text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
1.08k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
Given the magnitude of climate change impacts on the natural environment, development and infrastructure, economy, and public health in the region, it is imperative that climate change mitigation and adaptation are adequately addressed at the City Level. Local authorities will play a key role to combat climate change by developing climate action plans to reduce their greenhouse gas emissions and to adapt to the impact of climate change. Tam Ky City is ready to move forward for the Climate Action Plan development. On 14 October 2020, Tam Ky organized a virtual training for city representatives on Climate Action Plan formulation under the IUC Asia project. Supported by the CDP and UN-Habitat, the session aimed to share the general knowledge of Global Covenant of Mayors for Climate and Energy (GCoM) program, highlighting the benefit and the reporting platform. It also provides an understanding of the technical assistance provided by IUC Asia to Tam Ky – to assist Tam Ky Develop the Climat Action Plan in a way to pursue their ambition of the urban climate change resilience. Shandy of CDP shared the established Common Reporting Framework, would guide GCoM cities in assessing their greenhouse gas emissions, climate change risk and vulnerabilities (CRVA), as well as planning and reporting in an integrated and coherent way. This would enable cities to identify and take the right actions in a timely manner, as well as for better identification of shared challenges, greater cooperation, and the development of common responses to the impacts of climate change. GCoM cities agreed to make key data publicly available through the GCoM via regular reporting, which is needed to track overall progress in achieving the aims of the alliance. Later in the training session, Laids of UN-Habitat explained in more detail the GCoM requirements and recommendations for undertaking a CRVA – one of the initial stages for developing climate change adaptation plans. The first step of CRVA required the need to identify the past, current, and future climate hazard and their impacts. The second step involved the vulnerability, focusing on the need to identify affected population groups vulnerable to each climate hazards. This information can help the local government to gain a better understanding of the vulnerability dimension of risks and in prioritizing climate adaptation actions. The third step was to assess adaptive capacity, which includes factors that enable a city to adjust its systems in view of current and future risks, adequately respond to its impacts. UN-Habitat demonstrated the adopted tool for CRVA and highlighted the data required. Further, the city was expected to continue data gathering based on historical and statistical; as such UN-Habitat Team would assist in database consolidation.
<urn:uuid:0154bb1c-67f3-4786-a4b0-0991a2d947d8>
CC-MAIN-2021-10
https://www.asian-mayors.eu/2020/10/vietnam-tam-ky-shares-visio-to-moving-to-a-low-emission-and-climate-resilient-future/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360107.7/warc/CC-MAIN-20210228024418-20210228054418-00318.warc.gz
en
0.943579
528
2.515625
3
The Demographic Expansion of Kashmir, and the Shrinking of Jammu and Ladakh - In History & Culture - 11:27 AM, Jul 09, 2016 - Shanmukh .True Indology . Aparna . Saswati Sarkar and Dikgaj Introduction:: The state of Jammu and Kashmir has occupied the minds of many since 1947. The only Muslim majority state to accede to India, the state has been mired in controversy since its accession was prompted by a Pakistani invasion. Part of Kashmir was annexed by Pakistan in a war in 1947 and The Hindu population of the state has long been subjected to various forms of discrimination. There are three major regions in the state of Jammu and Kashmir. Jammu and the Hills of Jammu in the south, Kashmir valley in the north and the Ladakh region in the north east. Each of the three regions has its own characteristics. The bulk of the population is concentrated in Kashmir (which has a population of 6.9 million) and Jammu (which has a population of 5.3 million). The huge region of Ladakh has just over 200,000 people. In this article, we will focus on Ladakh and parts of the Jammu region. The Kashmir region, which is 99%+ Muslim, is not the focus of the article. Further, Jammu and Kathua (which are more than 90% Indic) are also not the focus of this article. In this article, we will focus on the regions of Hill Jammu and Ladakh, which have a more mixed population, in religious terms. Specifically, we focus on the three old districts of Hill Jammu, viz, Poonch, Udhampur and Doda and the district of Ladakh We will merely show that `Kashmir' is expanding and Hill Jammu and Ladakh are shrinking. For the sake of historical consistency, we have grouped several districts together. In this article, we examine the following districts, which together comprise of 3 million people: Poonch, which consists of the current Poonch and Rajouri districts, Udhampur, which comprises of the current districts of Udhampur and Reasi, Doda, which comprises of the current districts of Doda, Kishtwar and Ramban The above three districts comprise the region of Hill Jammu, which has been a region where neither Hindus nor Muslims have been a majority. The region of Ladakh has a large Buddhist population and consists of the sole district of historical Ladakh. The district Ladakh, comprises of the current districts of Ladakh and Kargil. In all our computations, we have grouped the Hindus, Sikhs and Buddhists together. In Hill Jammu, the population is mostly Hindu, with a small sprinkling of Sikhs. In Ladakh, it is Buddhists who predominate and the Hindus and Sikhs are a small minority. Consequently, the population of Ladakh may be considered Buddhist for all practical purposes. Further, the presence of the army and/or the Border Security Force in the border