text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 1.08k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
|Abrams, Steven -|
Submitted to: Pediatrics
Publication Type: Review Article
Publication Acceptance Date: December 15, 2010
Publication Date: March 1, 2011
Citation: Abrams, S.A. 2011. Dietary guidelines for calcium and vitamin D: a new era. Pediatrics. 127(3):566-568. Technical Abstract: Ensuring adequate intake of calcium and vitamin D are important nutritional goals for children. They are primarily important for bone growth and development, and recent data suggest the possibility of other important health benefits for these key nutrients throughout life. These new data prompted the Institute of Medicine (IOM) to reevaluate existing dietary recommendations for calcium and vitamin D. On November 30, 2010, the IOM issued a new report that provides dietary recommended intake (DRI) values for calcium and vitamin D for adults and children. The final publication of the report will be in 2011; thus, it will be known as the 2011 IOM report. | <urn:uuid:fabe7af4-413e-46f6-adb7-6ef26212121b> | CC-MAIN-2015-22 | http://www.ars.usda.gov/research/publications/publications.htm?seq_no_115=265558 | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929978.35/warc/CC-MAIN-20150521113209-00093-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.875462 | 203 | 2.796875 | 3 |
No constitution no statehood, for New Mexico it was as simple as that. The procedures and requirements for United States Territories to gain admittance to the Union derive from the Northwest Ordinance of 1787, which was an act of the Congress operating under the Articles of Confederation of the United States that created a formally organized territory out of an area northwest of the Ohio River. According to the precedent established by the Enabling Act of 1802, Congress had to pass such an act before admission of a territory to statehood. An enabling act authorizes the people of the territory to draft a constitution before being considered for statehood.1
Congress passed the Enabling Act for New Mexico on 10 June 1910, and President William Howard Taft signed it into law on 20 June.2 "Santa Fe is Wild with Joy," proclaimed The New Mexican after word of events in Washington reached the territorial capital.3 After much debate, the 1910 Enabling Act provided for New Mexico and Arizona to enter the Union as separate states.
One hundred delegates from around the Territory of New Mexico gathered in Santa Fe for a constitutional convention. The convention opened on 3 October at noon There were thirty-two Hispanic delegates and sixty-eight Anglo American delegates.4 Seventy-nine were Republicans and twenty-one were Democrats.5 The most influential Republicans reflected the views of the conservative wing of the party. In the main, Republicans supported statehood, and Democrats opposed it.
The atmosphere at the convention was tense, and some delegates were said to have kept weapons in their desks.6 Green Barry Patterson, a Democrat representing Chaves County, was a powerful political figure at the time. Patterson left the convention at the halfway mark because Albert Fall would not withdraw a remark made on the floor. Subsequently, Patterson carefully signed his name to the constitution and just as carefully crossed it out as a measure of his disapproval of certain provisions in the document.
As Thomas J. Mabry later observed
New Mexico's interests were varied, and in many cases, rather conflicting, and the idea of writing a constitution [that] would fairly serve the people for decades not years merely, and which would, at the same time, pass muster in a congress then divided, politically, with a democratic house and a republican senate, and which would meet the approval of a most conservative president, was no little problem.7
The convention lasted sixty days and adjourned on 21 November. Congress had stipulated that the constitution be place before the voters of New Mexico between sixty and ninety days after adjournment of the constitutional convention.8 Territorial voters approved the constitution on 21 January 1911.
When Congress and the very conservative President Taft examined the document, they found unacceptable the amendment article, Article 19, which made it essentially impossible to alter the constitution.
As adopted in 1910, Article 19 required that a legislative proposal for an amendment have a two-thirds' vote of the elected members of each house voting separately. The only exception was for amendments proposed at the first regular session convening two years after the adoption of the constitution and at each session convening every eighth year thereafter. No more than three amendments could be submitted at any one election.
Approval of the proposed amendment required an affirmative 40 percent vote of the people in at least one-half of the counties in the state. In addition, special protection was provided for Article 7, Sections 1 and 3, pertaining to election law, and Article 12,
Sections 8 and 10, pertaining to education. No amendment could be submitted to these sections "unless it be proposed by a vote of three-fourths of the members elected to each house voting separately. . .". As the final clincher, no amendment could be made to these requirements except by a constitutional convention.9
The remedy for this issue came in the form of the so-called Smith-Flood resolution, which required that this question to be voted on separately on a ballot printed on blue paper so that the New Mexicans would have the opportunity to change this provision and make it easier to amend the state constitution.10 For that reason, the amendment is referred to as the Blue Ballot Amendment. The Blue Ballot was voted on during the general election of state officers in 1911, and it passed with a comfortable margin on 7 November.11 Thus, the New Mexico constitution was amended before it became effective upon admission of the territory to the Union as the forty-seventh state on 6 January 1912.
1 Arnold H. Leibowitz, Defining Status: A Comprehensive Analysis of United States Territorial Relations (Dordrecht: Nijhoff, 1989), 6-8.
2 36 Stat. 557: authorizing formation of a State government and Admission thereafter.
3 Tom Sharpe, "1910's Enabling Act: Where New Mexico's March to Statehood Begins," The New Mexican, 27 November 2010.
4 Michael G. Chiorazzi and Marguerite Most. Prestatehood Legal Materials: A Fifty-State Research Guide, Including New York City and the District of Columbia (New York: Haworth Information Press, 2005), 781.
5 Le Baron Bradford Prince, A Concise History of New Mexico (Cedar Rapids, Iowa: The Torch Press, 1912), 217.
6 Santa Fe New Mexican, 27 October 1945.
7 New Mexico Legislative Council Service, Piecemeal Amendment of the Constitution of New Mexico, 1910 to 2010, 183150 (Santa Fe: New Mexico Legislative Council Service, 2011), iv.
8 Paul L. Hain, F. Chris Garcia, and Gilbert K. St. Clair. New Mexico Government (Albuquerque: University of New Mexico Press, 1994), 125.
9 Ibid., 3.
10 Prince Concise History, 217.
11 "New Mexico Constitution," http://www.iandrinstitute.org/New%20IRI%20Website%20Info/I&R%20Research%20and%20History/I&R%20at%20the%20Statewide%20Level/Constitution%20and%20Statutes/New%20Mexico.pdf (accessed 15 December 2011). | <urn:uuid:729a3384-b6ce-47aa-885d-2240be9ec3e6> | CC-MAIN-2015-11 | http://www.newmexicohistory.org/centennial/TheConstitution.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463708.99/warc/CC-MAIN-20150226074103-00331-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.95941 | 1,260 | 4.09375 | 4 |
Cyclic di-adenosine monophosphate (c-di-AMP) is a recently discovered bacterial second messenger implicated in the control of cell wall metabolism osmotic E7080 (Lenvatinib) stress responses and sporulation. second messengers1 2 One of these RNA-derived signaling compounds c-di-GMP is a cyclic dinucleotide made by fusing guanosine molecules via two 3′ 5 linkages. Fluctuations in local c-di-GMP concentrations in bacterial cells trigger a striking number of fundamental changes E7080 (Lenvatinib) in physiological status and these changes are interpreted by the cellular machinery through binding of this second messenger to numerous protein3 4 and RNA receptors5 6 A similar cyclic dinucleotide c-di-AMP was discovered in bacteria several years ago7. This compound which consists of two adenosine nucleotides joined via two 3′ 5 linkages (Fig. 1a) has been implicated in signaling the presence of DNA damage8 and cell wall stress9 10 Several protein receptors have recently been discovered that bind this molecule11. However it is anticipated that numerous additional receptors remain to be discovered that sense and respond to changing concentrations of c-di-AMP. Since the discovery of c-di-AMP we12 and others9 have considered the possibility that some newly-found riboswitch candidates might serve this purpose. As has occurred with other riboswitch classes5 12 the discovery of a c-di-AMP responsive riboswitch would reveal much of the underlying biology controlled by this signaling molecule. Figure 1 Binding E7080 (Lenvatinib) of c-di-AMP by a motif RNA Nearly a decade ago we reported the discovery of eight candidate riboswitch classes13. Four of these classes have since been proven to function as riboswitches for glycine14 glucosamine-6-phosphate15 7 (PreQ1)16 and divalent magnesium17. A fifth class called corresponds to the complementary sequence of a small riboregulator RNA called CsfG18. The three remaining “orphan” riboswitch classes are among the most common discovered to date and are predicted to control fundamental and perhaps underappreciated aspects of bacterial physiology. One of these three orphans motif RNAs in bacterial DNA CASIL sequence databases revealed a total of 3012 representatives corresponding to a revised consensus sequence and secondary structure model (Fig. 1b). Given the number and the diversity of genes controlled by this E7080 (Lenvatinib) riboswitch class20 we expected that identification of its ligand would lead to new insights on how bacteria trigger cell wall remodeling and respond to extreme physicochemical stresses. Unfortunately our previous attempts to identify the ligand were not successful19 which highlights the challenge of identifying the natural ligand for some orphan riboswitch classes21 22 Recently a motif representative from was reported to sense and respond to ATP23. However several existing observations suggested that ATP was not the primary ligand. First we previously reported that certain mutations likely affecting energy metabolism and ATP production in result in an increase in motif-mediated gene expression19. However the disruption of energy metabolism and the corresponding depletion of ATP also will affect the concentrations of numerous other metabolites. Therefore these and similar observations23 cannot be used as strong evidence for ATP riboswitch function. Second our analyses had ruled out tight binding of ATP by a similar RNA construct19. Third and perhaps most importantly genes associated with motif RNAs do not implicate ATP as the biologically relevant ligand13 19 Fourth our unpublished observations suggested that a much more tightly-binding ligand for this RNA existed in yeast extract. Our further efforts to characterize this intriguing riboswitch candidate revealed that all members examined respond selectively to c-di-AMP and E7080 (Lenvatinib) strongly discriminate against ATP by more than one-million fold. Furthermore and gene control experiments provide evidence that c-di-AMP and not ATP is the primary natural ligand for this riboswitch class. These findings reveal that riboswitch-mediated detection of c-di-AMP is important for the control of numerous genes involved in germination peptidoglycan biosynthesis and osmotic shock responses in a wide variety of bacteria. RESULTS The primary ligand for the riboswitch candidate To establish the biologically relevant ligand for motif RNAs we employed a biochemical purification strategy using yeast extract as a source of chemically diverse natural metabolites (see Methods). An assay for ligand binding was developed by combining equilibrium dialysis and in-line probing24 25 and the putative aptamer portion of the mRNA of called 165 RNA (Supplementary Fig.. | <urn:uuid:d2e9e75b-57f7-4a41-8722-b477743c887b> | CC-MAIN-2023-50 | http://biomedigs.org/2016/07/29/cyclic-di-adenosine-monophosphate-c-di-amp-is-a-recently-discovered-bacterial-second-messenger/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100781.60/warc/CC-MAIN-20231209004202-20231209034202-00533.warc.gz | en | 0.916538 | 957 | 2.6875 | 3 |
Instructions on how to enable your browser are contained in the help file.
WHAT ENGLISH LEVEL ARE YOU? CHECK WITH THIS TEST!
Who's that man? ___________
He's a colleague.
His's a colleague.
He's a colleague man.
Which sentence is correct?
That girl is some of my schoolmates.
This girl is one of my schoolmates.
That girl is me schoolmates.
This girl's are schoolmates.
'Whose DVD’s are they?' 'They're ___________'.
John works in a small town and ___________.
so does Simon too
that does Simon too
so Simon too does
that Simon too does
Linda is looking at ___________!
When ___________ his shopping?
Brian usually does
does Brian usually
does Brian usually do
usually does Brian
Which sentence is correct?
Go there to he.
Go here to him.
Go here to his.
Go there to him.
'Do you like that shop?' 'Yes, I ___________ every day.'
I arrived home early ___________.
My mother was ___________ all day.
in the home
at the home
Mark ___________ to buy a new car.
Tim usually travels ___________.
That's an old photo of my father when he ___________.
have long hairs
had long hairs
have long hair
had long hair
When they arrived, they ___________ the noise.
'Did you see Geoff in the cinema on Friday?' ' No,___________?'
was him there
has he been there
was he been here
was he there
That one is ___________ this.
the same as
the same than
the different from
When ___________, give him the letter.
Tom will arrive
Tom is arriving
Which sentence is correct?
What is whiskey from made?
What is whiskey made from?
What are whiskey made of?
What whiskeys are made from?
___________ wonderful day!
I'm going to give ___________ for birthday.
to him a book
a book him
some book to him
her a book
How's the baby? ___________.
She's a girl
She's very well
That's the baby
Susan's hat is ___________.
as expensive as your one
so expensive as yours
as expensive as yours
so expensive as your one
Which sentence is correct?
Were the players young?
Was the players young?
Was the players a young?
Were the players some young?
Last night our washing machine ___________.
was breaking down
had broken up
had broken down
I ___________ tennis since last year.
There are eight of them, so ___________ sit together.
all they may not
they can't all
all they can't
they may all not
His sisters told him ___________ old to watch cartoons.
he's getting too
he's getting so
he gets too
he gets so
When they next perform in town, I've promised ___________ her.
___________ at the moment, I'll go out for a walk.
As it isn't raining
As it doesn't rain
For it doesn't rain
For it isn't raining
In sports ___________ the opponent.
it's important respecting
it's important to respect
there's important respecting
there is important to respect
The cat shouldn't be in the kitchen! ___________!
Get out it
Put it off
Take it out
Take away it
Carol's a good runner, but she skies ___________.
I don't drink coffee and ___________.
neither does my sister
my sister doesn't that either
so don't my sister
my sister neither does
My mother usually cooks ___________ Sunday lunch.
anything nice to
something nice for
something nice to
anything nice for
John doesn't drink ___________ beer.
neither wine nor
or wine or
neither wine or
If I ___________, I would have asked her.
have seen her
would see her
had seen her
would have seen her
The project ___________.
finished four days ago
has finished four days since
finished since four days
has finished ago four days
I ___________ take you to the place where I met your mother.
will like to
would to like
am wanting to
would like to
I'll email you when I ___________ there.
will have got
I think I know him. I ___________ him last year at a party.
can have met
may have met
She didn't even look at us! That's ___________ I didn’t like.
the thing what
You may need ___________ glasses to read this.
a couple of
a pair of
Mary looks ___________ .
that he's happy
to be happy
I've been looking for them___________.
for all places
in all places
Silvia went to the library ___________ a book.
in order she borrows
for to borrow
Alan didn't know ___________ or stop.
to go on
if that he should go on
whether to go on
if should go on
If you ___________ come, just ask.
want that I
want I should
want me to
are wanting me to
'We're going to the theatre on Saturday.' 'So ___________!'
Patricia wants to get a ___________ with a higher salary.
Nobody could hear what they were ___________.
I couldn’t find Jane. 'She ___________ shopping,' I thought.
must be gone
must have gone
ought to had gone
I wish I ___________ find a better solution, but there isn't any.
___________ for her birthday.
50 pounds they were given to her
She was been given 50 pounds
She was given 50 pounds
There were given to her 50 pounds
She ___________ since 7 in the morning and she’s very tired.
has been working
They spoke about the incident ___________ the way home.
That's not the sort of film ___________.
I'm interested for
what I'm interested for
I'm interested in
what I'm interesting in
Brian wrote, 'I ___________ on the 15th'.
will be arriving
will be arrived
She has never seen me before. She’s confusing me with ___________.
___________ open the window for you
Do you want that I
Can't you like that I
This is very difficult to read! You ___________ the same difficulties, too.
must to have
ought to have
Do you think we’ll finish by seven o’clock? '___________.'
I'm not afraid so
I'm sorry not
I'm afraid not
I'm sorry that 'no'
They started early in the day so they ___________ finish in time.
___________ a good thing you brought an umbrella.
I would like ___________ it once again.
that you checking
you to check
you check to
Their presentation was a success, ___________ they hadn't prepared it very well.
in spite of
They couldn't afford the apartment as the ___________ was too high.
Anna was sitting ___________ in the garden.
in her own
We were sitting in for half an hour, waiting ___________ start.
for the film
for the film to
the film to
How long does the train take to ___________ London?
When I last checked, everyone was ___________.
I’m sure she wouldn’t mind ___________ me a favour?
I told them how to play it, but I ___________ the instructions, as well.
had to written
should have written
must have written
A lot of kids from our school had ___________ the race.
put themselves for
put their names for
The ___________ outside the house that we wanted to buy said 'Sold'.
Dinner will be ready ___________, but we still have time for a drink.
Mary has ___________ for the job and she hopes to get it.
They certainly didn't expect everyone to turn ___________ for the meeting!
We think one picture is very much like ___________.
Have you been to Barcelona? It's ___________ beautiful city.
I woke up and couldn't ___________ again.
put myself to sleep
get back to sleep
put myself for sleeping
get back to sleeping
John crossed the street and ___________ a van came round the corner.
while doing like that
as he did like that
as he did
at doing so
I wish I ___________ the windows before leaving.
would have checked
They could ___________ the project on time with more work.
Somebody left a hat ___________ mine in the room.
the same that
She ___________ through the door and then walked on.
I think you should take ___________ of such an opportunity!
The candidate promised to raise people's ___________ of living.
I’ve decided to do it just for my ___________ .
She reminds me ___________ somebody I met years ago.
David was ___________ that they had to take him to hospital.
having such ache
with such pain
in such ache
in such pain
Alison didn't dare ___________ to upset her father.
to do something
to do the thing
I ___________ petrol on my way home.
ran away with
ran down of
ran out of
Can you ___________ me it won’t need any more work?
Total chaos ___________ when the earthquake started.
Just when we think it’s over; a new problem ___________.
The machine you can see ___________ many tiny parts.
That door ___________ when opened. Can you oil it?
People need a ___________ family life to avoid stress.
He's always ___________ the government, but never votes.
I caught a ___________ of the animal before it disappeared.
This is more feedback!
This is the feedback!
Back to Top | <urn:uuid:ddab043a-45e7-40ea-b811-c23ad842180c> | CC-MAIN-2017-34 | http://www.corporatecoaching.si/test/EnglishTest.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105187.53/warc/CC-MAIN-20170818213959-20170818233959-00164.warc.gz | en | 0.912548 | 2,218 | 2.71875 | 3 |
Background: As of March 2021, in the USA, the COVID-19 pandemic has resulted in over 500,000 deaths, with a majority being people over 65 years of age. Since the start of the pandemic in March 2020, preventive measures, including lockdowns, social isolation, quarantine, and social distancing, have been implemented to reduce viral spread. These measures, while effective for risk prevention, may contribute to increased social isolation and loneliness among older adults and negatively impact their mental and physical health. Objective: This study aimed to assess the impact of the COVID-19 pandemic and the resulting “Stay-at-Home” order on the mental and physical health of older adults and to explore ways to safely increase social connectedness among them. Methods: This qualitative study involved older adults living in a Continued Care Senior Housing Community (CCSHC) in southern California, USA. Four 90-minute focus groups were convened using the Zoom Video Communications platform during May 2020, involving 21 CCSHC residents. Participants were asked to describe how they were managing during the “stay-at-home” mandate that was implemented in March 2020, including its impact on their physical and mental health. Transcripts of each focus group were analyzed using qualitative methods. Results: Four themes emerged from the qualitative data: (1) impact of the quarantine on health and well-being, (2) communication innovation and technology use, (3) effective ways of coping with the quarantine, and (4) improving access to technology and training. Participants reported a threat to their mental and physical health directly tied to the quarantine and exacerbated by social isolation and decreased physical activity. Technology was identified as a lifeline for many who are socially isolated from their friends and family. Conclusions: Our study findings suggest that technology access, connectivity, and literacy are potential game-changers to supporting the mental and physical health of older adults and must be prioritized for future research. | <urn:uuid:7b2f963c-eea2-417c-a42f-8bab842ccccf> | CC-MAIN-2023-06 | https://research.ibm.com/publications/health-impacts-of-the-stay-at-home-order-on-community-dwelling-older-adults-and-how-technologies-may-help-focus-group-study | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499768.15/warc/CC-MAIN-20230129211612-20230130001612-00203.warc.gz | en | 0.9677 | 398 | 2.84375 | 3 |
Volume 6, Number 9
ELECTION '93: What role did television
play in the outcome?
PRIOR TO THE 1993 CANADIAN FEDERAL ELECTION campaign, the Liberal and New Democratic
parties complained that the media had been biased in favour of Kim Campbell and the
Conservative party by covering her summer events almost to the exclusion of all else. But
during the campaign, it was the Conservatives who complained of media bias against them
and their leader. Throughout the campaign Campbell was often heard complaining that the
media were not faithfully conveying her message to the public. For example, on 24
September, CBC's Denise Harrington reported: "Campbell also complained that the media
travelling with her reported unfairly what she said." Similarly, on the same day,
CTV's Leslie Jones said: "Campbell was clearly frustrated with the media's focus. She
says the Liberal refusal to tackle the deficit is guaranteed to result in the destruction
of Canada's social programs. That, she says, is what the media should be concentrating
The issue of balanced coverage of the parties typically arises during election campaigns.
In light of the devastating losses the Conservative and New Democratic parties received at
the polls it has never been more important. What role did television news play in these
losses, and equally important, how did television attention to the Liberal and Reform
party campaigns reflect in their huge gains in the election returns?
This issue of On Balance assesses national television coverage of the 1993 federal
election campaign. It examines the amount of attention all the parties received; the
proportion of positive, negative and factual coverage, as well as the amount of attention
the networks allocated to examining the issues.
Conservatives Most Frequently Discussed Party
ON BOTH NETWORKS THE PROGRESSIVE Conservatives were the most frequently mentioned party;
they received 32 percent of CBC and 31 percent of CTV attention to the political parties.
The Liberals received 26 percent of both networks' attention (figure A).
Click here to view Figure A: Assessments of the Parties
Traditional parties covered in traditional ways
The Progressive Conservatives and the Liberal parties were essentially covered in the same
ways that they had been in past elections. These two parties were portrayed as old,
traditional parties. Coverage of the PCs and Liberals focused extensively on campaign
strategies, the horse-race and following the leaders.
The campaign strategies of the Conservatives under the leadership of Kim Campbell received
the most negative assessments. Almost three-quarters of the assessments of the
Conservative campaign were unfavourable. Assessments of the Liberal party's campaign
performance were balanced.
Television treated Chretien better than Campbell
Early on, it appeared that the Conservative party would be judged on how it presented its
message, rather than on the message itself. In the first week of the campaign, reporters
commented on how they themselves were being treated by the two main parties. For example,
on 12 September Keith Boag reported: "Courting the media has always been part of the
game, but in this campaign the Liberals are taking that game to a higher level. Take their
media bus: it has seduced reporters. They're in love with it. Not only is it roomy and
comfortable, with televisions, and so on, but each reporter also has a work space with a
table, a lamp and a telephone. And there's a fax machine in the back. For print and radio
reporters that means deadlines are suddenly easier to meet. They can file stories straight
off the bus. On the Tory bus, organizers are aware that reporters covering them feel
they're not treated as well as reporters covering the Liberals. The party is trying
harder: last night the Tories offered reporters and technical crews tickets to the
Montreal Expos game. The Liberals insist their service to the media is not an attempt to
jolly reporters into sympathetic coverage. They're just trying to help."
The differences in the campaign styles of Chretien and Campbell underscored the
relationship each had with the press during the campaign. Chretien was accessible, funny,
and best of all, portrayed himself as the elder statesman with clever tales from campaigns
gone by. In contrast, Campbell was not as readily available to the national press corps.
As a result, her youth worked against her--she was not portrayed as a seasoned leader. In
fact, her inexperience aided the media in their relentless pursuit of "the
Campbell portrayed as confused
What is even more significant about the way in which the media treated Kim Campbell and
Jean Chretien was that Campbell was portrayed as confused, and often having to explain and
re-explain her statements, especially in French. For example on 9 September Denise
Harrington concluded her story stating: "But Campbell left confusion behind at the
end of what was planned as a picture-perfect day."
In contrast, Jean Chretien was rarely asked to clarify his statements.
Campbell and Chretien judged by different standards
Various media personnel have described Kim Campbell's September 23 remarks that social
programs could not be completely overhauled in 47 days as "the defining moment of the
campaign." Probably no other incident best illustrates the power of the media. After
all, it was the media who dubbed Campbell's statement as "defining" and it was
the media who emphasized those remarks throughout the remainder of the campaign to ensure
that they in fact did define the campaign. The role of the media in identifying these
"defining moments" and in ignoring others is best illustrated in the comparison
of Kim Campbell's 47 day remark to one Jean Chretien uttered a few weeks later.
On October 7 Jean Chretien stated to reporters: "Let me win the election and after
that you come and ask me questions about how I run the government." While Kim
Campbell tried to emphasize the statement, not only did the media fail to emphasize
Chretien's comments as they had Campbell's earlier remarks on revamping social welfare,
but they only provided scant information on the statement Campbell was attempting to
highlight: For example, on the CTV News that night Sandie Rinaldo stated: "Prime
Minister Kim Campbell accused Chretien today of ducking tough questions about what he
would actually do in office. The Tory leader said Chretien wants people to elect him first
and ask questions later. And she added this description of the Liberal leader's campaign.
Kim Campbell: Mr. Chretien is running what I've referred to as the closed casket
campaign. Viewing from three to five every afternoon, please speak in hushed tones and at
all costs do not ask a question.
On CBC, while Campbell's quip was mentioned, more attention was made to a supposed
contradiction in her remarks on the deficit projections.
Paul Adams: Later, with the national press corps, she insisted
she was being misunderstood.
Q: I'm just wondering. Do you have doubts that you can get to zero by 1999?
Kim Campbell: No, I think that it's realistic. I think it's tough but I think
Paul Adams: . . . The mix-up over Campbell's deficit plans illustrate
once again a problem that's plagued her campaign: her off-the-cuff remarks have often
distract from the message she'd like to deliver. Even when the Tories go on the offense,
it seems, they spend some of their time playing defence.
Reform only party judged on issues rather than on campaign
While television reporters were judging the merits of the Conservative and Liberal parties
on the basis of their campaign, the Reform party was being judged on its policies. Being
judged on policy rather than on the campaign gave Reformers a clear advantage over the
other parties. Claims made by Preston Manning that Reform was different was supported by
the different reporting style that television offered them. While Kim Campbell was
consistently being questioned on campaign strategies, or explaining a current gaffe,
Preston Manning was presenting the Reform party's vision for a new Canada.
This ability to present concrete policy alternatives to those put forward by the
traditional parties also helped increase national television. By the second week of the
campaign, they received more attention than the traditional Canadian third party, the NDP.
By the leaders' debate, media attention to the Reform party had intensified. On October
12, CBC Prime Time devoted most of its magazine to the Reform party. Not only was Reform's
rise in the public opinion polls highlighted, but Preston Manning gave an interview which
examined many of the party's policies.
The increased scrutiny did not come without some costs. In the early weeks of the
campaign, assessments of Reform were three times as likely to be favourable as
unfavourable. As the media spotlight shone more brightly on Reform, the proportion of
assessments began shift. Despite this increased attention, Reform remained the only party
that was able to withstand the increased scrutiny. In previous weeks, whenever any other
party became the major focus of television news, their negative attention surpassed their
positive attention. The Reform party went from where favourable assessments of them
outnumbered unfavourable assessments of them three to one, to balanced assessments of
NDP fail to attract national television attention
In all, the NDP received 10 percent of both CBC and CTV attention to the parties. During
the fourth week of the campaign, New Democrats received less attention on CTV than did the
The inability of the NDP to attract national attention became a self-fulfilling prophecy
on the part of the media. At the onset of the campaign, the NDP were low in the polls and
had difficulty in getting visible support at public meetings. The media reported this lack
of popularity. As the campaign progressed, this inability to persuade the media that the
NDP were a significant factor in turn amplified the swing in popular support away from
CTV provided negative assessments of the NDP campaign more frequently than they did
positive assessments. Assessments of New Democrats on CBC were slightly more positive than
negative. The feeling that New Democrats were given an easier ride than the PC party was
highlighted in a 22 September Globe and Mail story by Murray Campbell: "Campaign
reporters agree that some days they are softer on Ms. McLaughlin than they would be on
Progressive Conservative Leader Kim Campbell because the NDP seems so out of the
Bloc able to begin dialogue with English Canada
In Lucien Bouchard's first election speech in English Canada he indicated that the reason
for the engagement was that he wanted to promote understanding of his cause in English
Canada: "I'm here today because I strongly believe in the possibility of a dialogue.
In my view, this is imperative when one considers the events which are more likely, more
than likely to unfold in the coming months and years." Essentially, this wish was
fulfilled by national television news. The Bloc received more attention than the NDP and
on CTV rivalled the attention payed to the Western-based Reform party.
Moreover, the emphasis on the Bloc resulted in Quebec's issues being discussed more
frequently than those from other regions. Slightly more than half of CBC and half of CTV
attention to the regions examined Quebec. In contrast, Western Canada received less than
one-fifth of CBC and one-fifth of CTV attention. Ontario was practically ignored compared
to previous elections, receiving slightly more than 10 percent of network coverage.
The Bloc was presented in English national television news as the potential official
opposition. Much of the media attention to Bloc reflected the possibility of this outcome
as well as the speculation on what role a separatist party would play in a federal
Results are based on census samples of 237 CBC Prime Time, 17 National (aired on
Saturday), and 26 Sunday Report stories as well as 252 CTV News stories from September 8
to October 24, 1993.
All stories appearing during that time were coded, representing a total population rather
than a random sample of stories.
Two researchers were employed in coding the news stories. The researchers were selected on
the basis of their differing political views. To assess the clarity of the research
instrument and measure consistency, tests of inter-coder reliability were conducted
throughout the procedure. A random sample of 15 percent of the stories were recoded for
the inter-coder reliability quotient. A high level of intercoder reliability (0.87) was
obtained. Further information or details on the coding design and methods may be obtained
by contacting the National Media Archive.
Networks Fail to Live Up to Campaign Promises
AT THE START OF THE ELECTION CAMPAIGN, CBC and CTV predicted that issues would dominate
this campaign. On CTV, Ottawa Bureau Chief Craig Oliver said: "I hope this will be an
election in which content will be more important than the contest. And I think voters are
gonna force it to be, because there's such a state of high anxiety out there. People are
worried about their jobs and their livelihood, and they want to find out who might offer
them some answers to meet those concerns. They're gonna want specifics. They're gonna want
concrete, they're gonna watch issues, I think, this time around, very closely."
Pollster Angus Reid echoed that remark: "Oh I think there's no question that this is
gonna be a campaign far more about substance than style." Similarly, CBC suggested
that its coverage would be different with this campaign; they would aspire to listen to
the people. More importantly, they introduced segments that examinee the issues in more
detail. For example, CBC provided a "Reality Watch" segment with Brian Stewart.
CBC increases horse-race coverage; on CTV it decreases from 1988
In terms of the horse-race, i.e., covering the gains and losses in public support, the
networks differed from each other and from previous campaigns in their attention. CBC
nearly doubled the proportion of its total attention to the horse-race from 1988.
Meanwhile, CTV decreased its total proportion of attention to the horse-race from 15
percent in 1988 to 12 percent of the total attention in 1993.
In the end, both networks gave the substantive issues, such as jobs, free trade, or health
care, less attention in 1993 than in 1988. In 1988, CBC examined the issues in 38 percent
of its attention to the election; in 1993, issue coverage went down slightly to 35 percent
of total attention. On CTV, the difference was even more dramatic. In 1988, the private
broadcaster examined the issues in 38 percent of the coverage, whereas in 1993 the issues
were discussed in only 27 percent of total election coverage.
Free trade ignored in Week 1
Figure B depicts how substantive issues (like the economy or social concerns) compared to
campaign process (such as following the leaders) were reported on a weekly basis. During
the first week of the campaign economic issues were given only 19 percent of CBC and 28
percent of CTV attention--Jobs were the main focus of discussion.
Click here to view Figure B: Weekly Election Coverage
Free trade, the dominant theme of the 1988 election campaign, was barely mentioned in the
first week of coverage. Only two percent of CBC and four percent of CTV overall attention
in the first week of the campaign mentioned free trade, despite the fact that during this
time side agreements to NAFTA were signed by U.S. president Bill Clinton and Canadian
Prime Minister Kim Campbell. While the signing ceremony in the U.S. was reported, it was
not discussed in reference to the Canadian election. On the other hand, CBC did report
that Saskatchewan politicians should avoid election campaigning to farmers until the
harvest was completed.
Liberal's "Red Book" shifts CBC's attention to economic issues
in Week 2
The announcement of the Liberals' economic platform in the second week of the campaign,
which came to be known as the "Red Book" shifted CBC's focus on the campaign to
the economy and jobs. Forty three percent of CBC's coverage during the second week of the
campaign examined economic issues. In contrast, CTV's overall attention to economic issues
decreased to 25 percent in week 2.
Conservative policies fail to attract television attention in Week 3
The prime minister's two major speeches on the Conservative party platform were not given
the same amount of attention as the Liberal party platform released a week earlier.
Reporters' analysis about Kim Campbell's speeches were more likely to focus on the change
in strategy than on discussing what she had to say.
Only 25 percent of CBC's and 18 percent of CTV's attention to the campaign focused on
economic issues during week 3, despite the fact that the polls quoted by television news
during that same week cited jobs as the most important issue in the election campaign.
Social issues were discussed in 17 percent of CBC and 16 percent of CTV's attention to the
election. That level of attention was partly a result of CBC's "Town Hall"
series, and partly from the prime minister's controversial remarks that discussion of a
complete overhaul of Canada's social policies in all their complexities could not be done
in the time allotted in a 47-day campaign.
Debate coverage fails to address issues in Week 4
Coverage of the debates focused on the preparations made by the leaders and assessments of
their performance rather than on what the leaders had to say. Less than one-third of both
CBC and CTV national television news attention to the election for the fourth week of the
campaign focused on the issues.
CBC gives more substantive coverage than CTV during Week 5
During the fifth week of the campaign there were some stark differences between the
networks in their coverage of the issues. CBC balanced its coverage of the campaign with a
discussion of substantive issues. Half of the coverage examined the leaders, the
horse-race and campaign strategies. The remainder looked at party platforms and issues.
CTV was not as diligent in providing the issues to its viewers: nearly four-fifths of its
coverage examined the campaign. Only 22 percent of the private broadcaster's coverage of
the fifth week of the campaign examined issues.
CBC outlines policy position in Week 6
The majority of the discussion in the final days of the campaign continued to be strategy
and the horse-race. Two-thirds of CBC and four-fifths of CTV attention to the campaign
focused on election predictions, following the leaders, and campaign strategy profiles.
Although the proportion of coverage was dominated by campaign strategies of the major
parties, CBC had been quite responsible in outlining the major parties' specific policy
positions. The best example of this was on the 19 October Prime Time where two economists
dissected the economic policies of all the parties. This is how Peter Mansbridge
introduced the segment: "It is not all that easy to sort out what the politicians are
saying about their own or each other's plans to cut the deficit and create jobs. It may
not require a degree in economics to make sense of what the politicians are saying, but a
quick lesson in some of the basics just might help. So whether you are completely confused
or simply have a few questions lingering, stick with us. We're joined tonight by two
economists who are going to help us get past all the political rhetoric."
The segment began with a discussion on the difference between the debt and deficit. It
discussed the reality of campaign promises made by the various parties such as job
creation and deficit reduction.
The New Television Pundit: The Public
ONE CAMPAIGN PROMISE MADE BY THE networks that they did fulfil was their pledge to allow
voters more opportunity to voice their concerns. Since the Referendum campaign there has
been a significant amount of discussion about how politicians and media outlets have
failed to address the concerns and needs of the so-called "average Canadian."
During this election campaign, both CBC and CTV offered ways in which the public could be
heard. On CBC there was the "Voter's Voice," whereby a focus group of voters
would provide a second-by-second electronic assessment of various clips of the leaders or
their advertisements. As well, CBC resurrected its "Town Hall," first featured
in the Referendum, in which a group of Canadians were assembled in Roy Thompson Hall in
Toronto to ask representatives of the parties questions on issues. On CTV, Sunday nights
saw a sampling of opinion from popular radio programs across the country.
These innovations magnified the role of the public for the first time in any election
campaign. The "average Canadian" received more attention than any other group or
political party. As figure C shows, 23 percent of CBC and 24 percent of CTV sources'
statements originated with the public.
Click here to view Figure C: Sources
The difference between CBC's and CTV's use of the public is noteworthy. While CTV went to
open-line talk shows to sample public opinion, CBC selected the participants with the aid
of a marketing company. While CTV made no assertions that those presenting their opinions
were partisan or undecided, CBC specifically indicated when the group was leaning toward a
party, was undecided or was firmly committed.
The networks' use of the public differed not only in selection but in content. While CTV's
sources were concerned about the issues, they did not convey the same anger those on CBC.
For example, at the end of the first Town Hall meeting Peter Mansbridge wondered aloud:
"I mean, was there no one in this whole room who liked anything they heard tonight on
the part of candidates?" A response from one woman was: "I would like to say
this evening that I don't feel that any of the questions were answered appropriately. I
think a lot of people side-stepped issues and it's really unfortunate. And actually I have
to say personally I was almost offended by the Bloc Quebec-ois and their stance on issues,
because they're looking solely at Quebec and when we're trying to get our country back
together and have Canadians work together now, I really feel insulted as a Canadian that
your issues are only pertaining to Quebec."
Conservatives provide most statements
In terms of access to television, the Conservatives were given access to the greatest
number of statements on both networks. One fifth of CBC and CTV sources' statements
originated with the Conservative leader, candidates or supporters. The Liberals received
15 percent of CBC and 16 percent of sources' statements. Reformers presented more
statements than either the NDP or the Bloc.
You can contact us at the above email address for any comments or information requests. Please report any dead links or technical problems.
Last Modified: Wednesday, October 20, 1999. | <urn:uuid:c832215a-cb06-4ef8-9d7d-2d13b35edb8c> | CC-MAIN-2014-49 | http://oldfraser.lexi.net/publications/onbalance/1993/6-9/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400373301.1/warc/CC-MAIN-20141119123253-00033-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.973324 | 4,800 | 3.1875 | 3 |
Fifth Anniversary of Virginia Tech Massacre
Yesterday marked the fifth anniversary of the horrific shooting at Virginia Tech, where a mentally disturbed student named Seung-Hui Cho opened fire on his classmates, killing 32 and wounding 25 others. One of the victims was a Jewish Holocaust survivor and professor who used his body to barricade his classroom door to allow his students to escape. It was the deadliest shooting committed by a single person in American history.
The shooting highlighted problems with national gun control legislation, including a lack of state compliance with a federal law that should have stopped the mentally disturbed student from being able to purchase guns and ammunition. While this specific problem was fixed in large part as a result of the shooting, the lapse of the Federal Assault Weapons Ban in 2004 has allowed for the proliferation of guns that use high-capacity ammunition clips, such as those used in the shooting, which are designed to inflict as much damage as possible without the need to reload.
For the first time since the attack, Virginia Tech held classes on April 16. There was also a statewide moment of silence at 9:43 a.m., the time when shooting in the classroom building began (Cho had shot two other students in a residence hall by that point). Certainly we have an obligation to remember the victims of this tragedy. Jewish values emphasize the sanctity of human life and teach that the loss of even one life is as devastating as the loss of entire world. But our responsibility extends beyond that, too: to ensure that nothing like this ever happens again.
Image courtesy of The Washington Post. | <urn:uuid:684a72c0-5591-4f60-b5cb-61e81c5939e2> | CC-MAIN-2016-36 | http://blogs.rj.org/rac/2012/04/17/fifth-anniversary-of-virginia-tech-massacre/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982932747.45/warc/CC-MAIN-20160823200852-00202-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.976583 | 316 | 2.609375 | 3 |
The debate on global warming is burdened with unfortunate misconceptions that inhibit progress in moving forward (see “Planning for a Climate-Changed World”).
One misconception is that “draconian measures” would be required to mitigate global warming. This is simply not so, if we implement a prudent program right away. Such a program would include four major strategies: increased energy efficiency (in buildings, autos, and appliances), coal mitigation (which includes increased use of solar, wind, geothermal, and perhaps nuclear power, as well as carbon capture and sequestration for coal-fired power plants), the development of new biofuels (such as cellulosic ethanol), and reversal of deforestation. These strategies can stabilize atmospheric concentrations of greenhouse gases at acceptable levels and for acceptable economic costs.
Another misconception is that it would be better to wait to take action until technology provides new options. In fact, we need to start reducing emissions right away. If we delay, the world will face a dreadful dilemma: the choice between adopting draconian measures and passing the “tipping point beyond which it will be impossible to avoid climate change with far-ranging undesirable consequences,” as the NASA climate scientist James Hansen puts it.
Another misconception is that a cap-and-trade system is the best approach to controlling the various greenhouse gases. Such a system sets a cap on total emissions and distributes emission allowances (or permits to emit) to market participants. These participants must buy allowances if they don’t have enough, and they may sell them if they have an excess. Such a system has helped reduce sulfur and nitrogen emissions from power plants in the United States.
But there are major problems with relying too heavily on this approach. The biggest is that it is too hard to figure out the economic and environmental effects. Prudent people do not want to risk unacceptable economic consequences. Other prudent people do not want to risk accomplishing too little. A politically acceptable compromise might take a long time and would probably tilt too far toward economic prudence, failing to achieve the necessary reductions.
Performance standards are a simpler approach. They would directly regulate the pollutants from new sources of emissions, such as power plants and autos, and mandate greater efficiency for new appliances and buildings. Performance standards can be implemented right away, without fear of unforeseen adverse economic consequences. They alone would result in major emission reductions over time. Such reductions could then be complemented by whatever additional help a cap-and-trade system provides.
Hoff Stauffer is the managing director of the Wingaersheek Research Group, which focuses primarily on global climate change. He previously worked at the U.S. Environmental Protection Agency and various consulting firms. | <urn:uuid:b06186b6-fd41-4f90-aa0c-5b07448f9d1c> | CC-MAIN-2015-27 | http://www.technologyreview.com/notebook/407847/global-warming-myths/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094690.4/warc/CC-MAIN-20150627031814-00157-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.941344 | 552 | 3.25 | 3 |
UNESCO has a total membership of 193 states and eleven associate members. The associate members are not independent states. It is worth noting that not all member states of the UN are members of UNESCO. There are three nations that are members of the UN, but not members of UNESCO: the United States of America, Israel, and Lichtenstein. Liechtenstein has not been a member of UNESCO, but it is a member of National Organizing Committees (NOC). The US and Israel were members, but they pulled out of the organization citing bias against Israel.
The United States of America's First Withdrawal
The US was among the founding member states and joined the organization on November 4th, 1946. However, the US withdrew its membership from UNESCO on December 31st, 1984. In December 1983, the US president at the time, Ronald Reagan, announced the decision to pull out of UNESCO, and the reasons given by Reagan's administration was that the organization had become highly politicized in almost every subject that the UNESCO was dealing with. Reagan also argued that UNESCO had exhibited hostility towards a free society, particularly a free press and free market, and that it has demonstrated unchecked budgetary expansion. Earlier in 1974, the then US president Gerald Ford had frozen remittances to UNESCO because it had recognized Palestinian liberation organization (PLO). Experts also believe that Reagan's decision was trying to quell presumed and real Soviet influence in different parts around the world. The United States of America joined UNESCO again as a member on October 1st, 2003, under the administration of George W. Bush.
The United States of America's Second Withdrawal
The United States of America gave the intention to withdraw from UNESCO on October 12th, 2017, and it became effective on December 31st, 2018. At the time, President Trump gave reasons why the US was withdrawing from UNESCO, and he cited the mounting arrears to the organization and the need for fundamental reforms in UNESCO as well as the continuing anti-Israel bias. Earlier in 2011, Obama's administration had frozen America's contributions to UNESCO, after the organization granted full membership as a state to Palestine, becoming the first UN agency to do so.
UNESCO's Anti-Israel Bias
In 2016, UNESCO approved resolutions which the US and Israel have claimed is anti-Israel that ignored the Jewish links to Jerusalem’s holy sites. The organization refers to Temple Mount Complex/Haram esh-Sharif by only English and Arabic names and ignores the Hebrew name. UNESCO also had previously referred to Israel as occupying Palestinian territories. UNESCO adopted another controversial resolution in 2017 when it designated the Al-Khalil Old Town/Hebron as a cultural Heritage Site belonging to Palestinians. The site is located in West Bank and it is home to the tombs of Patriarchs, which is known as Machpela in Judaism.
The Impact of Membership Withdrawal
The US payment to UNESCO accounted for about 22% of the total budget of the organization. The US alone has accrued unpaid dues which add up to more than $600 million. The state of Israel is estimated to owe the organization about $10 million. | <urn:uuid:1b799701-e343-43e9-b151-c8ceae67c37e> | CC-MAIN-2020-34 | https://www.worldatlas.com/articles/which-three-un-member-states-are-not-unesco-members.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740423.36/warc/CC-MAIN-20200815005453-20200815035453-00552.warc.gz | en | 0.980064 | 642 | 3.015625 | 3 |
Since 2007, over 1,700 families have taken part in Our Fragile X World projects. They have given important information about how fragile X affects their lives. The reports below summarize key findings from these projects.
School Settings of Students with Fragile X
Our Fragile X World researchers studied types of educational settings of students with fragile X, the types of support they get, and how this support affects learning
A Comparison of Functional Academic and Daily Living Skills in Males with Fragile X Syndrome with and without Autism
Our Fragile X World researchers studied when males with fragile X syndrome master certain everyday life skills, and whether the skills of males with fragile X syndrome differ from males who have a co-diagnosis of autism.
Family Communication and Cascade Testing for Fragile X Syndrome
Our Fragile X World researchers studied how families communicate about fragile X syndrome and what factors play a role in the decision to test other children and extended family members.
Aggression in Fragile X Syndrome
Our Fragile X World researchers studied aggression in individuals with fragile X syndrome and how it affects the parents and legal guardians who take care of them.
FIRST NATIONAL FRAGILE X SURVEY SUMMARY REPORTS
Overview of the National Fragile X Survey
This report provides an overview of the National Fragile X Survey. The overview talks about why and how the survey was done. It also describes the families and children who took part in the survey and what was learned during the 3-year project.
Download (PDF, 413 KB)
Getting the Diagnosis of Fragile X Syndrome
This report describes how families find out their child has fragile X syndrome. We found that when families first express concerns about their child, they are often told to "wait and see" if their child’s language or behavior gets better. It often takes between three and five visits to a specialist before a child is tested for fragile X syndrome. As a result, the average age of diagnosis had stayed the same over the previous 7 years (2001-2007).
Download (PDF, 1 MB)
Conditions Associated with Fragile X Syndrome
This report gives information on nine conditions that are common in people with fragile X syndrome. These conditions include
- developmental delays (problems learning developmental skills, such as walking, talking, and playing with others)
- attention problems
- hyperactivity (higher than normal level of activity)
- self-harm or self-injury
- autism (disorders that make it hard to communicate and form relationships)
- seizures (fits of uncontrolled movement)
Overall, males with fragile X had the highest levels of these conditions. Females with fragile X also had these conditions but to a lesser extent. These results show the need for doctors and other care providers to track signs of these conditions and treat them as soon as they can.
