text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 1.08k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
Date of this Version
Narrow-row spacing of soybeans may be a profitable practice with modern herbicides and new lodging-resistant varieties. This NebGuide describes considerations for producing narrow-row soybeans. Early in this century crop row spacing was determined by the breadth of the animals used to work the fields. Spacing had an impact on methods of weed control and the varieties of soybeans developed. Even a decade ago row spacing was determined by tractor tire size since cultivation was required. Also, the tall varieties of soybeans lodged severely in narrow-row systems. However, the broad spectrum of herbicides now available and lodging-resistant soybean varieties have made narrow-row soybeans more practical. Narrowing soybean row spacing can increase yields if light utilization is the yield-limiting factor. The main purpose of narrow rows is to intercept more light. Unlike fertilizers and water which can use the soil as a reservoir, light falling on bare soil cannot be used. Decreasing row spacing results in more rapid canopy closure and increased light interception. Canopy closure at or shortly after flowering will maximize yields in ideal conditions. However, Nebraska's growing seasons are rarely ideal. Any yield limiting factor like lodging, weed growth, moisture stress, soil compaction, high soil pH, or nutrient deficiency will reduce soybean yield responses in narrow rows. | <urn:uuid:05473791-eacc-4c0c-b91f-4f8b534e8b26> | CC-MAIN-2018-43 | http://digitalcommons.unl.edu/extensionhist/747/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583518753.75/warc/CC-MAIN-20181024021948-20181024043448-00420.warc.gz | en | 0.939609 | 271 | 3.5625 | 4 |
This article is part of the network’s archive of useful research information. This article is closed to new comments due to inactivity. We welcome new content which can be done by submitting an article for review or take part in discussions in an open topic or submit a blog post to take your discussions online.
This is a great video of a talk given at the Oxford Martin School by Professor Kevin Marsh, 9th of March 2017.
From the Martin School info: Africa currently has the highest disease burden of any region of the world and the least resources in terms of health personnel and health systems. But things are changing rapidly, many countries are in the process of major epidemiologic transitions with falling childhood mortality and the prospects of controlling many of the traditional infectious causes of ill health. At the same time the combined effects of economic development and rapid demographic expansion against a background of increasing urbanisation will pose enormous new challenges for the health of African populations.
In this talk Kevin Marsh, Professor of Tropical Medicine at the University of Oxford, will examine the possible trends for the health of the continent.
See more videos from the Oxford Martin School by clicking here.
Oxford Martin School,
University of Oxford | <urn:uuid:fa9e3f19-64d9-4d7a-845e-51e2fab4b370> | CC-MAIN-2020-45 | https://globalresearchmethods.tghn.org/articles/africas-health-transition-prof-kevin-marsh/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107893011.54/warc/CC-MAIN-20201027023251-20201027053251-00661.warc.gz | en | 0.925265 | 243 | 2.71875 | 3 |
Monday, November 17, 2008
“Maps are central to the human experience... In many ways, the history of maps and mapmaking is the history of human society.”
-- The World Through Maps by John Rennnie Short
I’ve been working with our graphic artist here at work to create a logo for a new client. The first “direction” we were given was to include, in some way, a world map – perhaps even a treasure map.
Unfortunately, four weeks later, we’re still frantically searching for the hidden treasure of a perfect logo buried somewhere deep in our creative sand. Let’s just say that we’ve successfully dug up many empty chests and fools gold.
The process has got me thinking a lot about hidden treasures and creating. Not too long ago, we had my family over to my house for dinner; one of the things I did to keep people occupied was hide a dozen our so items throughout the neighborhood and handed out a “treasure map” complete with landmarks, hints, and GPS coordinates. One child and a couple of childlike-adults enjoyed the search for hidden trinkets.
There are a couple of popular global “treasure hunt.” One is called Geocaching, which involves finding hidden caches/treasure by use of a GPS. There is also a similar game called Letterboxing that involves clues just as starting at a point and walking x# paces to a landmark. Both ways are great for not only finding the prize, but also finding new locations you never knew existed or landmarks you’ve seen a thousand times but never really stopped to take notice. Some are deep in the woods, some are right out in the open near a busy road. In both cases, it helps to have with you one of the greatest inventions in the world -- the magnetic compass. If it’s not the greatest invention that changed the world, it’s certainly the one that heralded a revolution in medieval mapmaking and exploration.
Creative Knights, too, need good maps and a compass to navigate our daily world. Without clear directions, we’d be lost with no direction known (like a rolling stone) and creative ideas would just stay lost in the mental world of uncharted waters. Without a compass to give us some clear direction, how do we know if we’re heading in the right direction, if not running around in circles?
When creating whatever it is we Knights create, it’s fun to be given some directions and start out hunting. Of course, it’s also exciting and necessary to go out and explore beyond the known mapped limits of the universe (or imaginations). How else does the unknown become known and, well, mapped? Or, asked a different way, how else does a new idea get on the map?
Sir “Cartographer” Bowie of Greenbriar
Posted by Sir Bowie of Greenbriar (a.k.a. David A. Kuhn) | <urn:uuid:1a3c33c8-1fff-4719-bb74-73d512204feb> | CC-MAIN-2018-22 | http://knightsmsa.blogspot.com/2008/11/hidden-treasure.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863626.14/warc/CC-MAIN-20180520151124-20180520171124-00317.warc.gz | en | 0.952621 | 630 | 2.546875 | 3 |
If you follow the alternative energy issues (windmills, solar cells, ethanol for fuel, etc) you have very likely encountered discussions about rare earth elements. This posting is designed to provide the reader a little background. Rare earths are used in lights, batteries, motors, lasers, and many other electronic applications. In addition some of them are used as oil refinery catalysts, in metal alloys and glass polishing and coloring applications just to mention a few non-electronic uses. There are 17 rare earth elements on the periodic table. What makes these metals rare is that they are not often found in concentrations that can be profitably mined. According to Wikipedia, one of them “Cerium” is the 25th most abundant element in the Earth’s crust, however they are widely dispersed. China has the best mines in the world it would seem. China sold these elements at prices low enough to shut down most of the other mines in the world.
The magnets that can be made from several of the elements are vastly more powerful that those made from cobalt, the previous best permanent magnet making metal. Two of the rare earths commonly used are Neodymium and Samarium. They are alloyed with other metals to form permanent magnets. These magnets are replacing non-rare earth alloy magnets in electric motor assemblies because of their magnetic field strength. These rare earth alloy magnets can be made smaller to reduce weight and still create high magnetic flux for electric motors. It is said that the magnetic attraction is so powerful that if your finger is between two of these magnets you will likely experience a fractured finger.
Pure Neodymium has a low Curie temperature so it is only magnetic at low temperatures. Above the Curie point it’s parallel alignment of the magnetic field lines become disordered and it loses its magnetism. To overcome this problem, Neodymium is alloyed with boron and iron to make a permanent magnet that can operate up to approximately 300 C. The rare earths are also vulnerable to corrosion. This problem is resolved by plating.
Although Samarium has a higher Curie temperature, it plays a smaller role than Neodymium because it is more expensive and creates a weaker magnetic field. It is commonly alloyed with Cobalt.
The price and geopolitics are playing a role in the use of rare earths. According to a November 16, 2011 NYTimes article, the prices of rare earths are dropping:
International prices for some light rare earths, like cerium and lanthanum, used in the polishing of flat-screen televisions and the refining of oil, respectively, have fallen as much as two-thirds since August and are still dropping. Prices have declined by roughly one-third since then for highly magnetic rare earths, like neodymium, needed for products like smartphones, computers and large wind turbines.
A chart of the price versus time for Neodymium is shown below:
The price for Neodymium appears to be at about $350 per kilogram.
There are some geopolitical ramifications surrounding rare earths: Again from the Times posting:
China mines 94 percent of the rare earth metals in the world. Through 2008, it supplied almost all of the global annual demand outside of China of 50,000 to 55,000 tons. But it cut export quotas to a little more than 30,000 tons last year and again this year and imposed steep export taxes, producing a shortage in the rest of the world.
Together with a two-month Chinese embargo on shipments to Japan during a territorial dispute a year ago, the trade restrictions and shortage resulted in prices outside China reaching as much as 15 times the level within China last winter. That created a big incentive for companies that use rare earths in their products to move factories to China or find alternatives.
The US had some working rare earth working mines before the advent of the Chinese. I have read that one in California is planning to resume production now that the prices have reached a point where working the mine is economical. | <urn:uuid:83c1407b-e753-4069-afea-f1d1795731a0> | CC-MAIN-2020-16 | https://cbdakota.wordpress.com/2011/12/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510846.12/warc/CC-MAIN-20200403092656-20200403122656-00225.warc.gz | en | 0.955771 | 834 | 3.1875 | 3 |
About Water chestnut Edit
The water chestnut, resembles a chestnut in color and shape, is also known as the Chinese water caltrop. This tuber is commonly associated with Chinese cooking, but is finding its way into other ethnic meals.
Hailing from Southeast Asia, water chestnuts are actually roots of an aquatic plant that grows in freshwater ponds, marshes, lakes, and in slow-moving rivers and streams. These roots are commonly grown in Japan, Taiwan, China, Thailand, and sometimes in Australia. Water chestnut harvesting is laborious, making them somewhat expensive to purchase. Processed and canned water chestnuts widely found in most supermarkets. However, fresh water chestnuts, are more difficult to find, but are becoming more available.
If you find fresh water chestnuts, select those that are firm with no signs of wrinkling. These will need to be peeled prior to eating and cooking. Stored fresh tubers need to be wrapped tightly in a plastic bag for up to one week.
Canned, unopened water chestnuts will store indefinitely. Once opened, canned tubers will keep up to one week in a bowl of water. Be sure to change the water daily for the ‘freshest’ product.
The edible tuber of a water plant indigenous to Southeast Asia. The water chestnut's brownish-black skin resembles that of a true chestnut, but its flesh is white, crunchy and juicy. The flavor is bland with a hint of sweetness. Water chestnuts are very popular in Asian cooking, especially in Stir-fried dishes where their crunchy texture is a standout. Water chestnuts are available fresh in most Chinese markets. Choose those that are firm with no sign of shriveling. Refrigerate, tightly wrapped in a plastic bag, for up to a week. Peel before using raw or in cooked preparations. Water chestnuts are also available canned-either whole or sliced-in most supermarkets, but the fresh are far superior.
- Vegetable of the Month: Tubers by the US Centers for Disease Control & Prevention, public domain government resource—original source of article | <urn:uuid:69f27cd3-47d1-4aae-9521-d23d68567c05> | CC-MAIN-2019-35 | https://recipes.fandom.com/wiki/Water_chestnut | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314852.37/warc/CC-MAIN-20190819160107-20190819182107-00079.warc.gz | en | 0.954114 | 434 | 2.8125 | 3 |
The Bank Cormorant is listed as Endangered on the IUCN red list and currently there are only about 150 breeding pairs left in South Africa (DEA unpubl. Data 2016). More than 80% of the world’s population breeds on one single island in Namibia, Mercury Island. Current threats to the species include lack of food because in South Africa, Bank Cormorants feed almost exclusively on Rock Lobster, which has recently been listed as Red on the WWF SASSI list. Other threats include storms and heat events that reduce breeding success and human disturbance at breeding sites.
SANCCOB has been involved with a variety of projects to save the Bank Cormorant from extinction over the last decade. A hand-rearing project was initiated but the species has proven to be difficult as birds imprint on humans and are difficult to release back into the wild. However, SANCCOB’s strength in this regard will be its experience in hand-rearing seabirds, which will be vital in the project’s success.
SANCCOB is also leading the Bank Cormorant Working Group, a group of NGOs, researchers, government institutions and conservation authorities, working on a Species Action Plan to align the efforts to save the species from extinction.
The only two colonies in South Africa with more than 50 breeding pairs of Bank Cormorants are Robben Island and Stony Point in Betty’s Bay.
In both colonies, SANCCOB is funding seabird and penguin rangers that assist the managing conservation authorities with rescuing injured and weak birds, monitor breeding success and try to reduce human disturbance through educating the public and local communities. These efforts are not limited to the African Penguin but extend to threatened and important species such as the Bank Cormorant, Cape Cormorant, African Black Oystercatcher and others.
SANCCOB’s Rehabilitation and Veterinary teams also treats injured Bank Cormorants but due to the low numbers in South Africa, only few birds are admitted to SANCCOB annually.
SANCCOB’s Research Department conducts disease research involving Bank Cormorants and collaborates closely with researchers in Namibia on how best to protect the species in the main breeding colonies. | <urn:uuid:1a64419d-a6ab-4473-b02e-f7bc40365174> | CC-MAIN-2021-04 | https://sanccob.co.za/projects/bank-cormorant/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506832.21/warc/CC-MAIN-20210116165621-20210116195621-00799.warc.gz | en | 0.941195 | 460 | 3.171875 | 3 |
An x-ray beam of wavelengths from 76.5 pm to 230 pm is incident at ? = 41.1° to a family of reflecting planes with spacing d = 262 pm. What are (in pm) the (a) longest wavelength ? and (b) associated order number m and the (c) shortest ? and (d) associated m of the intensity maxima in the diffraction of the beam?
Detailed explanation would be helpful. Thanks in advance to anyone who answers :) . | <urn:uuid:cf7905f8-f38b-4d65-92f8-ba9962610298> | CC-MAIN-2013-20 | http://www.chegg.com/homework-help/questions-and-answers/x-ray-beam-wavelengths-765-pm-230-pm-incident-411-family-reflecting-planes-spacing-d-262-p-q3781137 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705790741/warc/CC-MAIN-20130516120310-00020-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.948077 | 100 | 2.734375 | 3 |
Confederate Circle at Mt. Olivet:
1201 Lebanon Pike, Nashville, TN 37210
After the Civil War, women formed an association to raise funds to purchase a distinct plot of land at the cemetery for the interment of Confederate dead. It was used for the interment of soldiers who had died on nearby battlegrounds and as a memorial to their sacrifice. Women organized such memorial associations and raised money for interment of Southern soldiers in cities across the South and areas where there were concentrations of bodies. The Nashville memorial association arranged for burials of about 1,500 soldiers here. Confederate veterans were also eligible for burial. – Wikipedia
Confederate Memorial Hall: The chamber was constructed in 1856, when Mount Olivet opened, as a holding vault. Underground, it allowed the deceased to be kept at cooler temperatures. Embalming procedures improved in the 1860’s, but the structure is believed to have been used well into the 20th Century. It is open to the public and includes a timeline of significant individuals related to the Civil War in Nashville. The Hall located on the left main drive, on the right side near the crest of the hill.
Notable Civil War Related Burials:
- Adelicia Acklen, wealthy Nashville businesswoman and socialite.
- William B. Bate, Governor of Tennessee (1883 to 1887), Confederate general
- Battle, Fannie (Mary Francis) (1842-1924), Confederate spy and social reformer.
- William N.R, Bealle, Confederate brigadier general
- John Bell, United States Senator and presidential candidate
- George P. Buell, Union Army general
- Benjamin F. (“Frank”) Cheatham, Confederate general
- Mark R. Cockrill (1788-1872), cattleman, planter, and “Wool King of the World”.
- Thruston Sr., Gates Phillips (1835-1912) Union Brevet Brigadier General. Lawyer, businessman and author.
- Alvan Cullem Gillem, Union general and post-bellum Indian fighter
- Adolphus Heiman (1809 – 1862), Prussian-born American architect and soldier; later becoming a Confederate Colonel
- William Hicks Jackson, Confederate general
- Mary Kate Patterson Kyle (1844-1931) Coleman’s Scouts Confederate spy, first woman to be buried in Confederate Circle
- George Maney, Confederate general and U.S. Ambassador to Chile, Bolivia, Paraguay, and Uruguay
- Randal William McGavock (1826–1863), Mayor of Nashville from 1858 to 1859 and Confederate Lt. Colonel who was killed in the Battle of Raymond.
- Colonel Buckner H. Payne (1799-1889), clergyman, publisher, merchant and racist pamphleteer.
- James E. Rains, Confederate general killed in the 1862 Battle of Murfreesboro
- John Hugh Smith (1819–1870), Mayor of Nashville, Tennessee three times, from 1845 to 1846, from 1850 to 1853, and from 1862 to 1865.
- Thomas Benton Smith (1838 – 1923), Confederate brigadier general
Seven Confederate generals are buried in or around the circle. They are William B. Bate, William N.R, Bealle, Benjamin Franklin Cheatham, William H. Jackson, George E. Maney, James E. Rains, and Thomas Benton Smith. Other prominent Nashville Confederates, Colonels Adolphus Heiman and Randall McGavock, lie nearby.
This 45-foot granite monument marks the center of the Confederate Circle. | <urn:uuid:5611224b-0fd3-4fcf-8943-2da4485f16a0> | CC-MAIN-2019-09 | https://battleofnashville.com/mount-olivet/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247489425.55/warc/CC-MAIN-20190219061432-20190219083432-00241.warc.gz | en | 0.895997 | 761 | 2.96875 | 3 |
StollWerthe in the 1200s is STOLLERY today
"WERTHE," sources told your editor, is the traditional name for the herder. The "th" hardened into the "d" sound in this case, is a presumption. Members of the "WERTHE" family were involved in raising, shearing (yet note there were SHEARER families as well), cleaning the pelts, carding the wool (perhaps the CARDERS came from this group) and then selling to woolen weavers (WEAVERS) and specific goods manufacturers.
NAME UPDATE: Thank you, sharp librarian! No, we are NOT related to terms found in the Oxford English Dictionary, even if Oxford IS near Suffolk! Just come in on the discussion? Based on what the OED has to say, STOLL = thief; WERTHE = value; ergo, STOLLWERTHE = valuable thief, or wealthy or worthy thief...sorry! However, we DO follow up on things, even if we don't get to do it immediately.
A family with the name "STOLL" was involved in weaving and preparing woolen fabrics for market. Their work apparently consisted, in the main, of sleeveless shirt-type wraps, or what we would today call "stoles." They bought wool 'pelts,' did the carding and threadmaking for their weaving.
One of the famiilies had a bright idea; it's a presumption that the WERTHE family wanted to "lock in" a market for their wool. It's just as easy to presume that the STOLL family wanted to assure themselves of a source of wool In either case, it's a guess: it also appears to be the first step towards "vertical marketing" of wool; from grower of the raw goods to seller of finished product.
A better historian than this writer will (eventually) tell us more about that fateful day in 1253 when the marriage itself took place, in what appears to have been a small parish; the register isn't available to your editor, at present.
(When it is, and the true facts elicited therefrom, this narrative will be updated and appropriately referenced.)
That marriage between two proud Saxon families was the first real step towards the family we call STOLLERY today. What began in a small parish in southern Egnland has spread, in the Stollery family, to encompass a major portion of the world.
For more discussion on the origins of STOLLERY etc., please see http://www.stollery.8m.net, where you will find all of the known STOLLERY family members in a comma delimited alphabetically ordered file.
There are four "coats of arms" reported in the STOLLERY family.
The COATS OF ARMS page has three of the printed versions, plus current interpretation of those images. Your editor THINKS, as of Jan. 15, we can date two of them. We will cover them as we go along.
During our preparation period for that page, it was discovered that the Coats themselves might clue you in as to when it originated. Note: about May 15th, we had word about a fourth coat (no art work) and that one of the existing coats (#3) is a fake. At this writing (May 28) we've included the fourth coat and information on #3 on a separate page..
AND, we settled one mystery ancestor! We deleted her from the list, as her entry was inaccurate. It was a double, which is explained further on.
Your Privacy Rules..
Your email address is yours; it is NOT put into any type of a "public mailng list" or in any way compromised or exposed to others. You may notice that your editor's emails have but ONE person on the address bar; that way, even other people on the editor's address list don't know ALL his secrets!
(Most of you already posted your email addresses at Ancestry.com, where more information is available.)
Not all Stollerys are linked to the "Main Line"
This web site is given over to the generally accepted "Stollery Family Tree." As such, it omits twice as many or more OTHER Stollerys! You will find the "current list" of all Stollery family members at http://www.stollery.8m.net.
Your family has several ... "orphans." Stollery families with names, rarely any dates, and no way of knowing where they link to. Although we've used 'internal evidence' to link some families together, their link to the rest of us is missing -- which leads us to our call, nay, our CRY, for your help:
If you know dates, etc., for the individuals -- please email me!
OH -- just noticed on Memorial Day weekend; the orphan pages, here, are not complete as we've added a few Stollerys to the alphabetical pages. I'm not really on top of the Orphan pages, with all the other things going on.
AND, something new. I've been asked about doing more to list the spouses than their current position. Okay, give me some room -- and I'll turn out a composite SPOUSE LIST complete with links to your own family pages. Just send me the links, okay!
Site email address -- mailto: firstname.lastname@example.org?Stollwerthe
To contact the editor, use the email link above.
NEW STOLLERY WEB SITE -- Paul Pederson, a major contributor of information to the Ancestry.com and other web databanks (and to our PAF file here) has developed his own tribute to our family. He's not posted the Coats of Arms yet -- but you will find different materials when you look at
Frederick Arnold Stollery, Sacramento CA (of the California Stollerys) for printing, in March 2001, a compendium on which these pages are based. An update: the original file (which came before the book) is a PAF file.
Nancy Crisp, Essex, UK, for leading and discovering many of the names and dates.
Kathy Stollery Vick, Edmonton, Alberta, Can., source of the original Canada line.
Paul Pederson and wife Jean Stollery Pederson, Toronto, Ontario, Can., for expanding some of the Canadian story.
LATE BREAKING NEWS: PEDERSON HOSTS WEBSITE --
the URL is http://freepages.genealogy.rootsweb.com/~stollery
Joan (Mrs. Arthur) Stollery, Christchurch, NZ, for the New Zealand / Southseas line.
APOLOGIES may be due to several "non-Stollery" descendants; the original files were recorded in "PAF" (hence the numbers) and because several different families were involved, their descendants were omitted from these crowded pages. HEY, COUSINS, I'll be delighted to insert your links in those places! You can have your OWN family tree pages -- email me!
Additional work by Gary John Stollery, also of the California Stollerys.
Your editor is thankful for the preliminary work by these wonderful family members and relatives. Alterations and additions to the printed report are the responsibility of your editor. So are the usual typographical errors, which were inserted by accident and NOT to satisfy the purists who look for such things. (Tell me about them, of course, and I'll sneak in and correct what ones can be corrected.)
Should you have any of the "missing links," that is, connections between the major line and the "orphans" in the minor lines, be sure to let your editor know! (email links below.)
(Ed Stollery is the same as Edward W. Stollery II as may have been seen elsewhere on the internet.)
If you want to use the STOLLERY.8M.NET link, highlight it ... it's right below this paragraph.
Remember our "Alphabetical List" | <urn:uuid:b9dbcb66-d529-40fd-ab54-f9373dcc5f0d> | CC-MAIN-2014-49 | http://stollwerthe.8m.net/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400380037.17/warc/CC-MAIN-20141119123300-00234-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.961769 | 1,707 | 3.40625 | 3 |
When technology, weather and/or released acreage expand crop supply faster than the rate of demand growth, crop prices plummet as they most certainly have in recent years. But in contrast to other sectors, crop agriculture tends not to recover in a reasonable time — the last three years being a case in point.
In a market economy, bloated product inventories (grain stocks in the case of agriculture) should be worked down automatically as consumers purchase more and producers produce less of the product in response to the depressed prices. This self-correction causes inventories to rebalance and prices and incomes to recover. To the dismay of all, no such correction has occurred in crop agriculture despite prices that have plummeted by 40 percent. This column considers why a market-driven recovery has not occurred through expansion of the quantity demanded.
The lack of a significant increase in the quantity of agricultural commodities purchased, especially by importing nations, is in marked contrast with the rhetoric of the past. The conventional wisdom in the 1980s was that we were pricing our crops out of the export market. A lower U.S. price, it was said, would cause a surge in demand by crop importers and cause our export competitors to reduce their exports. Then, as our exports greatly expanded, revenues would increase, inventories would decline and prices would improve.
Yet, when given a chance æ especially since the adoption of Freedom to Farm in 1996 æ the market has not reacted as expected. Compared to early 1980s, crop prices are down by half while exports are virtually unchanged. It has taken us twenty years to relearn what we had known for decades: Crop demand is relatively unresponsive to price changes.
The overarching idea is that since food is essential for life, price is of little consequence. Food comes first. We will pay whatever is required to obtain it. But once we have enough, we will not buy significantly more total food, no matter how far the collective price of food has dropped.
Is this true for other products? Of course not. Typically, a price drop greatly expands the quantity of an industry's product purchased by consumers.
It is also likely that feed demand, the major use of grains and soybean meal, is becoming less rather than more responsive to low prices. With the increased use of large, high-fixed-cost buildings in livestock production and fewer producers who come “in and out” of the market, there are fewer opportunities for adjusting feed use in response to price changes.
And as the last four years have shown us in spades, export demand responds very little to lower prices, even after four years. Importing countries have no more tendency to import more because of a general drop in grain prices in a given year than we have a tendency to eat more total food because prices have dropped. As a result, the total world export pie expands very little in response to lower prices.
And since our export competitors tend to export almost all their production in excess of their domestic use in a given year, the U.S. tends to be the residual supplier. We tend to be the residual suppler whether prices are “low” or “high” and regardless of the rate that the dollar exchanges with other currencies.
Likewise, importers do not produce significantly less even when prices remain low for several years. Although, as a result of a drop in world price, it may be significantly cheaper to import food than to produce it locally, food security and other politically important considerations often override price.
As an economist, I would like to think that relative costs or comparative advantage among countries is the driving force behind international trade. And I believe it is for many or most internationally traded products. However, it is delusional to think that comparative advantage is in the driver's seat in the case of raw agricultural commodities.
Export competitors react to lower prices much the same as our producers, they produce anyway. It is important to note that with the loan deficiency payment program, our export competitors have experienced the full force of the low prices in recent years. Yet, Brazil has increased soybean acreage by 13 percent since 1996 despite a 40 percent drop in soybean prices and an increase in U.S. soybean area of over 13 million acres.
Subsidies not needed
At the same time, lower wheat prices have not brought the “EU to its knees” as was so commonly heard during the policy debates of the mid-1980s. After years of receiving price-depressed wheat export revenue and experiencing the continued erosion of our share of world wheat exports, not only were we unsuccessful in reducing wheat exports from the EU over the years, it now appears that the EU is capable of exporting wheat without the export subsidies that we were so sure they needed to be competitive.
It is astounding to think of how much money we have spent on deficiency payments and other direct payments convinced that by driving the price well below our full cost of production, we could regain the export share we enjoyed during the late 1970s.
Obviously, this hasn't worked! Are we going to learn from that policy failure or are we going to continue to stay the course, producing more than can be sold at profitable prices so we can be competitive in the export market but receive successively less from the sale of crop exports?
Daryll E. Ray holds the Blasingame Chair of Excellence in Agricultural Policy, Institute of Agriculture, University of Tennessee, and is the Director of the UT's Agricultural Policy Analysis Center. (865) 974-7407; Fax: (865) 974-7298; email@example.com; http://apacweb.ag.utk.edu/. | <urn:uuid:301b7b73-2d8f-4efc-b842-c5b227a38630> | CC-MAIN-2015-14 | http://westernfarmpress.com/low-prices-not-correcting-crops-surplus | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298020.57/warc/CC-MAIN-20150323172138-00087-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.971616 | 1,167 | 2.75 | 3 |
Defending Abe: Why Japan's Decision to Reintroduce Nuclear Power Makes Sense
By Russell SeslerPublished April 14, 2014By Russell Sesler, 4/14/14
Before the Fukushima Daiichi disaster, nuclear power was a cornerstone of Japan's electricity generation. It constituted 30% of Japan's electricity production and was expected to rise to 50% of production by 2030. Yet, on March 11th 2011, a tsunami hit the Fukushima 1 Nuclear Power plant. This caused three of the plant's reactors to melt down and release substantial amounts of nuclear materials. In the aftermath of that meltdown, Japan switched off all 48 of its reactors.
Just three years the Fukushima disaster, Shinzo Abe, the Japanese prime minister, and his government have made the immensely unpopular decision to reopen several of Japan's nuclear plants. Currently, 17 out of the 48 reactors are undergoing screening for probable reopening. According to a survey by Asahi Shimbun in March, 59% of those polled opposed restarts while only 28% supported it. Furthermore, 36% of the Japanese public had a very high degree of concern of further nuclear disasters and 50% had a fair degree of concern. Despite this public outcry, Abe's energy policy, with some minor tweaks, is the best strategy for Japan. His nuclear energy policy seeks to restore Japanese economic effectiveness, minimize the risk of future disasters, and limit environmental risks.
The most important factor in Abe's decision-making is economics. Japan is a resource-poor country and imported an astounding 84% of its energy requirements in the wake of the Fukushima disaster. Now Japan primarily relies on oil, natural gas, and coal to generate electricity. Before the meltdown, nuclear energy was intended to absorb much of Japan's electricity demand and was expected to grow from 30% of electricity production in 2011 to 50% by 2030. Since much of its energy demanded is now imported, Japan's electricity costs have doubled and Japan has posted its 20th consecutive month of experiencing a trade deficit. All of these factors have weakened the Yen and have raised the costs for many Japanese businesses. Many environmentalist groups have urged the Japanese government to shift to renewable energy production instead of using nuclear power to add extra electricity supply. However, renewable energy sources like solar and wind power only constitute 2% of output and many experts believe that it will be years until renewables can supply a significant amount of Japan's energy demand.
Environmentally, a nuclear option seems much better than relying on coal. Much of the imported energy used to offset the closing of nuclear plants has been coal because of its relatively low effectiveness and secure supply. However, it has been widely documented that using coal for electricity production emits carbon dioxide, which has caused significant levels of greenhouse gas emissions. While there is always the risk of another major nuclear meltdown like at Fukushima, it can be prevented with stricter safety procedures.
To mitigate future nuclear disasters, the Japanese government now makes nuclear companies ensure that its nuclear reactors can withstand a maximum level of stress from natural disasters. Nearly all of the nuclear reactors that are being considered for reopening are along the safer Sea of Japan coast, rather than on the Pacific coast, to minimize the threat of tsunamis. Furthermore, in the wake of Fukushima, the Japanese government created the Nuclear Regulatory Authority, which has been much more stringent and safety conscious.
Ultimately, the tenuous state of the Japanese economy means that a return to the nuclear option looks like the most economically and environmentally viable option as long as the Japanese NRA continues to adhere to effective safety policies. As Japan looks to revise its energy policy, nuclear power should remain in the mix. | <urn:uuid:3a529d05-14f4-4207-908d-0e1ebb51f872> | CC-MAIN-2018-51 | https://cornellrooseveltinstitute.org/env/defending-abe-why-japans-decision-to-reintroduce-nuclear-power-makes-sense | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376832330.93/warc/CC-MAIN-20181219130756-20181219152756-00184.warc.gz | en | 0.957726 | 733 | 2.90625 | 3 |
What is Transphyseal Surgery?
Surgery may be necessary to reconstruct an irreparable anterior cruciate ligament (torn ACL). It usually involves the use of a soft tissue graft which is passed through tunnels drilled into the shin and thigh bones and secured to these bones. In a child or adolescent, a transphyseal surgery may be performed where the tunnels pass through the growth plate or physis (area near the end of a long bone where growth is still occurring). Injury to this area could potentially affect growth and result in deformity. An appropriate surgical technique is used to minimize these effects.
Indications for Transphyseal Surgery
ACL reconstruction via transphyseal surgery is recommended for active children who are involved in sports or recreational activities. Severe knee pain and inability to continue activities are the primary indications for ACL reconstruction.
The other indications include:
- Failure to improve or comply with non-operative treatment
- A recurrent feeling of knee instability during daily activities
- Repeated episodes of the knee “giving way”
- Associated meniscal tears and/or severe injuries to other knee ligaments
- Generalized laxity of the ligaments
Knee instability due to an ACL tear can lead to meniscal and cartilage injuries and early onset of arthritis
Benefits of Transphyseal Surgery
Benefits of transphyseal surgery include:
- Effective treatment with minimal complications
- Improved knee stability
- Allows return to sports following adequate rehabilitation
Transphyseal surgery has demonstrated excellent functional results in children with no significant growth disturbances.
How is the Procedure Performed?
Hamstring tendons on the inner side of the knee (inner thigh muscle) are mostly used as a graft in transphyseal ACL reconstruction surgery. Two of the tendons are removed and bundled together to create a new ACL.
- The procedure is performed under general anesthesia
- You will lie on your back
- A tourniquet is placed over the thigh
- Small incisions are made over the knee to insert an arthroscope and instruments.
- The torn or injured ACL is debrided
- Tunnels are drilled through the bones and oriented to minimize injury as they pass through the growth plates (making them small and as vertical and central as possible)
- Drilling is performed slowly which also minimizes injury to the growth plate
- The graft is passed through the tunnels
- The graft is fixed and secured with screws or staples away from the growth plate
- The incisions are closed, and a dressing is applied
- A brace may sometimes be used for support
You will usually be able to return home on the day of the surgery.
Recovery After Transphyseal Surgery
Post-procedure, X-rays of the knee are obtained to check the position of the tunnels and fixation. A rehabilitation program that includes specific exercises for hamstring strengthening and knee motion restoration is instituted.
What are the Risks Associated with the Procedure?
Transphyseal ACL reconstruction surgery carries a few risks some of which are correctable. They include:
- Damage to the physis
- Traumatic graft disruption
- Post-operative knee instability
- Growth disturbance or disorder
- Tibial or femoral overgrowth
- Valgus or angular deformity
- Recurrent ACL tear
- Long healing time | <urn:uuid:6fc56e80-1840-4de3-ae14-343d715ec294> | CC-MAIN-2023-40 | https://www.stapletonortho.com/transphyseal-surgery-orthopedic-sports-surgeon-lewisburg-west-virginia/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00243.warc.gz | en | 0.928322 | 693 | 2.953125 | 3 |
GEOG 413: Remote Sensing -- Image Interpretation
(Landsat 7 ETM+ Image Courtesy of NASA and USGS)
Please check Blackboard for your Course Syllabus
- Lillesand, Kiefer, and Chipman. 2008. Remote Sensing and
Image Interpretation, 6th edition. John Wiley & Sons, Inc, New York.
Web Resources -- there are many from which
to choose, but here is a small sample of useful sites.
- ASPRS -- American
Society for Photogrammetry and Remote Sensing
- Cambridge In
Colour -- A site dedicated to the art, science, and technical mastery
of photography. Created by Sean T. McHugh.
Above the Clouds -- An eclectic collection of aerial photographs
from around Plymouth England, late 1970s. Created by Stephen Johnson.
- Canada Centre for
Remote Sensing -- This site contains excellent
reference materials and instructive tutorials about remote sensing, as well
as access to sample imagery.
- USGS Landsat Project
-- The home page of Landsat, one of the most successful civilian satellite
remote sensing programs ever initiated.
7 Compositor -- A nifty tutorial with information about the basics
of Earth Imaging with Landsat
- USGS Land Cover Institute
(LCI) -- Learn about some of the operational remote sensing work
conducted by the US Geological Survey.
From Space -- A classic NASA resource authored by Nicholas M. Short
and Robert W. Blair, Jr.
Sensing Glossary -- Remote sensing can involve a head-spinning
array of technical jargon and terminology. This site was created in an effort
to catalog it!
- Remote Sensing Tutorial
-- An excellent reference site for all things related to remote sensing. Created
by Dr. Nicholas M. Short and maintained by NASA.
- Imaging Notes
-- A trade magazine pertaining to all things related to earth observation
with remote sensing.
- Earth Imaging Journal
-- Another remote sensing / earth observation trade magazine.
Page Last updated: August 26, 2011 | <urn:uuid:fb37f9e6-f31d-4a12-9ff3-13434cd372be> | CC-MAIN-2014-15 | http://faculty.frostburg.edu/geog/meramspott/GEOG413.htm | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206118.10/warc/CC-MAIN-20140423032006-00219-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.751549 | 431 | 2.828125 | 3 |
PI is determined by the circumference of a circle.
What bothers me is why is it any particular constant number? What I mean is, would a circle as defined as a perfect circle in any universe lead to a different value of PI?
Would all universes where a circle could be constructed by "people" there also lead to the value of PI?
If its true then it leads to the conclusion that PI is some sort of constant value constant to all universe. What is the meaning of that?
Science fiction references.
In science fiction Pi sometimes has a different value in different universes, for example Greg Bear's "The Way", it says "Gates are capped with cupolas formed from Space-time itself. As distortions in space-time geometry, their nature can be calculated by 21st century instruments laid on their 'surfaces'. The constant Pi, in particular, is most strongly affected.".
A message is found encoded within Pi, in the novel by Carl Sagen, "Contact" "Ellie, acting upon a suggestion by the senders of the message, works on a program which computes the digits of pi to record lengths in different bases. Very far from the decimal point (1020) and in base 11, it finds that a special pattern does exist when the numbers stop varying randomly and start producing 1s and 0s in a very long string.". | <urn:uuid:4fdc413f-84fe-45e7-b2ca-11b45b00ee5f> | CC-MAIN-2015-32 | http://math.stackexchange.com/questions/53023/could-pi-have-a-different-value-in-a-different-universe/53024 | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990603.54/warc/CC-MAIN-20150728002310-00264-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.954395 | 282 | 2.734375 | 3 |
The eastern North Pacific blue whale population has rebounded since being hammered by commercial whaling, according to a new study. And ship strikes, long feared a major obstacle to the recovery in blue whale numbers, likely aren't major threats, the authors conclude.
The study authors used a computer model to estimate the size of the eastern north Pacific blue whale population before commercial whaling decimated their numbers—as well as current abundances and future population trends. They then examined whether the population was more affected by ship strikes or by the environment's ability to support a certain number of whales.
The team found that "there's no immediate population threat to these whales from ship strikes," says Cole Monnahan, a doctoral student at the University of Washington and the study's lead author. Rather, the reason the blue whale population in the eastern north Pacific hasn't increased, he says, is that the ocean off the west coast of North America can't support any more.
There are now about 2,200 blue whales in the eastern north Pacific, Monnahan says. And that number hasn't changed appreciably since 1993. "That's why people thought something was going on and that maybe ship strikes might be having an effect [on blue whale numbers]," he explained. (See "Blue Whale 'Hot Spots' Overlap With Shipping Lanes, Raising Threats.")
The researchers point out that they looked at only the eastern north Pacific blue whale populations. Their results in no way reflect a global recovery of blue whales. In fact, a 2013 study pegged historical blue whale population numbers in the waters around Antarctica at nearly 300,000. Recent estimates suggest that there are about 2,000 left in that southern population.
Not So Fast
The problem, says John Calambokidis, a senior research biologist at the Cascadia Research Collective in Olympia, Washington, is that "these types of models are based on the assumption that populations aren't experiencing other threats, like ocean warming."
The study's conclusions are a bit of a stretch, Calambokidis says, because the data on whale numbers is shaky. Historical catch numbers from commercial whaling fleets are notoriously underreported, as are estimates of how many blue whales are killed each year by ship strikes, both data sets that researchers fed into their model.
The study acknowledges these limitations, he adds, but does a poor job of addressing them in the computer model. That could "potentially contribute to false conclusions about ship strikes not being a threat to blue whales," Calambokidis says.
Based on the numbers in the study, it is possible that blue whale numbers have recovered in the eastern north Pacific population, the biologist acknowledges. But he is hesitant to say that even this particular population of whales has recovered. (Read about tracking blue whales in National Geographic magazine.)
Bruce Mate, director of the marine mammal institute at Oregon State University, adds another problem with the study. Its assumption that the carrying capacity—an environment's ability to support a certain number of animals—hasn't changed from the early 1900s to now is also a problem.
He cites his work studying gray whales in the Bering Sea between Alaska and Russia as an example of how quickly a habitat's carrying capacity can change.
Gray whales used to be concentrated in the Bering Sea about ten years ago, feeding on seafloor creatures. But "today, it's turned around," Mate says. Now, they're all north of the Bering Sea, he notes, because "they ate themselves out of house and home."
"The environment [today] isn't the same environment it was a century ago," Mate says, and the way that "the animals repopulate this environment may be quite different."
Monnahan was also surprised when he saw the computer model's results, and he is anxious to see how the research and conservation community receives the study. "If someone wants to challenge [the paper], we'd be more than happy to share our data," he says.
For now, Monnahan and colleagues are aiming to broaden their blue whale studies to the entire north Pacific. The eastern north Pacific blue whale population is, in some respects, the easiest to study, he says. "We know much less about blue whale populations in the western Pacific around Hawaii, Japan, and Korea."
Commercial whaling fleets caught many more blue whales in the western Pacific, and those historical numbers have been harder to get a good handle on, Monnahan explains.
"Basically, [we want to] compile all the data on blue whales in the north Pacific to learn more about their ecology," he says. (Learn more about blue whales through this interactive.)
For now, in regard to this current study, "all we're saying is that there's no immediate population threat to [blue] whales from ship strikes," Monnahan says.
Follow Jane J. Lee on Twitter. | <urn:uuid:aaaf91f1-fcf9-4d4b-8fa9-f9926d98f7b2> | CC-MAIN-2019-26 | https://news.nationalgeographic.com/news/2014/09/140906-blue-whale-recovery-questions-animals-ocean-science/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999787.0/warc/CC-MAIN-20190625031825-20190625053825-00288.warc.gz | en | 0.963405 | 1,003 | 3.421875 | 3 |
A yellow star in the Big Dipper's bowl bears a striking resemblance to our
Sun, say astronomers in Australia. It may therefore have a planet like
Earth, so they suggest scientists search the star for signs of intelligent
life. For the full story, see http://KenCroswell.com/HD98618.html .
Other recent stories:
The Horsehead Nebula is Rotating (Jan 31, 2006):
Andromeda's Newest Satellite Galaxy (Jan 29, 2006):
Most Stars Are Single (Jan 19, 2006):
The Tenth Planet's First Anniversary (Jan 5, 2006):
First Direct Distance to Andromeda (Nov 4, 2005):
A not-so-recent story, but perfect for the month of March:
Regulus is Oblate (Jan 19, 2005):
Correct email: MagnificentUniverse "at" yahoo "dot" com. | <urn:uuid:180f8b9b-b3ca-40d6-a8e8-9cc6acc864ad> | CC-MAIN-2017-30 | http://www.archivum.info/sci.astro/2006-03/01219/BREAKING-NEWS--A-Solar-Twin-in-the-Big-Dipper.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426693.21/warc/CC-MAIN-20170727002123-20170727022123-00618.warc.gz | en | 0.700877 | 185 | 2.78125 | 3 |
The green hills of California's prairie barely conceal a horrific violent past. Around 20-23 million years ago, huge volcanic eruptions shook the western part of North America. Ash (pulverized volcanic rock) blasted into the atmosphere in unimaginable volumes, 100 cubic miles or more. Some of the ash was driven into the upper atmosphere, to be spread around the world with the wind currents, but much of it settled in layers that covered tens of thousands of square miles. Living things would have been buried at best, incinerated at worst. Any one of these events would have been a catastrophe. But there were many of them.