districts greatly skews demographics. Consequently, we have removed the BSF and the Army from the census, by inferring the male population of the districts using the female demographics and the gender ratios. Take Home Message 1 – Ladakh and Hill Jammu in Microscopic Detail: Out of the four districts, two were Indic majority in 1961, and two more were Muslim majority. It will have changed to Muslim majority by 2061 and 1 Hindu majority. Hill Jammu was 38.75% Indic in 1961, rose to 47.44% in 1981 (due to influx of W Punjabi Hindu refugees during the 1965 and 1971 wars with Pakistan) and fell back to 44.32% Indic in 2011. The higher Muslim fertility rates are wiping out the advantage gained by the Indics during the 1951-1981 period. However, the Hindu percentage is set to fall in the region. The polynomial curves, which give the most accurate prediction, predict a 35.94% Indic population in the region. We have given a quick overview of the situation. The Hindu majority of Udhampur comes from the massive majority Hindus enjoy in Udhampur area. The Reasi area is already Hindu minority now (49% Hindu) and will be more Muslim by 2061. Gulabgarh and Gool Arnas will ensure that Reasi region remains strongly Muslim majority, even if Reasi tehsil remains Hindu. In Doda district, all the tehsils, with the one solitary exception of Bhaderwah are already Hindu minority. Bhaderwah is also only 59.5% Indic. It too may change character in the next 50 years. The Dogra character of Doda is fast being lost. Even more worrying, in Bhadarwah, Bhaleesa regions of Doda, etc the local languages (Bhaderwahi, Bhaleesi, etc) are fast disappearing, along with the unique culture of these regions, due to the shrinking of the Hindus, who are the sole speakers of these languages. In the Ramban district, Banihal will ensure Hindu minority of the current Ramban district, leaving Ramban town the only Hindu majority region in the area. Even Ramban tehsil is Hindu minority now, a sharp fall from the clear Hindu majority in 2001. In the current Kishtwar district, only Poddar tehsil is Indic majority. Rest are Muslim. In Poonch, both Poonch and Rajouri are Muslim majority. The current Poonch district is 90% Muslim, Indics have been eliminated in Mendhar, Mandi and Surankote tehsils. In the current Rajouri district, except for Sunderbani and Nowshera, other tehsils are already Indic minority. Indics have been totally eliminated from the Thanamandi and the Darhal tehsils. In Ladakh district, Indics have fallen from 54.5% in 1961 to 48. 37% in 2011. In fact, Ladakh benefited at Partition by the arrival of some Shigaris from Gilgit-Skardu provinces. The Indics are set to fall further. Indic growth has been extremely meagre in the region. In Leh district, Indics lost 10% of the population and fell from 82% in 2001 to 72% in 2011. Ladakh's Muslim population grew by 17% while the Buddhist population shrank by 2%. Given these figures, it is reasonable to expect a further shrinkage of the Indic population in Ladakh. Ladakh's Muslim population stems from the conversion of the Kings of Skardu (in today's PoK) to Shia Islam by Shamsuddin Iraqi in the 1500s, who converted them. Since then, the Muslim population of Kargil and Nubra (the Takshis) has grown. The Muslim population of Leh are, in contrast, Sunnis, and originally came from the Muslim wool traders (who got a monopoly on wool trade during the reign of Aurangzeb) who settled down and married local Buddhists (these Muslims were, in later years, called Arghons or half-castes). This small number has in recent years, been augmented by influx from the Kashmir Valley. The tragedy of the Buddhists of Ladakh is compounded by the fact that their collapse is very recent in Kargil and Drass areas, and has happened mostly in the last century. Dards of Kargil and Ladakh were influenced by Bon and by 7th century, most Dards either became Buddhist or followed Saura mata (sun worship). The native kings of Dardistan, who styled themselves as “Darada rajas”, patronised Buddhists and also erected wooden images of Surya with his attendants Danda and Pingala. During the reign of Jahangir(c.1614), Baharistan -i Shahi still describes Gurezis as Kafir.( Also see which mentions that sultan returned successfully with booty after conducting a holy war on infidels) The Jihad against Dards was a common affair as noted by historian Alan vairo . This shows that Gurezis had resisted Islam for at least 300 years. In the late nineteenth century, the Shia Muslim chieftain of Skardu married her daughter Tila Khatoon to Thi Namgyal, the son of the Buddhist chieftain of Suru. The queen brought with her a Sufi who converted the Buddhists to Islam. It was believed that this Sufi had miraculous powers and those commoners seeking them, converted to Islam. . This percentage has been increased multi-fold through conspicuously high fertility rates and intention to outbreed in the last century, so much that Kargil is now a Muslim majority. Take Home Message 2-Retreat of the Indics: Indics have been effectively wiped out in several tehsils. In Kargil district, Indics have been wiped out in Sanku tehsil. Similarly, there are only a few hundred to a few thousand Indic individuals left in Surankote, and Mandi tehsils of Poonch and, Thanamandi tehsil of Rajouri. Some tehsils saw a negative growth in the number of Indics. The total number of Indics actually shrank in the following tehsils. The Hindu population has been shrinking in the following Tehsils/Towns. Hindus are vanishing from the Thanamandi-Darhal tehsil, which has a huge Muslim population. In Kishtwar, the Hindus have suffered many terrorist attacks , which could account for them leaving. In Ramban and Batote, Hindus have been inundated by the huge Muslim growth in the district. Further, the Hindus of Ramban and Batote may be leaving for Udhampur and Jammu for better facilities too. Apart from this, Muslim population has grown enormously in many tehsils. In Kalakote tehsil (Rajouri district), Muslim