Download (PDF, 795 KB)
Daily Living Skills of Individuals with Fragile X Syndrome
This report gives information about the daily living skills of people with fragile X syndrome. These skills include eating, dressing, using the toilet, bathing, communicating, speaking, and reading. We report results across five age groups: birth to 5 years, 6 to 10 years, 11 to 15 years, 16 to 20 years, and over 20 years. Most adults had mastered many skills on their own. However, some of their skills were not as well developed. These were skills such as using complex sentences, reading, or speaking at a normal volume. As expected, differences were found between males and females.
Download (PDF, 890 KB) | <urn:uuid:bbb76ed3-6eb9-4ade-8f10-baee38950a2e> | CC-MAIN-2019-04 | https://ourfragilexworld.org/reports | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583745010.63/warc/CC-MAIN-20190121005305-20190121031305-00308.warc.gz | en | 0.956426 | 733 | 3.4375 | 3 |
Srimad Bhagavatam, Mahatmyam, Chapter One Sloka 13: Shukam natuvam.
Translation: The Devas, who are known to do things that please themselves, offered Amruth from the kalasha (pot) to Sri Sukha and in return wanted the Amruth called Srimad Bhagavatam
Interpretation: It is implied in Suthan’s narration that the essence of Srimad Bhagavatam is much greater than Amruth which can make one immortal. More of it in next sloka.
Srimad Bhagavatam, Mahatmyam, Chapter One Sloka 14: Evamvinimaye.
Translation: The Devas tell Sri Sukha, once we exchange the kalashas (pot of immortality of the Devas and the pot of Bhakthi of Sri Sukha), let King Parikshit take the Amruth so that he becomes immortal and will not be affected by death from a serpent bite. In return, we will get the Amruth called Srimad Bhagavatham.
Interpretation: Sutan makes it clear that Srimad Bhagavatam is for devotees and believers who have bhakti and not for ‘traders’ like Devas. Moreover, Srimad Bhagawatham is supreme, much above Amruth. This is elaborated in the next sloka. But one point: One should read Srimad Bhagawatham not expecting any returns. One need not even pray for Bhakti because the Supreme Text by itself is meant to generate Bhakti. You do not ask the fire to give heat; it is inherent in the fire; so is Bhakti in Srimad Bhagavatam.
srimad bhagavatam, Mahatmyam, Chapter One Sloka 15: Kvasudha, kvakatha.
Translation: Where is Amruth of the Devas and the Amruth called Srimad Bhagavatam, where is an ordinary stone and a diamond? There is an ocean of difference between the two Amruths.
Interpretation: When Amruth gets over, the Devas have to be reborn, but there is no rebirth after one gets the essence of Srimad Bhagavatam as one attains moksha. This implies that Srimad Bhagawatham cannot be compared to Amruth. Sri Sukha showed how the Amruth of the Devas was far inferior and implies that there could be no barter agreement with Srimad Bhagavatam which is unique in Bhakti. Srimad Bhagavatam is a diamond while Amruth is as worthless as an ordinary stone.
Srimad Bhagavatam, Mahatmyam, Chapter One Sloka 16: Abhaktam..
Translation: Knowing that the Devas are after materialistic wealth and happiness, Sri Sukha refused to partake Srimad Bhagavatam to them.
Interpretation: This shows that Srimad Bhagavatam, which is refused to the Devas, is sacred. If the knowledge was denied to the Devas, what about humankind who see Bhagawatham as a means to attain materialistic gains? | <urn:uuid:88de1ae7-2ede-4c40-842e-4c38f886a20e> | CC-MAIN-2023-50 | https://atmanirvana.com/fountainhead-of-bhakti-moksha/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00343.warc.gz | en | 0.945199 | 712 | 2.515625 | 3 |
The accelerated digital transformation trend has increased the demand for cybersecurity professionals to mitigate the associated risk and keep systems protected. In fact, the 2021 (ISC)2 Cybersecurity Workforce Study indicated a persistent shortage even after the addition of 700,000 professionals into this space, with 2.72 million openings still unfilled by October.
So as more people seek various levels of cybersecurity education, there’s a growing need to provide training that sticks, since the stakes are high. One emerging approach is the use of gamification, so let’s discuss its effectiveness in cybersecurity training and how to use it:
How does gamification work?
Gamification is all about turning an exercise into a game or incorporating small games at different stages of the exercise. This usually takes the form of a competition where an individual can establish a score, solve a puzzle or discover a hidden element. They may also compete with a group for an ultimate prize. By infusing cybersecurity objectives into a game, students can be more engaged in learning while absorbing information passively.
The prize also gives the student more incentive to get things right, so with sharper focus during the active efforts, they are more likely to retain the knowledge applied. Gamification also encourages the idea of immersing students in real-life situations to build their composure for instances when they’ll have to apply security measures and respond to attacks.
What complicates gamification of cybersecurity training?
Unfortunately, some games are too advanced for students with preliminary knowledge, so they can’t get far into these games without having to first take separate studies.
Whether it’s Defend the Crown, Hotel Hijinks, Network Collapse, Capture the Flag, or some other game, there are always limitations aside from the difficulty level. On that note, here are some essential tips to follow when creating and using games in cybersecurity training:
Select a format
Remember that there are very few new ideas; sometimes, copying well can work better than having an original but lousy idea. Start by checking other games and identify the elements you like, especially those that are similar concept-wise. The format you chose can also be guided by the volume and complexity of the lesson you’re trying to convey. For a procedure with a few simple steps, you can go for something that resembles a basic sliding tile puzzle.
However, if you want to teach students how to respond to an intricate network attack involving numerous assets or a high level of concealment, you definitely need something more captivating. You’ll also need to be able to create an atmosphere of urgency, so you may need a visual story game. Ensure that the objective is clear and that any relevant information regarding the relationship between sub-missions is available.
Establish your target audience
While the knowledge level is integral to picking a target audience, this step is about more than that. You may start with ordinary User Access Control and gradually flesh out the game with more components regarding high-level encryption, authentication and other related topics.
However, you also have to think about categories. Cybersecurity for IoT isn’t exactly the same for smart contracts and blockchain assets. Every industry is unique, so you need to ascertain how specific your game will be or whether it’ll address more universal topics.
Another consideration here is age and educational setting. Are you making a game for university students studying something related, or are you making it for a more random group, like workers trying to reskill? Is your game the kind that requires a more organized environment with an observer and additional hardware, or can it be played from anywhere?
Once you understand who you’re making the game for, you’re more likely to ensure that it gets to them, hooks them, and teaches them in a manner that speaks to their abilities.
Make the game adaptable
Cybersecurity needs are constantly evolving. People find new ways to set up their systems and accommodate their organization’s workflows. As a result, new loopholes arise, and attackers have more ways to compromise systems. Therefore, cybersecurity training must be continuous if experts are to keep up with all the new tricks malicious actors use.
Subsequently, you should reflect this in your game by making it adaptable. For example, HTTP was once the standard, but now HTTPS is the norm. So in the same spirit, you should be able to add or remove certain aspects of the game, whether before or after it’s released. Additionally, adaptability isn’t only about what new cybersecurity technology is out there.
It’s also about tackling misconceptions about how people learn. Some challenges need to be timed. Some should be accompanied by extra instructions while others don’t need them.
In essence, it’s possible to be wrong about what gets people’s attention and keeps them participating. For instance, if there are several goals to achieve within the game but only one reward at the very end, some people may find that less exciting than when there’s a series of prizes. Adaptability also extends to the issue of accessibility. You may need to apply color-coding, audio notifications, simplified labels, symbols, fonts and other features in your game.
Why? Because it should cater to people with dyslexia, ADD/ADHD, photosensitive epilepsy, partial blindness, or other defects or disabilities that complicate learning through gamification.
While gamification is an excellent way to perform cybersecurity training, it has to be extensively examined in context. For example, a game may teach someone how to perform an action, but it can’t simulate every possible scenario in an organization.
People share passwords, bring their own devices to work, log into workplace systems from unsecured public networks, and act recklessly in many ways. It’s crucial to identify the remaining gap that a cybersecurity game may not cover and supplement training with other exercises. However, you should keep enhancing the game to address such eventualities.
Gerald Ainomugisha is a freelance Content Solutions Provider (CSP) offering both content and copy writing services for businesses of all kinds, especially in the niches of management, marketing and technology. | <urn:uuid:9addbe32-b7e3-483a-b397-2b8139fd0d58> | CC-MAIN-2022-49 | https://busycontinent.com/gamification-in-cybersecurity-training/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710953.78/warc/CC-MAIN-20221204004054-20221204034054-00522.warc.gz | en | 0.948302 | 1,277 | 2.875 | 3 |
"The Shepherd Girl of Nanterre." by Charlotte M. Yonge (1823-1901)
Four hundred years of the Roman dominion had entirely tamed the once wild and independent Gauls. Everywhere, except in the moorlands of Brittany, they had become as much like Romans themselves as they could accomplish; they had Latin names, spoke the Latin tongue, all their personages of higher rank were enrolled as Roman citizens, their chief cities were colonies where the laws were administered by magistrates in the Roman fashion, and the houses, dress, and amusements were the same as those of Italy. The greater part of the towns had been converted to Christianity, though some Paganism still lurked in the more remote villages and mountainous districts.
It was upon these civilized Gauls that the terrible attacks came from the wild nations who poured out of the centre and east of Europe. The Franks came over the Rhine and its dependent rivers, and made furious attacks upon the peaceful plains, where the Gauls had long lived in security, and reports were everywhere heard of villages harried by wild horsemen, with short double-headed battleaxes, and a horrible short pike, covered with iron and with several large hooks, like a gigantic artificial minnow, and like it fastened to a long rope, so that the prey which it had grappled might be pulled up to the owner. Walled cities usually stopped them, but every farm or villa outside was stripped of its valuables, set on fire, the cattle driven off, and the more healthy inhabitants seized for slaves.
It was during this state of things that a girl was born to a wealthy peasant at the village now called Nanterre, about two miles from Lutetia, which was already a prosperous city, though not as yet so entirely the capital as it was destined to become under the name of Paris. She was christened by an old Gallic name, probably Gwenfrewi, or White Stream, in Latin Genovefa, but she is best known by the late French form of Genevieve. When she was about seven years old, two celebrated bishops passed through the village, Germanus, of Auxerre, and Lupus, of Troyes, who had been invited to Britain to dispute the false doctrine of Pelagius. All the inhabitants flocked into the church to see them, pray with them, and receive their blessing; and here the sweet childish devotion of Genevieve so struck Germanus, that he called her to him, talked to her, made her sit beside him at the feast, gave her his special blessing, and presented her with a copper medal with a cross engraven upon it. From that time the little maiden always deemed herself especially consecrated to the service of Heaven, but she still remained at home, daily keeping her father's sheep, and spinning their wool as she sat under the trees watching them, but always with a heart full of prayer.
After this St. Germanus proceeded to Britain, and there encouraged his converts to meet the heathen Picts at Maes Garmon, in Flintshire, where the exulting shout of the white-robed catechumens turned to flight the wild superstitious savages of the north–and the Hallelujah victory was gained without a drop of bloodshed. He never lost sight of Genevieve, the little maid whom he had so early distinguished for her piety.
After she lost her parents she went to live with her godmother, and continued the same simple habits, leading a life of sincere devotion and strict self-denial, constant prayer, and much charity to her poorer neighbors.
In the year 451 the whole of Gaul was in the most dreadful state of terror at the advance of Attila, the savage chief of the Huns, who came from the banks of the Danube with a host of savages of hideous features, scarred and disfigured to render them more frightful. The old enemies, the Goths and the Franks, seemed like friends compared with these formidable beings whose cruelties were said to be intolerable, and of whom every exaggerated story was told that could add to the horrors of the miserable people who lay in their path. Tidings came that this "Scourge of God", as Attila called himself, had passed the Rhine, destroyed Tongres and Metz, and was in full march for Paris. The whole country was in the utmost terror. Everyone seized their most valuable possessions, and would have fled; but Genevieve placed herself on the only bridge across the Seine, and argued with them, assuring them in a strain that was afterwards thought of as prophetic, that, if they would pray, repent, and defend instead of abandoning their homes, God would protect them. They were at first almost ready to stone her for thus withstanding their panic, but just then a priest arrived from Auxerre, with a present for Genevieve from St. Germanus, and they were thus reminded of the high estimation in which he held her; they became ashamed of their violence, and she held them back to pray and to arm themselves. In a few days they heard that Attila had paused to besiege Orleans, and that Aetius, the Roman general, hurrying from Italy, had united his troops with those of the Goths and Franks, and given Attila so terrible a defeat at Chalons that the Huns were fairly driven out of Gaul. And here it must be mentioned that when the next year, 453, Attila with his murderous host came down into Italy, and after horrible devasation of all the northern provinces, came to the gates of Rome, no one dared to meet him but one venerable Bishop, Leo, the Pope, who, when his flock were in transports of despair, went forth only accompanied by one magistrate to meet the invader, and endeavour to turn his wrath side. The savage Huns were struck with awe by the fearless majesty of the unarmed old man. They conducted him safely to Attila, who listened to him with respect, and promised not to lead his people into Rome, provided a tribute should be paid to him. He then retreated, and, to the joy of all Europe, died on his way back to his native dominions.
But with the Huns the danger and suffering of Europe did not end. The happy state described in the Prophets as "dwelling safely, with none to make them afraid", was utterly unknown in Europe throughout the long break-up of the Roman Empire; and in a few more years the Franks were overrunning the banks of the Seine, and actually venturing to lay siege to the Roman walls of Paris itself. The fortifications were strong enough, but hunger began to do the work of the besiegers, and the garrison, unwarlike and untrained, began to despair. But Genevieve's courage and trust never failed; and finding no warriors willing to run the risk of going beyond the walls to obtain food for the women and children who were perishing around them, this brave shepherdess embarked alone in a little boat, and guiding it down the stream, landed beyond the Frankish camp, and repairing to the different Gallic cities, she implored them to send succour to the famished brethen. She obtained complete success. Probably the Franks had no means of obstructing the passage of the river, so that a convoy of boats could easily penetrate into the town, and at any rate they looked upon Genevieve as something sacred and inspired whom they durst not touch; probably as one of the battle maids in whom their own myths taught them to believe. One account indeed says that, instead of going alone to obtain help, Genevieve placed herself at the head of a forage party, and that the mere sight of her inspired bearing caused them to be allowed to enter and return in safety; but the boat version seems the more probable, since a single boat on a broad river would more easily elude the enemy than a troop of Gauls pass through their army.
But a city where all the valour resided in one woman could not long hold out, and in another inroad, when Genevieve was absent, Paris was actually seized by the Franks. Their leader, Hilperik, was absolutely afraid of what the mysteriously brave maiden might do to him, and commanded the gates of the city to be carefully guarded lest she should enter; but Geneviere learnt that some of the chief citizens were imprisoned, and that Hilperik intended their death, and nothing could withhold her from making an effort in their behalf. The Franks had made up their minds to settle, and not to destroy. They were not burning and slaying indiscriminately, but while despising the Romans, as they called the Gauls, for their cowardice, they were in awe of the superior civilization and the knowledge of arts. The country people had free access to the city, and Genevieve in her homely gown and veil passed by Hilperik's guards without being suspected of being more than an ordinary Gaulish village maid; and thus she fearlessly made her way, even to the old Roman halls, where the long-haired Hilperik was holding his wild carousal. Would that we knew more of that interview–one of the most striking that ever took place! We can only picture to ourselves the Roman tessellated pavement bestrewn with wine, bones, and fragments of the barbarous revelry. There were untamed Franks, their sunburnt hair tied up in a knot at the top of their heads, and falling down like a horse's tail, their faces close shaven, except two moustaches, and dressed in tight leather garments, with swords at their wide belts. Some slept, some feasted, some greased their long locks, some shouted out their favourite war songs around the table which was covered with the spoils of churches, and at their heads sat the wild, long-haired chieftain, who was a few years later driven away by his own followers for his excesses,–the whole scene was all that was abhorrent to a pure, devout, and faithful nature, most full of terror to a woman. Yet, there, in her strength, stood the peasant maiden, her heart full of trust and pity, her looks full of the power that is given by fearlessness of them that can kill the body. What she said we do not know–we only know that the barbarous Hilperik was overawed; he trembled before the expostulations of the brave woman, and granted all she asked–the safety of his prisoners, and mercy to the terrified inhabitants. No wonder that the people of Paris have ever since looked back to Genevieve as their protectress, and that in after ages she has grown to be the patron saint of the city.
She lived to see the son of Hilperik, Chlodweh, or, as he was more commonly called, Clovis, marry a Christian wife, Clotilda, and after a time became a Christian. She saw the foundation of the Cathedral of Notre-Dame, and of the two famous churches of St. Denys and of St. Martin of Tours, and gave her full share to the first efforts for bringing the rude and bloodthirsty conquerors to some knowledge of Christian faith, mercy, and purity. After a life of constant prayer and charity she died, three months after King Clovis, in the year 512, the eighty-ninth of her age. *
* Perhaps the exploits of the Maid of Orleans were the most like those of Genevieve, but they are not here added to our collection of "Golden Deeds", because the Maid's belief that she was directly inspired removes them from the ordinary class. Alas! The English did not treat her as Hilperik treated Genevieve.
This chapter has been put on-line as part of the
BUILD-A-BOOK Initiative at the
Celebration of Women Writers.
Initial text entry and proof-reading of this chapter were the work of volunteer | <urn:uuid:b937993f-c08d-4b48-b84a-f4c0cb28544a> | CC-MAIN-2017-43 | http://digital.library.upenn.edu/women/yonge/deeds/shepherd.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823350.23/warc/CC-MAIN-20171019160040-20171019180040-00253.warc.gz | en | 0.987367 | 2,502 | 2.59375 | 3 |
Ivan Petrovich Pavlov
(1849—1936) Russian physiologist
Russian physiologist, who became professor of physiology in St Petersburg in 1886. While working on the physiology of digestion he discovered that the mere sight of food stimulates the production of digestive juices. For this work he was awarded the 1904 Nobel Prize for physiology or medicine. Pavlov went on to demonstrate operant conditioning in dogs and other animals. See also learning (Feature). | <urn:uuid:c9b4b95d-f2fa-47f6-ac1f-58eb017c265c> | CC-MAIN-2020-05 | https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100311691 | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598800.30/warc/CC-MAIN-20200120135447-20200120164447-00328.warc.gz | en | 0.94069 | 92 | 2.53125 | 3 |
an agency that helps find jobs for persons seeking employment or assists employers in finding persons to fill positions that are open.
Deepen Your Understanding Of Black History With These 10 Essential TermsBlack history is American history, and it's vital we always continue or revisit our learning all year round, as we hope you'll join us in this roundup of some important terms in Black history, past and present.
Origin of employment agency
An Americanism dating back to 1885–90
Also called employment bureau.
Dictionary.com Unabridged Based on the Random House Unabridged Dictionary, © Random House, Inc. 2019
Examples from the Web for employment agency
The employment-agency is the housekeeper's recruiting station.Guide to Hotel Housekeeping|Mary E. Palmer
In this employment-agency business a radical reform is needed.
British Dictionary definitions for employment agency
a private firm whose business is placing people in jobs
Collins English Dictionary - Complete & Unabridged 2012 Digital Edition © William Collins Sons & Co. Ltd. 1979, 1986 © HarperCollins Publishers 1998, 2000, 2003, 2005, 2006, 2007, 2009, 2012 | <urn:uuid:2ebec21c-b059-48e6-9017-e6d4a7da35c4> | CC-MAIN-2019-43 | https://www.dictionary.com/browse/employment-agency | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986669546.24/warc/CC-MAIN-20191016190431-20191016213931-00288.warc.gz | en | 0.867312 | 235 | 2.71875 | 3 |
Astrophysicists have developed a new way to measure the mass of black holes, and initial results support the controversial claim that an intermediate-mass version of these strange objects exists.
Nikolai Shaposhnikov (NASA/Goddard Space Flight Center) and Lev Titarchuk (U.S. Naval Research Laboratory) recently tested this method which Titarchuk proposed several years ago on three known black holes. One was the Cygnus X-1 binary system, in which a small, stellar-mass black hole gives off copious X-rays. Its calculated mass is 8.7 Suns (with an error margin of 0.8), close to the 10 solar masses estimated by two previous methods. These results will appear in the July 1st issue of Astrophysical Journal.
In Cyg X-1, the black hole orbits a more massive blue supergiant star closely enough to pull matter mainly gas from its enormous companion. This transferred gas rotates around the black hole in an accretion disk, emitting X-rays as it becomes energized and occasionally clumping together in what Titarchuk refers to as a "traffic jam." He finds that the farther these clumps form from the black hole, the more massive it is.
To find where these clumps lie, Shaposhnikov and Titarchuk monitored reoccurring X-ray variations, called quasi-periodic oscillations (QPOs), that are common to black-hole systems. The timing of these oscillations together with X-ray spectral properties allowed the two scientists to figure out the black hole's mass.
"No one's 100 percent certain of the exact physics that produces the QPOs," says Richard Mushotzky (NASA/Goddard Space Flight Center). Mushotzky, along with Goddard colleague Tod Strohmayer and others, used Titarchuk's technique to estimate that a bright X-ray source in the small, nearby galaxy NGC 5408 has a black hole with a mass of about 2,000 Suns.
Although this value agrees with previous estimates, the result has been hotly debated among researchers because there are no well-accepted models to explain how such intermediate-mass objects can occur. Stellar black holes, which form when a star collapses, weigh in from just over 3 to 20 solar masses, whereas supermassive black holes, which sit at the center of galaxies (including the Milky Way), are millions of times more massive than the Sun.
Scientists have used two other techniques to measure the mass of these enigmatic heavyweights. One uses the black hole's energy output to estimate its mass (the more luminous it is, the more massive), and the other uses the accretion disk's X-ray spectrum to deduce its temperature (the cooler the disk, the more massive the black hole). However, neither technique measures the velocities of a black hole and its companion, which would yield its mass more directly. Although Titarchuk's technique is also an indirect measurement, it "improves our confidence a lot," says Mushotzky. | <urn:uuid:ab190e1f-be30-41c8-a88f-b9c97b287566> | CC-MAIN-2017-26 | http://www.skyandtelescope.com/astronomy-news/scientists-find-new-way-to-measure-black-holes/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320438.53/warc/CC-MAIN-20170625050430-20170625070430-00611.warc.gz | en | 0.939467 | 632 | 3.578125 | 4 |
Pilot seagrass transplantation trials in Forsters Bay, Narooma, NSW
Summary: The last reported extent of seagrass coverage in the Wagonga Inlet, Narooma was given as 148 ha, although estimates of seagrass coverage vary considerably. The channel area consists of approximately 4 ha or 2.7% of this total coverage. The bare sand flats adjacent to the channel are naturally colonising at a reasonably rapid rate (c.a. 1 m y-1). That seagrasses are healthy in the inlet is illustrated by the fact that they are growing successfully underneath jetties, boardwalks and oyster leases. Additionally, in the quite turbid environment of the upper reaches of the inlet, Zostera sp. is growing well. Any factor that would increase this turbidity such as runoff from land clearing would be expected to impact upon these communities and possibly reduce their range. However sediments in the channel between Mill and Forsters Bay are more coarse and turbidity caused by dredging would be expected to be short-lived; and, if carried out at the appropriate time of year would be expected to have minimal impact upon adjacent seagrasses.
After more than a year pilot seagrass transplantation trials on the sand flats adjacent to the channel have shown 92% survival. In addition there has been natural colonisation in this area by both seedlings and seagrass fragments within and around the transplant area. Recent data on transplantation trials in another NSW estuary have also shown good survival. This indicates that the seagrasses in the Narooma Inlet may neither be under stress nor are they decreasing in area and that seagrass transplantation may be a viable method to increase meadow area.
Dredging a channel would remove approximately 2.7 % of the seagrasses in the inlet adjacent to a seagrass meadow that is naturally colonising and of a greater size. The bare sand flat area is approximately 40 ha and might be expected to support at least half of this as seagrass meadows in the future. It would be possible to augment the colonisation by further transplantation of the appropriate methodology using material which would be dredged from the channel. Therefore if a channel is dredged to attract tourist boat usage during holiday periods, its total impact upon seagrass meadows in the inlet is likely to be minimal.
|Murdoch Affiliation:||School of Environmental Science|
|Publisher:||Marine and Freshwater Laboratory, School of Environmental Science, Murdoch University|
|Item Control Page|
Downloads per month over past year | <urn:uuid:5afec0dd-da28-45ec-8271-a65f2d3cb5fc> | CC-MAIN-2016-07 | http://researchrepository.murdoch.edu.au/10942/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701147492.21/warc/CC-MAIN-20160205193907-00246-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.941494 | 553 | 2.703125 | 3 |
From February 1 2020, Britain has left the European Union. The Brexit referendum comes into effect. This is a Victory for the Democracy in the United Kingdom.
The United Kingdom has been a member of the European Economic Community (EEC) or Common Market, the forerunner to the European Union, in 1973, along with the European Coal and Steel Community (ECSC), and the European Atomic Energy Community (EAEC or Euratom). A referendum on continued membership of the Common Market was held in 1975, with 67.2% of the population voting in favour of Britain remaining a member.
The Brexit was declared by the government after a referendum. The United Kingdom European Union membership referendum, commonly referred to as the EU referendum, or the Brexit referendum, took place on 23 June 2016. From the 72% registered voters 52% said Leave and 48% said Remain. The planned referendum was included in the Queen’s Speech on 27 May 2015.
The main cause of the Brexit is the “ever closer union”. The European integration process faced a major defeat with the failed Treaty establishing a Constitution for Europe and euro-skeptical opinions gained more impact overall. The role of public opinion had been lower before but gained importance with state referendums, as in the rejection of the constitution by French and Dutch voters in 2005.
With executing the Brexit referendum there is a Victory for the Democracy in the United Kingdom. With not executing the NO of the referendum in The Netherlands and France their governments have declined their Democracy. They have chosen for a Bureaucratic Dictatorship. The citizens of France and The Netherlands have had enough of it. Revolt is rising.
The NEXIT is rising. The Dutch government does not call the European Constitution (which will establish the European State) a Constitution but a Treaty. By doing this the Dutch government does not honor the honest Democracy. The Dutch will be pay more and more. The Dutch pensions are forced to calculate the risks with the ECB 30-yr Euro swap which had a minimum of almost zero in 2019. The pension negative result of the ECB rate downfall in 2019 was 18%. The average positive profit of their stock investment was 18%. The Dutch government dictates the Dutch pension funds to calculate with the not realistic ECB rate. With it the Dutch pensions are too less. The Dutch government promises purchasing power, but year after year the purchasing power does not increase.
Some foolish Dutch laws has given a foundation with only a few members the right to ordain the Dutch government to execute the CO2 decline of 5% in the next year. This due the EU Constitution. From it all building procedures are on hold. Many people cannot find an affordable house. The Dutch have experienced an immigration flood of more than 100.000 immigrants each year, due to the leaking borders and procedures of the EU. The Dutch government is out of control and will fall in 2020. | <urn:uuid:5807546b-6c0f-4fcc-9b03-2e6562031507> | CC-MAIN-2021-17 | https://www.theeuropeanpost.net/the-brexit-victory-for-democracy-in-britain/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038078900.34/warc/CC-MAIN-20210414215842-20210415005842-00585.warc.gz | en | 0.968613 | 589 | 3.203125 | 3 |
We believe that every member of our community should have access to all the information, collected materials, and stories that informs the understanding of our tradition.
In any community it is imperative that every member have access to the material that informs the history of that community. If access is limited, classes emerge. We see this across history as religious, intellectual, and political classes emerge and consolidate power from the rest of the population through the control of information and narrative. In the world of active oral traditions it is normal for a select few members of a community to be tasked with upholding the standard of a particular tradition. They are usually the most experienced and trustworthy, but can also be part of a particular family line or tradition of apprenticeship and specifically trained for the role. Still, the power of these select few should be balanced by the active involvement of the entire community in the tradition, be it a celebration, religious ritual, or other expression of dance, music, or storytelling.
Today the tap dance community is separated by its geography. The lineages of tradition are many and do not always align with regards to approach to the craft. Furthermore, multiple collections of materials – archives of photographs, show programs and posters, audio and moving image recordings, and physical objects – are scattered around the globe, held both privately and by private and public institutions.
Digital platforms like YouTube have done wonders to surface video clips of tap dancers from long ago and spread around the world at the speed of the internet. But access isn’t just about the stuff. Access is about the quality and value of the information. It’s about context. So that what is spread ultimately supports the tradition which in turn supports the community. Learning a single tap dance step from a video is great. Learning the stories that surround that step, who your actually stealing it from, and who was behind the documentation of the clip itself are as important if not more when it comes to the oral tradition. Unfortunately the latter is much more difficult with the platforms we currently have, but we can fix this.
Access is the key. As we develop the Archive of American Vernacular Dance, access is at the heart of our endeavor. We aim to build a platform that is accessible to the entire tap dance community, not just a particular subset. We aim to build a platform that provides access to the material that informs the stories upon which the tradition of tap dancing and American vernacular dances stand. We aim to provide the tools necessary for anyone in our community to learn, understand, and contribute to the body of work that is our collective history.
Access to the stories that make up the history of a community is a matter of social justice. People inside the community should be the primary storytellers, not outside observers. We now have the technology to rectify this situation, which unfortunately has happened often in the world of American Vernacular Dance.
If this resonates with you, we want to here from you here.
If you’re moved to support this endeavor, you can do so here. | <urn:uuid:9ed4742c-fab6-45a3-9ee1-f5d01e83ee82> | CC-MAIN-2021-10 | https://taplegacy.org/access-for-all/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350942.3/warc/CC-MAIN-20210225095141-20210225125141-00574.warc.gz | en | 0.957186 | 618 | 2.609375 | 3 |
King Tut, or Tutankhamun, was the son of Akhenaten, the king of egypt from 1353 BC to 1336 BC, and Nefertiti, Akhenaten's wife. It is believed that he had two siblings, one sister and one brother. His brother's name was Smenkhkare and his sister's name was Ankhesenpaaten. Tutankhamun was born in the year 1341 BC and died in the year 1323 BC. His reign lasted from 1332 BC to 1323 BC. He was the 12th pharaoh of Egypt, after taking the crown from his brother, Smenkhkare, in 1332 BC. | <urn:uuid:b957b760-2978-4e3b-9234-b21b473932d3> | CC-MAIN-2015-11 | http://thelifeofkingtut.weebly.com/brief-description.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00157-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.990061 | 142 | 3.1875 | 3 |
Porcupine quills, big fangs, and a parrot-like beak are only three of the strange qualities that this newly discovered plant-eating dinosaur, known as the Pegomastax africanus, possesses.
This tiny Dino, measuring in at about 2 feet tall, is a newly discovered species of heterodontosaur. It is about the size of a housecat and used its giant fangs for self-defense and for attracting mates.
Two Sinocalliopteryx gigas, which are carnivorous dinosaurs about 6 feet long and covered in hair-like fuzz, were discovered in Liaoning, China with evidence of their last meals remaining in their stomachs.
One of the paleontologists working with the specimens stated that stomach remains are “…extremely rare in the fossil record”, so this discovery gives scientists evidence of interaction between dinosaurs. Though it is still unknown whether or not these dinosaurs hunted or scavenged the prey found in their stomachs, it gives scientists a look into their diets.
A dinosaur foot print was found in the backyard of NASA’s Goddard Space Flight Center campus in Maryland, measuring in at 12-inches wide. The footprint is believed to belong to a Nodosaur, a plant-eating, armor studded dino that roamed the area about 110 million years ago.
Several other smaller dinosaur footprints were also discovered in the backyard of NASA, most likely from theropods.
Several remains of primitive shark’s teeth, with at least three of the teeth dating back from 270 million years ago, were discovered in what is known as the Kaibab Formation of northern Arizona. It is believed that the three sharks range from about 3 feet to 20 feet long, and that Arizona was home to a very diverse shark population in the Cretaceous period.
About 75 million years ago, duck-billed and horned dinosaurs flourished in Canada, while only a few of these species emerged in the United States.
Scientists believe that this diversity among dinosaurs caused a dinosaur boom when the Rocky Mountains were formed, creating geographic and ecological barriers between species. This not only rapidly increased the population of certain dinosaur species, but it in turn reduced the pace at which new species evolved. | <urn:uuid:98d30298-0763-4fe1-b30e-12237594d6c3> | CC-MAIN-2015-11 | http://www.pbs.org/parents/dinosaurtrain/dinosaur-discoveries/page/2/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461612.31/warc/CC-MAIN-20150226074101-00230-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.96178 | 462 | 4.03125 | 4 |
values characterizing the electric current
Ohm's law, unlike, for example, Coulomb's law, it is not a fundamental law of physics.It is of practical importance.
In nature there are substances, electrically conductive - conductors and conductive - dielectrics.
The conductors have free charges - electrons.In order to move electrons started in unison in one direction, it is necessary electric field, which "force" them to move from one end to the other conductor.
simplest way to create such a field may be an ordinary battery.If at the end of the conductor lack of electrons, it is indicated by a "+" if the excess is "-".Electrons have a negative charge always naturally flock to positive.So in Explorer is born an electric current, that is. E. The direction of movement of electric charges.To increase it,
is necessary to strengthen the electric field in the conductor.Or, as they say, to attach to the ends of the wire higher voltage.
electric current is usually denoted by the letter I, and stress - the letter U. is important to understand that the formula R = U / I only allows to calculate the resistance of the circuit, but it does not reflect the dependence of the resistance on the voltage and amperage.
But conductors, which are moving free electrons, can have different electrical resistor R. The resistance shows a countermeasure conductor material passing through it an electric current.It depends only on the geometrical dimensions of the conductor material and its temperature.
Each of these variables has its units: The Power of the current I is measured in amperes (A);The voltage U is measured in volts (V);Resistance is measured in ohms (ohms).
Ohm's law for subcircuit
In 1827 the German scientist Georg Ohm established mathematical relationship between these three values, and formulated it in words.So there was a law, named after its creator Ohm's law.His complete statement follows: "The strength of the current flowing through a circuit is directly proportional to the applied voltage and inversely proportional to the resistance of the circuit."
To avoid confusion in the output of the derivatives of formula, place the value of the triangle, as shown in Figure 2. Close your finger desired value.The relative position of the remaining shows what action to perform. formula for Ohm's Law looks like: I = U / R
Simply put, the higher the voltage, the stronger the current, but the greater the resistance, the current is weaker. | <urn:uuid:4f27eb0b-94bb-401e-9e8f-bb1f2476723e> | CC-MAIN-2018-30 | http://howded.com/en/pages/297183 | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592636.68/warc/CC-MAIN-20180721145209-20180721165209-00085.warc.gz | en | 0.928619 | 528 | 4.40625 | 4 |
Boost Your Immune System for Healthier Outcome
It’s best to be cautious and conservative when trying to avoid the COVID-19 virus, said Bayhealth Primary Care, Milford’s Internal Medicine and Infectious Disease Specialist Antonio Zarraga, MD. He’s also serving as the Bayhealth Coronavirus Management Team director. It’s important, he said, to recognize a weakened immune system, and take steps, when possible, to make choices to enhance or boost your immune system.
“This is a very unusual and unpredictable virus. Be very cautious, and consider your next-door neighbor, friend or relative as potentially infected,” he advised.
Dr. Zarraga explains some of the signs of a weakened immune system and offers ways to boost immunity.
“The hallmark of a weak immune system is recurrent infections,” Dr. Zarraga said. Doctors consider the frequency, severity, duration, complications, and causes of those infections.
People who have chronic infections, autoimmune or malignant diseases are prone to weakened immune systems. Chronic diarrhea, malabsorption and poor wound healing may also indicate immunodeficiency, he said.
Malnutrition, malignancy and drugs used to treat malignancy, metabolic diseases – including diabetes, severe liver disease and uremia, HIV infection and asplenia also weaken the immune system. “Response to treatment and resolution of infection can be affected by a patient’s immune medical condition,” said Dr. Zarraga.
A healthy lifestyle is the best way to help boost immunity. Dr. Zarraga says that getting adequate sleep and proper nutrition – specifically eating more vegetables, will help. Other means for boosting the immune system include moderate exercise, drinking plenty of water, limiting alcohol and sugar intake, and getting fresh air and sunshine.
In addition, after consulting your primary care physician, Dr. Zarraga said limited research suggests a “cocktail” of supplements may be beneficial. Taking Vitamin C, an anti-inflammatory; Quercetin, a plant phytochemical; Zinc lozenges, slow-release Melatonin and Vitamin D-3 may prevent or mitigate COVID-19. “While there is no high-level evidence that this cocktail is effective, it is cheap, safe, and widely available.”
To learn about coronavirus testing or vaccinations, please contact your primary care physician or visit the Delaware Division of Publics Health's (DPH) coronavirus resource center at Coronavirus.Delaware.gov. You can also reach DPH by calling 1-866-408-1899 or emailing DPHCall@Delaware.gov.
Visit Bayhealth.org/COVID-19 for coronavirus information specific to Bayhealth including visitation policies, testing, FAQs, and more. | <urn:uuid:055b0572-b1d3-45fe-a21f-1b2072490d18> | CC-MAIN-2021-43 | https://www.bayhealth.org/community-health-and-wellness/blog/2020/april/boost-your-immune-system-for-healthier-outcome | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585439.59/warc/CC-MAIN-20211021164535-20211021194535-00327.warc.gz | en | 0.905306 | 599 | 2.828125 | 3 |
Lucian had received a good education and his desire was to share it with others who felt a calling to the theological life. He had been born to Christian parents with enough money to provide him with a classical education and train him further in theology. Following in the footsteps of his parents, he was active in the Church. Further, he had a significant impact as he served in different roles within the ecclesiastical structure. He was ordained as a relatively young man by the congregation in Antioch and opened a school of theology. His students were well-trained and accepted by congregations of Christians throughout the Roman Empire but somehow he became associated with Paul of Samosata. It might have been because of accusations from opponents or it might have been based on spurious evidence but, regardless, Lucian’s name was connected to Paul’s. When Paul’s theology was labeled suspect–and eventually heretical–Lucian’s reputation and influence were crippled.
Since he was rumored to be heretical, his students were less accepted by other Christians. Then, since his students were experiencing difficulty, prospective students soon found other teachers. For nearly twenty years, Lucian struggled through false accusations and mistaken impressions. As he did so, his own personal spiritual life deepened and intensified. Years later when Church historians would look back at him they would insist that Lucian had been better known for his Christian practice than for his Christian theology and that is saying something since Lucian was one of the chief proponents of literal reading of the scripture in juxtaposition to the allegorical readings suggested by the Alexandrians (in the tradition of Origen). It wasn’t that Lucian felt that figurative reading was a poor practice but, rather, that literal reading was essential in understanding some passages that otherwise might be glossed over and their powerful meaning missed. In his attempt to insure that the words of the scripture not be avoided or not be overlooked, he taught a literal reading that allowed the scripture to speak powerfully and directly when appropriate.
Eventually, his students were accepted again and his reputation was cleansed by continued piety and faithful Christian practice. False accusations simply could not stick to Lucian over the long term and melted away when faced with the intense heat of his personal devotion to Jesus. But once his school of theology was regaining its notoriety and influence, it attracted the attention of the Emperor. As Maximian’s persecutions continued, Lucian was arrested. Unlike many of the Church’s martyrs, it was not a short process for Lucian. Over a period of nine years he was tortured as the Empire hoped to manipulate him to deny his faith. Every time they asked over nine years, Lucian refused to deny his faith–a faith that had already cost him dearly and would likely cost him even more dearly if he continued to refuse. Finally, the Empire tired of their efforts and executed Lucian with little pomp or show.
from Blogger http://ift.tt/2F9Zzga | <urn:uuid:88adf022-db18-41d5-9dc1-07a340e4e437> | CC-MAIN-2018-30 | https://joshuahearne.wordpress.com/2018/01/07/telling-the-stories-that-matter-january-7-lucian-of-antioch-martyr-theologian-falsely-accused/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589172.41/warc/CC-MAIN-20180716021858-20180716041858-00108.warc.gz | en | 0.993138 | 611 | 2.53125 | 3 |
Q. Why is the KJV translation of Isaiah 9:1-3 so different compared to most other translations or versions of the Bible? It appears that the KJV translation is opposite in meaning compared to the other Bible translations. Why is that so?
A. In Isaiah 9:1, the King James Version (KJV) has “he lightly afflicted the land…and…did more grievously afflict.” These are renderings of the Hebrew verbal roots q-l-l and k-b-d, respectively. The New International Version (NIV), in common with other modern English translations, translates it, “he humbled the land…but…will honor.”
The wording of the NIV seems to contradict what the KJV translators wrote. As it happens, the first Hebrew root, q-l-l, can mean both “to humble” or “curse” and “to be easy” or “to be light.” In like manner, the second Hebrew verb, k-b-d, signifies both “heaviness” or “grievous affliction” and “honor.” It is rare in Hebrew (as in most other languages, I suspect) that the same root can convey opposite meanings, but this is not the only occurrence of the phenomenon in the Hebrew Bible.
Thus, it’s possible that the KJV translators, in part because they relied on earlier English renderings, understood Isaiah’s words here to describe the movement progressively (“and”) from moderate to grievous affliction. More modern translators, faced with the same Hebrew text, have interpreted the process as contrastive (“but”) from severe punishment to singular reward. Given the difficulty in fully comprehending the meaning of this verse as a whole, such disagreement in translation is not entirely unexpected—or unwelcome.
In Isaiah 9:3, KJV has “Thou hast…not increased the joy,” where NIV (again in common with other modern versions) has the exact opposite: “You have…increased their joy.” This variation in translation, unlike the example in Isaiah 9:1, is not the result of differences in interpretation, but instead is based on different Hebrew wording.
As handed down from antiquity, the Hebrew word for “not” (two letters: lamed-aleph) appears in the text, and this is what the KJV translators rendered. However, an influential group of medieval Jewish scholars, whom we call Masoretes, judging that the traditional text was in error here, instructed that instead of lamed-aleph (“not”) we should read lamed-yod (“to him”).
The NIV translators rendered this into smooth English as “their.” This is consistent with modern interpretations/translations in general, where the Masoretic instructions (generally called qere; that is how we should “read” the Hebrew) are almost always given preference over what is written (ketiv) in the Hebrew. Additionally, in this instance the negation of “to increase” (as in the ketiv = KJV) makes little, if any sense.
Postscript: In the text of the Hebrew Bible itself and in Jewish translations based on the Hebrew text, Isaiah 9:1-3 appear as Isaiah 8:23 and Isaiah 9:1-2. | <urn:uuid:7cc66e28-916a-40d4-a09f-bc05bacc25f0> | CC-MAIN-2018-43 | http://bibleodyssey.com/en/tools/ask-a-scholar/kjv-and-isaiah-9-1 | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512499.22/warc/CC-MAIN-20181019232929-20181020014429-00257.warc.gz | en | 0.931156 | 739 | 2.90625 | 3 |
Assessment is defined as a proper collection, interpretation and use of information in regards to learning. It gives the teacher a better awareness about the knowledge of peoples and their understanding and what are learning experiences are also about their skills and personal characters and capabilities.
The assessment should be in sync and supportive of learning, it should be and should be valid in nature, the assessment should be proper and manageable, it should support the judgment of a teacher and lastly, it should support accountability.
10 Types of Assessment :
1) Summative Assessment
Summative comes from the word summary. The summative assessment arrives at the very end of the learning sequence and is used to record the students overall achievement at the end of learning. The primary objective summative assessment is to measure a student’s achievement post instructions or learnings.
Examples of summative assessment II midterms and final papers and examinations which give overall knowledge test of the student at the end of the learning. The summative assessment gives an insight into an overall scenario of the understanding of the student regarding particular learning or a topic. Summative assessment helps to answer the questions like what happened and what went wrong at the end of the learning.
The United States uses summative assessment all over their educational institutes. Summative assessments have more weight compared to formative assessments. Questionnaire service interviews testing’s and projects are few of the methods used to measure Summative assessment.
2) Formative Assessment
Formative assessment includes a variety of formal and informal assessment procedures which are used by teachers in the classroom so that they can modify the teaching an improve the student’s attention retention and his learning activity.
Formative assessment survey geyser in throughout the learning process and usually determined the performance of the student during the learning, unlike summative assessment which determines the performance at the end of the learning.
The primary objective of formative assessments is to involve the attention of the students and help them achieve their goals. It is performed in the classroom and determines the strengths and weaknesses of students. The routine question during the teaching of a lesson is an example of formative assessment.
Following are the characteristics of formative assessment
- Formative assessment is positive in its intention such that it is directed towards promoting learning and hence it is an integral part of teaching.
- It helps in addressing individual or group deficiencies by identifying it.
3) Evaluative assessment
This is concerned only with evaluating assessment. The overall idea is to evaluate the assessment in the school or in the system or in the department. Evaluation of candidates helps in assessing and judging whether the candidates are capable enough for the learning program. Evaluative assessment is done only with the aim of evaluating and grading the candidates.
4) Diagnostic Assessment
When the objective is to identify individual strengths and areas of improvement diagnostic assessment is the one that is used. It helps to inform next steps in the assessment bike including the strengths and weaknesses areas of improvement and other characteristics. Unlike Evaluative assessment, diagnostic assessment does not aim to grade the candidates but rather it helps in diagnosing the issue after which the teacher can take steps to address it.
5) Norm-referenced tests (NRT)
Robert Glaser coined the term Norm-Referenced Test.
Norm-referenced tests commonly known as NRT tests is used to assess or evaluate with the aim of determining the position of the tested individual against a predefined group on the traits being measured. The term normative assessment means the process of comparing one test taker to his seniors or peers.
The primary objective behind this test is to determine whether the test taker has performed better or worse than the other test takers which in turn determines whether the test taker knows more or less than the other test takers. Comparison by benchmarking is the method used in NRT.
The primary advantages that this kind of test can provide information about an individual vis-a-vis the reference group while disadvantage includes the reference group may not represent the current population of interest since most of the norms are misleading and therefore do not stay over a period of time. This test also does not ensure if the test is valid in itself. Norms do not mean standards which is another disadvantage of this test.
6) Performance-based assessments
This is also known as education assessment in which the skills, attitudes, knowledge, and beliefs of the student are checked to improve the standard of learning. The assessment year used at times done with the test but not only confirm to tests and it can extend to class or workshop or real-world applications of knowledge used by the student.
It is further divided into few subtypes such as
- Initial and diagnostic assessment
- Objective and subjective assessment
- Referenced and norm-referenced Assessment
- Informal and formal assessment
- Internal and external assessment
Examples would include multiple choice questions approach and answers as a post to the traditional responses which are normally done in writing a report.
7) Selective response assessment
This refers to the objective assessments including multiple choice true or false and matching questions. It is a very selective effective and efficient method to measure the knowledge of students and is also the most common method of assessment for students in the classroom.