Some of the ash clouds rolled off of highlands that once existed in central Nevada and flowed west into California and down the western slopes of the slowly rising Sierra Nevada. These ash deposits are called the Valley Springs formation, and this rock still influences life in the present day.
The ash eruptions subsided, but new volcanoes developed at closer quarters, near or just east of the present-day crest of the Sierra Nevada. An occasional lava flow reached the lower foothills of the Sierra, but more often, it was a volcanic mudflow, or lahar, that came to inundate the landscape. The rocks today are called the Mehrten formation. Numerous animals lived on the resulting river floodplains and lakes, include tremendous six-foot long salmon (with "tusks"), and tortoises the size of their Galapagos cousins. Mastodons, horses and camels wandered the plains, chased by fearful carnivores, including the ancestors to the Sabertooth cat.
The geologic violence subsided, and erosion has subsequently smoothed off the hard edges of the volcanic rocks. In the semiarid climate, it is mostly grass and annuals that grow here, although the occasional oak survives in the barren landscape. The volcanic rocks contributed to the unique habitat that exists here today, providing through the weathering process copious amounts of clay.
Most of the minerals in ash will decay over time into one of the clay minerals. Soils that develop at the surface tend to be clay-rich, or clay may be present just below the surface, forming an impermeable barrier that prevents water from percolating into the ground. Because wind can blow out hollows, and because clay-rich layers can differentially settle, small pools of water may remain after major winter rainstorms. Because the water can't percolate, it doesn't disappear until it evaporates. The resulting ponds are called vernal pools. The pools are one of our more unique and unusual habitats in California.
A large number of species of plants and animals have evolved to survive in this environment that swings wildly from wet to dry within a period of weeks, and many of the species are endemic to the state. Colorful wildflowers bloom quickly in the drying rings of the "shores" of the little ponds, growing and setting seed before the water has completely dried up. The seeds can repose in the soil for years at time when drought dominates the landscape. Frogs and other amphibians may burrow into the soil and estivate (remain inert) for months on end, waiting for the rains to return.
We spent a delightful afternoon out on the prairie last weekend. It's not too hard because our village lies on the edge of the grasslands. We traveled Willms Road south of Knights Ferry near Highway 108. The spring flowers were just beginning to make an appearance following a warm dry February. There had been fears that this was the end of our rainy season, but a number of vigorous storms are on tap for the next two weeks, so the pools may be filling again for awhile.
Many birds call the prairie home. We felt especially lucky to see a pair of Great Horned Owls in a hollow along an ephemeral creek. The Valley Springs formation is soft and easy to excavate, but the holes are architecturally sound.
A Savannah Sparrow favored me with a pose on a fence next to the road. It was the first time I've had a chance to photograph one.
It was also the first time that I captured a Horned Lark. I thought at first that it was a Western Meadowlark, but I realized the markings were all wrong.
The Meadowlarks were certainly out and about, though. We could hear them all along our drive. At this time of year, they're looking for mates, and aren't at all bashful.
It was a beautiful afternoon in a serene "wilderness" (these are really private ranchlands), but we were also chastened by the sight of thousands of acres of new almond orchards that have been planted just to the west. The water for the trees is coming from irreplaceable groundwater aquifers, and when they have been sucked dry, the almonds will die away. In the meantime, hundreds if vernal pools will have been destroyed.
How far south in the Great Valley does the Mehrten formation go?
The Mehrten disappears in the vicinity of the Merced River. There are only a few exposures of volcanic rocks south towards Fresno.
Post a Comment | <urn:uuid:37938f13-3716-48c9-a2a7-95fb36fe499c> | CC-MAIN-2023-23 | https://geotripper.blogspot.com/2016/03/volcanic-violence-and-californias-most.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00561.warc.gz | en | 0.964096 | 1,074 | 4.1875 | 4 |
On August 14, 1935, the US federal government launched its social insurance program to provide…
World Autism Awareness Day falls on April 2nd each year and is part of the larger World Autism Month observance. The observance includes hundreds of thousands of landmarks, homes, and buildings worldwide being swathed in light blue to recognize people living with autism. Many educational activities and events will take place to foster understanding and promote acceptance of autism spectrum disorder, or ASD, and of course, fundraising will intensify to endow growing research challenges to meet the needs of this highly individualized disorder.
The prevalence of autism is on the rise in the US. Because the condition first manifests itself before the age of 3, the majority of people receiving new diagnoses are under the age of 6. Autism spectrum disorder (ASD) refers to a broad range of behavioral conditions that include challenges with social skills, speech, and nonverbal communication as well as repetitive behaviors. The Centers for Disease Control and Prevention (CDC) now estimate that autism affects 1 in 59 children in the United States.
That number has been steadily increasing in the past decade.
Autism is a very plural condition as there are many subtypes, primarily influenced by the environmental and genetic factors and has varying degrees of severity. Individuals coping with autism have distinct sets of strengths and challenges. That is why people are characterized as being on an autism spectrum because the individual scale of learning, thinking and problem-solving skills can range from highly skilled to severely challenged. Some who are diagnosed with autism spectrum disorder (ASD) may be able to live entirely independently while others may require some to significant support in their daily lives.
Federal and state programs help assist families with children and young adults who have ASD. The Individuals with Disabilities Education Act (IDEA) federal law outlines rights and regulations for US students who require special education. The U.S. Department of Education website outlines the basics of IDEA in simple terms. Are these services available until the young adult reaches the age of 22 and then what? There is a vast continuum of diagnosed and undiagnosed adults who are struggling to make sense of life while living with ASD.
Autism Speaks is an organization that calls on legislators and public health agencies like the National Institute of Health to promote research and advancements in understanding the increased prevalence of and complex medical needs that often accompany a person with autism. There has recently been a call to double the budget to advance research and create policies that better provide individual support and services as autistic children transition to adulthood and need employment and residential options.
For people afflicted, autism is a lifelong condition and there is an unacceptable gap in our awareness of their needs particularly as children age out of federal school programs at 22 and are left to struggle with areas of basic life skills such as employment, housing, and social inclusion. Children with autism eventually become adults with autism. While some autistic adults become very successful, even famous for their success in arts and sciences (Albert Einstein, Dan Aykroyd, and others) others languish in their inability to navigate a complex world.
Wherever an adult finds themselves in the autism spectrum, there are specific basic needs which mirror those adults without the challenge of ASD, and they are friendship, support, and opportunity. The mechanisms and interpretation of communication may differ but the human need is the same. Reliance on tax-funded programs is not always the best way to approach the needs to sustain them as funding and programs come and go. The real solution to meet the needs of adults with autism is essentially the same as the needs of children with autism. People in their families and communities must help their autistic loved one to make sense of and live in a complex world. The collective belief that they have abilities and strengths are can help reduce their anxieties.
Accommodating support in ASD sufferer’s efforts to meet challenges and their own special needs can go a long way in assisting them to live more independent and successful lives.
Are there federal and state programs available where you reside?
Are there community outreach programs that help young adults transition to independent living past the age of 22?
Adults with autism differ from one another just as it is for children on the spectrum.
At Drescher & Cheslow, we can help you in the creation of a plan for you or your loved ones so they can keep on living the life they are accustomed to.
If you have questions, please don’t hesitate to reach out. You may call our offices at (732) 972-1600, or simply message us on our website by clicking here. | <urn:uuid:35b0ff5f-7c0a-4d1e-8471-2beaafa4f48b> | CC-MAIN-2023-06 | https://drescher-cheslow.com/why-rise-autism-america | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494826.88/warc/CC-MAIN-20230126210844-20230127000844-00857.warc.gz | en | 0.961358 | 935 | 3.828125 | 4 |
We believe every woman deserves the facts about her biological clock. Start here to learn more about fertility and age and how time really affects your ability to have a healthy baby.
(And if you’re ready to get proactive about your fertility future, you can schedule a fertility assessment today to test your ovarian reserve and understand how egg freezing can help.)
It’s a common misconception that we have a 100% chance of pregnancy each time we ovulate (i.e., each month). Because a certain percentage of our eggs are abnormal at any age, and because fertilization has to happen within a narrow window after ovulation occurs, even a young, healthy woman trying to get pregnant has only about a 25% chance each month.
However, we get 12 or so cycles a year—so a healthy woman in her 20s has a very good chance of getting pregnant in a given year, if she’s trying. (That’s why doctors tell women under 35 to try for a year before seeking fertility help.)
Our “reproductive life” begins when we get our first period, usually around age 12 or so, and lasts until our last menstrual period some four decades later (that’s menopause). But because egg count and egg quality decline as we age, we don’t remain fertile for the entirety of this timespan.
No, it’s not like our fertility drops off a cliff at age 35; fertility decline happens throughout our adult lives. But fertility decline is a snowball effect—meaning as we age, not only does our fertility decline, but the rate at which it declines actually increases. So the downward slope of fertility and age gets steeper in our mid-30s. Thanks biology!
The truth about natural fertility and age: while women under 30 have about a 25% chance of getting pregnant naturally each cycle, that chance drops to 20% for women over 30, according to estimates by the American Society for Reproductive Medicine. By 40, the chance of getting pregnant naturally each month is just 5%.
In fact, the above picture of age-related fertility decline is reflected in many studies of assisted reproductive technology.
One study of healthy, fertile women undergoing artificial insemination with donor sperm indicates that the chance of getting pregnant in 12 cycles (or about a year) was 73% for women 30 and under, and dropped to 54% for women over 35.
And national statistics for women undergoing in vitro fertilization using their own eggs of the same age demonstrate that the drop in IVF success is also dramatic: for women under 35, the percentage of successful IVF cycles was 41.5%; for women 35–37, it was 31.9%; for women 38–40, 22.1%; 12.4% for women 41–42; 5% for women 43–44; and just 1% for women over 44. That means that, after age 35, IVF birth rates declined about 10% every 2 years—reflecting a similar relationship between fertility and age as we see in natural fertility.
(We’re not trying to be scaremongers! But it’s really important that women have all the facts about fertility and age, so they can make informed choices about their lives and their health.) | <urn:uuid:955d04e0-e310-449f-a195-dc5c800fe6fb> | CC-MAIN-2017-30 | https://extendfertility.com/your-fertility/fertility-and-age | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549427750.52/warc/CC-MAIN-20170727082427-20170727102427-00675.warc.gz | en | 0.94907 | 676 | 2.828125 | 3 |
“People who take a daily dose of aspirin are twice as likely to suffer blindness in later life,” The Daily Telegraph reported. The newspaper said that an international study of over 4,000 elderly people found that daily aspirin users are twice as likely to be diagnosed with a late-stage form of age-related macular degeneration(AMD), a common cause of vision problems in older people.
The study examined the association between aspirin use among older people and AMD. To examine the relationship, researchers tested the eyes of 4,691 adults aged over 65. They also assessed their aspirin use and other medical and lifestyle factors. The researchers found that people who took aspirin daily were more than twice as likely to have a more severe, later stage of AMD. This is known as “wet” AMD, and about 15% of people with AMD develop it. However, the relationship between aspirin use and other stages of AMD was not consistent, with aspirin users being no more likely to have mid-stage AMD.
As this study assessed AMD and aspirin use at the same time, it cannot show that regular aspirin use causes or increases the risk of vision problems. As such, we cannot tell whether aspirin use or vision problems came first. On the evidence provided by this particular study, it is not possible to tell how or whether the two are related, or if some unaccounted for factor is linked to both aspirin use and AMD. For example, aspirin is often prescribed to people with cardiovascular problems, which are themselves associated with smoking and obesity. Both of these are risk factors for AMD.
However, the study does raise questions about whether there could be an association between AMD and regular aspirin use, and the subject warrants further investigation.
Where did the story come from?
The study was carried out by researchers from a number of European centres, including Queen’s University, Belfast, and the London School of Hygiene and Tropical Medicine. It was funded by several organisations including the EU and the Macular Disease Society UK. The study was published in Ophthalmology,the peer-reviewed journal of the American Academy of Ophthalmology.
While headlines tended to overstate the certainty of the study’s findings, both the Daily Mail and the Telegraph pointed out that the study provided no evidence that aspirin use itself caused the participants’ AMD. The newspapers also explained that the relationship may be due to confounding factors. For example, it is possible that AMD was caused by cardiovascular disease, which might typically be treated using aspirin.
Some reports suggested that aspirin use was associated with “blindness”, but this may not reflect the nature of AMD. For example, the degree of visual impairment experienced by people with AMD can vary, and people may have distorted vision rather than no vision at all. Although it can cause severe visual impairment as central vision is lost (affecting everyday activities such as reading and writing), it does not usually affect peripheral vision and generally does not cause profound blindness.
What kind of research was this?
This cross-sectional study of nearly 4,700 older people explored the possible association between use of aspirin and the development of age-related macular degeneration (AMD). This type of study can provide a “snapshot” of health-related issues in a particular population at a certain point in time, but it cannot show cause and effect.
AMD (referred to in the research paper as aging macular disorder) is the most common cause of vision loss in people over 50. It occurs when problems affect the workings of the macula, the spot on the back of the eye that is responsible for central vision. This leads to a gradual loss of central vision, which is needed for detailed work and for tasks like driving or reading. However, it does not normally lead to complete blindness.
There are two main types of AMD, called wet and dry AMD. Dry AMD is the most common form. It usually progresses in stages causing gradual loss of vision over time. About 15% of people with AMD develop wet AMD. It is called wet because it is associated with the growth of abnormal new blood vessels in the retina, which are fragile and prone to bleeding.
The researchers say that while previous research has explored an association between aspirin use and AMD, findings have so far been inconsistent.
What did the research involve?
Between 2000 and 2003, researchers recruited participants aged 65 or over by randomly sampling people from national population registers of seven European countries. Participants were interviewed and given a structured questionnaire. This asked about their aspirin intake and other factors such as socioeconomic background, medical history, smoking and alcohol consumption. Aspirin intake was split into four categories ranging from “never” to “daily use”. Researchers also took into account other health measures, such a body mass index, blood pressure and cholesterol levels.
Participants underwent standard ophthalmic tests for AMD, with their AMD progression graded using a five-stage scale. A score of 0 indicated no AMD and the last stage – stage 4 – was also classified as being either dry or wet (not everyone with late-stage AMD will progress to the wet form). The classification system they used is a recognised international grading system.
The researchers then used standard statistical methods to analyse any association between aspirin use and AMD.
What were the basic results?
Of the initial 4,753 participants, the researchers excluded 62 for whom information on aspirin use was missing. This left 4,691 participants. They found that 36.4% (1,706) had early AMD (stages 0–3) and 3.3% (157) had late AMD (stage 4). Of those with stage 4 AMD, 108 had the wet form and 49 the dry form.
Within the whole study population, 41.2% took aspirin once a month, 7% at least once a week and 17.3% took aspirin daily.
After the researchers had adjusted for potential confounders, they calculated the associations between daily aspirin use and each grade of AMD. They found that there was:
a 42% increased risk of grade 2 AMD (OR 1.42, 95% CI 1.18–1.70)
no increased risk of grade 3 AMD
a more than double risk of grade 4 wet AMD (OR 2.22, 95% CI 1.61–3.05)
no increased risk of grade 4 dry AMD
How did the researchers interpret the results?
The researchers say that frequent aspirin use was associated with early AMD and wet late AMD. The risk rose with increasing frequency of aspirin use. They consider that, as aspirin acts on the body in several ways, it is possible that it affects blood vessels in the eye. However, further study of this is needed.
This large study had strengths, including the fact that it took a random sample of the population and established the presence of AMD using validated methods and accepted grading procedures for AMD. The researchers also tried to take account of other factors that could have affected the risk of AMD, in particular cardiovascular disease, smoking and excess weight, which are known risk factors for AMD.
The study’s major limitation is its cross-sectional design, which means it cannot establish cause and effect. As such, while the study has shown associations between aspirin use and vision problems, it cannot tell how or whether the two are directly related, nor which came first. While we could speculate that aspirin somehow causes AMD, it could also be suggested that AMD might be the result of cardiovascular conditions that require treatment with aspirin. Also, although the researchers attempted to adjust their analyses for confounders – including those known to be associated with AMD – other factors may be independently related to both aspirin use and AMD and could account for the observed relationship.
The relationship was also not completely consistent. Aspirin use was not associated with grade 3 AMD or grade 4 dry AMD. This suggests that the findings could possibly have happened by chance.
The limitations of the study’s design, together with the inconsistent results of other studies on the matter, mean it is hard to tell if there truly is an association between regular aspirin use and AMD. However, the possibility of an association seems worthy of further exploration. Ideally, this would involve examining people’s eyes to check they do not have AMD and following them over time to see whether people taking aspirin daily are more likely to develop the condition in the future. | <urn:uuid:908c7789-cac6-44f5-8b5c-d6eaa642d935> | CC-MAIN-2018-09 | http://crabsalloverhealth.blogspot.com/2011/11/link-between-aspirin-and-eye-condition.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813712.73/warc/CC-MAIN-20180221182824-20180221202824-00002.warc.gz | en | 0.96835 | 1,717 | 2.796875 | 3 |
Chauncey Goodrich (October 20, 1759-August 18, 1815) was an American lawyer and politician from Connecticut who represented that state in the United States Congress as both a senator and a representative.
Goodrich was born in Durham, Connecticut, the son of Elizur Goodrich. He was graduated from Yale in 1776 and taught school afterward. From 1779 to 1781 he taught at YAle. After studying law, he was admitted to the Connecticut bar in 1781, practicing in Hartford. He served in the Connecticut House of Representatives from 1793 to 1794, when he was elected as a Federalist to the Fourth Congress from the Second District of Connecticut. He was re-elected to the Fifth and Sixth Congresses, serving from March 4, 1795 to March 3, 1801. In the Sixth Congress, he served with his brother Elizur Goodrich.
Returning to Connecticut, he resumed his law practice and was on the Governor's Council from 1802 to 1807. The Connecticut legislature elected him to the United States Senate to complete the term of Uriah Tracy, who died, and re-elected him to a full term. He served in the Senate in the Tenth, Eleventh, Twelfth, and Thirteenth Congresses from October 25, 1807 to May 1813 when he resigned to become Lieutenant Governor of Connecticut. He was elected to that office in 1813, having also been elected Mayor of Hartford in 1812. He served as both Mayor and Lieutenant Governor until his death in Hartford.
His nephew Chauncey Allen Goodrich was the son-in-law of Noah Webster and edited his Dictionary after Webster's death.
This article incorporates facts obtained from the public domain Biographical Directory of the United States Congress.
Preceded by: Uriah Tracy Class 3 Senators of Connecticut 1807-1813 Succeeded by: David Daggett | <urn:uuid:2fc37108-96b8-4acb-b8ff-68a00f747bb0> | CC-MAIN-2018-05 | http://www.mysticgames.com/famouspeople/ChaunceyGoodrich.htm | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887981.42/warc/CC-MAIN-20180119125144-20180119145144-00329.warc.gz | en | 0.986499 | 393 | 2.71875 | 3 |
Meaning is one of our most central and most ubiquitous concepts. Anything at all may, in suitable contexts, have meaning ascribed to it. In this wide-ranging book, David Cooper departs from the usual focus on linguistic meaning to discuss how works of art, ceremony, social action, bodily gesture, and the purpose of life can all be meaningful. He argues that the notion of meaning is best approached by considering what we accept as explanations of meaning in everyday practice and shows that in these situations we are explaining the appropriate fit of an item - whether a word or an artwork - with something larger than or outside of itself. This fuller account of meaning explores questions of the meaning of meaning and tackles issues such as whether meaning is just a misleading 'folk' term for something more basic, whether there really is meaning at all, and whether we should strive for meaning or let our lives 'just be' rather than mean. By taking the problem of meaning out of the technical philosophy of language and providing a more general account, Cooper is able to offer new insights into the import, function, and status of meaning that will be of interest not only to philosophers of language but to students and philosophers working in areas such as epistemology and metaphysics. | <urn:uuid:44b2e5b0-3f0f-44b0-8254-72f3021ae57c> | CC-MAIN-2021-43 | https://www.routledge.com/Meaning/Cooper/p/book/9781902683768 | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588526.57/warc/CC-MAIN-20211028193601-20211028223601-00434.warc.gz | en | 0.955815 | 250 | 2.65625 | 3 |
To go back to the task you were doing, just close this window (just make sure this is not the only window open!)
Learning strategies are skills that can be applied to learning situations, and as you improve in using them, the better the learner you will be.
There are 2 types of learning strategies : Cognitive strategies and Metacognitive strategies.
Cognitive Strategies are the ones that are used while you do a learning task, such as skimming and scanning a reading text.
Skimming - to quickly read a text without pausing to think about unknown words or concepts.
The main point of skimming a text is to get the main idea of the text and to prepare yourself for a second, more
Scanning - to read a text very carefully in order to find specific information. Here it maybe necessary to understand the
difficult parts of the text. If you you don't know them, you can use other strategies such as guessing what
the word is from the context .
Reading and listening also involve 2 processes called Top-Down and Bottom-up Processes.
Top-Down processes deal with understanding the meaning of a text and how ideas are interrelated
It involves :
- recognition of coherence and consistency in a text
- knowledge of the text structure
-inferences (guesses from context) and background knowldege about the content of a text
Bottom-Up Processes involve decoding letters, words and sounds to create words and sentences.
It involves :
- identifying the meaning of a word
- recognising the correspondence of the letters and pronunciations
Top-Down Processes use contextual knowledge to fill in gaps when a word is not undertstood -this is called 'inferencing'
- use knowledge of the topic to choose the correct meaning of ambiguous words.
Bottom-up Processes involve using linguistic knowledge in utterance comprehension
-identifying individual phonemes (sounds) in a stream of speech
- recognsing words on the basis of the phonemes recognised
- analysing the words in a sentence in order to identify its grammatical features - 'parsing'
If cognitive strategies are those that are used while practicing a skill, metacognitive strategies are those that are used to plan and organise learning.
For example, this might be deciding what to read and what is considered important information in a text.
Some of the main metacognitive strategies in reading and listening are :
- paying attention
- searching for practise opportunities
- planning for language tasks
- self- evaluating one's process
- monitoring error
- problem identification
- selective attention (looking or listening for something specific)
Another metacognitive strategy is note-taking .
Taking notes are very useful and might involve :
-paraphrasing and summarising
Remember, your goals as a language learner should be to become the best learner possible.
Good learners :
- ask questions
- make inferences
- use deduction
-seek clarification, verification and negotiation of meaning
-use memory efficiently
- pracrtice and self/evaluate to achieve accuracy and fluency
- organise their learning by preferred learning techniques
- choose prioritise and plan their learning
-are active participants in the learning process
Try to think about how you might use the various strategies to help you become a better learner !
You may close this window when you have finished. | <urn:uuid:9ab8fc75-2740-417a-b540-d09054f351af> | CC-MAIN-2014-15 | http://www.theswanstation.com/memento/readingstrategies.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206647.11/warc/CC-MAIN-20140423032006-00308-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.912686 | 708 | 4.125 | 4 |
April 15, 2010 - A new study from the Injury Research Center at the Medical College of Wisconsin in Milwaukee found obese male drivers have a higher risk of injuries (and more serious injuries, at that) to the face, head, chest, and spine. Drivers who were overweight but not obese had a lower risk of injury, and women suffered more injuries in the abdominal area.
The study was published in The Public Library of Science Medicine and concluded the "higher risk may be attributed to differences in body shape, fat distribution, and center of gravity between obese and normal-weight subjects, and between men and women." Researchers used so-called fat crash-test dummies to simulate the ever-growing American public. According to the American Obesity Association, "approximately 127 million adults in the U.S. are overweight, 60 million obese, and 9 million severely obese." | <urn:uuid:d4181ccf-5b89-403e-81f1-26b79b77e09a> | CC-MAIN-2015-48 | http://www.examiner.com/article/medical-college-of-wisconsin-milwaukee-study-finds-obese-men-are-at-greater-risk-car-accidents | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398450762.4/warc/CC-MAIN-20151124205410-00098-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.965668 | 174 | 2.90625 | 3 |
5 Ws Organizer
The 5Ws graphic organizer helps a writer organize information
around an event. When you need to know who, what, when,
where, and why, this is the organizer to put the information in
The 5 Ws organizer can work with many writing styles but is
especially useful when writing a journalism piece, a current event
article, or a historical fiction or historical nonfiction piece (such
as a short story, a reflection, or an article). The 5 Ws is also
useful with any type of writing in the social sciences: reports or
articles in history, psychology, geography, and politics.
What is a graphic organizer?
A graphic organizer is a visual tool that writers use when
planning a piece of writing. There are many styles of graphic
organizers such as: outline, 5Ws, Venn diagram, 3 column notes,
visual cluster, inverted triangle, KWL (know, want to know, learn),
plot diagram, and there are many more.
Different graphic organizers tend to appeal to different writers.
For example, some writers use only the traditional outline for all
of their planning needs, while others will switch between
organizers depending on the writing style.
How can writers use graphic organizers?
Writers use graphic organizers in the planning stage of the
writing process, which is just after the brainstorming stage. Take
the valuable information from the brainstorming and add it to
the graphic organizer. This process allows writers to keep their
important information which can be used in writing the first
You've purchased this product
See it in your libraryView in Library
We charged your card and sent you a receipt
You'll need an account to access this in our app. Please create a password to continue.
Download from the App Store or text yourself a link to the app
Good news! Since you already have a Gumroad account, it's also been added to your library. | <urn:uuid:5d7bc876-1232-49b3-b214-338c639e4780> | CC-MAIN-2021-04 | https://gumroad.com/l/lMKlq | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703522242.73/warc/CC-MAIN-20210121035242-20210121065242-00575.warc.gz | en | 0.905307 | 408 | 2.5625 | 3 |
April 7, 2009 -- A class of chemicals known as perfluorinated chemicals (PFCs) found in common household items do not appear to raise the risk of several types of cancer, according to a new study.
The safety of two types of PFCs, called PFOS (perfluorooctanesulfonate) and PFOA (perfluorooctanoate), has recently been called into question. The chemicals are used to make items such as nonstick cookware, carpet, breathable clothing, and food containers.
A recent study in the journal Human Reproduction also showed that the higher concentrations of these chemicals in women’s blood, the more likely the women were to take more than 12 months to get pregnant.
Cancer Link Disputed
The study, published in the Journal of the National Cancer Institute, looked at blood plasma levels of both chemicals in 57,053 Danish-born people who were cancer-free when the study began in 1993-1997; they were followed until July 2006.
During the study period, 713 cases of prostate cancer, 332 cases of bladder cancer, 128 cases of pancreatic cancer, and 67 cases of liver cancer were diagnosed. Researchers compared blood levels of perfluorinated chemicals in those diagnosed with cancer to a group of 772 healthy people.
The results showed no clear association between the level of perfluorinated chemicals and the risk of any of the four types of cancer studied.
"Additional research is warranted to investigate this relationship further in other cohorts, because this is, to our knowledge, the first study on perfluorinated chemicals and risk for cancer in a general population," researcher Kirsten T. Eriksen of the Danish Cancer Society in Copenhagen, says in a news release. | <urn:uuid:3dd49d77-4215-4345-855b-1dcfc383977f> | CC-MAIN-2021-31 | https://www.webmd.com/cancer/news/20090407/pfc-cancer-link-disputed | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154304.34/warc/CC-MAIN-20210802043814-20210802073814-00238.warc.gz | en | 0.974047 | 365 | 3.171875 | 3 |
Course Content and Outcome Guide for ED 224 Effective Winter 2016
- Course Number:
- ED 224
- Course Title:
- Foundations of Education
- Credit Hours:
- Lecture Hours:
- Lecture/Lab Hours:
- Lab Hours:
- Special Fee:
Course DescriptionProvides an overview of the history and current issues in the field for K-12 education including the impact of philosophy on practice. Prerequisites: RD 115 and WR 115. Audit available.
Intended Outcomes for the course
Students will be able to:
* Use global and historical perspectives, philosophical concepts, and educational views to articulate evolving teaching philosophies of their own;
* Use knowledge of the organization and management of the k-12 education system at a local, state, and national level to appropriately access resources;
* Relate specific educational practices in teaching and organization/management to philosophical theories and practical considerations in order to engage in professional collaborations;
* Connect issues of current and historical relevance to the field of education (e.g., diversity, accountability, standards, assessment, local vs. state vs. national control, funding) to professional daily practice.
* Meet the following required statewide outcomes for Foundations of Education to successfully apply them to professional practice:
1. Describe the qualities and characteristics that are necessary for one to be a professional and effective educator.
2. Identify the roles, responsibilities and ethical expectations of teachers in today's schools.
3. Understand the multiple purposes of schooling in America.
4. Develop an initial personal philosophy of education through examination of different schools of thought.
5. Explain how major social, cultural, economic, and political forces have impacted and continue to impact education.
6. Describe the diversity found in today's students, e.g. culture, race, ability, gender, language, community and economic class.
7. Understand the relationship of diversity to educational access and societal equity.
Outcome Assessment Strategies
Student progress will be evaluated and criteria will be developed for assigning a course grade using the following tools:
- responses to reading assignments;
- completion of a written philosophy of education;
- completion and presentation of a comprehensive portfolio designed to demonstrate the students knowledge and skills to date as related to specific outcomes in the field of education (depending on the career goals of the student);
- and participation in group and class discussion and activities.
Course Content (Themes, Concepts, Issues and Skills)
- Discuss and analyze a variety of philosophies of education;
- Discuss and analyze historical/philosophical antecedents and relate them to current conditions in American schools;
- Develop and write a personal philosophy of education tied to major movements of thought in the field;
- Relate philosophy and theory to specific practice;.
- Arrange evidence of personal knowledge and skills related to the field of education in a professional portfolio;
- Provide feedback to others for improvement of their portfolios and adjust their own portfolios in response to feedback.
GUIDELINES FOR CORE OUTCOMES:
In addition the students will demonstrate
COMMUNICATION: Graduates of Portland Community College should be able to communicate effectively by determining the purpose of communication; analyzing audience and context to sue appropriate language and modality; and by responding to feedback to achieve clarity, coherence, and effectiveness.
COMMUNITY AND ENVIRONMENTAL RESPONSIBILITY: Graduates of Portland Community College should be able to apply scientific, cultural, and political perspectives in understanding the natural and social world and in addressing the consequences of human activity both globally and locally, demonstrating an understanding of social change and social action.
CRITICAL THINKING AND PROBLEM SOLVING: Graduates of Portland Community College should be able to think critically and creatively to solve problems, understanding and using various methods of reasoning and evaluating information and it sources.
CULTURE AWARENESS: Graduates of Portland Community College should be able to demonstrate an understanding of the varieties of human cultures, perspectives, and forms of expressions as well as their own culture's complexities.
PROFESSIONAL COMPETENCE: Graduates of Portland Community College should demonstrate mastery in a discipline of profession at a level appropriate to program and transfer requirements through the application of concepts, skills, processes, and technology in the performance of authentic tasks that enhance community involvement and employability.
SELF-REFLECTION: Graduates of Portland Community College should be self-appraising in applying the knowledge and skills they have learned, examining and evaluating personal beliefs and comparing them with the beliefs of others.
The primary purpose of the Course Content and Outcome Guide is to provide
faculty a SAC approved outline of the course. It is not intended to replace
the Course Syllabus, which details course content and requirements for students. | <urn:uuid:241d2907-f663-4516-9a2d-804d973bdd18> | CC-MAIN-2016-07 | http://www.pcc.edu/ccog/default.cfm?fa=ccog&subject=ED&course=224 | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701163512.72/warc/CC-MAIN-20160205193923-00147-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.909404 | 999 | 2.859375 | 3 |
Kapnist [Капніст]. A noble family that owned estates in Left-Bank Ukraine. Its members used the title of count, which was granted to their Greek ancestor Stomatello Kapnissis in Venice in 1702; it was not recognized in Russia until the 1870s. Stomatello's brother (?) Basilio (?–1757) enrolled as Vasyl Kapnist in the Russian army during the 1711 Prut campaign of Tsar Peter I. He became a captain in Izium regiment in 1726, the colonel of Myrhorod regiment in 1737, and brigadier of the Slobidska Ukraine regiments in 1751. He was killed during the Seven Years' War near Gross Jägersdorf in East Prussia. Three of his sons—Mykola, Petro, and Vasyl—were Ukrainian patriots. Mykola became the marshal of the Katerynoslav gubernia nobility in 1795. Petro (ca 1750–1826) was a guard officer who lived abroad for 20 years; he returned to Ukraine a convinced republican and established a ‘republic’ on his estate in the village of Turbaitsi, Khorol county. Vasyl Kapnist was a famous poet and civic leader. One of Vasyl's sons, Ivan (ca 1794–1860), was the marshal of the Poltava gubernia nobility and a friend of Prince Nikolai Repnin. He took part in designing a project for the renewal of Ukrainian Cossack regiments in 1831. Later he became the governor of Smolensk and of Moscow. Oleksa (ca 1796–1869), marshal of the nobility of Myrhorod county and a friend of Taras Shevchenko, and Semen (ca 1791–1843), the marshal of Kremenchuk county, were involved in the Decembrist movement.
[This article originally appeared in the Encyclopedia of Ukraine, vol. 2 (1988).] | <urn:uuid:65814c4d-90b7-411b-835d-45382b62ce2b> | CC-MAIN-2021-39 | http://www.encyclopediaofukraine.com/display.asp?linkpath=pages%5CK%5CA%5CKapnist.htm | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057733.53/warc/CC-MAIN-20210925172649-20210925202649-00415.warc.gz | en | 0.970774 | 432 | 3.046875 | 3 |
Mafra National Palace
The impressive Mafra National Palace from the 18th century is known by its Basilica with the carilons as well as the magnificent Library
Mafra National Palace (Palácio Nacional de Mafra) raises majestic over Mafra and it seems like a giant looking down the small town at its feet.
The monument is one of the most impressive examples of the Baroque style, showing also some of the Italianized Neoclassical traces. However its grandeur comes from the fact that Mafra National Palace, one of the biggest buildings constructed in Europe on the 18th century, is more than just a palace. To be accurate it is a complex that houses a monastery with a basilica as well. In fact it rivals with the Spanish Escorial and the Pope’s official residence.
Mafra National Palace was built under the orders of king John V, who had made the promise to build a convent if the Queen Anne of Austria, his wife, gave him descendants. Therefore, when Princess Barbara of Bragança was born, the construction of the monument started on November 17, 1717, with a ceremony attended by the King and his court, as well as the Cardinal Patriarch of Lisbon.
Photo by MulderMedia
At first the monument was intended to be much smaller. In fact, the project was designed to be a modest convent of 13 Capuchin friars. However, the gold from Brazil began to arrive in abundance and the King inebriated with all that wealth, changed his mind and decided to have erected a sumptuous palace along with an enlarged monastery. So, thanks to the gold from Brazil the design was changed and the Palace was built symmetrically from a central axis, where the basilica is to be found, and it stretches lengthwise through the main façade ending in two identical towers.
Behind the main façade are the convent infrastructures that where abandoned by the Franciscans after the dissolution of the religious orders commanded by Queen Mary II in 1834.
Photo by MulderMedia
Since 1849, the monastery area of the building is occupied by the militaries. The construction lasted for 13 years under the orientation of Johann Friedrich Ludwig, a German called João Frederico Ludovice by the Portuguese. Nevertheless, other architects intervened on the construction process, namely Carlos Baptista Garbo, Custódio Vieira, Manuel da Maia and even the son of Ludwig, António.
To build a complex of 37,79m2, with a 220 meters long façade, more than 4,700 doors and windows, about 1,200 rooms and 156 stairways is an amazing achievement. It was only possible due to an unprecedented logistic that included a daily huge army of workers who reached the 45,000 men by the final phase of the project.
To maintain peace and order on the construction site where assigned 7,000 soldiers. The basilica, dedicated to Our Lady and to Saint Anthony, patron of Lisbon, and the convent were inaugurated on October 22nd, 1730, the King’s birthday. Nevertheless works went on until 1755 when the working force had to be transferred to the recovery of Lisbon after the Great Earthquake that destroyed a large part of the city.
The palace served mostly as a recreation accommodation for the royal court, whose members enjoyed hunting in the nearby Tapada de Mafra. King John VI, who lived in the palace for a year, ordered a partial renovation of the building, enriching it with sumptuous works of art of several renowned artists. Yet, following the French invasions, the Royal Family fled to Brazil taking with it some of the best art and furniture pieces. Therefore, many of the rooms were later on redecorated in the original style.
The Palace was occupied by the French General Junot until he was driven out by Wellington and his men. This monument is a landmark of the transition into a Republican regime thus it was from here that Manuel II, the last Portuguese King, departure on October 5th 1910 to Ericeira on his way to the exile. In 1907 Mafra National Palace was declared a national monument.
The highlights of Mafra National Palace
The magnificent pieces of art and furniture exhibited on the Palace coming from all over the world and designed by famed artists, as well as its architectural sumptuous amaze the visitors. In fact, the distance between the King and Queen Chambers was such that when the King wanted to pay her a visit, his departure was announced by the sound of a hornet. Nevertheless, it is the richly decorated Basilica that enraptures the tourists, especially due to the six historical organs and two carillons, composed of 92 bells, founded in Antwerp.
It is said that the bell-founders were so impressed by the size of the task that asked to be paid in advance. To assure them, the King doubled the amount offered for the work. The Mafra carillons are the world’s largest historical collection of this type. Sometimes concerts are held and listing to the music coming from these unique instruments is a heavenly experience no one should miss.
The magnificent library is another ex libris of the monument. Richly decorated under the Rococo style is 88 meters long, 9.5 meters wide and 13 meters high. It houses over 35,000 leather-bound books, which contain a huge part of the western knowledge acquired between the 14th and 19th centuries. Some of these books are priceless bibliographical pieces such as incunabula, a book that was printed in Europe before 1501. This treasure is not only preserved by natural techniques of conservation that avoid humidity, but also by a few bats that inhabit the library and eat all the insects that might destroy this unique books collection.
Photo by Xavi Llunell
The legends of Mafra National Palace
As any other self-respecting monument, Mafra National Palace has its own legends. In my opinion, the most bizarre states that there are giant rats living in the palace and that by night these huge animals come outside to hunt cats, dogs and even people. Probably this tale is due to the large sewer system of the palace.
Another less terrifying legend speaks of a secret tunnel, linking Mafra to Ericeira. Some say that King Manuel II used it to avoid exile and remained in the country.
10 am – 5:30 pm (last admission: 4.30 pm)
Closed on Tuesdays and in the following Holidays: New Year’s Day, Easter Sunday, May Day, Ascension Day and Christmas Day.
Basilica: Everyday, 10:00 – 13:00 and 14:00 – 17:00
Library (for readers): – Everyday, 10:00 – 12:30 and 14:00 – 17:00
Entry tickets: € 6
Estimated Visit Time:
1,5 hour (complete tour)
Where is Mafra National Palace?
Further information on Mafra National Palace
- Mafra National Palace at Association of European & Royal Residences
- Mafra National Palace at WikiPedia
Main image credits
- Photo by Xavi Llunell | <urn:uuid:f650bd72-c8ab-4d99-abdb-49c83f5e3faf> | CC-MAIN-2015-35 | http://www.all-about-portugal.com/mafra-national-palace/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065330.34/warc/CC-MAIN-20150827025425-00189-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.967737 | 1,507 | 3.046875 | 3 |
The Kingdom of Buganda is the largest of the four kingdoms in the western region of Uganda. The state was founded by Kato Kintu ca. 1300, who came from the Nile region. Although stated to be the founder of the ruling dynasty, it now appears that his male line descendants died out or were driven from their patrimony during the second half of the fourteenth century. The true founder of the dynasty is Kimera, claimed to be a grandson of Kabaka Chwa I, through his son and heir, Prince Kalemera through an illicit liaison with the Lady Wannyana, wife of Omukama Winyi I of Bunyoro-Kitara. Kimera's descendants greatly expanded their territories, building the kingdom into the most powerful in the region by the end of the eighteenth century. The state enjoyed a highly centralised form of government, common laws, language and customs, and clearly defined borders. However, the country continued to be plagued by an unresolved rule of succession. Very bloody and damaging insurrections and wars became commonplace. Massacres of surviving male members of the Royal clan became the rule. The arrival of Arab traders and Europeans made matters worse. They introduced guns and brought their own religious disputes into play amongst their converts. Disputes became even bloodier. Britain decided to intervene when British subjects became caught up in the battles. Eventually Lord Lugard negotiated a Protectorate agreement with the rulers of Buganda in 1894. Continuing unrest and brutality by the reigning Kabaka Mwanga II led to his deposition in 1897, and exile to the Seychelles. His year-old baby son was then proclaimed as Kabaka Daudi Chwa II, under the regency of three distinguished Ministers. The chief regent being, Sir Apollo Kagwa, KCMG, MBE, legendary statesman and first African to receive the honour of knighthood. Daudi Chwa II reigned for forty-two eventually years, which saw huge political, social and commercial changes to his kingdom. The first of his line to receive a Western education, he served as a young officer in the East African campaign, mentioned in despatches and received the CMG and the Belgian Order of the Crown for his services. His death in 1939 left the throne to a minor for a second time. Edward Frederick Mutesa II was chosen over his elder brothers because he was the only legitimate son in the Western Christian sense. The family were devout Anglicans, but the incumbent Archbishop of Canterbury of the time, implacably opposed any successor born out of wedlock. Mutesa II also received a thorough Western education, including a spell at Cambridge and a stint in the Grenadier Guards. However, he continually antagonised his colonial masters by involving himself in party politics. He was exiled to Britain in 1953 but returned to popular acclaim in 1955, becoming Uganda's first President eight years later. His popularity and independence rankled with the ambitions of the Prime Minister, Milton Obote. The latter deposed Mutesa II as President, instituted a one-party state and abolished the kingdom. Shortly afterwards, the Ugandan army led by Idi Amin, attacked the palace and forced the Kabaka to flee into exile in England. The restoration of the kingdoms in 1993 saw Mutesa's son and successor, Ronald Mutebi II, proclaimed and crowned as Kabaka.
STYLES & TITLES:
The ruler: Kabaka, with the style of Ssaabasajja.
The principals consorts of the Kabaka: styled Abakyala (Lady) and holding the following titles in descending rank Naabagareka, Kaddulubaale, Kabejja, Nassaza, Nanzigu, Kikome, Luyiga, Nakaddu, Saabaddu, Omukbya, Ow'ekatikamu, Omukebezi, Omwanga, Muwunda, Omwaziza, Nakasala, Omuwanga, Nakiboja, Omusuna, Omunakulya, Omukwanya, Omuterega, Omugoloba, Omulawula, Nakimera, Omubunge, Nankole, Omuweeweesi, Omunanya, Omusaka, Omuwanguzi, Omunywa, Omulangira, Omusenero, Omuteesa, Omukambata, Omusigula, Omukeera, Omuwambya, Naggayi, Nabanaku, Omukwakula, and Solamumi.