population grew from 19,454, to 37,498 between 2001 and 2011, an unprecedented growth of 92.5% in 10 years! Similarly, in Nowshera tehsil of Rajouri, Muslims grew by 89% in 10 years between 2001 and 2011. Similarly, in Ramban (part of Doda district originally), Muslims grew from 37,545 to 91,504 persons – an impossible growth of 143.65%! Hindus too registered an impressive 36.3% growth in Ramban, but have been completely outgrown by the Muslims in the same, with the result that Ramban tehsil, which had 55% Hindus in 2001, have now been reduced to 40% Hindus in 2011. Finally, in the Reasi tehsil of (current) Reasi district, Muslims grew by an astonishing 77%. Hindus have been growing south of the Chenab, though. Hindu proportion grew by 2% in Bhaderwah (Doda) and by 2% in (current) Udhampur district. Higher Hindu growth may indicate the relocation of Hindus south of the Chenab where they are in higher numbers. A polynomial model based prediction of Buddhist population in Ladakh shows that the population has peaked in 2011 and set to decrease in absolute numbers in the coming decade. The population stands to fall to <1 lakh by 2031. In Leh district, Buddhists actually shrank from 90,618 in 2001 to 88,635 in 2011, a negative growth of 2.18%, while Muslims grew from 16156 to 19057 – a growth of 17.96% in the same period. With the fall in numbers, the Buddhist population is subjected to pressure from the Muslim population which is steadily rising. In the Kargil part of Zanskar, which is still 98% Indic, there were conversions to Islam recently . The Zanskar Buddhism, which is the last remnant of Buddhism in Kargil region, may well suffer the same fate the other Buddhists of Kargil suffered in the 1800s. Ladakhi Buddhist culture – unique now, with the destruction of the Buddhist culture of Tibet, - stands a good chance of being wiped out from existence, with the falling Buddhist populations and the rising Muslim populations. The maps above show the shrinking of Indic population in both Ladakh and Hill Jammu, especially north of the Chenab. Indic population is shrinking in both districts of Ladakh. And in Hill Jammu, north of the Chenab, in only 2 of the 15 tehsils are the Indics growing. Indeed, in many, Indic population is rapidly shrinking in percentage terms and often, even in absolute numbers. The elimination of Indics north of the Chenab is a distinct possibility in the near future. The template – a crude generalisation, it is true, but a template nonetheless – was that Jammu was Hindu, Ladakh was Buddhist and the Kashmir valley was Muslim. What all these statistics indicate is that both Ladakh and Jammu are shrinking, with only a few isolated Hindu strongholds (like Reasi tehsil of Reasi and Leh and Zanskar tehsils in Ladakh, where Indic population is over 70%) left, and `Kashmir' is growing. These will make Indic positions in Hill Jammu, north of the Chenab and Ladakh untenable. Indeed, this seems to be the Pakistani position. In informal talks with the Chairman of the Observer group of newspapers, RK Mishra, envoy of the then PM, AB Vajpayee, the Pakistani envoy of Nawaz Sharif, Dr. Niaz Naik, had proposed the Chenab river as the boundary between India and Pakistan, with the regions north of Chenab becoming part of Pakistan and the region south becoming India. . It appears that the plan may still be part of the Islamist desired solution. Take Home Message 3: How religious demography will evolve in the overall state of J&K |Actual Indic Percentage||Predicted Indic Percentage in 2061| |Jammu and Kashmir||31.64||31.10||26.16||28.43||22.99| The different projections of Kashmir show that from a high of 35.03% in 1981, the Indic population has fallen back to 31.10 now and is all set to fall further to close to a quarter of the total population. The division of Kashmir, the influx of refugees from Pakistan (and Pakistan occupied Kashmir) and the removal of Pakistan Occupied Kashmir had improved Indic population share in the region, but the higher Muslim fertility rate has wiped out this advantage already and is set to further surge in population. Indic population grew at a healthy 19% between 2001 and 2011, but it was outstripped by the Muslim population which grew by 25% in the same period. Higher Muslim fertility, and falling Hindu fertility are set to skew the demographics further in the region. However, a question may be genuinely posed as to why the province is Muslim majority at all, when it has been under Muslim rule for less than five centuries (from 1339 to 1819). On the other hand, Telangana and Avadh, which have been under Muslim rule for 500 years and 600 years respectively, never had more than 15% and 20% Muslims respectively. One possible cause of Islamisation of Kashmir may have been the fact that large numbers of Afghan settlers (estimated at 25% of the population of Kashmir in 1901 ) have settled down in Kashmir from early on and the lack of a strong nearby enemy once the land had been conquered, which made it easy for them turn the Kashmir valley into their private land and dominate it in such a short period. In some ways, this parallels the colonisation of lower Assam. In just a century of large colonisation from old united Bengal and now Bangladesh, large areas of lower Assam have been rendered Hindu free. . Further, this influx of Afghans and Pathans has continued unabated for all subsequent times. In 1954, Sheikh Abdullah granted citizenship to 1 lakh Pathans . Similarly, Muslim refugees of Tibet and Xinjiang were granted citizenship . In contrast, Hindus of West Punjab, who came to India between 1947 and 1971 have been denied citizenship rights still . The continuous influx of foreigners, especially Afghans, makes it more likely that Kashmir was converted by colonisation than by outright conversion. The exodus of the Kashmiri Hindus has led to many questions about how many Hindus there really were in Kashmir and how many fled. In this article, we will try to answer those questions from