Selective response assessment determines the exact amount of knowledge that the student has and also provides an insight into the skills the student has acquired over the time of learning.
8) Authentic assessment
Intellectual assessments that are worthwhile significant and substantial are measured by authentic assessment. In contrast, to standardize tests authentic assessment provides deep insights about the student.
It focuses to enable the skills of students to demonstrate their capabilities and competencies in a more authentic setting. Like the performance of a particular skill or demonstrating a particular form of knowledge assimilation and role plays or strategic and selecting items. Authentic assessment helps to determine and develop the problem-solving skills that are required out of school. Case studies are one of the common examples of authentic assessment.
9) Criterion-referenced tests
This kind of assessment determines the performance of student against a fixed set of pre-determined and agreed upon criteria or the learning of students. Unlike norm-referenced test here without reference is made against a particular criterion other than a benchmark or a human being or another student.
While criterion-referenced assessment will provide whether or not the answer is correct the norm-referenced assessment will provide information on whether the answer is better than student number 1 is worse than student number 3.
The comparison here is not against a person or fellow competitor is what is the biggest advantage of criterion-referenced assessment over norm-referenced assessment. While the earlier assessment provides the exact running status of student the latter one provides the running status of a student with respect or in comparison to others.
10) Written and Oral Assessment
These include projects, term papers, exam papers, essays etc. The primary objective behind the written assessment is to determine the knowledge and understanding of the student. Written assessments are performed under the supervision of the teacher and the questions are given on the assessment day with limited time to answer the questions.
Written assessments are one of the most popular methods in Summative Assessment. Oral assessments, on the other hand, involve the evaluation of the candidates orally. They are evaluated for the knowledge with their verbal answers. Questions can be elaborative or objective or a combination of both. | <urn:uuid:19649fa4-b933-4111-8abb-a56256e8eafb> | CC-MAIN-2019-04 | https://www.marketing91.com/types-of-assessment/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657470.23/warc/CC-MAIN-20190116113941-20190116135941-00336.warc.gz | en | 0.949379 | 1,523 | 3.953125 | 4 |
In a review of progress on Ed Mazria’s 2030 Challenge, which calls for all buildings to be carbon neutral by 2030, World Changing argues that still more leadership is needed from architects, landscape architects, and planners to change already out-dated “green” building codes, and reach the goals of the 2030 Challenge. “We need a massive change in the very way buildings and places are planned, regulated and seen by the public.”
As Ed Mazria and others have noted, the building sector accounts for some 50 percent of global C02 emissions (see earlier post on his plan). Mazria provided a vision for green building development. World Changing argues: “his message became a rallying cry that professional groups, politicians, designers and journalists could stand behind: If we want to fight emissions, we must fundamentally change the building sector, the largest single source of greenhouse gas emissions worldwide.” World Changing argues that the technology and tools already exist for making this vision happen, it’s really just a matter of implementing on a wider scale.
World Changing says, while design organizations have signed on to Challenge 2030, now that we are nearly at the first marker in Mazria’s vision, it’s clear there has been little real progress. “Such adoptions have been largely aspirational, with little enforcement. Now we’re nine months from Architecture 2030’s first incremental goal: by 2010, the Challenge expected all new buildings and major renovations to meet a 60 percent fossil fuel reduction standard, with an equal number of buildings retrofitted to the same standard as those built new.” LEED buildings are breaking into the mainstream, but remain “a novelty to nearly everyone, still the stuff of awards ceremonies.”
One big problems remains out-dated building codes, which were designed to prevent things from happening, as opposed to encouraging green design. World Changing contends: “Part of the solution will be to get regulators — and voters — on board. Outdated zoning codes can stop designers from incorporating new technologies. One story making the rounds has a team of city employees in a Washington town designing a theoretical dream green development, and then seeing how well it met local code — they found, so the story goes, more than 50 rules that would prevent the project from moving forward before they stopped counting.”
World Changing argues for the importance of: new energy policies to encourage the inclusion of renewable energy components in buildings (so buildings can generate their own energy); greater involvement by designers in policy making through letter-writing, running for office, and working with local chapters of major design organizations; new continuing education focused on sustainability to dramatically change current practices among the design professions; and the active involvement of local designers in local zoning boards and government.
Read the article and another World Changing article on the building code changes outlined in the new Waxman-Markey legislation making its way through Congress. Also, check out an interview with a former owner of a landscape architecture firm who won a seat in the U.S. House of Representatives, Kathy Dahlkemper (D-PA), as well as ASLA’s advocacy work on Capitol Hill.
Image Credit: Sidwell Friends School / Andropogon | <urn:uuid:545b8d2a-5060-4612-96ff-7b83862a4dd8> | CC-MAIN-2016-07 | http://dirt.asla.org/2009/06/09/leadership-needed-from-architects-and-designers/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701159155.63/warc/CC-MAIN-20160205193919-00081-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.946484 | 665 | 2.875 | 3 |
Picture of old City Wall, Harar Harar was established by Sultan Abu Beker Mohammed in 1520. Harar, the Holy City of Ethiopia's Muslim community, is believed to be the forth-holiest city after Mecca, Medina and Jerusalem. The old City Wall of Harar is the main attraction and symbol of Islamic architecture. Harar has approximately 90 mosques, which form the largest concentration of mosques in the world. One of Harar's main attractions is the hyena man who feeds hyenas on the outskirts of the town every night.
Harar is known for its turmoil and bloodshed. Ahmed Gragn killed Abu Beker Mohammed who was the ruler of Harar. Ahmed Gragn was a militant Muslim leader and used Harar as his base to launch his jihad and raids against the Christian Ethiopia n Empire in 1528. He destroyed many churches and threatened the complete distruction of Ethiopian Christendom. He was killed by Emperor Gelawdewos in a Battle near Lake Tana in 1543. The raids continued against the Christians led by Ahmed Gragn's widow Bati Del Wambara. In 1559, Emperor Gelawdewos marched on Harar with the aim to eradicate the constant religious sectarianism taking place. Gelawdewos was killed in a battle and his head was paraded around the city on a stake.
In 1647, Emir Ali ibn Daud took control the city and established an autonomous administration. Despite the continuous fighting with Oromo tribes, Harar expanded; it became well populated, an important city for trade and a centre of Muslim scholarship. It issued its own currency. After 250 years of autonomous rule, Egypt occupied Harar and killed the Emir in 1875. The Egyptian action created a strong resistance in the Muslim community of Harar. Emir Abdullah took control and led a campaign against the Egyptians, which ended in 1885.
In 1887, Harar lost its autonomy when Menelik, Prince of Shewa, who later became Emperor of Ethiopia in 1889, waged war against the army of Emir Abdullah. Menelik defeated the Emir at the Battle of Chelenko in 1887. Menelik then established a new administration, including several members of the emir's family to prevent renewed religious sectarianism, headed by Ras Mekonnen, the father of Emperor Haile Selassie.
Harar then began to disintegrate and lost its status as a trade centre in the end of nineteenth century when the railway line was built between Addis Ababa and Djibouti through Dire Dawa. From 1902, Dire Dawa became the main commercial centre of Ethiopia.
However, Harar remained as the spiritual City of Ethiopia's Muslim community, the political capital of Hararge Province until 1994 and has become a federal city-state since 1995.
The Emirate of Harar was founded in 1647 when the Harari people refused to accept Imām ʿUmardīn Ādan as their ruler and broke away from the Imamate of Awsa to form their own state under `Ali ibn Da`ud. Like all Muslim states in the area, the Emirate of Harar was technically under the protection of the Ottoman Empire as a de jure part of Habesh Eyalet after 1554, and this vague suzerainty would be transferred to the Egypt Eyalet in 1818 following the Ottoman–Saudi War and would, along with the Sudan, become part of the Khedivate of Egypt. Egypt pressed its claim to Harar and annexed the city state in 1875. The British Empire defeated the Khedivate and occupied its territories in 1882 including Harar, but the British agreed to evacuate Harar and essentially cede the city to Abyssinia's sphere of influence in exchange for assistance against Mahdist forces in Sudan (the Hewett treaty). As per the terms of their agreement, the British withdrew from Harar in 1884, leaving the city to the son of the former Emir of Harar with a few hundred rifles, some cannon and a handful of British trained officers. The Emirate would be finally destroyed and annexed by the armies of Negus Sahle Maryam of Showa (the future Emperor Menelik II) in 1887 following the Emirate's defeat at the Battle of Chelenqo.
- Documentary Films | <urn:uuid:1ac5900e-6014-446e-8fbc-7a5ff4c46dcd> | CC-MAIN-2017-39 | http://www.planetethiopia.com/videos/travel-planet-ethiopias-treasure-emirate-of-harar_682f31551.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690307.45/warc/CC-MAIN-20170925021633-20170925041633-00470.warc.gz | en | 0.970262 | 891 | 3.390625 | 3 |
2 edition of Movement characteristics of the overarm throw found in the catalog.
Movement characteristics of the overarm throw
Anne Elizabeth Atwater
Written in English
|Series||[Oregon. University. School of Health, Physical Education, and Recreation. Microform publications]|
|The Physical Object|
|Pagination||, 3, iv-xiii, 408, l.|
|Number of Pages||408|
In an earlier investigation of older adults performing the overarm throw, Williams and colleagues (Williams, Haywood, & VanSant, ) examined proposed that specific movement characteristics emerged as a result of the inter- action between organismic, task, and environmental factors. for force and accuracy throws made by each Author: Kathleen Williams, Kathleen Haywood, Ann VanSant. Fundamental Movement Skills: Active Start and FUNdamentals for Children With Physical Disabilities provides the theory and practice to enable physical activity leaders to develop learners’ fundamental movement skills in an effective, fun, and interactive manner. This is achieved by providing the following:Descriptions and characteristics of the mature movement patterns of fundamental.
Again the basic technique is as easy as , that like Dead Ball Kicking or Kicking from Hands it is all in one smooth though from Figure 1 that it’s the arms doing all the work. However to ensure that throws are straighter, the arm throwing the ball will be the opposite arm to the leg placed forward (i.e. Biomechanics of the overarm throw used in cricket By Ronan Sexton Nicola Mc Anenly James Lennon Caroline Mc Gurk Definition of Biomechanics 'Biomechanics is the science that examines the internal and external forces acting on a human body and the effects produced by these.
Underarm throw – female bowling a ‘drive’ 29 Underarm throw – female bowling a ‘draw’ 30 Underarm throw – young male bowling a ‘draw’ 31 Sidearm throw – the hammer throw 32 Overarm throw – javelin throw 33 Overarm throw – bowling in cricket biomechanics of overarm throwing movements and of throwing injuries Atwater, Anne E. Exercise and Sport Sciences Reviews: January - Volume 7 - Issue 1 - ppg
Echoes of victory
Resource training manual for district councilors workshops program.
Our eternal heritage
Northern Ireland: untying the knot; a new opportunity
Wartime opportunities for men
Quartet (1966) [for] flute/alto flute (G), clarinet (Bb)/bass clarinet (Bb), vibraphone [and] C-bass.
Law relating to public nuisance
Providing for the consideration of H.R. 2930
Calcutta municipal act, 1951 (West Bengal act XXXIII of 1951) as modified up to the 1st May 1970.
Legal problems in higher education.
microcomputer automated anodic stripping voltammetric analyzer for trace heavy metal speciation
Refrigeration license; complete study guide to pass high on your civil service test
How I built myself a house
Alternatives to tax-exempt State and local bonds
A study of technologies for reducing winter weather costs.
Movement Characteristics of the Overarm Throw: A Kinematic Analysis of Men and Women Performers, Volume 1 Anne Elizabeth Atwater University of Wisconsin--Madison, - Movement characteristics of the overarm throw book - pages.
Get this from a library. Movement characteristics of the overarm throw: a kinematic analysis of men and women performers.
[Anne E Atwater]. The apparatus simultaneously allowed the simulation of the overarm throw movement and the recording of its kinetic and dynamic characteristics in a laboratory setting. Throw Underarm Exploring underarm throwing, space awareness (direction) and relationships (with others).
2 Hard or grass area Exploring Overarm Throwing Throwing overarm, time and energy, and relationships (with others).
1 or 2 Indoor or outdoor area with a wall Catching with a Partner Catching a ball rolled or thrown from different. On the basis of dynamic and kinematic data, this study identifies the type of muscle contraction in unloaded overarm throwing movements.
An unloaded throw or nearly unloaded throw is defined as. Variation: Change the locomotor movement, e.g. walk, skip, hop and jump. Practicing and developing the skill. Revise the components of the overarm throw.
The overarm throw is an object control skill frequently used in many sports, such as cricket, softball and baseball. The action is also used in athletics with theFile Size: KB. Figure 2 — An example of the overarm throw in team handball with average timing (in seconds; sec) of the dif ferent phases and characteristic points during the throw.
with regards to the overarm throw for distance and accurancy do societal expectation have an effect on the gender diffrence observed lowered parental ans societal expectation have had a negative effect on the development of the throwing abilities of girls.
of different movement characteristics and experimenting with different musculoskeletal organizations (Goldfield, Kay, & Warren, ). However, in the context of a high-speed, whole-body movement such as maximal-effort overarm throwing, exploration may be limited to early movement characteristics involving the lower-extremities and Size: KB.
The biomechanics of throwing. In sport, throwing is to the upper limb what gait is to the lower limb. It is an activity seen in many sports in some form, and there are similarities between all types of throw and with shots in racquet sports.
Throwing can be divided into five stages which form a single continuous motion. Procedure. After a general warm-up of 15 minutes, throwing performance was tested in an overarm throw towards a target at four meters distance.
The subjects performed a standing throw with holding the front foot on the floor during throwing (Figure 1).The instruction was to throw as fast as possible aiming at a by m square target at m by: Start studying Chapter 8.
Learn vocabulary, terms, and more with flashcards, games, and other study tools. Search. Characteristics of Early Overarm Throwing. Consists mostly of arm action Elbow points up Upper Arm Action for Developmental Changes in Overarm Throw.
Oblique 2. Aligned but independent 3. Lag. To clarify patterns in the rate of motor development, children observed between kindergarten and second grade were refilmed, performing an overarm throw, when they became seventh-grade students. Results were compared with predictions made earlier.
Differences in the skill levels of boys and girls and differences in their throwing experience are by: A Three-Dimensional Analysis of Overarm Throwing in is, an overarm throw toward a target at a distance of 7 m. The subjects performed a standing throw, which means keeping the front foot on the floor during the entire throw.
The instruction was to throw as fast File Size: KB. 13 Throwing Games for Kids Throwing is a fundamental part of many different activities and sports.
That’s why children need to learn how to throw as soon as possible, so they can participate in these activities with their friends. Stage 2 – Peer Assessment - Overarm throw performance. ASSESSMENT – TEACHER SHEET.
Purpose of the task The intent of this assessment is to allow students to assess a partner to identify components of appropriate and efficient skill execution for an overarm throw.
ThisFile Size: KB. PDHPE Stage 1 Overarm Throw Activity context The overarm throw is a fundamental movement skill which is introduced in Stage 1. The focus for teachers should be on students developing the introductory components of the overarm throw.
The overarm t hrow is a manipulative skill frequently used in many sports, such as cricket, softball and baseballFile Size: KB.
Developmental aspects of overarm throwing related to age and sex. Human Movement Science 2, A high speed mm camera was used to record the overhand throw for distance by children (boys and girls) from ages three to nine years. Changes of speed in the ball, wrist and elbow before and after release were obtained from the finished by: muscular system.
major muscles involved in a movement; muscle relationship (agonist, antagonist) types of muscle contraction (concentric, eccentric, isometric) Learn to: identify the location of the major muscles involved in movement and related joint actions; perform and analyse movements, eg overarm throw, by examining: bones involved and the.
One of the possible negative transfer from the movement of overarm throw to the action of badminton forehand clear is the subject Peter has practiced overarm throw in a specific way such that a specific perception-action coupling has grew between the perceptual characteristics of the task and the motor system (Magill, ).
Introduction. The ability to perform various fundamental movement skills (FMS) (e.g., running, catching, hopping, throwing) in a consistent and proficient manner, is often defined as movement competence [1,2].High levels of FMS competence in childhood are related to a number of health and physical activity outcomes .Children who possess high FMS levels have a greater chance of Cited by: Movement Book $ Buy.
Description (Available in soft back.) Start reading now and download the eBook! By using systematic logic and revisiting the natural developmental principles all infants employ as they learn to walk, run, and climb, Gray forces a new look at motor learning, corrective exercise and modern conditioning practices.Submitted by John A.
Mercer and Jason H. Nielson Abstract The lacrosse shot is a vital skill of the offensive player. Despite the growth of the sport of lacrosse, there is a paucity of research on describing the biomechanics of lacrosse specific skills. The purpose of . | <urn:uuid:9d85e316-4d51-4ef8-a869-f97e81995142> | CC-MAIN-2021-49 | https://rameroguxurapif.rangelyautomuseum.com/movement-characteristics-of-the-overarm-throw-book-14819ko.php | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358786.67/warc/CC-MAIN-20211129164711-20211129194711-00178.warc.gz | en | 0.930314 | 2,077 | 2.765625 | 3 |
I’ve got a few new students this year who are just starting to be able to verbally imitate. They are just starting to imitate environmental sounds and I’m working on imitating simple vowels. They have a variety of disorders from autism to apraxia. After spending a ton of days writing progress notes and trying to explain in writing, how exactly I’m eliciting verbal imitation, these 5 things popped out to me. I thought I’d make a quick run-down of some strategies I’m using here:
- Run. For some reason, these kids are all super motivated by playing “chase”. We go out into the hallway and play “stop and go”. For any sound at all, we “go”and I shape it into an “o” mouth position.
- I love this little cause/effect app. It’s called Make it Pop. When I went to tag them here I realized they are no longer making the app. You can use any firework app for this task though and there are lots of free ones! I really don’t use apps that often for this age, but if you’ve got a kiddo who is super into the iPad, use this app and get in from of a mirror. This version of the app has lots of things to “pop”, including popcorn, bubbles and fireworks! We practiced by saying “oohhh” and “ahhh” for the fireworks! Make sure you’re emphasizing the oral movements in the mirror!
- I always focus on getting imitation in play before I focus on getting verbal imitation. You can have them imitate silly play like flinging a car off a table or make it more gross motor in nature.
- I also love using music for verbal imitation. We can pair it with motions and make it really fun.
- I recently went to a Nancy Kaufman training at my state conference and she showed a video of a BCBA having a child imitate physical movements (tap your head, clap your hands) and then after a while adding verbalizing into the sequence. She did it really quickly and the task became just another copy/movement. They were using the skills with children with autism spectrum disorder and I’ve tried it a few times and loved it! I have used it with kids with ASD and kids with developmental delay. In her video, the BCBA continued the sequence over and over but when I’ve done it, I quickly move into a focus on the verbal back and forth play!
These are just a few quick tips I’ve been using to get verbal imitation in my young preschoolers. If you’ve got other EBP articles to point me to for verbal imitation, please comment and share them with us!
Join the SRN newsletter!
I'm so glad you stopped by! If you'd like to keep up with the newest posts and get exclusive free downloads, please sign up for the newsletter! Your first freebie is ready as soon as you subscribe and confirm your email! | <urn:uuid:cb1d517b-71d1-4189-a7c8-7037e3e3903d> | CC-MAIN-2020-05 | https://thespeechroomnews.com/2018/11/eliciting-early-verbal-imitation.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250610004.56/warc/CC-MAIN-20200123101110-20200123130110-00085.warc.gz | en | 0.959089 | 649 | 2.578125 | 3 |
Everything you do, any movement you make can be ‘just’ an exercise or it can be an embodied practice that invites growing awareness, more choices and presence.
There are a few pointers that help you identify what kind of practice you are engaging in. Especially if you are into personal growth and learning, this could be a helpful way to choose what your focus is.
- you and your body are the object
- intentional, with focusing attention
- experiential, intended to increase awareness
- you and your body are the subject
An exercise is what we typically do in the gym, what you learn growing up in physical eduation. You make specific movements and the goal is to do it correctly, to build muscle or achieve a certain state of bending or flexibility. Depending on how they are done, all exercises may be beneficial for your health. They can strengthen your cardiovascular system and keep the body fit.
Very often, exercises are also focused on achieving a certain outcome: such as a number of repetitions or a certain level of muscle strength. The goals can often be measured with metrics.
If you are exercising there is a chance that you treat yourself like a machine, an object that should function as intended and if something is not working properly, your system (read: body) is at fault. German neurobiologist Gerald Hüther talks a lot about the importance of people being treated like people not objects. And that real learning and growth can only happen when you are seen and treated like a subject, not an object. And that also goes for how you treat yourself.
Embodied Practices are about experiencing yourself in the moment, strengthening your felt sense of self and building awareness so you have more choices in responding to life (instead of getting stuck in reactive states where you only see one, or at the most two options).
The key elements of an embodied practice are intention and attention. You set an intention before you start your practice. This could, for instance be:
- I want to check-in with my body and reconnect with my physical self.
- I want to learn about softness or flexibility.
- I want to increase my ability to breathe freely.
In any case, an embodied practice doesn’t work when you try to impose how you should feel afterwards. You might do a breathing practice of which you know it improves your lung capacity. If, however, you think (possibly the mind taking over) you know how you should feel afterwards, you are taking away the possibility of your body showing you what it needs, its current limitations, or new ways of being or sensations that are connected to this ability.
By being attentive to your body or specific body areas during the practice, you consciously influence where the energy goes. It leads to increased awareness. You can regain sensations, strength, calmness, aso. by focusing on a body area or quality that you’d like to strengthen. The energy blocks, tensions or pains you will encounter, are showing you the way. There is nothing wrong with you, but you can assume that there are areas where energy is blocked that you can learn to access and tranfsorm.
And embodied practices are based on kindness with yourself. Every time you engage in an embodied practice, you make a choice of listening to your body and taking care of yourself. It is a discipline of self-care that, in my opinion, adds tremendously to self-confidence and overall health. Being kind to yourself is a prerequisite of being able to have empathy with others.
When you do embodied practices with an intention, there is no wrong. You will in any case always learn something about your self.
Embodied practices are not better than exercises. The two just serve very different purposes. For me, embodied practices add more value to my experience. They are never boring.
Even weight lifting in the gym can be an embodied practice. Just like chopping carrots in the kitchen and writing emails.
Once you’re aware of the difference between exercises and embodied practices, you can make an informed choice. This can change everything in your felt experience. | <urn:uuid:1656de18-f8e5-476a-b0d4-816e0b91378f> | CC-MAIN-2019-09 | https://bodies-at-work.com/en/exercise-vs-embodied-practice/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484648.28/warc/CC-MAIN-20190218033722-20190218055722-00403.warc.gz | en | 0.966726 | 841 | 2.6875 | 3 |
Defense equipment isn’t necessarily used only during political conflicts. When earthquakes, floods, or other natural disasters occur, armed forces often are called on to assemble quickly with large numbers of trained personnel and heavy equipment. Debris is cleared away to restore lines of communication so that relief supplies can be brought through and distributed to those in greatest need.
The FV180 Combat Engineer Tractor, designed by BAE Systems, Farnborough, UK, has become the standard vehicle of its class in the British Army. More recently, BAE Systems was awarded a contract for the design, development, and production of the more-capable Terrier Maneuvre Support Vehicle (MSV). MSVs can undertake a much wider range of battlefield operations than today’s FV180 CET, which was originally conceived more than 30 years ago.
The first prototype of Terrier was rolled out at the Land Systems Leicester facility in mid-2005 and has since been engaged in a demanding series of trials at various locations in the UK. BAE Systems built four pre-series Terriers in 2007, and about 65 production vehicles will follow — with the first batch of 20 to be delivered by late 2009.
What it is
Terrier is a tracked vehicle fitted with a front-mounted, hydraulically operated bucket that can be used to clear obstacles, prepare vehicle and weapon pits, and grip large objects. A ripper can be fitted to break up road surfaces.
Mounted on the right side is a hydraulically operated excavator arm system that can lift a maximum of 3 tons at full reach. Normally fitted with a bucket, the arm can be used to prepare infantry trenches. However, the bucket can be replaced quickly by other specialized attachments, such as an auger that can drill holes to 3-m deep, or an impact hammer-breaker. A rear load platform can carry payloads to 5 tons.
Despite all this versatile tooling, the Terrier is light enough to be carried in an A400M aircraft, and two can be carried in a C-17 aircraft.
An electronic interface
A key element of the Terrier’s success is electronic control, and to interface with electronics, hydraulic cylinders require some sort of linear displacement transducer (LDT). Magnetostrictive transducers have gained widespread use as an LDT, especially in stationary applications. High production machines that require positioning accuracy to within thousandths of an inch justify the cost of a magnetostrictive LDT.
However, Mark Hoffman, of Rota Engineering, Dallas, points out that because mobile equipment has a human operator, position feedback from cylinders generally only needs to be within hundredths of an inch. Put simply, he says that magnetostrictive LDTs are overkill for most mobile equipment applications. He suggests that an LDT with slightly less precision, but substantially lower cost, would enable designers to provide cylinder position feedback more often — not just for the most critical applications that justify high cost.
LDTs from Rota Engineering use a microprocessor that transmits and receives signals from Hall-effect chips mounted to a printed circuit board. The circuit board is contained within a stainless steel or aluminum housing, depending on application requirements. A piston-mounted magnet causes a voltage drop when it passes over the Hall-effect chip. The microprocessor calculates the position of the Hall-effect chip and correlates the voltage drop to a proportional voltage, current, PWM, or CANBUS output.
Hoffman explains, “Hall-effect sensors do not have as high a resolution as magnetostrictive sensors which can achieve resolution measured in ten-thousandths of an inch. Hall-effect LDTs, however, generally have resolution of 0.012 to 0.020 in. The tighter resolution of magnetostrictive LDTs is needed for many process applications, such as a rolling mill. Most of the time, though, 0.020 in. resolution is more than sufficient for mobile hydraulic applications.”
An additional benefit of the Hall-effect technology is small size. In most instances, the pin-to-pin dimension of a cylinder need not be increased to accommodate a Hall-effect LDT. Also, the surface-mount technology tolerates high levels of vibration, and potting can provide additional vibration resistance.
Hoffman continues, “The transducers used in the Terrier allow automatic stowing of the excavator arm when it is not needed. They also allow remote operation when the vehicle comes under fire from small arms. Since the original design, we developed a more compact transducer, which will be used on production vehicles. The Terrier has been on field trials for at least a year and has come under some severe conditions of shock and vibration.
“The Terrier vehicle still has its original set of our Hall-effect transducers, which were installed about three years ago. They have worked without failure inside the compact and lightweight cylinders designed by Parker in Germany.”
Click here to see a video showing the FV180 in action. | <urn:uuid:2f23a1bd-9c3b-47c2-9f35-5a4e57cada82> | CC-MAIN-2016-50 | http://hydraulicspneumatics.com/print/200/IndZone/Mining/Article/False/77216/IndZone-Mining | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541995.74/warc/CC-MAIN-20161202170901-00199-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.950778 | 1,038 | 2.515625 | 3 |
“Camping, backpacking, fastpacking, thru-hiking, boondocking, roughing it, glamping…” There are so many terms to describe the different ways we sleep outdoors. Everyone has a different style, favorite location, essential gear, and reason for camping out.
Camping has almost doubled over the past two years, accounting for more than 40% of all leisure trips. Almost 94 million Americans went camping just last year, and at least 9.1 million households went camping for the first time.
Regardless of what you call it, camping involves many small decisions that can make the difference between a wonderful experience and a miserable suffer-fest. Outdoor health plays a fundamental role in camping because you bring your home with you.
Are you prepared for your next campout? Whether it’s your first adventure or your 100th excursion, these are my top three hazards to avoid for a successful, safe camping trip.
1. Burns (and sunburns)
Will you use a stove or campfire? Do you have the right medications and know-how to treat a burn? Don’t ruin your camping trip with a s’mores injury! Safe camping starts with fire safety.
- Always keep a close eye on kids whenever a fire is nearby
- Pack antibiotic cream and non-adherent bandages for dressing burns
Remember that the most common type of burn outdoors is actually a sunburn. Stay on top of sun protection to ensure a comfortable campout.
- Bring your SPF sunblock and a hat
- Wear sunglasses as your eyeballs can get a sunburn (spoiler alert, it really hurts)
- Be extra cautious around water and snow, which refract light and increase the burn potential
- Be aware of the power of the sun at high altitudes (the intensity of ultraviolet radiation increases about 3% for every 1000 feet of elevation gained)
- Reapply that sunblock more often than you think you need to!
2. Tick bites
There are more ticks than ever these days, especially in the warm summer months. They can carry nasty infections like Lyme disease, but removing them within 36 hours will substantially reduce the chances of transmission and illness.
If you are traveling in an area known to have tick-borne illnesses, learn the signs and symptoms of these diseases. A little knowledge of how to safely remove a tick can provide a lot of peace of mind.
- Wear protective clothing like long-sleeved shirts and pants
- Utilize repellants with chemicals like DEET or Picardin to treat skin and clothing
- Perform regular tick checks on people and pets
- Know how to safely remove a tick and watch for signs of infection
3. Poison ivy, poison oak, and other rashes
Growing up in the Pacific Northwest meant summers full of strawberries. Since moving to California, I think tomatoes… and poison oak.
Summer rashes from toxic plants can range from a mild itch to horrific oozing sores like an infestation out of an old John Carpenter horror movie. (For real, it can be gnarly.)
If you’re camping in an area with toxic plants, be aware; travel with care.
- Learn to recognize poison ivy, poison oak, and other toxic plants (their appearance can differ by region and season)
- Consider wearing taller socks and long pants
- Bring a soap or scrub to help wash off oils after a potential exposure
- Pack calamine lotion or hydrocortisone cream to treat itchy rashes
What are you waiting for?
When I think of camping, it brings a distinct compilation of sensations to mind: the sound of the wind as it rushes through the tops of tall pine trees, shakes my tent, and then fades away… the sight of the morning sunlight marching across the valley as a bright line, pushing back the cold, dim dawn… the vitalizing shock of icy lake water on sweaty skin after a long day hiking in the high Sierra mountains… the smell of campfire smoke in the summer.
Camping is a fully immersive way to explore and connect with the outdoors. You get a unique satisfaction from making a home away from your regular comfort zone and the trappings of civilization — even for just one night.
If you’re new to camping, there’s no better time to get out there! Car camping is a great way to drive out and spend the night not far from your vehicle.
If you’re ready to push your comfort zone, the wilderness has so much more to offer. Solitude in nature can be incredible, and the stars are amazing.
Get prepared for safe camping
Plan and prepare for your next campout with the GOES Health App, featuring our full archive of expert knowledge. With a premium subscription, you can get 24/7 access to our team of wilderness medicine physicians and our offline-enabled digital health assessment tool.
Stay safe and have fun! | <urn:uuid:1c190b0d-5ecd-452a-835b-3071cded6538> | CC-MAIN-2023-50 | https://goes.health/top-three-tips-for-safe-camping/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00815.warc.gz | en | 0.917452 | 1,029 | 2.65625 | 3 |
A Patient's Guide to Anterior Cervical Discectomy and Fusion
Anterior cervical discectomy and fusion (ACDF) is a procedure used to treat neck problems such as cervical radiculopathy, disc herniations, fractures, and spinal instability. In this procedure, the surgeon enters the neck from the front (the anterior region) and removes a spinal disc (discectomy). The vertebrae above and below the disc are then held in place with bone graft and sometimes metal hardware. The goal is to help the bones to grow together into one solid bone. This is known as fusion. The medical term for fusion is arthrodesis.
Operating on the back of the neck is more commonly used for neck fractures. That procedure is called posterior cervical fusion.
Related Document: A Patient's Guide to Posterior Cervical Fusion
This guide will help you understand
- why the procedure becomes necessary
- what surgeons hope to achieve
- what to expect during your recovery
What parts of the neck are involved?
Surgeons perform this surgery through the front part of the neck. Key structures include the ligaments and bones, intervertebral discs, the spinal cord and spinal nerves, and the neural foramina.
Related Document: A Patient's Guide to Cervical Spine Anatomy
What do surgeons hope to achieve?
In most cases, ACDF is used to stop symptoms from cervical disc disease. Discs start to degenerate as a natural part of aging and also from stress and strain in the structures of the neck. Over time, the disc begins to collapse, and the space decreases between the vertebrae.
When this happens, the openings around the spinal nerves (the neural foramina) narrow and may begin to put pressure on the nerves. The long ligaments in the spine slacken. They may even buckle and put pressure on the spinal cord. The outer rings of the disc, the annulus, weaken and develop small cracks. The nucleus in the center of the disc may press on the weakened annulus and actually squeeze out of the annulus. This is called a herniated disc. The herniated disc may press on ligaments, nerves, or even the spinal cord. Fragments of the disc that press against the outer annulus, spinal nerves, or spinal cord can be a source of pain, numbness, and weakness. Pressure on the spinal cord, called myelopathy, can also produce problems with the bowels and bladder, changes in the way you walk, and trouble with fine motor skills in the hands.
Discectomy is the removal of the disc (and any fragments) between the vertebrae that are to be fused. When symptoms are coming from the disc, it is hoped that this stops the symptoms.
Related Document: A Patient's Guide to Cervical Discectomy
Once the disc is removed, surgeons spread the bones of the spine apart slightly (distraction) to make room for the bone graft. This is bone material that can be taken from the top of the pelvis bone (autograft) or from a natural substitute (allograft). The bone graft separates and holds the vertebrae apart. Enlarging the space between the vertebrae widens the opening of the neural foramina, taking pressure off the spinal nerves that pass through them. Also, the ligaments inside the spinal canal are pulled taut so they don't buckle into the spinal canal.
No movement occurs between the bones that are fused together. By holding the sore part of the neck steady, the fusion helps relieve pain. And it prevents additional wear and tear on the structures inside the section that was fused. This keeps bone spurs from forming, and it has been shown that fusion causes existing bone spurs to shrink. By fusing the bones together, surgeons hope that patients won't have future pain and problems from cervical disc disease.
How will I prepare for surgery?
The decision to proceed with surgery must be made jointly by you and your surgeon. You should understand as much about the procedure as possible. If you have concerns or questions, you should talk to your surgeon.
Once you decide on surgery, your surgeon may suggest a complete physical examination by your regular doctor. This exam helps ensure that you are in the best possible condition to undergo the operation.
On the day of your surgery, you will probably be admitted to the hospital early in the morning. You shouldn't eat or drink anything after midnight the night before.
What happens during the operation?
Patients are given a general anesthesia to put them to sleep during most spine surgeries. As you sleep, your breathing may be assisted with a ventilator. A ventilator is a device that controls and monitors the flow of air to the lungs.
The patient's neck is positioned facing the ceiling with the head bent back and slightly to the right. A two-inch incision is made two to three fingers' width above the collar bone across the left-hand side of the neck. Surgeons often choose the left side to avoid injuring the nerve going to the voice box. Retractors are used to gently separate and hold the neck muscles and soft tissues apart so the surgeon can work on the front of the spine.
A needle is inserted into the disc, and an X-ray is taken to identify the correct disc. A long strip of muscle and part of the long ligament that covers the front of the vertebral bodies are carefully pulled to the side. Forceps are used to take out the front half of the disc. Next, a tool is attached to the vertebrae to spread them apart. This makes it easier for the surgeon to see between the two vertebrae. A small rotary cutting tool (a burr) is used to carefully remove the back half of the disc. A special microscope is used to help the surgeon see and remove pieces of disc material and bone spurs near the spinal cord.
A layer of bone is shaved off the flat surfaces of the two vertebrae. This causes the surfaces to bleed. This is necessary to help the bone graft heal and join the bones together.
The surgeon measures the depth and height between the two vertebrae. A section of bone is grafted from the top part of the pelvis. It is measured to fit snugly in the space where the disc was taken out. The surgeon increases the traction pull to separate the two vertebrae, and the graft is tamped into place.
The traction pull is released. Then the surgeon tests the graft by bending and turning the neck to make sure it is in the right spot and is locked in place. Another X-ray may be taken to double check the location of the graft.
A drainage tube may be placed in the wound. The muscles and soft tissues are put back in place, and the skin is stitched together. The surgeon may place your neck in a rigid collar.
What might go wrong?
As with all major surgical procedures, complications can occur. Some of the most common complications following ACDF include
- nerve damage
- problems with the graft
- ongoing pain
This is not intended to be a complete list of the possible complications, but these are the most common.
Problems with Anesthesia
Problems can arise when the anesthesia given during surgery causes a reaction with other drugs the patient is taking. In rare cases, a patient may have problems with the anesthesia itself. In addition, anesthesia can affect lung function because the lungs don't expand as well while a person is under anesthesia. Be sure to discuss the risks and your concerns with your anesthesiologist.
Thrombophlebitis (Blood Clots)
Thrombophlebitis, sometimes called deep venous thrombosis (DVT), can occur after any operation. It occurs when the blood in the large veins of the leg forms blood clots. This may cause the leg to swell and become warm to the touch and painful. If the blood clots in the veins break apart, they can travel to the lung, where they lodge in the capillaries and cut off the blood supply to a portion of the lung. This is called a pulmonary embolism. (Pulmonary means lung, and embolism refers to a fragment of something traveling through the vascular system.) Most surgeons take preventing DVT very seriously. There are many ways to reduce the risk of DVT, but probably the most effective is getting you moving as soon as possible. Two other commonly used preventative measures include
- pressure stockings to keep the blood in the legs moving
- medications that thin the blood and prevent blood clots from forming
Infection following spine surgery is rare but can be a very serious complication. Some infections may show up early, even before you leave the hospital. Infections on the skin's surface usually go away with antibiotics. Deeper infections that spread into the bones and soft tissues of the spine are harder to treat and may require additional surgery to treat the infected portion of the spine.
Any surgery that is done near the spinal canal can potentially cause injury to the spinal cord or spinal nerves. Injury can occur from bumping or cutting the nerve tissue with a surgical instrument, from swelling around the nerve, or from the formation of scar tissue. An injury to these structures can cause muscle weakness and a loss of sensation to the areas supplied by the nerve.
The nerve to the voice box is sometimes injured during surgery on the front of the neck. Surgeons usually prefer to do surgery on the left side of the neck where the path of the nerve is more predictable than on the right side. During surgery, the nerve may be stretched too far when retractors are used to hold the muscles and soft tissues apart. When this happens, patients may be hoarse for a few days or weeks after surgery. In rare cases in which the nerve is actually cut, patients may end up with ongoing minor problems of hoarseness, voice fatigue, or difficulty making high tones.
Problems with the Graft
Fusion surgery requires bone to be grafted into the spinal column. The graft is commonly taken from the top rim of the pelvis. There is a risk of having pain, infection, or weakness in the area where the graft is taken.
After the graft is placed, the surgeon checks the position of the graft before completing the surgery. However, the graft may shift slightly soon after surgery to the point it is no longer able to hold the spine stable. When the graft migrates out of position, it can cause injury to the nearby tissues. A second surgery may be needed to align the graft and to apply metal plates and screws to hold it firmly in place.
Sometimes the bones do not fuse as planned. This is called a nonunion, or pseudarthrosis. (The term pseudarthrosis means false joint.) If the joint motion from a nonunion continues to cause pain, you may need a second operation. In the second procedure, the surgeon usually adds more bone graft. Metal plates and screws may also be added to rigidly secure the bones so they will fuse together.
ACDF is a complex surgery. Not all patients get complete pain relief with this procedure. As with any surgery, you should expect some pain afterward. If the pain continues or becomes unbearable, talk to your surgeon about treatments that can help control your pain.
What happens after surgery?
After ACDF, patients usually wear a special neck brace for several months. These neck braces are often bulky and restrictive. However, the bone graft needs time to heal in order for the fusion to succeed. This requires the neck to be held still.
Recently, surgeons have begun using metal hardware, called instrumentation, to lock the bones in place. This hardware includes metal plates and screws that are fastened to the neck bones. They hold the neck bones still so the graft can heal, replacing the need for a rigid neck brace.
Patients may stay in the hospital for one to two days after surgery. When the surgery is done on an outpatient basis, patients may even go home the same day of surgery. Patients can get out of bed as soon as they feel up to it. They are watched carefully when they begin eating to make sure they don't have problems swallowing. They usually drink liquids at first, and if they are not having problems, they can start eating solid food.
Patients are able to return home when their medical condition is stable. However, they are usually required to keep their activities to a minimum in order to give the graft time to heal.
What should I expect as I recover?
Rehabilitation after ACDF can be a slow process. You will probably need to attend therapy sessions for two to three months, and you should expect full recovery to take up to eight months.
Many surgeons prescribe outpatient physical therapy beginning a minimum of four weeks after surgery. At first, treatments are used to help control pain and inflammation. Ice and electrical stimulation treatments are commonly used to help with these goals. Your therapist may also use massage and other hands-on treatments to ease muscle spasm and pain.
Active treatments are slowly added. These include exercises for improving heart and lung function. Walking and stationary cycling are ideal cardiovascular exercises. Therapists also teach specific exercises to help tone and control the muscles that stabilize the neck and upper back.
Your therapist also works with you on how to move and do activities. This form of treatment, called body mechanics, is used to help you develop new movement habits. This training helps you keep your neck in safe positions as you go about your work and daily activities. At first, this may be as simple as helping you learn how to move safely and easily in and out of bed, how to get dressed and undressed, and how to do some of your routine activities. Then you'll learn how to keep your neck safe while you lift and carry items and as you begin to do other heavier activities.
As your condition improves, your therapist will begin tailoring your program to help prepare you to go back to work. Some patients are not able to go back to a previous job that requires heavy and strenuous tasks. Your therapist may suggest changes in job tasks that enable you to go back to your previous job or to do alternate forms of work. You'll learn to do these tasks in ways that keep your neck safe and free of extra strain.
Before your therapy sessions end, your therapist will teach you ways to avoid future problems. | <urn:uuid:d2d292b6-43ac-4089-a68b-0f65d826684b> | CC-MAIN-2019-13 | https://www.concordortho.com/patient-resources/patient-education/topic/d6eb9659677cf22a8126862844cd6e46 | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201521.60/warc/CC-MAIN-20190318172016-20190318194016-00009.warc.gz | en | 0.947563 | 2,979 | 3.296875 | 3 |
Tragic hero in antigone 2 pages 426 words february 2015 saved essays save your essays here so you can locate them quickly. Sa mga namomroblema sa essay nila, magpakalasing kayo tas pag english speaking na yun yung ilagay niyo sa essay niyo hahahaha joke bi pala dharti maa essays epic hero vs tragic hero essay. Read this english essay and over 88,000 other research documents antigone - tragic hero antigone is a greek tragic piece that stresses the use of power and morality versus the law written. Antigone tragic hero essay description - engineering homework help reddit april 22, 2018 i could probably write several essays about how good the character. Most greek tragedies were based on myths and consisted of a series of dramatic episodes mixed with a chorus who commented on the dramatic action or analyzed the pattern of events. Drrsgingrichcom: home ap lang who in the play is the tragic hero antigone persuasive essay rubric 9/8 superior. This is for my essay home antigone q & a five thesis statement why antigo antigone five thesis statement why antigone is a tragic hero in the play antigone.
Hence, an argument of who is an essay brother's memory means that still a tragic hero antigone creon is divided into sections argumentative essay. Antigone is a tragic hero essay - linear programming homework help pubblicato da il 18 apr 2018 0 comment mrswoods better not be on that hoe shit and make us write. Creon is the tragic hero in antigone antigone essay the question to be posited is how different would the story of “antigone” have been if creon had permitted the simple task of allowing. Get an answer for 'how is antigone a tragic hero' and find homework help for other antigone questions at enotes.
Free coursework on antigone a tragic hero from essayukcom, the uk essays company for essay, dissertation and coursework writing. It is not often in greek myth or tragedy that a woman is found portrayed as a tragic hero however, sophocles makes the hero of his antigone, the third and last play in the theme of oedipus. Essay antigone: a tragic hero heroes come in many forms some such as immense in size and strength as hercules, some in the form of people that are shunned upon, such as harriet tubman, and. Essay about antigone being the tragic hero: architecture essay help april 22nd, 2018 by there's an essay on feministcurrent that's somewhat provocative about what.
Tragic hero essay antigone characters help writing personal statement for law school home uncategorised tragic hero essay antigone characters. The play antigone by sophocles is a classic greek tragedy in every aspect but one one question remains, who is the tragic hero first, we should give meaning to what makes up a tragic hero. The play antigone, written by sophocles in 441 b c , presents a tragedy of characters whom suffer greatly, caused by a series of tragic flaws antigone, the main character of the play.
Antigone tragic hero essay dad: brown and levinson politeness theory essay how to conclude an essay phrases related post of antigone tragic hero. Antigone and creon tragic hero essay university of houston creative writing program ranking uncategorized antigone and creon tragic hero essay. Tragic heroes, antigone, - kreon, tragic hero in antigone. Creon: a tragic hero essay examples tragic hero essay tragic hero essay the play antigone, written by sophocies, is a great example of a classical greek tragedy.
Essays from bookrags provide great ideas for antigone essays and paper topics like essay view this student essay about antigone of the tragic hero in antigone.
Free essay: a tragic hero a tragic hero is a character who makes an error of judgment or has a fatal flaw, which combined with fate, results into a tragedy. The conception of tragic heroes has changed significantly since aristotle first laid down the rules for defining tragedy in his poetics in its origins in. A tragedy is a poem in which the protagonist, the tragic hero, is shown and falls in antigone by sophocles, antigone is the true tragic hero. Free coursework on antigone who is the tragic hero from essayukcom, the uk essays company for essay, dissertation and coursework writing.
Disclaimer: free essays on cliff notes posted on this site were donated by anonymous users and are provided for informational use only the free cliff notes research paper (antigone: the. Guess who passed their math midterm with a 195/16 & my english professor came up to me & complimented my essay it's a good day darwin evolution god believe essay biologos. Had to do an essay for english class about lord of the flies @madisonvines @lancethechamp bournemouth university dissertation dissertation tobias pfefferkorn lech essay on windmill in. Kacie ms c 11/16/12 c block antigone tragic hero essay creon is the better tragic hero because he has more traits of a tragic hero than antigone has. | <urn:uuid:08bfe8e4-d10b-48ff-a211-622aff08e7d0> | CC-MAIN-2018-26 | http://qlpaperuzyx.locksmith-everett.us/antigone-tragic-hero-essay-essay.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864257.17/warc/CC-MAIN-20180621192119-20180621212119-00305.warc.gz | en | 0.889671 | 1,132 | 2.90625 | 3 |
|The statue of Amida Buddha|
|Traditional Japanese wedding|
|Shrine at Anoshima|
|The Dancing girl of Izu|
|Commodore Matthew C Perry of U.S.|
|Monument of Perry's landing - Black Ships|
|The beautiful Perry Street|
|Port of Shimoda Coastline|
Kamakura was the first stop of our trip : A small town in Sagami which for several centuries was the second capital of Japan and played important role in Japan history. The statue of Amida Buddha (鐮倉大佛)was tourist attraction ,we also enjoyed local famous レらす丼(小白魚蓋飯)which was small white fish over a bow of rice very unique and made a delicious lunch. After lunch short stop at Anoshima and then arrived Izu's Shimoda: Japan's first open port in 1854.