The other wives of the Sovereign, if of noble birth: Abasebbeeyi.
The most junior category of wives of the Sovereign, if of non-noble birth: untitled.
The mother of the Kabaka: Namasole.
The eldest sister of the Kabaka: Naalinya, i.e. the Princess Royal.
The eldest son of the Kabaka: Kiweewa.
The younger sons, grandsons, and male descendants of the Kabaka in the male line: Omulangira, i.e. Prince.
The daughters, grand-daughters and female descendants of the Kabaka in the male line: Omumbejja, i.e. Princess.
RULES OF SUCCESSION:
Male primogeniture, legitimate sons taking precedence over those born of secondary wives.
ORDERS & DECORATIONS:
The Order of the Shield and Spears: founded by Kabaka Daudi Chwa II on 8th August 1927 to reward loyal services to the Kingdom and bestowed on Bugandan subjects and foreign nationals alike. Awarded in three classes (1. Commander - CSS, 2. Omutongole or Officer - OSS, and 3. Omukungu or Member - MSS). The medal of the order was instituted on 26th May 1937.
The Order of the Shield and Spears - First class or Commander, breast star (L) and Second class or Officer, badge (R)
SELECT GLOSSARY: Abalangira: male member of the royal clan. Abambejja: female member of the royal clan. Baganda: the people of Buganda. Bakopi: commoner. Bataka: chief of a clan. Bitongole: Men of the King. Gombolola: Sub-County. Kabaka: King. Kabaka Yekka: "the Kabaka only", the political party formed by Sir Edward Mutessa II in 1962. Kangawo: the title of the county chief of Bulemezi. Kattikiro: Prime Minister. Kimbugwe: bearer of the Royal umbilical cord. Kiweewa: title given to the King's first son. Kubbula: Kiganda custom consisting in giving the name of a favorite relative to a child. Lubiri: the Royal compound, palace enclosure. Lubuga: 'mother substitute', second in rank to the Naalinya. Luganda: the language of Buganda. Lukwago: the Kabaka's umbilical cord. Muganda: a person from Buganda. Mugema: the title of the head of the monkey clan, responsible for buring of dead kings. Also styled Katikiro w'abafu or Prime Minister of the dead. Mulangira: a descendant of the Royal clan, noble. Muluka: the most junior administrative unit of the kingdom, composed of a group of villages. Naalinya: Princess Royal, usually a full sister of the Kabaka, who enjoys the status of first lady of the kingdom during her brother's reign. Nagaddya: the midwife to Royal wives, usually a metrnal relative of the Kabaka. Nalongo: mother of twins. Namasole: title of the King's mother. Olukiko: meeting. Olukiiko Olukulu: 'the great meeting', i.e. Parliament.
Olulyo Olulangira: the royal clan. Omukungu: Member of the Order of the Shield and Spears (MSS). Omulangira, i.e. Prince.
Omumbejja: Princess. Omutongole: Officer of the Order of the Shield and Spears (OSS). Omwami: chief, i.e. not King as in Burundi and Rwanda. Omuwanika: Treasurer. Sabaganzi: the official maternal uncle of the Kabaka. Ssaabalangira: Chief of the Royal Princes. Salongo: father of twins.
Sekibobo: the title of the county chief of Kyagwe. Ssaabasajja: the style of the Kabaka, equivalent to His Majesty. Ssaabataka: the late Kabaka. Ssaza: County.
David E. Apter. The Political Kingdom in Uganda, a study of bureaucratic nationalism. Frank Cass, London, 1997.
Mandy Bjordal-Louis. Where Do We Belong? Nairobi, Kenya, 2000.
Burke's Royal Families of the World. Volume II: Africa & The Middle East. Burke's Publications Ltd., London, 1980.
Sir Apolo Kaggwa and M.S.M. Kiwanuka. The Kings of Buganda. Historical Texts of Eastern and Central Africa I, East African Publishing House, Nairobi, 1971.
Ernest B. Kalibala (transl.) and May Mandelbaum (ed.). The Customs of the Baganda by Sir Apolo Kagwa. Columbia University Contributions to Anthropology, Volume XXII. AMS Press, New York, 1969.
J.S. Kasirye, Abateregga ku Nnamulondo y'e Buganda. Macmillan and Co. Ltd., Lodnon, 1955.
A.B.K. Kasozi. The Life of Prince Badru Kakungulu Wasajja. Progressive Publishing House, Kampala, 1996.
Mukasa E. Semakula. The Buganda Home Page, Internet
The Kabaka of Buganda (Mutesa II). Desecration of my Kingdom. John Constable & Co. Ltd., London, 1967.
Christopher Wrigley. Kingship and State: The Buganda Dynasty. Cambridge University Press, Cambridge, 1996.
Dr. Morris Bierbrier, FSA.
Dr. Jones Kyazze. | <urn:uuid:80c119a6-4e76-47b3-a497-b7cdbbc06026> | CC-MAIN-2016-36 | http://www.royalark.net/Uganda/buganda.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982295103.11/warc/CC-MAIN-20160823195815-00083-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.896701 | 2,177 | 2.921875 | 3 |
I’ve taught Lewis Carroll’s Alice in Wonderland three different times. We focused on the topic of identity and Alice’s journey. I used surrealistic art with the book. I don’t know every nuance of the novel, but I do understand it rather well. However, it’s amazing how one can read a book over (even teach it) and yet discover something new or make a new connection.
Recently, a casual thought led me to re-read Alice and was floored by how much of Alice’s experience pertains to modern education: too many of our students experience much of what Alice does. Let’s pretend Alice represents our struggling students—students having problems with the current public educational system.
Now, are you ready to jump?
Imagine Alice falling down the rabbit hole and landing in Wonderland’s hall of doors. The only way out is through one of the doors, yet they are all locked. Suddenly, Alice spots a key, but either the locks are too large, or the key is too small.
How many students feel this way: they’ve been given the key of an education, but because of budget cuts or inherent racism/discrimination or too standardized a curriculum, they feel ill equipped to unlock any of the doors. Why hand them a key that doesn’t even work? We continually tell students we are preparing them for college and life, but how many educators are truly trying to do that? I guess if we want to prepare our students for the reality of systemic discrimination, then, yes, maybe school does prepare them.
But wait! What is behind that curtain? It’s the perfect door! Success! Somehow the key is a perfect fit. Despite the odds, Alice finds the door she wants to walk through. It opens and she beholds the loveliest garden and longs to escape the dark hall. “Dark hall.” What an apt description for too many of our public schools—institutional, prison-like buildings furnished with uncomfortable desks and fluorescent lights. And that’s the better schools. My mind keeps playing the recent pictures from Detroit schools: the mold, roaches, rats, and deplorable conditions. (In case you’re unfamiliar with the issue: https://www.washingtonpost.com/news/education/wp/2016/01/28/detroit-teachers-union-sues-over-poor-school-conditions/)
Alice wishes she could fold up like a telescope and be small enough to fit through the door. She wants to do whatever it takes to conform. She so strongly wishes to break out of that hall, she wishes for the impossible.
Alice spends much time trying to get through the door. She drinks something and shrinks; she eats something and grows. Nothing works. But, Alice does react with anger to her situation. She even cries and rails and questions her own identity because she isn’t the perfect size. She compares herself to children she knows as she grapples with who she is and tries to force herself to fit through the tiny door. Alice even turns to a memorized piece of literature to find comfort and answers; however, not even what she learns in school helps because it isn’t an accurate reflection of her current situation. How does this math lesson apply to her life? Where are the literary characters like her? Will science or art or music standards help Alice? Maybe a multiple-choice test will equip her with the skills she needs to escape her dark prison.
Poor Alice doesn’t know to question the weird door or the small key or the odd cake and drink. She doesn’t ponder why these weird systems are in place or wonder if they are the problem—no, she sadly blames herself and her “disabilities.”
Alice does finally makes it through the door on an ocean of tears she cried, but she still doesn’t reach the garden. Instead, she encounters many bedraggled creatures that also swam through the “ocean.” The next scene eerily resembles a typical classroom: one person (the Mouse) takes charge and tells everyone, “Sit down, all of you, and listen to me!” They sit and listen to the Mouse’s solution to their problem: a boring history lecture. Of course, what the Mouse presents doesn’t help at all. The “students” remain in the same state as before the Mouse’s pontification. Maybe if the Mouse’s speech had come in the form of a Kahoot quiz or gamification…that would at least make it less boring and more applicable, right?
Alice continues her adventures, encountering many anthropomorphisms and general confusion and silliness. Eventually, she meets the Caterpillar, who asks, “Who are you?” Poor Alice doesn’t know because “…being so many different sizes in a day is very confusing” Any student would feel this way as s/he spends time shrinking and growing and twisting and contorting to try to please each teacher and meet expectations for each class. In this class, the student is expected to sit down and shut up. In that class, s/he is allowed to move and discuss. In this class, grades and tests matter more than learning. In that class, s/he hears discriminatory words or ideas from other students—or from the teacher. Anyone would question his/her identity after all the nonsense. “’How puzzling all these changes are! I’m never sure what I’m going to be, from one minute to another! …the next thing is, to get into that beautiful garden—how is that to be done, I wonder?’” Still Alice lacks the proper guidance and direction to find that garden. If school doesn’t do that, what is its purpose?
Poor Alice forges ahead on her confusing journey through the public school system. The Cheshire Cat tells her if she doesn’t care where she ends up then it doesn’t matter which way she goes (come on, we all know people/educators like this). Then Alice encounters some lovely elitism at the Mad Hatter’s. They emphatically tell her there’s no room at their table—even though there clearly is. I don’t interpret this literally (as in schools actually not having room—even though many don’t); rather, I see this symbolically. The privileged don’t have room for whom they don’t want at their table: generally white, wealthy, cisgender, binary, “Christian” students. There’s no room for Alice. She doesn’t fit in…even though there is plenty of room for everyone.
Alice forces her way to the table, where she is subjected to personal criticism and ludicrous riddles. They even call her stupid and tell her not to talk. She leaves in disgusted frustration and discovers another door. By now, Alice has learned a little how to manipulate the system and finally makes it to the garden.
As Alice finds out, the garden is not a paradise, but another place fraught with dangers, where she neither knows nor understands the quicksilver rules and people. The Duchess even tells Alice, “’The more there is of mine, the less there is of yours.’”
Our best summation of the unequal nature of public education comes in the Mock Turtle’s story. He and Alice argue about the importance of their courses. Mock Turtle remarks his school had “’French, music, and washing,’” but he couldn’t afford washing. I think of all our students who can’t afford the necessities, much less the “extras.” We expect them to aim for self-actualization when they simply worry about shelter, food, clean water, and safety. Thanks to Flint, Michigan, we even see how some students can’t afford washing—they can’t afford the monetary cost for clean, safe water, and they can’t afford the cost to their health.
I don’t have the energy to analyze the travesty of a trial in Wonderland, but I know you, dear reader, can easily draw parallels with too many current events. Instead, I shall wrap up my strange tale…
Sadly, Alice (and too many other students) will realize the world is not made for her; instead, the world will do whatever it can to keep Alice in the subjugated place carved out for her by the strange world. That world will even threaten Alice’s life (“Off with her head!” as the Queen of Hearts shrieks) to keep her in her place.
How can we, as educators, continue to support this kind of systemic inequity? When we will elect people who understand education is the basis of a strong society—and without all of our citizens educated, we will only weaken society. When will American citizens wake the f*ck up and stop growing stronger on the oppression and subjugation of a large part of its citizenry?
Will we bellow and threaten and distract ourselves with silly entertainments (like playing croquet with flamingos)? Will we continue painting over our mistakes and history to make it fit of vision of perfection (painting the roses red)? Will we all continue to wallow in our selfishness, greed, hypocrisy, pride, and ignorance? Will we continue to sacrifice some of our children so others can retain their power, wealth, privilege, and status?
Curiouser and curiouser, isn’t it? | <urn:uuid:312ac718-bb03-4fbe-8909-3020e7647d96> | CC-MAIN-2020-50 | http://www.jennwillteach.com/2016/02/alices-adventures-in-public-ed.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141716970.77/warc/CC-MAIN-20201202205758-20201202235758-00609.warc.gz | en | 0.956934 | 2,024 | 2.84375 | 3 |
Merchandising Types and Examples
Introduction to Merchandising
What is merchandising? Merchandising is the practice and process of displaying and selling products to customers. Whether digital or in-store, retailers use merchandising to influence customer intent and reach their sales goals.
Note: For a more in-depth definition, see What is Merchandising?
Establishing the right merchandising strategy can depend on a variety of factors, such as sector, product qualities, available space, and whether the retailer is displaying in a physical or digital store. Additionally, there are various schools of thought on which types of merchandising are most effective in particular industries and departments.
The history of merchandising is as vast as the history of trade itself—even the ancient Ebla tablets (dated ca. 2500 BC to ca. 2250 BC) are predominately about the trade and commerce of the time. For this reason, it can be helpful first to understand the basic types of merchandising before seeing merchandising examples.
Types of Merchandising
Before exploring the merchandising types listed below, please re-read the original definition of merchandising. This will provide a base for what’s to come.
Please note that these are only a few common types of merchandising. This is not meant to represent an exhaustive list.
For a deeper dive into apparel merchandising, I recommend Apparel Merchandising: The Line Starts Here by Jeremy A. Rosenau and David L. Wilson.
If you want to explore all aspects of in-store visual merchandising, check out Visual Merchandising: Windows and in-store displays for retail by Tony Morgan.
And if you need other book or resource recommendations on any of the merchandising topics listed below, feel free to message me (Cameron Conaway) on Twitter or LinkedIn.
Lastly, for ease of navigation, you can click on each of the questions below to be taken to the answer further down the page.
Let’s jump in. Here are a few types of merchandising:
- What is product merchandising?
- What is retail merchandising?
- What is visual merchandising?
- What is digital merchandising?
- What is omnichannel merchandising?
What is product merchandising?
Product merchandising involves all promotional activities used to sell a product. Product merchandising can refer both to in-store or online products.
Although often incorrectly used as a synonym for service merchandising (the promotional activities used to sell services), product merchandising can also refer to either physical or digital products.
For example, the definition of product merchandising applies whether you are merchandising shoes in-person or online, and even if you are merchandising a product that isn’t physical, such as an eBook.
Additionally, because product merchandising refers to both in-store and digital, it includes all promotional activities that take place in a store (such as shelf displays and end caps) and online (such as web design and on-site search).
What is retail merchandising?
Retail merchandising refers to all promotional and marketing activities that in some way contribute to selling products to customers in a physical retail store.
The definition here is limited to the physical, but it can be applied to a variety of merchandising venues—from traditional brick-and-mortar malls to annual pop-up events.
However, with the continued rise of digital merchandising, the term retail merchandising is increasingly being used to describe digital merchandising as well. This trend is likely to continue, especially because research suggests that 2017 will be the first year in history that digital retail sales will surpass in-store retail sales.
What is visual merchandising?
Visual merchandising in the retail industry refers to all of the display techniques used to highlight the appearance and benefits of the products and services being sold.
Visual merchandising can include elements of spacing, lighting, and design, and is a term that can be applied both to in-store merchandising and online merchandising.
In regards to the in-store retail experience, visual merchandising includes aspects such as floor plan layout, color palette selection, three-dimensional displays, and product and banner alignment.
In regards to the digital retail experience, visual merchandising includes aspects such as web design, the use of GIFS and video, and any other visual design element used to highlight the features and benefits of a product or service.
What is digital merchandising?
Digital merchandising involves all promotional activities used to sell a product online. Often referred to as eCommerce or online merchandising, digital merchandising can include everything from site performance and digital product displays to digital marketing and email marketing initiatives.
Unlike terms such as retail merchandising, which were originally used to describe the in-store experience but are now expanding in their definition, digital merchandising is rooted 100% in the digital retail experience.
That said, as the in-store and digital experiences continue to merge, the digital experience may also occur in physical stores.
Take, for example, Bonobos. They started out as an eCommerce store, but now also offer physical stores referred to as Bonobos Guideshops. No physical merchandise is sold in these stores. Instead, associates help customers find clothes and discover their fit before asking the customer to place a digital order.
What is omnichannel merchandising?
Omnichannel merchandising refers to creating a unified customer experience across all possible touchpoints of the customer journey.
For retailers with physical and digital stores, omnichannel merchandising involves creating a seamless customer experience—even if the customer moves from one to the other (as in the Bonobos example above).
Omnichannel merchandising (also referred to as omnichannel retailing) is a topic of increasing interest and research—especially because physical stores are increasingly embracing digital.
Additionally, omnichannel retailing is often used to describe all of the elements within a single customer journey—regardless of where each element takes place.
Let’s create an example here:
A customer visits a digital store through finding an organic piece of content via a Google search. From there, they search the online store and build out their cart, but then at the last minute they abandon their cart. In the next 30 minutes, the digital retailer sends a personalized behavioral email showing the customer what’s in their cart and offering a 5% discount to complete the purchase. The customer accepts the offer and completes their purchase.
This experience could be referred to as an omnichannel merchandising experience because the customer moved from a search engine, to on-site, to their email, and then back to on-site.
The types of merchandising (and certainly the merchandising examples covered below) can be understood on a deeper level when paired with knowledge of a few merchandising techniques.
Consider the technique of cross-merchandising, where items that are in some way related are displayed in close proximity to encourage additional sales (such as bread with peanut butter).
Again, this is not meant to be a complete list of merchandising techniques, but it can serve as a base from which to improve your overall merchandising knowledge.
- First impressions in merchandising
- Lighting in merchandising
- Traffic in merchandising
- Merchandising metrics
- Science in merchandising
First impressions in merchandising
Making a strong first impression in merchandising is a critical aspect—whether it is to entice window shoppers at a physical store or those who have recently landed on the home page of your website.
Let’s first look at the in-store experience.
Retail merchandisers try to control as many variables as possible, knowing that those first initial moments are what may influence the customer to stay and browse around.
While these physical first impressions may certainly impact that first step into the store, first impressions are increasing formed digitally—through an advertisement on television or Instagram, for example.
Similarly, making a strong first impression in digital merchandising is about controlling a variety of variables. Take site speed, for example. Research from Google found that “53% of mobile site visits are abandoned if pages take longer than 3 seconds to load.”
Speed is also a critical component when it comes to customers searching on your site. Site search is often one of the first ways a potential customer engages with a site, so making a strong first impression here can lead to a better customer experience and even revenue increases.
Unfortunately, many digital retailers are still asking customers to type in their product search, click submit, and then hope that they stumble on something relevant.
For the above reasons, more and more retailers are taking site search seriously. Our own research revealed that intelligent site search is one area where elite retailers are separating themselves from the pack.
Lighting in merchandising
Manipulating light is an important part of all types of merchandising. Just as a theatre production uses light to convey moods and highlight characters and scenes, modern merchandisers use light to display products, highlight particular promotions, and even influence the mood and energy of their potential customers.
The use of color plays an important role in purchasing decisions, and lighting can be used to highlight certain colors and even steer customers in certain directions.
Apple, for example, is known for using clean white backgrounds to display their steel gray computers—and they keep this consistent whether you are in their physical store or shopping on their site. This color and lighting contrast conveys modernity and mechanical or technological precision—elements that many people would associate with the Apple brand.
Additionally, just as casinos in Las Vegas create a well-lit, diversely colored experience that makes you feel as if you’re outside and do not need to leave, lighting can be used to make customers feel a variety of sensations that may influence customer intent or otherwise create a memorable brand association.
Traffic in merchandising
Every type of merchandising is influenced by traffic. This can include everything from the foot traffic of customers walking into your retail store to the digital traffic of potential customers visiting particular product pages.
Physical traffic can be influenced by end caps, floor plans, and product displays. Digital traffic can be influenced by search engine optimization, social media, and other digital marketing initiatives.
Traffic, however, can also be considered part of a merchandiser’s technique. Consider how many major supermarket chains place the milk in the back of the store.
Some grocery merchandisers refer to this as “building the basket.” Knowing that many customers are coming in and will purchase milk, they put it in the back of the store in the hopes that the customer will “build their basket” either on their way to the milk or on their way back to the register.
Likewise, digital marketing leaders such as Andy Crestodina often talk about the importance of understanding your site’s traffic. “Think of your website like a highway,” Crestodina often tells his audiences. In this metaphor, Crestodina says that understanding your digital traffic flow is critical to understanding how to optimize your site for the customer journey.
There are many merchandising metrics, and merchandising techniques can be determined by which merchandising metrics are considered the most important. The sales-per-square-foot metric, for example, is one popular efficiency metric. It determines the ratio of sales to total floor and shelf display space.
There are many other metrics, including CAC (the cost of acquiring a new customer) and RPV (revenue per visit).
For a deeper dive on merchandising metrics, Merchandising Mathematics for Retailing by Cynthia R. Easterling, Ellen L. Flottman, Marian H. Jernigan, and Beth E.S. Wuest may be a helpful resource.
Science in merchandising
As you’ve probably gathered at this point, merchandising types and techniques are not simply influenced by the aesthetic leanings of each individual merchandiser.
Science plays a large role as it relates to influencing which merchandising techniques will work the best in particular environments and sectors. The field of merchandising science is about solving retail challenges through the application of data science.
Responsive merchandising, the real-time understanding and attentiveness to a potential customer’s wants and needs, also demands that merchandisers are using the latest advances in data science to understand and influence the intent of each customer.
As alluded to in a few sections above, successful retail strategy demands a fundamental understanding of human psychology. Additionally, research from Forrester and others is showing that the rise of eCommerce merchandising means that retailers are increasingly turning to artificial intelligence not only to automate mundane tasks but to deliver more relevant, personalized experiences for their digital customers.
This had led to a phenomenon referred to as “AI-washing” whereby solutions providers are losing sight of showing how their product helps customers because they are blinded by the hype and excitement around artificial intelligence.
Now that we’ve covered several types of merchandising and various merchandising techniques, let’s round out our knowledge base.
Seeing examples of merchandising is a great way to pull all of your knowledge together. Many of the examples mentioned below are those that will be familiar to you. Rather than describe in-depth what they are, I’ll highlight a few key points that make them unique in the retail industry.
- What is fashion merchandising?
- What is toy merchandising?
- What is technology merchandising?
- What is grocery merchandising?
- What is eCommerce merchandising?
What is fashion merchandising?
Fashion merchandising is the promotion and sale of clothing and accessories from brands and designers. As such, fashion merchandising involves all marketing-related activities—from building relationships with brands and designers to promoting and selling an array of clothing and accessories.
Some separate the term fashion merchandising from apparel merchandising. To them, fashion merchandising refers to more high-priced, trend-setting products.
Like other types of merchandising, fashion merchandising can encompass a variety of aspects that may not typically be viewed as promotional—such as fabric production and purchasing directly from suppliers.
Fashion Retailing: From Managing to Merchandising by Dimitri Koumbis may be a helpful resource.
What is toy merchandising?
Toy merchandising is the promotion and sale of products meant for children to play with. Toy merchandising at once has to enthrall and engage children while influencing the adult decision-makers to make a purchase.
For this reason, it’s an interesting field because the end-user is likely far apart in age from the purchaser.
As it relates to in-store retailing, toy merchandising is often about creating an immediate and powerful first impression for the child in the hopes that this leads the child to influence the adult to make a purchase.
One unique hook is seen in the educational toy sector, where children are influenced to want and play and parents are influenced by their wanting an educational experience for their child.
What is technology merchandising?
Technology merchandising is the promotion and sale of products and services associated with the technology space. Products can include smartphones and computers, and services can include data storage and cloud services.
Technology merchandising holds a unique position in that it’s essential to convey the end-user benefit while also positioning the brand or company as a technology leader.
Many brands focus too much on positioning themselves, which can lead to basic promotional failures—such as neglecting to show the customer the benefits of their service or product.
Likewise, technology companies can get lost in their own lingo or language. Unlike most toy companies which are hyper-focused on conveying their product’s value in as clear a way as possible, technology companies can fall into the trap of speaking in a way that doesn’t resonate with their targeted audience.
What is grocery merchandising?
Grocery merchandising is the promotion and sale of all products housed within a traditional grocery store or supermarket. Grocery merchandising can also include the display and layout of farmer’s markets as well as other food and drink related spaces and events.
Additionally, grocery merchandising can also take place inside gas stations or other small non-grocery specific venues where food and drink items are displayed.
A fantastic (and dare I say must-read) resource on this topic is Grocery: The Buying and Selling of Food in America by Michael Ruhlman.
What is eCommerce merchandising?
Ecommerce (electronic commerce) merchandising describes any and all types of business or commercial transactions that involve the purchase and sale of goods and services via the Internet.
Ecommerce merchandising, then, involves all activities surrounding the promotion and sale of products and services that are sold digitally.
In an eCommerce transaction, products can be delivered physically or digitally.
eCommerce has transformed all business operations, and as a result many predict the term itself will have a short shelf-life. As Steve Dennis wrote at Forbes, when most everything becomes eCommerce, we’ll simply refer to all types of commerce as commerce.
And as Amazon is of course a pioneer in this regard, The Everything Store: Jeff Bezos and the Age of Amazon by Brad Stone may be a helpful resource for learning about the rise of eCommerce.
Like all sectors, merchandising is undergoing a rapid period of change. While many principals—including some dating back to the aforementioned Ebla tablets—remain the same, the industry is being transformed by technological advancements and what’s being referred to as “the age of the customer.”
For some additional reads on the future of merchandising, check out these articles on our blog: | <urn:uuid:25983e83-5e07-4a20-b43c-ed3cc214da21> | CC-MAIN-2019-04 | https://reflektion.com/resource/merchandising-types-and-examples | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584415432.83/warc/CC-MAIN-20190123213748-20190123235748-00424.warc.gz | en | 0.935774 | 3,788 | 2.78125 | 3 |
With rise in price of petrol, demand for diesel engine is getting higher. Automobiles with diesel engine gives high mileage, thus makes an obvious choice for many people. In this article, we will discuss about the benefits of diesel engine in cars.
Benefits of Diesel Engine
One can benefit from Diesel engine in following ways:
- Fuel economy: Cars with diesel engine have better fuel economy than other vehicles, as diesel engine produces more power from less fuel because of high compression rate, thus produces more horse power per liter of fuel.
- Reliability: Diesel engines are more reliable than gasoline engines. But, nowadays it has become common with gas engines also. People have more trust in diesel engine than fuel.
- Fewer emissions: The diesel engine car produces fewer emissions because of the compression and the type of fuel ratios it has.
- Lower maintenance: The working mechanism of diesel engine is different from that of gasoline engines, the former are easier to maintain and also have long lifespan. Major difference between them is the diesel lacks in electronic fuel ignition system. Absence of this, the system eliminates any electric failures, reduces repair costs thus making the engine a reliable one.
- Lower fire hazard: The probability of getting fire hazard is low if any accident occurs with diesel engine cars.
- Diesel engine cars last longs: Parts of diesel engine are generally strong than the gas engines. Moreover, diesel fuel has properties that are superior. Thus diesel engines last long when comparing to other fuel engines.
- Greater torque: The diesel engine design produces greater torque. Torque means ability for puling loads and accelerating, thus diesel torque overcomes other vehicles easily.
- Lower taxes: A diesel vehicle has lower road tax than other gasoline vehicles because the way road tax laws have changed. The taxing policy is based on CO2 emissions of the vehicle. As diesel engine car has lower emission, it will thus have low taxes.
- Low end power: Many drivers like the feel of diesel cars when they are accelerated from the stop position. Diesel engine need not require rewed high for better acceleration when comparing to other gas engines. A diesel is considered worth especially for those people who want to be first away from the traffic light.
Thus diesel engines attracts more attention because of its higher efficiency and cost. | <urn:uuid:f085fa3f-26d3-46e6-930d-177e7f4dfd18> | CC-MAIN-2020-40 | http://bowiedavid.info/2014/02/benefits-diesel-engine/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400219691.59/warc/CC-MAIN-20200924163714-20200924193714-00794.warc.gz | en | 0.947633 | 466 | 2.6875 | 3 |
Author’s Purpose : Author’s Purpose Author – person who wrote the story
Purpose – the reason the author wrote the story Reasons Authors Write : Reasons Authors Write To inform – to give information or teach
To explain – to give step-by-step directions
To persuade – to get you to agree with an opinion or to perform a certain action
To entertain – to tell a story that is for your entertainment or just plain fun to read Strategy to Identify Author’s Purpose : Strategy to Identify Author’s Purpose It is sometimes helpful to notice facts and opinions. If a passage has more facts than opinions, it is more than likely an informative passage. If a passage has more opinions than facts, the passage will either be a persuasive passage or an entertaining one. Try These Sentences : Try These Sentences Fact Opinion Sponge Diving Adventures
1. In Tarpon Springs, Florida there are people who work underwater.
2. These people are called sponge divers.
3. The kind of treasure they look for is called sponges.
4. Sponge diving is not an easy job.
5. The diver has to breathe under the water, and be careful of extreme water pressure. Slide 5: In Tarpon Springs, Florida there are people who work underwater. These people are called sponge divers. The kind of treasure they look for is called sponges. Sponge diving is not an easy job. The diver has to breathe under the water, and be careful of extreme water pressure. What is the author's purpose? inform Lets Try Some! : Lets Try Some! There are many pets that a child can have, but a dog is the best one of all! There are several reasons why dogs make better pets than other animals. They are always willing to play with you when you need a friend. Snakes are interesting, but they don't play with you. They just sit there coiled around your arm. Dogs can be trained to do many tricks, unlike cats who just stare at you when you try to get them to do anything that you want them to do. They are also very loyal animals that will try to protect you and your household from danger! Have you ever seen a hamster try to protect its master? If you are thinking of getting a pet remember that a dog makes the best one of all! persuade Slide 7: entertain Sammy and Ralph were snowmen. Sammy was Ralph’s cousin. Sammy was a very proper little snowman and Ralph was a rebel. Ralph always wanted to be different and Sammy always wanted to do what he was supposed to do. One day Ralph decided to pack his suitcase full of snowballs. His cousin, Sammy, told him not to. He told Ralph that all the snowballs would melt and ruin his suitcase. Ralph packed his suitcase full of snowballs anyway, and they all melted. Ralph figured out a way to solve his problem. He put his suitcase in the freezer, and the water in his suitcase turned to ice! Slide 8: explain Rosie had the best time making her valentine cards for her classmates. She used red and white paper, heart stickers, markers and anything else she could find. It was great! First, she folded her piece of white paper in half. Next, she drew a heart on her red paper and cut it out. Then she glued the heart to the white paper and added heart stickers all over the card. Finally, she wrote Happy Valentines Day on the card with her markers. Slide 9: inform The Underground Railroad was a secret organization which helped slaves to escape to freedom. Many slaves were able to escape because of the conductors and station masters. The northern states were free states and slaves were free once they arrived in the north. Secret codes and signals were used to identify the conductors and station masters. Slide 10: entertain It was a glorious morning in Alabama. The sun was shining through the trees. Alan couldn't wait to find his fishing pole and call his friend Sam to go fishing. They had a great time on these early morning fishing trips. They took their dogs with them and the dogs would swim in the lake while they fished. It was so funny to watch those dogs paddle around the lake. Slide 11: inform Lets Try To
Purpose in the
Real World! Slide 12: persuade Slide 13: "Life found on Mars. Scientists discover new forms of life that once lived on Mars." To pick a book to read! inform “A laugh a minute." entertain "America's Best Educational Software" persuade Slide 14: To pick a T.V. show! Do It Yourself: Build a Birdhouse! The Crocodile Hunter explain inform Sponge Bob Square Pants entertain What is the author’s purpose for this presentation? : What is the author’s purpose for this presentation? inform Review:What are the 4 reasons authors write? | <urn:uuid:f1ddc64d-0ae7-4cf3-87a2-5aa643f5acfc> | CC-MAIN-2016-36 | http://www.authorstream.com/Presentation/ttravis-57266-Authors-Purpose-Reasons-Write-Strategy-Identify-Try-Sentences-Lets-Entertainment-ppt-powerpoint/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471983077957.84/warc/CC-MAIN-20160823201117-00128-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.975676 | 1,000 | 3.265625 | 3 |
The neutrino, child of desperate remedies
Physicists might be tempted, at this point, to assume that placeholders are limited to the realm of a softer science like biology. The history of the neutrino, however, shows otherwise.
Like genes, the neutrino was proposed decades before it was first detected. And, unlike genes, it was proposed simply to make the numbers add up. In the early studies of nuclear decay, it was possible to track all the energy and matter—a photon, an electron, and the remaining nucleus, as well as the momentum of the matter—with decent precision. Unfortunately, all that energy didn't add up. This may sound trivial now, but the discrepancy was large enough that Nils Bohr seriously considered giving up on the whole idea of the conservation of energy.
A placeholder saved the day: the neutrino, a hypothetical particle that we couldn't detect but which carried away the missing energy during nuclear decays. It was nothing more than a hack to balance the books on things, and even Pauli, the man who proposed it, called it a "desperate remedy." But the physics community was apparently relieved, and a number of years later, Fermi's description of the weak force that tears atoms apart included a neutrino, largely settling matters.
But the neutrino remained a placeholder, in the sense that, even though all the equations called for it, it had never been detected. It took until the 1950s for physicists to pick up hints of its existence by blocking all the radiation coming from a nuclear reactor and seeing what still hit the detector. From there on out, physicists were assured that the massless neutrinos that were slotted into the Standard Model were a physical reality.
But that wasn't the last time that neutrinos and physical equations had an uneasy relationship. The physicists who modeled the Sun could, based on their understanding of fusion and the amount of energy coming from the Sun, estimate the number of neutrinos that would find their way to Earth. But, as we began to build more sophisticated detectors, we simply couldn't spot anywhere near that number. Physics was faced with a serious neutrino deficit.
The folks who worked on the Sun were pretty sure they had their numbers right, which meant that, once again, there was something about the neutrino that we didn't know about, but was essential to balancing the books. An alternate possibility existed: neutrinos underwent what are called flavor oscillations, so that an electron neutrino would, with some probability, oscillate into a different type, such as a muon neutrino, and thereby escape detection. But most people considered this ludicrous because of its implications. For oscillation to occur, neutrinos must actually have mass.
For all but a few specialists, this remained ludicrous right up until the day that Japan's Super Kamiokande detector confirmed that neutrinos did, in fact, undergo flavor oscillations. (It did this by comparing cosmic ray events that occurred directly over the detector to those that occurred on the opposite side of the planet, and sent neutrinos through the entire diameter of the Earth.)
The role of placeholders
Despite the radically different fields in which placeholders have been used, they share some basic similarities. In each case, we had a theory or principle that seemed to hold in lots of familiar cases. Traits are inherited; they show independent assortment; energy is conserved; fusion occurs the way we think it does. Putting a placeholder for something we didn't understand allowed scientists to work with very powerful theories, like evolution, genetics, and the weak force.
Placeholders either enabled or preserved some very scientifically useful theories. And that's precisely what we've seen with dark matter. Relativity, which we've measured to very high precisions, appears to apply throughout the Universe. But, on scales from galaxies through to the structure of the Universe itself, everything acts like there's more mass there than we can see. So, it's not especially outrageous or unprecedented to suggest that there's mass we can't see, and slot dark matter in as a placeholder in order to retain relativity.
All that's left is to actually find the particle, something we seem to be getting closer to. As we've studied more instances where dark matter shows its influence, we've actually eliminated a number of candidates, leaving us with a WIMP, a weakly interacting massive particle. Many people are expecting one of these to pop out of the LHC before too long, just as the neutrino finally was nailed down decades after we found the need for it.
So far, dark matter looks like a pretty good placeholder. Right now, however, nobody even has any idea what dark energy might represent, so there's not much of a place to hold, as it were. That's likely to change as more attention is given to this mystery, though.
When placeholders go bad (and why it's not so bad)
Those offended by placeholders will often reference some of the more famous ones that turned out to be dead ends, like phlogiston, luminous aether, and the epicycles used to maintain circular orbits long past their sell-by dates. These were also used in place of a natural phenomenon we didn't understand well, but ended up being thrown out and replaced. Maybe a placeholder like dark matter is a big mistake, and we'll be laughing at the gullibility of today's scientists in the not-too-distant future.
I'd argue that it really doesn't matter. Even when a scientific idea is wrong, as Kuhn suggested, it can still be useful if it helps organize a program of research.
Epicycles were discarded not because they didn't exist, but because a different model made better predictions about the orbits of the planets. Arguments over the existence of phlogiston helped spawn the birth of analytical chemistry. The concept of luminiferous aether made enough predictions that it was possible to demonstrate that it almost certainly didn't exist well before Einstein came along.
Based on the evidence and the confidence of cosmologists, I expect that we'll eventually discover the particles that produce the effects we call dark matter. But, even if we don't, I also expect that the search for these particles will have led us to some very interesting physics, and whatever replaces dark matter will be more interesting still. | <urn:uuid:f3083f7c-e878-4be5-8f78-15b1de8e2442> | CC-MAIN-2015-11 | http://arstechnica.com/science/2011/01/this-space-left-blank-the-role-of-placeholders-in-science/2/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461995.64/warc/CC-MAIN-20150226074101-00135-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.976441 | 1,322 | 3.796875 | 4 |
The following post is a part of a series that discusses 'managing risk for development,' the theme of the World Bank’s upcoming World Development Report 2014 .
Income support is an essential part of crisis and disaster response. Time after time, governments, donors, and humanitarian agencies step in with support to people affected disasters and economic crisis. They often do this on an ad hoc basis, improvising how and what support to provide. Why not build systems that could respond quickly wherever and whenever crisis or disaster strikes?
Disasters wipe out homes and livelihoods in an instant. Millions of workers lose their jobs in economic crises. Food price spikes put basic staple foods out of the reach of the poor. Governments often feel compelled to act in such situations. To be effective, support to crisis and disaster-affected people needs to be provided rapidly.
Yet delivering early support to those suddenly in need requires systems that elude most developing countries. In principle, unemployment insurance to protect workers against job loss, disaster insurance for homeowners, and crop and livestock insurance for farmers are good solutions because they can be automatic, self-financing, and disburse rapidly. Yet because of informality and missing markets, most workers, homeowners, and farmers lack insurance. Unemployment insurance is common in Europe and Central Asia. Nevertheless, less than one-third of unemployed workers during the financial crisis were covered. Their benefit periods were short; workers who kept their jobs but had earnings reduced were not protected. Instead, social safety nets had to fill the void.
How can governments improve income support to people facing major income shocks? The most important is to ensure that programs to provide income support are in place before shocks hit and that income support and other social services remain accessible during shocks and crises. This can be done by enhancing existing programs so they better capture the newly vulnerable and by adding new social protection programs geared for shocks and crises. This has fiscal implications: spending on social services should be counter-cyclical and strive to protect access to health, education, and social protection during crises.
Keeping health, education, and vocational training free (or at least affordable) during crisis helps maintain enrollment, use of health services, and human capital. In part because schooling is free in most countries did the food, fuel, and financial crises that started in 2008 not precipitate declines in school enrollment–withdrawing children from school doesn’t add to the family budget; school lunches provide an added incentive to attend school in many countries. Health use, in contrast, declined markedly in some countries during the most recent crisis. Surveys in Armenia, Bulgaria, and Montenegro found that crisis-affected people reduced medical care and prescription drug use significantly.
Some countries have built social protection systems in ways that facilitate provision of regular and reliable transfers to people faced with a shock. India’s Mahatma Gandhi National Rural Employment Guarantee Act provides livelihood security by offering up to 100 days of casual day labor to rural households; uptake is voluntary and based on need. Ethiopia‘s Productive Safety Net Project is organized to deliver timely and predictable income transfers to households, in particular during drought: the program has financing, delivery, and early warning mechanisms in place to quickly scale up the number of beneficiaries in drought-stricken parts of the country. (Part II of this blog will examine Ethiopia‘s Productive Safety Net Project in greater detail.)
The ability to scale back transfers once crisis recedes should be preserved. Romania increased pension benefits in the most recent crisis to reach half the population. This reduced poverty, but resulted in large fiscal pressure as pension spending escalated to 8% of GDP.
Summing up, countries should prepare for shocks by strengthening their ability to protect people’s basic consumption and access to health and education during bad times. Programs for income support should be put in place during good times, along with fiscal frameworks to permit transfers and social services to continue uninterrupted during bad times. Income support programs need to be scalable and flexible to increase coverage in response to shocks and scale back once crises abate. Their targeting systems need to emphasize the shock-affected, not just the chronic poor.
Next week we will examine Ethiopia’s Productive Safety Net Program.
Independent Evaluation Group. "The World Bank Group's Response to the Global Economic Crisis - Phase II." Washington, DC: Independent Evaluation Group, The World Bank Group, 2012.
The World Bank. "The Jobs Crisis: Household and Government Responses to the Great Recession in Eastern Europe and Central Asia ." In Directions in Development. Washington, DC: The World Bank Group, 2011.
The World Bank. "Managing Risk, Promoting Growth: Development Systems for Social Protection in Africa ." In The World Bank's Africa Social Protection Strategy 2012-2022. Washington, DC: The World Bank Group, 2012.
- WDR 2014 | <urn:uuid:cfa3e4b2-13bf-4292-8846-68f7bf5a80ec> | CC-MAIN-2014-10 | http://blogs.worldbank.org/developmenttalk/print/protecting-the-vulnerable-during-crisis-and-disaster-part-i | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678678233/warc/CC-MAIN-20140313024438-00065-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.949985 | 989 | 3.234375 | 3 |
This Black History Month sermon, "I Have Come to Testify to the Truth," is a lesson on why the word of God does not sanction what scholars now call "American slavery." American slavery, a legal and oppressive system of labor that existed from the 17th century to the 19th century, must be distinguished from the form of servitude that God allowed in the scriptures. It is very important to distinguish the two systems because many erroneously equate the two forms of servitude. As a result, many have struggled with their faith by mistakenly believing that God sanctioned American slavery or any form of oppression.
This sermon is in no way an exhaustive look at American slavery nor the scriptures that apply. However, it is meant to at least demonstrate that by his very nature, and by his commands, God did not approve of the form of oppression that was legal in this nation for two centuries. | <urn:uuid:e8576500-55c5-4cce-a0df-a00ba4dc07e8> | CC-MAIN-2023-06 | https://www.dtodayarchive.org/commentary/oneness/item-8973-black-history-month-i-have-come-to-testify-to-the-truth | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500215.91/warc/CC-MAIN-20230205032040-20230205062040-00387.warc.gz | en | 0.978799 | 332 | 2.921875 | 3 |
The central chimpanzee or tschego, scientific name Pan troglodytes troglodytes is a subspecies of the common chimpanzee (one of many closest residing family to people, together with the bonobo).
Central African chimpanzee Overview
Central African chimpanzees live within the dense tropical rainforests of Central Africa. These forests are characterized by scorching climate and heavy rain.
The boundaries of their range are set by the Congo River within the south, the Ubangi River within the east, and the Sanaga River within the north.
They are discovered within the countries of Gabon, Equatorial Guinea, Cameroon, Republic of Congo, Central African Republic, and the Democratic Republic of Congo.