purely statistics and known demographics. In 1941, Hindus constituted 5.44% of the valley (4.95% including Muzaffarabad) and a total population of 86,000 persons, out of a total population of around 1.5 million. Between 1941 and 1961, the total population of Jammu And Kashmir State grew from 2.9 million to 3.6 million. Assuming the same rate of growth of the Hindu and Muslim populace between 1941 and 1961 (until 1962, when family planning was started on a wide scale, indeed the growth rates of Muslims and Hindus did not differ much), we get a total of 107,000 Hindus in 1961. Similarly, there were also around 27,000 Sikhs in two regions in 1941. Assuming that they grew at the same rate as the state average, there should have been around 45,000 Sikhs in 1961. Yet, in 1961, there were 106,000 Hindus and Sikhs in the Kashmir valley, showing a net deficit of ~34,000 Hindus and Sikhs. Indeed, this is observable in the combined Baramulla and Muzaffarabad districts, where from 6.5% in 1901, the Hindu and Sikh population fell to 2.4% in 1961. In 1981, there were 33,000 Sikhs out of the total Hindu and Sikh population of 157,000 people. Estimating the population of Sikhs in 1961, using the 1981 population, one gets the Sikh population to be around 20,000 Sikhs in 1961. Hindus seem to have suffered a loss of around 20,000 in this time. The state's population grew from 3.56 million in 1961 to 12.54 million. The total number of Hindus and Sikhs has shrunk from 106,000 Hindus and Sikhs in 1961 to 80,000 Hindus and Sikhs in 2011. Of this, the Sikhs constitute approximately 56,000 persons in the Valley, leaving around 24,000 Hindus left in the entire region in 2011, or approximately 0.3% of the population. Thus from a healthy 5.2% of the total population in 1901, Hindus have fallen to 0.3% of the population in the Kashmir valley. How many Hindus have been expelled from the region? If we assume that 20,000 of the population in the valley in 1961 was Sikh, then the total Hindu population was 86,000-91,000, which represents a loss of 16,000-21,000. The population of the Valley grew from 1.89 million in 1961 to 6.9 million in 2011, or roughly 3.65 times. In contrast, we shall assume that the Kashmiri Hindu population grew a two thirds to four fifths that rate, or from 107,000, to 261,000 (this is clearly a lower bound on the growth of the Hindus of Kashmir, and assuming a 2/3 of the Muslim growth rate accounts for the fact that the Hindus of Kashmir may have shown lesser natural growth than the Muslims of Kashmir given that the former were less educated) or 312,000 (assuming 80% of the Muslim growth). The total number of exiled population of Kashmiri Hindus is consequently, anywhere between 237,000 and 287,000 (depending on the growth rate one assumes for the Kashmiri Pandits). The policies followed by the Government of Kashmir have not only led to the expulsion of the Kashmiri Pandits, but also led to the destruction of their cultural heritage. The Kashmiri language has been killed, by the imposition of the Urdu script for it, in place of the traditional Sharada script. The consequence of this has been that an entire generation of Kashmiris has been cut off from their own literary heritage, as all Kashmiri literature is in Sharada script, which only few of the current generation can read at all. Not only have the Kashmiri Pandits been physically eliminated from the Valley, but their cultural and literary heritages have also been coldly erased. Statistical Predictions of the Various Districts – Details: We have predicted the future populations using three standard techniques, viz, the constant growth model, the polynomial model and the logistic model. All three have been employed to predict the population growths till 2061. Constant Growth Model: In the constant growth model, we have assumed that the average growth of the different communities over the last decade will hold in future and predicted future populations based on this hypothesis. In this case, we have not used the last 2 decades since there was no census in Kashmir in 1991. From the results, one can see that the Indic population proportion is set to fall in three of the four regions. The rise of Indic population in Udhampur is more likely an anomaly. The Muslim population in the region grew by 12% while the Indic population grew by 16% in the district. This, however, contradicts the longer term population trends in the district. It must be seen as an outlier and exception, consequently. However, Ladakh, Doda and Poonch are all Indic minority till 2061 in this model. Only Udhampur remains Indic majority. In this model, a cubic polynomial is employed to predict the future populations. We believe that this technique is the most accurate, since it can account for both positive and negative population growths that are exhibited in the various districts. In the polynomial technique, we can see that three of the four districts (Doda, Poonch and Ladakh) will be Muslim majority by 2061 (already are even today). The fourth, Udhampur, is set to lose Indic population share and fall to the 70% mark (or thereabouts). In this logistic model, we try to fit a logistic curve to the data points, minimising the square error in the process. We do not believe that this technique is a good fit for the region that is showing rapid changes in populations. However, for the sake of completeness, we have included this technique in our examination too. In this technique too, the districts that are Muslim majority and Indic majority remain the same as in the case of the polynomial. However, the predictions of Udhampur show a Hindu population share value that is too low because the logistic model is unable to take into account the rapid changes in the pace of growth of the populations of the various communities in the region. Similarly the Hindu population share of Doda is too high for the same reasons. Finally, the Ladakh values are also too high, because the technique assumes that the Hindu-Buddhist