After Commodore Matthew C. Perry of the U.S. In 1854 the "Black Ships" arrived the port of Shimoda waked up and changed the Japanese history. Today's Shimoda retains a feel of the Old Japan in it downtown areas and still has its beautiful natural coastline. We walked through Perry street along a small canal and witness early 19 century what happened in this small fishing port.
When our bus drove into Izu Peninsula, Kawabata Yasunari's "The Daning girl of Izu: jumping out from my mind the first love story of his. Kawabata Yasunari was a Japanese novelist,won him the Nobel Prize of Literature in 1968, the first Japanese author to receive the award. | <urn:uuid:c38b6ccd-bf6f-4687-863f-ab24d1466e88> | CC-MAIN-2017-26 | http://flowersikebanaandi.blogspot.com/2014/10/kamakura-izu-and-shimoda.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00211.warc.gz | en | 0.941653 | 348 | 2.6875 | 3 |
Urban, densely populated, and a balmy 29 degrees most of the time – as far as dengue fever is concerned, Singapore is the perfect storm.
Dengue is an environmental disease, and Singapore’s environment is the ideal breeding ground for it, said Dr Ng Lee Ching, Director of the National Environment Agency (NEA)’s Environmental Health Institute in Singapore. “Weather, population density, age of buildings, and extent of urbanisation as well” – these parameters are just a few that contribute to bouts of dengue infections that plague the tropical country, she explained.
The environment agency is turning to machine learning and data analytics to predict where clusters may form, up to a year in advance, and then prevent mosquitoes from breeding Ng shared at the recent SAS Analytics Insights Exchange supported by GovInsider. This case study is not only effective in Singapore, but could be used across the world to tackle malaria and other tropical diseases as well.
Data-driven dengue models
The NEA has been collecting data on dengue for years and displaying them on interactive maps on its website for citizens to avoid, but “this is reactive – that means it is already going on, there is already dengue transmission”.
Ng’s team took ten years’ worth of data on dengue clusters all over Singapore and analysed it together with other parameters – weather, built environment, demographics – to determine where high-risk spots are. They use these data to train their predictive models. “This actually helps us to pre-empt – go in and clean up, put more efforts into checks and inspections in these areas,” she said.
There are 50,000 mosquito traps dispersed across Singapore’s neighbourhoods, and currently, NEA officers need to manually check each of them every two weeks. With predictive models, “we can concentrate on a specific high risk area. That is really important for optimisation of resources,” Ng explained. “We don’t have the resources to go around every single home.”
Preparing for clusters
NEA successfully used predictive modelling to manage the 2013 dengue epidemic, which saw a record 842 dengue cases in a single week. “In January, we predicted an outbreak. So what do we do? Preparedness – diagnostic kits, hospital beds, make sure that fogging insecticides are ready,” said Ng.
And just this year, the agency unveiled ‘smart gravitraps’, mosquito traps that are equipped with sensors that identify mosquitoes that fly into them. At the moment, researchers have to identify species from trapping the insects and examining them under a microscope.
These smart devices could also be integrated with NEA’s existing data systems. “In the future, we hope that these traps will be in the field but, while sitting in the office, we can tell in real-time that we have caught which mosquito,” Ng remarked.
Lab tests in March revealed that these smart mosquito traps can accurately count the number of trapped mosquitoes and identify species and gender to a good level of accuracy, according to a local media report. The sensors transmit data to a database that contains ‘signatures’ that are unique to each species, the report said.
The environment agency also works closely with partners across industry and academia to collect, analyse and make sense of all the data across various contributing factors, NEA’s Ng continued. These can include meteorological data to gain a better understanding of the climate and humidity levels, and satellite imagery to identify if a certain area is urbanised.
In the future, genetic data could help detect dengue outbreaks and forecast its spread even more accurately. “Genomic data streams” from all over the island would provide real-time insights as an outbreak develops, according to Dr Swaine Chen, Senior Research Scientist at the Genome Institute of Singapore.
The threat of dengue can be at best, a pesky fact of life, and at worst, a matter of life and death. Being able to predict these trends ensures that government can act quickly, and ultimately save citizens’ lives. | <urn:uuid:23b76208-fa7e-43cb-94ee-46baa5acf0c1> | CC-MAIN-2019-22 | https://govinsider.asia/security/dr-ng-lee-ching-nea-singapore-dengue-machine-learning/?print=true | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256571.66/warc/CC-MAIN-20190521202736-20190521224736-00051.warc.gz | en | 0.943575 | 873 | 3.125 | 3 |
Historical overview: the evolutionary theory at the beginning
With the exception of a few creationists, biological evolution is now recognised as a well established occurrence. Such was not always the case. Some ideas about evolution may be found among ancient philosophers as well as in the works of Buffon (1749-1804, see Mayr 1982) but the first clear formalisation dates back to Lamarck (1809). Following Linné, the classification of plants and animals used morphological similarity in order to establish hierarchical taxa at various levels (e.g., genera, families, orders). The general interpretation was similarity by kind, that is, those animals looking alike, such as horses and donkeys, had been created to perform similar functions in nature. The basic idea of Lamarck was that similarity was more easily explained by a common ancestral origin. Of course, such an hypothesis, called transformism, needed a mechanism. At that time, nothing was known about heredity. It was however quite obvious that different environments and ways of life might result in large variations of phenotypes (what we call now phenotypic plasticity). Lamarck proposed that such changes, induced in parents, would be passed on to offspring, a mechanism called inheritance of acquired characters.
Some time later, Geoffroy St. Hilaire (see Piveteau 1950 and Le Guyader 1998), comparing different animal phyla, tried to establish a single plan of organisation. His comparison of the anatomy of a vertebrate and of an arthropod (a lobster) remains a well remembered example. His idea was to find homologous organs in distant phyla, an argument for a single plan of organisation, and of course for a possible evolution from a single ancestor. This ''théorie des analogues'' (homologous organs were called analogous) was fiercely fighted by Cuvier, a bright comparative anatomist, but a fixist and a creationist.
The idea of Evolution was extended three decades later by Darwin (1859). Again, nothing was precisely known about heredity, and Darwin believed in the heredity of acquired characters. His theory of gemmules, elaborated later, also turned out to be wrong. The merit of Darwin, however, was to suggest and argue for a mechanism of evolution, which is natural selection. Still now natural selection, with its multiple aspects, appears as the central mechanism of biological evolution. | <urn:uuid:91e67a7b-a2e4-42ee-aac3-9005ec7eac99> | CC-MAIN-2016-22 | http://www.biology-online.org/articles/evolution_development_insights_evolutionary/historical_overview_evolutionary_theory.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051165777.47/warc/CC-MAIN-20160524005245-00174-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.967667 | 496 | 4.03125 | 4 |
Researchers at Johns Hopkins have made an important discovery about people with chronic insomnia—the part of their brains that controls movement are more active and more adaptable to change than that of people who sleep normally.
The team focused on the motor cortex, located at the back of the frontal lobe, and found increased plasticity and excitability among neurons in this region in patients with insomnia. Their findings, detailed in the March issue of the journal Sleep, add evidence to the notion that insomniacs are in a constant state of heightened information processing that may interfere with sleep.
“Insomnia is not a nighttime disorder,” says study leader Rachel E. Salas, an assistant professor of neurology at the Johns Hopkins University School of Medicine. “It’s a 24-hour brain condition, like a light switch that is always on. Our research adds information about differences in the brain associated with it.”
Researchers say they hope their study leads to better diagnosis and treatment of the common sleep disorder, which effects an estimated 15 percent of the U.S. population.
To conduct the research, Salas and her colleagues worked with 28 adult participants—18 who suffered from insomnia for a year or more and 10 considered good sleepers with no reports of trouble sleeping. They delivered periodic electromagnetic currents to precise brain locations to disrupt function using a painless, FDA-approved procedure called transcranial magnetic stimulation, or TMS.
Each participant was outfitted with electrodes on their dominant thumb and an accelerometer to measure the speed and direction of the thumb. The researchers then gave each subject 65 electrical pulses, stimulating areas of the motor cortex and watching for involuntary thumb movements. Subsequently, they trained each participant for 30 minutes, teaching them to move their thumb in the opposite direction of the original involuntary movement, then introduced the electrical pulses once again.
The idea was to measure the extent to which participants’ brains could learn to move their thumbs involuntarily in the newly trained direction. The more the thumb was able to move in the new direction, the more likely their motor cortexes could be identified as more plastic. Because lack of sleep at night has been linked to decreased memory and concentration during the day, Salas and her colleagues suspected that the brains of good sleepers could be more easily retrained. The results, however, were the opposite. The researchers found much more plasticity in the brains of those with chronic insomnia.
Salas says the origins of increased plasticity in insomniacs are unclear, and it is not known whether the increase is the cause of insomnia. It is also unknown whether this increased plasticity is beneficial, the source of the problem, or part of a compensatory mechanism to address the consequences of sleep deprivation associated with chronic insomnia. | <urn:uuid:e1ec727b-47ea-42c1-918f-100fa4163416> | CC-MAIN-2016-07 | http://scienceblog.com/70749/insomniacs-brain-like-a-light-switch-that-is-always-on/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701146302.25/warc/CC-MAIN-20160205193906-00299-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.959331 | 564 | 3.3125 | 3 |
A well-constructed drawing can help to understand or stimulate a mathematical idea. The following puzzles explore some of the visual techniques that can be employed.
We begin by considering representations of the integers, and use the principle that if you count the same thing in two different ways you reach the same total.
We can represent the sum of the first n consecutive integers,
1 + 2 + 3 + … + n
as the quantity of dots in the following figure:
By considering an upside down copy of these dots, and by adjoining this copy to the original we are left with a rectangle of n by n+1 dots. The next figure demonstrates this for the case n = 5.
So, twice the sum of the first n integers is n(n+1), and therefore:
1 + 2 + 3 + … + n = n(n+1)/2
Problem 1: What is 1 + 3 + 5 + … + (2n – 1), the sum of the first n odd numbers?
Next, we consider the dissection and rearrangement of two-dimensional shapes.
A beautiful example is as follows. Given a right angled triangle with sides a, b and c (for the hypotenuse), we observe that we can arrange four copies of it within a square of side a+b in two different ways:
The shaded regions in both squares must be equal in area since all we have done is to rearrange the positions of the triangles within the larger square. The shaded region in the first square has area c2, and the shaded regions in the second square have areas a2 and b2. This gives us the famous Pythagorean theorem:a2 + b2 = c2An interesting problem is to cut a cross made up of five squares into four equal parts such that they can be reassembled into a square. The solution is as follows:
But how would one arrive at such a solution in the first place?
A common way to approach such problems is to first tile the plane with the shape to be dissected and then tile the plane again with the shape that is our objective.If we can overlay these two tilings in such a way that they match then the required dissection becomes clear. To see what this means we examine the above problem. The cross tiles the plane as follows:
By joining the centres of each cross together, we get an overlaid square tiling of the plane:
This gives the dissection into four equal parts, but observe that we can slide the two tilings about to get countless other dissections, although not necessarily into equal parts:
Problem 2: Cut the following shape, a pentomino, into three pieces (not all equal) that can be rearranged into a square.
Then, by considering the more general shape made up of two squares, prove the Pythagorean theorem!
Finally, we look at how infinite series can be represented visually.
By starting with a square of side 1, and repeatedly cutting off half of what remains we can arrive at the following infintite dissection:
The areas of each piece cut are the geometric series 1/2, 1/4, 1/8, 1/16, … whose nth term is (1/2)n. The dissection demonstrates that the total area of these pieces is 1. That is:1/2 + 1/4 + 1/8 + 1/16 + … = 1If instead we were to repeatedly divide into thirds, we might arrive at the following disection:
By shading in pieces corresponding to the geometric series 1/3, 1/9, 1/27, 1/81, … whose nth term is (1/3)n, we see that the shaded and non shaded regions are identical interlocking spirals:
The area of each region is therefore 1/2, and so:1/3 + 1/9 + 1/27 + 1/81 + … = 1/2
Problem 3: The following figure is constructed from a square in to which we fit a circle into which we fit a square into which we fit a circle … and so on. What portion of the original square is shaded? | <urn:uuid:17263d27-6607-4338-abb8-2cfec9f8cf1a> | CC-MAIN-2014-49 | http://bigi.org.uk/blog/2008/02/21/mathematics-visual-methods/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009515.14/warc/CC-MAIN-20141125155649-00173-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.933929 | 871 | 4.4375 | 4 |
How to Get Rid of Blue-Green Algae in Aquariums
Do you have a mysterious, blue-green slime taking over your aquarium? Or is there a strange smell coming from your fish tank and you can’t find the source? Blue-green algae might be a problem. This article will explain the causes of blue green algae and how you can eliminate it permanently.
What is Blue-Green Algaeee?
Blue-green alga (BGA) does not exist as an actual algae. It is actually a cyanobacteria, a group of bacteria that uses photosynthetics like plants. In freshwater aquariums, it’s known for its vivid blue-green color, but it can also appear in shades of brown, black, or even red. You may see it start off as a little spot of green algae that eventually grows into a thick slime stretched over your gravel, decorations, and plants. While cyanobacteria in aquariums does not usually harm fish, it can potentially kill your plants if their leaves are covered and can no longer photosynthesize light.
Another way to identify blue-green algae is by its distinct odor. People have described the smell as earthy, musty, swampy, and foul. Once you have learned to recognize the scent, it’s possible to detect cyanobacteria up to two weeks before it’s even visible in the fish tank.
Blue-green algae can be described as a type or photosynthetic bacteria.
What causes Cyanobacteria in Aquariums
Since cyanobacteria can have a devastating impact on the environment, many studies have been conducted to identify their causes. Although there is no clear answer, it is known that they are common in warm, slow-moving and nutrient-rich water. In the aquarium hobby, we have frequently seen blue-green algae pop up wherever organic waste has a chance to stagnate in certain areas of a fish tank. This can happen if:
– The current in the fish tank is too slow – Hardscape is blocking off a corner of the aquarium that also gets exposed to constant light – The substrate is collecting debris because the gravel hasn’t been vacuumed in a while and there are no animals to churn it
How do I get rid of blue-green algae naturally?
These possible causes are the basis for the first step: manually remove as much slime as you can using a siphon or toothbrush. Blue-green algae is not something animals like so your clean-up crew won’t be much help. Remove any excess nutrients by doing water changes more frequently, cleaning the filter regularly, and reducing the amount of fish or food going into the aquarium (if overfeeding is a problem). You can improve the water flow by adding a powerhead or a stronger filter.
Because Cyanobacteria relies on photosynthesis to generate energy, many people recommend that the aquarium lighting be turned off for at least three to seven days in order to starve the colony. However, this method can end up harming your plants (which also use photosynthesis) or causing spats among the fish. Plus, the blue-green algae often returns within a few weeks.
Cyanobacteria: Can Medicine Treat It?
People often have difficulty dealing with stubborn bacteria. Fortunately, it is weak against an antibiotic called Erythromycin. This medicine is safe for fish, plants, and invertebrates, and it will not harm the beneficial bacteria in your aquarium. Fritz Slime Out is our favorite, as it’s formulated to reduce cyanobacteria and not increase phosphate levels.
To begin treatment, scrub off as much of the blue-green algae as possible and remove it with a siphon. After vacuuming the substrate and refilling the tank, add one full dose of Slime Out (which is 1 packet per 25 gallons of water), and let the aquarium sit for 48 hours before doing a 25% water change. Add an air stone or other filtration that agitates the water surface to help ensure the fish have enough oxygen during the treatment. The earlier you treat the outbreak, the easier it is to eradicate. You may have to repeat the treatment multiple times if the blue green algae colony is large and thick.
If you address the underlying causes of cyanobacteria and treat it with Slime Out, you should have no problems getting rid of it in your fish tank. You can also find our complete guide to how to combat other types of algae in freshwater aquariums. | <urn:uuid:9d42e041-effb-4f5a-ad0c-a228ec42ae62> | CC-MAIN-2023-23 | https://www.monstersaquarium.com/how-to-get-rid-of-blue-green-algae-in-aquariums/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00128.warc.gz | en | 0.94331 | 926 | 3.171875 | 3 |
Issue No.03 - March (1990 vol.16)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/32.48936
<p>Much effort has been expended on developing special architectures dedicated to the efficient execution of production systems. While data-flow principles of execution offer the promise of high programmability for numerical computations, it is shown that the data-driven principles can also be applied to symbolic computations. In particular, a mapping of the RETE match algorithm along the line of production systems is considered. Bottlenecks of the RETE match algorithm in a multiprocessor environment are identified and possible solutions are suggested. The modifications to the actor set as well as the program graph design are shown for execution on the tagged data-flow computer. The results of a deterministic simulation of this multiprocessor architecture demonstrate that artificial intelligence production systems can be efficiently mapped on data-driven architectures.</p>
parallel production systems; data-flow principles; high programmability; numerical computations; data-driven principles; symbolic computations; RETE match algorithm; multiprocessor environment; actor set; program graph design; tagged data-flow computer; deterministic simulation; multiprocessor architecture; artificial intelligence production systems; data-driven architectures; expert systems; parallel architectures; parallel programming; symbol manipulation.
J.L. Gaudiot, A. Sohn, "Data-Driven Parallel Production Systems", IEEE Transactions on Software Engineering, vol.16, no. 3, pp. 281-293, March 1990, doi:10.1109/32.48936 | <urn:uuid:e2aa36e8-a8c7-4eb5-9c6e-8993072b5878> | CC-MAIN-2015-27 | http://www.computer.org/csdl/trans/ts/1990/03/e0281-abs.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096301.47/warc/CC-MAIN-20150627031816-00272-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.825948 | 345 | 2.546875 | 3 |
A computer that crops up again and again in classic old photographs of the early era of computing is the IMB 1401 Data Processing System, a stored-program transistor-logic computer from 1959. It happened to be first mass-produced digital business computer (10,000 existed in the mid-1960s) that could be afforded by many businesses worldwide. The machine came with 4096 characters of memory, with a maximum expansion of up to 16k, the monthly rental for a 1401 was $2,500! Jóhann Jóhannsson, an Icelandic musician, composer and producer has created an album of music commemorating the life (and death) of this computer system – ‘IBM 1401, A Users Manual’.
The chief maintenance engineer for this machine (when it arrived in Iceland) was Jóhann Gunnarsson, (Jóhann Jóhannsson’s father). A keen musician, Gunnarsson senior learned of an obscure method of making music on this computer, a purpose for which this business machine was not designed. The method was simple – the computer’s memory emitted strong electromagnetic waves and by programming the memory in a certain way and by placing a radio receiver next to it, melodies could captured by a receiver as a delicate, melancholy sine-wave tone.
When the 1401 was taken out of service in 1971, rather than being just thrown away, it was given a little farewell ceremony where its melodies were played for the last time and documented for posterity. The motifs of the ‘funeral music’ were used as sonic material for Jóhannsson’s album.
The track ‘Printer’ uses the voice of an instructor, reading through the maintenance manual, while elegiac strings build into a kind of requiem. It imparts an emotional connection to the 1401 and continues an ongoing fascination with the anthropomorphism of technology. The final track, ‘The suns gone dim and the sky’s turned black’ uses a computer reading of a Dorothy Parker poem, as if the IMB 1401 was conscious, and aware, of its own permanent departure: ‘The sun’s gone dim, and the moon’s gone black. For I loved him, and he didn’t love back’ | <urn:uuid:47e49902-bc21-4520-aeef-cbce55222bde> | CC-MAIN-2014-41 | http://www.dataisnature.com/?m=200611 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137698.52/warc/CC-MAIN-20140914011217-00169-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.96066 | 485 | 2.84375 | 3 |
Do It With Others (DIWO) is primarily a collaborative project development model similar to crowdsourcing, which binds individuals with similar interests. Generally, DIWO is implemented through websites or portals, where users highlight their interests and the projects they are working on.
The nature of the project can be anything from software application development, research, new innovation or even a social cause. People work with each other to support their project or cause, through with the internet helps to facilitate this form of crowdsourcing.
There is a particular section of the article that discusses about the imprisonment of creativity in the prism of brutal economic marketisation to meet the mainstream art world. It writes,
The more art meets the demand of business, governments & the super-rich, the more the promise of that freedom falters.
– Stallabrass, 2011
In other words, there has been a growing concern with regards to the art world becoming increasingly commercialised. This is where art is rarely considered based on its own merits but more of conforming to what is marketable to the consumers. This leaves us with an art culture where artists are merely consumer brands, resulting in a cultural homogeneity in where we are forced to see art much like product that is ready to be purchased in a shopping mall.
“But, what if these artists prefer by choice to be part of an art world less based on hegemony; and are more interested in being closely connected with their grass root art cultures, and are less interested in art celebrity culture?“
“What if this art is asking important questions that deserve a dialogue which goes deeper than marketable products?“
In fact in this digital age, for an art piece to actually be recognised and accepted by the consumers, certain criteria have to be met, be it technological or traditional skills. This actually closes down possibilities for a wider, creative dialogue that goes further than the aesthetics of an art piece.
However, with the introduction of DIWO, these artists are now given a platform to showcase their art pieces, with an imaginative exploration of engagement that not only opens up new forms of art, but also, new, shared, connected and potentially critically informed values. | <urn:uuid:bd62c144-f62e-4bcd-a1e6-a45ae31da5bb> | CC-MAIN-2022-05 | https://oss.adm.ntu.edu.sg/engj0007/experimental-interaction-research-critique-marc-garretts-diwo/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304600.9/warc/CC-MAIN-20220124185733-20220124215733-00599.warc.gz | en | 0.95266 | 457 | 2.515625 | 3 |
Full profile →'">
The author is a Forbes contributor. The opinions expressed are those of the writer.
Ever since the first dinosaur skeleton was discovered, the question rose: what happened to them all? After all, there aren't any around today. It's a mystery that paleontologists have been debating for well over a century. One of the leading candidates for the dinosaurs' demise is an asteroid impact - namely, the asteroid that struck the Earth in what is now the Yucatan peninsula millions of years ago.
However, in recent years, there has been some serious question over whether that asteroid impact really did wipe out the dinosaurs (except for the ones that evolved into birds) or whether there were other causes entirely. In particular, there was some indication that most dinosaurs may have gone extinct before the asteroid impact.
However, an international team of researchers, using the most precise dating methods currently available, have determined that while the asteroid impact wasn't the only thing that wiped out the dinosaurs, it was pretty much the deciding event - and it definitely happened simultaneously with the extinction.
"The impact was clearly the final straw that pushed Earth past the tipping point," said researcher Paul Renne in a press release. "We have shown that these events are synchronous to within a gnat’s eyebrow, and therefore the impact clearly played a major role in extinctions, but it probably wasn't just the impact."
This project took over three years, but solved a rather major dating puzzle for paleontologists. For one thing, it drastically cuts down the large error bars that existed around the date of the asteroid impact.
"When I got started in the field, the error bars on these events were plus or minus a million years," paleontologist William Clemens, who was not directly involved in the study, said in the release. "It’s an exciting time right now, a lot of which we can attribute to the work that Paul and his colleagues are doing in refining the precision of the time scale with which we work. This allows us to integrate what we see from the fossil record with data on climate change and changes in flora and fauna that we see around us today."
While an asteroid impact is obviously a devastating event, what's interesting about this impact and the extinction of the dinosaurs is that it might not have happened - except that for a million years prior to the impact, the Earth's climate had started to undergo some significant climate changes. That meant that the asteroid impact caused much more harm to the ecosystem than it otherwise might have during a more stable era.
"These precursory phenomena made the global ecosystem much more sensitive to even relatively small triggers, so that what otherwise might have been a fairly minor effect shifted the ecosystem into a new state," Renne added in the release. "The impact was the coup de grace."
The researchers' findings are reported in the current issue of Science. | <urn:uuid:8bd3f020-fc46-4563-a778-f5cd8c2db727> | CC-MAIN-2017-04 | http://www.forbes.com/sites/alexknapp/2013/02/10/asteroid-impact-was-the-coup-de-grace-for-dinosaurs/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00142-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.974686 | 596 | 3.46875 | 3 |
Plant for butterflies; plant for caterpillars -- Trees and shrubs to plant during cool weather
Published November 20, 2021 in the McAllen Monitor
Story and photos by Anita Westervelt, Texas Master Naturalist
As much as I love the heat and humidity of a Valley summer, this November’s reprieve from the heat is a welcome change -- if for nothing else, it makes digging holes for planting trees more enjoyable with a cool, gentle breeze against my skin.
Many local native habitat and landscaping experts adhere to the mantra, November to February is tree planting time in the Valley. The cooler months allow trees a dormant period when roots can grow without the stress of heat and drought. Trees will be more established and flourish with the spring rains.
For the butterfly lover, there are two kinds of trees: those that bloom and provide nectar for adult butterflies (and bees and other pollinators) and those that offer a lot of luscious leaves to feed the caterpillars that will eventually become butterflies.
Caterpillars are host-plant specific in that each butterfly species relies on a specific species of plants upon which their larvae feed.
One of the largest butterflies in the Valley is the showy Western giant swallowtail. It has several host plants in the Rutaceae family. If you have a backyard citrus tree, you’re probably already hosting giant swallowtails.
Citrus fruit trees are not native to the Rio Grande Valley, but several Rutaceae family trees that also host these swallowtails are, like colima (Zanthoxylum fagara), Texas torchwood (Amyris texana) and Sierra Madre torchwood (Amyris madrensis) which are native trees easily grown in the Valley. Texas torchwood is the smaller torchwood, growing to six feet; Sierra Madre to 10 feet tall. Colima can grow from 15 to 30 feet tall, depending how crowded it is with neighboring trees and vegetation.
Sickle-winged skipper butterfly larvae also feed on Rutaceae species, including Colima.
Another Valley favorite, the Mexican blue wing butterfly, relies on Vasey’s Adelia (Adelia vaseyi) for its caterpillar food. A tall, slender shrub with upright growth in the Spurge family, it can grow to 10 feet tall. Male and female flowers are on separate plants; fruit on female plant only.
The southern dogface butterfly uses Dalea scandens var. pauciflora [D. thyrsiflora] as a host plant. A free-standing shrub in the Legume family, it can reach to three feet tall, blooming in all seasons.
It’s not unusual for butterflies to fly throughout the year, especially in our more mild winters. If you’re willing to provide butterflies with their larval plants, you’ll also want plants that provide nectar during the colder months. Three plants that will offer nectar and benefit from winter planting are:
· Wild olive tree (Cordia boissieri) blooms in all seasons.
· Berlandier’s fiddlewood (Citharexylum berlandieri), a large shrub that flowers and fruits during most of the year.
· Scorpion’s tail (Heliotropium angiospermum), a small shrub-like plant that blooms into the winter.
A list of Rio Grande Valley butterfly larval and nectar plants can be downloaded from the following link: https://www.naba.org/chapters/nabast/plants_info.pdf
A list of Valley native plant growers and nurseries that offer native plants is at this link:
https://www.stbctmn.org/post/valley-native-plant-growers-nurseries Call for opening times, locations and plant availability.
A Texas A&M AgriLife Extension Service tree planting guide is at this link:
- 30 - | <urn:uuid:214972f3-9bae-4c0e-991e-69ad214d6ed9> | CC-MAIN-2021-49 | https://www.stbctmn.org/post/plant-for-butterflies-plant-for-caterpillars-trees-and-shrubs-to-plant-during-cool-weather | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363006.60/warc/CC-MAIN-20211204185021-20211204215021-00545.warc.gz | en | 0.927683 | 829 | 3.46875 | 3 |
In the near future, autonomous driving will lead to safer roads and great fuel-efficiency
Imagine the scene: You're driving your car to an office building in New York City, five minutes from a job interview. No worries. You have already dialed into the car's memory the parking garage where it's going to stay, and prepaid the bill. You shut the door. And off it goes. Driverless. And the chances of the car getting into an accident while it travels five or six treacherous city blocks are less than if the hopeful job applicant had tried to park it himself under time pressure.
Does it sound too good to be true? A sign of the end of civilization as we know it? Too far into the future to care? It depends on whom you ask. But some researchers, engineers, and auto companies believe that such automation is not only on the way to becoming commonplace in the next 20 years, but essential to reducing the carbon footprint of vehicles from the U.S. to China and everywhere else. Oh, and as the technology necessary to achieve the "autonomous" car arrives in stages every few years—some of it is already here, in options such as electronic stability control and blind-spot detection—it promises to sharply reduce traffic fatalities.
"Better Than Humans"
That's why Nady Boules is so enthusiastic about the prospects of putting technology into vehicles that will change the way we drive and even think about personal transportation. He is director of General Motors' (GM) electrical and integration laboratory, and thus is at the center of the automaker's research into what technology is possible and how well consumers might embrace it. "All of this will be made possible and practical by use of computers, sensors, and radio transmitters, and I think we are coming to realize that they can operate a vehicle or even a plane better than humans can behind the wheel," says Boules.
For now, GM can claim bragging rights among automakers for advancing autonomous driving. Last November, a Chevy Tahoe nicknamed "Boss," engineered by a team drawn from GM, Continental Teves, Caterpillar (CAT), and Carnegie-Mellon University, beat out 85 other teams and entries for the Defense Advanced Research Projects Agency, or DARPA, Urban Challenge. The Pentagon sponsored the competition to develop an autonomous fighting vehicle that will keep as many human war-fighters off the battlefield as possible. You have heard of "drone" fighter and intelligence-gathering planes? The DOD wants tanks and other vehicles that don't even need to be operated by remote control, let alone humans.
How do the vehicles work without even remote control? It takes a combination of technologies.
Electronic Stability Control, or ESC: This technology, which now comes or will soon come standard in most vehicles, improves a vehicle's handling by detecting and preventing skids. When ESC detects loss of steering control, the system automatically applies individual brakes to help "steer" the vehicle where the driver wants to go. Braking is automatically applied to individual wheels, such as the outer front wheel to counter oversteer, or the inner rear wheel to counter understeer. Some ESC systems also reduce engine power until control is regained.
Adaptive Cruise Control, or ACC: This is similar to standard cruise control in that it maintains the vehicle's preset speed. However, unlike conventional cruise control, ACC can automatically adjust speed in order to maintain a proper distance between vehicles in the same lane. This is achieved through a radar headway sensor, a digital signal processor, and a longitudinal controller. If the vehicle ahead of you slows down, or if another object is detected, the system sends a signal to the engine or braking system to decelerate. Then, when the road is clear, the system accelerates back to the set speed. GM's Cadillac models and Buick Lucerne now offer it as an option, as do Mercedes-Benz, Infiniti, and Lexus.
Blind-Spot Detection: This system—offered by Cadillac, Buick, Volvo, Mercedes, and other makes—watches the surroundings of the car with cameras, sensors, and radar, and lets the driver know by way of a light on the side-view mirror that a car is hovering in the blind spot.
Lane-Departure Warning: If the car drifts out of the lane, one system will vibrate the steering wheel, alerting the driver, who may be falling asleep. Another kind of system will also send a message to the steering wheel to steer back into the lane. This is expected to be available as early as 2011 as an option offered with other systems, such as adaptive cruise control.
Collision Mitigation: This system, like one developed by Honda Motor (HMC) and offered in Acura models, determines the likelihood of a collision based on driving conditions, distance to the vehicle ahead, and relative speeds. It uses visual and audio warnings to prompt the driver to take preventive action. It also initiates braking to reduce the vehicle's speed. When a collision is anticipated, the seatbelt retracts in anticipation of impact.
Each of these technologies can stand alone. But they're also designed to be added on to and integrated with one another over time, says GM's Boules. The "Boss" SUV was packed with thousands of dollars of advanced equipment and software that's not yet commercially available, such as an enhanced global positioning system, radar and sonar, and radio transmitters. On the test course it had to maneuver around vehicles driven by humans, as well as other driverless vehicles.
At a four-way stop with another autonomous vehicle, the Boss and its fellow "car-bot" communicated with one another, negotiating which would go first. "They are more polite than people," says Boules.
Price Dampens Consumer Enthusiasm
Polite or not, people have to buy into these technologies if they're going to catch on. According to the recently completed Emerging Technologies Study, conducted each year by J.D. Power and Associates, there's a lot of interest in the individual systems that will make autonomous driving possible: 76% of those surveyed are interested in blind-spot detection; 74% want backup assist; 62% want a collision mitigation system; 60% want adaptive cruise control, and 46% want lane-departure warning. However, those percentages drop a bit when price tags are suggested for each system.
The $1,300 GM "Driver Awareness Package," offered on the Cadillac CTS and DTS and Buick Lucerne, includes lane-departure warning, blind-spot detection, and heads-up instrument-panel display. So far this year, 5% of CTS sedan buyers have opted for the package.
J.D. Power's Mike Marshall, who oversees the Power study, says drivers will need time to get used to turning more and more control of the car over to computers and sensors. "Even I held my foot over the brake for a while before I trusted adaptive cruise control to do it for me, and I know more than most about how this stuff works," says Marshall.
The bigger payoff in having drivers spend a few thousand dollars to embrace autonomous vehicles is the huge improvements they promise in safety and fuel economy. About 43,000 people a year are killed in traffic accidents, including motorcycle accidents and pedestrians hit by moving cars. If every car had electronic stability control, for instance, fatalities would drop by about 10,000, according to estimates by the Insurance Institute for Highway Safety. If all drivers wore safety belts (about 81% do today), another 7,000 lives would be saved.
"The number goes down with each system to the point where [fatalities] would be so few that when it happened, it would really be an oddity," says Boules.
A Much Lighter Vehicle
How could car-bots that drive themselves be more energy efficient? Vehicles would be so safe that automakers could dramatically reduce the weight of cars and trucks by eliminating a lot of steel, bumpers, etc. Even airbags eventually could be eliminated. Much more of the vehicle could be made from plastics and other synthetics, even recycled paper and other cellulose-based material. With weight reduction comes fuel economy. A minivan that gets about 19 miles per gallon today could be made to weigh less than a Honda Fit, which gets more than 34 mpg. And the Fit could be lightened up enough to get 45 mpg or better.
Here is the kicker: Older people will have the greatest incentive to embrace the newest technology, a reversal of the usual trend with emerging technology. As baby boomers age into their 70s and 80s, living longer thanks to drugs, artificial joints, heart valves, and the like, they will want to continue driving as long as possible. The biggest beef against elderly drivers today is that their reflexes and eyesight deteriorate before their desire to drive their own cars.
With an autonomous car that can be driven safely on autopilot, it's the car's eyesight and reflexes that will matter more than the driver's. | <urn:uuid:b594f133-f357-4050-8aef-2501b5841d69> | CC-MAIN-2013-48 | http://www.businessweek.com/stories/2008-07-07/the-coming-of-the-car-botbusinessweek-business-news-stock-market-and-financial-advice | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387346051826/warc/CC-MAIN-20131218055411-00061-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.95685 | 1,871 | 2.890625 | 3 |
- Programming Guide
- Open Source Community
- Hardware Engineer
- Open Source Model
- Embed Design
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
If you can fix a hardware bug in firmware, it’s not a bug but a documentation issue.
—An anonymous hardware manager
What Is Embedded Firmware?
Since you are reading this book, you must have some understanding of what the words embedded and firmware mean in the context of computer technology. There are quite a few interesting discussions on the Web about the difference between firmware engineers and embedded engineers. Some say that an embedded engineer is a software engineer turning into a hardware engineer, and a firmware engineer is a hardware engineer turning into a software engineer. There is some truth to this because most firmware engineers learned how to design circuits in school, but there are definitely a lot of smart firmware engineers out there with a computer science or nonhardware degree. Regardless, writing firmware is a unique skill that deals with both hardware and software at the same time. You need to know something about signal strength, timing, voltage, and at the same time, data structure, algorithm, and modularity.
For the purposes covered in this book, let’s define firmware as the layer of software between the hardware and the operating system (OS), with the main purpose to initialize and abstract enough hardware so that the operating systems and their drivers can further configure the hardware to its full functionality. To make embedded systems run faster and be more robust, the relationship between the firmware and the OS is transitioning from isolating themselves from each other to cooperating with each other. In the past, you might have seen the same hardware initialized by the firmware first, and then initialized again by a driver in the OSas shown in Figure 1-1; but in modern systems, you see more effort in trying to eliminate redundancy between the firmware and the OS.
Hardware design is also moving toward being more “software friendly” so that hardware takes less effort to program. Self-initializing chips and a built-in boot ROM are just two examples currently available in System-on-Chip (SoC). Due to the evolution toward software friendliness, the heavy-duty hardware initialization responsibility has been gradually shifted from the firmware to the drivers of the operating systems, and the operating systems are relying less and less on firmware to carry out the hardware initialization work. Some real-time operating systems (RTOS) and specialized operating systems, such as Android and Chrome OS, are carrying out a lot of hardware initialization functions with help from the hardware vendors. This is especially true when system designers compartmentalize their design to a set of standardized hardware components and constrain the hardware selection pool; in some cases, hardware configuration can be achieved with a GUI (graphical user interface) -based configuration tool instead of relying on rewriting programs in firmware or software.
The line between firmware and specialized operating systems is definitely blurring, if not disappearing completely. The very minimum things that firmware has to do in a well-coordinated environment are presenting a data structure of features that can be further processed by OS drivers, such as an ACPI (Advanced Configuration and Power Interface) table, and carrying out the tasks that can only be done more effectively by firmware, such as memory controller initialization. When a seamless cooperation between the firmware and the OS cannot be guaranteed, firmware still plays a significant role in the system to make sure all system features are utilized properly. Therefore, no matter what the design trend is, firmware remains a critical component in a system.
Let’s face it: firmware does have a troublesome reputation in the x86 world. In the dawn of laptop computers, System Management Mode (SMM) was created to do many things behind the back of the OS. System Management Interrupt (SMI) was not only nonmaskable, but was also not controllable by the OS. Firmware would take its own initiative to blank the display to save power, put the system to sleep when no user activity was detected, slow down the clock when running on the battery, take care of battery warnings when they happened, and react to Fn hot keys when they are pressed. These functions were not coordinated with the OS, and they just happened, seemingly at random. Obviously, none of these are bad features, but the amount of time it took to go through the process, and the adverse effects (missing timer ticks, long latency in interrupt delivery, etc.) on the OS were too much for the OS to ignore. Therefore, ACPI was created to allow the OS and firmware to coordinate and cooperate on these features. The utilization of SMM has been gradually reduced over the years. In addition to some SMM firmware dealing with actions requested by ACPI and security features, chip vendors are the only entities still using SMM to work around chip issues when necessary.
Where Is Firmware?
Firmware is generally considered part of the hardware (rather than part of the software) because it resides inside a hardware component, which is typically a Flash storage device or ROM. However, when it comes to the programming language, the tools, and the methodology a firmware engineer follows, firmware is clearly a type of software, even though it is tightly coupled with hardware in most cases.
What Do Firmware Engineers Do?
Regardless of whether firmware engineers are hardware engineers turning into software engineers, or the other way around, firmware engineers have a lot of interesting work to do. One of the most important and challenging jobs that a firmware engineer does is to make a new circuit board work when it is first manufactured, especially when most components on the new board are also new. It is not a unique case to have many new components on a brand-new circuit board because most hardware evolves in similar cycles. In chip manufacturing companies, some firmware engineers’ only job is to bring up and test a new chip on a new board. The combination of a new chip, new components, and a new board not only makes debugging work much more complicated, but also makes the preparation work much more challenging.
When a firmware engineer prepares for the bring-up of a new board, he or she does not just wait for the hardware to show up, and then write the code; he or she needs to read a lot of early specifications, such as datasheets, a couple of months before the new board shows up. Since these specifications are mostly evolving, the information may not be 100 percent correct. Firmware engineers need to help correct the information in datasheets and write programming guides as they go through the debug process. In a typical hardware-oriented company, firmware needs to be ready when the first circuit board shows up. It is not acceptable for hardware to wait for firmware because hardware is usually more difficult and more expensive to alter than firmware. Manufacturers want hardware bugs to be discovered and fixed as early as possible. In the beginning, firmware only needs to have enough functions to test the circuit board to determine if the new components can be manufactured, but it is a lot of hard work to do it right the first time.
Firmware Preparation for New Hardware
During the preparation, firmware engineers need to figure out what to program, how to program, and the sequence in programming the new components after they study the materials available to them. The obvious challenge after writing the program for the new components is to figure out how to test the new code before the new hardware shows up at the door of their lab. Many manufacturers have simulators designed to test early firmware and software, such as Intel’s Simics and AMD’s SimNow, but the usefulness of a simulator depends on the behavioral models written to simulate the hardware. The accuracy and fidelity of the models in the simulation tool decide whether or not you can find bugs and programming errors in your early firmware.
Besides simulators, FPGA-based emulators are also frequently used to test early firmware and the circuitry inside a new chip. Compared to simulators, FPGA-based emulators are much more accurate in representing the final hardware, but since they are running in a much slower clock speed, timing-related issues may not be discovered easily, and firmware is sometimes modified to accommodate the slower clock speed; therefore, some parts of firmware are not well tested. In most cases, based on our experience, these simulators and emulators actually deliver pretty solid results, and the simulated and emulated firmware usually works when it is put on the real hardware for the first time they integrate. Even with the help of simulators, it typically takes a couple of days, weeks, or even months of effort to iron out all the hardware issues.
The Mystery of Bits
In the process of preparing a bring-up firmware, a firmware engineer spends a lot of time figuring out what needs to be programmed into the microprocessor and chipset by studying datasheets and specifications. In this case, literally, every bit matters. Even though many bits will work in their default states, a single mistake in misinterpreting the definition of a bit in a chip can turn the circuit board into a brick, and there are many bits to be programmed from their default states in order to work properly.
A datasheet is like the Bible for firmware engineers (see Figure 1-2); it has almost everything a firmware developer needs to know about the chip. Using a published datasheet from Intel as an example, the datasheet for Intel® Communications Chipset 89xx Series, published in October 2012, contains 1,682 pages of useful register data. The list of tables that are used to describe the registers span across 30 pages, with about 60 entries on each page.
Learning and understanding what each bit does and does not do is as tedious as sorting sand on a beach, especially when some of the data documented in the datasheet does not provide as much detailed information as needed to understand how to use it. Sometimes, it takes a lot of trial and error in the process. There are also many undocumented bits that are there either for internal testing or for tuning purposes; these bits are usually not documented inside a datasheet. Therefore, missing critical information could be another challenge for firmware developers.
From time to time, a mysterious problem can stall the debug and development effort for a long time, and the final solution is sometimes a mysterious bit that was somehow discovered after scrubbing the design data. With a stabilizing feature set and better tools, these kinds of problems are not happening as frequently in modern chips.
It is the purpose of early-stage firmware to find the problems of a newly designed chip. Even though there are chip bugs that cannot be resolved without fixing the chip itself, more often than not, a chip problem can be resolved with fixes in firmware; chip vendors frequently call these kinds of fixes “work-arounds.” If there is a work-around for a chip bug, it usually involves a bit or a set of bits that need to be programmed or changed. Or, there will be an algorithm developed to work around a problem only when certain conditions are met. To apply a work-around with as little impact as possible to the existing software, designers frequently suggest the fixes to be implemented in the SMM. Since SMM code takes away operating cycles and time, these kinds of fixes are sometimes intrusive and problematic. It is ultimately up to the designers to reveal the fixes after studying the original design of the chip. Most of the time, the fixes are not obvious; the designers need to analyze and figure out if there exists a setting of bits that could fix the problem, or check if they should turn off certain new features that are not working properly. Even though a firmware engineer may accidentally find a fix to resolve an issue through a trial-and-error process, this is very rare these days—especially when the work-around involves an undocumented bit or bits. Designers ultimately hold the key to resolving a chip issue.
How do undocumented bits exist? As stated earlier, when designers design a chip, they put many configurable bits in a chip to help tune the chip or control features that are supposed to be hidden from the programmers. They keep some of these bits undocumented and locked so that no one can accidentally program them to cause unintentional damage or adverse effects. There is a nickname for these bits, called “chicken bits.” The origin of this phrase is unknown, but it may have something to do with the fact that these bits are scattered everywhere in the chip like the food for chickens; or it may imply that the designers were too “chicken” to show these bits to others, therefore hiding them.
There could be as many as 60,000 chicken bits in a chip, depending upon the complexity, the functionality, and the size of the chip. This also explains why a chip vendor cannot possibly document every programmable bit of a chip in a datasheet or a programming guide, even if they wanted to try. As a matter of fact, most of these chicken bits will never be documented, and a small portion of the chicken bits will be documented only when they are needed to work around a chip problem. Many of you may have heard of or even read an errata sheet from chip vendors; this errata sheet frequently contains information for bits that were not documented before.
When designers design a new chip, they will compile of a list of registers to support various chip features. During the chip design phase, hardware engineers and firmware engineers work with designers to design, simulate, and validate the chip. By doing this together, the function of bits and bytes in registers are defined, refined, and documented so that a comprehensive programming guide can be available at the same time that the first chip shows up at a customer’s door, typically a manufacturer of a product using the chip. In Intel, this programming resource is named the BIOS Writer’s Guide (BWG) because it is designed to help BIOS developers write a BIOS for a PC to begin with. For a modern chip like Quark, the name of the document has been changed to the UEFI Firmware Writer’s Guide to distant itself from the term BIOS. Regardless, this programming guide has all the information a firmware engineer needs to know beyond programming a PC and for every embedded system as well.
In 1996, the BWG for the Pentium Pro was 73 pages long; but today, the BWG for the BayTrail SoC is 440 pages divided in two volumes; it grew more than six times in 18 years. Not only the amount of information, but the complexity has increased as well. For example, the Pentium Pro BWG describes very basic programming information that most people can probably figure out themselves after reading a few standard specifications from Intel, like SMM, BIOS INT functions, and how to handle multiprocessor initialization and so forth. In comparison, besides basic SMM multiprocessor topics, BayTrail BWG uses 34 pages just to talk about MSR (model-specific register); other information includes CPUID handling, the Microcode Update, SpeedStep, C-State Control, thermal management, and more. This list is just the information contained in volume one. In volume two, almost all the subjects require a domain expertise to understand, such as HD audio, graphics, the HPET timer, xHCI, EHCI, DDR3, ISP, P-Unit, SIO, PCIe, PCU, TCO, and so forth. (If you don’t recognize any of these acronyms, you get the point: modern-day BWGs have become very specialized repositories of information.)
The programming guide not only specifies the features that can be customized by the customer via programming the bits and bytes, it also methodically covers the many bits and bytes that must be programmed with particular values in a fixed order to support certain features.
Even if you have not been involved in debugging a new circuit board, you can imagine that finding a bit-setting error in an ocean of bits is pretty painful. Does a chip vendor need to put firmware engineers through a painful experience every time it produces a new chip? If the programming guide is done right, firmware engineers should not have to read through 440 pages of BWG to study what needs to be programmed just to get the chip up to the point of providing its features. Firmware engineers have better things to do than look at the programming guide to figure out which bits to flip and which bytes to write; they should spend their valuable time developing value-added features to help deliver a product with differentiating features.