Locally, Central African chimpanzees are referred to as “tschegos,” which suggests laughter. This can also be the given name in most older texts.
In their habitat within the forests of Central Africa, chimpanzees spend most of their days within the treetops. When they do come right down to earth, chimps normally travel on all fours, although they will stroll on their legs like people for so far as a mile. They use sticks to fish termites out of mounds and bunches of leaves to sop up consuming water.
Distribution and habitat
The central chimpanzee happens in Central Africa, primarily in Gabon, Cameroon, and the Republic of the Congo, but additionally within the Central African Republic, Equatorial Guinea, the Cabinda exclave of Angola, southeast Nigeria, and (presumably) the coastal extension of the Democratic Republic of the Congo.
Its range extends north to the Sanaga River in Cameroon, east to the Ubangi river that defines the border between the 2 Congos, and south to the Congo River, which defines a big part of the same border.
Chimpanzees are discovered predominantly in tropical moist forest and moist savanna woodlands, in addition to the forest-savanna mosaics the place these two biomes meet, from sea level to three,000 meters (9,800 ft).
They are likely to have bigger ranges within the forest-savanna mosaics. The average range is 12.5 km2 (4.8 sq mi) however can differ from 5 km2 (1.9 sq mi) to 400 km2 (150 sq mi).
Central African chimpanzee Description
The central chimpanzees average 59.7 kilograms (132 lb) in males and 45.8 kilograms (101 lb) in females.
Central chimpanzees are the biggest of all of the Central chimpanzee subspecies and in addition exhibit probably the most important sexual dimorphism.
Males can have a head-to-rump size of as much as 38 inches (96 cm) and an average weight of 132 pounds (60,000 g). Females have an average size of 31.5 inches (80 cm) and a weight of 97 pounds (44,000 g).
Central Chimpanzees can have a large range of lifespans. Many chimps in captivity have lived to effectively over 50; nevertheless, a more typical life expectancy for a captive Central chimpanzee is between 30 and 40 years. In the wild, most chimpanzees that survive their infancy will live between 15 and 25 years.
Central African chimpanzee Appearance
Central Chimpanzees are sturdy apes with black hair protecting most of their bodies. Their naked skin is uncovered on their arms, face, and feet.
Central African chimpanzees have pink skin early in life; it turns black as they mature. Central chimpanzees have much less hair protecting their face than the opposite subspecies, particularly females.
Once one seems to be past the hair, it’s easy to see that Central chimpanzees are our closest family, having solely diverged from people 4–8 million years ago. Chimpanzee physiology just isn’t all that totally different from human physiology.
Central chimpanzees have arms that aren’t solely considerably longer than human arms, however, are additionally the longest of all chimpanzee subspecies.
In addition to long arms, their arms characteristic long fingers and short thumbs tailored for climbing bushes. Central Chimpanzees are too heavy to gracefully climb just like the monkeys who inhabit the same areas, however, they will climb effectively sufficient to forage for the very best fruit.
Another main distinction between people and chimps is how our legs are constructed. Human thighs slope inward whereas Central chimpanzee thighs slope outward.
This permits people to shut their legs collectively and stroll upright, whereas chimps can solely stroll upright in short spurts.
The Central chimpanzee foot options an opposable huge toe spaced far other than the opposite toes permitting them to understand the branches and keep steadiness as they travel by the bushes.
Chimpanzees, like people, have a set of teeth that can be designed to eat vegetation and meat. Fruits make up about 60% of their diet, whereas leaves make up about 25% of their diet.
Seeds comprise about 7% of their diet and the remaining is made up of flowers, tree bark, and buds. Meat is an uncommon however useful catch for chimpanzees and they’re going to typically set up hunts of monkeys and different small animals.
Behavior and Lifestyle
Chimpanzee behaviors change not solely with the subspecies however with individual households as effectively. This is as a result of many behaviors are handed down from technology to technology versus being completely instinctive.
One notable behavior solely seen in Central chimpanzees up to now is tortoise looking. Several chimps in Gabon have been seen utilizing rocks to crack open tortoise shells.
Central African chimpanzee Daily Life and Group Dynamics
Chimpanzees are most energetic throughout the day. Depending on the season, they may spend someplace between a 3rd and a half of their time foraging.
Activity budgets additionally present that chimpanzees spend equal elements of their day socializing, touring, and resting. Central chimpanzee teams have an average population of about 66 people, which is way more than their Western and Nigerian-Cameroon cousins, however a lot fewer than Eastern chimpanzee teams. A typical group will control a territory of over 7 sq. miles (18 sq km).
Central Chimpanzee communities are dominated by an alpha male who should use energy and diplomacy to keep up his energy. Central Chimpanzee politics should not so totally different from human politics.
Leaders should construct and foster alliances, guarantee loyalty, and preserve a detailed eye on rivals. Given the right state of affairs, a sensible and robust chimp can rule a gaggle for a number of years.
Central African chimpanzee Communication
Central African chimpanzees might talk about feelings and concepts by noise, shows, contact, or odor. Communication is usually centered around meals, threats, and politics.
For instance, a chimp who’s making an attempt to take over or keep control of a gaggle will make the loudest noises he can. With his hair standing on end (making himself appear bigger), he shouts out barks and hoots whereas slamming branches and banging his feet on tree trunks.
Thirty-two totally different vocalizations have been deciphered and researchers are working to learn more. The most well-known Central chimpanzee call is the pant-hoot, which is a sequence of inhaling and exhaling “hoo-hoo” calls.
These calls will be made by chimps discovering meals, sustaining contact with out-of-sight people, and warning others of danger close by. Other calls might embody submission grunts, screams as misery call, and soft grunts used to remain involved throughout foraging.
Visual communication by facial expressions and body language can also be common and is effectively understood by researchers.
A Central African chimpanzee who opens his mouth and bares his teeth is frightened, however, a chimp who opens his mouth whereas hiding his teeth is seeking to intimidate others. Likewise, an aggressive chimp’s hair might stand on end to make him look larger.
A chimp might hug, pat, or brush the face of one other chimp in an effort to reassure them or calm them down. Submissive people might bob their head, bow, or kiss one other chimp to point out their respect.
Many totally different researchers are learning chimpanzee communication and several other guides have been developed to translate their actions.
Like many fruit-eaters, Central chimpanzees play a particular function in their environment as seed dispersers. Chimpanzees eat the fruit and defecate the seeds elsewhere within the forest.
The seeds are then allowed to develop into bushes without having to compete with their parents for sources. Chimpanzees are able to eat far bigger seeds than most animals of their ecosystem, and many plant species rely on giant animals equivalent to chimps to unfold their genes and prosper.
Central chimpanzee Reproduction and Family
After a pregnancy of about 8 months, chimpanzees are born completely helpless and unable to assist their very own weight for his or her first two months of life.
The mom will carry her child near her chest for about six months before the newborn is powerful sufficient to experience on her back. Over the next two years, the newborn will step by step develop more impartial and curious.
Central African chimpanzees are totally weaned after about 5 years. It just isn’t unusual for a younger chimp to be prematurely weaned 3 or 4 years into life if his mom provides birth to a brand new child at the moment. In this case, the older sibling remains to be cared for, however, he might battle in creating confidence and social skills.
Females are capable of mate at a while between 12 and 14 years old whereas males will possibly start mating at 15 years old. Males have a tendency to stick with their natal group for all times whereas maturing females will depart their group for a brand new one in what’s normally a gradual, months-long process.
Central Chimpanzees mate year-round. When a feminine is able to mate and enters estrus, her anogenital area will swell up. Chimpanzees live in polygamous societies.
Any persistent male will discover alternatives to father offspring, however, males who’ve higher social rankings are usually more profitable at mating.
Central African chimpanzee Threats
The International Union for Conservation of Nature classifies the Central chimpanzee as Endangered (IUCN, 2016) as a result of their declining population, a development that’s not anticipated to stop within the next few a long time.
The IUCN lists its most critical threats like illness, poaching, habitat destruction, and international warming.
Because we’re so related, illnesses can switch from people to chimpanzees. Many of those illnesses are utterly alien to chimpanzees and they also haven’t but developed any immunity to them. In the past few a long time, the Ebola virus has been particularly devastating to Central chimpanzee populations in Central Africa.
Poaching is one other distinguished menace. Bushmeat has at all times been the main food source in Central and West Africa, however lately poaching has developed into commercialized to fulfill the appetites of rich city residents. Infant chimpanzees are continuously taken alive and offered in cities as pets.
Global warming might show to be the best menace to the Central chimpanzee, as it’s the hardest one to fight. As temperatures rise and seasons shift, sure bushes shall be unable to provide fruit and the meal supply for Central chimpanzees will drastically fall.
Additionally, international warming is predicted to shrink the rain forests, elevated wildfires, and enhance the range of lethal illnesses.
Central African chimpanzee Conservation
The 2007 International Union for Conservation of Nature (IUCN) Red List of Threatened Species classifies the central chimpanzee as endangered.
In 1988 they have been thought-about “vulnerable”, however have been thought about “endangered” since no less than 1996.
The World Wildlife Fund (WWF) estimates there are as many as 115,000 people alive, but that the quantity is more possible between 47,000 and 78,000
The central chimpanzee solely has giant, sturdy populations the place giant quantities of forest are left undisturbed; smaller, remoted populations additionally stay. According to the IUCN, the decline within the central chimpanzee population is anticipated to proceed for an additional 30 to 40 years.
Major threats to central chimpanzee populations embody Ebola virus illness, poaching for bushmeat, and habitat destruction. The IUCN attributes this to growing human presence (agriculture, deforestation, improvement) and political instability.
More Interesting Articles
- Mouse Lemur – Can you have a Mouse Lemur as a Pet?
- Ruffed Lemur – Where are Ruffed Lemur found?
- Ring-tailed Lemur (Lemur catta) Profile, Traits, Behavior
- Red Ruffed Lemur – Are Red Ruffed Lemurs Endangered?
- Ring-Tailed Lemur Locomotion – How do Lemurs Move?
- Ring-Tailed Lemur Facts – A Large Strepsirrhine Primate
- Guenon – Quadrupedal Primates Monkeys Profile, Traits
- Lemur Reproduction – How do Lemurs have Babies?
- Why is Lemur Endangered – How are Lemurs Going Extinct?
- Ring-Tailed Lemur – How many rings does a ring-tailed lemur have?
- Lemur Baby – What is Baby or Infant Lemurs called?
- Ring-Tailed Lemur Habitat – What Habitat do Lemurs Live in?
- Lemur Facts – What do you call a Female Lemur?
- Aye Aye Finger – Why is the Aye-Aye Considered Bad Luck?
- Aye Aye Fun Facts – Simple Fun facts about Aye Aye to Know
- Aye Aye – Why is Aye Aye Endangered? Conservation Steps
- Aye Aye Facts – Learn about Aye Aye Finger, Habitat, and Diet
- Are Lemurs Monkeys – What kind of Animal is a Lemur?
- What Do Lemurs Eat – What Kind of Food do Lemurs Eat?
- Lemur – Description, Traits, Diet, and Facts | <urn:uuid:56046b44-af1a-43b8-aa69-487db0a82758> | CC-MAIN-2022-49 | https://www.primatespark.com/central-chimpanzee/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710829.5/warc/CC-MAIN-20221201153700-20221201183700-00525.warc.gz | en | 0.945823 | 2,976 | 3.828125 | 4 |
The world’s first internet transmission occurred on October 29, 1969. At least, that’s what some people believe. Others say the more important moment arrived eight years later, when a repurposed delivery van equipped with a wireless transmitter sent a message from San Francisco to Norway and back to California by way of satellite.
The date was November 22, 1977, and no one seems to remember what message was sent — or even who was in the van. But they do remember how it was sent. This marked the first time the TCP/IP protocol — the same protocol that underpins today’s internet — was used to send information across not one, not two, but three independent computer networks.
“It wasn’t just a transmission,” says Bob Kahn, one of the key figures behind that moment. “It was a whole system of network protocols being demonstrated over three different networks.”
You can certainly argue that the first internet transmission happened much earlier. The world generally agrees it happened in 1969, when researchers at the University of California at Los Angeles sent the inaugural message across the ARPAnet, the government-funded network that eventually evolved into the internet as we know it. But the internet and the ARPAnet are two very different things. The internet is fundamentally a collection of disparate networks — that’s why it’s called the internet — and this required the introduction of TCP/IP, which came of age on that delivery van in 1977.
TCP/IP was designed by two men: Vint Cerf and Bob Kahn. Earlier this year, both were inducted into the Internet Society’s (ISOC) Internet Hall of Fame, alongside such pioneers as Sir Tim Berners-Lee, Van Jacobson, and Ray Tomlinson. This past April, we celebrated Cerf’s induction, but Kahn deserves just as much credit for the rise of TCP/IP.
Cerf and Kahn developed the protocol in the early 1970s. Kahn worked for ARPA — the U.S. Department of Defense agency that funded the ARPAnet — and Cerf was an assistant professor at Stanford University. Both had been involved with the ARPAnet since it’s earliest days — Cerf as a graduate student at UCLA, and Kahn as an engineer with BBN, the Boston-based outfit that built the network’s hardware.
Kahn left BBN in 1972 to join the government office that oversaw the ARPAnet, and one day in 1973, he appeared in Cerf’s lab at Stanford. “I have a problem,” he said.
Basically, Kahn needed a way of controlling the network from the computers that connected to it. But he and Cerf didn’t want any one machine to have more control than any other — and they wanted all sorts of machines on the network. “The problem is that if you are serious about using computers, you better be able to put them in mobile vehicles, ships at sea, and aircraft, as well as at fixed installations,” Cerf says.
Eventually, they realized the project needed a protocol that could work across the many disparate networks need to connect all those machines. And then they built one. Their TCP/IP paper was published in May of 1974.
But a good two years would pass before the protocol was officially used to connect multiple networks. On August 27, 1976, a delivery van that belonged to the Stanford Research Institute — one of the research organizations attached to the ARPAnet — was sitting at a former stage coach stop somewhere between San Francisco and Monterrey, California. Since the previous year, the van — typically referred to as a “bread truck” — had served as a mobile node on a packet radio network that covered the area, but that day, for the first time, it used TCP/IP to send packets across both the wireless network and the ARPAnet.
Even still, some believe the bigger event came more than a year later when the van sent a message across a third network as well. With two networks, you’ve merely built a bridge. With three, you have an internet. “It was true inter-networking,” Cerf said in 2007 during an event celebrating the thirtieth anniversary of the transmission. “TCP was supposed to show how multiple networks could be interconnected, and I thought it would be more convincing if we could do three networks rather than just two.”
Driving down the road somewhere south of San Francisco, the van sent a message that traveled across not only the packet radio network and the ARPAnet but a satellite network that connected the ARPAnet to Europe. It hopped from California to Boston, on to Norway and Great Britain, and then back to California by way of a small town in West Virginia.
The message was unimportant. In all likelihood, those in the van were just remotely logging into an APRAnet machine at the University of South California. But the moment was important — at least in hindsight.
“The internet was all about a set of protocols and procedures that would allow different components to be interconnected, so that we could we could connect one machine to another over different networks,” says Bob Kahn. “[The three-network transmission] was a demonstration that the technology really worked.”
Kahn doesn’t remember if he was in the van or not. At the time, it was just another experiment. But it pushed TCP/IP forward — and TCP/IP would soon give rise to the internet. The ARPAnet officially adopted the protocol in 1983, and by then, it was already used across research networks in Asia.
In 1985, Kahn left the Department of Defense to found the not-for-profit Corporation for National Research Initiatives. But by the then, the ARPAnet was well on its way to bigger things.Go Back to Top. Skip To: Start of Article. | <urn:uuid:bb47dcd7-e1b2-4bde-b2bd-46ff55cfa6ac> | CC-MAIN-2017-04 | https://www.wired.com/2012/08/bob-kahn-internet-hall-of-fame/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00158-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.967921 | 1,250 | 3.359375 | 3 |
Northerners often depict the South as backwards and racist. During the Civil Rights Movement, the South gave the North plenty of reasons to feel superiors. Snarling dogs, skin bruising water hoses and lynch mobs didn’t help the South’s image. The South’s racism was on full display as African Americans from Virginia to Alabama and beyond fought for equality. Dr. Martin Luther King Jr. became the face of the movement.
In the South, King spearheaded efforts to integrate public spaces and he fought for voting rights. King, however, didn’t just fight racism in the South. He highlighted racism in the North as well. To read a traditional King bio, click here. To learn more about King’s efforts in the North read below.
Watch video of Mahalia Jackson singing at King’s funeral.
In one famous incident, King lead a fight to end housing segregation in Chicago — a mecca for blacks escaping the South. The march didn’t go well. In August 1966, King and his supporters marched in front of more than 4,000 angry white immigrants in southwest Chicago. The white mob called the 800 black marchers “cannibals,” and “savages” and stoned King.
He would later say, “I have seen demonstrations in the South, but have never seen anything so hostile and so hateful as I’ve seen here today.”
The incident showed that the South wasn’t the only bastion of racism that needed to change.
Below are King’s quotes about the fight to end racism everywhere:
“Let’s Not Fool Ourselves, we are far from the Promised Land, both north and south.”
“Never forget that everything Hitler did in Germany was legal.”
“Human progress is neither automatic nor inevitable… Every step toward the goal of justice requires sacrifice, suffering, and struggle; the tireless exertions and passionate concern of dedicated individuals.”
Watch this video of King’s “Letter From the Birmingham Jail.” | <urn:uuid:3796da8d-af98-415f-b9d5-5063b5402abc> | CC-MAIN-2018-22 | https://zhiphopcleveland.com/4534704/our-history-makers-martin-luther-king-jr/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865651.2/warc/CC-MAIN-20180523121803-20180523141803-00006.warc.gz | en | 0.951481 | 443 | 3.515625 | 4 |
Be the first to like this
Objectives: Identify the sources of overuse from the point of view of the Spanish primary care professionals, and
analyse the frequency of overuse due to pressure from patients in addition to the responses when professionals
face these demands.
Design: A cross-sectional study.
Setting: Primary care in Spain.
Participants: A non-randomised sample of 2201 providers (general practitioners, paediatricians and nurses) was
recruited during the survey.
Primary and secondary outcome measures: The frequency, causes and responsibility for overuse, the frequency that patients demand unnecessary tests or procedures, the profile of the most demanding patients, and arguments for dissuading the patient.
Results: In all, 936 general practitioners, 682 paediatricians and 286 nurses replied (response rate 18.6%). Patient requests (67%) and defensive medicine (40%) were the most cited causes of overuse. Five hundred and twenty-two (27%) received requests from their patients almost every day for unnecessary tests or procedures, and 132 (7%) recognised granting the requests. The lack of time in consultation, and information about new medical advances and treatments
that patients could find on printed and digital media, contributed to the professional’s inability to adequately
counter this pressure by patients. Clinical safety (49.9%) and evidence (39.4%) were the arguments that dissuaded patients from their requests the most. Cost savings was not a convincing argument (6.8%), above all for paediatricians (4.3%). General practitioners resisted more pressure from their patients (x2 =88.8, P<0.001,
percentage difference (PD)=17.0), while nurses admitted to carrying out more unnecessary procedures (x2 =175.7,
Conclusion: Satisfying the patient and patient uncertainty about what should be done and defensive medicine practices explains some of the frequent causes of overuse. Safety arguments are useful to dissuade patients from their requests. | <urn:uuid:13453cca-d965-47c4-9681-bdec91d749cd> | CC-MAIN-2018-47 | https://www.slideshare.net/jgdedios/controladores-y-estrategias-para-evitar-la-sobreutilizacin-sanitaria-en-atencin-primaria | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743968.63/warc/CC-MAIN-20181118052443-20181118074443-00540.warc.gz | en | 0.918688 | 412 | 2.546875 | 3 |
Magnitudes of Vectors Don't Add Up
Date: 11/14/2010 at 02:15:12 From: David Subject: Why does the vector law of addition work? I don't understand how adding vectors results in a triangle in which the third side is equivalent to the sum of the original two vectors. In particular, I don't understand how the sum of the two added vectors can have the same magnitude as the vector sum. A vector is defined as something with magnitude and direction, so vectors are equal if and only if they have the same magnitude and direction. The addition of vectors means combining two vectors, so the result of vector addition should give a vector with the same direction and magnitude as that of the combination of the added vectors, right? I can see how the sum of vectors A and B, if combined, would have the same direction as the third side of a triangle. What I don't understand here is how the magnitude of the third side can be equal to the magnitude of the other two sides. That would mean two sides of a triangle sum to the third side, wouldn't it?
Date: 11/14/2010 at 10:01:22 From: Doctor Ian Subject: Re: Why does the vector law of addition work? Hi David, Suppose you are standing on a giant grid. You are given two numbers (a,b). You move a units to the east, and b units to the north. Now you are given two more numbers (c,d). You move c units to the east, and d units to the north. What is the total distance you've moved to the east? It's a + c, right? And what is the total distance you've moved to the north? It's b + d, right? So you could have got to the same final point by being given the numbers (a + c, b + d) along with the same instructions. Does this make sense? Do you see how it illustrates the rule for vector addition? > A vector is defined as something with magnitude and direction, so > vectors are equal if and only if they have the same magnitude and > direction. The addition of vectors means combining two vectors, so the > result of vector addition should give a vector with the same direction > and magnitude as that of the combination of the added vectors, right? Right. And they are combined by adding their components, as illustrated in the example above. > I can see how the sum of vectors A and B, if combined, would have the > same direction as the third side of a triangle. What I don't understand > here is how the magnitude of the third side can be equal to the > magnitude of the other two sides. That would mean two sides of a > triangle sum to the third side, wouldn't it? The magnitudes don't add directly. If you add two vectors, the magnitude of the resulting vector will be somewhere between zero and the sum of the individual magnitudes. The latter occurs when they have the same direction, e.g., (3,0) + (4,0) = (7,0) The vectors on the left have magnitudes of 3 and 4, and the sum has a magnitude of 7. The former occurs when they have opposite directions, but the same magnitude, e.g., (3,0) + (-3,0) = (0,0) The vectors on the left have magnitude 3, but they cancel each other out, leaving a null vector, with no direction or magnitude. In between, we might have something like (3,0) + (0,4) = (3,4) Here, the vectors on the left have magnitudes 3 and 4, but the sum has a magnitude of 5. That would correspond to a situation like Two guys are pushing on a box. One pushes to the east with a force of 3 lbs, while the other pushes to the north with a force of 4 lbs. What is the resultant force on the box? We can add the vectors to get (3,4). The magnitude of that is sqrt(3^2 + 4^2) = sqrt(25) = 5 The direction of that is tan^-1(4/3) = about 53 degrees So we could replace the two guys with one guy, pushing with a force of 5 lbs, at an angle of 53 degrees from the x-axis, and the box would move in the same way as when the two guys push it. Now, why doesn't the combined force have a magnitude of 7 lbs? Well, think of it this way: the box is moving at an angle to the force being applied by the guy pushing to the east. So only SOME of his force is going to moving the box. And the same is true for the guy pushing to the east. So we should expect the resultant force to be less than either of the individual forces. Now try thinking about those other kinds of cases. In one, the two guys are both pushing east, and their forces add up -- so the box moves to the east, under a force of 3 + 4 = 7 lbs. In the other, one guy is pushing east while the other pushes west, and since they apply the same magnitude of force, the box doesn't move at all. That is, it's like a force of 3 + -3 = 0 lbs is being applied to it. In terms of triangles, you can think of it this way. The hands of a clock always form two sides of a triangle, right? And the third side of that is the line connecting the hands. Would you expect the length of that third side to always be the sum of the lengths of the individual hands? Or does the angle between them have something to do with it? Does this help? - Doctor Ian, The Math Forum http://mathforum.org/dr.math/
Date: 11/15/2010 at 09:49:43 From: David Subject: Thank you (Why does the vector law of addition work?) Yes that clarified it, thank you!!!
Search the Dr. Math Library:
Ask Dr. MathTM
© 1994-2013 The Math Forum | <urn:uuid:d60390ae-b640-4449-ac2c-0f90f7838734> | CC-MAIN-2014-10 | http://mathforum.org/library/drmath/view/76184.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011240122/warc/CC-MAIN-20140305092040-00001-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.96126 | 1,268 | 3.75 | 4 |
Lackey, Robert T. 1997. Restoration of Pacific salmon: the role of science and scientists. In: Sari Sommarstrom, editor, What is Watershed Stability? Proceedings of the Sixth Biennial Conference Watershed Management Conference, Water Resources Report No. 92, University of California: pp. 35-40
Many Pacific salmon "stocks" (a term used in fisheries management for a group of interbreeding individuals that is roughly equivalent to "population") have declined and a significant, but unknown, number have been extirpated. How to solve the salmon "problem" is one of the most vexing public policy challenges in natural resource management. Even with complete scientific knowledge -- and scientific knowledge is far from complete or certain -- it would be a challenging policy problem. The salmon decline issue is often defined as a watershed alteration policy problem, in part because changes in watersheds are highly visible and often occur on public lands where individuals and organizations have direct input to decision making. The more difficult -- and critical -- part of the debate deals with policies and decisions affecting private rural enterprises (especially farming and logging); industry; electricity generation (including hydro, fossil fuel, and nuclear); national defense; urban development; transportation (including road, rail, air, and water); competing personal rights and freedoms; the prerogatives and roles of local, state, and federal government and Indian tribes; and policies on human population level, reproduction, emigration, and immigration. The salmon problem illustrates a class of policy issues that are socially wrenching and are becoming increasingly common in the western United States as demands increase for limited resources. Technocrats, scientists, biological resource managers, and scientific advisors should avoid advocating political choices driven by personal interest and packaged under the guise of a scientific imperative. However, it is equally important not to permit tough policy choices to masquerade behind the cloak of scientific imperative -- a prostitution of science and scientists that sometimes provides a convenient cover for avoiding difficult social choices. The complete implications of each alternative public choice should be fully and clearly explained, including the short- and long-term consequences, and especially the level of scientific uncertainty. | <urn:uuid:aeb9457a-74d0-4fbf-b5c6-6d3bb93876d3> | CC-MAIN-2014-49 | http://www.epa.gov/wed/pages/publications/abstracts/archived/lackey97b.htm | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931007715.70/warc/CC-MAIN-20141125155647-00002-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.922769 | 432 | 2.84375 | 3 |
İstanbul - Hagia Sophia (Ayasofya)
Hagia Sophia was a Eastern Orthodox church at Byzantine period which completed in 537. It also known as the Ayasofya Museum and Church of Holy Wisdom. It was converted to a mosque at Ottoman period after Fatih Sultan Mehmed II conquered Constantinople in 29 May 1453. After 1935, it was converted into a museum. Hagia Sophia is neighbour to Topkapı Palace and Blue Mosque (Sultanahmet Camii) in İstanbul.
Hagia Sophia is known as one of the greatest buildings of the world and generally considered the Eighth Wonder of the World.
Some building details: The works was started on December 23, 532 AD and completed on December 27, 537. The size of the inner space of basilica is 100x70m and it is covered by the magnificent dome (diameter 30.31m. after some restoration, it was lost its perfect circular dome schema), supported by the four large piers, 55m high.
There are just 3 larger church after Hagia Sophia all around the world. They are St. Paul's Cathedral in London, St.Peter's Basilica in Vatican and Duomo in Milan.
<a href="/maps/hagia-sophia-map">Location of Hagia Sophia at Map</a>
Photos 37 - 45 of 99 | <urn:uuid:bf2e9e13-dd78-47ff-8074-f0ec62969443> | CC-MAIN-2014-23 | http://e-turkey.net/istanbul_hagia_sophia?page=5 | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510272584.13/warc/CC-MAIN-20140728011752-00420-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.963825 | 289 | 2.71875 | 3 |
Even though the World Wide Web is only one possible service that uses the Internet, surveys have shown that more than 80 percent of Internet traffic is for the Web. The percentage is likely to grow in the future.
The most remarkable aspect of the World Wide Web arises from its broad appeal. Users form a cross-section of society, including students preparing term papers, physicians researching the latest medical information, and college applicants investigating campuses or even filling out application and financial aid forms online. Other users include investors examining the trading history of a company's stock or evaluating data on various commodities and mutual funds. All the necessary information is available on the Web.
Travelers investigating a possible trip can take virtual tours, check airline schedules and fares, and even book a flight on the Web. Many destinations—including parks, cities, resorts, and hotels—have their own Web sites with guides and local maps. Major delivery companies also have Web sites from which customers can track shipments to determine the location of a package in transit or the time when it was delivered.
Government agencies have Web sites where they post regulations, procedures, newsletters, and tax forms. Many elected officials—including almost all members of the United States Congress—have Web sites, where they express their views, list their achievements, and invite input from the voters. The Web also contains directories of e-mail and postal mail addresses and phone numbers.
Many merchants now do business on the Web. Users can shop at the Web sites of major bookstores as well as clothing sellers and other retailers. Many major newspapers have special Web editions that are updated more frequently than the printed version. In some cases, a Web site will offer basic information to everyone, but provide additional information to users who buy a subscription. The major broadcast networks use the Web to provide supplementary materials for radio and television shows, especially documentaries. Electronic journals in almost every scholarly field are now on the Web. Most museums now offer Web users a virtual tour of their exhibits and holdings. Finally, many individuals have a Web site that describes their family, hobbies, and other personal information. | <urn:uuid:29b7dd5a-1eaf-48a9-9fe5-a8ede5d4a7ee> | CC-MAIN-2019-39 | http://auuuu.com/computereducation/web/who-uses-the-web/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575844.94/warc/CC-MAIN-20190923002147-20190923024147-00544.warc.gz | en | 0.94089 | 421 | 3.140625 | 3 |
The remarkable contributions of Maria Sibylla Merian, a 17th-century self-taught artist and the first person to document the metamorphosis of the butterfly, are not as well-known as those of John James Audubon, Charles Darwin, and Carl Linnaeus, but her discoveries preceded and influenced those later naturalists.
At a time when the most learned adhered to the Aristotelian theory of “spontaneous generation,” that insects came from “dew, dung, dead animals, or mud” and were “beasts of the Devil,” Merian was convinced otherwise. Captivated by the mysterious lives of insects, she wanted to know where they came from. Flouting the conventions of the time to pursue her passion for insects made Merian’s life difficult, but she never allowed adversity to interfere with her dogged pursuit of knowledge. Travelers’ stories inspired her to take an arduous journey to the Dutch colony of Surinam to observe, document, and collect exotic species. With techniques learned from her stepfather, Merian became an accomplished artist, rendering in beautiful, extraordinary detail the intricacies of caterpillars, flies, moths, butterflies, and other insects. She recorded her keen observations in a research journal and published three books about her discoveries. This fascinating account of Merian’s life and work is beautifully designed and embellished with both Sidman’s photographs of what Merian studied and images of her artwork. Informative captions identify and connect each image’s relevance to Merian’s life and work.
An exceptionally crafted visual biography of a pioneering entomologist and naturalist who lived a life devoted to discovery. (glossary, timeline, source notes, bibliography, further reading) (Biography. 9-12) | <urn:uuid:54b53299-afca-46b4-abfe-24bd4084d33d> | CC-MAIN-2018-43 | https://www.kirkusreviews.com/book-reviews/joyce-sidman/the-girl-who-drew-butterflies/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510019.12/warc/CC-MAIN-20181016051435-20181016072935-00072.warc.gz | en | 0.951196 | 384 | 3.546875 | 4 |
Echidnas and Platypus
Echidnas and the platypus are part of the Monotremata family. There are only three species of monotreme in the world - the platypus and two species of echidnas, one of which is restricted to the New Guinea highlands.
Monotremes have lower body temperatures than other mammals and have legs which extend out, then vertically below them. These features, together with their egg-laying, are more like that of a lizard than a mammal.
Read about a fungal infection affecting the platypus in Tasmania. | <urn:uuid:a1bed285-3a9c-4f9f-971c-72ab88749c9f> | CC-MAIN-2022-27 | https://nre.tas.gov.au/wildlife-management/fauna-of-tasmania/mammals/echidnas-and-platypus | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103033925.2/warc/CC-MAIN-20220625004242-20220625034242-00425.warc.gz | en | 0.935871 | 124 | 2.96875 | 3 |
by Sarah Laskow, November 09, 2016
Medieval scribes protected their work by threatening death, or worse.
In the Middle Ages, creating a book could take years. A scribe would bend over his copy table, illuminated only by natural light—candles were too big a risk to the books—and spend hours each day forming letters, by hand, careful never to make an error. To be a copyist, wrote one scribe, was painful: “It extinguishes the light from the eyes, it bends the back, it crushes the viscera and the ribs, it brings forth pain to the kidneys, and weariness to the whole body.”
Drogin’s book had dozens of such curses in it, and he had collected at least a dozen more to include in the second edition, which was never published. Inside his copy of the book, he still has a baggie of antique file cards, full of book curses.
As Drogin collected curses, he started to find repeats. Not all scribes were creative enough to write their own curses. If you’re looking for a good, solid book curse, one that will serve in all sorts of situations, try this popular one out. It covers lots of bases, and while it’s not quite as threatening as bookworms gnawing at entrails, it’ll get the job done:
“May whoever steals or alienates this book, or mutilates it, be cut off from the body of the church and held as a thing accursed.”
Source : Atlas Obscura | <urn:uuid:6c6c9d12-7c22-4acc-b929-4652ca9b8d3e> | CC-MAIN-2023-40 | https://artsvox.com/2016/12/?lang=fr | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00347.warc.gz | en | 0.981795 | 337 | 2.65625 | 3 |
Help support New Advent and get the full contents of this website as an instant download or CD-ROM. Includes the Catholic Encyclopedia, Church Fathers, Summa, Bible and more all for only $19.99...
Quinquennial representative meetings of the Clergy of France for the purpose of apportioning the financial burdens laid upon the Church by the kings of France, and incidentally for other ecclesiastical purposes—the Assemblies of the French Clergy (Assemblées du Clergé de France) had a financial origin, to which, for that matter, may be traced the inception and establishment of all deliberative assemblies. Long before their establishment, however, the State had undertaken to impose on the Church her share of the public expenses. The kings of France, powerful, needy, and at times unscrupulous men, could not behold side by side with the State, or within the State, a wealthy body of men, gradually extending their possessions throughout the kingdom, without being tempted to draw upon their coffers and, if need were, to pillage them. During the Middle Ages the Crusades were the occasions of frequent levies upon ecclesiastical possessions. The Dime Saladine (Saladin Tithe) was inaugurated when Philip August (1180-1223) united his forces with those of Richard of England to deliver Jerusalem from Saladin. At a later period the contributions of the clergy were increased, and during the reign of St. Louis (1235-70) we find record of thirteen subsidies within twenty-eight years. It has been estimated that the latter monarch received altogether from the clergy the equivalent of 400,000,000 francs, in the present currency ($80,000,000). The modern era brought no decrease in the taxes imposed on the Church. Francis I, for example (1515-48), made incessant calls on the ecclesiastical treasury. The religious wars stirred up by Protestantism furnished the French kings with pretexts for fresh demands upon the Church. In 1560, the clergy held a convention at Poissy to consider matters of Church-reform, and occasion made famous by the controversy (Colloque de Poissy) between the Catholic bishops and the Protestant ministers, in which the chief orators were the Cardinal of Lorraine and Thedore Beza. At this assembly the Clergy bound themselves by a contract made in the name of the whole clerical body to pay the king 1,600,000 livres ($300,000) annually for a period of six years; certain estates and taxes that had been pledged to the Hotel de ville of Paris for a (yearly) rente, or revenue, of 6300,000 livres ($120,000). In other words, the clergy bound themselves to redeem for the king in ten years a capital of 7,560,000 livres ($1,512,000). The French monarchs, instead of settling their debts, made fresh loans based on this rente, or revenue, paid by the Church, as if it were to be something permanent. After lengthy discussions, the clergy assembled at Melun (1579-80) consented to renew the contract for ten years, a measure destined to be repeated every decade until the French Revolution. The "assemblies of the Clergy" were now an established institution. In this way the Church of France obtained the right of freely meeting and of free speech just when the meetings of the States-General (Etats-Généraux) were to be discontinued, and the voice of the nation was to be hushed for a period of 200 years.
At a very early date, these assemblies adopted the form of organization which they were to preserve until the French Revolution. The election of deputies forming the body was arranged according to ecclesiastical provinces. It was decided in 1619 that each province should send four deputies (two bishops and two priests) to the assemblies de contrat held every ten years, and two to the assemblées des comptes which met once during the interval of ten years. Under this arrangement an assembly was convened every five years. There were two steps in the election of deputies. First, at the diocesan assembly were convened all holders of benefices, a plurality of whose votes elected two delegates. These then proceeded to the metropolitan see, and under the presidency of the metropolitan elected the provincial deputies. First at the diocesan assembly were convened all holders of benefices, a plurality of whose votes elected two delegates. These then proceeded to the metropolitan see, and under the presidency of the metropolitan elected the provincial deputies. Theoretically, parish priests (curés) might be chosen, but as a matter of fact, by reason of their social station, inferior to that of abbés and canons, they seldom had seats in the assemblies. The rank of subdeacon suffices for election; the Abbé Legendre relates in his memoirs as a contemporary incident that one of these young legislators, after an escapade, was soundly flogged by his perceptor who had accompanied him to Paris. The assemblies at all times reserved to themselves the right of deciding upon the validity of procurators and the authority of deputies. They wished also to reserve the right of electing their own president, whom they always chose from among the bishops. However, to conciliate rivalries, several were usually nominated for the presidency, only one of whom exercised that function. Under a strong government, withal, and despite the resolution to maintain their right of election, the Assemblies were unlikely to choose a person not in favour at court. We know that during the reign of Louis XIV Harlay de Champvallon, Archbishop of Paris, was several times president. Finally, Saint-Simon tells us the royal displeasure deprived him of his influence with the Clergy, and even shortened his life. The offices of secretary and "promotor", being looked on by the bishops as somewhat inferior, were assigned to deputies of the second rank, i.e. to priests. Like all other parliaments, the Assemblies of the French Clergy divided their work among commissions. The "Commission of Temporal Affairs" was very important and had an unusually large amount of business to transact. Financial questions, which had given rise to these assemblies, continued to claim their attention until the time of the Revolution. Beginning with the seventeenth century, the payment of the rentes of the H"tel de Ville was an item of slight importance as compared with the sums which the Clergy were compelled to vote the king under the name of dons gratuits, or free gifts. It had been established during the Middle Ages that the Church should contribute not only to the expenses of the Crusades, but also towards the defence of the kingdom, a tradition continued to modern times. The religious wars of the sixteenth century, later the siege of La Rochelle (1628) under Richelieu, and to a still greater extent the political wars waged by Henry IV, Louis XIII, Louis XIV, Louis XV, and Louis XVI occasioned the levying of enormous subsidies on the Clergy. The following example may serve as an illustration: the Clergy who had voted sixteen million livres ($3,200,000) in 1779, gave thirty millions more ($6,000,000) in 1780 for the expenses of the French Government in the war of the American Revolution, to which they added in 1782 sixteen millions and in 1786 eighteen millions. The Church was then to the State what, under similar circumstances, the Bank of France is today. The French kings more than once expressed their gratitude to this body for the services it had rendered both monarchy and fatherland in the prompt and generous payment of large subsidies at critical moments when, as now, money was the sinews of war. It has been calculated from official documents that during three-quarters of a century (1715-89) the Clergy paid in, either for the rentes of the Hotel de Ville or as "free gifts" over 380 million livres ($76,000,000). We may well ask ourselves if, with all their prerogatives, they did not contribute toward the public expenses as much as the rest of the nation. In 1789, when accepting, with all the cahiers or propositions emanating from the Clergy, the law imposing on the Church of France an equal share of the public expense, the Archbishop of Paris, Monseigneur de Juigné, was able to say that the Church already contributed as much as the other orders (nobility, bourgeoisie, and people); its burdens would not be increased by the new law that imposed upon all an equal share in contributing to the expenses of the State.
The Assemblies of the Clergy conducted their temporal administration in a dignified and imposing manner, and with much perfection of detail. They appointed for ten years a receiver-general (Receveur-général) in reality a minister of finance. The office carried with it a generous salary, and for election to it a two-thirds majority was required. He was bound to furnish security at his residence in Paris and render a detailed account of his management to the assembled Clergy. In each diocese there was a board of elected delegates presided over by the bishop, whose duty it was to apportion the assessments among the beneficed ecclesiastics. This Bureau diocésain de décimes (Diocesan Board of Tithes) was authorized to settle ordinary disputes. Over it were superior boards located at Paris, Lyons, Rouen, Tours, Toulouse, Bordeaux, Aix, and Bourges, courts of appeal, whose decisions were final in all disputes concerning the contributions of the dioceses within their jurisdiction.
In this way the Clergy had an administration of their own independent of the State, a very important privilege under the old regime. It may be added that they knew how to merit such a favor. In the whole nation their credit stood highest; the archives have preserved for us many thousands of rental contracts made in the utmost confidence by private individuals with the Church. Certain details of the ecclesiastical financial system are even yet worthy of study. It has been said that M. de Villle introduced into France the conversion of annuities and the consequent reduction of interest; as a matter of fact this was practised by the Clergy from the end of the seventeenth century when they were forced to negotiate loans in order to furnish the sums demanded by Louis XIV. Necker, a competent judge, commended the Clergy for the care they took in liquidating these debts. He also praised the clerical system of the distribution of taxes, according to which the beneficed ecclesiastics throughout the kingdom were divided into eight départements, or classes, in order to facilitate the apportionment of taxes in ascending ratio, according to the resources of each. This shows that even under the old regime the Clergy had placed on a practical working basis, in their own system of revenues the impit progressif or system of graduated assessment of income. It may be said that the system of administering the ecclesiastical temporalities as developed by the Assemblies of the Clergy of France was remarkably successful. Possibly, they succeeded only too well in maintaining the financial immunities granted the Church. These they gave up on the verge of the Revolution, when they accepted the principle that the public burden should be equally divided among all classes of the nation, a step they had delayed too long. Public opinion had already condemned in an irresistible manner all privileges whatsoever.
The Assemblies of the Clergy did not confine their attention to temporal matters. Doctrinal questions and spiritual matters held an important place among the subjects discussed in them. Indeed, the Colloquy of Poissy, the original germ of the Assemblies, was expressly convened for the discussion of Protestantism, and in opposition to schism and heresy. Practically every Assembly, from the first in 1560 to the last in 1788, dealt with the problem of Protestantism; it may be added that their attitude was scarcely favorable to liberty of conscience. In its turn, Jansenism received much attention from these Assemblies, which always supported with great loyalty the papal bulls that condemned this heresy. Indeed, some of the severest measures against Jansenism came from this quarter. The eighteenth century, with its philosophers and encyclopaedists, brought the Assemblies of the Clergy anxieties of a new and alarming character. They did their best to withstand the progress of infidelity, stirred up and encouraged Christian apologists, and urged the king to protect the Church and defend the faith of the French people. They were less successful in this task than in their previous undertakings. The philosophical and political movement which the Clergy had found themselves powerless to block, was to involve even them in the catastrophe that demolished the old regime.