population of the region will stabilise (see fig. below) whereas, in fact, the Buddhist population has already begun to fall. The technique simply cannot cope up with the rapidly changing growth rates. Consequently, we have given less weightage to the results from this prediction technique. Jammu and Kashmir – Statewise Predictions: We have predicted the population of Jammu and Kashmir by all three afore mentioned techniques. We can see that the Indic population is set to fall in all three techniques, even while all the three techniques show slightly different predictions of the populations of the Indics. The likely population of Indics will be between 25 and 28% in 2061. Jammu and Kashmir shows that the Indic population is set to fall to from 35% at the peak (in 1981) to nearly 25% in 2061. Ever larger areas of Hill Jammu are all set to become more Muslim and the Indics are in a retreat across both Ladakh and Hill Jammu. The implications for security of the Indics of Hill Jammu will become more critical and stark. The authors are very grateful to Sunanda Vashisht for her insightful comments on the Kashmiri Hindu numbers and the status of the Kashmiri language in the Kashmir Valley. (The article has been co-authored by Shanmukh (@maidros78), Vikram (@TrueIndology), Aparna ((@a_r_j_u_n), Saswati Sarkar (@sarkar_swati) and Dikgaj (@dikgaj))
<urn:uuid:20a4b5c1-e9f7-48df-b75c-62adadcd315c>
CC-MAIN-2023-14
https://www.myind.net/Home/viewArticle/demographic-expansion-kashmir-and-shrinking-jammu-and-ladakh
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00016.warc.gz
en
0.952463
5,480
3.015625
3
As a way of experiencing the Humanities beyond your classroom, computer, and textbook, you are asked to do a certain type of “cultural activity” that fits well with our course and then report on your experience. Your instructor will require you to propose an activity and get instructor approval before you do it and report on it (students should look for any instructions in that respect). Every effort should be made to ensure that this is a hands-on experience (not a virtual one), that this activity fits the HUM 111 class well, and that the activity is of sufficient quality for this university course. The two (2) key types of activities are a museum visit or a performance. Note: This must not be a report on the same activity (and certainly not the same report) as done for another class, like HUM 112. For instance, one might go to the same museum as done for HUM 112, but this HUM 111 report will focus on entirely different works and displays. - Visit a museum or gallery exhibition or attend a theater or musical performance before the end of Week 10. The activity (museum or performance) should have content that fits our course well. Have fun doing this. - Write a two to three (2-3) page report (500-750 words) that describes your experience. - Clearly identify the event location, date attended, the attendees, and your initial reaction upon arriving at the event. - Provide specific information and a description of at least two (2) pieces (e.g., art, exhibits, music, etc.). - Provide a summary of the event and describe your overall reaction after attending the event. - Use at least the class text as a reference (additional sources are fine, not necessary unless required by your content). Your report should include connections you make between things observed in your activity and things learned in the course and text. Note: Submit your cultural activity choice to the instructor for approval before the end of Week 5 (earlier is even better). Look for guidance from the instructor for how or where to make your proposal. You may also seek advice from your instructor (provide your town/state or zip code) for a good activity in your general area. Visiting a Museum - It makes sense to approach a museum the way a seasoned traveler approaches visiting a city for the first time. Find out what there is available to see. In the museum, find out what sort of exhibitions are currently housed in the museum and start with the exhibits that interest you. - If there is a travelling exhibition, it’s always a good idea to see it while you have the chance. Then, if you have time, you can look at other things in the museum. - Every effort should be made ahead of time to identify a museum that has items and works one can easily connect to our HUM 111 class and book. Since HUM 111 covers from ancient times to the 1500s AD, it makes more sense to focus on items from that time frame. In general, museums with artistic cultural artifacts and fine arts work better than history museums. - Any questions about whether a museum-visit activity fits the course and assignment well enough will be decided by the instructor when the student seeks approval for the activity. Any alternative activity outside the normal ones listed here, such as for those limited by disability or distance, will be determined by the instructor. Generally, we do not expect students to travel over an hour to get to an approved activity. - Take notes as you go through the museum and accept any handouts or pamphlets that the museum staff gives you. While you should not quote anything from the printed material when you do your report, the handouts may help to refresh your memory later. - The quality of your experience is not measured by the amount of time you spend in the galleries or the number of works of art that you actually see. The most rewarding experiences can come from finding two (2) or three (3) pieces of art or exhibits which intrigue you and then considering those works in leisurely contemplation. Most museums even have benches where you can sit and study a particular piece. - If you are having a difficult time deciding which pieces to write about, ask yourself these questions: (1) If the museum you are visiting suddenly caught fire, which two (2) pieces of art or exhibits would you most want to see saved from the fire? (2) Why would you choose those two (2) particular pieces?