The Intel® Firmware Support Package
Intel has taken the initiative to provide a way to encapsulate tedious chip initialization code into a package: the Intel® Firmware Support Package (Intel® FSP, for short; we will use Intel FSP and FSP interchangeably in this book). Obviously, there is more than one way to ease the programming pain associated with chip initialization. For example, releasing the full source code to allow people to view how it is done, or putting all the chip initialization code in one binary to hide the complexity, or anything in between. Intel has decided to go with the option to put all the chip initialization code in one place with the hope that, once it is used in the firmware stack of your choice, the developers will be able to quickly get over the chip initialization hump and move on to value-added features development work.
Why would Intel produce Intel FSP for the embedded designs and the Internet of Things (discussed shortly) in the first place? After all, Intel is already providing a comprehensive reference code for each reference platform, and there is also an open source EDK II codebase under Tianocore.org that allows people to study the UEFI implementation. The problem is not about having reference code out there or not; it is portability, scalability, and flexibility that developers are looking for, especially in the embedded and IoT space where UEFI and PC architecture are not playing a major role as things stand today.
Intel recognizes that many developers have a hard time extracting chip initialization code out of an EDK II codebase or from a BIOS to port to a different firmware stack or to a different platform design. Going to IBV (Independent BIOS Vendors) to ask for help is not always an option for some customers. Intel believes that there are a lot of smart firmware engineers out there, and once these engineers get hold of a technical specification, an industry standard, or reference code, they can produce a firmware implementation without too much difficulty. The only thing that is missing for them is the chip programming information.
That said, it does not matter how smart the firmware engineer is: he or she cannot and will not be able to figure out how to program a new chip without help from chip vendors. Over the years, some smart developers have tried to reverse-engineer what has been done in an existing platform, but the process is long, hard, and error-prone.
In this book, we talk about Intel’s FSP solution; other chip vendors have also provided similar packages or mechanisms to reduce the programming burden for initializing basic chip functions, such as AMD’s AGESA (AMD Generic and Encapsulated Software Architecture), and ARM’s boot ROM concept. This book will not discuss these implementations, but they are efforts that chip vendors put out to ease the programming challenges.
Since its launch in October of 2012, Intel FSP has been widely used in many customers’ embedded designs, including customers who chose to convert from a competing architecture to Intel Architecture. As you will discover in later chapters of this book, Intel FSP can be easily integrated into an existing firmware stack to save you time and energy in figuring out the information needed to program an Intel chip.
Keep in mind that Intel FSP is not a stand-alone firmware stack. It does not have all the ingredients to boot to an OS on its own; therefore, it must be integrated with a firmware stack, such as BIOS, coreboot, RTOS, or other proprietary bootloader solutions.
The Uniqueness of Embedded Firmware
It is one thing to develop firmware for a general-purpose and open system such as a PC; it is quite another thing to develop a firmware stack for a closed system with dedicated functions. Over the last three decades, firmware engineers have almost perfected BIOS (including UEFI) for the PC. The PC BIOS has the ability to deal with devices that come and go anytime (plug-and-play) and to boot to any general-purpose OS (Linux, Windows), and it is smart enough to learn about its environment (ambient light, battery status, and user inactivity) to adjust itself to save energy. Arguably, it could be the most intelligent firmware stack ever created. Over the last three decades, we have definitely seen the evolution of BIOS, and we have witnessed a great improvement of quality in the BIOS realm.
Can the experience learned from the PC BIOS be applied to an embedded firmware design? The answer is “yes” because there are many useful industry standards created and implemented in the code.
Can we use a PC BIOS stack on an embedded firmware design? The answer is “yes, but…” because it depends on the purpose of the design. Many embedded designs leverage PC architecture for cost and ecosystem support reasons. Since the designs inherit all the characteristics of a PC, the PC BIOS and similar technologies could still be the best choice for an open and general-purpose system if boot speed and the size of the firmware stack are not issues of concern. There are also a lot of embedded designs that are not based on PC architecture. In these cases, the PC BIOS and similar technologies can be used, but will need a lot of effort to fit into the design; there are better firmware solutions out there to choose from. In some cases, a PC BIOS just won’t work because the special need for boot speed, a small footprint, real-time performance, and so forth, are required.
Many mission-critical and time-sensitive designs require the system (hardware, firmware, and software) to be deterministic and predictable among other special constraints; many intelligent and dynamic configuration capabilities of a PC BIOS can be prohibitors for those deterministic and predictable considerations. Some closed devices designed without any upgradability do not need the flexibility of plug-and-play, heuristic training algorithm, and bus enumeration techniques that are typical in a PC BIOS; therefore, embedded firmware can sometimes be dramatically simplified. Finally, there are more embedded designs asking for faster boot time and quicker response time, which a typical PC BIOS cannot achieve. The rear-view camera in a vehicle, for example, needs to be turned on within 2 seconds after the car engine is ignited; this is for safety concerns and also a regulation requirement in many countries. Even though it is not impossible for a PC BIOS to achieve faster boot time, the hardware and firmware stack used in an IVI (in-vehicle infotainment) system is heavily customized to achieve this stringent boot-time requirement. All of these unique requirements make a PC BIOS harder to fit into embedded applications.
The Choice of Firmware Stacks
There are quite a few firmware options in the market, such as PC BIOS (including various UEFI implementations), RTOS, open source stacks, and proprietary solutions. Each of these firmware stacks has a specific purpose to fulfill, and we will discuss their special usage models later in the book. We’ll also discuss how to work with different firmware stacks using a common chip initialization module (in the next chapter, we’ll take a look at a few of the options), and we will also talk about their pros and cons and how to make a choice based on your needs.
Welcome to the Era of the Internet of Things
Due to the fast evolution of microprocessors, embedded systems are not only becoming more intelligent, but also becoming more ubiquitous. Some of the devices we use today will start to make decisions for us and even protect us from danger someday. There are refrigerators that can order food for us when they are empty. There are thermostats that can call the police when they detect an intruder in our house. There are cars that can steer themselves out of danger when they are about to collide with another car. There are a lot of more new ideas and new devices in the works to make you safer and make your life more convenient. The next wave of the technology revolution has arrived, and it comes in the form of built-in connectivity and intelligence. People are calling these intelligent and connected devices the “Internet of Things” or IoT. It takes a lot of creative minds to conceive, develop, and refine such an IoT, and no doubt much of the work needs to be done at the firmware and software level. The demand for the skill sets covered in this book will increase in the foreseeable future.
Technical Coverage in This Book
This book covers topics related to embedded firmware stacks and an important ingredient that enables them—Intel FSP. Since this book uses Intel Architecture as the centerpiece, we focus on how Intel FSP works and demonstrate how it can be integrated into popular firmware stacks; coreboot and EDK II examples are used in this book. We cover detailed information about each of these two firmware stacks, including the internals and how to work with them. The reader can pick and choose a particular subject and do a deep dive, or the reader can choose to learn both of the firmware stacks in a holistic way. If you are among the readers who are not using either the coreboot or the EDK II codebase, the same principles and practices also apply to your own firmware stack once you have a basic understanding.
This book does not cover the details of implementing specific features, such as power management, device enumeration, graphics, audio/video, and other non-chip related features. However, this book will touch upon the new Intel Quark family products and talk about their firmware stack and detailed firmware architecture. Even though the firmware strategies of some Intel products are not yet using FSP as the building block, you can compare and understand the differences and the rationale behind the decisions.
There are not many books out there talking about firmware because it is not a standard discipline that can be talked about generically. Every subject in the realm of firmware can be a book on its own, and there have been books about UEFI, BIOS, Fast Boot, and so forth, and many system requirements and constraints can dictate how a firmware is chosen and written; therefore, it is a topic that cannot be easily addressed holistically without an objective. Our objective is to show you how you can take advantage of Intel Architecture, and prepare a firmware stack for it regardless which firmware stack you choose. There might be areas that are not covered in great detail in this book, such as integrating Intel FSP into a RTOS codebase, but hopefully the same practices still apply.
The Future of Firmware
We have been witnessing an interesting phenomenon since the beginning of this century: open source projects are gaining momentum, led by companies such as Google and Facebook. Many legacy and proprietary software solutions are either disappearing or losing steam very quickly; open source solutions are becoming a primary interest of technologists at an amazing speed.
Even though this century is still young, we are riding on a fascinating wave that will make the 21st century a distinctly different century than any other. The phrase “open source” clearly connotes sharing and collaboration, in contrast to the waning business philosophy of protecting intellectual properties so that “we can win as an individual company.” What has emerged is a new concept to tie business success to a collaborative ecosystem effort. Under this new model, everyone has a chance to thrive in the ecosystem because innovation is multiplied with the participation of many intelligent scientists, hobbyists, and engineers.
Will embedded firmware solutions be moving toward the same model that operating systems and computing systems are currently going through? Yes, we can tell that the open source model is impacting the firmware world in equal force in the last few years. Even some of the traditionally closed solutions are adapting themselves to the open source model as we write this book. For example, even though Tianocore was created as an open source project by Intel years ago, the community did not thrive due to lack of crucial components in the source tree. Until recently, many ARM developers have tapped into the Tianocore source code to make it workable with ARM designs. Intel has also ramped up its effort to provide an FSP component so that it can be successfully built for a platform in distribution.
However, due to its many unique characteristics, firmware is a source of intense debate because it is so tightly coupled with the hardware underneath, and hardware still has IP that companies want to protect. The questions for chip vendors will always be how much firmware can be benefited by the collaborative model, and how much firmware is so chip-specific that there is nothing that needs to be collaborated on? For example, if some of the chip code is fragile enough that only the designers can program it right, does it make a difference if the code is open or not? If it is open, does it do more harm than good? How about the code inside a boot ROM that is masked? Should that code be open as well? What about the firmware that is currently outside an SoC? Where is the boundary? What makes sense to be open and what does not? These questions may be rhetorical, but the binary distribution format will gradually move away from being a mechanism to hide features, and instead be a way to simplify its integration.
Putting these rhetorical questions aside for the moment, the open source model is a trend that all chip vendors, BIOS vendors, and software vendors will continue to adapt to. In the spirit of open source communities, the best of the best will emerge after all the debates, arguments, and brainstorming. This book was written with the aim to enable the open source community to thrive on its own and alongside proprietary solutions. It will undoubtedly fall short of some readers’ expectations, and it may disappoint a few hard-core open source enthusiasts. However, it is still a step toward the right direction to make chip initialization a non-issue (or less of an issue) for open source communities.
We are all aware that the state of the art in chip engineering will continue to rapidly evolve. New methodologies will emerge to make firmware development easier and faster for the developers trying to bring innovative IoT devices to the world, and perhaps subsequent editions of this book will cover those developments. In the meantime, we welcome you to this discussion. Please read on.
Rights and permissions
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits any noncommercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this chapter or parts of it.
The images or other third party material in this chapter are included in the chapter’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the chapter’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
© 2015 Jiming Sun
About this chapter
Cite this chapter
Sun, J., Jones, M., Reinauer, S., Zimmer, V. (2015). Introduction. In: Embedded Firmware Solutions. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-0070-4_1
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-0071-1
Online ISBN: 978-1-4842-0070-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books | <urn:uuid:17496f71-0815-4b01-8e23-e1bb30b16b91> | CC-MAIN-2023-23 | https://link.springer.com/chapter/10.1007/978-1-4842-0070-4_1 | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00148.warc.gz | en | 0.946893 | 6,699 | 3.34375 | 3 |
Negotiators meeting in Geneva, Switzerland, this week reached agreement today on a Mercury Convention that protects human health and the environment from mercury, a toxic heavy metal. The treaty names the GEF as the lead organization charged with raising and disbursing grants for projects and programs to reduce and eliminate mercury pollution.
“The Global Environment Facility is ready, willing, and able to help carry forward the international agreement to meet this dangerous environmental threat,” said Dr. Naoko Ishii, CEO and Chairperson of the GEF. “We are proud to have worked with UNEP and international negotiators throughout the historic process of developing this mercury convention. We look forward to continuing our partnership.”
The Mercury Convention was agreed to at the fifth meeting of the Intergovernmental Negotiating Committee. The Committee, chaired by Fernando Lugris of Uruguay, will present the Convention text to the UNEP Governing Council for adoption next month.
“There was strong support among negotiators for the GEF to finance the new Convention,” Chairman Lugris said. “We look forward to cooperating with the GEF.”
The toxic effects of mercury on the nervous systems of humans were first identified in the 1950s in the fishing village of Minamata, Japan. Mercury compounds dumped into Minamata Bay by a petrochemical company worked their way into shellfish and from there into seafood consumed by humans and animals. The resulting illnesses, called Minamata disease, sickened adults and led to severe deformities in newborns. Some 3,000 people contracted Minamata disease and more than 1,700 died, according to the Japanese Government.
GEF grants will support a wide range of activities under the Convention. These activities include inventories, implementation plans and investments in technology for reduction and elimination of mercury. | <urn:uuid:c9572d8b-8514-4f11-bda7-9e29d69164c6> | CC-MAIN-2018-39 | https://ngonewsbd.com/gef-given-funding-role-in-new-mercury-convention/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158766.65/warc/CC-MAIN-20180923000827-20180923021227-00336.warc.gz | en | 0.960639 | 374 | 2.703125 | 3 |
Using cutting edge technology - one of the world’s smallest action cameras, a Sony Action Cam Mini - the flight recorded an extraordinary bird’s eye perspective of the landscape, capturing unique footage.
Darshan’s flight can be viewed here
The Imperial Eagle’s flight from the top of Burj Khalifa, which stands at a height of 829.8 metres, 2722 feet, represent a world first and sets a new world record as the highest recorded bird flight from a man-made structure.
The charity Freedom Conservation works in collaboration with a leading conservation initiative, SOS (Save our Species) and UNESCO to raise awareness of the plight of threatened wildlife, many of which are recorded on the IUCN Red List of Threatened Species.
Darshan the Eagle, who has set the new world record, is an example of a threatened species, which has been successfully rehabilitated through global conservation programmes. He acts as an ambassador for threatened animals all over the world. The Imperial Eagle, once on the Red List of endangered species, has been saved from extinction.
Birds of prey are rooted in the heritage of culture of the United Arab Emirates – the Golden Falcon is the nation symbol of the United Arab Emirates, and Dubai firmly supports international effort in protection of threatened species such as Freedom Conservation. Despite its rapid development as a major regional business centre, Dubai has long recognised its responsibility towards preserving its environment, mainly its unique desert habitat. Over the past three decades, many natural reserves, along with several laws, have been established to protect threatened animals. The United Arab Emirates, in general, has always been active in conservation of threatened animals, creating over 15 natural reserves around the country and planning a number of rehabilitation programmes.
Freedom Conservation’s Eagles have flown from iconic landmarks across Europe, including the Eiffel Tower in Paris (301 m) and St. Paul's Cathedral in London, recording unique footage that have attracted record audiences to its conservation efforts. Images recorded by Freedom’s Eagle were the most viewed online animal images of 2013/14.
Freedom’s Eagles are trained by world-renowned falconer Jacques-Olivier Travers, who has pioneered new techniques to increase the reintroduction rate of threatened eagles to the wild, that include paragliding, skiing and kayaking to teach vital survival skills. He has since been dubbed ‘The man who teaches Eagles to fly’.
Sony and FREEDOM
Sony is working with FREEDOM as an official sponsor, to help them achieve their goals of re-introducing the White-Tailed Eagle into its natural habitat in the French and Swiss Alps. Sony is providing its Action CamTM camcorders to FREEDOM to allow them to accurately document the flights of white-tailed eagles. FREEDOM is looking to use this footage to learn from the behaviours of the eagles to better understand the work that needs to be done to best prepare the terrain for their re-introduction.
The technical capabilities of the Action Cam by Sony in being able to deliver smooth Full-HD video content, benefitting from Sony SteadyShotTM technology, coupled with the ability to overlay GPS data on the captured footage means that it is the ideal tool for FREEDOM to gain the insights that they need to conduct their work. Furthermore, the small size of the Action Cam camcorders means that they can be easily attached to eagles and not restrict their natural flight in any way.
Sony Corporation is a leading manufacturer of audio, video, game, communications, key device and information technology products for the consumer and professional markets. With its music, pictures, computer entertainment and online businesses, Sony is uniquely positioned to be the leading electronics and entertainment company in the world. Sony recorded consolidated annual sales of approximately $75 billion for the fiscal year ended March 31, 2014. Sony Global Web Site: http://www.sony.net/ | <urn:uuid:d0a83b6e-da85-481e-859d-5c7fbf04b2d4> | CC-MAIN-2019-26 | https://presscentre.sony.eu/pressreleases/eagle-sets-new-world-record-for-flight-from-world-s-tallest-building-1130405 | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998580.10/warc/CC-MAIN-20190617203228-20190617225228-00255.warc.gz | en | 0.948371 | 808 | 2.96875 | 3 |
BAN422 Visualization in R
-Visualization is one of the key strengths of R. However, visualization involves many choices, and R offers such a wide range of choices that guidance is desirable. There are two major underlying techologies, base graphics and grid graphics, and several toolboxes built on these (trellis graphics and grammar of graphics on grid graphics). In addition, much work has been done on the effective use of shapes and colours.
Knowledge: on successful completion, the student will be able to
- understand the principles underlying base and grid graphics
- understand how toolkits build on grid graphics are structured
- understand the choices involved in the effective use of colours and glyphs
- understand the motivations underlying the choices made in visualization in R programming
- use this understanding in customising graphical outputs
Skills: on successful completion, the student will be able to
- assign correct descriptions to visualization techniques used in scripts and functions encountered in simple workflows
- define new visualization templates for workflow output
General competence: on successful completion, the student will be able to
- handle the graphical output of R functions with greater confidence
- customise the graphical output of R functions to meet specific needs
This course combines lectures and programming tutorials. Lectures focus on methodological issues. In programming tutorials, the student will implement the learned methodologies using R.
Programming skills with R are helpful. However, if necessary, an additional introduction to programming with R will be offered.
Credit reduction due to overlap
Course identical to BUS464.
Requirements for course approval
A group project, with a presentation during the course (conditional on participant numbers).
Course approval from BUS464 is valid for BAN422.
Group term paper, based on the group project (conditional on participant numbers).
This course is a continuation of BUS464 and the total number of attempts applies to the course (not the course code).
R (https://cran.r-project.org/) and RStudio (https://www.rstudio.com/) and contributed packages packages as needed.
Unwin, A. (2015) Graphical Data Analysis with R. Boca Raton, FL: CRC Press.
Murrell, P. (2011) R Graphics. Boca Raton, FL: CRC Press.
Sarkar, D. (2008) Lattice: Multivariate Data Visualization with R. New York: Springer.
Wickham, H. (2016) ggplot2: Elegant Graphics for Data Analysis. New York: Springer.
- ECTS Credits
- Teaching language
Spring. Offered first week of spring semester 2019.
Professor Roger Bivand, Department of Economics | <urn:uuid:1c34c2cb-b180-4c7d-b58b-27f9bfba759f> | CC-MAIN-2019-09 | https://www.nhh.no/en/courses/visualization-in-r/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247490806.45/warc/CC-MAIN-20190219162843-20190219184843-00038.warc.gz | en | 0.876072 | 566 | 2.921875 | 3 |
Title: Visitor perceptions of crowding and discrimination at two National Forests in southern California
Author: Chavez, Deborah J.
Source: Res. Paper PSW-RP-216. Albany, CA: Pacific Southwest Research Station, Forest Service, U.S. Department of Agriculture; 17 p
Description: Visitors to southern California National Forests are urban dwellers and as a group are culturally diverse. To manage the National Forests for this diverse group of visitors, information is needed on their expectations, preferences, and experiences at recreation sites. To evaluate visitor perceptions of crowding and discrimination, to determine favorite activities, and to determine the potential of visitor displacement from recreational sites, observations and surveys were collected during July and August 1990 in two of the National Forests. Racial and ethnic groups were categorized into Anglo American, Hispanic American, Mexican American and Others. In general all groups rated crowding similarly, although Hispanic groups expected more people than were found at the sites. Additionally, enjoyed activities differed only slightly between ethnic groups: all reported hiking, picnicking and visiting with others as favorite activities. The biggest difference between ethnic groups was exposure to discriminatory acts. Members of minority groups were more likely to report being subject to these acts. There was little evidence of displacement at the sites studied. Potential management actions include suggestions for improving interaction and communication between resource managers and the visiting public, reducing depreciative behaviors, and better signs. Research needs include evaluating these suggested management actions.
Keywords: crowding, cultural diversity, discrimination, displacement, participant observation, symbolic interaction
View or Print this Publication (1.0 MB byte)
- We recommend that you also print this page and attach it to the printout of the article, to retain the full citation information.
- This article was written and prepared by U.S. Government employees on official time, and is therefore in the public domain.
- You may send email to firstname.lastname@example.org to request a hard copy of this publication. (Please specify exactly
which publication you are requesting and your mailing address.)
Chavez, Deborah J. 1993. Visitor perceptions of crowding and discrimination at two National Forests in southern California. Res. Paper PSW-RP-216. Albany, CA: Pacific Southwest Research Station, Forest Service, U.S. Department of Agriculture; 17 p
Get the latest version of the Adobe Acrobat reader or Acrobat Reader for Windows with Search and Accessibility | <urn:uuid:7e7a04db-48e1-4fc1-900f-3e04fbdcf844> | CC-MAIN-2014-10 | http://www.treesearch.fs.fed.us/pubs/28613 | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999661726/warc/CC-MAIN-20140305060741-00088-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.938484 | 505 | 2.734375 | 3 |
The articles of confederation vs constitution is a debate that has been around for quite some time now. So little is known about these documents much as they are very essential to the republic of America. For purposes of understanding, it is essential to look at what exactly these documents are and what is contained in them.
In case there are any differences between them then they better be looked at in the same manner as well. Doing so will provide the much-needed information in this regard which makes it essential to look into this issue in a discussion. This is exactly what this text is all about, the text looks into the essential details of the articles of confederation vs constitution.
For purposes of understanding, it is important to keenly look at what each one of these two documents is. Once looked at that way, the text will also look at any similarities as well as differences between these two as well. At the very end, you will have a much better understanding of this document especially in the articles of confederation vs constitution.
The Articles Of Confederation VS Constitution
The articles of confederation vs the constitution are some of the two common and famous documents that note the American Revolution. The regulations which were contained in the articles of the confederation were accepted and signed in 13 states in the US. The constitution on the other hand contains all the rules and regulations adhered to in a democratic country.
The articles of confederation together with the perpetual union marked an agreement between 13 states in the US. These states agreed to follow this agreement and implement its proposals as well as regulations to the fullest. The article of confederation was considered to be the first constitution these states ever had.
That is about the articles of confederation now it is time to look at the constitution again and see what it contained. The constitution is pretty much simpler to understand in America and other places in the world as well. The constitution is basically a set of rules and regulations which are followed by the citizens of the country as well as the government.
In every country that exercises democracy, a constitution is such an essential document in such a state. In fact, many people refer to the constitution as the backbone of any democratic country. The Indian constitution is one of the longest in the world containing up to 444 articles. This constitution makes India one of the largest democracies there is in the world.
The constitution can be implemented by individuals as well as institutions that prescribe rules for them. There are many ways by which a constitution can be implemented and also interpreted. This bit of the constitution perhaps is the greatest difference of it in the articles of confederation vs constitution.
The Difference Between The Articles Of Confederation And The Constitution
There are quite a number of differences between the articles of confederation vs the constitution. As you look into this discussion, it is important to look into this matter as well. Once you understand the greater differences between these two you will be best placed to give proper explanations of them all.
The difference between the articles of confederation and the constitution is not that hard to understand. They are quite simple to understand depending on who you are as a person. The articles of confederation in simple terms were the rules that were agreed upon in the United States of America. These rules were agreed in the 28th century by all the states involved as of that time.
The constitution on the other side is the rules that democratic countries use in the implementation of the law. Almost all the countries in the United States of America have a constitution that they follow. Acting contrary to or out of the provisions of the constitution might lead you to some problems in the end.
In many countries, there are always some heavy penalties imposed on people who breach the law. This is exactly why the constitution is such a document of the essence in many parts of the world. In fact, it is this document that is regarded as the guiding light in many of these countries.
Comparison Between The Articles Of Confederation VS The Constitution
There are quite a number of factors that go into the count when comparing the articles of confederation vs constitution. Some of these factors in differences might actually look like the same thing but in reality, they are not. That said, this text also looks into this comparison to help you understand what exactly sets these two documents apart from each other.
The greatest difference between these two documents is actually the basic purpose that they were meant to serve. For instance, the articles of the confederation were actually an agreement between the 13 states in the United States of America. This agreement was signed very many years ago and is considered to be one of the founding documents of the United States of America.
The articles of confederation are not in use now much as they served such a significant role back then in time. The constitution on the other side is a set of rules and procedures that govern a democratic country. In fact, in every country where the rule of law is applied, the constitution plays such an essential and integral role.
Even though the articles of the confederation played an essential role in the United States back then in time, they are not used across the globe. The constitution on the other side is used from across the globe in all democratic countries.
Frequently Asked Questions (FAQs)
Constitution vs articles of confederation is a debating concept, hence it occurs with various questions. let’s make an attempt to clear the queries if they are knocking on your mind. I hope you will get your answer.
Q1. What are the articles of confederation?
A. The major articles of confederation are the Legislative Branch, the Executive Branch, the Judicial Branch, the States, Amendment, Debts, Supremacy, Oaths.
Q2. What is the main purpose of the Articles of Confederation?
A. Article of confederation is a written document that establishes the function of the U.S government. Mainly after the independence, articles of confederation has started.
There is so much to the issue or debate of articles of confederation vs constitution. The text above has been looking into these concepts with the view of helping you understand what they are. As you read through them, you will be able to understand what these two documents are. | <urn:uuid:34f1dcce-64ca-4c46-91fa-e7e966a579b1> | CC-MAIN-2022-21 | https://exclusiverights.net/articles-of-confederation-vs-constitution/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662510138.6/warc/CC-MAIN-20220516140911-20220516170911-00557.warc.gz | en | 0.973568 | 1,275 | 3.609375 | 4 |
This week, the people of the world celebrated the 45th Earth Day. While every day should be treated like Earth Day, this particular date is used to remind the world how important it is to care for our planet.
On April 22nd of 1970, Americans, with the help of Earth Day founder Gaylord Nelson, made a conscious decision to begin placing the needs of the planet in the front of political and social debates. Demonstrations and rallies that took place throughout the nation helped to gain the attention of both political parties in the hopes that change would begin to take place in the way we treated our planted. In 1990, Earth Day was catapulted into the world wide spotlight, with over 200 million individuals throughout 141 countries to participate in rallies and protests to help better the planet we live on. Today, Earth Day serves as a reminder that changes need to be made on both a residential and commercial stage to save our environment.
Because of initiatives such as Earth Day, 3M is dedicated to making changes towards a more sustainable world. One of their main goals over the past year has been to decrease the use of hydrofluorocarbons, or HFCs. Like discussed in our previous blog Clean Agents for a Clean Planet, 3M has found more sustainable and safer alternatives for clean agents rather than using these harmful HFCs. By using the Novec 1230 on occasion, you can do your part to create a more sustainable world as well.
At Fireline, we offer an array of portable fire extinguishers and fire alarm systems to keep commercial buildings safe. Fireline offers the highest quality alarm systems to keep your business safe from fires and carbon monoxide poisoning. We also offer fire suppression systems as well to help keep commercial fires controlled should they break out. Our trained technicians will work with you to determine which air sampling smoke detection system is best for your business. We will also help install and maintain the system for your commercial building. | <urn:uuid:9f90516b-6efb-437b-8ebc-46ae227baaca> | CC-MAIN-2021-43 | https://www.fireline.com/earth-day-and-a-sustainable-world/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587877.85/warc/CC-MAIN-20211026103840-20211026133840-00702.warc.gz | en | 0.956554 | 395 | 2.75 | 3 |
Experimenting With Storia
- Grades: 3–5
Have you noticed a new tab on the Scholastic Web site? It is labeled "Storia." Since I browse the site often, I was curious and checked it out. In short, Storia is a great application for parents to use with their children. It allows them to purchase books and then track their children’s reading progress. Of course, I thought there had to be a way to utilize this free app in my classroom, too. I brainstormed a bit and found a couple ways to incorporate this new feature.
Classroom Uses for Storia
Picture Books: We know that a picture book can be used at any level to introduce a concept. We have all tried to do those Gumby-like flexibility moves in order to read a page while simultaneously showing the picture to the class to save time and maintain interest. One solution is to buy an electronic version of the book and then display it on the interactive whiteboard. Everyone can see, and you can save those neck stretches for the gym. An additional bonus is that the electronic version is easier for a teacher to keep track of.
Literature Circles: Literature circles or book clubs have great value in the classroom. Mary Blow discusses the ways she organizes middle school literature circles in her blog. I know when I have three or four novels being read at a time in the classroom, I simply cannot meet with each group every day. On a day that I can’t meet with a book club, I let the students become the teachers of their group. They display the electronic version of the book on the interactive whiteboard and read it as a group. While on Storia, the book club has three objectives: (1) asking good questions, (2) reading fluently, and (3) building vocabulary.
Here is how I do it:
- Each student takes a turn playing the role of the designated teacher by reading a page and then asking a teacher-like question, such as: "Can you summarize what this page is about?" "Who can make a deep connection to this page?" "Any predictions as to what will happen next in the story?" or "What inferences can be made?"
- The designated teacher is in charge of all vocabulary words on a page. One cool feature of the electronic book is that a student can simply touch the word and a definition window pops up — complete with an audio pronunciation of the word. The designated teacher will stop anytime a student indicates he or she does not know a word. The designated teacher will ask for three predictions based on context clues. After the group makes their predictions, the students are allowed to use the definition window feature to discover the true definition.
Novelty: According to brain research, the brain likes novelty. Storia offers one more way to get students excited about reading.
Works With Today’s Society: Some students have more electronic devices and video games than they do books in their home. In short, students would rather be plugged in. With this new app, they are allowed to be plugged in while learning.
Convenience: One of the best features is convenience. When a child is on vacation or waiting in a dentist office, they don't have to take a bunch of books to read. Simply bringing the family iPad or laptop gives them access to the entire family library.
I have only experimented with Storia for a week, and I am sure there are more ways to effectively use it in the classroom. What are some ways that you see this being a valuable classroom tool? Or, if you have already downloaded it, what are some ways you are currently using it?
Read every day!
2i2 is a trademark of Mr. Vasicek’s class. Visit his classroom Web site at www.mrvasicek.com | <urn:uuid:ace7053c-3063-4569-8ad1-6748bfaabdf9> | CC-MAIN-2015-48 | http://www.scholastic.com/teachers/top-teaching/2012/04/experimenting-storia-0 | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398453805.6/warc/CC-MAIN-20151124205413-00336-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.959781 | 795 | 2.859375 | 3 |
Alpine ecosystems are islands of cold. They contain pockets of endemic biodiversity surrounded by a sea of hotter land. Mountains are thought to be particularly vulnerable to climate change because increased temperatures compromise species that are adapted to the coldest of habitats. As more species move to higher ground to escape warmer weather, what will happen to those that are already there? It is feared that species already adapted to the highest peaks will “fall off the top” of mountains or get pushed out by the plant world’s climate refugees moving up slope. This theory seems to pass a common sense test, but is this actually what is happening? Are species moving uphill, and if so, what is driving the upward expansion of their range?
Researchers from UC Berkeley, Lawrence Berkeley National Labs, University of Colorado, and elsewhere are working to answer these questions. Hundreds of experimental plots have been established on Niwot Ridge in Colorado’s Front Range to query what environmental factors determine the current range of a number of mountain dwelling plant species. Tree line, the elevation at which trees stop growing, has been advancing uphill in most regions of the globe over the past half century, however, this is not happening uniformly in all areas.
Investigations on two high elevation tree species, Engelmann spruce and limber pine, have shown that temperature may not be the primary factor determining their maximum elevation ranges. Researchers working on Niwot Ridge manipulated temperature and moisture in multiple experimental plots near tree line and observed seedling establishment under artificially varied temperature and water regimes.
Artificial heating of the plots with seeds sewn above tree line, designed to mimic climate change, actually resulted in reduced seedling survival compared to control plots. Warmer temperatures created drier soil conditions that negatively influenced seedlings. However, plots with artificial heating and supplemental water showed increased seedling survival and growth. Therefore, we can speculate that warmer temperatures will only induce up slope movement of tree line in circumstances where there is sufficient soil moisture. Otherwise, warmer temperature may exacerbate moisture stress and limit range expansion. This highlights the importance of accounting for local factors, such as water availability, in determining future range shifts.
The topography of mountain ecosystems is extremely diverse, and warming temperatures affect water availability and plant survival differently depending where on the mountain they occur and what the individual species are adapted to. For example, snowfields melting earlier in the season negatively impact the survival of plants that are adapted to more persistent snow cover and shorter growing seasons- including mosses, lichens, and other snowfield plants. Meanwhile, wet meadows down slope of the snowfield may remain unchanged or transition to drier meadows if total moisture availability drops below a certain threshold.
These changes are broadly important to climate models- computational tools that allow us to predict future climate change scenarios. This is because the difference between having a coniferous forest versus alpine tundra changes the way carbon and other greenhouse gases are cycled between the atmosphere and the land. Changes in Earth’s vegetation mean changes in Earth’s atmosphere. The aggregate of these changes all over the globe is something that climate models need to take into account if we are going to get better at predicting the effects of climate change. Mountain ecosystems are particularly heterogeneous topographically and ecologically which is why they present a poignant study system for this topic. They serve as a great reminder that a finer scale understanding of vegetation responses to climate change are needed to predict species’ range shifts and to create better climate models. The more our climate models take into account studies such as the one on Niwot Ridge, the better we will be at predicting the future climate.
Aside from their ecological importance, the mountains of the American West are iconic landscapes that provide a unique sense of place for both locals and visitors. Understanding what drives their ecological changes may also help us manage them in a more sophisticated way so that future generations can enjoy their intact ecosystems.
Original Scientific article (s)
Katharine N. Suding, Emily C. Farrer, Andrew J. King, Lara Kueppers
& Marko J. Spasojevic (2015) Vegetation change at high elevation: scale dependence
and interactive effects on Niwot Ridge, Plant Ecology & Diversity, 8:5-6, 713-725, DOI:
Moyes, A. B., Castanha, C., Germino, M. J., & Kueppers, L. M. (2012). Warming and the dependence of limber pine (Pinus flexilis) establishment on summer soil moisture within and above its current elevation range. Oecologia, 171(1), 271–282. http://doi.org/10.1007/s00442-012-2410-0
Featured Image, Mountain Research Center
Niwot Ridge, Niwot Ridge LTER, Mountain Research Center
Barren snow free peak, Andreas F. Borchert via Wikipedia
climate model data example, NOAA | <urn:uuid:d90f0b12-cdb1-43d7-bcdc-aa6d47c40c9d> | CC-MAIN-2019-35 | https://ecosciencewire.com/2016/03/17/escaping-the-heat-the-plant-worlds-refugees/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313589.19/warc/CC-MAIN-20190818022816-20190818044816-00314.warc.gz | en | 0.909298 | 1,020 | 4.4375 | 4 |
National Records of Scotland (NRS) today publishes ‘'Scotland’s Population 2015 – the Registrar General’s Annual Review of Demographic Trends'.
Tim Ellis, the Registrar General of Scotland, said:
“The figures produced by National Records of Scotland paint a picture of our nation in 2015. The Registrar General’s Annual Review has been published since 1855, and over that time my predecessors have faithfully recorded the state of our nation, and told our story – one of changes, both big and small.
“The population in 1855 was 2,978,065. This year’s figures show our population is still increasing, mostly due to migration, and in 2015 was at its highest ever at 5,373,000 people. The population is continuing to age and this change will bring both opportunities and challenges in the years ahead.
“As well as more people moving to Scotland than leaving, fewer babies were born during 2015 and there were more deaths than in 2014.
“The most common causes of death are still cancer, respiratory system diseases and ischaemic (coronary) heart disease.
“Although mortality rates in Scotland have generally fallen more slowly than in the rest of the UK and elsewhere in Europe, the improvements over the last 60 years are still considerable and the impact is reflected in the increase in expectation of life. Despite these improvements inequalities remain within Scotland. For example, males born around 2012 in the 10 per cent least deprived areas in Scotland could expect to live 12.5 years more than males born in the 10 per cent most deprived areas.”
The report on Scotland’s Population shows that:
- The estimated population of Scotland on 30 June 2015 was 5,373,000, the highest ever recorded.
- In the year to 30 June 2015, 85,000 people came to Scotland (from the rest of the UK and from overseas) and 57,000 left Scotland (to the rest of the UK and overseas). This resulted in a net increase in population of 28,000.
- There were 55,098 births registered in Scotland in 2015. This was 1,627 (2.9 per cent) fewer than in 2014, resuming the downward trend over the five years prior to 2014.
- There were 57,579 deaths registered in Scotland in 2015. The main causes of death were cancer (16,093), respiratory system diseases (7,669) and ischaemic (coronary) heart disease (7,142).
- Life expectancy in Scotland has improved greatly over the last 33 years. Life expectancy of those born around 2014 is now 77.1 years for males and 81.1 years for females. However, life expectancy in Scotland has improved more slowly than in the rest of the UK and elsewhere in Europe and inequalities within Scotland remain. Life expectancy is still lower by 12.5 years for males in the 10 per cent most deprived areas compared with males born in the 10 per cent least deprived areas, for males born around 2012 (the latest life expectancy figures by deprivation).
- There were 29,691 marriages in Scotland in 2015. Of these, 1,671 were same-sex marriages following The Marriage and Civil Partnership (Scotland) Act 2014 coming into force on 16 December 2014. The majority of same sex marriages were couples who changed their existing civil partnerships to marriage – 936, or 56 per cent. There were only 64 civil partnerships – 33 male couples and 31 female couples. The average age at which people marry for the first time has increased by around two years since 2005, to 33.6 years for men and 31.9 years for women in 2015.
- In 2015, there were 504 adoptions recorded in Scotland, an increase of 11 per cent over 2014 and the highest number recorded since 1996. The number of adoptions each year is around a quarter of what it used to be in the early 1970s.
- In mid-2015, there were 2.43 million households in Scotland, which is an increase of around 160,000 over the past ten years.
The report also includes the invited chapter ‘Migrants in Scotland’s population histories since 1850’, written by Prof. Michael Anderson, Professor Emeritus of Economic History and Honorary Professorial Fellow of the University of Edinburgh. This chapter draws on material from his on-going research into the population histories of different parts and occupational groups of Scotland, in the context of wider British and European population change, and explores some of the key patterns and roles of migration in Scotland’s population histories since the middle of the nineteenth century.
The report is a compendium that brings together key demographic information from a range of publications produced by NRS. It has been produced annually since it was first published in 1855. It is accompanied by an update on a wide range of other statistics on births, stillbirths, adoptions, marriages, civil partnerships and deaths, which appear in the Vital Events Reference Tables and in website sections on deaths from certain causes.
Among the other information published by NRS today:
- There were 1,150 alcohol-related deaths in 2015, very similar to the 2014 figure of 1,152.
- There were 672 probable suicides in 2015, 24 (three per cent) fewer than in the previous year.
- Age-standardised death rates fell by 12 per cent between 2005 and 2015 for all ages and by 17 per cent for people aged under 75.
The full publications Scotland's Population 2015 - The Registrar General's Annual Review of Demographic Trends, Vital Events Reference Tables 2015 and Deaths by various causes(excluding Drug-related Deaths and Winter Mortality) are available on this website.
An infographic booklet on Scotland’s population has also been published today on this website.
Source: National Records of Scotland | <urn:uuid:90a6cd88-17c7-49e9-bf07-28c4266be8fe> | CC-MAIN-2022-33 | https://www.scotlandstowns.org/scotland_s_changing_population | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00472.warc.gz | en | 0.967098 | 1,194 | 2.6875 | 3 |
The majority of us are so wedded to our phones, tablets and other wireless devices, and so enthralled by how much easier they seem to make our lives, that we don’t stop to think of the long-term health effects of being surrounded by radiation-emitting devices 24 hours a day.
Already, there is overwhelming evidence that WiFi radiation causes serious health problems. Dozens of studies have confirmed that it has devastating effects on brain and overall health, with children being especially vulnerable to the effects of this type of exposure.
Despite evidence to the contrary, however, governments around the world, desperate not to be left behind in the technology race, continue to allow ever more dangerous forms of WiFi radiation. Now, as reported by Waking Times, the United States Federal Communications Commission (FCC) has authorized Elon Musk’s rocket company, SpaceX, to launch close to 12,000 satellites into the atmosphere, from where they will beam extremely high frequencies of radiation down to every corner of the globe in an effort to make global satellite broadband services available planet-wide.
And SpaceX will not be alone in taking this technological leap. Several other companies, including Boeing, Spire Global and One Web, will be launching thousands of their own satellites. Within the next few years, a total of 20,000 satellites will be irradiating the Earth at extremely high frequencies, every day, all day.
There will literally be nowhere to hide. (Related: Potential risks of 5G wireless radiation are too serious to ignore.)
It is true that there are already around 2,000 satellites orbiting the Earth, beaming down commercial GPS, allowing us to enjoy certain mobile device services and television shows, while gathering information for meteorologists and the military.
These satellites are different, though, to those to be launched by SpaceX and the other companies. While the existing satellites are already irradiating the planet to some extent, these next generation satellites will beam down extremely high frequencies of between 12 GHz and 42 GHz, much higher than what we have experienced in the past.
Waking Times explains the way in which we will be under attack from radiation on multiple fronts:
At present, mobile phones, smartphones, tablets, most Wi Fi and so on all operate at under 3 GHz in what is called the “microwave” region of the electromagnetic spectrum. If you could see and measure their wavelengths, you would find that they are many centimetres (or inches) long. …
The introduction of 5G will entail the use of considerably higher frequencies than these, with correspondingly shorter wavelengths. Above 30 GHz, wavelengths are just millimetres rather than centimetres long. The millimetre waveband (from 30 GHz to 300 GHz) is referred to as Extremely High Frequency, and its wavelengths are between 10 millimetres and 1 millimetre in length.
Using these millimeter waves enables much larger bands of spectrum, meaning vast quantities of data can be transferred at incredibly high speeds.
But, there’s a problem: Those tiny wavelengths aren’t strong enough to get through walls, trees and other solid objects. The solution: Multiple small phone masts, placed very close together (around 100 metres apart), and operating at much higher currencies than existing phone masts. The result?
Waking Times explains:
[A]ny living creature that gets in the way of such a concentrated beam will be subjected to a powerful dose of extremely high frequency radiant electricity. (Related: New report finds that WiFi radiation is damaging the environment and wildlife.)
Pretty soon, every living creature will be subjected to non-stop radiation beamed down from the skies above and from masts placed 100 meters apart, all around us. Truly, we are living in terrifying times.
Learn more at Radiation.news. | <urn:uuid:f810aa36-bc74-4681-8e7c-dab3ab9d4131> | CC-MAIN-2023-50 | https://newstarget.com/2019-10-17-satellites-you-cant-hide-from-5g-electromagnetic-radiation.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00342.warc.gz | en | 0.940002 | 780 | 2.875 | 3 |
Weather forecast for October 2021 is an interesting one for North America. The month will be marked by a strong high-pressure system and warmer than normal temperatures, while low pressure pushes in from the North Pacific, bringing colder temperatures to the western United States and even some severe weather.
October is the first month of the cold season in the Northern Hemisphere. It is not a fully cold month but marks a bigger step into Autumn. This is the time when temperatures start to slowly cool off over the mid-latitudes but cooling faster over the polar regions.
This creates pressure differences across the northern hemisphere, which provides more and more energy for complex and dynamic weather patterns. We will look at October 2021 weather development over North America and how a massive high-pressure system will influence the weather over the entire month.
We often hear about these weather “oscillations” every cold season. One is AO, the other is NAO, then we have QBO, PNA, EPO, WPO, ENSO, SOI,… The list is almost endless.
What are these weather oscillations and why are they important? Oscillation generally means that something is oscillating, meaning that it moves back and forth. In weather and climate studies, this “movement” is usually up or down, the rising and dropping of a certain weather parameter, like temperature or pressure.
PACIFIC-NORTH AMERICAN INDEX
There is one of the more important oscillations, which, as the name suggests, is more specific to North America. It is called the PNA – Pacific North American index. It basically describes the pressure difference between the northwest United States and western Canada on one side and the southeast United States on the other side.
We made a special plot that shows the pressure pattern during the positive phase of the PNA during the October-March period. We can see higher pressure over the northwestern United States and western Canada and lower pressure over the southeastern United States. This means warmer weather for western Canada and the northwestern United States.
But in a negative phase, the roles are reversed. Below we have an example for the temperatures in the negative phase of the PNA. Colder air over Western Canada and the northern United States, and warmer over the southern United States
Current PNA forecasts take it into negative values. This means the opposite of what we see above. It means colder air and lower pressure in the western parts and warmer temperatures in the SE United States.
The PNA is just one of the weather patterns over the Northern Hemisphere. We produced a video that shows the weather circulation over the entire Northern Hemisphere. You can nicely see the circulating mass of colder air over the polar regions, which is getting colder over time as we go deeper into Fall. Also, notice how the weather patterns are developing over different continents, but stay connected in this one larger circulation system.
OCTOBER 2021 WEEKLY WEATHER FORECAST
We will break down the October forecast into weekly segments, looking at the development through the weeks. First, we will start with the GEFS ensemble model for the first half of the month and then add the ECMWF and CFS models to get more ideas for the weather forecast in the second half of October for North America.
We have to add a disclaimer, that forecasts always change, especially in the extended range. So in the second half of the month, we are mainly looking at trends and patterns and comparing different models/scenarios.
OCTOBER WEATHER – WEEK 1
October starts off with all oscillations in a negative phase, and we can see why. We have higher pressure reaching into the Arctic, keeping the arctic circulation negative. A low-pressure system is dropping down into western and northwestern Europe, keeping North Atlantic oscillation neutral to negative. A strong ridge is climbing up over the United States and further extends into eastern Canada. As the pressure over the west coast of Canada is lower, and east Canada is under a high-pressure zone, this corresponds to a negative PNA pattern.
Going over North America, we can see much warmer than normal temperatures in the northern United States and in central and northeast Canada. For most of week 1, this blocking pattern has dominated. It brought warmer weather to much of the northern half of the United States. We can see colder air starting to descend into western Canada and the far northwestern United States.
We can also see drier conditions taking over much of Canada and the central regions of the United States. A precipitation zone is present over the eastern United States, as a weak low-pressure area moves over the eastern United States.
Summary: Over North America, we saw mostly drier and warmer weather. Some colder than normal conditions are present over western Canada, while most of the United States has warmer than normal weather. More precipitation is forecast for the eastern half of the United States, while central regions remain drier than normal. The western United States shows normal to slightly warmer and wetter conditions.