Among the doctrinal questions brought before the Assemblies of the Clergy particular note should be taken of the Four Articles voted on by the famous Assembly of 1682. We know that this Assembly was convened to consider the Régale, a term denoting the right assumed by the French king during the vacancy of a see to appropriate its revenues and make appointments to benefices. For centuries, even back in the Middle Ages, such seizure of ecclesiastical rights on the part of the State had given rise to innumerable abuses and depredations. The kings of France had often affirmed that the right of Régale belonged to them in virtue of the supremacy of the Crown over all sees, even those previously exempt from the assertion of this right. Under Louis XIV, these claims were vigorously enforced. Two prelates, Pavillon, Bishop of Alet, and Caulet, Bishop of Pamiers, made a lively resistance to the royal pretensions. The pope sustained them with all his authority. Thereupon the king convoked the famous Assembly of 1682, presided over by Harley de Champvallon, and Le Tellier, Archbishops respectively of Paris and of Reims. Bossuet, though firm in his allegiance to the Holy See, was convinced of the danger menacing the Church, and on the 9th of November, 1681, preached in the church on the Grands Augustins at Paris his celebrated sermon "On the Unity of the Church". This immortal masterpiece of eloquence was so fortunate as to secure the approbation of both pope and king. Contrary to its custom, the Assembly ordered the discourse to be printed. Thereupon, the question of the Régale was quickly decided according to the royal wish. A far graver question, however, was laid before the Assembly when Louis XIV asked them to pronounce upon the authority of the pope. Bossuet, who felt the peril lurking in such discussions, tries to temporize and requested that, before proceeding further, Christian tradition on this point be carefully studied. This move proving unsuccessful, the Bishop of Meaux stood out against the (Gallican) propositions presented in the name of the commission by Choiseul-Praslin, Bishop of Tournai. Thereupon the propositions were turned over to Bossuet himself; he succeeded in eliminating from them the irritating question of appeals to a future council, a proposition several times condemned by the Holy See. It was then that the Assembly voted (19 march, 1682) the famous "Four Articles" that may be briefly summarized as follows:
Bossuet who was drawn into the discussions in spite of himself, and who in all questions inclined towards the least arbitrary solution, wrote his Defensio Declarationis in justification of the decisions of the Assembly. It was not published, however, until after his death. The king ordered the "Four Articles" to be promulgated from all the pulpits of France. Innocent XI (1676-89), notwithstanding his dissatisfaction, hesitated to pass censure on the publication of the "four Articles", He contented himself with expressing his disapproval of the decision made by the Assembly on the question of the Régale, and refused the papal Bulls to those members of the Assembly who had been selected by the king for vacant sees. To lend unity to the action of the Assemblies, and to preserve their influence during the long intervals between these meetings, two ecclesiastics were elected who were thenceforth, as it were, the executive power of the Church of France. They were known as Agents-General (Agents-gnraux) and were very important personages under the old regime. Although chosen from among the Clergy of the second order, i.e. from among the priests, they were always men of good birth, distinguished bearing, and quite familiar with the ways of the world and the court. They had charge of the accounts of all receivers, protected jealously all rights of the Church, drew attention to whatever was prejudicial to her prerogatives of discipline, and in the parliament represented the ecclesiastical authority and interest in all cases to which the Church was a party. They enjoyed the privilege of committimus, and were specially authorized to enter the king's council and speak before it on ecclesiastical matters. On the occasion of each Assembly these agents rendered an account of their administration in reports, several folio volumes of which have been published since the beginning of the eighteenth century under the title of: Rapports d'agence. The usual reward for their services was the episcopate. Their duties prepared them admirably to understand public affairs. Monseigneur de Cic, Monseigneur de La Luzerne, the Abbé de Montesquiou, and Talleyrand, all of whom played important roles in the Constituant Assembly, had been in their time Agents General of the Clergy.
The reader may now judge of the importance attaching to the Assemblies of the Clergy under the old regime. The mere fact that they could meet the king, converse with him on questions of finance, religion, administration, even of politics, and, when necessary, lay complaints before him, was in those days a very great privilege. At a time when the public were without a voice, the Nobility forbidden to assemble (enjoying, indeed, special favours, but without rights; forming no distinct corps, and with no official organ of their interests) the clergy were represented, had a voice in affairs, could defend themselves, attack their opponents, offer remonstrances. It was a unique position, and added still more to the prestige already enjoyed by the first order of the nation. It was a unique position, and added still more to the prestige already enjoyed by the first order of the nation. It was truly extraordinary that they should have so jealously preserved the right of voting on their taxation, a right which for three centuries the people had allowed to lapse. It was an evidence of great power when the Clergy could force an absolute monarchy to discuss with them grave questions of finance, could vote freely on their own contributions and set forth their demands, could seize the occasion of their "free gifts". To draw to all manner of religious interests the royal attention and good will- in a word, could practice the policy of do ut des (I give that you may give), efficacious even under a Louis XIV. It is worthy of note that in the suspension of the meetings of the States-General, of councils national or provincial, these Assemblies enabled the Clergy to exercice a correctional surveillance over all the interests of the Church. As for the temporalities, the Assemblies ensured to the Clergy an autonomous financial administration by which they might better defend themselves against the menace of the taille, or land tax, escape the often odious interference of the royal treasury, redeem the new assessments known as the capitation (poll-tax) of the tenth, the fiftieth, and twentieth—all which favours could be obtained only in consideration of contributions of prompt authoritative decisions. We have, indeed, already remarked that these Assemblies succeeded all too well in retaining the ecclesiastical exemptions until 1789, just before the States-General were again convoked, when, yielding to the pressure of public opinion, and in their own interest, the Clergy were induced to relinquish them. In the eyes of posterity the doctrinal role of the Assemblies of the Clergy was more striking than their administration of the ecclesiastical temporalities. If they were unable to weather the storm that laid low all institutions of the old regime, it was due in great part to the fact that their share in the interests and life of the people was inconsiderable. By defending ecclesiastical privilege with so much heat and constancy these Assemblies appeared to be occupied almost solely with clerical interests. Moreover, the method of their recruitment, almost exclusively from the higher Clergy, begot a temper of indifference towards their fate on the part of the curés, or parish priests, who were soon called to exercise a decisive influence on the course of the States-General. Had the Assemblies been less attached to the prerogatives of absolute power, even at a time when ideas of liberty were gaining a hold on public opinion in France, they might have become what they were qualified for by their organization and their operation—a standing invitation to a parliamentary form of government and a preparation for the same. The tardy stand taken by the Assembly of 1788, with its hold plea to the King for the rights of the people and for the convocation of the States-General, came a trifle too late; the effect produced was lost sight of in the general ferment. The vote by which the national parliament was assured of equal taxation for all deprived these Assemblies of their raison d'tre; it was precisely for the regulation of special contributions from the Clergy that they were established and had been kept up. Henceforth, like the parlements and other bodies apparently detached from, or loosely connected with, the life of the nation, they were fated to be merged in its new and larger unity. Despite the manner of their ending, shared by so many other institutions of the old regime, the Assemblies had been one of the ornaments—it might be said, one of the glories of the Church of France. During centuries of political servitude they offered the example of a free parliament in regular operation; their financial administration was successful and was conducted with much dignity; in time of war they rendered the State notable services, and some of their meetings will be always remembered for the important religious and political discussions they provoked. For these reasons the Assemblies fill a brilliant page in the annals of the French Clergy, and will merit at all times the attention of the historian.
Manuscripts and Archives nationales, Srie G8, in the Bibliothèque Nationale Paris. The records of the National Archives contain the authentic proceedings (Procs-verbaux) of the Assemblies. Collection des procs-verbaux du clerg de France, depuis 1560, jusqu' prsent (1767-78, 9 vols.) The later Assemblies had each a Procs-verbal printed in one folio volume. Recueil des actes et mmoires du clerg de France (1771) I and VIII: Louis Serbat, Les Assembles du clerg de France (Paris, 1906) 1561-1615); Maury, in Revue des deux Mondes (1878); Bourlon in Revue du Clerg (1905-06); Sicard, L'ancien clerg de France (Paris, 1893-1903).
APA citation. (1907). Assemblies of the French Clergy. In The Catholic Encyclopedia. New York: Robert Appleton Company. http://www.newadvent.org/cathen/01795a.htm
MLA citation. "Assemblies of the French Clergy." The Catholic Encyclopedia. Vol. 1. New York: Robert Appleton Company, 1907. <http://www.newadvent.org/cathen/01795a.htm>.
Transcription. This article was transcribed for New Advent by Gilles Beaudet, f.s.c.
Ecclesiastical approbation. Nihil Obstat. March 1, 1907. Remy Lafort, S.T.D., Censor. Imprimatur. +John Cardinal Farley, Archbishop of New York.
Contact information. The editor of New Advent is Kevin Knight. My email address is webmaster at newadvent.org. Regrettably, I can't reply to every letter, but I greatly appreciate your feedback — especially notifications about typographical errors and inappropriate ads. | <urn:uuid:8cb5b53a-efe9-46eb-964f-02e667428071> | CC-MAIN-2014-49 | http://newadvent.org/cathen/01795a.htm | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931008227.98/warc/CC-MAIN-20141125155648-00184-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.972197 | 5,106 | 3.328125 | 3 |
The Roaring Twenties brought Americans a new era of mass-produced goods and, with it, an emerging middle class clamoring for newly affordable automobiles. In 1925 you could buy a Ford Model T for just $290 (about $3,700 adjusted for inflation). That same car would cost you $850 when it was first introduced in 1908 (about $20,400 adjusted for inflation). This steep drop in the price of cars — coupled with a national fascination with flight — had every “small f” futurist dreaming up the flying car of tomorrow.
The June, 1927 issue of Science and Invention magazine looked at one possible flying car of the future — specifically, a flying ambulance . The magazine included pictures from a scale model display, dreamt up by a French inventor who is unfortunately left unnamed by the article. The ambulance would be completely independent of the plane and simply drive into position to be swept away to the nearest hospital. The inventor imagines that patients would be riding in much more comfort because the ambulance could be sailing through the air rather than traversing over rough roads.
The Ne Plus Ultra of comfort can be found in this conception of a French inventor, permitting automobiles to go into the air as flying machines. It surely would be a great convenience if travelers, without leaving their automobiles, could embark in an airplane by driving their car into its fuselage. This particular invention was developed by a high-speed ambulance service, and allowing patients to be transported without shock or discomfort, such as might be experienced of the automobile were driven over bad roads. The machine is fastened into the fuselage of the plane.
This machine is reminiscent of the aero-limousine which was exhibited at the Aviation Show in New York some years ago. This arrangement possesses the added advantage that the automobile may be driven out of the fuselage used separately from the plane in any way desired. The perfection of this invention should prove of military use.
Local governments across the country were scrambling to figure out how keep pace with (or often restrict) the burgeoning car culture that was erupting. It’s sometimes hard to imagine what the world looked like before the development of our modern highway system. In the year 1919, future President Eisenhower (then just a lieutenant colonel) participated in a drive across the United States from Washington, D.C. to San Francisco called the Transcontinental Motor Convoy. This caravan of 80 vehicles by the U.S. Army had the goal of demonstrating how vital a modern transportation infrastructure was to U.S. forces in the event of any future war. The journey took 62 days and Eisenhower would later describe the roads they used as ranging from “average to non-existent.”
Eisenhower, of course, would be instrumental in developing America’s modern highway system in the mid-1950s. But long before these highways would crisscross the United States some people found hope in the aerial technologies which might make transportation that much easier. | <urn:uuid:457bfa80-6e26-414c-bdee-5fefaee5183f> | CC-MAIN-2016-22 | http://www.smithsonianmag.com/history/the-flying-ambulance-of-tomorrow-60354553/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049276415.60/warc/CC-MAIN-20160524002116-00186-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.962832 | 608 | 3.640625 | 4 |
Activities to develop a range of dictionary skills
The ability to use a dictionary effectively is essential to all learners. Dictionary Skills is a series of three blackline masters that takes young learners through the processes and skills that will assist them to become proficient when using a dictionary. The activities develop a wide range of skills.
takes young learners through the processes and skills that will assist them to become proficient dictionary users
these blackline master activities develop a wide range of skills including alphabetical order, proofreadingspelling errors, using guide words, word origins, finding definitions, antonyms and synonyms
activities can be used in a variety of ways including as part of the class literacy program, as an activity centre, for homework activities, as a library resource, for early finishers | <urn:uuid:cd4da01d-57c5-4936-94e2-2031962b8364> | CC-MAIN-2020-50 | https://www.ricpublications.co.nz/shop/dictionary-skills-varied-dictionary-activities-ages-5-7/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141189038.24/warc/CC-MAIN-20201127015426-20201127045426-00494.warc.gz | en | 0.919587 | 160 | 3.859375 | 4 |
In recent years after concluding 30 years war with LTTE, at an alarming rate rain forest is diminishing, it is said that currently there about only 12% of forest cover remaining intact. Undue political influence and negligence of the regime and law enforcing officials, put flora and fauna at a great risk. We decided to donate US $ 1 from every purchase you make with us to fund conservation mainly to take legal actions against responsible on this disaster.
Walallawita: A 28,000 years old village
Walallawita is situated in the Kalutara District of the Western Province. It is blessed by nature, possessing ecological treasures such as primeval tropical forests (the Yagirala Reserve being the largest, comprising nearly 10,000 acres of natural forest), an abundance of natural resources and labour, and a salubrious climate. As a whole, it consists of hilly areas, plains and valleys. A worthy aim would be to introduce and promote tourism in Walallawita, as also to promote the Pahurukanda temple and the Yagirala Nature Reserve as focal points for the development of other potential tourist attractions in the area. Tailor-made tour packages could be offered to develop and enhance wildlife conservation and environmental protection in the region. Currently, there is a heavy demand for eco-tourism, since people have begun to understand the significance of protecting the natural habitat.
Walallawita has rich mineral deposits: graphite, gems, and a variety of industrial clays. Even today, you can visit the Bogodakanda plumbago mine. Walallawita is located roughly mid-wetland, in the path of the south-west monsoon blowing in from the Indian Ocean. The climate is moderately tropical; the warmest months are April and August, and the coldest is December. In Walallawita, there are approximately four major rivers and streams whose length exceeds 100 kilometres. There are also many other minor freshwater sources in the area.
Humans lived in the Walallawita region as far back as 28,000 years ago. Unexcavated caves belonging to the Pahurakanda temple bear evidence to this, according to expert archaeologists. The list of reserves in the area are the Yagirala Forest Reserve, Kalugala Proposed Reserve, Haycock Reserve, Halawalkele Government Forest, Meegahatenne Reserve, Uggalkaduwa-Pareigama Natural Forest, Paniyawala Reserve and the Ittapana Mangrove Forest. Historically and culturally significant places in the vicinity include the ancient Pahurukanda temple and its surroundings, and the Weligalpotte monastery. Other attractions are Bangalakanda, Didduwa Island, Pahala Hewessa, Uthumgama-Panagala stream, Gonkaradola stream, Batahendola stream and Yattapata Water. Places that could be developed include the Galatara boatyard and its surroundings, which could provide basic washroom facilities for tourists. The marketing of Walallawita and its environs must involve the promotion of the region as a whole, with the cooperation of all interested parties, identification of market segments ranging from holidaymakers to day visitors (specially tourists who visit via the Bentara River, on their river safari) for whom appropriate offers must be tailored, and achieving this within a framework of sustainable tourism to heighten the satisfaction of visitors and inhabitants alike. To reduce seasonality, promoters could concentrate on offering off-season packages designed to create a new image of the area as a worthwhile off-season destination for nature lovers, environmentalists, adventure tourists and explorers. To prepare long-term tourist development plans, we need to improve transportation, roads and telecom in partnership with private and public sector organizations.
Sri Lankas forests are under threat Sri Lanka Wilpattu Nature Reserve has suffered from encroachment as the country’s population expands.This has provoked an outcry from environmentalists, who hope the government will take their concerns seriously. Al Jazeera Minelle Fernandez reports from North West Sri Lanka on Thursday, January 7, 2016
Sri Lanka had a proud history of conservation of her much valued lush green Tropical Rain Forest for over 2500 years under the direct influence of Buddhism.
This is our humble request to Buddhists in the world and compassionate human beings all around the world to protect our inheritance and to end the massive destruction of forest in the country. | <urn:uuid:cdff7745-6c49-4740-ae3b-a2d06d7dab78> | CC-MAIN-2019-39 | https://serendib-tea.org/conservation-3/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514571651.9/warc/CC-MAIN-20190915155225-20190915181225-00346.warc.gz | en | 0.946616 | 921 | 2.75 | 3 |
Post-secondary student homelessness (PSSH) is a bigger problem in Canada than previously thought. PSSH includes a range of destabilizing housing experiences resulting in housing precarity or literal homelessness that is expressed within a far more complicated demography than found in K-12. PSSH occurs at points in the student’s lifecourse that is directed at practical outcomes like finding a job, so there is considerable urgency in addressing this issue in a timely fashion. In Canada, there are approximately 2,048,000 students in post-secondary, the vast majority are youth, 18-34 years of age.
Though no one knows exactly how many students experience homelessness, our early survey research among students at three post-secondary sites, finds that as many as 4% of Canadian post-secondary students experience some kind of homelessness every day meaning that about 80,000 students are couch surfing, sleeping in a vehicle, locker room, stair well, or shelter today. Again, we do not know the actual numbers so one of the goals of this ongoing research is to ascertain the number and understand the range of experiences constituting PSSH in Canada. In order to understand and find solutions means to address complex systemic, individual and institutional factors that create housing precarity for Canadian students
While most PSSH is hidden homelessness, survey responses suggested that students will as a last resort, stay in toxic relationships, suffer abuse, deal drugs or trade sex for places to stay or to make income to stay housed. Over 60% said they would definitely leave school if facing homelessness, over 35% experienced stress that impacted school and social life, and almost 28% had experienced homelessness in the past; most of it while they were students in K-12, or in prior stints at post-secondary. Close to half of students indicated they suffered mental health issues often requiring treatment and close to 75% of students felt that student homelessness and housing were serious issues in general requiring immediate attention. The bottom line is that PSSH has personal, social, economic and cultural implications that we need to understand better. And in fact, there is much more attention being paid to PSSH today, and researchers are beginning to connect over the issue.
In the recent StudentDwellTO symposium at York University, student researchers revealed that many students are living in slum housing; densely overpopulated regular market town homes, sleeping in cubicles separated by simple sheets of drywall and paying $600-700 CDN for each space to shady landlords. Not only are these unsafe and illegal conditions, they are dehumanizing and apparently more common than anyone knew until recently.
Many of the respondents had been living in similar conditions or other levels of precarity expressed in the COH’s Definition of Homelessness in Canada but had never thought of themselves as homeless until reading that definition in our survey preamble. In our research, while we address the prevalence and ranges of experiences that PSSH presents, we also pay careful attention to the attitudes and perceptions that students, institutions and governments hold about this complex issue.
One of the biggest issues we talk about is stigma. The stigma of being homeless prevents students from identifying their needs to school support teams or to their friends. Students fear being rejected socially and anecdotally expressed the perception that their housing precarity would be a barrier to academic advancement. The result is that PSSH is a sort of dirty little secret, so we really are trying to catch up to situations that have become quite large and entrenched in a system that is not used to responding effectively to a hidden social need.
Recent discussions among PSSH researchers suggest that several things must take place for there to be meaningful change:
- Institutions need to reexamine their role as landlords and housing providers and must create safe spaces to discuss student housing precarity.
- Governments, housing ministries and research funders need to support efforts to understand the dimensions of PSSH and explore culturally intelligent solutions to student housing.
- Students must be involved in creating and designing safer student communities and housing options.
At the CAEH conference in 2018, we discussed our first study carried out at Red Deer College, and since then, a number of scholars, people with lived experience, institutional stakeholders and non-profits have reached out and the base of our research has snowballed. An open collaboration has formed around the participation of the University of New Brunswick (Saint John), the University of Calgary, Lakehead University, Red Deer College, the University of Alberta, Lethbridge College and Nova Scotia Community College. We have created a universal survey instrument that will provide information for researchers trying to understand the social dynamics of PSSH and also provide important information for institutions to use in planning for their students’ needs.
In the presentation at CAEH this November, representatives from Lethbridge College, UNB SJ, the University of Calgary and the University of Alberta will discuss their respective projects and research. This is a great opportunity to join this important and emerging conversation and research track. Elements of this collective project are discussed in the upcoming special edition of Parity Magazine that will be featured at the CAEH. | <urn:uuid:cf395d3d-1adf-4e04-bb47-53a961609d3c> | CC-MAIN-2020-50 | https://www.homelesshub.ca/blog/post-secondary-student-homelessness-canada-new-research-prevalence-intervention-and-prevention | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141184123.9/warc/CC-MAIN-20201125183823-20201125213823-00504.warc.gz | en | 0.964608 | 1,045 | 2.8125 | 3 |
Course Hero. "The Color Purple Study Guide." Course Hero. 15 Sep. 2016. Web. 11 Dec. 2017. <https://www.coursehero.com/lit/The-Color-Purple/>.
Course Hero. (2016, September 15). The Color Purple Study Guide. In Course Hero. Retrieved December 11, 2017, from https://www.coursehero.com/lit/The-Color-Purple/
(Course Hero, 2016)
Course Hero. "The Color Purple Study Guide." September 15, 2016. Accessed December 11, 2017. https://www.coursehero.com/lit/The-Color-Purple/.
Course Hero, "The Color Purple Study Guide," September 15, 2016, accessed December 11, 2017, https://www.coursehero.com/lit/The-Color-Purple/.
Corrine refuses to believe Nettie and Samuel's facts about Olivia and Adam: they are Celie and Alphonso's children and Nettie is their aunt. Nettie reminds Corrine of the encounter with Celie in town years earlier, but Corrine does not remember the meeting. After Nettie shows her the material Celie picked out for them in a quilt, Corrine confesses she was afraid Celie would want the children back if she accepted the truth. That night, Corrine dies after accepting the truth about the history of her family. In sorrow over losing Corrine, Nettie bemoans her empty life. She is not married, has no children of her own, and enjoys no close female companions. She acknowledges Samuel as her only friend.
By Letter 72, Olivia menstruates and becomes a woman, and the family has buried Corrine according to village custom. Nettie inherits Corrine's clothing and talks with Samuel about Celie.
In Letter 73, Celie confesses she doesn't write to God anymore because he let her down: "he give me a lynched daddy, a crazy mama, a lowdown dog of a step pa, and a sister I probably won't ever see again." She also rejects God because she sees him as a man, a gender that has always oppressed her, and more specifically as a white man, a member of a race that has always oppressed her people. Shug contradicts Celie's views by offering an alternative view: the Bible favors white people, but God isn't a color or gender but an It. She believes God loves all people, no matter their sins, and just wants them to appreciate the world's magnificence. She supports her theory and gives the book its title by saying God becomes angry "if you walk by the color purple in a field somewhere and don't notice it." Shug also asserts, "I believe God is in everything ... Everything that is or ever was or ever will be. And when you can feel that and be happy ... you've found It."
In Letter 74, during a family dinner at Odessa and Jack's, Sofia has returned home after 11 years to find that her children have grown up without her, referring to Odessa as Mama and Mary Agnes as Little Mama. Harpo and Mary Agnes act as if they're married, although Harpo is still legally married to Sofia.
Shug announces she is leaving and taking Celie with her to Memphis. Celie calls Mr. ___ a "lowdown dog," when he objects and stands up for her right to do as she pleases. She announces that her children and Nettie are coming home, and she denounces Mr. ___'s own children as rotten. He slaps Celie, but she pokes him with a table knife. In response to Mr. ___'s insults about Celie's physical ugliness in comparison to Shug, Celie asks Mr. ___ whether any more letters from Nettie have arrived. At his surprise she curses him, "Until you do right by me, everything you touch will crumble," and leaves with Shug.
Inspired, Sofia joins the fray and tells Harpo that his youngest and favorite daughter Henrietta is not his biological child. Meanwhile, Eleanor Jane, the mayor's daughter, arrives to consult with Sofia, who has become like a mother to her.
Mary Agnes decides that she wants to go to Memphis, too, to embark on a singing career. Sofia promises to care for Mary Agnes's daughter, Suzy Q, and Harpo. When Harpo orders Mary Agnes to stay, calling her Squeak, the girl responds, "Mary Agnes ... When I was Mary Agnes I could sing in public."
Celie and Shug's discussion about God undermines the belief that racial and gender oppression are proof that God disdains blacks and women. Shug argues that the oppressive aspects of God are human constructions: Each person wants to envision God in his or her own image. However, Shug suggests that the real God defies such limitations, and It places constant reminders of beauty in the world, such as the color purple, to remind people to celebrate what is beautiful in themselves and in the world. This worldview offers Celie the opportunity to reclaim the relationship with God that sustained her for so long.
Mr. ___'s and Harpo's dominance over the family shrinks visibly at the dinner table, a place traditionally controlled by women, as Shug leads the charge for the novel's female characters to assert themselves. Celie will finally build a life on her own terms; Mary Agnes will finally claim her voice and, thus, her identity; and Sofia will finally take her place as the family matriarch. | <urn:uuid:5a698490-523e-440f-9b43-b43cad983412> | CC-MAIN-2017-51 | https://www.coursehero.com/lit/The-Color-Purple/section-10-letters-7075-summary/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948513330.14/warc/CC-MAIN-20171211090353-20171211110353-00686.warc.gz | en | 0.970531 | 1,173 | 2.75 | 3 |
The Art of Violin Making Hardback
Illustrated by Adrian Lucas
"The Art of Violin Making" is the major work for the craftsman, bringing into one volume a summary of essential information for the violin maker and player, as well as providing a historical reference.
Part One: The Violin Makers is devoted to separate chapters on the life and work of some of the greatest of all violin makers; the families of Amati, Stradivari and Guarneri, and the unique genius of Jacob Stainer.
These chapters include superb colour photographs of examples of their work.
Also included is a chapter covering the work of some leading contemporary violin makers.
Part Two: The Workshop, Tools and Materials provides essential information on the tools, working environment and material needed by violin makers.
Part Three: Violin Construction comprises a detailed, step-by-step guide to the traditional method of violin making, based closely on the teaching system employed at the world-famous Newark School of Violin Making in England.
This section is highly illustrated with photographs and technical drawings.
The method of violin construction is presented with great clarity, so that even the newcomer to this fascinating craft will be able to produce a superb instrument. The often overlooked subject of 'setting up' is dealt with in detail, and the final chapter includes advice from an experienced restorer on sound adjustment.
This book is essential reading for the violin maker, repairer and historian, providing a unique record of the history, social background, lives and work of the great violin makers of the past, combined with a clear practical guide to making violins.
- Format: Hardback
- Pages: 253 pages, 34 colour, 244 black and white and 50 line illustrations
- Publisher: The Crowood Press Ltd
- Publication Date: 01/02/1999
- Category: String instruments
- ISBN: 9780709058762 | <urn:uuid:d91e9659-c0dd-4ee7-8f6b-c0b9a4f4dd48> | CC-MAIN-2017-04 | http://www.hive.co.uk/Product/Professor-Chris-Johnson/The-Art-of-Violin-Making/1754028 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00158-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.919755 | 393 | 2.734375 | 3 |
Description: Covers definition, calculation, flotation, unique properties of water.
Keywords: density, lesson, covers, definition, calculation, flotation, unique, properties, water
Created by: Laura Rizzo Added: 2010-09-18
Earth Science (Density) Views: 932
File: Be sure you have an application to open this file type before downloading. Click here for more information.
The continued strength of this site depends on teacher contributions. Please help make this site stronger by submitting a file today. Submitting is easy, simply click here to get started. Thanks!
For classroom use under a: Creative Commons License | <urn:uuid:ef95e9dc-f0df-4187-86d0-ce2733fe5a07> | CC-MAIN-2016-50 | http://newyorkscienceteacher.com/sci/files/download.php?id=1254&file=Density_Lesson-Rizzo.notebook | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542217.43/warc/CC-MAIN-20161202170902-00433-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.860576 | 135 | 3.296875 | 3 |
Lost Mound Unit - The Savanna Army Depot is located in southwestern Jo Daviess and
northwestern Carroll Counties,Illinois. Founded in 1917, it was used for military
munitions manufacturing,testing, storage and recycling.
The 13,062 acre area contains about 7,262 acres of uplands and 5,800 acres
of bottomlands. The entire area is listed as a statewide significant natural area by the Illinois Natural Areas Inventory. At least 45 Illinois endangered
and threatened plant and animal species have been observed | <urn:uuid:15b1f439-0962-4f6e-86bf-81dfab4c9813> | CC-MAIN-2015-11 | http://www.fws.gov/refuge/upper_mississippi_river/publications.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936469016.33/warc/CC-MAIN-20150226074109-00292-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.951066 | 110 | 2.515625 | 3 |
What Causes Concrete Slab Moisture?
It's time to talk about concrete slab moisture. At Building Forensics International we have had our share of projects where concrete slab moisture is the topic of conflict. BFI just finished a two year investigation and litigation case involving concrete slab moisture.
The first source would be ground water sources. This would be when the concrete slab is in contact with saturated ground, or where there is poor drainage. Moisture moves to the surface of the slab through capillaries or what is referred to as wicking. Just like a candle wick draws the oil up to the lamp to keep the flame burning. Wicking is a descriptive term for the ground moisture being drawn up throughs the pores of the concrete to the surface of the slab.
A second source is water vapor form damp soil will spread over a portion of the slab and pool or appear as droplets on the slab surface. This usually occurs in cooler temperatures or lower humidity due to vapor pressure.
Third, Wetting of the blotter layer (fill course) will on occasion trap moisture. The blotter layer is a thin layer of coarse or fine sand, or pea gravel used as an absorbant layer between the concrete slab and plastic sheeting. The blotter layer if over saturated with moisture can cause moisture on the slab surface.
Fourth, residual moisture in the slab from the original concrete mixing water will move toward the surface. This can take anywhere from four weeks to over a year.
Finally, there are some factors that can affect the drying rate of the concrete slab. Original water content of the concrete, type of curing, humidity and temperature during the drying period. Any wetting of the slab after final curing will increase moisture levels in the slab itself and cause the drying period to last longer.
BFI Staff Writer | <urn:uuid:6b321239-637e-4e21-b098-81e20d57ce3d> | CC-MAIN-2020-29 | https://www.buildingforensicsintl.com/post/2014/04/01/what-causes-concrete-slab-moisture | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655881763.20/warc/CC-MAIN-20200706160424-20200706190424-00049.warc.gz | en | 0.922781 | 373 | 3.296875 | 3 |
- Schedule of Classes - November 29, 2021 7:42PM EST
- Course Catalog - November 29, 2021 7:27PM EST
Course information provided by the Courses of Study 2021-2022.
At the beginning of the 7th century, a new religion, Islam, appeared in Arabia and by the end of the century, Muslims had defeated the Byzantines and Persians and created an empire that stretched from Spain to India. For the next millennium, Islam glittered. Its caliphs, courts, and capitals were grander, more powerful, and more sophisticated than those of any medieval king, duke or prince. In this course, we will trace the emergence and development of Islamic civilization from the birth of Muhammad ca. 570 to the Mongol sack of Baghdad in 1258. We will read the Qur'an and listen to its recitation; examine the career of the Prophet Muhammad; follow the course of the Arab conquests; explore the nature of the conflict between Sunnis and Shi'is; learn about the five pillars of Islam, sharia law, theology, and Sufism; and assess the achievements of Muslim intellectuals in literature, art, architecture, science, and philosophy.
When Offered Fall.
Breadth Requirement (GHB)
Distribution Category (HA-AS, ALC-AS, HST-AS)
Course Attribute (CU-ITL)
Credits and Grading Basis
3 Credits Stdnt Opt(Letter or S/U grades)
Class Number & Section Details
- MW Goldwin Smith Hall 142
- Aug 26 - Dec 7, 2021
Instruction Mode: In Person
Or send this URL: | <urn:uuid:ca37ea67-9630-416e-b961-6785ae95dc06> | CC-MAIN-2021-49 | https://classes.cornell.edu/browse/roster/FA21/class/RELST/2655 | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359082.76/warc/CC-MAIN-20211130232232-20211201022232-00612.warc.gz | en | 0.880908 | 390 | 2.796875 | 3 |
A combustion oscillation experiment showed combustion oscillation frequencies of around 350 Hz when only natural gas was used as fuel and approximately 200 and 400 Hz when a hydrogen–natural gas mixture was used. To analyze the resonant frequency, two- and four-region models considering unburned and burned regions of the combustor were developed. The experimental frequencies of the 100% natural gas condition were successfully predicted. Conversely, the experimentally observed frequencies under the hydrogen–natural gas condition were not accurately predicted. A swirler-combustor model was then constructed to get closer to the actual configuration and shape of the experimental setup. However, the model could not reproduce the experimental value under the hydrogen–natural gas condition. A whole piping model was then developed by adding a casing and an air supply pipe to the combustor. The resonant frequencies under both the 100% natural gas and hydrogen–natural gas conditions were successfully calculated. The model reproduced the range and change tendency of the experimentally measured oscillation frequency. | <urn:uuid:07b21c86-ccfe-45e6-8167-aa6e718732a6> | CC-MAIN-2023-14 | https://micronanomanufacturing.asmedigitalcollection.asme.org/IMECE/proceedings-abstract/IMECE2021/85543/V001T01A016/1132330 | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948858.7/warc/CC-MAIN-20230328104523-20230328134523-00523.warc.gz | en | 0.962509 | 204 | 2.96875 | 3 |
No, pinhole glasses can not cure astigmatism.You should know they do improve your vision. The moment you put on pinhole glasses you will notice instant clarity and focused vision. By blocking peripheral rays, and only letting into the eye those rays which pass through the central portion of the pupil, any refractive error in the lens or cornea is not noticed as much. The pupil may be wide open, but only the central portion is receiving light. The improvement in visual acuity can be striking. But they can not cure astigmatism. So if you want to cure astigmatism, you should have to go and have a deep conversation with the doctor. I think he can give you some advices and even the treatment.
It would be work when you are wearing pinhole glasses. It can provide a better vision when your astigmatism can be corrected with glasses. However, it couldn't improve the vision as good as with Regular glasses. And your vision would be blurry again when you take off the pinhole glasses thus there is no permanent effect. The vision through pinholes would be dim, and it's poor in low light and you would lose peripheral vision.
No. Adopting the working principle of the telescope, the pinhole glasses are designed with the scientific small holes to let the normal light come into the eyes which may help the eyes control their vision. Anyone with prescription, astigmatism is suitable to wear the pinhole glasses to help them improve the vision. However, the pinhole glasses can't help them cure the eyes with bad vision.
Pinhole glasses are also named stenopeic glasses which have a lot of pinholes on the lenses. Pinhole glasses are useful for people with vision problem. They can make people see clearly without wearing the prescription glasses. Pinhole glasses can help people to exercise our eye muscle to improve eyesight. If your astigmatism is not very bad, pinhole glasses can obviously reduce your symptom. But the glasses can't cure your astigmatism. | <urn:uuid:6eeb35f5-51f3-4f9d-aacc-36a302f602c8> | CC-MAIN-2019-30 | https://www.firmoo.com/answer/question/5283.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525004.24/warc/CC-MAIN-20190717001433-20190717023433-00226.warc.gz | en | 0.957743 | 412 | 2.578125 | 3 |
(PRWEB) August 05, 2015
Childhood asthma affects millions of children across the United States and tens of millions more throughout the world. Asthma, a condition in which the airways of the body constrict, is characterized by labored breathing, coughing, shortness of breath, and wheezing. Ultimately, asthma that is left unchecked can prove to be fatal, so parents who suspect that their children are asthmatic should seek the advice of a qualified physician to create a management plan. Asthma is not curable, but by creating greater awareness of the triggers, risks, and management principles related to asthma, the chances of severe reactions can be minimized. The new infographic by FilterBuy.com discusses asthma-related statistics, health concerns associated with the condition, preventative steps, asthma risks and triggers, maintenance plans, and ways to keep kids healthy even outside of the home.
As specified in the infographic, approximately 14% of children have been diagnosed as asthmatic – leading to more than 600,000 ER visits per year on average. Millions of school days are missed every year, and over 150 children die each year due to the effects of their asthma. One of the easiest ways to keep asthma symptoms at bay is to ensure clean air inside of the home.
View the infographic located here: https://filterbuy.com/childhood-asthma/ and learn more about ways that you can minimize the dangerous side effects of asthma. FilterBuy.com is a leader in replacement filter sales for a variety of air and water filtration units found throughout the home and office.
About FilterBuy - FilterBuy is a US-based organization that has been in the general supply business since 1958. As a division of a family-owned and operated business, the company provides top-quality filter replacements to a wide range of customers. An innovative service that is offered by FilterBuy is the ability to establish recurring shipments of filters to encourage and facilitate regular filter changes. This program helps to prevent filter neglect as well as related damage to critical appliances or equipment in the home or business. With hundreds of filter options available today that cover dozens of filter brands, FilterBuy is well-positioned to accommodate all customers – both foreign and domestic. Customer support reps are available to help Monday - Friday, 830-530 EST at 855-345-8289. | <urn:uuid:1ff0f464-c757-41d5-bec1-b2e719fc0e11> | CC-MAIN-2018-26 | http://www.prweb.com/releases/2015/08/prweb12886440.htm | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863119.34/warc/CC-MAIN-20180619193031-20180619213031-00501.warc.gz | en | 0.953882 | 483 | 2.9375 | 3 |
The Audit Office of the Straits Settlements was established by the British colonial government in 1867. This was the year that the Straits Settlements were made a Crown Colony of the British Empire.
The Auditor-General’s Offices of the Straits Settlements and the Federated Malay States were merged into a single department, the “Audit Department”. A Singapore Audit Office (later renamed the “Audit Department”) was established under the charge of a Deputy Auditor, who was subordinate to the Auditor-General in Kuala Lumpur.
After the Federation of Malaya became independent, the post of Director of Audit was created for the head of the Singapore Audit Department, which came under the supervision of the Overseas Audit Department in London. The first Director of Audit was Arthur H Armitage who held the post from 1958 to 1962.
The official standing of the Audit Department was enhanced with the enactment of an Audit Ordinance which formally gave the Director of Audit the legal authority to carry out his duties.
In 1963, Malaya, Singapore, Sabah and Sarawak signed the Malaysia Agreement in London to form the Federation of Malaysia. The Singapore Audit Department became a branch of the Malaysian Audit Department under the Auditor-General of Malaysia.
Singapore Audit Department came under Singapore Government’s authority after Singapore gained independence.
Singapore Parliament passed the Audit Act to re-enact the 1959 Audit Ordinance that lapsed when Singapore became part of Malaysia. The Act stipulated the responsibilities of the Director of Audit and safeguarded the Director of Audit’s terms of service to allow him to carry out his work objectively and autonomously, without fear or favour.
The Director of Audit was re-designated Auditor-General in 1970.
The Audit Department was renamed the Auditor-General’s Office (AGO) in 1985.
The Constitution of the Republic of Singapore was amended to empower the President to veto government’s use of national reserves as well as appointments to vital public sector positions – including that of the Auditor-General. Along with these changes, the terms of appointment and duties of the Auditor-General were also enshrined in the Constitution. The Constitution also imposed on the Auditor-General the additional duty of informing the President of any proposed transaction of the Government which is likely to draw on the reserves of the Government which were not accumulated by the Government during its current term of office. | <urn:uuid:b223e2c2-5adf-4529-a100-06440aa8e0a8> | CC-MAIN-2021-25 | https://www.ago.gov.sg/who-we-are/history | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488551052.94/warc/CC-MAIN-20210624045834-20210624075834-00248.warc.gz | en | 0.977795 | 499 | 2.9375 | 3 |
The first national survey of children with attention deficit/hyperactivity disorder shows that nearly half of preschoolers are on medication for the condition, and more than a fifth were receiving neither of the recommended therapies.
American Academy of Pediatrics guidelines call for the use of behavioral therapy first with children younger than 6 because the long-term impacts of medications on developing brains are not well known. But the data show that 46.6 percent of the pre-school aged children with the disorder had taken medication alone or with behavioral therapy in the previous week, and 53.2 percent had used behavioral therapy in the previous year. Another 21. 4 percent received neither therapy.
The numbers also show that 15.3 percent of pre-schoolers were taking dietary supplements, though there are no proven dietary treatments for the disorder, said Steven Cuffe, chairman of the Department of Psychiatry at the University of Florida College of Medicine in Jacksonville and one of the study authors.
Brain scan may help detect CTE
A brain-scanning technique might one day help identify people with a disease linked to concussions in football and other sports, an illness now diagnosed only after death, a study suggests.
Scans of 14 retired football players at risk for the condition, called CTE, revealed deposits of abnormal protein in a pattern resembling that found at autopsy in the disease. CTE stands for chronic traumatic encephalopathy. It causes progressive brain degeneration in athletes and others who’ve had repeated concussions and other blows to the head. Symptoms include memory loss, confusion, aggression, depression and progressive dementia.
No cure is known. But the brain-scanning approach raises the possibility of detecting the disease early, when the chances would be greatest for success of experimental treatments, study authors said. It might also shed light on the disease and help athletes with decisions on retirement, said a study author, Dr. Julian Bailes, co-director of the NorthShore Neurological Institute in Evanston, Ill.
Pollution raises risk of stroke
Air pollution — even for just one day — significantly increases the risk of stroke, a large review found.
Researchers pooled data from 103 studies involving 6.2 million stroke hospitalizations and deaths in 28 countries. The analysis, published online in BMJ, found that all types of pollution except ozone were associated with increased risk for stroke, and the higher the level of pollution, the more strokes there were.
The reason for the effect is unclear, but studies have shown that air pollution can constrict blood vessels, increase blood pressure and increase the risk for blood clots. Other research has tied air pollution to a higher risk of heart attacks, stroke and other ills.
Combo may prevent injury in a fall
Exercise and vitamin D supplements may help prevent injurious falls in older adults, a randomized trial found.
Finnish researchers recruited 409 women ages 70 to 80 who were living at home. Neither vitamin D supplements nor exercise reduced the number of falls. But compared with the placebo without exercise group, those who took vitamin D alone were 16 percent less likely to be injured in a fall; the placebo and exercise group were 54 percent less likely to be injured; and those who exercised and took supplements were 62 percent less likely to be hurt.
The authors suggest that physical conditioning and vitamin D increase bone density, which could help prevent injury. | <urn:uuid:288ce34a-0445-4693-9418-5f9a8fd0b220> | CC-MAIN-2018-39 | http://www.startribune.com/health-briefs-many-young-kids-take-adhd-drugs/299291201/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156305.13/warc/CC-MAIN-20180919200547-20180919220547-00025.warc.gz | en | 0.962403 | 684 | 2.859375 | 3 |
WHEN WEATHER PERSISTS TO BE THE TALK!