<urn:uuid:0897de2e-2773-4470-ab09-0f066f534afc>
CC-MAIN-2018-39
https://www.precisionessays.com/cultural-activity-report/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157351.3/warc/CC-MAIN-20180921170920-20180921191320-00521.warc.gz
en
0.946246
919
2.609375
3
Nelson Mandela (Rolihlahla Mandela; b. 18 July 1918) was born in the Transkei region of South Africa, in the small village of Qunu - a collection of beehive-shaped huts with thatch roofs, known as rondavels. mother, Nosekeni Fanny, was the third wife of Gadla Henry Mphakan-yiswa, a councillor to the Thembu king and a member of the Xhosa tribe. His father had four wives and thirteen children (four boys and nine mother had three huts and Mandela lived with her and his three immediate sisters. One hut was used for sleeping, another for cooking and the third for storing grain and other food. Everyone slept on mats on the ground, without pillows. His mother, as a married woman, had her own field to tend and her own cattle kraal - an enclosure for cattle made from Mandela, who started school when he was seven, was given the name Nelson by a Methodist teacher, purportedly after the British admiral Horatio His father died of tuberculosis when he was nine and the Regent, Jongintaba became his guardian. In Xhosa society that was the natural thing to do. Jongintaba was the head of the Madiba clan. In terms of custom, all members of the clan were treated like people in the same family because they were all descended from the same ancestor. Mandela, or anyone else, could go to the home of any fellow Madiba member, whether in the same village or in a village miles away, and know that he would get food and At 16, as is the Xhosa custom, Mandela went to a circumcision school on the banks of the Bashee River, the place where many of his ancestors were circumcised. By the standards of his tribe, he was now a man ready to take part in the 'parliament' of the tribe Imbizo. When Mandela was nineteen he went to the Wesleyan college in Fort Beaufort. After matriculating he went to Fort Hare University where he was befriended by Oliver Tambo. Before finishing his course Mandela left for Mandela's flight to Johannesburg Mandela recalled, "At 23, my guardian felt it was time for me to get married. He loved me very much and looked after me as diligently as my father had, but he was no democrat and did not think it worthwhile to consult me about a wife. He selected a girl, fat and dignified, paid lobola and arrangements were afoot for the wedding. I escaped In Johannesburg he found temporary employment as a mine guard. Shortly after, his friend and lawyer, Walter Sisulu, helped him find work as an articled In 1944 Mandela joined the African National Congress (ANC). That same year he married Evelyn Ntoko Mase, who, like Mandela, was from the Transkei. They had three children, but they broke up in 1957 under the dual strains from his devotion to revolutionary agitation and her devotion to her faith as a Jehovah's Witness. Mandela completed his degree at the University of South Africa (UNISA) via correspondence, after which he started with his law studies at the University of Witwatersrand. During this time Mandela lived in the Alexandra township. In 1948 the Afrikaner-dominated National Party came to power with its apartheid policies of White Mandela was prominent in the African National Congress (ANC) Defiance Campaign (1952) and the Congress of the People (1955 ) where the Freedom Charter was first adopted. this time Mandela and Oliver Tambo operated the law firm of Mandela & Tambo, legal counsel to many blacks who would otherwise have been without legal Mandela and 150 others were arrested in December 1956 and charged with treason. The marathon Treason Trial of 1956–61 followed, but all were acquitted. married Winnie, daughter of Columbus Madikizela, the Minister of Agriculture in the Transkei, in 1958, whilst an accused in the Treason Trial. He had two children with Winnie. She was twice detained under the Terrorism Act and repeatedly arrested whilst her husband was imprisoned. (Their marriage was to end in separation in 1992 and divorce four years later, fuelled by political estrangement.) the massacre at Sharpeville in March 1960, and the subsequent banning of the ANC and many other political organisations, the ANC took up armed Albert Luthuli, criticised at the time for inertia, was peripheralised, and the ANC used the 1961 Conference for Mandela to issue a dramatic call to arms, announcing the formation of Umkhonto we Sizwe (translated as Spear of the Nation and commonly abbreviated to MK). In January 1962 Mandela toured Africa and visited England. In all these countries he met the Heads of State or other senior government officials. In England he was received by Hugh Gaitskell, then leader of the Labour Party, and by Jo Grimond, leader of the Liberal Party. became leader of MK and co-ordinated a sabotage campaign against military and government targets, and made plans for a possible guerrilla war if sabotage failed to end In August 1962 Mandela was arrested and imprisoned after living on the run for seventeen months - he was known as the Black Pimpernel. In October 1962 he was sentenced to five years, charged with leading workers to strike in 1961 and leaving the country illegally. While Mandela was in prison, police arrested prominent ANC leaders in July 1963, at Liliesleaf Farm, Rivonia, north of Johannesburg. was charged with sabotage and other offences in the Rivonia Trial and on 14 June 1964 was sentenced, along with Ahmed Kathrada, Raymond Mhlaba, Andrew Mlangeni, Elias to life imprisonment on Robben Island. Dennis Goldberg was the only white person found guilty and was sentenced to life imprisonment in a white prison in Pretoria. 20 April 1964 Mandela opened the defence case in Pretoria Supreme Court by saying, "During my lifetime I have dedicated myself to the struggle of the African people. I have fought against white domination, and I have fought against black domination. I have cherished the ideal of a democratic and free society in which all persons live together in harmony and with equal opportunities. It is an ideal which I hope to live for and to achieve. But if needs be, it is an ideal for which I am prepared to die." Bram Fischer led the defence and Harold Hanson was brought in at the end of the case to plead mitigation. All except Rusty Bernstein were found guilty, but they escaped the gallows and were sentenced to life imprisonment. was imprisoned on Robben Island where he was destined to remain for the next 18 of his 27 years in prison. It was there he wrote the bulk of his autobiography, Long Walk to In 1980 a statement by Mandela was smuggled out of Robben Island, which read, "Unite! Mobilize! Fight on! Between the anvil of united mass action and the hammer of the armed struggle we shall crush apartheid!" an offer of conditional release in return for renouncing armed struggle in February 1985, Mandela remained in prison until the resounding national and international campaign to "Free Nelson Mandela!" culminated in his release on 11 February 1990 and the unbanning of the ANC (ordered by State President Frederik de Klerk). On the day of his release, Mandela made a speech to the nation and the world from the balcony of Cape Town city hall, "Our resort to the armed struggle in 1960 with the formation of the military wing of the ANC was a purely defensive action against the violence of apartheid. The factors which necessitated the armed struggle still exist today. We have no option but to continue. We express the hope that a climate conducive to a negotiated settlement would be created soon, so that there may no longer be the need for the armed struggle." South Africa's first free elections were held on 27 April 1994. The ANC won the majority in the election, and Mandela, as leader of the ANC, was inaugurated as the country's first black State President, with the National Party's de Klerk as his deputy president in the Government of National Over the next five years Mandela presided over the transition from white minority apartheid rule to black majority 1999, on his 80th birthday, he married Graça Machel, widow of Samora Machel, the former Mozambican president who had been killed in an air crash 12 years before. After his retirement as President in 1999, Mandela went on to become an advocate for a range of social and human rights organisations, including his own Nelson Mandela failing health led him to announce in 2004 that he would be retiring from public life. He continues to make occasional exceptions, particularly when speaking out on HIV/AIDS or on child health. His son Makgatho died of AIDS in January 2005. In South Africa Mandela is often known as Madiba, a title adopted by elders of Mandela's clan. The title has come to be synonymous with Nelson Mandela. Many South Africans also refer to him reverently as 'mkhulu' meaning old man or grandfather.