OCTOBER WEATHER – WEEK 2 FORECAST
The weather forecast for week 2 shows progress in the pressure pattern and quite interesting weather dynamics.
The North American ridge will move slightly east, making room for a low-pressure zone to enter the western United States. This will establish a more zonal (west-east) flow over the country, and stormier conditions in the western half.
On the temperature forecast, we can see the warmer temperatures moving eastward. Much warmer than normal temperatures will continue over eastern Canada. Colder temperatures will be making their way into the western half of the United States, while most of the eastern half of the country will be under warmer conditions and warmer southerly flow.
We can see wetter conditions forecast over the northern United States and southern Canada. That is due to the low-pressure system entering the western United States. It produces a warm moist westerly/southwesterly flow over the northern United States. Unsettled weather is expected in these regions, while the south-central states are forecast to see less precipitation, as the storm tracks remain further north. The central states are neutral, as they will likely see some precipitation and even severe weather.
Current forecasts show a massive low-pressure area entering the western United States. With a low-pressure system entering from the west, the risk of severe weather increases for the south-central states. The entrance of this low-pressure system is expected around the 12th over California.
A low-pressure system from the west also brings lower temperatures to the west half of the country. Unseasonably lower temperatures are to be expected over the entire northwestern United States, while the entire west will see colder than normal temperatures.
Further east, the low-pressure system will interact with the high-pressure area, creating a potential zone of severe weather in the central United States. Strong winds will move over the region, together with warm temperature and moisture, creating a potent severe weather combination.
Week 2 summary:
Over the United States, we see a trend of a strong low-pressure system moving into the western half of the country. It will bring unseasonably colder weather to the western half of the United States and southwestern Canada. It will likely bring severe weather conditions over the central United States. The eastern half of the United States and Canada will stay under warmer than normal weather, as the high-pressure systems remain over the region.
OCTOBER WEATHER – WEEK 3
Going into week 3, we will look at three different models. First is the same GEFS model that we looked at for weeks 1 and 2 above. It shows a similar pattern as in week 2 over North America, with a slight difference. The low-pressure zone over the west seems to back off slightly, while the ridge remains over the east, but also lifting slightly north.
Looking broadly over the temperatures, we see the warmer temperatures will stay over most of central and eastern Canada and the United States. The colder air is forecast to move out in the west, as the lower pressure area lifts slightly back out, but remains in the northwest.
Below we have ensemble forecast graphs for different parts of the United States. In Seattle, northwest United States, we can see a temperature drop as the low-pressure area comes in but relaxing back up in week 3 as the low-pressure area lifts further north.
On the other side of the country, in Chicago, we see steady warmer than normal temperatures under the high-pressure area. But in week 3, temperatures will start to drop, as we have seen the high-pressure area lifting further north.
Going to the southwest, we have a forecast graph for Los Angeles, where we see a quite strong temperature drop, as the low pressure moves into the western half of the United States. Two temperature drops are likely, as two low-pressure systems will move over the region. But into the second half of the month, the temperatures are expected to rise again as the low-pressure area lifts back to the north.
Adding the ECMWF model, it shows a similar pattern, with a high-pressure zone over eastern Canada and the northern United States. It features the same low-pressure area over western Canada, also keeping it further northwest than in week 2.
Temperature-wise, the ECMWF is forecasting warmer conditions in most of the central and northern United States. Most of central and eastern Canada is even strongly above normal. However, we see normal to cooler than normal temperatures over the western United States, with normal conditions also hinted over the southeastern states.
Adding another model is the CFS from the NCEP center in the United States. It also has a strong high-pressure area over eastern Canada and a low-pressure zone over western Canada and the Aleutians. So far, the pressure pattern forecast for week 3 is mostly consistent within all three models.
The CFS is forecasting much warmer than normal conditions over central and eastern Canada and the eastern United States. It keeps some of the cooler air still over the western half of the United States.
OCTOBER WEATHER – WEEK 4
We will only keep the ECMWF and CFS for week 4, as the GEFS loses most of its signals at this range, which is normal for such an ensemble forecast at this extended range. This range is far out, so we only look at hints of “highs and lows” in the pattern and the strength of the signals and confidence between different models.
For week 4, the ECMWF shows the high-pressure area staying stable over eastern Canada and crawling into Greenland. A low-pressure zone remains over western Canada and over the North Pacific ocean.
Looking at the temperature forecast, we have a similar pattern to week 3, keeping most of the western United States neutral to cooler than normal. But central and eastern regions stay under warmer than normal temperatures. A transitioning low-pressure system is likely in this region, underneath the higher pressure further up in eastern Canada.
The CFS model shows a similar story, with high pressure over eastern Canada and extending into Greenland. A lower pressure zone is in western Canada and extending into the Aleutians.
The temperature forecast for week 4 of October shows warmer conditions over most of the United States and Canada. One exception is the northwestern United States, western Canada, and Alaska, with colder than normal temperatures.
Finalizing the month, we have the official NOAA temperature forecast for the United States. We can see the summary of the above-normal temperatures for much of the month over the north-central and eastern parts of the United States. In the far northwest, we have an increased chance for lower than normal temperatures. The southwest region will see warmer and cooler temperatures, creating average conditions over the entire month.
Precipitation-wise, we have above-average precipitation prediction for central regions of the United States, and for the northwest. Southwest remains in average conditions, while drier weather is expected for the northeast. The central above-average precipitation mainly results from the southwesterly moist flow between the low-pressure to the west and high-pressure to the east/northeast.
NOVEMBER WEATHER – WEEK 1 FORECAST
Pushing the forecast into week 1 of November 2021, we see the pattern staying stable over North America. This is a more negative NAO development, with higher pressure crawling over Greenland and low pressure staying over western Canada.
However, we do see a change over the United States, as the warmer temperatures are gone from most of the central and northern regions. This could indicate a more typical negative NAO pattern, as it allows some colder air transport from western Canada into the northern and central parts of the United States.
We will release regular weekly and monthly updates for the upcoming cold season as fresh forecasts are produced. So make sure to bookmark our page. Also, if you have seen this article in the Google App (Discover) feed, click the like button (♥) there to see more of our forecasts and our latest articles on weather and nature in general.
SEE ALSO: *Winter forecast 2021/2022* First look at Winter reveals a shift in the jet stream due to the new La Nina, felt in North America and in Europe | <urn:uuid:548949d9-3393-4caf-a0c8-54368c3fde10> | CC-MAIN-2021-49 | https://www.severe-weather.eu/long-range-2/october-strong-ridge-united-states-weekly-forecast-fa/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358233.7/warc/CC-MAIN-20211127193525-20211127223525-00013.warc.gz | en | 0.942799 | 2,730 | 3.34375 | 3 |
Yesterday I received a post in my email concerning the dropping water levels in major rivers across Europe as the region suffers under an historic drought. According to German media outlet Deutsche Welle (DW), the extended heat, lack of rainfall, and prolonged drought across Europe have caused major rivers to dry up. The Rhine River is one of the busiest waterways in the world as it flows from the Swiss Alps to the North Sea, and water levels are extremely low. The low-water levels have snarled supply chains and created more problems for an already-struggling economy in Europe. Container ships have had to reduce their load by at least 30% to pass through the obstructions the low-water levels have created in the Rhine. As the water level has dropped, centuries-old warning messages known as hunger stones have been uncovered in the dry riverbeds.
When I looked online, I found a hunger stone (German: Hungersteine) is a hydrological landmark used across central Europe. Hunger stones serve as famine memorials and warnings and were erected in Germany and in ethnic German settlements throughout Europe in the 15th through 19th centuries. The stones were embedded in the river during droughts to mark the water level as a warning to the future generations that they will have to endure famine-related hardships if the water sinks to this level again. One famous example in the Elbe River in the Czech Republic, has “Wenn du mich siehst, dann weine” (lit. “If you see me, weep”) carved into it as a warning. Many of the stones featuring carvings or other artwork were erected following the hunger crisis of 1816–1817, which was caused by the eruptions of the Tambora volcano. In 1918, a hunger stone on the bed of the Elbe River, near Tetschen, became exposed during a period of low water coincident to the wartime famines of World War I. Similar hunger stones in the Elbe were uncovered during a drought in 2018.
Europe’s current drought is historic. Scientists at the European Drought Observatory said the current drought is on track to be the worst in 500 years. According to the drought observatory, 47% of Europe is in drought warning conditions, meaning the soil has a moisture deficit. Another 17% is on alert, meaning the vegetation in the area is being affected by the dry conditions. Major rivers in Italy (Po), Germany (Rhine), and England (Thames) are all drying out. Water levels in the Rhine River are about half of their usual depth for this time of the year, with some sections having even lower water levels, DW reported. The outlet reported that rivers are “too dry, too low, and too warm,” which has consequences on wildlife, the economy, and people. In Italy, the prime minister said that the country is experiencing, “the most serious water crisis of the last 70 years.” In addition to the hunger stones, dropping water levels have uncovered bombs and watercraft, hazards left over from World War II.
THOUGHTS: Europe is not the only draught that has uncovered oddities. The drought in the western US has caused water levels in Lake Meade to plunge 150 feet since 2000, to their lowest since 1937 and the construction of the nearby Hoover Dam. Everything from World War II-era ships and bombs to four sets of modern skeletons have been recovered, including one stuffed in a barrel and at least one other the result of homicide. When I worked with the State Archeologist in Utah, we had the opposite result as the waters of the Great Salt Lake rose during a period of high precipitation/snow fall. The high water levels lapped along the shore and exposed dozens of Indigenous burials that had been placed beside the lake by peoples living hundreds of years ago. These were all carefully excavated and ceremonially reburied with the direction of representatives of local tribes. The rise and fall of rivers and lakes are always linked with inundation and exposure of past cultures which used the waters as a life source. This can tell us about our past and give us a warning for the future. Act for all. Change is coming and it starts with you. | <urn:uuid:954246a6-76fd-4e37-a715-b50278a665c5> | CC-MAIN-2022-33 | https://dandmtravels.blog/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00174.warc.gz | en | 0.972746 | 874 | 3.328125 | 3 |
Definition - What does Dezincification mean?
Dezincification is a process which selectively removes zinc from an alloy, leaving behind a porous, copper-rich structure that has little mechanical strength.
Dezincification can show itself in a variety of ways depending on the water composition and service conditions. It may present itself as dull red spots on the surface of brass. It can also manifest as seepage of water through the walls of fittings or leakage at valves. Extreme dezincification can cause actual breakage, with a dull coppery appearance to the fracture surface.
Copper alloys that contain less than 15% zinc and alpha brasses inhibited by arsenic or antimony are resistant to dezincification, when in service in water or soil environments.
Corrosionpedia explains Dezincification
Dezincification is the leaching of zinc from copper alloys in an aqueous solution. It is an example of dealloying in which one of the constituents of an alloy is preferentially removed by corrosion. Dezincification is similar to graphitization in that one constituent of the alloy (zinc) is selectively removed, leaving the other (copper) behind.
Dezincified brass retains the original shape and dimensions of the metal component before corrosion, but the residue is porous and has very little strength.
Conditions favoring dezincification are:
- Contact with slightly acid or alkaline water
- Water with little aeration
- Low flow rates of the circulating liquid
- Relatively high tube-wall temperatures
- Permeable deposits or coatings over the tube surface
An in-service valve suffering from dezincification has a white powdery substance or mineral stains on its exterior surface. The valve may exhibit water weeping from the valve body or stem/bonnet seal. Two types of corrosive attack characterize dezincification in this case:
- Plug-type dezincification: This type of dezincification penetrates deeply into the sidewalls of valves and fittings.
- Uniform-layer dezincification: This type of dezincification uniformly reduces the wall thickness of the valve or fitting.
Elevated temperature and coupling to a more noble metal can increase the dezincification. If brass bosses are used on copper hot water cylinders, the combined effects of the high water temperature and coupling to a large area of copper can give rise to significant dezincification even in waters that normally would not cause problems.
Avoiding and mitigating dezincification failures in aggressive water is probably best accomplished by use of dezincification-resistant brass alloys. | <urn:uuid:89e55401-22ef-4bcd-9c97-a7464abe1799> | CC-MAIN-2020-34 | https://www.corrosionpedia.com/definition/384/dezincification | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738573.99/warc/CC-MAIN-20200809192123-20200809222123-00275.warc.gz | en | 0.907083 | 552 | 3.53125 | 4 |
An argument against the possibility of super-intelligence is that the intelligence of a creation will be limited by the intelligence of its creator. How reasonable is this argument?
Of course the intelligence of a product is limited by the intelligence of its creator. Just not to the intelligence of its creator.
That would be about as reasonable as the idea that the speed of a car is limited to the speed of its creator.
Or the playing strength of a chess program to the Elo of its creator.
Or the ability of a neural network to differentiate between dozens of dog breeds to the dog expertise of its creator.
So, not very reasonable.
AI is frequently used to discover things that would take laborious amounts of time for humans to do. For example, AI can be used to find the optimal configuration for a mother-board layout, or identify best fit parameters for a financial model. Frequently, the AI can do a better job at a task and do it more qucikly than a human. Therefore, in many applications, the AI is already more intelligent than the creator at specific tasks.
Here are just a few things that AI can already do better than humans:
- Playing Chess
- Playing Jeopardy
- Detecting Cancer
To argue against the possibility of a super-intelligent AI is somewhat of a moot point since it has already been proven. | <urn:uuid:81c576f1-8433-4f45-a633-fa11daebca71> | CC-MAIN-2021-21 | https://ai.stackexchange.com/questions/2902/is-a-super-intelligence-limited-by-the-intelligence-of-its-creator | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989756.81/warc/CC-MAIN-20210518063944-20210518093944-00522.warc.gz | en | 0.964475 | 281 | 2.734375 | 3 |
The English used in this article may not be easy for everybody to understand.
Latino Moderne (LM) is a language that was made by David Th. Stark in the 1980s and first published on the internet in 1996. It is a revision of the grammar of the IALA's language Interlingua, using the IALA's words with little change. Applying the same principles that were used in developing the international vocabulary for Interlingua to developing a grammar, L.M. restores personal endings on its verbs and has gender and number agreement between its nouns and their adjectives and articles. The language also has an more clearly developed system for showing case distinctions in its pronouns. This, in effect, frees L.M. from a dependence on word order as is found in Interlingua. The changes in L.M. actually are very simple and easy to learn, providing a much more poetic and free use of it for international communication. Most of the changes that L.M. makes to the IALA language are actually suggestions that were set forth by the original deverlopers of the IALA project. Properly speaking, L.M. should be viewed as a continuation to the IALA project, not as something in competition with it.
It is hoped that the spread and use of Latino Moderne may assist in solving some of the communication problems that exist in the European Union and throughout the modern world. In this respect it shares the same goals as Interlingua, Esperanto, etc.. The developer of the language hopes that L.M. will be received and used as a suggested model language to help promote better international communication and friendship among nations.
Community[change | change source]
No community is presently established for the Latino Moderne (L.M.) project. Its developer, David Th. Stark, welcomes any activity in this area by other interested parties. "The language, Latino Moderne, belongs to all those who desire to use it."
Specimen[change | change source]
This page or section needs to be cleaned up. (September 2010)
Patre nostre, Qui es in celo, Sia Sanctificate tue nomine! Que adveni tue regno! Sia facite tue voluntate, como in celo, assi sur la terra! Le pan nostre necesse da nobis hodie, E pardona nobis las debitas nostras, Como anque nos pardonamus les debitores nostres. E ne induce nes in a le tentation, Ma libera nes ab le mal, Proque tues son le regno e la potentia e la gloria Por tute las epochas. Amen.
And Modern Latin is also a simplified Interlingua, which same text as above is :
Nostre Patre qui es in le cielos, Que tu nome sia sanctificate ! Que tu reino veni ! Que tu voluntat sia facte sure terra como in cielo ! Dona nois este jorno nostre pan quotidian, E perdona nois nostre ofensas como nos perdona a nostre ofensores. E non induce nois in tentation, ma libera nois del mal, Porque son de te le reino, le pocentia e le gloria pro le sieclos de sieclos. Amen.
Other websites[change | change source]
- The developer's website and a basic (1996) grammar with lessons for LM may be found at: http://www.oocities.org/athens/3150/latinomodernecontents.html
- And about simplified Interlingua also called Modern Latin | <urn:uuid:3634a91f-aa1c-4deb-b4f9-2cfb13baa014> | CC-MAIN-2019-26 | https://simple.wikipedia.org/wiki/Latino_moderne | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000353.82/warc/CC-MAIN-20190626134339-20190626160339-00147.warc.gz | en | 0.820237 | 789 | 2.765625 | 3 |
HIV Prevention Knowledge Base
Biomedical Interventions: Post-exposure Prophylaxis (PEP)
Post-exposure Prophylaxis to Prevent HIV Infection: Joint WHO/ILO Guidelines on Post-exposure Prophylaxis (PEP) to Prevent HIV Infection.
These are joint WHO and ILO guidelines on PEP to prevent HIV infection. They aim to provide a unified framework to guide both PEP policy development and the implementation of services for occupational and nonoccupational HIV exposures, with a focus on occupational exposure and exposure through sexual assault. This document does not provide detailed guidance relating to exposure through injecting drug use or through consensual sex.
Management of Non-Occupational Post Exposure Prophylaxis to HIV (NONOPEP): Sexual, Injecting Drug User or Other Exposures.
EURO-NONOPEP is a collaboration of 14 European countries. The goals of the collaboration are to collect and describe the PEP guidelines of all participants to evaluate PEP-related knowledge among patients and providers, and to maintain a registry of nonoccupational HIV exposures.
Antiretroviral Post-exposure Prophylaxis After Sexual, Injection-Drug Use, Or Other Nonoccupational Exposure to HIV in the United States: Recommendations from the U.S. Department of Health and Human Services.
The CDC recommends prompt initiation of PEP with highly active ART (HAART) for persons who seek care within 72 hours after a nonoccupational exposure to infectious body fluids of a person with known HIV infection, if the exposure event presents a substantial risk for transmission. HAART should be continued for 28 days. Exposures are defined as “any direct mucosal, percutaneous, or intravenous contact with potentially infectious body fluids that occurs outside perinatal or occupational situations. Potentially infectious body fluids are blood, semen, vaginal secretions, rectal secretions, breast milk, or another body fluid that is contaminated with visible blood.” When the HIV status of the source is not known and the patient seeks care within 72 hours after exposure, the CDC does not recommend for or against PEP but encourages clinicians and patients to weigh the risks and benefits on a case-by-case basis. When the transmission risk is negligible or when patients seek care more than 72 hours after a substantial exposure, PEP is not recommended. However, clinicians might consider prescribing PEP for patients who seek care more than 72 hours after a substantial exposure if, in their judgment, the diminished potential benefit of PEP outweighs the potential risk for adverse events from ARV medications.
Post Exposure Prophylaxis Guidelines for Occupational Exposure
This document gives NACO’s clear and concise guidelines for preventing and responding to occupational injuries that expose hospital workers and others to HIV. Separate flow charts detailing the differential levels of risk associated with types of injuries and the HIV status of the exposure source were developed to evaluate whether PEP would be recommended, and if so, the type of regimen that is most appropriate.
Offering HIV Post-Exposure Prophylaxis (PEP) Following Non-Occupational Exposures: Recommendations for Health Care Providers in the State of California
This document offers a comprehensive discussion of the critical issues that medical providers must consider before offering PEP for HIV in cases of nonoccupational exposure. Areas covered include the elapsed time from the event to referral, type of exposure and its associated risk (e.g., receptive/insertive anal or vaginal intercourse; shared needle), and the actual or likely HIV status of the source person or instrument. A summary of key studies on these issues and research on drug regimens used in different circumstances provides good background information for providers. Also useful are the patient information sheets on frequently asked questions, patient information forms, and provider scripts on topics that should be discussed with patients, which are provided in appendices.
HIV PEP: Now There is a Treatment that May Prevent HIV Infection After the Virus has Entered the Body
This colorful five-page booklet is intended to raise awareness among MSM about the availability of emergency PEP for HIV. Using a question and answer format (“We had unsafe sex . . . the condom broke. . . is it worth asking for PEP?”), and written in plain, nontechnical language, the pamphlet describes the who, what, where, and when of PEP—namely, eligibility, factors affecting success, how and where treatment is administered, and possible side effects.
PEP Online Self-Assessment
This website offers a brief online questionnaire that assesses eligibility for PEP. A series of questions establish when the exposure occurred and the actual or likely HIV status of the partner and recommends whether PEP is indicated or not. The site also offers links to a sexual assault hotline, how to find PEP administration centers, and easily accessible information about PEP that can be downloaded.
Development of Guidelines on Nonoccupational HIV Postexposure Prophylaxis for the State of Rhode Island
This article describes the history of the U.S. state of Rhode Island’s developing PEP guidelines. Rhode Island was the first state to establish such guidelines, which were disseminated in 2002. The key elements of the guidelines (context, timing, consent and testing, and recommended regimens) are summarized. However, the information in the guidelines is not as clear, nor as comprehensive, as guidelines that were published subsequently by the U.S. Government or by international organizations. Also, the drug regimens do not take into account recent research on adverse side effects associated with some multidrug regimens. | <urn:uuid:ce0d8e2c-e331-425a-b0f9-5082ef630f86> | CC-MAIN-2014-42 | http://aidstar-one.com/focus_areas/prevention/pkb/biomedical_interventions/post_exposure_prophylaxis_pep?tab=tools | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444209.14/warc/CC-MAIN-20141017005724-00086-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.910197 | 1,164 | 2.53125 | 3 |
The Tobacco Use Prevention and Cessation Program is a state-administered program that operates within ODH. TUPCP receives funding from the CDC and other grants, state general revenue funds, and other funding sources. The program promotes healthy outcomes in adults, children, and babies by limiting the effects of tobacco and tobacco smoke by taking steps to lower smoking rates.
Major components of the program include Prevention, Cessation, Enforcement and Data and Statistics.
Prevention: This area of the website focuses on preventing young people from starting using tobacco products. It contains educational resources, marketing materials and other important information to help prevent young people from trying tobacco products.
Cessation: This area of the website focuses on helping those who already use tobacco products to quit. It contains education, marketing materials, fact sheets, and a database of cessation service providers. This area focuses mostly on the impact of the Quitline and directing people to the Quitline and Quitline website.
Enforcement: This area of the website focuses on enforcing tobacco and smoke-free policies. It also includes information for the implementation of smoke and tobacco-free policies in local jurisdictions.
Data and Statistics: This area of the website focuses on Ohio specific tobacco and smoking-related data and statistics. | <urn:uuid:8f4c291f-7107-49b0-983a-865cfbb39496> | CC-MAIN-2023-14 | http://perrycountyhealth.info/tobacco-prevention-program/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00100.warc.gz | en | 0.933203 | 257 | 2.671875 | 3 |
South polar skua
The south polar skua is a large bird that grows to 53 cm in length.
Distribution & abundance
The south polar skua breeds on the Antarctic Continent and is a winter visitor to Australia. It has been recorded as far north as Greenland and the Aleutian Islands.
Conservation status: least concern
South polar skuas arrive at their breeding colonies in late October to mid-December. Their nests are a shallow depression on the ground and are generally found in sheltered locations on rocky outcrops, moss covered cliffsides or valley floors.
The eggs hatch in late December to late January after an incubation period of 24-34 days.
Diet and feeding
During the summer months, south polar skuas prey on eggs and young of Adélie penguins near the coast, while other skuas feed solely on fish and krill. South polar skuas are often seen following ships at sea.
Many skuas nest in close association with their prey. Southern giant-petrel and other skuas are infrequent predators on unattended nests and wandering chicks. Some eggs and chicks are lost each season to exposure. | <urn:uuid:3542472f-abd4-4230-9b64-dd0857291b75> | CC-MAIN-2015-14 | http://www.antarctica.gov.au/about-antarctica/wildlife/animals/flying-birds/south-polar-skua | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131296462.22/warc/CC-MAIN-20150323172136-00131-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.939032 | 242 | 3.265625 | 3 |
Self-Sufficient RF Transmission of Switch Signals Without Battery and Wires.
Energy Harvesting Switch Solutions Technology is an energy harvesting switch which reacts to its environment without a need for energy. This solution developed by ZF is based on the principle of Energy Harvesting and does not require any wires. Energy Harvesting can be described as an ‘operation without any auxiliary energy’. Instead of generating auxiliary energy through an integrated energy source or adding it via an external energy supply, energy that is available in the surrounding environment or that is acting on the system is converted. Therefore an Energy Harvester generally speaking is an energy converter.
The wireless RF switch system from ZF based on an energy harvester transforms the mechanical input energy of the actuation into electrical energy, which then transmits, for example, a switching signal to a wireless receiver via RF electronics. The advantages of the system are that the switch can be placed anywhere without the need for any wires. Over its whole life cycle it will fulfill its function completely maintenance free and without any need to replace a battery. The RF switch is fed with different input parameters and is capable of reacting to its environment.
The energy harvesting RF-switches from ZF can be used in a variety of applications such as industrial automation and building automation, smart home or medical technology. Designed for global use, the switches provide an excellent alternative to wired or battery-powered systems.
• Reduction of connection systems
• Flexibility for inaccessible locations
• No complex wire assembly
• Maintenance-free – no batteries need to be changed
• High energy efficiency
• Long mechanical life
• Flexible “Pairing” allows the operation of several receivers with one switch (and vice versa)
• Unique ID excludes a mutual interference between different RF-switches
> Compact & highly efficient Energy harvesting wireless system consisting of a generator and receiver.
> Network compatible wireless data transfer via RF-technology.
> “Unique ID” excludes interference between RF-switches.
> Several frequency bands allow global use within different applications.
> Flexible “Pairing” allows the operation of several receivers with one switch (and vice versa).
> Environmentally friendly – no batteries need to be changed or disposed of.
> Long mechanical life (up to 1.000.000 operations).
> Integrated receiver (in existing ECU) or as a separate unit (in a housing/as a plug-in receiver PCB).
> Antenna integrated or external
> Output interfaces: Low voltage relay 230V / 0.5A; RS 232 TTL Bus; RS 485 TTL Bus; Digital interface (high/low) / SPI; USB
> The product is available in the form of a “raw” energy harvesting generator or generator with PCB and antenna system, as a rocker switch, snap switch or light switch module.
> A Wireless Switch Module fulfilling KNX-RF 2.0 is also available.
Enquiry Form: http://www.epreston.co.uk/contact/
Home Page: http://www.epreston.co.uk/epblog/ | <urn:uuid:cc552158-eb3b-4a52-bc9b-0df8ed9122dd> | CC-MAIN-2020-40 | http://www.epreston.co.uk/epblog/category/product-annoucements/energy-harvesting-technology/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400227524.63/warc/CC-MAIN-20200925150904-20200925180904-00637.warc.gz | en | 0.881227 | 652 | 2.640625 | 3 |
This image is part of a weekly series that The Root is presenting in conjunction with the Image of the Black Archive & Library at Harvard University’s Hutchins Center for African and African American Research.
Dominating a tropical landscape filled with an array of sumptuous fruit, a splendidly dressed noblewoman of colonial Spain evokes the power and privilege of a regime entrenched for well over 200 years. However, it is another, quite different, figure who provides the richest insight into the mechanics of power and the elaborate fictions devised to legitimize the rule of the many by the few.
Dressed in the same lavish finery, a young black woman stands just behind the patrician lady in a position of discreet subservience. A complex web of meaning supported by gesture, stance and dress defines the relationship between the two figures. The girl looks up at the older woman with an animated gaze and slightly parted lips. The lady, on the other hand, turns away to regard the viewer with an air of practiced formality.
The relationship between the older woman and her young companion is made clear by the letter “A” appearing over the lady’s head. On the corresponding descriptive key, the pair is identified as a “Señora Prinsipal[sic] con su negra esclava.” From this we learn that, despite her elegant dress, the young black woman is held in bondage by a leading lady of society.
The highly detailed painting is actually the first of a series of six canvases. Collectively they record the typical levels of upper-class life in the town of Quito, Ecuador. The set is dated 1783 and signed by the prominent Quiteño artist Vicente Albán. At that time, the region of Quito formed part of the Spanish viceroyalty of Nueva Granada. The city is nestled in a spectacular setting high among the north central sierra of the Andes Mountains.
The series was intended to convey the great wealth and influence driving the success of the colony’s production of agricultural products, cloth and precious minerals. In each painting, the flourishing natural bounty of the land surrounds a centrally placed human figure. The series was most likely commissioned by a high-ranking official of the audiencia, or province, of Quito.
The strongly formalized nature of these half-dozen images seems especially fitting given their status as presentation pieces to the distant Spanish court in Madrid. In keeping with the Enlightenment’s interest in the natural world, their purpose was to put before the eyes of Carlos III and his court a visual catalog of one of Spain’s royal possessions in the New World.
The set has often been characterized as a type of casta painting, similar to the large number of serial images made in the colonial state of Mexico, then called New Spain. Despite the inclusion of a black figure in Albán’s work, however, the intention of his series was altogether different. His concern was not with the miscegenation of black, white and Indian inhabitants—that is, the mixing of the three main racial groups living in colonial Spain—but instead with depicting the place on the social scale of the white and indigenous people who populated the urban areas and wild Amazonian forests of Nueva Granada.
Dressed in attire of the finest materials and workmanship, the señora represents the pinnacle of colonial Spanish society. The young black slave holds a platter of sliced papayas, their red flesh and black seeds symbolizing fecundity, love and faithfulness. The bare feet of the young woman stress her connection to the earth. She serves as a trope of abundant nature sprouting from the ground like the plants around her.
An aspect of untamed nature and distant origins is signified by the pearl earring worn by the maidservant. Another distinction between the two women emphasizes the slave’s existential otherness. Clearly, each is what the other is not, as is patently clear from the absolute contrast between the colors of their skins. The extremely dark complexion of the slave girl is intended to set off the whiteness of that of her mistress, a calculated aesthetic conceit, as well as a clear affirmation of dominance.
The possibility of a real flesh-and-blood existence for the young black woman invites speculation on the nature of her arrival in Quito. At the time the series was painted, the colony saw a renewed influx of slaves provoked by a series of catastrophic epidemics and natural disasters. So great was the increased trafficking of slaves during the 18th century that the phenomenon has been termed the re-Africanization of Ecuador. In the case of this enslaved female attendant, the bestowal of a human being as an article of favor was enmeshed in the subtle play of social politics found only within the highest stratum of colonial society.
As was the case with her European counterparts, the young slave woman could expect to remain in her role of favored indulgence until some point around the onset of puberty. Her departure from this position was a necessary dictate of social protocol. As an adult woman, had she stayed through her physical and intellectual maturity, she might have given the unsettling impression of social or even racial parity. Her original duties, therefore, would have been shifted to other responsibilities, perhaps to a key role in the management of the household. Alternately, she could have been manumitted and paired with a socially suitable mate.
Whatever her eventual destiny may have been, she was certainly one of the last of her kind. The emerging disdain in the enlightened countries of Europe for the keeping of enslaved black pages and young girls, coupled with the growing abolitionist movement, would soon make the practice seem as antiquated as the notion of the divine right of kings. Further, the very expense of maintaining such an ostentatious artifact of luxury would soon become prohibitive during a period wracked by the near-total economic collapse of Nueva Granada as the colonial period came to a close.
In retrospect, Albán’s catalog of the splendors of Ecuador and its people documents a state of affairs already obsolete and soon to vanish forever. The abolition of slavery, however, would be achieved only in 1851, long after the founding of the independent nation of Ecuador. Today, about a half-million people of African descent live in the country, once a considerable part of Nueva Granada. Among them, at least in the ideal sense, may be the descendants of the young slave girl. They struggle even today to claim the fruits of the land symbolized by her elaborately dressed body.
The Image of the Black Archive & Library resides at Harvard University’s Hutchins Center for African and African American Research. The founding director of the Hutchins Center is Henry Louis Gates Jr., who is also chairman of The Root. The archive and Harvard University Press collaborated to create The Image of the Black in Western Art book series, eight volumes of which were edited by Gates and David Bindman and published by Harvard University Press. Text for each Image of the Week is written by Sheldon Cheek. | <urn:uuid:17c010a0-0c56-4189-a5ce-165255759417> | CC-MAIN-2020-05 | https://www.theroot.com/how-a-black-slave-girl-came-to-symbolize-wealth-and-nat-1790859226 | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606975.49/warc/CC-MAIN-20200122101729-20200122130729-00393.warc.gz | en | 0.959833 | 1,462 | 3 | 3 |
If children do not know about the struggles history can teach them, then they won’t appreciate the rights and freedoms they have, or realize how fragile they may be. History doesn’t need to hide away until middle school you can teach it to much younger children and one of my favorite ways to do so is with picture books. Women’s history is a one of my greatest passions and sharing the lives and true stories of strong, amazing, brave women with my children is essential. Both young girls and young boys must hear these stories and dive into the lives of these remarkable women who changed the world. All our book lists contain affiliate links.
A Picture Book of Amelia Earhart (Picture Book Biography)by David A. Adler had both my 7 year old and I totally enthralled. This book does a great job at painting the picture of early 20th century North America and how women were treated. Amelia’s whole life is covered and the book even touches on the conspiracy theories about her death. I loved how much of Amelia’s independent spirit came through in the quotes that the author shared. My absolute favorite tidbit about Ms. Earhart is actually in the author’s note and is about her mother. Did you know her mother was the first woman to summit Pike’s Peak ? That fact opened up a huge conversation with my son about parental role models.
A Picture Book of Harriet Tubman (Picture Book Biography)by David A. Adler. Often when I am reviewing a book with my kids I will jot down notes. This book had only one note. ” Amazing!!!” I have always known the bare facts about Harriet Tubman and her involvement in The Underground Railroad but I loved being able to learn more at the same time as my son. Our eyes both got wide as we read her incredible story of strength and leadership. My son loved this book as well and I appreciate how the author gives details without getting lost in them. My son told me “She was crazy brave !” and I agree. This is a wonderful book about a real American hero.
Rosa by Nikki Giovanni is not so much a biography, but it is most definitely a historical account of one woman who changed a nation. We all know the story of Rosa Parks but no matter how well you know the facts, reading a children’s book about it makes me cry. The author has done a fantastic job setting the stage, explaining how Rosa Parks was not your typical heroine, she was just a seamstress, just like everyone else. This is imperative to the message that a single person can stand up for what is right and make big changes. I also appreciated that the author included so much about the women who spearheaded the bus boycott. I am 36 and I feel inspired reading this as a woman, to think of the power it can have over the younger generation excites me. This would be a wonderful introduction to learning about the civil rights movement for kids 5-10.
Librarian on the Roof! by M.G. King made me cry. The true story is about a librarian who did what she needed to do to raise enough money to make a functional children’s section in the oldest library in Texas. What she did was stay on the roof of that library for a week, and it worked. I loved the message that libraries are vital, that books open doors, and that providing access to information to those who can’t afford to get it on their own is a worthwhile cause. This book made me want to cheer, it had me spouting off lessons left and right to my kids, and it absolutely captivated all three of us. Go read this book and learn more about RoseAleta Laurell the real librarian on the roof. Maybe she hasn’t changed history the way that some of these other women did but she is such a hero and put books in children’s hands and that will change history, I am certain.
Wilma Unlimited: How Wilma Rudolph Became the World’s Fastest Woman by Kathryn Krull Do you know who Wilma Rudolph was? She was the African-American Olympian who became the first American woman ever to win three gold medals at one Olympic Games. But her story is even more amazing than that. She also suffered from Polio as a child and was told she’d never run. Her determination stands out and inspires. I have mentioned many times how my grandmother was an Olympic medalist so this story hits a personal chord for me. I am awed and amazed by how far women have come from their first Olympic games in 1928.
The Story of Anne Frank by Brenda Ralph Lewis impressed me. I struggle with how to tell such a horrifying story to young children. I should explain that this book is not geared for preschoolers, it’s a school-age book, but still, it’s a daunting task. This book helps break down the facts while including details about this young girl’s personal and family life. This balance of historical facts and Anne’s family life is the key to why this book works. There is so much horror to digest that the little details like how Anne was a bit of a troublemaker and talked too much in class helps to tune the reader back into the very personal story. I think this is a fantastic precursor to reading Anne Frank: The Diary Of A Young Girl, it will give all the needed background for your older child to fully comprehend and appreciate the diary itself.
Basketball Belles: How Two Teams and One Scrappy Player Put Women’s Hoops on the Map by Sue Macy is the story of the very first basketball game played by college women. The game took place in 1896 and while we shake our heads at what these athletes were wearing at the time it was shocking. I am not a basketball player but to imagine women not being able to play simply because they are women bothers me even if it doesn’t shock me. Books like this that include activities that my own children do are important to share, it’s important to show them how many things women had to fight to do.
Marvelous Mattie: How Margaret E. Knight Became an Inventorby Emily Arnold McCully is a book that all little girls should read. I think I may buy 20 copies and give them to every girl that invites either one of my kids to their birthday parties. The reason I think this book is so wonderful isn’t that it’s about some woman that is on a coin (no disrespect Susan) but because I had never heard of Mattie but I should have, we all should have. Many of her inventions are still in use today… like the paper bag that stays upright. She made history many of us just didn’t know it. Her story of invention, entrepreneurship, and strength of character are stunning. She stands up for herself, learns from her mistakes, and follows her passion even though it’s not the easy or even the “only kinda hard” road. All the way she faces challenges and just keeps going. This is far more inspiring than any girl power book that I have read before, and it’s true.
Molly, by Golly!: The Legend of Molly Williams, America’s First Female Firefighterby Dianne Ochilltree is a story I had never heard before we found this book at the library but am so glad I know it now. Molly was an African American cook who provided meals for the firefighters in a town in New York. When a fire broke out and most of the firefighters were ill she put on the gear and stood side by side with the men to help fight the fire. She is the first known female firefighter. What I love about this story is that Molly didn’t grab the gear and start fighting because she wanted to be the first, she did it because there was a need and she was capable of helping. Being the first woman to be a firefighter was brave and Molly kept volunteering with the department for years after the first fire.
Susan B. Anthony: Fighter for Freedom and Equalilty (Biographies (Picture Window Books))by Suzanne Slade is a great introduction to Susan B. Anthony and why she is so much more than just a lady on coins. Although we often think of her as a suffragette she was also a champion of human rights and abolitionist. She fought for women’s right to vote to know that she herself would never get the right. This book explains all that in terms kids can understand and relate to.
Elizabeth Leads the Way: Elizabeth Cady Stanton and the Right to Voteby Tanya Lee Stone made me teary-eyed. If you aren’t familiar with Elizabeth Cady Staton grab this book because not only will it catch you up on the life of this women’s rights activist, it will also let you feel her sense of justice and determination. I wrote down the quote ” …wasn’t interested in easy.” which was in reference to her father saying she should have been born a boy so she would fit in better, but is a great quote for anything and anyone.
Eleanor: Quiet No More by Doreen Rappaport is an inspiring look at Elanor Roosevelt’s life and legacy. Readers learn about Eleanor’s childhood, being orphaned and sent away to school in England where she experienced independence for the first time. It covers her romance and marriage with FDR in a sweet, loving way that won’t make your child cringe about “mushy” things but they will understand that there were real life and partnership. There is ample information about her work over the years as a politician’s wife as well as the First Lady. My favorite part of the book was all the fantastic quotes woven into the biography, it connects the reader to her and not just her story.
Terry Walker says
Thank you! Wonderful books! I find kids of all ages love picture books and being read too. I love the books you chosen and plan to acquire a set for my classroom.
You and your work inspire me to be a better and better homeschooler ea. day. Thanks for all you do!
Allison McDonald says
Thank you Stella!
But nobody ever remembers Sarah Josepha Hale… There’s a picture book about her, too! It’s called “Thank You, Sarah” and it talks about one of the many contributions she made to her country. She was truly an amazing woman.
Pari' - B4Schools says
Hi Allison! What a great list you have here! I read everything Anne Frank I could get my hands on as a kid and re-read some of her work as an adult. She was truly a lovely soul and more amazing women like her need to be read about!
I’m going to feature your book list for today’s B4Schools #Freedom #Friday post! Every Friday, B4Schools posts an inspiring story, photo, list etc. about freedom. We want to keep the conversation about liberty constant and for people to embrace choice and innovation on all fronts.
Why do we care? B4Schools is empowering schools to make more out of their budget so they can provide better education for their students, pay teachers more, update their facilities, whatever necessary! We believe When Schools Save, We All Win.
We launch November 3rd so mark your calenders because that’s the day you can start saving BIG (up to 53%) off on toilet paper, paper towels and trash bags and we’re open to ALL schools and ALL entities! We look forward to seeing you via FB, Twitter and Pinterest 🙂
What a good list….I had been looking for books about great women in history for my son…this is a great help…Thanks…
Love the poster – where can I get one? Hopefully, it is not out of print. | <urn:uuid:3d6d7b94-cd73-4e3b-af82-0ff5af3a6c3e> | CC-MAIN-2023-23 | https://www.notimeforflashcards.com/2014/01/books-about-women-who-changed-history.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652494.25/warc/CC-MAIN-20230606082037-20230606112037-00084.warc.gz | en | 0.972038 | 2,511 | 3.296875 | 3 |
MONDIALAB’s UAE-based developers claim product will hand back control of viral outbreaks and pandemics to health authorities.
Meanwhile on January 29, 2020, the Institut Pasteur, which is responsible for monitoring respiratory viruses in France, sequenced the whole genome of the coronavirus known as “2019-nCoV”
A new report, Vital Signs just published this month from Centers for Disease Control & Prevention (CDC) indicates just how far proposed federal efforts must go to put an end to the American HIV epidemic. Far too many Americans with HIV are unaware that they have it.
Today, December 1, 2019, MONDIALAB PRO joins millions around the world in recognizing World AIDS Day. Beginning in 1988, World AIDS Day became a way to raise awareness about the AIDS pandemic. The theme of this year’s World AIDS Day is “Communities make the difference”.
A grand total of 2.15 million cases of tuberculosis (TB) were reported in 2018, an increase of 17% of 1.8 million cases in 2017. Per the report, the sustained efforts of the government of India towards TB control have led to an unprecedented increase in TB notifications and improvements in diagnostics.
Health emergencies have been met with a cycle of neglect and panic for far too long – an method that is putting everyone one of us at growing risk. Governments across the globe must start thinking and planning ahead and significantly boost funding at the community, national, and international level.
The time is now for the world to get much more serious in responding to the second worst Ebola crisis in history. The Ebola outbreak in the northeast region of the Democratic Republic of Congo is this crisis, ongoing for a year now and claiming the lives of nearly 2,000 people as a result. | <urn:uuid:6092b51b-ce6b-4886-bb50-15a661ad3d08> | CC-MAIN-2023-50 | https://www.mondialab.com/category/design/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100593.71/warc/CC-MAIN-20231206095331-20231206125331-00790.warc.gz | en | 0.945826 | 370 | 2.671875 | 3 |
Singapore, officially the Republic of Singapore, and also known in the region as Singapura, is an island country in Southeast Asia, located at the southern tip of the Malay Peninsula. It has a very diverse population of more than five million, comprising Chinese (74%), Malays (13%), Indians (9%), and minorities of Eurasians (people of mixed heritage), other Asians, and non-Asians. The nation's official languages are English, Mandarin, Malay and Tamil.
Singapore became part of the British Empire in the early 19th century and was a major trading post in the region. It was occupied by the Japanese from 1942 to 1945 during World War II, and was returned to the British after the war. In 1963, Singapore joined Malaya and Sabah and Sarawak to form Malaysia, but separated from Malaysia in 1965 and became an independent country.
Singapore is currently one of the world's leading financial centres and its port is among the busiest in the world. It is governed by a parliamentary republic, with the President as the head of state and the Prime Minister as the head of government.
Spanking in Singapore
Spanking (predominantly in the form of caning) is widely used as a disciplinary measure in Singapore, in various contexts - judicial, prison, military, reformatory, school and domestic. The traditional and most commonly used spanking implement is the rattan cane. Little is known about consensual spanking and BDSM in Singapore.
Judicial and prison caning
Singaporean law includes JCP (in the form of caning, up to a maximum of 24 strokes) for various crimes, including vandalism, robbery, rioting, sexual abuse and unlawful possession of weapons. It is mandatory for offences like rape, drug trafficking, and for male foreigners who overstay their visa by more than 90 days. Male criminals not sentenced to caning in court may, however, be punished by caning of up to 12 strokes if they break certain rules in prison. Only men below the age of 50, and who have been certified medically fit by a doctor, may be subjected to caning. Women are exempted from caning. On average, a few thousand men are caned every year, but in recent years (2007-2011), the number of caning sentences is decreasing.
The rattan cane used is 4 feet (1.2 m) long and 1⁄2 inches (1.3 cm) thick, and is soaked in water (not brine) to make it more flexible and prevent it from splitting, and treated with antiseptic to prevent infection. A smaller cane is used for juveniles (boys under 16), who may be sentenced to caning only by the High Court and not by the local courts. There are a few dozen of such canings of boys per year.
Caning is always ordered in addition to a jail sentence and never as a punishment by itself. Contrary to widespread belief, it is never administered in public, and has never been. The prisoner will not receive any advance notice as to when he will be caned, and is only notified on the day itself. He is ordered to strip completely naked; the prison doctor then examines him to see if he is medically fit, by measuring his blood pressure and other physical conditions. If the doctor certifies him fit, the prisoner will be caned, but if the doctor declares him unfit, he is exempted from caning and is sent back to court for his jail term to be increased instead. A prison officer confirms with the prisoner the number of strokes he is to receive.
The prisoner is brought to the caning trestle and bends over a padded crossbar on the frame, with his wrists and ankles secured tightly to the frame by strong leather straps. He is now restrained in a bent-over position with his legs together, at an angle of close to 90° at the hip. Protective padding is tied around his lower back to protect the kidney and lower spine area from any strokes that land off-target. The caning is administered on the prisoner's bared buttocks.
The specially trained prison officer administering the caning will then position himself beside the frame to take aim. He delivers the number of strokes specified in the sentence, at intervals of 10-15 seconds, using full force (as required by law). The caning is carried out in a single session, and not by 'instalments'. If the prisoner faints during the punishment, or if the doctor certifies that he cannot receive any more strokes due to his condition, the prisoner will be sent back to court for his jail time to be increased.
This form of caning is very severe and will usually draw blood and leave permanent scars. The cane is so flexible that 'wrapping' (the cane striking the side of the far buttock at the hip area, especially on the right side) frequently occurs, as seen in these pictures: , . Men who have been caned before described the pain they experienced as "excruciating" and "unbearable". After the caning, the prisoner is untied and given medical treatment. Antiseptic lotion is applied on the wounds, which take between a week and a month to heal.
Singaporean men who have been subjected to judicial caning are not required to undergo compulsory military service if they have not done so.
Differences between judicial caning in Singapore and in Malaysia
- In Malaysia, local courts may order the caning of boys under 16. In Singapore, only the High Court may do so.
- In Malaysia, the term "caning" is often used informally, and the phrases "strokes of the cane" and "strokes of the rotan" are used interchangeably, but officially the correct term is "whipping" in accordance with traditional British legislative terminology. In Singapore, in both legislation and press reports, the term "caning" is used to describe the punishment.