“Siku hizi kumebadilika sana,” is a common Swahili phrase used by almost everyone to refer to the changes in weather patterns today. All this is Climate change which is a reality already here with us. The effects are felt all over the world. This happens in different ways in different places across the globe. It is actually so dynamic. As everyone is left wondering what will happen in years to come, life has to move on. There is great need for people both young and old to become aware of it, get the knowledge, change their attitudes and develop skills to actively participate in solving this environmental problem.
It is on this background that we chose climate change as our theme for the environmental education expeditions in Marafa and Bamba areas of Kilifi County. We managed to visit 16 primary schools and conducted one lesson in each with the members of the Wildlife clubs of Kenya. In the lessons, we handled the definitions of weather, climate and climate change. We explained the greenhouse effect and global warming concepts using simple examples for ease understanding. What has caused climate change? This is the question we answered next looking at both natural and human causes then the effects resulting from the change in climate. The big challenge is what can be done about climate change. For sure we can do something about it, even if it seems small because if we imagine everyone doing what they can, then together we can deal with this issue. This led us to a discussion of the various ways we can apply in solving this problem either to prevent , mitigate, adapt or reduce the effects.
As Christians in #conservation we believe that our work is a calling and that we have an added responsibility to the people that God brings our way. It is important to report on this specific incidence in one of the school in Marafa. We found a girl who was demon possessed crying loudly as we arrived in the school. We decided to take time to pray for her until she got back to normal, talked to her and then had the lesson. It is really satisfying to see what is taught in lessons put into practice. We were so glad to see tippy taps built in some of the schools as a result of the previous lessons on water conservation. In general all the lessons were highly interactive and enjoyable in all the schools. | <urn:uuid:4d982048-d093-41d2-a860-d1650e323955> | CC-MAIN-2019-22 | https://www.arocha.or.ke/news/when-weather-persists-to-be-the-talk/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256314.25/warc/CC-MAIN-20190521082340-20190521104340-00420.warc.gz | en | 0.975107 | 487 | 2.71875 | 3 |
Trashing trillions of calories
June 11, 2014
by Josh Sosland
WASHINGTON — Meat and dairy account for nearly half of the annual food loss each year in the United States as measured by value, according to data published recently by the Economic Research Service of the US Department Agriculture. While meat (together with poultry and fish) ranks first in value among food categories wasted, near the bottom (sixth) in poundage wasted, following dairy, vegetables, fruits, grains and sweeteners. Calories wasted each year in the United States have reached 15 figures.
Food waste and the complexities of, the magnitude of and the challenges associated with addressing the problem are explored in an article in the current issue of Amber Waves published by the Economic Research Service of the USDA.
“Food Loss — Questions About the Amount and Causes Still Remain” was published June 2. Authors include Jean C. Buzby, Hodan Farah Wells and Jaspreet Aulakh of the ERS. Buzby, who has been studying food consumption issues for many years, is chief of the Diet, Safety, and Health Economics branch in ERS’s Food Economics Division.
Per capita, 290 lbs. of food went uneaten in 2010 in the United States, equating to a value of $371. This waste equates to 789 calories per person per day.
“The estimate of 290 lbs. per capita at the consumer level in the United States in 2010 suggests that consumer level food loss in the United States is higher than in other parts of the world,” the authors said. “In general, food waste tends to be higher in developed countries — a 2011 study conducted for FAO found that per capita food waste by consumers in North America and Europe was 209-254 lbs. per year compared to 13-24 lbs. per year in Sub-Saharan Africa and South/Southeast Asia.”
The economists noted overall percentage of food that is wasted or goes uneaten has been estimated at one third by the FAO.
“In the United States, an estimated 31 percent of the food available for consumption at the retail and consumer levels went uneaten,” the ERS said.
While lower than the global average, the US figure does not include losses in several parts of the food chain.
“ERS defines food loss as the amount of food available for human consumption — after removing bones, pits, peels, and other nonedible parts — that is not consumed for any reason,” the economists said. “It includes moisture loss and cooking shrinkage; loss from mold, pests, or inadequate climate control; and food waste. Food waste is a subcomponent of food loss, and examples include edible food discarded by retailers due to color or appearance and plate waste thrown away by consumers. While ERS researchers have estimated the amount of food loss that occurs in US grocery stores, restaurants, and homes, the waste portion of this loss has not been calculated because of data limitations.”
The potential for spoilage and waste exists virtually at each link of the food chain, including field losses, problems during drying, milling, transporting, or processing that expose food to damage by insects, rodents, birds, molds, and bacteria. At retail, equipment malfunction (such as faulty cold storage), over-ordering, and culling of blemished produce can result in food loss.
“Consumers also contribute to food loss when they cook more than they need and choose to throw out the extras,” the economists said.
Losses occur at different parts of the “farm-to-fork food chain” when comparing what occurs in developed versus less-developed countries, the economists said.
In less developed countries, food loss mostly occurs closer to the farm and retail segments with relatively little wasted by the consumer.
“These countries tend to have relatively inadequate storage (particularly cold storage), transportation networks, and access to markets making it challenging to keep food edible and wholesome until it is consumed,” they said. “Access to loss-reducing technologies, such as sophisticated packaging films that allow fresh produce to breathe, and adoption of food management practices, such as computerized inventory tracking, are less common in developing countries.”
By contrast, in developed countries like the United States, a relatively larger share of food loss occurs at the consumer end of the spectrum.
“Food accounts for a relatively smaller share of household incomes, and consumers typically demand a wide variety of high-quality, cosmetically appealing, and convenient foods,” the economists said. “As a result, blemished, misshapen, or wrong-sized foods are often discarded to meet minimum quality standards. Also, oversized portions and the distaste for certain foods among abundant food choices may help contribute to greater plate waste. Additionally, consumers are often confused over “use-by” and “best before” dates, leading to the discard of edible food.”
The waste rate of 31 percent in the United States equates to an astonishing 141 trillion calories of food available in the US supply in 2010 but not consumed.
When measured by calories (versus value or pounds, the top three food groups in terms of shares of total calories uneaten are very different, with added fats and oils most wasted, added sugars and sweeteners second and grains third. The relative ranking reflects, in part, these foods’ caloric density per pound.
The researchers recognized both the value of reducing food loss and limitations on how much progress is possible because of issues such as spoilage of perishable items and the cost of recovery.
“Consumers’ tastes, preferences, and food habits also play a role, such as when people throw out milk leftover at the bottom of a bowl of cereal,” the economists said. “Economic factors, such as the costs to recover and redirect uneaten food to another use, may only provide limited incentives to reduce food loss. Food firms will adopt a loss-reducing practice if it is economically justifiable, that is, if the benefits outweigh the costs.”
Ways cited in the research in which waste may be reduced include the adoption of technological enhancements in food packaging, more efficient food inventory management in retail stores and restaurants, increased redistribution of food to food bank networks and consumer education campaigns to reduce food waste.
One government effort toward this end is the US Food Waste Challenge, launched a year ago by the Environmental Protection Agency and the USDA.
The program, targeted at US producer groups, processors, manufacturers, retailers, local municipalities, and other government agencies, seeks to reduce food loss and waste; recover wholesome food for human consumption; and recycle discards to other uses, including animal feed, composting, and energy generation.
“The goal of the challenge is to lead a fundamental shift in how Americans think about and manage food and food waste. Participants in the challenge include major food companies, smaller private firms, universities and colleges, sports teams, entertainment resorts, and other businesses,” the researchers said.
The Challenge program has a goal of 400 partners by 2015 and 1,000 by 2020.
Accurate measurement of food loss also is a challenge, the researchers said. The ERS is working to enhance its estimates of food loss and to revise how it generates its estimate of food loss for fresh fruit, vegetables, meat poultry and seafood. | <urn:uuid:33afe91b-1534-467c-ad2f-83f3983d1946> | CC-MAIN-2017-22 | http://www.meatpoultry.com/articles/news_home/Trends/2014/06/Trashing_trillions_of_calories.aspx?ID=%7B1D742179-6920-4D08-815D-20A2CAE8A341%7D&cck=1 | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463614615.14/warc/CC-MAIN-20170530070611-20170530090611-00031.warc.gz | en | 0.948018 | 1,539 | 2.75 | 3 |
- absolutely no background in robotics, electronics, or programming needed
- some assembly required
- use of eyes NOT required
- batteries not included
|My first robot, the Luna Moth Bot, on exhibit at the Pittsburgh Mini Maker Faire 2011. The microcontroller, motor control circuit, breadboard, and tank treads are housed under a repurposed SMILA BAGGE plastic lamp enclosure from IKEA that is about 12 by 9 inches. The photoresistor sensors (more on those later) are sized to fit perfectly into the winged bug’s eye sockets. Note that my nail polish matches the robot enclosure. The neon light green color is similar to that of a luna moth, the inspiration for the project. Photo credit: Larry Rippel|
Pfft... you think I could build a robot?
Getting started: a journey of a thousand miles begins with a single step
A fun place to begin outside of a school is in a makerspace, any one of the physical locations that comprise the “maker movement”. Makers (in this context) are folks who want to make the things around them better through modification and experimentation. A maker is the type of person who might build a robot or use a 3D printer, laser cutter, or even yarn to make an interesting item. A makerspace comes into existence when makers get together to create a community of collaboration, fun, and adventure. In a way, makers can be thought of as amateur hobbyist engineers, proving that you do not need a fancy degree to fulfill geeky aspirations. The community and resources of a makerspace should be available to anyone. In my experience in Pittsburgh and in traveling to other shops, I have always found them to be welcoming places. I was lucky enough to find some robotics experts to mentor me. Some people love to talk about their work and will tell you more than you ever wanted to know while others might direct you to someone else who could help you. You could really hit the jackpot and live in a town that has a makerspace specializing in robotics such as the Dallas Personal Robotics Group. Makerspaces can pool together at Maker Faires around the country to collaborate and show off new projects which the Blind Arduino group will be doing in 2016. Another nice thing about makerspaces is that if you do not have one in your town, you are free to start one yourself!
If you prefer a more solitary learning path, or there are no resources for a makerspace in your hometown, there are some books and online resources that are available to help you. I have found a few problems with these materials that I hope to help you, as a (very) new beginner, overcome. First, since technology changes at a seemingly ever more rapid pace, printed material of any kind can become outdated or obsolete. Second, some “beginner's” books are still too advanced for someone who is brand new to electronics or robotics. I certainly remember feeling my eyes gloss over while trying to read some of these things. I am writing this guide as a possible solution to these issues. I will be discussing hobby robotics in very broad terms so that as the specifics change, the general principles will hopefully still be helpful to you. I will also discuss how to select resources for further learning and experimentation on your own. I encourage you to supplement all of this instruction with free resources, including your local public library or websites like www.instructables.com which offer free step-by-step outlines of projects. There are plenty of self-education podcasts and videos that are helpful once you know what you don’t know.
Here are some rules about hobby robot building I learned from my mentor at the time, Ed Paradis. He doesn’t take credit for them, so I guess that means their origins are now steeped in lore and mystery.
1) Avoid building a robot you can’t outrun. (I always get a comical image in my head when I think about this one.)
2) Avoid building a robot heavier than you can lift.
3) Avoid building a robot that can’t fit in a car or out your main door.
I’m adding a few rules myself:
1) Don’t feel intimidated. It is unlikely that you will seriously injure yourself with a rover kit or unwittingly unleash a maniacal destruction bot upon the world. Everyone started somewhere and once knew nothing about robotics! With the creator’s permission, feel free to pick robots up and play with them to your heart’s content.
2) Do whatever makes you excited. Hobby robotics is all about having fun. Leave behind whatever doesn't make you happy.
3) Create a memorable robot. Give it a name or make it appeal to your senses. I personally like to make cute robots that evoke a smile instead of looking fearsome.
The Arduino (aka Braaaaaaaaaains)
The Sensors: sensitive kind of guys
Power! Muhahaha!!You will want some batteries to run your robot because a roving robot that is plugged into the wall might end up being no fun. The power requirements for your robot depend on things like your motor sizes, required running time before it dies, and the amount of cool things you want to hook up. Given all that variability, I wouldn’t be able to cover all cases in this guide so I will refer you to a kit, or to someone who will design your first robot for you. The main thing to know is that you should only use a battery of the specified size and type. This should be marked on the battery itself. Know that a fresh battery right out of the box or charger will cause different behavior than one that has been used a lot. If your robot is acting strangely, try swapping in new batteries. Also, if you are just using something like a few AA batteries, you don’t have to worry too much about electric shocks. Hobby robotics is not an extreme sport.
Motors and gears: he's going the distance, he's going for speedI once used the terms “engine” and “motor” interchangeably which left an inquisitive engineer aghast that there was an “engine” (thinking of an engine in a car) in a tiny vehicle (that most certainly did not run on gasoline!). I now know that there is actually some debate regarding the exact meaning of those two terms depending on historical context and other factors and that other people use them interchangeably, too. The fact of the matter is that if you want to get into robotics, you will encounter a confusing array of technical terms and you will definitely make some mistakes in using them along the way. Don’t let that deter you. While you may encounter that one person eager to put you down, my experience has shown that there will be far more people even more eager to help you along. In my case, the engine/motor confusion just led to a good laugh for all. I’m just going to call them motors for the rest of this guide. That’s how I refer to them in the context of hobby robotics in conversation now. I am clearly not an expert on motors, so I will tell you what I’ve learned about some very specific yet common motors, hobby DC motors, and how to avoid destroying them. The most basic thing to know is that when it comes to working with motors, it is important to know what the motor needs to run and what kind of result you should expect from running it. I know that I needed my Arduino to tell the motors when to run, and I’ll go into that more in the next section on motor controllers. I also needed those motors to turn my robot’s wheels. Specifically, I had model tank treads that just had a sprocket, or a wheel with teeth, that was responsible for turning the entire tread. I had a total of two motors, one for each sprocket/tread combination on either side of the robot. (I spent most of my life thinking that the term ‘sprocket’ was a made up term for the Jetsons and wasn’t a real thing. You never know what you’ll learn when you try new things!)
In the case of my robot, I had motors that had a metal shaft sticking out of one end with a little gear attached to it that would spin when the motor had electricity flowing through it. That small gear was connected to other gears in such a way that I could take advantage of what are called gear ratios. You can read more about gear ratios online and see lots of interesting physics discussions. I’ll summarize the basics. A gear ratio is determined by comparing the size or number of teeth of one gear to another. A smaller gear can make its rotation faster while a larger gear is capable of outputting more turning force, or torque. Torque has an interesting unit of measure because it is a combination of a force (or mass) unit and a distance unit. Something that took me a while to figure out is that torque isn’t just a force, or a distance between the center of a gear and its teeth, it is the combination of both of those things together. It is a little like velocity or speed. Velocity isn’t just the time it takes to travel a distance, and it isn’t just that distance that is traveled, it is both the time and the distance together in one measurement. I recommend that you start out working with gears that are selected for you and then experiment to see which sizes yield different results. This is another area where you can just keep going deeper and deeper with the details so start at the most general case and keep studying if you are interested. You can’t learn everything in robotics! That is an impossible task for one human. The specific problem that was solved by my gears was that I had a small motor that was capable of spinning that small gear really fast but was a weakling when it came to spinning around something heavy. The sprockets didn’t need to go as fast as the motor but they needed to turn with more torque than the motor alone could deliver. By putting gears between them and taking advantage of the increasing size of each gear compared to the rest of the gears in the gear train, the fast turning motor’s movement could be translated into the turning force I needed to turn the tank treads.
So you’ve got a motor, some gears, and some sweet wheels and you are ready to use them. Congratulations, you now have a toy car that will drive in one direction at one speed until you disconnect the power! If you want some control over your motor, you need something called a motor controller, oddly enough. Some people call them motor drivers or point out that they are just an example of a larger concept that is called a control system. If you buy one off the shelf, you would just hook it up to one of the pins of your Arduino on one end and your motors on the other according to its specifications. My first robot didn’t use an off the shelf motor controller and instead used a bunch of individual electronics parts put into what is called a breadboard, or electronics prototyping board. While this was a learning experience, I also nearly destroyed my whole robot because I accidentally hooked it up incorrectly the first time. I lucked out there, but if I didn’t, I could have just replaced some of the robot parts because they were pretty cheap. Use whichever motor controller is recommended to you or is a part of a kit you have purchased.
Motor Controllers: Control freaks
Chassis: bringing everything togetherThis section is about the exterior shell of your robot. You could say that it provides protection and structure for your robot, and I would agree, but I’d also consider it a place to stuff your somewhat ugly parts or hastily made assembly mistakes so that you don’t need to see them anymore. If you want a rover type robot, you would look for a chassis that can accept your wheels and has enough room to hold a microcontroller, some motors, some batteries, and some sensors. You may need to add some holes in which to situate sensors or to allow heat to escape so you might want to choose a somewhat easy to cut material. You can find many designs online that are inexpensive because they are composed of parts that come in a kit that you can assemble. These kinds of kits are commonly made out of wood or plastic and they were likely made using a tool called a laser cutter that can cut plastic and other materials on demand. A laser cutter allows for rapid prototyping and creation of a design. Really, though, you could put just about anything together as long as you think it looks cool. The chassis for my first robot was an old Ikea lamp I found at a thrift store. I took out the light bulb and cord and put in the electronics and wheels. There are even electronics that can be sewn into soft items like a stuffed animal but I’d be likely to recommend against that because it might just turn out to be creepy. Let’s delight, not traumatize, the children.
Time to build: the whole kit and caboodle
Special thanks to Meagan H. Houle for her copyediting services and to countless friends for playing with robots with me. | <urn:uuid:5c2c0c2f-0219-4094-b2d5-c055a0014e7a> | CC-MAIN-2017-51 | http://blarbl.blogspot.com/2016/05/a-very-new-beginners-guide-to-hobby.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948585297.58/warc/CC-MAIN-20171216065121-20171216091121-00322.warc.gz | en | 0.964341 | 2,767 | 2.65625 | 3 |
Humanity evolved from the heart of Nature. Day by day, season by season, generation after generation, human lives were linked inseparably to the cycles of the living world. Like the heartbeat of a great Mother, the rhythms and workings of the natural world imprinted themselves into every cell of our bodies. We knew our place within the whole and developed spiritual beliefs that honored our independence within the vast network of sibling species.
For eons, the idea that humanity could be separate from the rest of life was essentially incomprehensible. Only in the past few hundred years have our minds fully embraced these concepts that tear us from the embrace of our broader family. The new myth is hard. By keeping us from recognizing the Earth as our natural means of support, it engenders in us a feeling of abandonment.
How do you perceive the living world around you? How do you view nature? Take this quiz and find out:
As you consider each question, jot down your responses. Be brief. The point is not to have everything all polished and exact – it is to get you thinking.
1. How would you define Nature? What is your personal relationship with it?
2. What is humanity’s relationship to Nature?
3. What do you like most about the natural world? Which plants and animals are most important?
4. What do you not trust about the natural world? What aspects of it scare you? Which animals or plants would you consider “bad?”
After taking this quiz step back. Create some distance between yourself and the mainstream consciousness. Work with your beliefs. As you begin to see the world more clearly, you’ll have an opportunity to observe your own beliefs with greater objectivity. Feel your connections. The very best way to demonstrate the illusion of separation is to gain some first-hand experience of just how connected you really are. Then, when you hear messages that try to convince you that you’re isolated, they won’t have any power. You’ll already know the truth because you’ve felt it in your body. | <urn:uuid:c8a035e5-8f2c-442c-8023-5ff1663e99b9> | CC-MAIN-2015-22 | http://www.care2.com/greenliving/your-place-in-nature-quiz.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928780.77/warc/CC-MAIN-20150521113208-00156-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.957751 | 429 | 2.640625 | 3 |
Q2. Solve the problems given in Example 1.
From Example 1 we get:
Solving by factorization method:
Given the quadratic equation:
Hence, the roots of the given quadratic equation are .
Therefore, John and Jivanti have 36 and 9 marbles respectively in the beginning.
Therefore, the number of toys on that day was
Create Your Account | <urn:uuid:2f1792c1-06c9-490e-b685-ac4d7f985ae7> | CC-MAIN-2020-24 | https://learn.careers360.com/ncert/question-solve-the-problems-given-in-example-1x-square-minus-45x-plus-324/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348523564.99/warc/CC-MAIN-20200607044626-20200607074626-00580.warc.gz | en | 0.800154 | 84 | 3.515625 | 4 |
When caring for newborn budgies, it is important to let the parents do the job that nature has had them doing for generations. There are some things you can watch for and do to make sure your chicks are healthy and well-socialized, such as teach them good hygiene, cleanliness and socialization.
When baby budgies are born, they are blind and naked. When providing any care for them, make sure to keep their delicate eyes out of direct light and keep the nesting box they were born in insulated from the elements. There should be sufficient airflow for the newborn chicks and the adult birds, but they should not be subject to excess wind or moisture for the sake of their health. This is less of a concern when the chicks are developed around four weeks of age and they venture out of the nesting box of their own accord.
Hygiene and Cleanliness
Most momma budgies are good about keeping their young ones clean, but it is always a good idea to make sure your little chicks' feet and beaks are kept free of buildup and debris. The buildup of dirt on their feet can lead to infections and problems walking, while the buildup of food or grime in the beak area can lead to malformed beak and other health concerns. If you must handle the chicks before they are 2 weeks old, try to touch them as little as possible. This will help their mother stay bonded to them because they will smell like her, not human hands.
Socialization and Behavior
If you want your budgies to be pets, it is necessary to socialize them properly and get them used to human touch and interaction. This can begin as soon as the chicks are fully developed, but not before if you intend your budgies to stay in the nesting box with their parents. If the budgie does not recognize the chick because he smells like humans, she will reject the chick and will no longer care for him. Start off with 10 minutes a day per chick, increasing the time once a week by a few minutes as each chick allows.
One of the most important stages of a baby budgie's life is when the adult budgies leave the nesting box and stop feeding the little ones. In a healthy, well-developed budgie this will mean leaving the box in search of food. If for some reason one of your chicks does not, you can remove him from the box and encourage him to join the rest of his siblings in exploring the world. At this point the budgie should continue to grow and mature until he is an adult without much human interference.
- Budgies: A Guide to Caring for Your Parakeet (Complete Care Made Easy; Angela Davids
- The Essential Parakeet; BS Siino, R Stockdate
Hemera Technologies/PhotoObjects.net/Getty Images
Based in Lexington, Ky., Christina Root has worked as a blogger, writer and freelance consultant since 2009. As a mother, animal lover, natural alternative medicine enthusiast and a student of all things, she loves learning and sharing with others. | <urn:uuid:c9f2433f-c3c0-498a-b95f-d5915f812f8f> | CC-MAIN-2021-17 | https://animals.mom.com/care-baby-budgies-9246.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039379601.74/warc/CC-MAIN-20210420060507-20210420090507-00479.warc.gz | en | 0.963744 | 630 | 2.96875 | 3 |
The character of soil
Shelter for plants and animals, guardian of groundwater, or repository of human history? If soil had to give a character profile of ecological excellence for a job interview, it would be accepted straight away for any environmental job. Soil provides ecological functions too important to be overlooked. The only competitors applying for the same job would be other soils. The natural configuration of soil includes a unique set of soil properties and soil functions. Therefore, only another soil could score better or worse – and eventually get the job.
Easily measurable properties that determine the natural configuration of a soil are soil depth, texture, pore space, content of organic matter and clay minerals, capacity for nutrient exchange, and pH value (acidity or alkalinity) . The extent to which a soil exhibits these properties determines the ability of soil to provide certain capabilities, or soil functions.
A deep, gravel-rich soil, for example, does not contain enough fine earth (sand, silt and clay) to store large amounts of water in its soil profile. The ecological capability of a gravelly soil, therefore, will be suitable for grape growing, whereas it might be average for sunflower cropping and rather unsuitable for vegetable harvesting . Different crops require different optimal moisture conditions, all of which are defined by the functional ability of soil.
The range of functions
Soil offers a wide range of functions, such as:
- Biomass production – source of our food, forage, and fibre
- Storing, filtering and transforming nutrients and water
- Hosting life, and thereby contributing to biodiversity
- A platform for human activities
- A source or raw materials
- An archive of natural history and human heritage.
Most soils are able to provide a range of different functions. Some functions might be more dominant than others that compete with each other or are inactive. Also, the competence of soil to deliver specific functions to its environment is subject to change in both space and time.
The use of soil for a job in ecological excellence is nowadays judged by humans. Soil functions need to match particular human needs to be considered valuable. Maps locate soils of different functions, which allows an assessment to be made. This process, in part, disregards soil’s overall capability to service the life of the total environment – not just humankind.
After Mosimann (2010). Landschaftsstruktur. Physische Geographie und Landschaftsoekologie A.1. Geosynthesis Skripten. Hannover
Scheffer & Schachtschabel (2010). Lehrbuch der Bodenkunde. 16th edition. | <urn:uuid:83b18b3a-7bfb-4323-9d0e-256427bf23c4> | CC-MAIN-2021-17 | https://soils.landcareresearch.co.nz/understanding-soils/why-bother-about-soils/soil-ecosystem-services/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038862159.64/warc/CC-MAIN-20210418224306-20210419014306-00569.warc.gz | en | 0.888543 | 549 | 3.390625 | 3 |
Overturning of a Forklift
NIOSH In-house FACE Report 83-10
The National Institute for Occupational Safety and Health (NIOSH), Division of Safety Research (DSR), is currently conducting The Fatal Accident Circumstances and Epidemiology (FACE) Study. By scientifically collecting data from a sample of similar fatal incidents, this study will identify and rank factors which increase the risk of fatal injury for selected employees.
On the morning of July 19, 1983 a mechanic was fatally injured while load testing a forklift truck. The truck overturned with the raised mast striking the employee. The employee was pronounced dead at the scene.
Back to Top
After notifying the employer and arranging a site visit, two DSR staff members, an epidemiologist and a safety engineer interviewed the employers, inspected and photographed the workplace (site of the mishap) and equipment involved, and obtained comparison interview data from co-workers. This visit occurred on August 4, 1983.
Synopsis of Events
This company services, modifies, and refurbishes industrial materials handling equipment. It employs 20 people, who were primarily trained as mechanics, specializing in industrial truck servicing and modification for specific purposes required by their customers.
The forklift involved in the incident was being modified to handle large rolls of paper. However, testing procedures had not been performed on this equipment. The victim apparently took the vehicle to perform the load test while the supervisor had gone off the premises to pick up parts. The supervisor was unaware of the victim's intentions. The company's normal Standard Operating Procedure (SOP) was to test forklifts on a hard surface leaning the mast up against a permanent structure, while the supervisor was present. None of these procedures were followed in this case. To the best of their knowledge, the two owners did not know of any other similar incident in the past, during which an employee deviated so radically from the SOP. There was some discussion of the victim's state of mind; e.g., the effects of his recent divorce.
Site inspection revealed the following details: The forklift was carrying a paper roll, approximately 72 inches in diameter and 71 inches long, and weighing 5430 lbs. on a machine that was rated to carry 5500 lbs. with the mast vertically raised to its highest point. The driver had parked the forklift with the rear wheels on the asphalt pavement and the front wheels on the berm. He raised the load up over the canopy of another forklift and tilted the mast forward to test the truck's counter weight stability. This caused his truck to tilt forward and rotate counter-clockwise about the front wheel axles. He lowered the load onto the canopy of the other truck. However, as his truck continued to rotate, he jumped off and crouched down among some equipment about 12 ft from the forklift. The mast fell in the victim's direction, fatally injuring him.
Back to Top
General Conclusions and Recommendations
The occurrence of this occupational fatality represents the combination of the violation of several precautions for forklift operation and the misfortune of the victim being in the wrong place when he sought safety. First, the load of paper on the forklift nearly equaled the load rated capacity of 5500 lbs. of the lifting device. Second, the operator did not follow usual SOP for testing the forklift, such as leaning the vehicle against a solid structure or tying it down in the rear by chains or ropes. Third, the forklift was driven off a hard surface onto a softer surface (berm) where the front of the vehicle could lean forward further compounding the tilt angle and thus increasing the load. Fourth, the mast of the forklift was raised to its highest point and then lowered onto the unstable support of another vehicle. And, fifth, given the relatively long period of time (several seconds at least) during which the forklift started to fall, the victim had sufficient time to seek a safe distance, but, unfortunately, he moved with the direction of the fall. From discussions with the owners, the victim had had sufficient experience and training to be aware of the safe and correct SOP for testing forklifts. Thus the employee's decision to proceed with a test outside of the SOP is open to conjecture.
According to an in-depth study of incidents associated with materials handling equipment (Coleman et al, 1978), tipping of sit-down forklifts is ranked fifth among forklift accident types, among which are:
- struck by material from forklift
- caught between forklift and stationary object
- struck by moving part of forklift
- pedestrian accidents
Also, incidents involving forklifts accounted for over 1% of worker compensation claims in Wisconsin. Thus, forklifts are a major source of injury, and forklift tipping is a common occurrence. It is recommended that when forklifts are tested, special attention be paid to the instability of forklifts that result from near capacity load in combination with uneven surfaces.
The owners of the company were very cooperative in providing sufficient opportunity for obtaining information about the procedures and sequence of events associated with this incident.
- Coleman, PJ, Gottlieb, MS, Kaplan, MC, Knutson, SJ, McPeek, JS, Human factors analysis of materials handling equipment., report to NIOSH, Madison, Wisconsin, 1978.
- Page last reviewed: November 18, 2015
- Page last updated: October 15, 2014
- Content source:
- National Institute for Occupational Safety and Health Division of Safety Research | <urn:uuid:2ee4ccfb-b2e5-4748-b42a-748cf09183f3> | CC-MAIN-2016-26 | http://www.cdc.gov/niosh/face/In-house/full8310.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00086-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.963565 | 1,133 | 2.546875 | 3 |
Juggling Genius Claude Shannon Launched the Digital Age
Claude Shannon turned the world on its head by developing Information Theory, which blazed a trail toward digital communication.
Claude Shannon has been described as the "intellectual giant of the digital age." By the time of his death on Feb. 24, 2001, Shannon had collected a pile of prestigious prizes that proved it the National Medal of Science, Japan's Kyoto Prize, the IEEE Medal of Honor among them. But, none of those awards quite measured up to the honor he received in October 1998, when AT&T Labs named its two-building, 387,000-square-foot complex in Florham Park, N.J., the Shannon Laboratory.
Perhaps that building's sign should have read "Shnon Lab," because as the Father of Information Theory, Shannon paved the path for digital communications by introducing ingenious concepts for efficiently packaging and transmitting data.
Birth of the theory
Considered the Magna Carta of communication, Shannon's Information Theory first appeared more than 50 years ago in his 1948 Bell System Technical Journal paper "The Mathematical Theory of Communication."
Information Theory describes an ideal communications system in which all information sources -- people speaking, computer keyboards, video cameras -- have a "source rate" measured in bits per second. The channel through which the source's data travels has a "capacity," also measured in bits per second. Information can be transmitted only if the source rate does not exceed the channel's maximum capacity, now known as the Shannon limit.
To approach the Shannon limit, communications engineers encode data, compress it to remove redundancy, and transmit only information essential to understanding. By posting the sign "Shnon Lab," for example, we would eliminate predictable, redundant symbols and send only those symbols that contain unpredictable news -- what Shannon called "information."
It sounds simple, but the complex mathematical formulas embedded in Information Theory have guided the discoveries of two generations of communications engineers. "Information Theory stimulated all kinds of intellectual energy," says AT&T Fellow Neil Sloane, whose research on the mathematical framework of communications is rooted in Information Theory. "Without Shannon's theory, we wouldn't have all the digital devices we depend on today -- wireless phones, fax machines, compact disks or the Internet." Shannon's ideas have even been applied in such diverse fields as psychology, linguistics, economics and biology.
Shannon does the math at Bell Labs, 1955.
"Because Information Theory was such a profound development, history will remember Shannon as one of the great thinkers in the field of electrical engineering," says AT&T Fellow Larry Greenstein, who relied on Shannon's theories in researching point-to-point radio and wireless communication channels. "He broke the mold in the field of communications and did something unlike anything that came before -- not just an extension or improvement."
The cycling scholar
Just as unique as the theory was the theorist himself. Born in 1916, Michigan native Shannon arrived at AT&T in 1941 after producing what's been called the century's most important master's thesis and earning a Ph.D. at the Massachusetts Institute of Technology. His work on anti-aircraft and digital-encryption systems during World War II planted the seeds for Information Theory. Shannon reasoned that the same types of digital codes that protect sensitive information could be used to safeguard it from noise, static or interference
While pondering such deep thoughts, Shannon often pedaled a unicycle through the halls of Bell Labs. In the early 1950s, his intellectual journey veered toward the relationship between people and machines, and he helped found the field of artificial intelligence. Among the first applications he devised in this area was Theseus, a mechanical mouse that solved mazes in search of a brass "cheese." During this period, Shannon also published one of the earliest proposals for a chess-playing computer.
By "teaching" an electrical mouse to find its way through a maze, Shannon helped stimulate Bell Labs researchers to think of new ways to use the logical powers of computers for operations other than numerical calculation.
After leaving AT&T in 1956, Shannon joined the faculty at MIT. He formally retired in 1978 and pursued his longtime passions gadgets and juggling. In fact, one of his favorite creations was a juggling gadget a robot in the likeness of comedian W.C. Fields.
"I've always pursued my interests without much regard to financial value or value to the world. I've spent lots of time on totally useless things," Shannon said in 1983, perhaps referring to such gizmos as a gasoline-powered pogo stick, a rocket-powered Frisbee, and THROBAC (THrify ROman numerical BAckward-looking Computer), a computer that calculates in Roman numerals.
"He had a wonderful sense of humor and was a great builder of gadgets," Sloane says. "His house was filled with toys, including one device that displayed all the gowns he wore to receive his dozen or more honorary doctorates. He hung them on a circular clothes line, and when he'd flip a switch, the gowns marched around and around."
The man who caused so much excitement died quietly at age 84. But in one of his last papers, Shannon continued pointing the way toward communications' far horizons: "Our government might consider ... listening for evidence of intelligent life on other star systems. Who knows, perhaps E.T. would have words of wisdom for all of us." | <urn:uuid:fc3004df-296e-428f-aee8-6c52b5eb7545> | CC-MAIN-2015-11 | http://www.corp.att.com/attlabs/reputation/timeline/16shannon.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463340.29/warc/CC-MAIN-20150226074103-00268-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.957155 | 1,111 | 2.96875 | 3 |
Prominent Russians: The Lykovs
The Lykovs are a family of Old Believers who lived as hermits in the deep taiga of the Sayan Mountains in Southern Siberia from the 1930s up until they were accidentally discovered in 1978 by geologists exploring the Bolshoy Abakan River. They were unfamiliar with any civilization and the story resonated greatly in the Soviet press at the time.
The Lykov family spent about 50 years in a remote region of the Sayan taiga. The reason for their seclusion is rooted as far as three hundred years back in history, when after a schism in the Russian Orthodox Church, the Old Believers, who were against church reforms, went northward. The Lykov’s ancestors settled in the taiga, reportedly pushed out of civilization by the tragic events of the years of total collectivization, particularly by the burning of their farms.
In the 1930s they lived with their fellow believers on a farm in the taiga, but later infighting caused them to split from the community. Their whereabouts were not a secret at the time, however, as their house could be found on local maps. But in 1945, a patrol appeared looking for deserters and scared them off. The Lykovs departed hastily and hid in the mountains for the next 30 years.
Without any contact with the outside world, the family lived in accordance with the laws of their faith. They supported their bodies with berries, healthy food and hard work, and their spirits with prayers. Every member of the family was obliged to work. They used the materials at hand to build root cellars to keep food in, started fires with flints, grew their own vegetables and sewed their own clothes from the fabric they also made themselves.
They lived off farming, fishing and hunting. They salted the fish and extracted fish oil. As far as hunting is concerned, their faith only allowed them to hunt hoofed game, as animals with claws were believed to embody the devil. The Lykov brothers hunted elk using pits three meters long, wide and deep. These animals constituted the bulk of the Lykov’s protein food. Even more interesting was the way they hunted deer: the two brothers simply chased the animal to exhaustion and when it fell down, they finished it off with a knife.
At first, the Lykov family had six members: the father Karp Iosifovich, the mother Akulina, their sons Dmitry and Savin and daughters Natalya and Agafya. They hid deeper and deeper in the taiga in an effort to escape contact with potentially hostile people. It wasn’t until 1978 that a group of geologists stumbled upon the family’s little house in the thick of the forest. It turned out the Lykovs never considered their living conditions “extreme.” For them, it was a normal, albeit difficult, life.
In 1982, a series of newspaper articles put the Lykov’s secluded abode on the map for the whole world to see. People were moved by the story of forest hermits coming to know civilization.
Doctors found no health irregularities in the family members, but contact with people turned out to be lethal for them. Three years after they were discovered, three Lykovs died during just two fall months. Karp Iosifovich’s elder children, having been born and having spent all of their lives in the taiga conditions didn’t have the immunity that protects modern day people from infective diseases. And the arrival of infections at their remote farm was just a matter of time, with all the people making the trip to visit the reclusive family. Savin, Dmitry and Natalya died one after another.
That fall, all the members of the family fell ill. Karp Iosipovich weathered the illness the best, probably because he lived among people for many years and had acquired the necessary immunity. Agafya fell ill too, but was young and healthy enough to overcome the disease. Karp Osipovich died after a subsequent visit by geologists. He probably also infected Agafya, but the doctor who was brought from a nearby village made her drink a medicine.
Agafya, although left alone, keeps living the life she is accustomed to, surviving off agriculture and fishing. She greets every day with a prayer and goes to sleep with one. However, her everyday life is exhausting. She is surrounded by wolves in winter and bears in summer. Agafya has refused to move to civilization or receive a pension, spending her time on household chores and prayers. Local authorities take care of the hermit bringing her firewood, foodstuffs and chickens and organizing volunteer trips to help her run the house and garden.
Written by Aleksandr Bondarenko, RT | <urn:uuid:ce0b83bd-290a-426f-ac36-b3d79fa51df9> | CC-MAIN-2017-13 | http://russiapedia.rt.com/prominent-russians/entertainment/the-lykovs/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189534.68/warc/CC-MAIN-20170322212949-00595-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.984162 | 995 | 2.78125 | 3 |
selfish adj : concerned chiefly or only with yourself; "Selfish men were...trying to make capital for themselves out of the sacred cause of civil rights"- Maria Weston Chapman [ant: unselfish]
- Holding one’s self-interest as the standard for decision making.
- Regard for oneself above others’ well-being.
holding one's self-interest as the standard for decision making
regard for oneself above others' well-being
- ttbc Arabic:
- ttbc Chinese: 自私 (zìsī)
- ttbc Czech: sobecký
- ttbc Dutch: zelfzuchtig, egoïstisch
- ttbc French: égoïste
- ttbc German: selbstsüchtig, egoistisch
- ttbc Greek: ατομιστής (atomistís) , εγωιστής (eɣoistís) , ιδιοτελής (iðiotelís) , φίλαυτος (fílaftos)
- ttbc Italian: egoistico
- ttbc Korean: 이기적 (igijeok)
Selfishness denotes the precedence given in thought or deed to the self, i.e., self interest or self concern. It is the act of placing one's own needs or desires above the needs or desires of others. Selfishness is the opposite of altruism.
The implications of selfishness have inspired divergent views within religious, philosophical, psychological, economic and evolutionary contexts.
- Twilight of the Idols, Friedrich Nietzsche Penguin Classics; Reissue edition (February 15, 1990), ISBN 0140445145
- The Evolution of Cooperation, Robert Axelrod, Basic Books, ISBN 0-465-02121-2
- The Selfish Gene, Richard Dawkins (1990), second edition -- includes two chapters about the evolution of cooperation, ISBN 0-19-286092-5
- The Virtue of Selfishness, Ayn Rand, ISBN 0451163931
selfish in Hebrew: אנוכיות
selfish in Portuguese: Egoísmo
selfish in Serbian: Себичност
acquisitive, ambitious for self, autistic, avaricious, careerist, covetous, egocentric, egocentristic, egoistic, egoistical, egomaniacal, egotistic, egotistical, grasping, greedy, grudging, illiberal, inconsiderate, individualistic, mean, mercenary, miserly, narcissan, narcissine, narcissistic, narcistic, narrow, niggardly, parsimonious, penny-pinching, penurious, personalistic, possessive, privatistic, remote, self-absorbed, self-admiring, self-advancing, self-aggrandizing, self-besot, self-centered, self-concerned, self-considerative, self-contained, self-devoted, self-esteeming, self-indulgent, self-interested, self-jealous, self-loving, self-occupied, self-pleasing, self-seeking, self-serving, self-sufficient, stingy, thoughtless, tight, tight-fisted, uncharitable, ungenerous | <urn:uuid:e090e767-e5d2-4572-9568-e48baae11174> | CC-MAIN-2018-30 | https://selfish.askdefine.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591831.57/warc/CC-MAIN-20180720193850-20180720213850-00276.warc.gz | en | 0.746001 | 753 | 2.78125 | 3 |
sigaction - examine and change signal action
#include <signal.h> int sigaction(int sig, const struct sigaction *act, struct sigaction *oact);
The sigaction() function allows the calling process to examine and/or specify the action to be associated with a specific signal. The argument sig specifies the signal; acceptable values are defined in <signal.h>.
The structure sigaction, used to describe an action to be taken, is defined in the header <signal.h> to include at least the following members:
Member Type Member Name Description void(*) (int) sa_handler SIG_DFL, SIG_IGN or pointer to a function. sigset_t sa_mask Additional set of signals to be blocked during execution of signal-catching function. int sa_flags Special flags to affect behaviour of signal. void(*) (int, siginfo_t *, void *) sa_sigaction Signal-catching function.
If the argument act is not a null pointer, it points to a structure specifying the action to be associated with the specified signal. If the argument oact is not a null pointer, the action previously associated with the signal is stored in the location pointed to by the argument oact. If the argument act is a null pointer, signal handling is unchanged; thus, the call can be used to enquire about the current handling of a given signal. The sa_handler field of the sigaction structure identifies the action to be associated with the specified signal. If the sa_handler field specifies a signal-catching function, the sa_mask field identifies a set of signals that will be added to the process' signal mask before the signal-catching function is invoked. The SIGKILL and SIGSTOP signals will not be added to the signal mask using this mechanism; this restriction will be enforced by the system without causing an error to be indicated.
If the SA_SIGINFO flag (see below) is cleared in the sa_flags field of the sigaction structure, the sa_handler field identifies the action to be associated with the specified signal. If the SA_SIGINFO flag is set in the sa_flags field, the sa_sigaction field specifies a signal-catching function. If the SA_SIGINFO bit is cleared and the sa_handler field specifies a signal-catching function, or if the SA_SIGINFO bit is set, the sa_mask field identifies a set of signals that will be added to the signal mask of the thread before the signal-catching function is invoked.
The sa_flags field can be used to modify the behaviour of the specified signal.
The following flags, defined in the header <signal.h>, can be set in sa_flags:
- Do not generate SIGCHLD when children stop.