<urn:uuid:7eddea02-3392-41d9-ad29-c96715bb84f8>
CC-MAIN-2015-06
http://www.southafricaholiday.org.uk/history/le_nelson_mandela.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115856115.9/warc/CC-MAIN-20150124161056-00262-ip-10-180-212-252.ec2.internal.warc.gz
en
0.966553
2,112
2.921875
3
The Geotechnical Engineering research program undertakes research on a range of topics, including: - Reliability of site investigations, including investigation of building sites based on numerical simulations of variable soil conditions; case studies to verify modelling; a practical framework for planning and implementing geotechnical investigations, based on the variability of the soil profile; awareness of the importance of site investigations, which are linked to the risk of foundation failure and cost of overdesign. - Artificial neural networks in geotechnical engineering including artificial intelligence with superior predictive performance; settlement of shallow foundations in coarse grained soil; the load settlement characteristics of single piles; bearing capacity of shallow foundations on multilayered soils; slope stability of layered, spatially variable soil embankments. - Phytocaps as an alternative landfill cap including capping landfill to control percolation of water into the waste, promote surface runoff, minimise erosion, control odour and prevent the occurrence of disease vectors; capping landfill for gas containment and capture; using local soil and a vegetative cover to minimise percolation by means of evapotranspiration (phytocap). This research is also being applied to the control of spontaneous combustion in open pit coal mines. - Impact of rolling dynamic compaction including ground improvement technology using a non-circular roller (i.e. a triangle, square or pentagon) which is towed behind a tractor at moderate speed; and the effectiveness of rolling dynamic compaction. - Rock slope stability assessment assessment using both deterministic and probabilistic approaches, with the incorporation of rock mass discontinuities in the form of a fracture model. - Borehole stability assessment and remediation for deep drilling and drilling in unconsolidated ground. Rolling dynamic compaction Case studies of some of our research impacts are the following:
<urn:uuid:98f22e05-eab9-47ae-895a-bd50635573ab>
CC-MAIN-2017-39
http://www.ecms.adelaide.edu.au/civeng/research/mining/geotech/geotech.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690228.57/warc/CC-MAIN-20170924224054-20170925004054-00652.warc.gz
en
0.896955
377
2.734375
3
To celebrate the day, Jennelle from our DSA Regina office put together some interesting facts pertaining to the timeless wonder that is radio! The radio was invented in 1895, but the first advertisement didn’t appear on air until the 1920’s and is one of the oldest forms of advertising there is. Through the years, many have thought that the radio industry was going to die, with different options becoming available such as: iPods, satellite radio, streaming services, etc. However, today an average of 91% of Canadians listen to the radio at least once per week. Canadians spend an average of 19.2 hours per week listening to the radio. Needless to say, radio isn’t going anywhere anytime soon, and since today is National Radio Day, we thought it would be the perfect opportunity to celebrate radio. Here are the top 5 benefits of including radio in your advertising efforts: - Hyperlocal – Consumers see radio as a local medium where they can get the local news, weather, sports updates, etc. People often feel as though they have a personal connection with the station they frequently listen to, based on the format as well as the on-air personalities. - Timely – Day-parting your ad placements is a great way to ensure you are reaching your target audience at precisely the right time. Are you a restaurant who has a different message depending if it’s breakfast, lunch, or supper? With radio, you can air your ads during the time of day that makes the most sense for the message. Are you a local retailer who’s having a one day sale? Drive traffic to your store by creating urgency with your messaging, “today only!”. - Provides strong frequency – Typically people have a station of choice that they tune into more frequently than others. Because of this, it ensures that your message is being heard by the same person multiple times, creating frequency amongst your desired target audience. - Provides rural reach – Radio is a great way to get your message into rural markets that are often hard to reach with other mediums. In Saskatchewan, for example, farmers listen to 6-10% more hours of radio per week than those people living in cities. This is, again, likely due to the hyperlocal content as they seek out information like weather and Ag reports through-out the day. Rural audiences are also more likely to spend time in their vehicles, as they may need to commute for groceries, gas, work, etc. - Highly targetable – Radio is quite segmented since there are so many different station options in each market to listen to. People typically choose their stations based on the format or on-air personalities of each particular station. Because of this segmentation, advertisers have the ability to choose the stations based on the target audience of listeners to ensure they are reaching the right audience. For example, News/Talk stations often skew to an older demographic, rock stations skew to a male audience, while a top hits station is going to skew to a female 25-45 audience. Depending on the message of your campaign, you can tailor your advertising placements based on the audiences of each station. Contributor: Jennelle Gervan – DSA Regina
<urn:uuid:fbafc40f-3f70-42e1-8edb-7051a62bd4a2>
CC-MAIN-2022-49
https://www.mediologymedia.com/happy-national-radio-day/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711077.50/warc/CC-MAIN-20221206092907-20221206122907-00283.warc.gz
en
0.95863
661
2.546875
3