- In Singapore, no man above the age of 50 can be sentenced to caning. In Malaysia, however, this age limit has been abolished for rapists. In 2008, a 56-year-old man was sentenced to 57 years' jail and 12 strokes of the cane for rape.
- The Malaysian cane is marginally smaller than the Singaporean one but there are no discernible differences when first-person accounts from both countries are compared. In Malaysia, a smaller cane is used for white-collar offenders but there are no reports of any such distinction being made in Singapore.
- The "torso shield" that covers the offender's lower back and upper thighs while leaving the buttocks exposed is used only in Malaysia. In Singapore, rubber-lined padding is secured around the prisoner's lower back to protect the kidney and lower spine area from any strokes that land off-target. This is also a reason why 'wrapping' hardly occurs in a Malaysian caning, and the wounds are more concentrated around the middle of the buttocks (because the sides are covered by the torso shield). In Singapore, 'wrapping' occurs nearly all the time, because there is a very high tendency for the flexible cane to hit the side of the far buttock near the hip area (usually on the right side), which is not covered by any padding.
- The frame used to secure the prisoner in Malaysia is different from that used in Singapore. In Malaysia, the inmate stands upright (albeit leaning slightly forward) at the A-frame with his legs apart, while in Singapore the offender bends over a padded crossbar on the caning trestle with his feet together.
- In Malaysia, men have sometimes been sentenced to more than 24 strokes, such as in a case in 2004 when a man was given 75 years' jail and 50 strokes of the cane for molesting his stepdaughter. There are no reports of any man being sentenced to more than 24 strokes in a single sentence in Singapore.
- Syariah caning is practised in Malaysia, but not in Singapore. This form of punishment is applicable only to Muslims (both Malaysian and non-Malaysian).
Notable cases involving foreigners
Shades of Singapore book
Within months of the Michael Fay incident, a paperback book titled Shades of Singapore: Sister Sarah Balfour's Memoirs of Judicial Caning in South Africa, Vol. I, by Angus Balfour (New York: Blue Moon Books, 1994), was published. This 294-page novel of punishment erotica purports to be the memoirs of a retired Nursing Sister who took part in dozens of court-appointed canings of women in pre-war South Africa.
The original title, Judicial Female Corporal Punishment Memoirs, appears on the contents page. It is indicative of the widespread notoriety of the Fay controversy that a book set in South Africa in the 1930s would have its title hastily altered to capitalise on a contemporary incident in Singapore.
Military caning
In Singapore, all male citizens who have reached the age of 18 are required to serve in the military (Singapore Armed Forces, SAF) for about two years. A soldier who breaks certain military rules can be sentenced to a maximum of 24 strokes of the cane (a maximum of 12 strokes per offence) by a military court or the officer in charge of the SAF Detention Barracks.
Military caning is less severe than judicial/prison caning and is designed not to cause bleeding or permanent scars. The soldier is bound to a caning trestle (similar to the one used in judicial/prison canings) in a bent-over position, and receives the strokes on the buttocks, which are covered by a protective cloth to prevent cuts. The cane used is 1⁄4 inches (6.4 mm) in diameter (half the thickness of the judicial/prison cane) though it is about the same length.
Reformatory caning
Caning is also used as a form of legal corporal punishment in reformatories, where juvenile delinquents below the age of 16 are detained.
The managers of these reformatories have the authority to order detainees to be caned for committing serious offences. A maximum of 10 strokes can be administered. The type of cane used is similar to the one used in ordinary secondary schools. The punishment is administered in private. Boys can be caned on the hand or on the bottom over clothing. Girls may be caned only on the palm of the hand, and this is the only form of official corporal punishment in Singapore that can be applied to females.
School caning
Singaporean schools are known for their strict and high standards of discipline. School uniforms are mandatory (except in some private schools). School corporal punishment exists in the form of caning and is applicable only to schoolboys; it is illegal to cane schoolgirls. The implement used is a light rattan cane of about four feet long. Government regulations state that the student cannot receive more than six strokes (but the majority of canings range from one to three strokes), and may be caned only on the palm of the hand (hand caning) or on the buttocks over clothing. Hand canings are very rare, with Saint Andrew's Secondary School (an all-boys school) being one notable exception, as students are just as likely to be caned on the hand as on the bottom.
Boys are typically caned for committing serious offences like fighting, smoking, cheating in tests/examinations, gangsterism, vandalism, showing disrespect towards teachers, and truancy. In the hierarchy of penalties, caning comes after detention but before suspension and expulsion. Students may also be caned for repeatedly making minor offences, such as being repeatedly late for school in a term. The punishment can only be administered by the principal, vice principal, or a specially designated and trained 'Discipline Master'.
The caning is administered in a formal and ritualistic manner, similar to the traditional British style - the boy adopts either a bent-over position (bending over a desk or a chair) or leaning position (placing his hands or elbows on the desk and leaning slightly forward), and receives a number of hard strokes on the buttocks over his uniform trousers (primary and lower secondary students wear shorts, while upper secondary students wear long pants). Sometimes, before the caning, the discipline master will tuck a protective item (a book or a file) into the boy's trouser waistband to protect the lower back from strokes that land off-target, and then pull the boy's pants tight across the target area. In some schools (especially all-boys schools), following British traditions, the student may be asked to change into PE attire for the punishment, because PE shorts are apparently thinner than the usual uniform trousers.
School canings usually take place in private inside the school office (with the principal/vice-principal and another teacher around to witness the punishment), but boys who have committed very serious offences may be caned in public - in the classroom in front of their classmates; or on stage in the assembly hall in front of the whole school population, to serve as a warning to potential offenders. A 'public caning' is a very solemn ceremony, as the principal will usually announce to the school why the student is being punished, and the student may be asked to read out a public apology before or after the caning.
Boys of any age from 6 to 19 may be caned, but the majority of canings are of secondary school students aged 14 to 16. The education ministry recommends that the student receive counselling before and/or after his caning.
Routine school canings are naturally not normally publicised, so cases only get reported in the press in rare special cases.
Domestic corporal punishment
According to a survey conducted by the Singaporean newspaper The Sunday Times in January 2009, out of 100 parents surveyed, 57 said that caning was an acceptable form of punishment and they had used it on their children. Parents usually punish their children (both boys and girls) for disobedience or lying, and this form of punishment is not illegal in Singapore. The government does not particularly encourage this, and parents may be charged with child abuse if their children get injured.
The most common implement used is a thin, whippy rattan cane, about 65cm long, with a plastic hook at the end, which comes in a variety of colours. They are easily available in grocery shops around the country. Each cane costs about 50 Singapore cents. Sometimes, parents may use other implements like feather duster handles, rulers, and clothes hangers. The child is usually beaten on the buttocks, thighs, calves or palm of the hand. This type of punishment usually leaves the child with marks that will fade in a few days.
Singaporean spanking artists
None known so far.
See also
- Singapore Criminal Procedure Code
- Judicial Caning in Singapore, Malaysia and Brunei on World Corporal Punishment Research
- Computer-generated visualisation of the successive stages of a judicial caning on the Internet Archive
- Real Life Singaporean Spanking Stories. A Singaporean spanking blog by Cedric Foo, containing several (most probably fictional) domestic spanking stories set in Singapore.
- The State of Discipline: Chinese Masculinity and BDSM in Singapore (Thesis)
|This page uses content from Caning in Singapore. The list of authors can be seen in the . As with Spanking_Art, the text of Wikipedia is available under a copyleft license, the Creative Commons Attribution Sharealike license.. The original article was at| | <urn:uuid:73ba79ec-efca-4906-9e99-89ff1e8af5cd> | CC-MAIN-2014-42 | http://spankingart.org/wiki/Singapore | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119645845.57/warc/CC-MAIN-20141024030045-00195-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.959893 | 3,197 | 2.546875 | 3 |
Delve into the world of Android Programming with this compact guide that introduces you to UI Design!
Android is an operating system based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablet computers. Android’s user interface is based on direct manipulation, using touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching and reverse pinching to manipulate on-screen objects.
In this eBook, you will get a look at the fundamentals of Android UI design. You will understand user input, views and layouts, as well as adapters and fragments. Furthermore, you will learn how to add multimedia to an app and also leverage themes and styles.
With this free eBook you will also receive weekly news, tips and special offers delivered to your inbox courtesy of Java Code Geeks.
Offered Free by: Java Code Geeks
See All Resources from: Java Code Geeks | <urn:uuid:8c64b9ad-5b02-4f76-961c-018c0f5e211e> | CC-MAIN-2023-40 | https://engineeringresources.spectrum.ieee.org/free/w_java08/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00226.warc.gz | en | 0.913256 | 188 | 2.921875 | 3 |
Pulligoda galge frescosFive and a half kilometers south of Dimbulagala temple are the little known Pulligoda galge frescos. Crossing a delightful little lake named Hitcha Pitcha wewa, and circuiting the changing range-scape of Dimbulagala, an unsealed road leads you to this lonely grotto.
A short climb up through a maze of jungle and rock boulders, and guided more by instinct than by a path, you reach this forgotten pocket, considered a milestone in the history of our artistic heritage. A fragment of colors are seen on the rock wall of the shallow cave.These may have at one time covered a wider surface.
The surviving fragments depict five male figures seated on lotus cushions placed on a broad seat which may have been a fragment of a larger scene of devotees in an attitude of veneration. Art scholars have described it thus: the male figures depicted here have reached a stage of mental attainment (sovan, sakradagami, anagami or arhat) as signified by the oval aura shaded red behind each head. The saintly figures are seated with their legs crossed. Their soles painted red with cosmetics like their palms. The lower garments consist of pantaloons reaching down to the ankle of plain red or stripes. Their head dresses vary distinguishing two figures as Brahmins. Another wears a white band of sacred thread across the bare upper body marking a sage. Ear rings, necklaces, armlets and , bracelets are also worn.. One figure is green in complexion. One of figures holds a lotus bud with the stalk while the left arm is folded and held across the chest in a charming gesture of offering. The others seem to hold their palms together in graceful worship. The pigments of earthy red, ochere, yellow and green stands on a background of white with small circular designs.The frescoes even after many years still remain vibrant in their impact radiating spirituality.
The dating of these frescoes are subject to debate. Some scholars believe that they are contemporary with the Polonnaruwa paintings (12th century), while others propose by referring to the material technology a date as early as the 4th century AD. (even older than Sigiriya.)
by Kishanie S. Fernando
Dimbulagala Raja Maha Vihara & Forgotten frescoes at Pulligoda Galge - by Kishanie S. Fernando
Other Sites Around Pulligoda galge frescos
March 26, 2007 | <urn:uuid:95bfbc0d-3a0c-455a-9cbd-b2c91b49c123> | CC-MAIN-2014-15 | http://www.angelfire.com/in4/pollonnaruwa/pulligoda_frescos.htm | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533957.14/warc/CC-MAIN-20140416005213-00246-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.942462 | 523 | 2.671875 | 3 |
Geographic Information System/Planning
The GIS (Geographic Information System)/Planning Option is designed to offer students a mix of technical skills and academic education that prepares them for careers in local, state, and federal planning as well as opportunities in private consulting firms that are involved in the planning process. The GIS/Planning Option recognizes the growing importance of Geographic Information Systems and Science in our society and how these analytic tools are applied in a wide variety of settings. The GIS/Planning Option takes advantage of excellent GIS facilities, lab space, expertise, and software available on campus and allows students to learn in an active hands-on environment. Students are prepared as map makers (cartographers) spatial analysts, and planners.
GIS/Planning Curriculum Sheets | <urn:uuid:dfd2f692-0477-47ee-828f-afef387446b1> | CC-MAIN-2017-26 | http://www.montana.edu/earthsciences/programs/GIS.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320003.94/warc/CC-MAIN-20170623045423-20170623065423-00047.warc.gz | en | 0.914889 | 161 | 2.65625 | 3 |
Recurrent miscarriage is defined as two or more consecutive, spontaneous pregnancy losses.
Approximately 15% of pregnancies end in miscarriage, which is defined as the loss of a pregnancy before 20 weeks of gestation. Most miscarriages occur within the first 12 weeks of gestation. “Recurrent miscarriage,” also known as “habitual pregnancy loss,” is commonly defined as three or more miscarriages. When miscarriage occurs this frequently, there may be an underlying cause such as a genetic defect. Other causes include an abnormally shaped uterus, uterine fibroids, and scar tissue in the uterus that may hinder implantation or growth of the fetus. Hormonal imbalances of prolactin, thyroid hormone or progesterone can result in miscarriage. Illnesses such as diabetes mellitus or immune system abnormalities may increase the chance of miscarriage.
Treatment for recurrent pregnancy loss can involve a range of options including careful monitoring and pre-natal care, surgery, hormone therapy, antibiotics and the use of procedures such as in vitro fertilization. Appropriate treatment has proved to be both safe and effective for most couples.
Your medical history, a pelvic exam, and one or more of the tests listed below are necessary in diagnosing possible causes of your recurring miscarriages:
Miscarriages appear to be a natural process to protect a woman from a pregnancy that is abnormal. Most losses are due to a chromosomal abnormality of the embryo. However, a variety of other factors can contribute to continued failure to carry a pregnancy. In some cases, genetic factors can prevent an embryo from developing normally. In other cases, conditions affecting the uterus, metabolic causes, environmental factors, infections, hormonal disorders, and possibly clotting disorders can affect a woman’s ability to carry a pregnancy.
A genetic problem with a developing embryo or a genetic condition that affects one or both parents may result in recurrent miscarriages.
As many as 50-70% of all early pregnancy losses are believed to be caused by abnormalities in the chromosomal makeup of the embryo. These errors typically occur early in the oocyte (egg) maturation process and less commonly during sperm maturation.
In some cases, one or both parents may have a chromosomal abnormality, resulting in an embryo with too much or too little genetic material. We can evaluate a couple’s chromosomes with a test called a karotype analysis. While some genetic issues affecting parents are undetectable, we can now test embryos for certain genetic abnormalities before they are transferred back to the uterus during in vitro fertilization. This process is called pre-implantation genetic diagnosis (PGD).
The process of implantation is hormonally regulated and requires a synchronized interaction between the implanting embryo and the lining of the woman’s uterus (endometrium). Factors that alter this relationship can result in pregnancy losses.
The hormone progesterone, produced by the ovaries in the second half of a woman’s ovulatory cycle, is necessary for the establishment and maintenance of pregnancy. The relationship between the hormonal environment of early pregnancy and implantation is intricate and, not very well understood.
Anatomical or structural problems with a woman’s uterus, including polyps, fibroids, or congenital defects, can result in miscarriage or complications later in pregnancy. An ultrasound test (saline sonography) or an X-ray test (hysterosalpingogram, or HSG) can reveal many structural abnormalities of the uterus. Occasionally, additional imaging studies may be required. Fortunately, many abnormalities of the uterus can be corrected through surgery.
It is clear that there is a special relationship between the uterus and the immune system, but the exact nature of this relationship is not well understood at this time.
Two antibodies, lupus anticoagulant (LAC) and anticardiolipin antibodies (ACA) are believed to promote fetal death by causing clotting in the early placental circulation. Other classes of antiphospholipid antibodies have been investigated, but none have yet been found to be associated with recurrent miscarriages. Testing for ACA and LAC are performed on all recurrent pregnancy loss patients. Treatment involves the use of low dose aspirin and other anti-clotting medications.
Abnormalities of certain white blood cell functions have been proposed as a potential cause of miscarriage, but no meaningful data exists to support this as a cause of miscarriages. The field of immunology is evolving and our approach to screening and treatment may change as more scientific research becomes available.
Women who have had repeated miscarriages often ask about a link between miscarriage and environmental factors such as smoking, caffeine, and alcohol use and exercise. While some studies suggest that environmental factors may cause sporadic pregnancy loss, a link with recurrent pregnancy loss has not been firmly established. We generally advise all pregnant women, but especially those with a history of recurrent loss, to avoid smoking (including second-hand smoke exposure), excessive caffeine intake (more than two cups of coffee/day) and alcohol use. There is no evidence to suggest that exercise increases a woman’s risk of pregnancy loss. However, there are no studies suggesting that strenuous exercise is safe for recurrent loss patients. Therefore, as a precaution, we suggest that women avoid strenuous aerobic exercise. In addition, there is some evidence to suggest that women with a history of miscarriage should avoid exposure to biohazards, solvents or certain industrial chemicals that are known to have an effect on a developing fetus. Your doctor can help you evaluate your risk of exposure to these materials if this is a concern.
It is believed to be unusual for an infection to cause a miscarriage and it is extremely unlikely that infections cause multiple pregnancy losses. Some suspected but unproven infectious causes of pregnancy loss include the bacteria mycoplasma, ureaplasma and Chlamydia. Screening is done through cultures and we are typically able to eliminate those problems during the evaluation.
Diseases affecting the endocrine system, especially those that are relatively mild, do not appear to increase the risk of miscarriage. However, certain disorders, including uncontrolled diabetes or thyroid disease are known to increase a woman’s risk of miscarriage. In addition, women with Polycystic Ovary Syndrome are at increased risk for sporadic loss, but the condition has no proven association with recurrent pregnancy loss. Based on an individual’s health history, we may recommend an evaluation for an endocrine disorder. In many cases these conditions can easily be managed with medication and should be corrected prior to further attempts at conception.
Thrombophilias, the tendency to form blood clots, appear to be associated with a variety of problems in pregnancy, although studies are inconclusive. Research suggests a link between thrombophilias and pregnancy-related problems in the second and third trimester. These include fetal growth problems, fetal death, pregnancy-induced hypertension and placental separation. However, the association between thrombophilias and first trimester loss is controversial. Testing for thrombophilias is based on an individual’s health history. Most cases of thrombophilias can be treated with low dose aspirin and other anti-clotting medications.
For about one third of all couples that experience recurrent pregnancy loss, the cause is attributable to more than one factor. In these cases, multiple treatments may be required. However, for nearly half of all couples with recurrent pregnancy loss, no cause is revealed by the evaluation.
For couples with no evident cause of recurrent loss, studies suggest that chromosome abnormalities of the embryos are the most likely explanation. For these couples, as well as couples with known chromosome abnormalities, a technique called pre-implantation genetic diagnosis (PGD) used in conjunction with IVF may be beneficial. Using PGD, we can test embryos that have been grown in the laboratory for specific genetic abnormalities prior to transferring the embryos into the uterus. The goal of PGD is to reduce the risk of a miscarriage.
Overall, PGD appears to be safe and effective. However, like all treatments, there are limitations. Your physician can help you determine if PGD is right for you.
Recurrent pregnancy loss can be an emotionally difficult experience for couples that want to have a baby. In addition to treatment, many couples find that they benefit from emotional counseling and support services, as well as relaxation therapy. These helpful services are available at ARMG through our Complementary Care program. Fortunately, a thorough medical evaluation and proper treatment can, in many cases, help couples that experience recurrent pregnancy loss to have a successful pregnancy and birth. A majority of couples that experience three or more losses are eventually able to deliver a baby. A comprehensive evaluation and treatment of any identifiable causes of loss is essential for maximizing the chances for success. | <urn:uuid:294148b1-bd2d-44e9-9ffb-a3d30b05eeaa> | CC-MAIN-2018-17 | https://www.armghawaii.com/reproductive-endocrinology/recurrent-pregnancy-loss/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948617.86/warc/CC-MAIN-20180426222608-20180427002608-00264.warc.gz | en | 0.94967 | 1,806 | 3.390625 | 3 |
Mr. Schaffer's math class is specifically designed to positively push students in the right direction when it comes to math and understanding how this basic subject is vital to one's future (see below for math quotes).
Why is math so important? Some have asked, "Why is math so important?" Well, listen to what others throughout history have said...
"God used beautiful mathematics in creating the world." ~Paul Dirac
"Without mathematics, there's nothing you can do. Everything around you is mathematics. Everything around you is numbers." ~Shakuntala Devi
"Pure mathematics is, in its way, the poetry of logical ideas." ~Albert Einstein
"Mathematics has beauty and romance. It's not a boring place to be, the mathematical world. It's an extraordinary place; it's worthy spending time there." ~Marcus du Sautoy | <urn:uuid:81928600-5449-47b4-8e4e-b4c16da4e9a3> | CC-MAIN-2017-43 | https://jjschaffer.weebly.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826642.70/warc/CC-MAIN-20171023202120-20171023222120-00492.warc.gz | en | 0.920879 | 177 | 2.921875 | 3 |
Previous Challenge Entry (Level 3 - Advanced)
Topic: Christmas Cooking/Baking (not recipes) (10/16/08)
By Kenneth Heath
LEAVE COMMENT ON ARTICLE
SEND A PRIVATE COMMENT
ADD TO MY FAVORITES
It was a hot November evening and Simon was pouring over a mountain of recipe books. Tradition, tradition, why do we always have to follow tradition he mused, as he looked for the ultimate glazed gammon recipe. He had found sixteen variations on a theme and each sounded equally as tasty.
“Where would we be without our tradition?” said Tevye in Fiddler on the roof. “Because of our traditions we have kept our balance for many years, and how do we keep our balance? Only one way, “Tradition”, and because of our tradition each one of us knows who he is and what God expects us to do.”
Why not break with tradition this Christmas, thought Simon. For the past three hundred years, his forefathers had been cooking traditional “English” Christmas fare. The thought of it made him sick as he visualized the traditional menus of the past.
They would all assemble around the dining table, give thanks and then the feasting would begin. Seafood or fruit cocktail would kick off this meal with appropriate wines served, just at the correct temperature to get those taste buds working. Then, there was the traditional Christmas cracker popping session, with everyone placing those silly hats on their heads and playing with the toys that were inside the crackers.
Next, followed a steaming bowl of Avgolemono (chicken, egg and lemon) soup, a firm family favorite, served with Portuguese rolls and Rose wine. Bringing out the big guns, the host would now display his collection of Cape wines for his guests to choose from. A Cabernet Sauvignon or a Pinotage for him and a semi-sweet Groot Constantia white for the ladies and then it was time to carve the roasts.
Many animals had contributed to this feast. Firstly, there was the amazing fowl roast that consisted of a bacon-larded de-boned turkey, inside of which there was a de-boned lemon basted duck and inside of it was a large de-boned chicken complete with stuffing. Once sliced there would be a ring of varied layers of fowl and stuffing. Then, there was the traditional glazed gammon, roast silverside of beef and a succulent leg of lamb. The vegetables consisted of roast potatoes, honey-peas, baby carrots in a butter sauce, cauliflower in a cheese sauce, brussel sprouts, rice and Yorkshire pud. The sauces came next, mustard, cranberry, apple, mint and the traditional beef gravy.
For desert there was the Christmas pudding with custard, assorted jellies, trifles and ice cream. Naturally, a traditional Christmas meal would not be complete without cheese and biscuits and a good Sherry or Port to round it off. Chocolates and filter coffee would follow before the guests would slowly sneak off for an afternoon nap or sit around listening to Boney M’s latest Christmas CD.
“Enough! Time for some new traditions,” said Simon as he reached for Hildagonda Duckitt’s “Where is it?” cookbook. It was published in 1891 and is an authority on the cultural and culinary history of the early settlers to southern Africa, and so began Simon’s exploration of uniquely African dishes, dishes that he could prepare for all his guests on Christmas day.
Bearing in mind the fierce December heat, he planned his menu around cool dishes and dishes that could be prepared in advance so that he could also spend time with his guests instead of in the kitchen.
Starters would be Ingelegde Visch (pickled fish), Kreeft (lobster) salad and a fruit salad with thick cream or yoghurt and wine jellies. A chilled curried butternut soup would follow together with slices of hot pot bread and farm butter.
A large leg of “Kudu” (a succulent and extremely tasty venison) roasted in the Weber along with the smoked hind leg of a Warthog (wild bush pig), “Babotee” (curried mince, egg, raisin and almond dish) served with assorted chutneys and sassatees (type of kebab) would round off the meat dishes. Yellow rice with raisins, would be served along with cinnamon pumpkin, stuffed vegetable marrow, “Mfino,”(a spinach and ground maize dish) and assorted salads.
Pudding would be “koeksusters”, milk tart and brandied figs and peaches in ice cream. Lemon punch, Cape wines and Van Der Hum and Orange liqueurs would round off a most memorable meal. Filter coffee would be served with “Soetkoekies”(sweet biscuits), Ginger nuts and Almond Macaroons.
Simon smiled as he finished his menu, “Here’s to the start of a new tradition, for what we have to eat and drink, we praise thy name O lord.”
The opinions expressed by authors may not necessarily reflect the opinion of FaithWriters.com.
Accept Jesus as Your Lord and Savior Right Now - CLICK HERE
JOIN US at FaithWriters for Free. Grow as a Writer and Spread the Gospel. | <urn:uuid:e93600b7-4e75-44de-b99e-1ffae3fd4dad> | CC-MAIN-2017-04 | http://www.faithwriters.com/wc-article-level3-previous.php?id=26079 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00136-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.963663 | 1,167 | 2.625 | 3 |
The MAIN STREET Cybersecurity Act of 2017 is definitely going to be passed by the U.S. Senate which would necessitate the National Institute of Standards and Technology (NIST) to make cyber security better amongst all small businesses. In reference to the National Cyber Security Alliance, the Act states that 60% of small businesses are closed down within a period of six months because of cyber-attacks. This is why protecting them is important to the economy of the United States.
The Act was ratified by the Committee on Science, Transportation and Commerce. It now needs to be approved by both the houses of Congress and then be signed by the President to become official. Here are five things which should be known about the law:
1. Guidance of NIST: Once the bill is passed the NIST would develop guidance resources to aid the small businesses, they can safeguard themselves from the rising pressures of cyber security. The guidance would be developed and completed within a year’s time as per the actual text of the Act and encourage “effective and usable” practices which would be grounded on international standards.
2. Small Business Version of the CSF: An outline was released in 2014 by the National Institute of Standards and Technology to the Cyber Security Framework (CSF) to institute the best practices of cyber security in big establishments. In a research conducted by Tenable revealed that this had been implemented by 29% of the organizations in United States who had more than 100 employees and 14% more were planning to embrace it in 2016. Several organizations also said that they would need much high investments to implement it.
3. Varying Criteria: The guidance will vary depending on the nature and size of the business and the sensitivity and nature of the data the business deals in. Several small businesses that handle sensitive information are already complying with different regulations in place such as PCI and HIPAA, which of course would not be affected.
4. Technology Neutral: The guidance states that all the practices which need to be executed would be using technologies which are commercial and already exist. Also included in the practices are “simple basic controls”. Just like Cyber Security Framework this will also be advised instead of being made obligatory. This means that just like CSF most of the organizations who are adopting the guidance will exclude the applications which they think are costly.
5. Almost Sure to Become Law: The act is supported and sponsored by two parties and is stable with the Small Business Development Cyber Strategy enacted in 2016. In a situation where cyber threats have become alarming and the news headlines are being flooded with such cyber-attacks the bill of MAIN STREET Cybersecurity Act of 2017 is sure to be passed in one of the congressional sessions as both the sides agree to have it implemented.
Why has Cyber Security become so Important?
In another recent cyber-attack Netflix was targeted where the series of ‘Orange is the New Black’ was stolen online from the channel. A ransom was demanded but when Netflix refused to pay the ransom to the cyber-criminal, they uploaded the series on the internet which could be downloaded by anyone through torrent.
According to a report generated by Verizon Communications Inc., criminals encrypt user data with malicious software and then ask for money to unencrypt this data. These happening increased by 50% last year. Earlier attackers targeted individual customers but now they are going after businesses and organizations whose security system is susceptible. In a report generated by McAfee Inc. in partnership with Verizon it was seen that the most targeted for ransom were government organizations, after which came health care companies and then financial services.
These cyber criminals ask the ransom to be paid in bitcoin. Bitcoin is a digital currency. In all the cases the malware was delivered through infected websites. However, many criminals have also used emails with attachments which when downloaded infected the website with malware. The report also said that these emails were targeted at some certain job functions such as finance or HR.
In another breach that happened at Yahoo, attackers stole customer information which comprised from emails to account passwords. There were around 500 million customer accounts. Companies offering financial services are obvious targets however recently government firms, manufacturing industries, educational institutes and universities have also come on the target list of the criminals.
Cyber-crimes have become extremely high from spamming emails to extortion for money, they seem to be everywhere. From individuals to corporates, everyone needs to be on their guard. Even though there are hundreds of reports which are registered there are many who don’t approach the law because they are embarrassed to come up and take help. This attitude needs to be changed and help should be taken from the right people to avoid such attacks in futures. | <urn:uuid:b3e43003-7985-4d92-9d6a-b973651b1371> | CC-MAIN-2019-09 | https://tutorials.hostucan.com/5-things-you-need-to-know-about-the-small-business-cybersecurity-act | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249406966.99/warc/CC-MAIN-20190222220601-20190223002601-00300.warc.gz | en | 0.977843 | 956 | 2.546875 | 3 |
During war, the Green Berets operate alone in enemy territory. After the war, they serve to establish an environment where official agencies can organize and function. Once the United States is successful in defeating a foreign military, the toppled government leaves a power vacuum -- put simply, there is no one in charge.
The United States has a stated policy against nation-building.This means that the nation does not invade countries in order to change their structure to better suit the nation's interests. Although this is the official policy, once a government has been toppled, it's almost inevitable that the conquering power must take some action to restore order and influence government.
During their time spent amassing guerrilla armies, interacting with locals and gathering intelligence during wartime, the Green Berets are in a unique and useful position to identify the friendliest group that is likeliest to fill the power vacuum. This is part of the post-hostility (the period immediately following war) role that Green Berets play. By advising group leaders and offering the support of the United States, Green Berets act as underground diplomats and help foreign groups come to power after a government has been toppled.
One of the best ways for the United States to keep itself out of entering a war is to train other nations to defend themselves -- foreign internal defense. Detachments travel to foreign nations friendly to the United States and teach their military organizations in counterterrorism, counterinsurgency and other methods to maintain power and deal with threats from within and outside the country. Green Berets also serve as liaisons between the governments of those nations and the United States. This type of training and advising also extends to nations dealing with major drug trade organizations -- Green Berets' counterdrug operations.
Others Green Beret operations have evolved out of the changing face of the modern socio-political climate. Counterproliferation activities, for example, are a fairly recent duty charged to Special Forces groups. In this, Green Berets identify, find, and remove or render useless weapons of mass destruction (WMDs), also referred to as nuclear, biological and chemical weapons (NBCs).
Counterterrorist activities have also emerged as an important role the Green Berets play. In addition to carrying out counterterrorism operations around the world, the Green Berets have worked within the United States. Faced with a lack of Arabic-speaking agents and evidence of a real terrorist threat, the Federal Bureau of Investigation (FBI) enlisted the help of Green Berets who translated chatter and documents between suspected terrorists. The Green Berets were able to give the FBI the leads they needed, thwarting a terrorist attack planned for Dec. 31, 1999, at the Los Angeles International Airport [source: Truman National Security Project].
In the next section, we'll learn about the Green Berets' psychological operations. | <urn:uuid:4abc53a7-47d5-40c4-a2d8-9a3665485c31> | CC-MAIN-2019-13 | https://science.howstuffworks.com/green-beret5.htm | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912205163.72/warc/CC-MAIN-20190326115319-20190326141319-00140.warc.gz | en | 0.951638 | 569 | 2.796875 | 3 |
- Using the site: http://www.uwex.edu/ces/pdande/evaluation/evallogicmodel.html, create a basic logic model to present how an event or topic of importance occurs in your major / field of study.
- Using the site: http://www.cdc.gov/eval/resources/index.htm, select one of the examples provided and discuss what steps are involved in the evaluation process.
- Explore the site containing an Evaluation Tool Kit and performing creating a logic model at: http://toolkit.pellinstitute.org/evaluation-guide/plan-budget/using-a-logic-model/. Through basic internet research, identify an example of a logic model being used in a specific policy area and discuss its various components. How can it be used to help make decisions, both at the programmatic and organizational levels? | <urn:uuid:003e27c0-9fc7-4282-a68a-10a7806bf5fe> | CC-MAIN-2019-26 | https://study.sagepub.com/remler2e/student-resources/chapter-2/web-exercises | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628001014.85/warc/CC-MAIN-20190627075525-20190627101525-00140.warc.gz | en | 0.805352 | 185 | 3.296875 | 3 |
Awareness levels need to increase on other types of pollution including in aquifers, national use of water, soil and biodiversity loss. These issues attract less media attention but are still unsolved. Fortunately, other types of pollution, such as air quality in cities, are beginning to be addressed as they are responsible for the deaths and health degradation of millions of people around the world. Another critical problem that worries me is the ongoing unabated emissions from the corporate world which exacerbates climate change while trying to shift the burden of blame and behavioral change to individuals.
We are still pumping lots of CO2 into the atmosphere and we need to bring down the Keeling curve from current 417 ppm to the safer 350 ppm zone.
Greenwashing remains also a big problem both with companies and governments. We need to develop effective legislation to enhance transparency and accountability on public sustainability commitments. At the Observatory for example, we analyse public and scientific data to publish annual reports on Spanish IBEX 35 listed and unlisted large companies big polluters. We have also partnered with Heinrich Boll for a report on the European Transport Atlas. In addition, we publish an annual report of Sustainability in Spain assessing progress towards the Sustainable Development Goals.
The slow-down of the destruction of the ozone layer is certainly one of the environmental breakthroughs of the last decades. Big polluters like Dupont reviewed their whole production process to become more sustainable. It is not a solved problem as the hole stills persists over Chile and Patagonia but the progress made has been astounding. | <urn:uuid:528ea6b4-c878-4f97-947d-d07bbcc9f541> | CC-MAIN-2022-21 | https://www.remotefulness.com/the-next-frontier-after-climate-change-is-the-fight-against-social-inequality/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662560022.71/warc/CC-MAIN-20220523163515-20220523193515-00075.warc.gz | en | 0.951373 | 311 | 2.765625 | 3 |
Divorcing fathers are often concerned about their children’s well-being during and post-divorce. Common issues that arise is how to protect the relationship they have with their children, and how their children is coping with the divorce.
Researchers have found that a small percentage of children encounter serious problems as adults due to their parents’ divorce.
Divorce affects most children in the short run, but research suggests that kids recover rapidly after the initial blow. In a 2002 study psychologist E. Mavis Hetherington of the University of Virginia and her then graduate student Anne Mitchell Elmore found that many children experience short-term negative effects from divorce, especially anxiety, anger, shock and disbelief. These reactions typically diminish or disappear by the end of the second year. Only a minority of kids suffer longer.
A key indicator regarding whether a child will experience serious problems as an adult stems from high levels of parental conflict during and after a divorce. As a parent, It is important during this time to work on your co-parenting skills to ensure your children are living in healthy non-hostile environments.
Children fare better if parents can limit conflict associated with the divorce process or minimize the child’s exposure to it. Further, children who live in the custody of at least one well-functioning parent do better than those whose primary parent is doing poorly. In the latter situation, the maladjusted parent should seek professional help or consider limiting his or her time with the child. Parents can also support their children during this difficult time by talking to them clearly about the divorce and its implications and answering their questions fully.
What techniques did you use to protect your children from the harmful effects of your divorce? Do you recommend any course of action in particular for single fathers? | <urn:uuid:e3cca024-712c-4b4c-96d7-085aa3c7bd76> | CC-MAIN-2014-15 | http://www.dadsrights.org/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538423.10/warc/CC-MAIN-20140416005218-00094-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.967495 | 361 | 2.921875 | 3 |
This past summer, my nephew, Charles Goodridge, an unarmed black 53-year-old computer analyst, was shot and killed by an off-duty policeman in Harris County, Texas. Our family believes that Charles was unjustly killed and we are trying to get justice for him and those he left behind. In these situations, healing really begins when there is a sense of justice. Despite our efforts, however, we are doubtful that we will ever get justice. This is my second article inspired by my nephew’s killing, but this article goes beyond Charles’ killing. A police officer or vigilante kills a black person every 28 hours in the United States. Unfortunately, in most cases, even when these killings are videotaped, the police officer is cleared and in some cases rewarded. As one who is left behind and as a psychologist, I ask why this is happening. Where is the justice in our justice system? And so I look for answers to these questions.
The Rashomon Effect
In 1950, Japanese filmmaker, Akira Kurosawa made a film titled Rashomon. The movie is about a murder and a rape to which there were four eyewitnesses.
As the story unfolds, each of the four witnesses tells their version of what happened. Each story is compelling and vastly different from the other, but the fact remained that there was a rape and murder. In 1988, ethnographer and anthropologist Karl G. Heider, who was familiar with Kurosawa’s work, coined the term “the Rashomon effect” to describe the subjectivity of perception and recollection to explain why people give different accounts of the same event. Heider was addressing this specifically to his colleagues since this disparity of perception was manifesting within the research they were doing. He found that seeing is not always seeing clearly and that realizing this fact helped his colleagues filter out their misperceptions and gain more accurate data. How does the Rashomon effect help us in our healing process? How does the Rashomon effect affect our ability to adjudicate our justice system?
Lady Justice and the US Constitution: Our Symbols of Justice
Among the things an anthropologist studies to understand a culture are the customs and symbols said culture reveres. Lady Justice, the blindfolded woman holding in one hand a scale and in the other a double-edged sword, is one of those symbols. Her blindfold and the scales can represent fairness and objectivity. The sword can represent reason and justice. The blindfold can also mean fate or luck. The sword can also mean vengeance. So the symbol of justice that the United States has chosen is a very complex symbol.
Justice can be blind meaning objective or it could be blind to injustices, depending on the Rashomon effect. The sword could represent reason and justice or it could be vengeful, depending on the Rashomon effect. The idea that justice has to do with fate or luck has not been forgotten by history.
The US Constitution
Many say that first impressions are lasting impressions. When our revered national document, the Constitution of the United States, states that a black person is only three-fifths of a person, then the lasting impression of not seeing a black person as a human being has affected and continues to affect our personal and judicial lives.
The Rashomon Effect Obscuring Reality
The Rashomon effect can explain our family’s doubts that we will get justice for Charles. When white people see videos of black men being killed by police, the customs of our society and the racial subjectivity of perception create a reality for them that justifies the police action. White people see this as justice. When blacks see these videos, they see violence being perpetrated on them. Black people see this as injustice. The fate of black people is in the hands of a white justice system that does not see the realities of black folk.
It has been and continues to be our fate that we feel lucky if we get justice from this blind system. White society both ignores and perpetuates the system’s violence, vengeance and race ideology. If you asked a black person how it feels to be black, he or she would have lots to say. Black people always have to think about where their blackness fits in a white society. If you ask a white person how it feels to be white, he or she would be confused by the question. They never have to think about how it feels to be white. So how is it possible for black people to receive justice in such an indifferent culture?
Acknowledgement Is the First Step to Justice
The Rashomon effect does not mean that everyone’s point of view is correct. There are facts, and the fact that black lives are being taken with little or no consequence is not up for debate. It is a fact. If we are to move forward toward justice and healing, our institutions and those who run them must acknowledge the Rashomon effect. There must be meaningful changes based around this new understanding. People who have the power of life and death must be educated to see that their indifference is real and has had and will continue to have deadly consequences if they don’t change.
I truly believe that people can change and most people want to do the right thing. I also know that change is difficult and scary, especially when the cultural ways of seeing and not seeing are deeply imbedded. The awareness of the Rashomon effect gives us a tool that will help us move forward. To my white brothers and sisters, if you believe that white lives matter, you must also believe that black, brown and yellow lives matter equally. Resistance to acknowledge this and resistance to go forward with this knowledge will only lead to the downfall of this nation – and in the end, no one will have justice or peace. | <urn:uuid:5fd07798-e8bb-41ad-934e-e3a48a5861bc> | CC-MAIN-2019-13 | https://truthout.org/articles/black-death-the-rashomon-effect-and-our-symbols-of-justice/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203462.50/warc/CC-MAIN-20190324145706-20190324171706-00382.warc.gz | en | 0.966377 | 1,176 | 2.984375 | 3 |
teosinte (genus Zea), any of four species of tall, stout, solitary annual or spreading perennial grasses of the family Poaceae, native to Mexico, Guatemala, Honduras, and Nicaragua. Corn, or maize (Z. mays mays), is a worldwide cultigen that was derived from the “Balsas” teosinte (Z. mays parviglumis) of southern Mexico in pre-Columbian times more than 5,000 years ago.
Annual teosintes strongly resemble subspecies mays in their large terminal, plumelike, male inflorescences (the tassels). However, they differ strongly in their small, 5–12-seeded female ears, which are hidden in clusters in the leaf axils. Nonetheless, both the perennial and annual species readily cross with corn, and in the 1980s attempts were made to produce a perennial variety of corn. Teosintes have a high resistance to both viral and fungal diseases of corn as well as corn insect pests. | <urn:uuid:fb49a2d4-baf8-47c0-a477-67e48797ef83> | CC-MAIN-2014-41 | http://www.britannica.com/print/topic/587659 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657128304.55/warc/CC-MAIN-20140914011208-00140-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | en | 0.957422 | 218 | 3.546875 | 4 |
Our expert guide looks at the history of Britain’s daffodil industry and challenges facing growers today, plus the best daffodil walks in the UK.
A bunch of sunshine-yellow daffodils on the windowsill brings joy to the heart and the promise of the summer to come. But have you ever wondered about the journey those daffodils made to get to you? Twigs Way explores the industry’s roots, and speaks to the growers who are flourishing against the odds.
When were daffodils first sold in Britain?
Daffodils of all sizes and shapes have been seen in England since the 17th century; Shakespeare celebrated them as the flower that “comes before the swallow dares”, and bunches of wild blooms were sold by flower girls on the streets of London. However, the farming of daffodils for cut-flower sales did not start until the late 19th century.
In 1875, William Trevellick, a potato farmer on the Isles of Scilly, was struck by the semi-wild narcissi in full flower on the tracks and verges of his farm in January. He realised that by using the weekly freighter from the island then the railway link from Penzance to London – opened in 1859 – he could get these early blooms to the London markets within 48 hours of picking, and more importantly, weeks before they flowered on the mainland. Thirty experimental bunches, sent in a hatbox, earned Trevellick seven shillings and sixpence (37.5 pence), and a week later, more bunches brought him £1.
Realising the scheme had potential, Scilly landholder Thomas Dorrien-Smith encouraged his tenant farmers to create bulb-forcing houses, plant shelter hedges and make special wooden boxes for the daffodils. Dorrien-Smith also obtained different varieties to ensure longer supplies. In 1885, 65 tonnes of flowers were sent to the mainland; by 1889, this had reached 198 tonnes, and an industry was born.
More related content:
Watching the wooden boxes full of Scillonian daffodils pass through Penzance gave Andrew Lawry, farmer at Varfell, the idea of planting his own bulb fields. Although they could not rival the Scilly Isles for earliest flowering, there was more space for the fields and they were not subject to the vagaries of the boat crossing. The area around Varfell, overlooking St Michael’s Mount, is known as the ‘Golden Mile’ and is still a centre of production. Gilles Deprez of Greenyard Flowers, based in Varfell, emphasises the importance of “working with nature and the unique and complex environment of Cornwall”. The company works with conservation bodies, such as the Cornwall Wildlife Trust, to plant trees and protect soils.
- The only species of narcissus native to Britain is the rather demur Lent Lily, more at home in orchards and pastures than in the flower vase.
- There are more than 26,000 daffodil cultivars, coming from a gene pool of 56 species, making choosing which ones to plant in your garden quite tricky.
- ‘Pheasant’s Eye’ daffodil is a member of the poets’ group of daffodils, Narcissus poeticus, which are thought to have been the first daffodils to be cultivated. They were described by the Greek writer Theophrastus in the 4th century BC.
- Today, Britain produces 90% of the world’s daffodils
The growth of Britain’s daffodil industry
With the south of the country leading the way, lovers of the daffodil soon realised the season could be extended by planting bulbs further north, and daffodil farming spread first to Lincolnshire and then Scotland. Utilising the new railways to rush the cut flowers to market, farmers would extend the blooms into April or even May. Indeed, with modern techniques of soil warming and delayed blooming, the daffodil can overlap Shakespeare’s swallow at both ends of the season.
Those first narcissi that travelled from the Isles of Scilly to fill the vases of the London suburbs were predominantly the ‘Scilly White’ and ‘Grand Soleil d’Or’ varieties, but as the industry developed and spread into other regions, breeders developed larger and brighter flower heads. Foremost among these was ‘Carlton’, developed in Cornwall by Percival Dacres Williams (1865–1935). Williams named his many cultivars after Cornish villages or Celtic saints and was said to have an almost mystical approach to daffodil breeding, notably not keeping any records of his work. In Cornwall he was followed by Alec Grey, a grower and amateur archaeologist, who developed miniature daffodils for show and sale in pots, another aspect of the market. For the 38 years of its existence, Rosewarne Experimental Horticulture Station at Camborne, Cornwall, explored every aspect of daffodil growing and developed many new varieties still used today.
Picking and planting the crop was traditionally a family business, with the men picking while the women worked bunching, tying and packing in flower sheds or barns. On larger farms on the mainland, local agricultural labour was used in the otherwise quiet period of the year, supplemented by itinerant workers. In the late 1950s, 3,000 people were employed in market gardening year-round in the Tamar Valley in Cornwall. In the spring, daffodil-picking season, the numbers were swelled by a further 10,000 workers concentrating on the famous Tamar ‘Double White’; the secret of its success lay in its good scent and the fact it flowered on the Whitsun bank holiday.
How daffodils are harvested today
Today, recruitment agencies advertise for workers to start in Cornwall at new year and finish in Scotland in late May, with many coming from eastern Europe, a source of labour which may prove more difficult to source in the future. As well as being wrapped against the cold, pickers have to wear gloves and long sleeves to protect from ‘daffodil itch’ – a painful skin irritation that can spread to the mouth.
Daffodils are picked in bud and stored at 1–2°C for their onward journey to the supermarkets and florists of England and Europe – a change from the past when they would be warmed to ensure they opened before dispatch. The only flowers to be sent open now are Narcissus tazetta, such as ‘Pheasant’s Eye’, which are often ‘pulled’ rather than picked to give them longer stems.
Depending on the scale of the farm and whether it also services the bulb industry, bulbs may be left in the ground for two to four years before being dug up (lifted), dried and sorted, with some kept for replanting.
The daffodil plague of 1917
However, keeping bulbs in the ground for several years makes them vulnerable to disease or climate fluctuation. Hardly had the industry set up than it found itself reeling from the effects of daffodil ‘plague’ in 1917, later identified as due to ‘stem and bulb nematode’. Hundreds of acres of bulbs rotted in the fields and the value of farms plummeted. Nematodes – tiny, worm-like creatures – were attracted by the eelworm that also infested the daffodil bulb; eelworms had multiplied due to poor husbandry during the First World War, 1914–18, when labour was short.
In the inter-war period, increased use of glasshouses alleviated rot and resulted in more daffodils being produced in Britain than in any other country. But then, the Dig for Victory campaign of 1939–45 demanded that land used for cut flowers should be turned over to edible crops, and the rail transport of flowers was banned. Bulbs such as ‘Fortune’ – which, when first developed, sold for £50 a bulb – were simply tipped on to verges and field edges, where they still flower today.