- If set and an alternate signal stack has been declared with sigaltstack() or sigstack(), the signal will be delivered to the calling process on that stack. Otherwise, the signal will be delivered on the current stack.
- If set, the disposition of the signal will be reset to SIG_DFL and the SA_SIGINFO flag will be cleared on entry to the signal handler.
Otherwise, the disposition of the signal will not be modified on entry to the signal handler.
- SIGILL and SIGTRAP cannot be automatically reset when delivered; the system silently enforces this restriction.
In addition, if this flag is set, sigaction() behaves as if the SA_NODEFER flag were also set.
- This flag affects the behaviour of interruptible functions; that is, those specified to fail with errno set to [EINTR]. If set, and a function specified as interruptible is interrupted by this signal, the function will restart and will not fail with [EINTR] unless otherwise specified. If the flag is not set, interruptible functions interrupted by this signal will fail with errno set to [EINTR].
- If cleared and the signal is caught, the signal-catching function will be entered as:where signo is the only argument to the signal catching function. In this case the sa_handler member must be used to describe the signal catching function and the application must not modify the sa_sigaction member.
void func(int signo);
If SA_SIGINFO is set and the signal is caught, the signal-catching function will be entered as:where two additional arguments are passed to the signal catching function. The second argument will point to an object of type siginfo_t explaining the reason why the signal was generated; the third argument can be cast to a pointer to an object of type ucontext_t to refer to the receiving process' context that was interrupted when the signal was delivered. In this case the sa_sigaction member must be used to describe the signal catching function and the application must not modify the sa_handler member.
void func(int signo, siginfo_t *info, void *context);
The si_signo member contains the system-generated signal number.
The si_errno member may contain implementation-dependent additional error information; if non-zero, it contains an error number identifying the condition that caused the signal to be generated.
The si_code member contains a code identifying the cause of the signal. If the value of si_code is less than or equal to 0, then the signal was generated by a process and si_pid and si_uid respectively indicate the process ID and the real user ID of the sender. The <signal.h> header description contains information about the signal specific contents of the elements of the siginfo_t type.
- If set, and sig equals SIGCHLD, child processes of the calling processes will not be transformed into zombie processes when they terminate. If the calling process subsequently waits for its children, and the process has no unwaited for children that were transformed into zombie processes, it will block until all of its children terminate, and wait(), wait3(), waitid() and waitpid() will fail and set errno to [ECHILD]. Otherwise, terminating child processes will be transformed into zombie processes, unless SIGCHLD is set to SIG_IGN.
- If set and sig is caught, sig will not be added to the process' signal mask on entry to the signal handler unless it is included in sa_mask. Otherwise, sig will always be added to the process' signal mask on entry to the signal handler.
If sig is SIGCHLD and the SA_NOCLDSTOP flag is not set in sa_flags, and the implementation supports the SIGCHLD signal, then a SIGCHLD signal will be generated for the calling process whenever any of its child processes stop. If sig is SIGCHLD and the SA_NOCLDSTOP flag is set in sa_flags, then the implementation will not generate a SIGCHLD signal in this way.
When a signal is caught by a signal-catching function installed by sigaction(), a new signal mask is calculated and installed for the duration of the signal-catching function (or until a call to either sigprocmask() or sigsuspend() is made). This mask is formed by taking the union of the current signal mask and the value of the sa_mask for the signal being delivered unless SA_NODEFER or SA_RESETHAND is set, and then including the signal being delivered. If and when the user's signal handler returns normally, the original signal mask is restored.
Once an action is installed for a specific signal, it remains installed until another action is explicitly requested (by another call to sigaction()), until the SA_RESETHAND flag causes resetting of the handler, or until one of the exec functions is called.
If the previous action for sig had been established by signal(), the values of the fields returned in the structure pointed to by oact are unspecified, and in particular oact->sa_handler is not necessarily the same value passed to signal(). However, if a pointer to the same structure or a copy thereof is passed to a subsequent call to sigaction() via the act argument, handling of the signal will be as if the original call to signal() were repeated.
If sigaction() fails, no new signal handler is installed.
It is unspecified whether an attempt to set the action for a signal that cannot be caught or ignored to SIG_DFL is ignored or causes an error to be returned with errno set to [EINVAL].
If SA_SIGINFO is not set in sa_flags, then the disposition of subsequent occurrences of sig when it is already pending is implementation-dependent; the signal-catching function will be invoked with a single argument. If the implementation supports the Realtime Signals Extension option, and if SA_SIGINFO is set in sa_flags, then subsequent occurrences of sig generated by sigqueue() or as a result of any signal-generating function that supports the specification of an application-defined value (when sig is already pending) will be queued in FIFO order until delivered or accepted; the signal-catching function will be invoked with three arguments. The application specified value is passed to the signal-catching function as the si_value member of the siginfo_t structure.
Signal Generation and Delivery
A signal is said to be generated for (or sent to) a process or thread when the event that causes the signal first occurs. Examples of such events include detection of hardware faults, timer expiration, signals generated via the sigevent structure and terminal activity, as well as invocations of kill() and sigqueue() functions. In some circumstances, the same event generates signals for multiple processes.
At the time of generation, a determination is made whether the signal has been generated for the process or for a specific thread within the process. Signals which are generated by some action attributable to a particular thread, such as a hardware fault, are generated for the thread that caused the signal to be generated. Signals that are generated in association with a process ID or process group ID or an asynchronous event such as terminal activity are generated for the process.
Each process has an action to be taken in response to each signal defined by the system (see
Signal Actions). A signal is said to be delivered to a process when the appropriate action for the process and signal is taken. A signal is said to be accepted by a process when the signal is selected and returned by one of the sigwait() functions.
During the time between the generation of a signal and its delivery or acceptance, the signal is said to be pending. Ordinarily, this interval cannot be detected by an application. However, a signal can be blocked from delivery to a thread If the action associated with a blocked signal is anything other than to ignore the signal, and if that signal is generated for the thread the signal will remain pending until it is unblocked, it is accepted when it is selected and returned by a call to the sigwait() function, or the action associated with it is set to ignore the signal. Signals generated for the process will be delivered to exactly one of those threads within the process which is in a call to a sigwait() function selecting that signal or has not blocked delivery of the signal. If there are no threads in a call to a sigwait() function selecting that signal, and if all threads within the process block delivery of the signal, the signal will remain pending on the process until a thread calls a sigwait() function selecting that signal, a thread unblocks delivery of the signal, or the action associated with the signal is set to ignore the signal. If the action associated with a blocked signal is to ignore the signal and if that signal is generated for the process, it is unspecified whether the signal is discarded immediately upon generation or remains pending.
Each thread has a signal mask that defines the set of signals currently blocked from delivery to it. The signal mask for a thread is initialised from that of its parent or creating thread, or from the corresponding thread in the parent process if the thread was created as the result of a call to fork(). The sigaction(), sigprocmask() and sigsuspend() functions control the manipulation of the signal mask.
The determination of which action is taken in response to a signal is made at the time the signal is delivered, allowing for any changes since the time of generation. This determination is independent of the means by which the signal was originally generated. If a subsequent occurrence of a pending signal is generated, it is implementation-dependent as to whether the signal is delivered or accepted more than once in circumstances other than those in which queueing is required under the Realtime Signals Extension option. The order in which multiple, simultaneously pending signals outside the range SIGRTMIN to SIGRTMAX are delivered to or accepted by a process is unspecified.
When any stop signal (SIGSTOP, SIGTSTP, SIGTTIN, SIGTTOU) is generated for a process, any pending SIGCONT signals for that process will be discarded. Conversely, when SIGCONT is generated for a process, all pending stop signals for that process will be discarded. When SIGCONT is generated for a process that is stopped, the process will be continued, even if the SIGCONT signal is blocked or ignored. If SIGCONT is blocked and not ignored, it will remain pending until it is either unblocked or a stop signal is generated for the process.
An implementation will document any condition not specified by this document under which the implementation generates signals.
Some signal-generating functions, such as high-resolution timer expiration, asynchronous I/O completion, interprocess message arrival, and the sigqueue() function, support the specification of an application-defined value, either explicitly as a parameter to the function or in a sigevent structure parameter. The sigevent structure is defined in <signal.h> and contains at least the following members:
Member Type Member Name Description int sigev_notify Notification type int sigev_signo Signal number union sigval sigev_value Signal value void(*)(unsigned sigval) sigev_notify_function Notification function (pthread_attr_t*) sigev_notify_attributes Notification attributes
The sigev_notify member specifies the notification mechanism to use when an asynchronous event occurs. This document defines the following values for the sigev_notify member:
- No asynchronous notification will be delivered when the event of interest occurs.
- The signal specified in sigev_signo will be generated for the process when the event of interest occurs. If the implementation supports the Realtime Signals Extension option and if the SA_SIGINFO flag is set for that signal number, then the signal will be queued to the process and the value specified in sigev_value will be the si_value component of the generated signal. If SA_SIGINFO is not set for that signal number, it is unspecified whether the signal is queued and what value, if any, is sent.
- A notification function will be called to perform notification.
An implementation may define additional notification mechanisms.
The sigev_signo member specifies the signal to be generated. The sigev_value member is the application-defined value to be passed to the signal-catching function at the time of the signal delivery or to be returned at signal acceptance as the si_value member of the siginfo_t structure.
The sigval union is defined in <signal.h> and contains at least the following members:
Member Type Member Name Description int sival_int Integer signal value void* sival_ptr Pointer signal value
The sival_int member is used when the application-defined value is of type int; the sival_ptr member is used when the application-defined value is a pointer.
If the Realtime Signals Extension option is supported:
- When a signal is generated by the sigqueue() function or any signal-generating function that supports the specification of an application-defined value, the signal will be marked pending and, if the SA_SIGINFO flag is set for that signal, the signal will be queued to the process along with the application-specified signal value. Multiple occurrences of signals so generated are queued in FIFO order. It is unspecified whether signals so generated are queued when the SA_SIGINFO flag is not set for that signal.
Signals generated by the kill() function or other events that cause signals to occur, such as detection of hardware faults, alarm() timer expiration, or terminal activity, and for which the implementation does not support queuing, have no effect on signals already queued for the same signal number.
- When multiple unblocked signals, all in the range SIGRTMIN to SIGRTMAX, are pending, the behaviour will be as if the implementation delivers the pending unblocked signal with the lowest signal number within that range. No other ordering of signal delivery is specified.
If, when a pending signal is delivered, there are additional signals queued to that signal number, the signal remains pending. Otherwise, the pending indication is reset.
Multi-threaded programs can use an alternate event notification mechanism:
- When a notification is processed, and the sigev_notify member of the sigevent structure has the value SIGEV_THREAD, the function sigev_notify_function is called with parameter sigev_value.
The function will be executed in an environment as if it were the start_routine for a newly created thread with thread attributes specified by sigev_notify_attributes. If sigev_notify_attributes is NULL, the behaviour will as if the thread were created with the detachstate attribute set to PTHREAD_CREATE_DETACHED. Supplying an attributes structure with a detachstate attribute of PTHREAD_CREATE_JOINABLE results in undefined behaviour. The signal mask of this thread is implementation-dependent.
There are three types of action that can be associated with a signal: SIG_DFL, SIG_IGN or a pointer to a function. Initially, all signals will be set to SIG_DFL or SIG_IGN prior to entry of the main() routine (see the exec functions). The actions prescribed by these values are as follows:
- SIG_DFL - signal-specific default action
- The default actions for the signals defined in this specification are specified under <signal.h>. If the Realtime Signals Extension option is supported, the default actions for the realtime signals in the range SIGRTMIN to SIGRTMAX are to terminate the process abnormally.
- If the default action is to stop the process, the execution of that process is temporarily suspended. When a process stops, a SIGCHLD signal will be generated for its parent process, unless the parent process has set the SA_NOCLDSTOP flag. While a process is stopped, any additional signals that are sent to the process will not be delivered until the process is continued, except SIGKILL which always terminates the receiving process. A process that is a member of an orphaned process group will not be allowed to stop in response to the SIGTSTP, SIGTTIN or SIGTTOU signals. In cases where delivery of one of these signals would stop such a process, the signal will be discarded.
- Setting a signal action to SIG_DFL for a signal that is pending, and whose default action is to ignore the signal (for example, SIGCHLD), will cause the pending signal to be discarded, whether or not it is blocked. If the Realtime Signals Extension option is supported, any queued values pending will be discarded and the resources used to queue them will be released and made available to queue other signals.
- SIG_IGN - ignore signal
- Delivery of the signal will have no effect on the process. The behaviour of a process is undefined after it ignores a SIGFPE, SIGILL, SIGSEGV or SIGBUS signal that was not generated by kill(), sigqueue() or raise().
- The system will not allow the action for the signals SIGKILL or SIGSTOP to be set to SIG_IGN.
- Setting a signal action to SIG_IGN for a signal that is pending will cause the pending signal to be discarded, whether or not it is blocked.
- If a process sets the action for the SIGCHLD signal to SIG_IGN, the behaviour is unspecified, except as specified below. If the action for the SIGCHLD signal is set to SIG_IGN, child processes of the calling processes will not be transformed into zombie processes when they terminate. If the calling process subsequently waits for its children, and the process has no unwaited for children that were transformed into zombie processes, it will block until all of its children terminate, and wait(), wait3(), waitid() and waitpid() will fail and set errno to [ECHILD]. If the Realtime Signals Extension option is supported, any queued values pending will be discarded and the resources used to queue them will be released and made available to queue other signals.
- pointer to a function - catch signal
- On delivery of the signal, the receiving process is to execute the signal-catching function at the specified address. After returning from the signal-catching function, the receiving process will resume execution at the point at which it was interrupted. If the SA_SIGINFO flag for the signal is cleared, the signal-catching function will be entered as a C language function call as follows:If the SA_SIGINFO flag for the signal is set, the signal-catching function will be entered as a C language function call as follows:
void func(int signo);where func is the specified signal-catching function, signo is the signal number of the signal being delivered, and info is a pointer to a siginfo_t structure defined in <signal.h> containing at least the following member(s):
void func(int signo, siginfo_t *info, void *context);
The si_signo member contains the signal number. This is the same as the signo parameter. The si_code member contains a code identifying the cause of the signal. The following values are defined for si_code:
Member Type Member Name Description int si_signo Signal number int si_code Cause of the signal union sigval si_value Signal value
- The signal was sent by the kill() function. The implementation may set si_code to SI_USER if the signal was sent by the raise() or abort() functions or any similar functions provided as implementation extensions.
- The signal was sent by the sigqueue() function.
- The signal was generated by the expiration of a timer set by timer_settime().
- The signal was generated by the completion of an asynchronous I/O request.
- The signal was generated by the arrival of a message on an empty message queue.
If the signal was not generated by one of the functions or events listed above, the si_code will be set to an implementation-dependent value that is not equal to any of the values defined above.
If the Realtime Signals Extension is supported, and si_code is one of SI_QUEUE, SI_TIMER, SI_ASYNCIO, or SI_MESGQ, then si_value contains the application-specified signal value. Otherwise, the contents of si_value are undefined.
- The behaviour of a process is undefined after it returns normally from a signal-catching function for a SIGBUS, SIGFPE, SIGILL or SIGSEGV signal that was not generated by kill(), sigqueue() or raise().
- The system will not allow a process to catch the signals SIGKILL and SIGSTOP.
- If a process establishes a signal-catching function for the SIGCHLD signal while it has a terminated child process for which it has not waited, it is unspecified whether a SIGCHLD signal is generated to indicate that child process.
- When signal-catching functions are invoked asynchronously with process execution, the behaviour of some of the functions defined by this document is unspecified if they are called from a signal-catching function.
The following table defines a set of interfaces that are either reentrant or not interruptible by signals and are async-signal safe. Therefore applications may invoke them, without restriction, from signal-catching functions:
_exit() access() alarm() cfgetispeed() cfgetospeed() cfsetispeed() cfsetospeed() chdir() chmod() chown() close() creat() dup() dup2() execle() execve() fcntl() fork() fpathconf() fstat() fsync() getegid() geteuid() getgid() getgroups() getpgrp() getpid() getppid() getuid() kill() link() lseek() mkdir() mkfifo() open() pathconf() pause() pipe() raise() read() rename() rmdir() setgid() setpgid() setsid() setuid() sigaction() sigaddset() sigdelset() sigemptyset() sigfillset () sigismember() signal() sigpending() sigprocmask() sigsuspend() sleep() stat() sysconf() tcdrain() tcflow() tcflush() tcgetattr() tcgetpgrp() tcsendbreak() tcsetattr() tcsetpgrp() time() times() umask() uname() unlink() utime() wait() waitpid() write()
aio_error() clock_gettime() sigpause() timer_getoverrun() aio_return() fdatasync() sigqueue() timer_gettime() aio_suspend() sem_post() sigset() timer_settime()
All functions not in the above table are considered to be unsafe with respect to signals. In the presence of signals, all functions defined by this specification will behave as defined when called from or interrupted by a signal-catching function, with a single exception: when a signal interrupts an unsafe function and the signal-catching function calls an unsafe function, the behaviour is undefined.
When a signal is delivered to a thread, if the action of that signal specifies termination, stop, or continue, the entire process will be terminated, stopped, or continued, respectively.
Signal Effects on Other FunctionsSignals affect the behaviour of certain functions defined by this specification if delivered to a process while it is executing such a function. If the action of the signal is to terminate the process, the process will be terminated and the function will not return. If the action of the signal is to stop the process, the process will stop until continued or terminated. Generation of a SIGCONT signal for the process causes the process to be continued, and the original function will continue at the point the process was stopped. If the action of the signal is to invoke a signal-catching function, the signal-catching function will be invoked; in this case the original function is said to be interrupted by the signal. If the signal-catching function executes a return statement, the behaviour of the interrupted function will be as described individually for that function. Signals that are ignored will not affect the behaviour of any function; signals that are blocked will not affect the behaviour of any function until they are unblocked and then delivered, except as specified for the sigpending() and the sigwait() functions.
The result of the use of sigaction() and a sigwait() function concurrently within a process on the same signal is unspecified.
Upon successful completion, sigaction() returns 0. Otherwise -1 is returned, errno is set to indicate the error and no new signal-catching function will be installed.
The sigaction() function will fail if:
- The sig argument is not a valid signal number or an attempt is made to catch a signal that cannot be caught or ignore a signal that cannot be ignored.
The sigaction() function may fail if:
- An attempt was made to set the action to SIG_DFL for a signal that cannot be caught or ignored (or both).
The sigaction() function supersedes the signal() interface, and should be used in preference. In particular, sigaction() and signal() should not be used in the same process to control the same signal. The behaviour of reentrant interfaces, as defined in the description, is as specified by this specification, regardless of invocation from a signal-catching function. This is the only intended meaning of the statement that reentrant interfaces may be used in signal-catching functions without restrictions. Applications must still consider all effects of such functions on such things as data structures, files and process state. In particular, application writers need to consider the restrictions on interactions when interrupting sleep() and interactions among multiple handles for a file description. The fact that any specific interface is listed as reentrant does not necessarily mean that invocation of that interface from a signal-catching function is recommended.
In order to prevent errors arising from interrupting non-reentrant function calls, applications should protect calls to these functions either by blocking the appropriate signals or through the use of some programmatic semaphore (see semget(), sem_init(), sem_open(), and so on). Note in particular that even the "safe" functions may modify errno; the signal-catching function, if not executing as an independent thread, may want to save and restore its value. Naturally, the same principles apply to the reentrancy of application routines and asynchronous data access. Note that longjmp() and siglongjmp() are not in the list of reentrant interfaces. This is because the code executing after longjmp() and siglongjmp() can call any unsafe functions with the same danger as calling those unsafe functions directly from the signal handler. Applications that use longjmp() and siglongjmp() from within signal handlers require rigorous protection in order to be portable. Many of the other functions that are excluded from the list are traditionally implemented using either malloc() or free() functions or the standard I/O library, both of which traditionally use data structures in a non-reentrant manner. Because any combination of different functions using a common data structure can cause reentrancy problems, this document does not define the behaviour when any unsafe function is called in a signal handler that interrupts an unsafe function.
If the signal occurs other than as the result of calling abort(), kill() or raise(), the behaviour is undefined if the signal handler calls any function in the standard library other than one of the functions listed in the table above or refers to any object with static storage duration other than by assigning a value to a static storage duration variable of type volatile sig_atomic_t. Furthermore, if such a call fails, the value of errno is indeterminate.
Usually, the signal is executed on the stack that was in effect before the signal was delivered. An alternate stack may be specified to receive a subset of the signals being caught.
When the signal handler returns, the receiving process will resume execution at the point it was interrupted unless the signal handler makes other arrangements. If longjmp() or _longjmp() is used to leave the signal handler, then the signal mask must be explicitly restored by the process.
The ISO POSIX-1 standard defines the third argument of a signal handling function when SA_SIGINFO is set as a void * instead of a ucontext_t *, but without requiring type checking. New applications should explicitly cast the third argument of the signal handling function to ucontext_t *.
The BSD optional four argument signal handling function is not supported by this specification. The BSD declaration would be:
void handler(int sig, int code, struct sigcontext *scp, char *addr);
where sig is the signal number, code is additional information on certain signals, scp is a pointer to the sigcontext structure, and addr is additional address information. Much the same information is available in the objects pointed to by the second argument of the signal handler specified when SA_SIGINFO is set.
The fpathconf() function is marked as an extension in the list of safe functions because it is not included in the corresponding list in the ISO POSIX-1 standard, but it is expected to be added in a future revision of that standard.
bsd_signal(), kill(), _longjmp(), longjmp(), raise(), semget(), sem_init(), sem_open(), sigaddset(), sigaltstack(), sigdelset(), sigemptyset(), sigfillset(), sigismember(), signal(), sigprocmask(), sigsuspend(), wait(), wait3(), waitid(), waitpid(), <signal.h>, <ucontext.h>.
Derived from the POSIX.1-1988 standard. | <urn:uuid:5cdaf367-ce03-4ced-8e0e-1fd1e0bad17b> | CC-MAIN-2023-14 | https://pubs.opengroup.org/onlinepubs/7990989775/xsh/sigaction.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945433.92/warc/CC-MAIN-20230326044821-20230326074821-00693.warc.gz | en | 0.87386 | 7,022 | 3.03125 | 3 |
In June 2013, Edward Snowden revealed the National Security Agency’s ongoing data collection of Americans by means of mass surveillance to the U.S. Data was being collected and analyzed from daily telephone records and a program called Prism that tracks online communication through a server invasion of internet firms such as Facebook and Google.
Snowden has been charged with several offences including theft of government property and unauthorized leakage of government espionage practices, which led Snowden to flee America to avoid arrest.
American Film Director Oliver Stone’s film Snowden was released in theatres on Sept. 16, 2016. Following the media attention, an internet campaign started to collect signatures to urge President Obama to pardon Snowden’s past actions before Obama leaves the White House in 2017.
So, should Snowden be pardoned?
On May 2, 2016 Snowden posted a Twitter message stating the following question:
“Should the government have lawful power to unlock any device?”
One way that Americans define freedom is by having a right to having privacy. The Fourth Amendment of the American constitution grants us freedom from search and seizure without proof of a warrant that specifies a probable cause for the search. However, there is no mention of the term privacy in the Bill of Rights, so the right to privacy is an implied one, and investigators would need a government issued warrant with probable cause to search you and your belongings.
Without probable cause, for example, take a look at the case study of Weeks v. United States, 1914. In this case, evidence collected against the defendant was excluded because the warrant was illegal, therefore, any unlawfully obtained evidence cannot be used in the court system to make a case.
The courts should embrace a modern interpretation of the Fourth Amendment, including protection of private data on phone and internet networks. There is no probable cause to search through anyone’s device anyway, let alone collect data.
In reply to Snowden’s tweet, I do not think government agencies should have access to unlock my iPhone.
There are principles adopted by agencies that support ethics in human conduct. Scientists trained to conduct psychology experiments must protect private information they collect from participants taking part in the study. Often, this includes information collected digitally. The Institutional Review Board governs research ethics with human subjects. Their goal includes protection of patient privacy. One of the established codes of ethical conduct included in their policy is the Belmont Report from the Office of Human Research Protections.
The Belmont Report includes three core principle guidelines for conducting ethical research. One is respect for people, which encourages participant autonomy. Subjects should be able to make a decision about what their goals are and carry out their decisions, excluding a decision about harming others.
According to the Report, individual freedom rests in the capability to make choices. This includes having enough information to make these choices, so researchers should not withhold pertinent information that could cause harm to the subject. Use of deception can occur as part of a study, but the subject has to be informed about the reason behind deception after the study is over. This is called a debriefing session. Additionally, the IRB will only approve those studies if the committee deems the use of deception as an integral aspect of the research being conducted.
The Report’s ethical guidelines help ensure that people are not taken advantage of. In my opinion, the Bill of Rights should adopt similar ethical guidelines to respect an Americans’ decision of whether or not they want their personal data monitored and collected by government agencies.
It is important to remember, however, that the government can make up lies about anyone, regardless of the information they collect. American journalist Barton Gellman’s tweet, written on Sept. 15, 2016, sums up that the House Permanent Select Committee on Intelligence Committee has reviewed Snowden’s history of disclosing government information about the NSA spying on Americans. The HPSCI released a report on Snowden that is less than accurate. The HPSCI lied about Snowden’s education and other bits of information over the two year investigation into Snowden’s political affairs.
“Well, I think I may have to write something up. The HPSCI report on Snowden is aggressively dishonest.”
Should President Obama pardon Snowden?
Yes. I believe he should be given a chance to come back to America with a pardon. Snowden’s actions, at the very least, should provoke reform at the NSA for stronger encryption of internet- and web-based sources of private information andour nation should provide better training to enhance digital security. Also, the Fourth Amendment should adopt ethical guidelines regarding collection of data from digital sources from American citizens. | <urn:uuid:c8d7e03e-0b8f-4853-935e-d5c425c443ba> | CC-MAIN-2022-33 | https://sbpress.com/2016/09/snowden-scandal-pardon/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00477.warc.gz | en | 0.945623 | 952 | 2.84375 | 3 |
River blindness: reducing the prevalence of clinical disease
It may be time to widen the focus of onchocerciasis programmes to include the prevention and treatment of clinical disease of the eyes and skin.
The once well-known – and disturbing – image of a person with river blindness (onchocerciasis) is now thankfully much less common, thanks to successful ivermectin distribution programmes that have reduced the prevalence of Onchocerca volvulus infection over the past 30 years.1
However, as we celebrate this remarkable success, we must not forget those people who are still affected by clinical onchocerciasis (onchocercal eye and skin disease). There is a general perception that onchocerciasis is now much less of a public health problem than in past decades, and that new cases of onchocercal disease are few. This assumption needs to be backed up by solid research, especially in countries that are highly endemic and/or where the distribution of ivermectin has not been regularly achieved due to violent conflict. These countries include South Sudan and the Democratic Republic of Congo.
Surveys of onchocercal eye disease, which were common some 30 years ago, are rarely conducted these days.2 A major factor for this is the current focus on elimination of transmission rather than prevention of disease.3
Unlike the global lymphatic filariasis programme, the global onchocerciasis programme has not had a strong individual patient care component in recent years. This is understandable, in part, because ivermectin is also used to reduce the clinical symptoms and signs of onchocercal disease. In addition, the expertise (ophthalmology and dermatology) needed for clinical assessment has not been readily available to national onchocerciasis programmes. Approaches to the care of those with onchocerciasis are listed in Table 1.
However, perhaps the most important unknown is the lack of reliable figures as to how many people are suffering from onchocercal eye and skin disease. This information is needed to provide treatment and care for those affected by both existing and new disease.
Knowing the true reduction in eye and skin disease will allow us to accurately document the success that has been achieved and identify remaining any gaps that need attention. It should also encourage further support for those who have irreversibly lost vision or suffer from the severe forms of onchocercal skin disease.
As neglected tropical diseases gain ever more prominence in the context of Universal Health Care, we need to celebrate the successes in reducing the devastating effects of all diseases including onchocerciasis. Clinical onchocerciasis results in significant disability for the affected individual, which also impacts families and communities. We must actively look for remaining cases – both old and new – as is done with other disability- and stigma-inducing diseases such as lymphatic filariasis and leprosy. We should remember that the Global Program for Onchocerciasis Control was begun because there were patients that needed treatment and support. The ongoing challenge now is finding out how many people are still suffering from clinical onchocerciasis and its consequences – and what is being done to help them.
Table 1 Approaches to providing care for people with onchocerciasis
|A||Community drug distribution (PCT)||Whole endemic community||Will eventually reduce/eliminate incidence of new disease|
|B||Individual patient treatment/ management||Those presenting with specific onchocercal symptoms||Includes ivermectin as well as specialised care for eyes and skin|
|C||Rehabilitation and care||Those permanently blind and their families||Includes links to associations for the blind, self-care groups, etc.|
1 Cupp EW, Mackenzie CD, Unnasch T. The importance of ivermectin to human onchocerciasis: past, present, and the future. Research and Reports in Tropical Medicine. 2011, 2: 81-92.
2 Samuel A, Belay T, et al. Impact of Six Years Community Directed Treatment with Ivermectin in the Control of Onchocerciasis, Western Ethiopia. 2016 PLOS One.
3 World Health Organization 2018. River blindness: shifting from prevention to surveillance and elimination.
© The author/s and Community Eye Health Journal 2018. This is an Open Access article distributed under the Creative Commons Attribution Non-Commercial License. | <urn:uuid:ced9bd17-103b-4262-8ad9-12ce4faf731e> | CC-MAIN-2022-27 | https://www.w.cehjournal.org/article/river-blindness-reducing-the-prevalence-of-clinical-disease/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036099.6/warc/CC-MAIN-20220625190306-20220625220306-00346.warc.gz | en | 0.937148 | 949 | 3.28125 | 3 |
By backing in, the open car door prevents kids from running into the street/parking lot because it directs them to the curb, assuming that a curb is immediately behind the space. Parents leaving the parking space can see other drivers and kids who might be in the street or infront of the vehicle. However, if there is a lot of "park and walk" pick-up and drop-off activity that takes place at the school, there is a possible safety hazard associated with drivers backing into spaces because of the potential difficulty seeing kids that are getting into and out of cars in neighboring parking spaces. For normal on-street parking applications, back-in parking is far better, but for the shared space like a school parking lot, the advantages aren't as clear. If the spaces in question were a single row of back in parking at a school parking lot with a sidewalk behind (where there is a more clear advantage to forcing kids to the back of the vehicle), the advantage of back-in parking is more apparent, but at a larger lot with multiple bays or rows of parking, the advantages may not be greater than vehicles backing out of a typical perpendicular space into the drive aisle in a traditional lot. One city that uses back-in angle parking routinely throughout the city, including schools is Seattle, WA. | <urn:uuid:5b2f4445-2381-47ed-bb76-863208f3a1f1> | CC-MAIN-2016-36 | http://www.saferoutesinfo.org/program-tools/what-are-advantages-and-disadvantages-using-back-head-out-angled-parking-elementary-sc | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292659.26/warc/CC-MAIN-20160823195812-00238-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.97109 | 265 | 2.734375 | 3 |
Any musician worth his salt has to have the ability to listen. When you are practicing at home or up on stage, it is essential to have the ability to feel the intricacies of your device and nuances of your playing. When playing together a group of musicians rely upon their ears; members play off of each other’s tools to provide energy and soul to the operation. There are ways to avoid this every musician should understand what a hearing test can show after years of misuse and their ears work although loud noises will cause damage to your ears. Your ear includes many tiny sensors deep in the ear canal. These hairs respond to any noise that transforms the sound and enters them your brain can comprehend. They are also delicate since these hairs are so accurate. These hairs die; causing permanent damage and can sew when exposed to loud noises. A hearing test can determine how much damage was done using the system.
A decibel is a unit of measurement used to assess sound’s quantity. Decibel levels that are higher have greater risks of doing harm but there is. Trouble starts occurring around the mark that is 100dB. Decibel ratings that are lower will not cause harm but within a period of a couple hours your ears can begin to suffer. Greater decibel levels 110dB – 120dB may lead to damage after only a couple of minutes and anything over 120dB can cause irreversible damage almost instantly. Considering that clock in 120dB, this is a cause of concern for many musicians. You can think about a hearing evaluation to assess the damage if you have been enjoying for years with no ear protection. Now that you understand that you are in danger, there are options to prevent damage. Foam earplugs and earmuffs are the products but are part of the reason that ear protection turns off artists.
Ear plugs that are Inexpensive muffle frequencies that musicians rely on which make their use undesirable. Recently earplugs made for musicians that decrease have been developed by producers. These are more helpful to a musician. For those create a long term investment in their ears which should be everybody really fitted ear buds are getting increasingly more popular. The ear bud produces a Best Bluetooth Auxiliary Adapters on your ears audiologists create a mould of your ear. These kinds of buds provide protection and the quality. Your tech ought to be able to recommend a fitted ear bud if you opt to have a hearing test. Some of them offer systems for monitoring which channels the mixture from the system that is audio in your ear for a suitable volume. If you think you have experienced some loss, a hearing evaluation damage was done and how to prevent damage. | <urn:uuid:73aaad01-314a-4027-91e3-f76ac9758c9a> | CC-MAIN-2021-04 | https://tirelitigation.com/2020/about-test-drive-bluetooth-protective-adapter-ear-buds/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703529128.47/warc/CC-MAIN-20210122051338-20210122081338-00322.warc.gz | en | 0.969304 | 531 | 2.671875 | 3 |
Violence, Incivility, & Bullying
While nursing is a profession dedicated to helping others, the highly charged nature of many of the environments in which nurses work can lead to situations where emotions boil over.
Incivility, bullying, and violence in the workplace are serious issues in nursing, with incivility and bullying widespread in all settings. Incivility is “one or more rude, discourteous, or disrespectful actions that may or may not have a negative intent behind them”. ANA defines bullying as “repeated, unwanted, harmful actions intended to humiliate, offend, and cause distress in the recipient.”
Such acts of aggression – be they verbal or physical – are entirely unacceptable, whether delivered by patients or colleagues. These incidents not only have a serious effect on the wellbeing of the nurse in question but also their ability to care for their patients.
ANA seeks to protect nurses from all types of workplace conflict through various methods including advocacy, policy, and resources. We want nurses, employers, and the public to jointly create and nurture a healthy, safe, and respectful work environment in which positive health outcomes are the highest priority.
Types of violence
According to The National Institute of Occupational Safety and Health (NIOSH), there are four types of violence that nurses might face in their work environment:
- Criminal Intent. The perpetrator has no relationship with the victim, and the violence is carried out in conjunction with a crime.
- Customer/client. The most common health care environment-based assault, the perpetrator is a member of the public with whom the nurse is interacting during the course of their regular duties.
- Worker-on-worker. Commonly perceived as bullying, in these instances the perpetrator and victim work together – though not necessarily in the same role or at the same level.
- Personal relationship. In these incidents, the victim has been targeted as a result of an existing exterior relationship with the perpetrator, with the violence taking place in the workplace.
It is important to remember that none of the scenarios above are restricted to physical violence – verbal and psychological abuse can be just as damaging to both the nurse and their ability to care for patients. All such abuse comes within the scope of ANA’s anti-workplace violence agenda.
How ANA is taking action on workplace violence
Currently, there is no specific federal statute that requires workplace violence protections, but several states have enacted legislation or regulations aimed at protecting health care workers from its effects. We support these moves by individual states, and are actively advocating further, more stringent regulation.
In 2015, we convened a Professional Issues Panel on Incivility, Bullying, and Workplace Violence to develop a new ANA position statement. You can read the full position statement here, and below are some key points:
- The nursing profession will not tolerate violence of any kind from any source;
- Nurses and employers must collaborate to create a culture of respect;
- The adoption of evidence-based strategies that prevent and mitigate incivility, bullying, and workplace violence; and promote health, safety, and wellness and optimal outcomes in health care;
- The strategies employed are listed and categorized by primary, secondary, and tertiary prevention;
- The statement is relevant for all health care professionals and stakeholders, not exclusively to nurses.
In 2019 the #EndNurseAbuse Professional Issues Panel developed policy on barriers to reporting workplace violence. You can read the full Issue Brief here.
How you can make a difference
Tackling workplace violence will take a united effort. To that end, we have collated a series of promotional and educational resources that can help you and your colleagues reduce incidents in your workplace, and help create safe health care environments by advocating for change. Take the pledge to #EndNurseAbuse https://p2a.co/DQPJlDH
Related ANA Position statements
- Bullying in the Workplace: Reversing a Culture
This book will enable nurses to understand and deal with bullying and its perpetrators and to counter the culture of bullying in their work environments.
- Not Part of the Job: How to Take a Stand Against Violence in the Work Setting
This book outlines the factors that create barriers to reduce violence against health care workers; and offers strategies and tools that can address them.
Below are some additional anti-bullying resources created by other health care organizations that you might find useful:
You are now leaving the American Nurses Foundation
The American Nurses Foundation is a separate charitable organization under Section 501(c)(3) of the Internal Revenue Code. The Foundation does not engage in political campaign activities or communications.
The Foundation expressly disclaims any political views or communications published on or accessible from this website.Continue Cancel | <urn:uuid:c48703d2-80c5-4dda-a2e8-0f6f50270b53> | CC-MAIN-2020-34 | https://www.nursingworld.org/practice-policy/work-environment/violence-incivility-bullying/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738595.30/warc/CC-MAIN-20200809222112-20200810012112-00077.warc.gz | en | 0.950835 | 981 | 3.0625 | 3 |
Sun, 11 Nov 2012 12:00 UTC
Sun, 11 Nov 2012 12:00 UTC
Crucially, if it's to survive the wear and tear it's put through every day, it needs to be able to repair itself. Now, researchers in California may have designed a synthetic version - a flexible, electrically conductive, self-healing polymer.
The result is part of a decadelong miniboom in "epidermal electronics" - the production of circuits thin and flexible enough to be attached to skin (for use as wearable heart rate monitors, for example) or to provide skinlike touch sensitivity to prosthetic limbs.
The problem is that silicon, the base material of the electronics industry, is brittle. So various research groups have investigated different ways to produce flexible electronic sensors.
Chemists, meanwhile, have become increasingly interested in "self-healing" polymers. This sounds like science fiction, but several research groups have produced plastics that can join their cut edges together when scientists heat them, shine a light on them, or even just hold the cut edges together.
In 2008, researchers at ESPCI ParisTech showed that a specially designed rubber compound could recover its mechanical properties after being broken and healed repeatedly.
Chemical engineer Zhenan Bao of Stanford University in Palo Alto, California, and her team combined these two concepts and explored the potential of self-healing polymers in epidermal electronics. However, all the self-healing polymers demonstrated to date had had very low bulk electrical conductivities and would have been little use in electrical sensors.
Writing in Nature Nanotechnology, the researchers detail how they increased the conductivity of a self-healing polymer by incorporating nickel atoms, allowing electrons to "jump" between the metal atoms. The polymer is sensitive to applied forces like pressure and torsion (twisting) because such forces alter the distance between the nickel atoms, affecting the difficulty the electrons have jumping from one to the other and changing the electrical resistance of the polymer.
To demonstrate that both the mechanical and the electrical properties of the material could be repeatedly restored to their original values after the material had been damaged and healed, the researchers cut the polymer completely through with a scalpel. After pressing the cut edges together gently for 15 seconds, the researchers found the sample went on to regain 98% of its original conductivity. And crucially, just like the ESPCI group's rubber compound, the Stanford team's polymer could be cut and healed over and over again.
"I think it's kind of a breakthrough," says John J. Boland, a chemist at the CRANN nanoscience institute at Trinity College Dublin. "It's the first time that we've seen this combination of both mechanical and electrical self-healing." He is, however, skeptical about one point: "With a scalpel you can very precisely cut the material without inducing significant local mechanical deformation around the wound." Failure due to mechanical tension, however, could stretch the material, producing significant scarring and preventing complete self-healing, he suspects.
Now, Bao and her fellow researchers are working to make the polymer more like human skin. "I think it will be very interesting if we can make the self-healing skin elastic," she says, "because, while it's currently flexible, it's still not stretchable. That's definitely something we're moving towards for our next-generation self-healing skin."
( No Comments ) | <urn:uuid:44e81360-e839-4c9e-9477-24af54bf607c> | CC-MAIN-2016-36 | https://www.sott.net/article/253493-Self-healing-plastic-skin-points-way-to-new-prosthetics | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982291592.14/warc/CC-MAIN-20160823195811-00219-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.956519 | 713 | 3.640625 | 4 |
Psychology in Slovenia
Slovenia joins the European Union this month, and its psychologists are keen to develop their subject and structures in line with the rest of Europe. Here, Velko S. Rus and Vid Pecjak outline the history and current state of Slovenian psychology.
Slovenia was the first region to break away from the former Yugoslavia, publicly declaring its independence in 1991. After 10 days of aggression by the Yugoslav army on Slovenia, its independence was recognised. It is a country of barely two million people, sharing borders with Austria, Croatia, Italy and Hungary. In 2003 the country voted overwhelmingly in favour of joining the European Union, and psychologists have been prominent among those helping Slovenia to define its own role and identity within the enlarged EU.
BPS Members can discuss this article
Already a member? Or Create an account
Not a member? Find out about becoming a member or subscriber | <urn:uuid:3db5c5d6-f799-49a9-a12b-1b7405273d55> | CC-MAIN-2018-51 | http://thepsychologist.bps.org.uk/volume-17/edition-5/psychology-slovenia | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828056.99/warc/CC-MAIN-20181217020710-20181217042710-00564.warc.gz | en | 0.961035 | 186 | 2.640625 | 3 |
As the number of children diagnosed with ADHD is rising, pediatricians do their best to find the reasons which make kids hyperactive. Most researchers name heredity as the main reason why the disorder emerge. Numerous studies confirmed that children diagnosed with ADHD almost always have a close relative with the same disorder. Currently, researchers try to find genes responsible for ADHD. They anticipate that children with the disorder have some segments of their DNA missing or duplicated.
Despite such a solid evidence that genetic factors cause ADHD, cultural environment also matters. Today children see their parents constantly rushing and get used to fast tempo of their life at home. Probably, living in a fussy environment makes it hard for children to concentrate in цthe classroom. Scientists claim that in the period of intense development, some brain cells constantly connect with the other brain cells while there are yet another cells which appear pushed back and uninvolved. This process determines the brain activity in the prefrontal cortex and affects human ability to concentrate. Which is more, TV and video games contribute to developing ADHD. Researchers made such a conclusion after they studied kids in Amish families which forbid such traditional everyday activity.