Although daffodil farming has declined in some areas, the UK still produces 90% of the world’s cut daffodils and exports to Europe and the USA; 80% of these daffodils are grown in Cornwall. Grower James Hosking recalls his parents sending their first boxes of Fentongollan Farm daffodils as gifts to friends; today, the farm sells flowers as well as local produce online. Personalisation is the theme at Scilly Flowers, a small family-run farm on St Martin’s in the Isles of Scilly, where Zoe Julian and her husband Ben send beautifully packaged bunches of Paper White and Soleil d’Or to customers by first-class post, via air or sea. A return to the original ‘farm to vase’ service that all started with a hatbox.
Cutting edge growers
Due to the harsh winter conditions, daffodils grown by sheep farmers in the Black Mountains of Wales for Kevin Stephens have extra high levels of a compound called galantamine, which is used in the treatment of Alzheimer’s disease. The farm produces enough to give 9,000 sufferers their daily dose, but experimentation in the way the flowers are grown and the compound extracted mean the farm should soon be able to produce enough galantamine for 250,000 doses. They are now looking for new growers, who must have land at over 305m altitude to get the best galantamine.
One of the best places to see traditional daffodils is Cotehele in Cornwall, where the National Trust is working with volunteers to save the old cultivars that were grown for market at the height of the industry. Collected from hedgerows in the Tamar Valley, there are more than 250 varieties here, including heritage ones from the 17th century.
Whether it’s the robust yet dainty native wild daffodil or a host of golden cultivars, these vivid flowers are one of the first signs that spring is truly under way. Here is our pick of the best daffodil walks to enjoy this spring
Fringed by Rendlesham Forest’s fir plantations, tiny Butley, and its fine display of wildflowers, is a delight to explore in April. The priory woods shine with daffodils, then bluebells across a long spring. Nearby is the extraordinary Staverton Thicks; ancient woodland with some of Europe’s oldest trees. suffolkcoastandheaths.org
Isles of Scilly, Cornwall
Lemony heads bob above golden sands and an azure sea on the sub-tropical archipelago of the Scillies. These fabulous flowers don’t all end up as florists’ bundles; countless escapee blooms riffle beside the myriad paths that hug the shorelines and crisscross the tiny islands, most notably St Martin’s and Tresco. visitislesofscilly.com
When to plant daffodil bulbs?
To ensure your garden is filled with colourful daffodils in spring, the best time to plant is between October to December.
How to plant daffodil bulbs
Dig a hole that is twice as deep as the bulb is in height. Place the pointy end of the daffodil facing upwards and cover with soil. Water well and wait for spring! Daffodils will often spread and multiply on their own in a three to five year period so with any luck you will have a larger display to enjoy. | <urn:uuid:e00991dd-8081-4170-a89d-2906611b9ce8> | CC-MAIN-2020-50 | https://www.countryfile.com/wildlife/trees-plants/a-brief-history-of-british-daffodils/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141747323.98/warc/CC-MAIN-20201205074417-20201205104417-00418.warc.gz | en | 0.96162 | 2,478 | 3.21875 | 3 |
October 18, 2017 – Researchers with NASA’s Cassini mission found evidence of a toxic hybrid ice in a wispy cloud high above the south pole of Saturn’s largest moon, Titan.
The finding is a new demonstration of the complex chemistry occurring in Titan’s atmosphere—in this case, cloud formation in the giant moon’s stratosphere—and part of a collection of processes that ultimately helps deliver a smorgasbord of organic molecules to Titan’s surface.
Invisible to the human eye, the cloud was detected at infrared wavelengths by the Composite Infrared Spectrometer, or CIRS, on the Cassini spacecraft. Located at an altitude of about 100 to 130 miles (160 to 210 kilometers), the cloud is far above the methane rain clouds of Titan’s troposphere, or lowest region of the atmosphere. The new cloud covers a large area near the south pole, from about 75 to 85 degrees south latitude.
Laboratory experiments were used to find a chemical mixture that matched the cloud’s spectral signature — the chemical fingerprint measured by the CIRS instrument. The experiments determined that the exotic ice in the cloud is a combination of the simple organic molecule hydrogen cyanide together with the large ring-shaped chemical benzene. The two chemicals appear to have condensed at the same time to form ice particles, rather than one being layered on top of the other.
“This cloud represents a new chemical formula of ice in Titan’s atmosphere,” said Carrie Anderson of NASA’s Goddard Space Flight Center in Greenbelt, Maryland, a CIRS co-investigator. “What’s interesting is that this noxious ice is made of two molecules that condensed together out of a rich mixture of gases at the south pole.”
Previously, CIRS data helped identify hydrogen cyanide ice in clouds over Titan’s south pole, as well as other toxic chemicals in the moon’s stratosphere.
In Titan’s stratosphere, a global circulation pattern sends a current of warm gases from the hemisphere where it’s summer to the winter pole. This circulation reverses direction when the seasons change, leading to a buildup of clouds at whichever pole is experiencing winter. Shortly after its arrival at Saturn, Cassini found evidence of this phenomenon at Titan’s north pole. Later, near the end of the spacecraft’s 13 years in the Saturn system, a similar cloud buildup was spotted at the south pole.
The simple way to think about the cloud structure is that different types of gas will condense into ice clouds at different altitudes, almost like layers in a parfait dessert. Exactly which cloud condenses where depends on how much vapor is present and on the temperatures, which become colder and colder at lower altitudes in the stratosphere. The reality is more complicated, however, because each type of cloud forms over a range of altitudes, so it’s possible for some ices to condense simultaneously, or co-condense.
Anderson and colleagues use CIRS to sort through the complex set of infrared fingerprints from many molecules in Titan’s atmosphere. The instrument separates infrared light into its component colors, like raindrops creating a rainbow, and measures the strengths of the signal at the different wavelengths.
“CIRS acts as a remote-sensing thermometer and as a chemical probe, picking out the heat radiation emitted by individual gases in an atmosphere,” said F. Michael Flasar, the CIRS principal investigator at Goddard. “And the instrument does it all remotely, while passing by a planet or moon.”
The new cloud, which the researchers call the high-altitude south polar cloud, has a distinctive and very strong chemical signature that showed up in three sets of Titan observations taken from July to November 2015. Because Titan’s seasons last seven Earth years, it was late fall at the south pole the whole time.
The spectral signatures of the ices did not match those of any individual chemical, so the team began laboratory experiments to simultaneously condense mixtures of gases. Using an ice chamber that simulates conditions in Titan’s stratosphere, they tested pairs of chemicals that had infrared fingerprints in the right part of the spectrum.
At first, they let one gas condense before the other. But the best result was achieved by introducing both hydrogen cyanide and benzene into the chamber and allowing them to condense at the same time. By itself, benzene doesn’t have a distinctive far-infrared fingerprint. When it was allowed to co-condense with hydrogen cyanide, however, the far-infrared fingerprint of the co-condensed ice was a close match for the CIRS observations.
Additional studies will be needed to determine the structure of the co-condensed ice particles. The researchers expect them to be lumpy and disorderly, rather than well-defined crystals.
Anderson and colleagues previously found a similar example of co-condensed ice in CIRS data from 2005. Those observations were made near the north pole, about two years after the winter solstice in Titan’s northern hemisphere. That cloud formed at a much lower altitude, below 93 miles (150 kilometers), and had a different chemical composition: hydrogen cyanide and cyanoacetylene, one of the more complex organic molecules found in Titan’s atmosphere.
Anderson attributes the differences in the two clouds to seasonal variations at the north and south poles. The northern cloud was spotted about two years after the northern winter solstice, but the southern cloud was spotted about two years before the southern winter solstice. It’s possible that the mixtures of gases were slightly different in the two cases or that temperatures had warmed up a bit by the time the north polar cloud was spotted, or both.
“One of the advantages of Cassini was that we were able to flyby Titan again and again over the course of the thirteen-year mission to see changes over time,” said Anderson. “This is a big part of the value of a long-term mission.”
The Cassini spacecraft ended its Saturn mission on Sept. 15, 2017.
The Cassini-Huygens mission is a cooperative project of NASA, ESA (European Space Agency) and the Italian Space Agency. NASA’s Jet Propulsion Laboratory, a division of Caltech in Pasadena, manages the mission for NASA’s Science Mission Directorate, Washington. JPL designed, developed and assembled the Cassini orbiter. | <urn:uuid:0aec1c50-44c6-4648-89c7-df010faab0af> | CC-MAIN-2017-51 | https://www.coloradospacenews.com/nasa-team-finds-noxious-ice-cloud-on-saturns-moon-titan/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948537139.36/warc/CC-MAIN-20171214020144-20171214040144-00466.warc.gz | en | 0.936017 | 1,360 | 3.6875 | 4 |
RANGE: East Europe , Turkey.
HABITAT:Mountains and forests.
HISTORY: Linne 1758.
DISCRIPTION: It is one of the true pheasants. Caucasian Pheasant was living in Turkey for centruies so we have to protect this bird and be careful about the hybrids of the other true pheasants.
AVAIRY POSITION:Well planted 9 m2 avairy.
FEEDING: Pellets, seeds, green food, live food.
BREEDING AGE: First year.
BREEDING SEASON: Mid March.
NUMBER OF EGGS IN A YEAR: 50-70 eggs.
INCUBATION PERIOD: 24 days. | <urn:uuid:b795af49-c363-4994-bc20-1fbd98b09ad6> | CC-MAIN-2019-26 | http://www.kamileron.com/index.php?Page=21&Lang=en | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999709.4/warc/CC-MAIN-20190624191239-20190624213239-00046.warc.gz | en | 0.840448 | 155 | 2.765625 | 3 |
Light, for our purposes (photographic) may be described as being composed of discrete and quantifiable packets of energy called photons. Light is known to exhibit wave behaviors as well but for the purposes of this discussion, we may focus on its particle nature, except with regard to spectral sensitivity mapping of films and sensors.
This limitation is practicable because both films and sensors are changed incrementally by light. In the case of film or other photo-sensitive materials, photons are absorbed by metal-halide grains (most typically, Silver Bromide) that together with gelatin provide the chemical “sensor” of the film. When a photon is absorbed by a Silver-Halide grain, a Bromine ion (Br-) looses an electron, converting into elemental Bromine and a Silver ion (Ag+) absorbs the electron creating a Silver atom. The silver atom migrates to a potential latent image site caused by impurities in the crystal structure of the grain and forms a latent image that will be changed into an image after being treated by chemical developing and fixing agents. It is believed the Bromine atom reacts with the gelatin. Therefore, there is an incremental effect and relationship between the formation of image / image density and the number of photons (of appropriate wavelength) entering a Silver-Halide grain.*
Now consider a digital sensor composed of an array of photo-sensitive sites where each site can absorb photons and convert them into an electrical signal that is proportional to the number of photons absorbed. CMOS sensors converting them directly to a voltage using a a photo diode to establish a voltage differential across a (FET) transistor and indexing the photo sites with a 2D array. CCD sensors develop discrete charges at each photo site and then dump the charges serially. Both sensor types feed the sensor’s analog outputs into analog to digital converters that convert each photo site’s voltage into a number representing its magnitude.
There are of course certain inefficiencies in both systems. Both media require a minimum light intensity, in the case of film, to create a linear response and to overcome absorption and dispersion within the film base and the gelatin emulsion. In the case of digital sensors, to significantly overcome the circuitry’s inherent noise so as to establish a good signal to noise (s/n) ratio (where the signal strength is significantly higher than the base noise level.)
How does this relate to exposure? Both mechanisms have both lower and upper limits to their functionalities. Each photographic site (the Silver-Halide grain in the case of film and the pixel in the case of the digital sensor,) must receive enough photons to initiate a recordable response but not too many so as to exceed the site’s absorptive ability. The medium’s absorptive capability is generally referred to its dynamic range and is often expressed in terms of the number of stops (or whole EV numbers) the medium is capable of recording. Each full stop represents a difference of 2 times (or 1/2,) a dynamic rage of 8 stops is equal to 2^8 or 256:1. 12 stops = 2^12 or 4096:1, and 14 stops = 2^14 or 16,384:1.
Practical Exercise: Determine your digital camera’s dynamic range.
- Choose a uniformly well lit white surface such as a wall.
- Mount your camera on a tripod an face it towards the surface taking care not to cast a shadow on the surface.
- Set the camera to its lowest ISO setting.
- Using the built-in metering system, make one exposure.
- Look at the exposure data and note the shutter speed and the f/stop.
- Set the camera’s mode dial to M (manual) and set the aperture and shutter speed to match those of the exposure just made.
- Reduce the shutter speed by 1/2 and make another exposure.
- Repeat step #7 eight more times each time reducing the shutter sped by 1/2 of the previous exposure.
- Re-set the shutter speed to that used in step #4 (the first exposure made.)
- Repeat steps #7-8 except instead of reducing the shutter speed by 1/2, double it instead.
- Examine the first series of exposures (steps #7-8) and determine the last exposure that appears different (lighter) than the previous exposure.
- Examine the secondt series of exposures (step #10) and determine the last exposure that appears different (darker) than the previous exposure.
- The total number of exposures that show gradations plus the center image (remembering to include one pure white and one pure black) is the dynamic range of your camera’s sensor expressed in full stops (or EVs.)
Exposure value is a base-2 logarithmic scale defined by (Ray 2000, 318 **)
EV = log2N2/t
N is the relative aperture (f-number)
t is the exposure time (“shutter speed”) in seconds
EV 0 corresponds to an exposure time of 1 s and a relative aperture of f/1.0. If the EV is known, it can be used to select combinations of exposure time and f-number, as shown in EV Table.
Each increment of 1 in exposure value corresponds to a change of one “step” (or, more commonly, one “stop”) in exposure, i.e., half as much exposure, either by halving the exposure time or halving the aperture area, or a combination of such changes. Greater exposure values are appropriate for photography in more brightly lit situations, or for higher ISO speeds.
* A detailed description of the Gurney Mott Theory of Latent Image Formation may be found at The Photographic Latent Image
** Ray, Sidney F. 2000. Camera Exposure Determination. In The Manual of Photography: Photographic and Digital Imaging, 9th ed. Ed. Ralph E. Jacobson, Sidney F. Ray, Geoffrey G. Atteridge, and Norman R. Axford. Oxford: Focal Press. ISBN 0-240-51574-9 | <urn:uuid:642481a6-f0c3-426b-a19f-a867b9ebe8b8> | CC-MAIN-2018-22 | http://andrewrreed.com/writings/curricula/articles-of-potential-interest/exposure/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866938.68/warc/CC-MAIN-20180525024404-20180525044404-00075.warc.gz | en | 0.904495 | 1,275 | 2.96875 | 3 |
New scanning and transmission electron microscope images of the SARS-CoV-2 coronavirus taken at the National Institute of Allergy and Infectious Diseases Rocky Mountain Laboratories show the virus’s similarities to the viruses that caused a MERS outbreak in 2012 and a SARS outbreak in 2002, according to a NIAID blog post. “That is not surprising,” the post says. “The spikes on the surface of coronaviruses give this virus family its name—corona, which is Latin for ‘crown,’ and most any coronavirus will have a crown-like appearance.”
Amy Schleunes is an intern at The Scientist. Email her at email@example.com. | <urn:uuid:78838ed1-76f9-4a2b-95f2-076b20c09764> | CC-MAIN-2022-21 | https://www.the-scientist.com/image-of-the-day/image-of-the-day--67114 | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662572800.59/warc/CC-MAIN-20220524110236-20220524140236-00491.warc.gz | en | 0.918924 | 158 | 2.953125 | 3 |
[4/19/17] In 1966, Milton Friedman wrote an op-ed for Newsweek entitled “Minimum Wage Rates.” In it, he argued “that the minimum-wage law is the most anti-Negro law on our statute books.” He was, of course, referring to the then-present era, after the far more explicitly racist laws from the slavery and segregation eras of United States history had already been done away with. But his observation about the racist effects of minimum wage laws can be traced back to the nineteenth century, and they continue to have a disproportionately deleterious effect on African-Americans into the present day.
The earliest of such laws were regulations passed in regards to the railroad industry. At the end of the nineteenth century, as Dr. Walter Williams points out, “On some railroads — most notably in the South — blacks were 85–90 percent of the firemen, 27 percent of the brakemen, and 12 percent of the switchmen.”1
The Brotherhood of Locomotive Firemen, unable to block railroad companies from hiring the non-unionized black workers, called for regulations preventing the employment of blacks. In 1909, a compromise was offered: a minimum wage, which was to be imposed equally on all races.
To the pro-minimum wage advocate, this may superficially seem like an anti-racist policy. During this time, with racism still rampant throughout the United States, blacks were only able to enjoy such high levels of employment by accepting lower wages than their white counterparts. These wage-gaps at the time genuinely were the product of racist sentiment.
But this new wage rule, of course, did not eliminate the racism of nineteenth-century employers. Instead, it displaced their racism at the expense of black workers. One white union member at the time celebrated the new rule for removing “the incentive for employing the Negro.”2 This early minimum wage rule was explicitly put in place to prevent African-Americans from finding employment, and it was successful in this goal.
In the 1930s, racial views had hardly improved, if at all. Despite this, the unemployment rate among blacks was actually marginally lower than that of whites.3 Like the railroad workers, this was due to their willingness to accept lower wages than whites. But as infuriating as the employer racism at the time might be, the 1930s wage laws should incite even more anger.
For almost a decade Gov't Slaves has worked tirelessly to bring its readers the most critical news the corporate media does not want you to see. We have no intrusive ads, pop-ups or clickbait, just NEWS. If you happen to be in a position to support our work, PLEASE consider making a one-time donation below or a monthly recurring donation HERE. Your support is humbly appreciated. Gov't Slaves | <urn:uuid:338648b3-a9a4-4676-bc16-770611abf5e0> | CC-MAIN-2017-43 | http://govtslaves.info/2017/04/the-racist-history-of-minimum-wage-laws/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823229.49/warc/CC-MAIN-20171019050401-20171019070401-00352.warc.gz | en | 0.974811 | 585 | 3.65625 | 4 |
Fastest Star Ever Seen In The Milky Way Is Headed Out Of Our Galaxy
Almost a decade after its discovery, astronomers have learned that a compact star dubbed US 708 is moving faster than any other star ever observed in the Milky Way galaxy.
The record-setting hypervelocity star has been clocked at 746 miles per second, or 2.7 million miles per hour. That’s so fast that astronomers say it will escape the gravity of our galaxy (in 25 million years).
Scroll down for video
“At that speed, you could travel from Earth to the moon in five minutes,” Dr. Eugene Magnier, an astronomer at the University of Hawaii at Manoa and one of the researchers involved in the discovery, said in a written statement.
Most other hypervelocity stars, as these speedsters are known, have been flung outward by the enormous gravity of the Milky Way’s central black hole.
This one, by contrast, was probably launched on its high-speed trajectory by a kind of exploding star known as a Type Ia supernova, one of the most powerful and brightest bursts of energy in the universe.
Nobody knows for sure what triggers a Type Ia, however—and the fast-moving star, known as US 708, might provide valuable clues.
Why It Matters
Astronomers would love to know what makes a star explode so violently that the flash can be seen halfway across the universe. Theorists think the process probably starts with a white dwarf, the leftover husk of a star after it swells into a red giant (as our own sun will in about five billion years) and then puffs off its outer layers.
If enough extra matter falls onto the white dwarf—most likely from an ordinary companion star—it can reach critical mass and detonate in a thermonuclear explosion. Or a Type Ia might result when two white dwarfs collide. And thanks to a discovery in 2013, there’s a third option. Astronomers found a white dwarf in tight orbit around a hot subdwarf that was rich in helium. And when helium falls onto a white dwarf, a thermonuclear explosion can happen especially easily.
Looking for such a star, Stefan Geier of the European Southern Observatory and colleagues trained one of the powerful Keck telescopes on US 708, a fast-moving, hot subdwarf and found out how astonishingly fast it was moving.
See also: Scientists Discover Another Earth!
They also calculated its trajectory, which was clearly in the wrong direction if it had come from the black hole at the core of the Milky Way—a hint that it could have come instead from a Type Ia explosion. Another hint, says Geier: US 708 rotates very fast, just what you’d expect of a star formerly in a tight gravitational dance with a companion.
The Big Picture
Type Ia supernovae are so bright that astronomers use them to measure the distances to faraway galaxies and to calculate speeds at which those galaxies are flying away from us. Astronomers learned to their astonishment in the late 1990s that this speed has changed: The cosmos is flying apart faster today than it was billions of years ago, pointing to a still unexplained antigravity force known as dark energy.
To understand dark energy, astronomers need to know exactly how the cosmic expansion is changing, which depends on a full understanding of Type Ia’s-including exactly what sets a Type Ia supernova off and how much energy comes out of it.
Armed with this new information, Geier and his colleagues are headed back to their telescopes to find more fast-fleeing stars and stellar pairs that might be the raw material for future explosions. If they find enough examples, they might get a handle on the step-by-step process that triggers these mammoth explosions.
It could turn out that a fast-moving star helps solve one of the thorniest problems in astrophysics.
(Read about black holes.) | <urn:uuid:1ae8f7b2-23db-4420-b1e4-bab8edcddbce> | CC-MAIN-2022-27 | https://csglobe.com/this-is-the-fastest-star-ever-seen-in-our-galaxy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103034877.9/warc/CC-MAIN-20220625065404-20220625095404-00754.warc.gz | en | 0.943128 | 836 | 3.015625 | 3 |
Utilities to Explore Power in the Tidesby Colin McDonald
Seattle Post-Intelligencer, May 9, 2007
When the tide changes at Deception Pass, the black water erupts into a frothy mess, with whirlpools big enough to swallow kayaks.
Pulled by the sun and moon, the water surges through the narrow gap four times a day -- smashing logs against the rock walls and providing an exchange of water critical to the health of the ecosystem.
The Snohomish County Public Utility District has been given the authority to figure out how to turn that tidal power into electricity.
The Federal Energy Regulatory Commission issued three-year permits to the PUD and Tacoma Power to investigate eight sites in the Sound for possible installation of tidal generators. Precise mapping of tidal movements using underwater sonar will begin this summer.
If approved and installed, the turbines would harness tidal flow the same way wind farms tap a steady breeze. The utilities estimate the Sound's tides are strong enough to light up more than 70,000 homes. The largest installation calls for up to 1,000 turbines churning along the bottom of Admiralty Inlet.
The local projects are some of the most ambitious in the country, and follow on the heels of the world's first free-flowing tidal projects, now being installed and tested off the coasts of Scotland and Ireland.
"Puget Sound is a jewel," said Trey Taylor, president of Verdant Power, which last week completed the first tidal-power installation connected to the grid in the United States.
Taylor's company has six generators in the East River in New York and is looking to expand here. With 14-foot tides and a political climate supportive of expanding "green" energy sources, Taylor said the Sound is one of the best locations in the country for capturing water power.
The electricity would be emission-free and, unlike solar and wind energy, steady enough of a power source to be counted on for centuries.
"'Zero' is a real magic number when it comes to carbon emissions," said U.S. Rep. Jay Inslee, D-Bainbridge Island.
Inslee has introduced a bill with seven co-sponsors that would streamline the FERC approval process for energy projects and provide $50 million a year for tidal and wave energy research.
While waves on the Pacific Ocean have more power potential than estuary tides, the technology to transform ocean swells to electricity is in its infancy and the waves are far from the transmission lines needed to bring the juice to cities.
Inslee readily admits underwater construction in critical salmon habitat, where sea mammals lurk and fishermen like to drop their nets and lines, isn't an easy sell.
"But my view is that global warming is such an existential threat that we have to look at new technology," he said. "It is not like this is your Cuisinart going around."
Because water is 800 times more dense than air, the blades of the underwater turbines don't need to be as long or spin as fast as their windmill counterparts, said Glen Darou, president of Clean Current Power Systems.
The hope is that the relatively lethargic nature of the turbines, turning at less than 30 revolutions per minute, will minimize the impact the blades will have on sea life.
This month, Darou's company will pull up a prototype turbine it installed near Race Rocks on the southern tip of Vancouver Island.
A little more than 16 feet wide, the prototype looks like a cross between a cement truck and the engine off the wing of a Boeing jetliner. It sits on top of metal pilings drilled into the bedrock in 70 feet of water and since December has provided enough electricity to replace the diesel generators that heat and light the living quarters of the Race Rocks Lighthouse.
Clean Current's commercial version would be almost 100 feet across and large enough for a sea lion to swim through, Darou said.
"We are happy with everything but the bearings," Darou said of the turbine's performance.
Initial results have shown fish and sea mammals tend to swim around the turbine. His company is conducting further studies to see how organisms such as jellyfish, which simply move with the current, are affected by the blades.
Darou said the commercial version of its turbine would spin at 10 rpm, but at its size, the tips would be moving through the water at 40 knots. There are no conclusive studies on the effect something that large might have on sea life.
There also are concerns that the installation of water turbines will close parts of the Sound to fishing and diving.
"You can't really drift a gillnet into one of those, or drop a crab pot nearby," said Daryl Williams, the Tulalip Tribes' environmental liaison. "There is a lot to be learned, and most of the studies have been started in other countries -- and most of those just started in the last few months."
Researchers at the University of Washington are looking at what the cumulative effects on the Sound would be if the tides were tapped for power.
"If you put some turbines in the water and those turbines are extracting power from that water, how much power can you extract before you have an impact on Puget Sound?" said mechanical engineer Philip Malte, who is heading the study.
If enough power is taken out, the high tides would be lower and the low tides would be higher, Malte said. Even a change of less than a foot would drastically alter the beaches and the life that depends on them.
Using mathematical models, Malte and his team are working to predict how much power can be taken out of the Sound without changing the tides.
Across the industry the assumption is that taking 15 percent of the available power would have no discernable effect. But the industry is less than a decade old -- and there is little track record to go by.
"You can study it and study it," Malte said, "but at some point we are going to have to put a turbine in the water to find out if this will work."
learn more on topics covered in the film
see the video
read the script
learn the songs | <urn:uuid:ec985610-505b-4f33-9436-dc178a3f5e71> | CC-MAIN-2017-13 | http://www.bluefish.org/exptides.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190183.80/warc/CC-MAIN-20170322212950-00502-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.954539 | 1,267 | 2.71875 | 3 |
SAN FRANCISCO - Uber says it's working on developing a model for a flying car.
The idea is to have the flying cars in the country's most congested cities.
NASA aircraft engineer Mark Moore has joined the Uber team to make a commercially available flying car.
RELATED: Researchers work to design flying car models
Moore says it will take about three years before a concept car takes flight.
Uber is calling their flying car plan "Uber Elevate".
Uber says summoning a car with the capability of a helicopter will cut travel times and revolutionize commuting. | <urn:uuid:60904a89-947e-4a91-986b-2b785b86c5f5> | CC-MAIN-2017-43 | http://abc7news.com/amp/science/uber-working-to-develop-flying-car-models-with-nasa/1740802/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824775.99/warc/CC-MAIN-20171021114851-20171021134851-00302.warc.gz | en | 0.961943 | 117 | 2.625 | 3 |
Recently our youngest child engaged in a feat more suited to a trained circus professional than a toddler and the result was not pretty. A knocked out tooth, much blood, a hysterical mother and the question, ‘Why isn’t dental care included in infant first aid courses’?
You’ll be pleased to know we have now added dental care to our infant first aid course. The course is designed for parents and carers of young children in a non professional care setting. We aim to cover the top emergency health issues parents and carers face with young children including, choking, drowning, burns, CPR, severe cuts, broken bones, eye injuries and of course dental emergencies.
We asked our dentist friend Dr Nicki to confirm if our knowledge of what to do in a dental emergency was up to date and we were pleased to know it was. So what exactly do you do when you child or another person breaks or knocks out a tooth?
In the case of a clean break try to locate the missing piece of tooth, wash in warm water and place in a sealed plastic bag or container with a little bit of milk or saline and head straight for the nearest emergency dental clinic. Most often if only a portion of the tooth has been broken the patient will feel little to no pain, this does not mean however that there has not been any damage below the surface to the root or gum, a broken tooth or teeth should always be treated as a dental emergency and as such the patient should be looked at immediately. If you live in a rural area or other region where an emergency dental clinic is not available the patient should be taken to the nearest hospital emergency room. In cases where a clean break has occurred the tooth may be able to be repaired using the broken piece.
Knocked out tooth
If a tooth is completely knocked out try to locate it and pick it up by the part that you would normally see when the patient smiles. Do not touch the root of the tooth or try to clean away any skin, dirt or other materials from the tooth or root. Place the tooth in a clean, sealed bag or container (a plastic lunch bag works just fine) with a little milk or saline solution and proceed to the nearest emergency dental clinic or hospital emergency room. Quite often when a tooth has been knocked out or partially knocked out a lot of blood can be produced. If the patient is old enough, have them bite down on gauze or similar to stem the flow of blood. Water can be used to rinse and spit periodically whilst waiting for medical attention. Never ask the patient to lay back when bleeding orally as they may choke on the excess fluid. If the patient is not old enough to bite down on gauze (as was the case with our daughter) offer room temperature water and encourage the child to spit the water out, comfort the child as best as possible and seek immediate assistance from an emergency dental clinic or hospital emergency room.
If you did not witness the cause of the dental emergency, particularly where younger children are involved, it is always recommended to head directly to a hospital emergency room as the first option. The patient may have sustained concussion or other facial injuries such as facial fractures which may not be obvious to the naked eye. If in doubt, avoid the dental clinic and head straight for the hospital.
If you have any safety questions that you would like answered please feel free to send them to us via our email address firstname.lastname@example.org
Miss H showing her pearly whites before the accident. | <urn:uuid:7af975e6-8de0-4371-8370-3fd6d4e4efc4> | CC-MAIN-2018-51 | https://australianfireandfirstaid.wordpress.com/2011/09/08/dental-first-aid/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823674.34/warc/CC-MAIN-20181211172919-20181211194419-00251.warc.gz | en | 0.954104 | 714 | 3.046875 | 3 |
By Philippa Mein Smith
New Zealand was once the final significant landmass, except Antarctica, to be settled by way of people. the tale of this rugged and dynamic land is superbly narrated, from its origins in Gondwana a few eighty million years in the past to the twenty-first century. Philippa Mein Smith highlights the consequences of the country's smallness and isolation, from its overdue payment through Polynesian voyagers and colonisation by means of Europeans and the exchanges that made those humans Maori and Pakeha to the dramatic struggles over land and up to date efforts to regulate international forces.
A Concise background of latest Zealand areas New Zealand in its international and local context. It unravels key moments the signing of the Treaty of Waitangi, the Anzac touchdown at Gallipoli, the sinking of the Rainbow Warrior exhibiting their function as nation-building myths and connecting them with the fewer dramatic forces, fiscal and social, that experience formed modern New Zealand.
Read Online or Download A Concise History of New Zealand (2nd Edition) (Cambridge Concise Histories) PDF
Best history books
A background of the Irish in the United States from the eighteenth century to the current, through one of many nation's most outstanding students of the immigrant event.
Jay Dolan of the collage of Notre Dame is considered one of America's such a lot acclaimed students of immigration and ethnic historical past. within the Irish american citizens, he caps his many years of writing and educating with a magisterial heritage of the Irish event within the United States—the first general-reader’s account to be released because the 1960s.
Dolan attracts on his personal unique learn and masses different contemporary different scholarship to weave a clean and shiny narrative. He follows the Irish from their first arrival within the American colonies throughout the bleak days of the potato famine that introduced hundreds of thousands of bad immigrants; the years of ethnic prejudice and "No Irish want Apply;" the increase of Irish political strength and the heyday of Tammany politics; to the old second whilst John F. Kennedy used to be elected to the top workplace within the land.
Dolan conjures up the ghastly ships crowded with women and men fleeing the potato blight; the colourful lifetime of Catholic parishes in towns like manhattan and Chicago; and the area of desktop politics, the place ward bosses frequently held court docket within the neighborhood saloon. wealthy in colourful aspect, balanced in judgment, and the main complete paintings of its type but released, The Irish american citizens becomes a must have quantity for any reader with an curiosity within the Irish-American historical past.
This 6th and ultimate quantity in John Pocock's acclaimed series of works on Barbarism and faith examines Volumes II and III of Edward Gibbon's Decline and Fall of the Roman Empire, wearing Gibbon's narrative to the top of empire within the west. It makes common assertions: first, that this can be in truth a mosaic of narratives, written on different premises and not absolutely synthesized with each other; and moment, that those chapters assert a development of either barbarism and faith from east to west, leaving a lot heritage in the back of as they accomplish that.
“José Ignacio Velasco posee una virtud, y es que escribe con propiedad sin caer en los angeles sofisticación que hace incomprensibles algunos términos para los no iniciados en un tema. los angeles historia aquí narrada es ágil, amena, no requiere que el lector sea un especialista y, sin embargo, es tremendamente rica en matices, detalles e información.
Книга Wings & Wheels precise Museum Line No 17: Israeli airplane intimately half. .. Wings & Wheels specified Museum Line No 17: Israeli plane intimately half . Israel Air strength Museum at Hatzerim Книги Вооружение Автор: Daniel Petz, Karel Hellebrand Год издания: 2001 Формат: pdf Издат. :Wings and Wheels guides Страниц: fifty two Размер: 14.
- Ends of Enlightenment
- Flags Of The Third Reich Part2 Waffen Ss
- Marcus Aurelius in the Historia Augusta and Beyond
- The Great Fire of Rome: The Fall of the Emperor Nero and His City
- Gettysburg 1863: High tide of the Confederacy
Extra resources for A Concise History of New Zealand (2nd Edition) (Cambridge Concise Histories)
For years, schoolchildren learned his version of Maori history: that the Polynesian ‘sea rover’, Kupe, discovered New Zealand about 950 AD, and that about 1350 a great fleet of seven canoes followed his instructions to reach the new country far to the south, a feat only possible because Maori ancestors were ‘fearless, sea-loving people’. This chronology and narrative history was subsequently debunked; but the idea of a planned migration has regained Waka across a watery world 15 authority, as has the timing of the first settlers’ arrival 500 years before Europeans.
The turning point which hooked New Zealand into the British Empire came in 1830, instigated by Te Rauparaha, who approached the English Captain Stewart for assistance against Ngai Tahu chief Te Maiharanui in revenge for the killing of Te Pehi Kupe. Stewart agreed to transport Te Rauparaha and 70 armed men to Akaroa Harbour on the brig Elizabeth in exchange for a cargo of dressed flax. At Akaroa the crew helped lure an unsuspecting Te Maiharanui into the captain’s cabin where he was handcuffed. The same evening Te Rauparaha’s warriors attacked the pa on shore.
Marriage networks ensured mana over both the people and the land: equilibrium required women as well as men. 2 Beachcrossers 1769–1839 So deep was Aotearoa in the watery world of the Pacific that it remained for long unknown to Europeans, other than as an imagined part of the mythical great southern land, Terra Australis. Surely there had to be a continent in the South Pacific to balance the weight of land in the Northern Hemisphere? As it proved, there was not. New Zealand is immersed in the Pacific, surrounded for 2000 km by ocean, a fact that is reflected in Maori waka traditions. | <urn:uuid:7231b960-b0b9-402c-8ec5-ed5332d26e8d> | CC-MAIN-2018-17 | http://cpa.monetizador.net/lib/a-concise-history-of-new-zealand-2-nd-edition-cambridge-concise-histories | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946807.67/warc/CC-MAIN-20180424154911-20180424174911-00627.warc.gz | en | 0.905737 | 1,394 | 2.828125 | 3 |
Insight Online News
New Delhi, July 29 : The latest edition of National Geographic in India’s ‘Extreme Tech’ is all set to unravel the art and science behind the country’s largest Hydroelectric projects by the engineers and workers at Patel Engineering.
Titled ‘Extreme Tech: Patel Engineering Marvel on the Subansiri’, will give the viewers a glimpse into the modern engineering that aims to produce 2000 MW of clean and green energy.
The Subansiri Lower Dam, officially the Subansiri Lower Hydroelectric Project, is an under construction gravity dam on the Subansiri River in Northeast India. It is located 2.3 km upstream of Subansiri river in Arunachal Pradesh.
“At National Geographic in India, it is our continuous endeavour to inspire people by bringing forth insightful & enriching narratives. With this edition of Extreme Tech; which focuses on highlighting the magnificence of modern engineering; we took the opportunity to take our viewers through a journey filled with hard work, persistence, planning, and ingenuity of a team who are creating an engineering marvel in the form of one of India’s largest hydroelectric projects,” said a National Geographic spokesperson in a statement.
“Subansiri Lower Hydro Electric is a project that involves engineering in the most extreme circumstances. Our long-term vision with the project was to operate and optimise hydropower in a manner that it maximises opportunities and provides long-term benefits for the nation.
“Extreme Tech: Patel Engineering “Marvel on the Subansiri” is a story of our efforts, resilience, and journey to building one of India’s largest hydroelectric dams. We are glad to have associated with National Geographic to bring out the story of how we are creating this masterpiece,” said a spokesperson from Patel Engineering.
The documentary captures the vision, ideation along with sheer hard work and synergy of the skilled engineers and workers at Patel Engineering to create one of the largest hydropower projects in India.
The film takes the viewers through the blueprint of the under-construction site – from highlighting the extreme challenges of this gigantic project to adopting a strategic headway approach. The film also chronicles the incredible technology and execution methods behind this man-made creation.
It will premiere on July 30 at 8 pm on National Geographic Channel India. | <urn:uuid:bbdd2ec3-5df9-4680-a4d2-a9b511cbf9a3> | CC-MAIN-2022-40 | https://insightonlinenews.in/nat-geo-india-to-air-extreme-tech-on-subansiri-project/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00110.warc.gz | en | 0.918514 | 493 | 2.5625 | 3 |
Published online by Cambridge University Press: 31 July 2008
A population–biological study of the Kota of the Nilgiri Hills was undertaken between May 1966 and January 1968. This paper discusses the demographic structure of the tribe and its genetic implications.
The Kota is a small tribe of 1203 individuals distributed in only seven villages; it is an isolated population with a low rate of fertility and a high rate of infant mortality. The Kota is not a random mating population. The rate of consanguineous marriages is high and the coefficient of inbreeding is almost equal to the highest recorded value. Besides cousin marriages, marriage within the village is very much preferred. The admixture rate (0·29%) among the Kota is very low. The effective population size is only 28·87% of the total population. The coefficient of breeding isolation is 1·01, which indicates that genetic drift may produce important differentiation in this population. The data show that selection is acting with moderate intensity in this population. | <urn:uuid:9f7f6dd6-8692-4905-9f20-f9e8d2886b45> | CC-MAIN-2022-40 | https://www.cambridge.org/core/journals/journal-of-biosocial-science/article/abs/kota-of-the-nilgiri-hills-a-demographic-study/7539F217FE1BC68A02F49A404E5DFAB2 | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00701.warc.gz | en | 0.951327 | 204 | 2.703125 | 3 |
What’s a cookie?
A “cookie” is a piece of information that is stored on your computer’s hard drive and which records your navigation of a website so that, when you revisit that website, it can present tailored options based on the information stored about your last visit. Cookies can also be used to analyse traffic and for advertising and marketing purposes.
Cookies are used by nearly all websites. If you want to check or change what types of cookies you accept, this can usually be altered within your browser settings. We suggest consulting the Help section of your browser or taking a look at the About Cookies website which offers guidance for all modern browsers. You can also disable cookies by using the link in the cookie bar at the bottom of the screen.
- To track your use of our website. This enables us to understand how you use the site and track any patterns that emerge individually or from larger groups. This helps us to develop and improve our website and services in response to what our visitors want and need.
- To help us advertise jobs, products or services to you that we think you will be interested in. Hopefully this means less time for you trawling through endless pages and will get you to the information you want more quickly
Cookies are either:
- Session cookies: these are only stored on your computer during your web session and are automatically deleted when you close your browser – they usually store an anonymous session ID allowing you to browse a website without having to log in to each page but they do not collect any information from your computer; or
- Persistent cookies: a persistent cookie is stored as a file on your computer and it remains there when you close your web browser. The cookie can be read by the website that created it when you visit that website again. We use persistent cookies for Google Analytics and for personalisation (see below).
Cookies can also be categorised as follows:
- Strictly necessary cookies: These cookies are essential to enable you to use the site effectively, such as when applying for a job, and therefore cannot be turned off. Without these cookies, the services available to you on our site cannot be provided. These cookies do not gather information about you that could be used for marketing or remembering where you have been on the internet.
- Performance cookies: These cookies enable us to monitor and improve the performance of our site. For example, they allow us to count visits, identify traffic sources and see which parts of the site are most popular.
- Functionality cookies: These cookies allow our website to remember choices you make (such as your user name, language or the region you are in) and provide enhanced features. For instance, we may be able to provide you with news or updates relevant to the services you use. These cookies can also be used to remember changes you have made to text size, font and other parts of web pages that you can customise. They may also be used to provide services you have requested such as viewing a video or commenting on a blog. The information these cookies collect is usually anonymised.
- Personalisation cookies: These cookies help us to advertise details of potential services that we think may be of interest. These cookies are persistent (for as long as you are registered with us) and mean that when you log in or return to the website, you may see advertising for services that are similar to services that you have previously browsed.
Google analytics is being used on this website to monitor its performance. The data profiling captured by Google analytics includes anonymised age range, gender and location information. | <urn:uuid:14109cfe-049c-4445-8d47-e2c85036f340> | CC-MAIN-2020-40 | https://excellolibertas.com/cookie-policy/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400245109.69/warc/CC-MAIN-20200926200523-20200926230523-00370.warc.gz | en | 0.942362 | 732 | 2.734375 | 3 |
|Binomial name:||Nerodia fasciata|
The Banded Water Snake, otherwise known as Southern Water Snake Nerodia Fasciata, is not poisonous and more of an aquatic type Colubrid variety of snake that is widespread in the South East and central parts of the United States. In their common habitat, they are often misled by their manifestation, for other snakes. This also includes the cottonmouth, a venomous snake that is rarely seen.
The standard length to which a banded water snake grows is 30 (76 cm), even though it is capable of growing up to 4 1/2 ft. These keel snakes have solid bodies. Generally they are colored either dark brown or with a background of brownish red and cross bands colored brown. They have broad backs sliming towards the sides. The color of the belly is of a yellow tint, with black and red bright spots. The bands of the adults gradually disappear and they become fully brown in color
The temperament of the Banded Water Snakes is rather horrible, but taking care of them is reasonably effortless. At the onset of danger, this variety of snakes usually find a way out.
In such a situation they let go nauseating musk, or bite when they sense danger. If not, they survive with ease amidst human being and other types of animals. Be on your guard, do not lift them up since they get offended and attack back. At times, you come across aquatic snakes that take in food given by you. Still, it is better to avoid this activity. You normally come across these snakes, both day and night. Still, their activities are more prolific at night.
These Banded Water Snakes adapt well to water. You can frequently see them taking a sunbath in the flora. When you aggravate them, they slip into the water. These snakes take pleasure in surviving in areas of freshwater such as lakes, rivers, marshy lands, streams and ponds. We see them in the southern most parts of North America. At times we see them hanging on the branches of the trees, on land. These snakes are not good looking pets, even then they do not mind living in captivity. We find these snakes generally in many countries, particularly in Florida, they are but not protected.
As a Pet
The Banded Water Snake bears live babies and normally a litter can account for 25 baby snakes during the end of summer. These babies are brilliantly patterned and have a length 8(20 cm). They have glands with musk. Fully grown, they bite. While in captivity, they breed with ease. These snakes mate in the months of January or perhaps in February. After 3 to 4 months of mating, the babies are born.
It is possible to keep these snakes either single or in groups along with the other snakes of similar habits and sizes, since they never eat other snakes.
You would do well to arrange for a terrarium either in wood or go for a water tank. These snakes are mostly aquatic and require a higher humidity. Maintain the basking area in the terrarium always dry so that they are prevented from infection of the skin, particularly boils. These Banded Water Snakes require a tiny water vessel and a place for hiding. They are fond of climbing, and as such, it is fine to set up some vines, trees or branches placed vertically or slanting.
Have a terrarium with sufficient water. It is essential to keep some tree branches, projecting above the water. These snakes are fond of having a sunbath in those places. Since the snake uses the water area for the purpose of a toilet, facilitate easy cleaning of the tank.
They are comfortable with a temperature nearing 770F (280C) at day and at night they need it cooler. For sustaining the health of your snakes, it is vital to have a lighting of total spectrum that is sufficient for a long time without sustenance. Make use of an incandescent bulb of low voltage with the total spectrum for the day and use a red or blue bulb during the night for providing heat, if required. It is mandatory to place a thermometer to control the temperature, to prevent an excess heat.
Feed your Banded Water Snake with frogs, crayfish, tiny fish and salamanders. These snakes are very agile. So, feed them daily, since their consumption of food is limited. At all times reserve a flat bottom vessel of water.
If you lift them, they send out a nasty foul smell as a defense mechanism and sometimes they even bite. If you handle them with utmost care, they become calm and avoid the nasty fart. Some of these snakes become quiet when food is offered to them, while many often bite.
Having discovered a fondness for insects while pursuing her degree in Biology, Randi Jones was quite bugged to know that people usually dismissed these little creatures as “creepy-crawlies”. | <urn:uuid:97027ad6-3c6c-4613-8e6d-bd3abd1e8f05> | CC-MAIN-2023-23 | https://www.learnaboutnature.com/reptiles/snakes/banded-water-snake/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643585.23/warc/CC-MAIN-20230528051321-20230528081321-00740.warc.gz | en | 0.951568 | 1,147 | 3.484375 | 3 |
A zoological park is a unique door to the world of wild nature where one may watch how its inhabitants live, to see what they eat. We are going to visit a Zoo in Almaty just to witness this unique process.
Visitors may enter only at 9 am, but there is a lot of work to do before that. .
The predators of the Zoo eat 350 kg daily. Live food is very important for birds of prey and preying mammals. It includes rats, rabbits, guinea pigs etc.
Bengal tiger Sango eats 12 kg of meat daily but always refuses live food, that’s why rabbits calmly stroll about its enclosure for weeks.
This adult lion also eats at least 12 kg of meat daily, female lions eat 8 kg of meat, cubs – at least 3 kg. Apart from meat all the Felidae get milk, eggs, bone meal.
Carrying food for the animals
Each animal has its own character and its preferences in food. The Zoo employees try to find an individual approach to each animal, satisfy its taste.
Siberian tiger also has 12 kg of meat daily. Some fish oil and chicken meat are also added to its diet.
The cheetah is waiting for its meat
It must be swept here, old bones are to be removed, water is to be poured. | <urn:uuid:a0469a14-2f31-41f8-93b5-fe17cd31ef8c> | CC-MAIN-2014-15 | http://englishrussia.com/2012/06/04/what-do-animals-have-for-lunch/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205137.4/warc/CC-MAIN-20140423032005-00503-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.972799 | 278 | 2.796875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.