Other environmental factors which contribute to ADHD are exposure to certain chemicals such as pesticides, lead, food additives. Women’s lifestyle during the pregnancy is also crucial to the child’s mental health. Being exposed to alcohol and nicotine at the prenatal stage, a fetus may acquire certain mutations in genetic material. Therefore, in case if ADHD is diagnosed, many more factors than just poor genetics are to blame. | <urn:uuid:0028fe20-a1db-4808-bd34-654fe61dcb68> | CC-MAIN-2018-47 | https://buypapercheap.net/blog/understanding-the-roles-of-biology-and-environment-in-hyperactive-children.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743353.54/warc/CC-MAIN-20181117102757-20181117124757-00066.warc.gz | en | 0.957744 | 314 | 3.3125 | 3 |
It is never too early to start reading with your baby; she will associate the security and pleasure of your lap with reading and will want to learn to read when she is older.
- Read with your baby every day.
- Try board books. Board books are books with hard pages your baby can throw, bite, and hit.
- You don’t need to read the words at all. Just point to the pictures and talk about them.
- Have him flip the pages. Let him play with the book.
- Comment as you read. Connect what you read to what's happening in her life.
- Keep their board books in the same place as toys.
- Let your child see you reading for yourself and enjoying it.
- Come to the library often! Find new books and come to storytime. | <urn:uuid:b21597fb-a646-464e-a5d3-2908d5f36788> | CC-MAIN-2014-15 | http://oaklandlibrary.org/blogs/childrens-services/read-your-baby | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609536300.49/warc/CC-MAIN-20140416005216-00250-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.972459 | 171 | 2.890625 | 3 |
USB is everywhere. It’s how you charge your mobile phone, download photos from your camera, and now, how you connect to your Campbell Scientific dataloggers and other hardware. Most of the time you don’t have to think about it at all; it just works. Today I’m going to give you a few things to check if you ever bump into the dark side of USB.
Connect the computer end of the cable directly to your computer, not through a hub. Always connect to the same USB port on the computer.
Physical ports on the computer often run through an internal hub. Disabling power savings on this device can avoid some problems. In your computer’s Device Manager, right-click on the USB Root Hub in the list of Universal Serial Bus controllers. Then select Properties and the Power Management Tab. If checked, uncheck the option to “Allow the computer to turn off this device to save power.”
Use a cable without any choke points or lumps.
With a new datalogger or other piece of hardware, click Install USB Driver and follow the wizard before connecting it to your computer.
If all else fails, uninstall the driver and reinstall it from the latest version of the Device Configuration Utility. To uninstall a driver you will need to right-click on the device in the Ports list shown in your computer’s Device Manager.
USB is here to stay. I have a good feeling about this. | <urn:uuid:e3cdacdd-b7d9-41a8-a39e-a74faa9cc206> | CC-MAIN-2020-16 | https://www.campbellsci.co.uk/news-tip-awaken-usb-force | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506673.7/warc/CC-MAIN-20200402045741-20200402075741-00035.warc.gz | en | 0.877002 | 303 | 2.671875 | 3 |
Choice plants from California and Australia
Three local nurseries helped Kus create an eclectic but stunningly beautiful mix of mostly drought-resistant plants. She worked with Planet Earth Growers in Fresno, which specializes in California and Australian natives, Intermountain Nursery in Prather, which specializes in native California plants, and Mountain Valley Growers in Squaw Valley, supplier of herbs. Kus kept plants that need more water, such as Japanese anemone and iris, closer to the house for an oasis effect.
More than 600 different species and varieties of plants now grow in this garden. Among the showiest are acacia, grevillea, melaleuca, olive tree, rosemary, and California natives such as ceanothus, manzanita, Matilija poppy, redbud, toyon, and four species of oak. There are native wildflowers, which reseed each year, a multitude of flowering perennials (including a diverse selection of salvias), and roses, ornamental grasses, and fruit trees.
To manage the little water available, Kus has an elaborate drip-irrigation system that includes more than 1,000 emitters and microsprinklers, operated by 21 valves and 2 automatic controllers. Among the many features of these state-of-the-art controllers is one that allows watering times to be easily adjusted to weather or water supply.
As automated as the irrigation system is, it still needs regular maintenance to deliver water efficiently. Cleaning emitters and repairing damage caused by rabbits and coyotes is a constant chore, but to Kus, it's well worth the effort. All beds are mulched with chunks of redwood bark. | <urn:uuid:16a76bed-9412-4326-b6e7-37e34d44ce69> | CC-MAIN-2014-15 | http://www.sunset.com/garden/landscaping-design/water-wisdom-00400000021810/page2.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206647.11/warc/CC-MAIN-20140423032006-00403-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.92668 | 346 | 2.515625 | 3 |
The tyre was first invented and patented by RW Thomson. He patented the Pneumatic Tyre in 1845. His first design used a number of thin inflated tubes inside a leather cover. This design actually had its advantages over later designs. It would take more than one puncture to deflate the whole tyre, and varying the pressures could alter the ride conditions.
RW Thomson - Tyre Invention 1845
It was not until the late nineteenth century, 1888, that John Boyd Dunlop invented the Rubber Pneumatic Tyre. Despite these technological breakthroughs the solid rubber tyre continued to be the dominant tyre and it was not until 1889 that the pneumatic tyre caught on.
In 1888, Scottish-born John Boyd Dunlop, a prosperous Veterinary Surgeon in practice in Belfast, Ireland, invented the Pneumatic Bicycle Tyre. A group of Irish businessmen from Dublin, realised the potential of the tyre, and, in 1889, together with Mr. Dunlop, formed a syndicate to float what was to become "THE DUNLOP PNEUMATIC TYRE COMPANY."
A BIT ABOUT RUBBER
Most latex plants come from the New World. Latex is a mixture of compounds borne in special structures called laticifers. The composition differs in different species, but typically contains water, terpenes, sugars, enzymes, etc. In many plants latex has a milky appearance, but not in others. (Latex in latex paint is a synthetic material and is not related to true latex).
The properties of latex were apparently discovered by different groups of people in different areas. The Aztecs of Mexico played ball with balls made of latex of Castilla elastica (Moraceae). In the Amazon area, the Indians waterproofed clothing by coating it with latex of Hevea brasiliensis (Euphorbiaceae). The Spanish in South America also began to use it to waterproof clothing.
In 1823, Charles Macintosh discovered that rubber was soluble in hexane. Further, when the solution was applied to clothing, a thin layer was left on the clothes. He invented the "Macintosh" (a raincoat -- not a computer). [(or apple)]. In cold weather, they cracked. In hot weather, two people with Macintoshes often became inseparable. The coats stuck together.
In 1839, Charles Goodyear (whose wife allegedly nagged him) while working in his garage (that's why he worked in the garage) discovered how to vulcanize (no relation to Spock) rubber and make it non-sticky and much more usable. In this process, because of added sulfur, the rubber becomes cross linked and also has better elasticity.
Whenever people tried to raise rubber trees in South America, the plants were attacked by a fungal disease. In 1876, Sir Henry Wickham took seeds of rubber trees from Brazil to the Royal Botanical Gardens in Kew, near London. They were taken from there to Singapore and then to other places in Southeast Asia. Luckily, the fungal disease was not taken along with the plants.
Rubber was extracted mostly from wild trees of Hevea brasiliensis until the 1890's. The latex was collected (often in leaves) by slashing the trees diagonally. The latex is about 30% rubber and the rest is serum. When the latex was collected, it was filtered, mixed with water and slowly poured over a paddle held over a smoky fire. A ball of coagulated latex was eventually prepared. Rubber is still prepared in Brazil in this manner. Today, however, dilute acetic or formic acid is added to coagulate the rubber (especially in Asia) and the rubber rolled into sheets.
In Asia, cultivation of the plant is much more carefully done. The plant is grown on extensive plantations. Numerous breeding programs are in progress. The "jebong" method of tapping the trees gives better yields and is less harmful to the trees.
As rubber began to be used in pneumatic tires, about 1900, there was a rubber boom. In 1910, rubber sold for $3.10 per pound. Towns, such as Manaus in Brazil, did well economically. They even had an opera house and European opera companies came there (many of them got malaria and died). But at just about that time, the production of rubber plantations in Southeast Asia became important and the price went down. In the 1920's rubber went to 14 cents per pound and in 1932, it sold for 3 cents per pound. By World War II, 90% of all rubber came from Asian plantations.
Because of the war, much work on synthetic substitutes began. (The Germans had already made some synthetic rubbers). Several types of synthetic rubbers were made. For some purposes they are better than natural rubber, but, for others, not as good. In any case, use of natural rubber is greater today than at any time in the past. About 2/3 of all rubber goes into tires. Natural rubber is the best for airplane tires and is also important in radial tires.
Synthetic rubber is made from petroleum derivatives, which will be problem in the future as oil reserves run dry.
Hevea brasiliensis is a tropical tree. It is native to the Amazon Basin in Brazil and adjoining countries. In comparison to the production of synthetic rubbers from petroleum, Hevea, the rubber-tree, has been called "The green rubber factory". On the one hand, Hevea uses the sun as a renewable energy source together with atmospheric CO2, water and mineral elements of relatively poor soils for the building of its constituents. The by-products of Hevea are to a high degree "biodegradable" and rubber itself is "recyclable". The rubber tree may be used to reconstitute new forests on poor or degraded soils. Also, the wood from "the rubber tree" is increasingly used as timber.
Tapping begins once trees reach maturity at about seven years, although this may be later in unfavorable areas. Tapping involves periodically cutting bark on the trunk, and hence severing latex vessels. It is best done at a 25-30° angle from the horizontal, from high on the left of the tree to low on its right, in an action exposing the maximum number of latex vessels per length of incision. Tapping productivity is a critical issue in maintaining sustainable supplies of natural rubber.
first pneumatic bicycle tyres to reach Australia arrived in Melbourne in
1889, and within 2 years, the Dunlop Company was established in Europe
& North America ( the first pneumatic bicycle tyres to reach North
America arrived in New York on Christmas Day, 1890).
In 1899, a Canadian syndicate purchased the Australasian interests and floated "THE DUNLOP PNEUMATIC TYRE COMPANY OF AUSTRALASIA LTD as an Australian company, with a capital of 170, 000 Pounds ( $A 340, 000).
In 1905, the Company made the first of its many acquisitions with the purchase of its main rival the Barnet Glass Rubber Company.
In 1889, John Boyd Dunlop founded the Pneumatic Tyre Company and Booth's Cycle Agency, which were to become the Dunlop Rubber Company Limited.
The company became involved in aviation in 1910, when Dunlop Rubber Company introduced a wire-spoked wheel with a beaded tyre specifically designed for the aviation market.
In 1925, Dunlop formed a separate Aviation Division to produce
Dunlop was a Scottish vet living in Belfast. His son Johnny complained that when he rode his bicycle to school the cobbled streets made his bottom sore. Dunlop solved his son's problem by inventing a pneumatic tyre, but then it became clear that this tyre was faster - the lad kept winning cycle races. There was a famous cycle race on the Queen's College playing fields on 18 May 1889 and Dunlop persuaded the cycle champion Willie Hume to use the new tyres. Willie won the race and everybody wanted the tyres, and so the Dunlop Rubber Company was formed.
What Dunlop did not realise was that 43 years earlier another Scot had patented almost the same thing. Robert Thomson, who had been to America, returned to Britain and was given a workshop by his father where he invented all sorts of things. In 1845 Thomson patented what he called aerial wheels. There were no bicycles then, so it would not have been a bicycle tyre that he invented. There were no internal combustion engines either, just a few steam carriages, and otherwise horse-drawn carriages and carts. However, Thomson did some elegant experiments.
He fitted his tyres to a carriage and, in Regent's Park in London, had it pulled side by side with an ordinary carriage. He showed it was much easier to pull the one with pneumatic tyres. All the watching journalists thought it would be slower because the tyres were soft. It was easier to pull and also silent - it did not make the noise of a carriage. The pneumatic tyres were a huge success but there was no market at the time - rubber was very expensive in the 1840s.
Robert Thomson is much under-rated. He invented a whole range of things including a fountain pen - possibly the first fountain pen, though there are other claimants. He never became rich and famous, perhaps because he was so far ahead of his time.
Dunlop first advertised his tyres in December 1888 in The Irish Cyclist, and in May of the following year the Tyre had its first breakthrough. A Belfast Cycle Race was won on pneumatic rubber tyres, and by now the public were starting to take note.
Unfortunately the original tyre had its drawbacks. The inner tube was difficult to get at because the tyre was stuck to the wheel. In 1890 CK Welsh patented the design of a wheel rim and outer cover with inextensible lip. By now we had the basics for today’s tyre.
Tyre Pollution 2005
The content of this website is copyright © and design copyright 1991 and 2005 Electrick Publications and NJK. All rights reserved. The bird logo and name Bluebird and Blue Max are trademarks. The BE2 and BE3 vehicle shape and configuration are registered designs ®. All other trademarks are hereby acknowledged. Max Energy Limited is an environmental educational charity. | <urn:uuid:ce97665e-f15c-42db-a031-088c13aba770> | CC-MAIN-2015-35 | http://www.speedace.info/rubber.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645340161.79/warc/CC-MAIN-20150827031540-00307-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.975132 | 2,136 | 3.3125 | 3 |
- Stress is a state of psychological and physiological strain cause by adverse stimuli
Stress prepares as for fight or flight by shutting off bodily functions to direct the supply of oxygen to the muscles.
Glucose + Oxygen -------> Water + Carbon Dioxide + ENERGY
Sypathomedually pathway for Acute stress (HANSAM model)
Nerve impulse, used as they work quicker then hormones.
2. Autonomic Nerves System
3. Adrenal Medulla (In the Liver)
4. Noradrenaline/ Adrenaline
Physiological effects (Examples) - Dilated lungs, increases heart rate and the digestive system closes down. This provides more oxygen… | <urn:uuid:5e418f53-ae55-4d0a-92c5-16d6cb0e4626> | CC-MAIN-2017-51 | https://getrevising.co.uk/revision-notes/biological_psychology_1_pathways_of_stress | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948513784.2/warc/CC-MAIN-20171211164220-20171211184220-00418.warc.gz | en | 0.778929 | 143 | 3.15625 | 3 |
Smart SIDS exploit a mixture of agility, detection, and learning capabilities to satisfy the SIDS needs. However, planning, engineering and management of these systems involve many decisions that require people, processes and technologies tradeoffs. These tradeoffs are particularly serious in developing countries where the needed technologies are not available. This report investigates how smart cities and islands in least developed countries can provide the SDG compliant services in health, education, public safety and public welfare through people, processes and technology tradeoffs.
Our research is based on a systematic methodology and an associated computer aided toolset. In this research, a systematic methodology to be followed while transforming an island to a smart island is proposed. This methodology is applied to a few of the islands in the UN Small Islands and Developing States (SIDS) Partnership.
And finally, a computer aided decision support environment called SPACE (Strategic Planning, Architecture, Controls, and Education) is used to guide through strategic decisions required to plan, develop, manage and control the project in the developing countries setting. | <urn:uuid:a9a59795-ab99-49d2-8cdc-f8110694ba19> | CC-MAIN-2018-51 | http://ict4sids.com/smartsids.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376831933.96/warc/CC-MAIN-20181219090209-20181219112138-00055.warc.gz | en | 0.932965 | 210 | 3.0625 | 3 |
Page 2 of 3
Using closure 1 - More parameters
Clearly closures are fun but what use are they?
The answer is that they provide a context for a function which can be used to provide it with additional information without the need to use additional parameters.
Why wouldn’t you create some additional parameters?
Most likely because the signature of the function you are trying to use isn’t under your control.
For example consider the EnumWindows API call which needs a callback function that is called for each window that it enumerates. The API call is:
static extern bool EnumWindows(
ref IntPtr lParam);
and the callback delegate is:
public delegate bool EnumWindowsProc(
ref IntPtr lParam);
The problem with using the callback delegate is that it only has the two parameters - the handle of the current window and a pointer supplied in the call to the EnumWindows function.
It is this pointer that is used to communicate between the callback function and the program needing the enumeration.
Closure, however, makes communication much easier.
If you need a function to find a particular dialog box specified by its Owner and its Caption string then you could write a function something like:
public IntPtr getDialog(
IntPtr Owner, String Caption)
Clearly we need to pass the Owner and Caption to the callback delegate so that it can compare each of the enumerated windows to the target. The most natural way to do this is to provide these extra pieces of information to the callback via extra parameters but to work as a callback it can only have the parameters defined by the API.
The simplest solution is to define the callback delegate in the usual way but use the fact that the Owner and Caption parameters are in scope and so are captured by an anonymous function:
EnumWindowsProc enumProc =
ref IntPtr pointer)
First we get the window text and compare it to Caption, which we can only access here thanks to closure:
int length =
StringBuilder wTitle =
new StringBuilder(length + 1);
if (wTitle.ToString() == Caption)
If they match we check that the class name is correct for a dialog box and then check that Owner, which is once again only accessible at this point because of closure, is the correct window:
int max = 100;
This completes the anonymous callback delegate; now we can call EnumWindows:
StringBuilder classname =
GetClassName(handle, classname, max);
if (classname.ToString() == "#32770")
IntPtr Parent = GetParent(handle);
if (Parent == Owner)
pointer = handle;
IntPtr DlgHwnd = IntPtr.Zero;
EnumWindows(enumProc, ref DlgHwnd);
To follow what is going on here you need to keep in mind that the callback is actually run by the API via the call
which passes in the handle to the window and a pointer to soon additional data. The Owner and Caption variables are used within the callback courtesy of closure.
Notice that the pointer in the callback delegate is used to return the handle of the dialog box that we have found but this too could have been achieved using closure.
Without any use of closure we would have had to pack the Owner and Caption into a data structure and passed this to the callback. Closure makes things much simpler in this case. | <urn:uuid:562df708-87b3-45b3-9b90-b6a529aacbb3> | CC-MAIN-2015-48 | http://www.i-programmer.info/programming/c/831-closure.html?start=1 | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398462665.97/warc/CC-MAIN-20151124205422-00062-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.840408 | 718 | 3.03125 | 3 |
If there’s any place in our solar system that we’d want to start seriously looking for life it’d be Europa. The dust covered snowball of a moon likely contains a vast subsurface ocean, one that is kept liquid by the giant gravitational forces of its host planet Jupiter. This makes Europa a great candidate for life as we know it as once we find water it’s inevitable that we find life shortly thereafter. The challenge with Europa though is getting to that subsurface ocean to study it as it could be covered in several kilometers of water ice, not something you can simply puncture through. Whilst there are numerous people more qualified than me on this subject, many of them actually working in the aerospace industry, with NASA asking for ideas for a potential mission to Europa I figured I’d throw my 2 cents in.
So the total budget for the potential mission is a cool $1 billion and whilst that sounds like a lot of money projects that I’d consider simpler than my idea (like say Curiosity which was $2.5 billion) but I think there’s potential to build a platform that could fuel further missions. With that in mind this initial mission is likely only to be a scouting mission, one that will give us the most detailed picture of Europa possible so that the follow up mission can choose the perfect site to land on and commence the search for life in its vast underground ocean. My proposal then is to develop a compact nuclear reactor (not a RTG) to power a scouting craft laden with instruments to analyse the gravitic field and surface of Europa. This craft will be able to find the point at which the surface ice is the thinnest and identify potential landing sites for the second generation craft: a cryobot that will punch through to the ocean below.
Putting a nuclear reactor into space might sound like the plan of a crazed sci-fi nerd but there’s actually been dozens of small prototype reactors launched into space with all of them proving to be safe and reliable. The power capabilities of such a reactor are far beyond that of what a small satellite would usually require however attempting to melt through kilometers of ice will require power of that scale. Thus it would make sense to fund research into developing the power supply first and then validating it on the scouting craft. Then, once that mission is successful, the reactor can be scaled to the appropriate dimensions for the cryobot mission and even used in other deep space programs.
Having such a generous amount of power available also opens up the opportunity to using instruments on the scouting craft which would not be feasible, typically. Things like high-power antennas (which could function as a relay for the follow up mission), radar imagers or bigger and better versions of other instruments. My knowledge on the power requirements of various instruments is limited but I know that even the most advanced RTGs, like the one in Curiosity, produce a measly 125W. Being able to draw on several kilowatts, an order of magnitude more power, seems like it would open up many opportunities that just weren’t possible previously.
I’m probably vastly underestimating how much it would cost to develop such technology, especially in today’s nuclear hostile political environment, but if we’re serious about actually digging under Europa’s surface I don’t see what our other options would be. Melting through giant sheets of ice is no small task and one that has requirements that far surpass anything we have currently. Using that $1 billion mission to set ourselves up for future exploration seems like the best bet especially considering how many other applications a safe, small nuclear reactor would have. | <urn:uuid:fbfd7ad7-fc2e-4037-93c5-ffb7a6631edd> | CC-MAIN-2020-24 | https://www.therefinedgeek.com.au/index.php/2014/04/30/an-armchair-scientists-mission-to-europa/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347406365.40/warc/CC-MAIN-20200529183529-20200529213529-00037.warc.gz | en | 0.952587 | 753 | 3.0625 | 3 |
Kayseri ( Turkey ) was an important trade center in Anatolia during history. It famous not only with trade but also with winter turism in Ercies Moution and with delicious tastes of Kayseri Turkey.
Districts: Kayseri(Center), Akkishla, Bunyan, Develi, Felahie, Hajilar, Injesu, Kojasinan,Melikgazi, Ozatan, Pinarbashi, Sarioglan, Sariz, Talas, Tomarza, Yahyali and Yeshilhisar.
Museums and Ruins
Kultepe – Karahoyuk Koyu Soganli- Yeshilhisar
Kultepe Ruin : It is located at 20 km of Kayseri Sivas roadway and height is 22 metres size is 500 metres. It has Karum city around ruin. This worldwide known open air museum has called attantion first in 1881. There were Assyria, Young Hittite, Roman-Persian and Tabalian Periods from excavations. The most important works are in Asur language especially tablets.These are the oldest articles of Anatolia.
City Walls and Castle : It is located at Cumhuriyet squeare and was built middle of 3 century, it was repaired middle of 6 century.The historic castle of city has two sides : inside and outside castle.
Religion Turism : The most important mosques of city are Ulu Mosque, Gulluk, Han, Hajikilich, Kurshunlu and Kale Mosque those located at center of Kayseri. Aygunlu, Chiphte, Sirchali,Shakh Kutlu Hatun, Ali Djafer, Melik Mehmet Gazi and Seyit Burhanettin combs are most important places in Kayseri Turkey.The most important madrasahes of Kayseri (Turkey) are Sahabie, Hunat, Seradjedin, Kosk ,Hatunie.
Sultanhani Caravansarai : It is found 50 km from Kayseri- Sivas roadway.It was built in Seljuk Sultan Alaattin Keykubat. Caravansarai known with ith architecture.
Karatay Caravansarai: It is found in Bunyan district, Karadayi village and was built in 1255 by Djelalettin Karatay who was vizier of Selcuklu.
Kara Mustafa Pasha Caravansarai: It is found in Injesu district and there are 30 stores inside it and was built in 1660 by Merzifonlu Kara Mustafa Pasha who was vizier of Ottoman.
Vizier Han : It is found inside city near to Kapali Bazaar. This two-storied han was built by Damat Ibrahim Pasa in 1727.There is fountanian middle of Han and its architecture is interesting for visitors. | <urn:uuid:e5f35535-71c6-4949-98c8-5fdbb748ca0d> | CC-MAIN-2018-43 | http://www.dreamofholiday.com/en/tanitim/70/holiday-in-kayseri-turkey.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513548.72/warc/CC-MAIN-20181021010654-20181021032154-00462.warc.gz | en | 0.943995 | 623 | 2.59375 | 3 |
Definitions for byzantiumbɪˈzæn ʃi əm, -ti əm
This page provides all possible meanings and translations of the word byzantium
an ancient city on the Bosporus founded by the Greeks; site of modern Istanbul; in 330 Constantine I rebuilt the city and called it Constantinople and made it his capital
Byzantine Empire, Byzantium, Eastern Roman Empire(noun)
a continuation of the Roman Empire in the Middle East after its division in 395
The ancient Greek city situated on the Bosporus, named Constantinople in 330 , and now known as Istanbul.
Byzantium was the ancient Greek city on the site that later became Constantinople. It was founded by Greek colonists from Megara in 657 BC. The city was rebuilt and reinaugurated as the new capital of the Roman Empire by Emperor Constantine I in 330 AD and subsequently renamed Constantinople. The city remained the capital of the Byzantine Empire until 1453, when it was conquered and became the capital of the Ottoman Empire. Since the establishment of modern Turkey in 1923, the Turkish name of the city, Istanbul, has replaced the name Constantinople in the West.
The Nuttall Encyclopedia
the ancient name of Constantinople; founded by Greek colonists in 667 B.C.
U.S. National Library of Medicine
An ancient city, the site of modern Istanbul. From the 4th to 15th centuries the empire extended from southeastern Europe to western Asia, reaching its greatest extent under Justinian (527-565). By about 1000 A.D. it comprised the southern Balkans, Greece, Asia Minor, and parts of southern Italy. The capture of Constantinople in 1453 marked the formal end of the Byzantine Empire. (From Webster's New Geographical Dictionary, 1988)
The numerical value of byzantium in Chaldean Numerology is: 4
The numerical value of byzantium in Pythagorean Numerology is: 5
Images & Illustrations of byzantium
Find a translation for the byzantium definition in other languages:
Select another language: | <urn:uuid:d3251a92-9058-490e-af7b-506e663b96bd> | CC-MAIN-2016-22 | http://www.definitions.net/definition/byzantium | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049270555.40/warc/CC-MAIN-20160524002110-00090-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.883231 | 442 | 3.765625 | 4 |
About 215 000 violent sexual crimes were recorded by the police in the European Union (EU) in 2015. A third of these (nearly 80 000) were rapes.
More than 9 in 10 rape victims and more than 8 in 10 sexual assault victims were girls and women, while nearly all those imprisoned for such crimes were male (99%).
In absolute terms, police in England & Wales* recorded the highest number of violent sexual offences (64 500, of which 35 800 rapes – 55%), followed at a distance by Germany (34 300, of which 7 000 rapes – 20%), France (32 900, of which 13 000 rapes – 40%) and Sweden (17 300, of which 5 500 rapes – 33%).
Number of sexual violence offences relative to the population: highest in Sweden and the UK
Relative to the population of each Member State, Sweden recorded the highest number, with 178 violent sexual crimes per 100 000 inhabitants, ahead of Scotland* (163), Northern Ireland (156), England & Wales* (113) and Belgium (91). For rapes, the highest rates were recorded in England & Wales* (62 rapes per 100 000 inhabitants) and in Sweden (57).
It should be borne in mind that the figures do not necessarily reflect the actual number of violent sexual crimes. Rather they show to what extent such crimes are reported to and recorded by police. Therefore the variation between countries is also influenced by general awareness and attitudes to sexual violence offences.
This news item marks the International Day of the Elimination of Violence Against Women (25 November).
* Due to the different legal systems in force, data for the United Kingdom are only available at subnational level.
Figures for each category refer to the most recent year for which data are available. | <urn:uuid:3b78ab78-607d-4cab-808b-062ce5a46c5a> | CC-MAIN-2019-18 | https://ec.europa.eu/eurostat/web/products-eurostat-news/-/EDN-20171123-1?inheritRedirect=true | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578531984.10/warc/CC-MAIN-20190421140100-20190421162100-00507.warc.gz | en | 0.946987 | 358 | 2.578125 | 3 |
Cells are the ultimate multi-taskers: they can switch on genes and carry out their orders, talk to each other, divide in two and much more, all at the same time. But they could not do any of these tricks without a power source to generate movement. The inside of a cell bustles with more traffic than Delhi roads, and, like all vehicles, the cell’s moving parts need engines. Physicists and biologists have looked “under the hood” of the cell and laid out the nuts and bolts of molecular engines.
The ability of such engines to convert chemical energy into motion is the envy of nanotechnology researchers looking for ways to power molecule-sized devices. Medical researchers also want to understand how these engines work. Because these molecules are essential for cell division, scientists hope to shut down the rampant growth of cancer cells by deactivating certain motors. Improving motor-driven transport in nerve cells may also be helpful for treating diseases such as Alzheimer’s, Parkinson’s or ALS, also known as Lou Gehrig’s disease.
We would not make it far in life without motor proteins. Our muscles would not contract. We could not grow, because the growth process requires cells to duplicate their machinery and pull the copies apart. And our genes would be silent without the services of messenger RNA, which carries genetic instructions over to the cell’s protein-making factories. The movements that make these cellular activities possible occur along a complex network of threadlike fibers, or polymers, along which bundles of molecules travel like trams. The engines that power the cell’s freight are three families of proteins, called myosin, kinesin and dynein. For fuel, these proteins bum molecules of ATP, which cells make when they break down the carbohydrates and fats from the foods we eat. The energy from burning ATP causes changes in the proteins’ shape that allow them to heave themselves along the polymer track. The results are impressive: In one second, these molecules can travel between 50 and 100 times their own diameter. If a car with a 5-foot-wide engine were as efficient, it would travel 170 to 340 kmph.
Ronald Vale, a researcher at the Howard Hughes Medical Institute and the University of California at San Francisco, and Ronald Milligan of the Scripps Research Institute have realized a long-awaited goal by reconstructing the process by which myosin and kinesin move, almost down to the atom. The dynein motor, on the other hand, is still poorly understood. Myosin molecules, best known for their role in muscle contraction, form chains that lie between filaments of another protein called act in. Each myosin molecule has a tiny head that pokes out from the chain like oars from a canoe. Just as rowers propel their boat by stroking their oars through the water, the myosin molecules stick their heads into the act in and hoist themselves forward along the filament. While myosin moves along in short strokes, its cousin kinesin walks steadily along a different type of filament called a microtubule. Instead of using a projecting head as a lever, kinesin walks on two “legs.” Based on these differences, researchers used to think that myosin and kinesin were virtually unrelated. But newly discovered similarities in the motors’ ATP-processing machinery now suggest that they share a common ancestor-molecule. At this point, scientists can only speculate as to what type of primitive cell-like structure this ancestor occupied as it learned to bum ATP and use the energy to change shape. “We’ll never really know, because we cannot dig up the remains of ancient proteins, but that was probably a big evolutionary leap,” says Vale.
On a slightly larger scale, loner cells like sperm or infectious bacteria are prime movers that resolutely push their way through to other cells. As L. Mahadevan and Paul Matsudaira of the Massachusetts Institute of Technology explain, the engines in this case are springs or ratchets that are clusters of molecules, rather than single proteins like myosin and kinesin. Researchers do not yet fully understand these engines’ fueling process or the details of how they move, but the result is a force to be reckoned with. For example, one such engine is a spring like stalk connecting a single-celled organism called a vorticellid to the leaf fragment it calls home. When exposed to calcium, the spring contracts, yanking the vorticellid down at speeds approaching 3 inches (8 centimeters) per second.
Springs like this are coiled bundles of filaments that expand or contract in response to chemical cues. A wave of positively charged calcium ions, for example, neutralizes the negative charges that keep the filaments extended. Some sperm use spring like engines made of act in filaments to shoot out a barb that penetrates the layers that surround an egg. And certain viruses use a similar apparatus to shoot their DNA into the host’s cell. Ratchets are also useful for moving whole cells, including some other sperm and pathogens. These engines are filaments that simply grow at one end, attracting chemical building blocks from nearby. Because the other end is anchored in place, the growing end pushes against any barrier that gets in its way.
Both springs and ratchets are made up of small units that each move just slightly, but collectively produce a powerful movement. Ultimately, Mahadevan and Matsudaira hope to better understand just how these particles create an effect that seems to be so much more than the sum of its parts. Might such an understanding provide inspiration for ways to power artificial nano-sized devices in the future? “The short answer is absolutely,” says Mahadevan. “Biology has had a lot more time to evolve enormous richness in design for different organisms. Hopefully, studying these structures will not only improve our understanding of the biological world, it will also enable us to copy them, take apart their components and re-create them for other purposes.”
According to the author, research on the power source of movement in cells can contribute to: | <urn:uuid:6b2c565a-34ed-4129-80ed-1e66a26a82d9> | CC-MAIN-2017-13 | http://gradestack.com/Complete-CAT-Prep/-Cells-are-the-ultimate/40-37094-19299-3965-test-wtst | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189198.71/warc/CC-MAIN-20170322212949-00078-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.954865 | 1,284 | 3.84375 | 4 |
Definitions for joint, splayed
This page provides all possible meanings and translations of the word joint, splayed
The Standard Electrical Dictionary
The method of joining the ends of stranded conductors. The insulating covering is removed, the wires are opened out, and the center wire, heart or core of the cable is cut off short. The two ends are brought together, the opened out wires are interlaced or crotched like the fingers of the two hands, and the ends are wound around the body of the cable in opposite directions. The joint is trimmed and well soldered. Tinned wire with rosin flux for the soldering is to be recommended. Insulating material is finally applied by hand, with heat if necessary.
Find a translation for the joint, splayed definition in other languages:
Select another language:
Discuss these joint, splayed definitions with the community:
Word of the Day
Would you like us to send you a FREE new word definition delivered to your inbox daily?
Use the citation below to add this definition to your bibliography:
"joint, splayed." Definitions.net. STANDS4 LLC, 2016. Web. 6 Feb. 2016. <http://www.definitions.net/definition/joint, splayed>. | <urn:uuid:3f04db85-fb96-44ba-aff3-eecb2711f0c9> | CC-MAIN-2016-07 | http://www.definitions.net/definition/joint,%20splayed | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701146241.46/warc/CC-MAIN-20160205193906-00275-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.898778 | 265 | 3.125 | 3 |
photo credits here
By Jolie Fong
‘‘Singapore is a fine city.’’ Among us citizens, this has become a nationwide mantra of sorts. Singapore could very well be a fine city. Compared to other first-world countries, we still stand above as one of the cleanest, most orderly countries with well-behaved citizens. Litter is hard to spot. Public transport is as comfortable as private vehicles. Drivers on the road are typically law-abiding. Street crime is virtually non-existent, and general crime rates are so low that they put our international competitors to shame.
Perhaps it is because of our small population, that the government feels they can keep us in check. How do they do so? Slapping hefty penalties onto rule-breakers has shown to be quite effective in cultivating the orderly society we are today.
Here are some things you can be fined for in Singapore:
- Spitting Gum [Technically illegal to sell]: $1000
The ban was decided on in 1992. Vandals disposed of chewed gum in public housing estates, on the roads and on public transport. This caused serious maintenance issues and increased the cost of cleaning. When the Mass Rapid Transit (MRT) system opened in 1987, vandals stuck gum on the door sensors of trains, thus disrupting train services. To ensure that everything ran smoothly, then newly appointed Prime Minister Goh Chok Tong enforced the ban.
- Eating and drinking on public transport: up to $500
This fine was introduced in early 2009. This was because eating attracted unwanted pests, and spillage of drinks could cause accidents. Most were careful not to dirty the train and ate only small snacks (sweets) or drunk water. Granted that there were selfish commuters who blatantly flouted the rules, but they were made up of a small minority. Both parties receiving equal backlash could be quite unfair.
- Littering: Starts from $300, community service
At the 2013 “Clean and Green Campaign”, Prime Minister Lee Hsien Loong mentioned that citizens must keep the country clean because it reflects our values- “proud, considerate and environmentally conscious”. He also added that “fines and regulations were not the best way to keep the country clean, but to exert social pressure on those who do not respect the environment”.
- Graffiti: Fine and/or jail term
This was introduced in 1966. Graffiti was deemed as vandalism instead of artistic expressions.
- Urinating in elevators: $75 SGD
Not much to be said. Some elevators have Urine Detection Devices which detect urine odour in elevators, which cause the elevator doors to remain close until the police arrive. Frankly, no one wants to be in an elevator that reeks of urine, but being trapped in an elevator with your own urine is much worse.
- Smoking in certain areas: $300 SGD
The ban started in 1970, and extended to other areas over the years. The Smoking Prohibition Act was to keep a clean and healthy environment, and protect the public from harmful effects of smoking. The long-term goal is to prohibit smoking in all public areas except for designated smoking points. There is even a plan to gradually remove tobacco from our lives by limiting supply of tobacco to those born after year 2000.
Sounds rather excessive, doesn’t it? Realistically speaking, not the entire population moves like robots in lock step with the law. Life is still relaxed here. Every once in a while, you see people jaywalking, tossing their cigarette butts on the roads, and behaving in all kinds of ‘fine’ manner. Citizens are perfectly content with the way things are. The populous treat the fine-happy nature of the law quite satirically, mostly as a slightly annoyance and with a light heart.
In conclusion, Singapore cannot be kept in such a clean and orderly state without more than a slight judicial probe. Though you could be fined for nearly anything and everything, the impact on our little country isn’t as big as expected. We Singaporeans should take this “Fine City” nickname of ours in our stride, and show its light-hearted side. | <urn:uuid:4c567d4c-aef5-44f9-808f-8fe4287fbca3> | CC-MAIN-2021-31 | https://nushpress.com/2016/03/29/a-compilation-of-ridiculous-fines-in-singapore/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150264.90/warc/CC-MAIN-20210724094631-20210724124631-00334.warc.gz | en | 0.966806 | 870 | 2.515625 | 3 |
How Virtual Learning is Helping Shy Children
The world is changing in response to the pandemic and so are our methods of teaching. Virtual learning is one such change and for many students who have previously exhibited shyness, and this form of learning has served as a boon, says Cody Claver, General Manager, iCademy Middle East.
During these challenging times of school and nursery closures, social distancing and strict lockdowns, we’ve had to adapt and adjust to the new environment in ways we never imagined. Virtual learning is one of the major changes for children, including the shy ones, and has been helping these students to boost their confidence. The reasons for this are many. Virtual learning has made children more independent and self-reliant. Shy children find a comfortable and safe setting in their home in which they can express themselves confidently and positively. Those who were previously reluctant to speak up and felt overpowered by their peers in a classroom setting are now seen smiling and interacting with teachers online, according to Cody Claver, General Manager, iCademy Middle East.
Claver says: “There is a segment of students that have school phobia and are shy and reticent with their peers in a ‘bricks and mortar’ school setting. For shy students online education can provide a safe haven for them to engage in the most important activity of their young life.
Students that are more reserved oftentimes will thrive in an environment of anonymity. They appreciate that the work they produce or the comments they share are not judged by how they look, dress, or carry themselves. Their work is judged based upon the quality of their efforts. Virtual education is an important modality of education for students for whom traditional school settings don’t work. They are now able to hold their own and present their understanding of concepts via the online sessions.”
Virtual learning sessions are proving to be engaging, interactive, visually attractive, and supported by a digital presentation to enhance clarity. Most programmes, especially for very young children, include songs, games, calendar skills, mental and physical challenges, curricular content that is introduced with a multi-sensory approach to support children’s diverse learning styles and multiple cognitive levels.
Most of the virtual learning programs at iCademy Middle East also have an interactive screen that allows the teacher to see what the child is touching and responding to. The children recognise their friends and peers by seeing them on a daily basis and call out to them by their name and their interests. There is a reflection session in which each child is able to proudly showcase their achievements and share it with their teachers and friends. Everyone is able to appreciate and applaud each other’s achievements and the children feel a sense of pride and ownership in their work.
Cody Claver adds: “Students find both their own voice and meaningful pathways to social interaction in virtual schooling. Teachers in a virtual environment are very important in establishing learning environments that foster cooperation and collaboration among students. When teachers structure learning experiences and projects that put students together in small groups (virtually) it gives students opportunities to interact and develop their social skills. There are also a lot of opportunities for students outside school hours through sporting activities, music lessons and activities.”
In addition, teachers and schools follow several tips and tricks also to keep children attentive and focused during the sessions for young children. They rank from incorporating humour, to playing games and just having fun. The teachers keep the lessons lively and engaging by sometimes letting the children be the teacher or asking them to do a ‘show and tell’, “which we know is their all-time favourite” says Claver. Even online, the children love to show their favourite items and equally enjoy seeing what their friends have to share.
All in all, online learning, as daunting as it may seem, with the right combination of a well-planned system and great team to back it up, can be a highly effective and efficient way to not only work with our children in the current times, but also to encourage shy young children to come out of their shell, express themselves and gain self-confidence. | <urn:uuid:12dad7c0-5890-4c75-acf0-af14700689ef> | CC-MAIN-2023-50 | https://www.motherbabychild.com/2020/education/how-virtual-learning-is-helping-shy-children/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00574.warc.gz | en | 0.976614 | 850 | 3.234375 | 3 |
1.What is Wastewater?
Wastewater is water that has been adversely affected in quality by human interaction or influence. It comprises of liquid waste that has been discharged by a domestic dwelling, commercial property, industry, and/or agriculture and can encompass a wide range of potential contaminants and concentrations.
2.What is Water Treatment
Water treatment describes the process of making water more acceptable for a desired end-use. The purpose of all water treatment process is to remove existing contaminants in the water, or reduce the concentration of such contaminants so the water becomes fit for its desired end-use. One such use is returning water that has been used back into the natural environment without adverse ecological impact.
3. How is Wastewater treated
Sewage treatment, or domestic wastewater treatment, is the process of removing contaminants from wastewater and household sewage, both runoff (effluents) and domestic. It includes physical, chemical, and biological processes to remove physical, chemical and biological contaminants. Its objective is to produce an environmentally-safe fluid waste stream (or treated effluent) and a solid waste (or treated sludge) suitable for disposal.
4. What is a Septic Tank
A septic tank is a commonly used small-scale sewage treatment system popular in areas with no connection to main sewage pipes provided by local authorities. For several decades septic tanks have been the primary method used to treat sewage and/or wastewater in rural Ireland. Only in the past decade, largely due to local authority regulation, have newer more advanced environmentally friendly alternatives such as waste water treatment systems started to grow in Ireland.
5. How a Septic Tank works
A septic tank consists of a usually concrete tank buried in the ground, connected to an inlet wastewater pipe at one end and a septic drain field at the other. The design of the tank usually incorporates two chambers, wastewater or sewage enters the first chamber allowing solids to settle and scum to float. The settled solids are anaerobically digested, the liquid component flows through the dividing wall into the second chamber, where further settlement takes place. The excess liquid then drains out in a relatively clear condition from the outlet into the surrounding ground. Over time the waste that is not decomposed by the anaerobic digestion eventually has to be removed from the septic tank, also known as desludging. If the sludge is not emptied it can overflow and clog the piping or decrease the soil porosity itself, requiring expensive septic tank repairs.
6. What is a Septic System
Septic System is a term used to describe the entire end to end system of removing and treating of wastewater and sewage. Not having the option to connect to a public waste treatment systems leaves home owners and more remote businesses with a choice of septic systems including Aeration treatment, Reed bed, Peat fibre, UV treatment or also a combination of some of these.
7. What is Liquid Waste
Liquid Waste is Wastewater that has been adversely affected in quality by anthropogenic influence. It comprises liquid waste discharged by domestic residences, commercial properties, industry, and/or agriculture and can encompass a wide range of potential contaminants and concentrations. | <urn:uuid:1348971a-a345-45bd-a954-b6f3d8dbbe25> | CC-MAIN-2021-39 | https://www.sewagetreatment.ie/faqs/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055632.65/warc/CC-MAIN-20210917090202-20210917120202-00710.warc.gz | en | 0.943607 | 650 | 3.40625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.