The James Webb Space Telescope (JWST) is set to launch into orbit a whopping 930,000 miles (1.5 million kilometers) from Earth in 2018 [source: JWST]. It's set to observe some pretty spectacular science in the process: The JWST is designed to help us look far into the depths of the universe and help us understand the very early beginnings of galaxies, stars and planets. If you are up-to-date on your supersensitive telescopes, you might be frowning and harrumphing that Hubble already did that. Why the repeat? First off, life is short — let's not get all worked up about telescopes that haven't done us any harm. Second, NASA is quick to point out that JWST isn't just a replacement for Hubble; it's designed to look at space a little differently. Despite its similar mission to Hubble, JWST is equipped with some new technology and advancements that are going to let us probe a little deeper into the universe and collect images with more precision. The biggest change from Hubble? Instead of observing in the visible and ultraviolet spectrum, JWST will be performing almost all of its observations in infrared. Because infrared wavelengths are so obviously superior, right? Hmm. That doesn't check out. Why the heck does it matter that the Webb is looking at the infrared spectrum? There are several reasons that infrared is ideal for JWST, and each one fits nicely into some goals of the telescope's mission. For one, JWST is going to study nebulae — big, dusty clouds where stars are born. And while nebulae are gorgeous, scientists are not thrilled that they do a great job of obscuring the stars and the space around them. Infrared lets us look into those pretty clouds and get a better look at early star formation [source: Masetti]. Scientists also want JWST to get a good glimpse at some early galaxies. Here's one problem with "looking" at early galaxies: The farther back we look, the light that was once visible or ultraviolet has now become harder and harder to see by the time it has reached us. The light has now gone through a redshift and is only visible on the infrared spectrum. Got an infrared telescope? You can now see the first bright objects in the universe [source: Masetti]. One more infrared advantage: It can help us determine the atmospheres of exoplanets, our cosmic cousins that orbit other stars. JWST will be doing spectroscopy of those exoplanets by making detailed measurements of certain lights at different wavelengths or energies. Certain elements will give off different energies; by looking at the absorption spectrum, you can see what molecules are present in the atmosphere. Infrared can show a larger number of spectral features than can visible or UV wavelengths [source: Masetti].
<urn:uuid:528a5714-6686-4f6d-9f9f-b057de796d22>
CC-MAIN-2017-13
http://science.howstuffworks.com/jwst-infrared.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189686.56/warc/CC-MAIN-20170322212949-00481-ip-10-233-31-227.ec2.internal.warc.gz
en
0.950314
585
3.359375
3
This paper discusses the research and design of ‘Sustainer’ a reminder-based, behavior-change mobile application ( app ) paired with a re-usable container meant to help reduce waste caused by disposable to-go food containers. The project is the collaboration of communication design student Kieran Wallace and industrial design student Andreas Eiken of Emily Carr University of Art + Design. Together we developed a behavior change service that encourages users to bring their reusable food containers with them when they are eating on the go. There is a large opportunity space within the zero waste initiative in the city of Vancouver. Packaging represents approximately one third of municipal waste in the United States. In tackling the zero waste initiative it meant that the project had to go through many iterations requiring primary and secondary research, video sketching, and an introduction to the idea of ‘the internet of things,’ or meta products. The project’s outcomes exemplify the three r’s of reduce, reuse and recycle. The City of Vancouver in British Columbia is attempting to be the greenest international city by 2020. One of the many goals is to “reduce solid waste going to the landfill or incinerator by 50%.” According to the U.S. Environmental Protection Agency in 2010 roughly 250 million tons of trash entered landfills in the United States alone. There have been a number of local projects that serve as precedents for this problem space including the ‘Tiffin Project’ of Vancouver and ‘Go Box’ a similar system founded in Portland, Oregon. The design intention for Sustainer was to make eating on the go easier by providing the user with a container and the support to maintain usage of it. The container and app would come bundled in one package at a set fee. The user would purchase the container and activate the app by entering a unique download code into a smartphone. There are several barriers to eating on the go with a personal container. Forgetting the container is the first issue. The research question asked: can a food container become part of the everyday things we carry like keys, a water bottle, or our phones? A second barrier is the issue of leakage. A trust issue exists with current containers and their ability to create a perfect, hermetic seal. It is generally understood that we all carry things in our bags that are far too valuable such as a smartphone or tablet to risk a tomato soup spill. The third issue with reusable food containers is their difficulty in transportation. Many of the current container designs do not accommodate a majority of different bag forms. The opportunity lies in resolving these three major issues through developing a system in which a container has a close relationship with a phone, something we carry with us everywhere. This system will in turn encourage sustainability within the context of eating, particularly on-the-go. Initial Preliminary Research The preliminary research for this project consisted of several phases. Various user-centred approaches were used in exploring the inquiry. A service safari was conducted in order to create user journey maps to develop a sense of how a member of the public might interact while taking their food to go. A number of expert interviews were conducted as well. Participants came from diverse fields such as city government, business, sustainability, and the restaurant industry. During the initial stages of design research for the project it was realized that the Student Union at Emily Carr University had a great example of a to-go solution. Their ‘Mug Wall’ is a centralized wall where mugs are hung and made accessible to share among the students. It has been in operation for over a year. We approached the Union to see if they could use the mug wall as a testing ground for the sustainer concept. There was one key problem in the way the mug wall was set up; it was too centralized, offering only one location for drop-off and pick-up. From the 200 mugs the union purchased in the fall of 2012, only about 40 remained on the wall after over a month of use. The research around the mug wall attempted to increase the return rate of mugs to inform a shared food container concept. After consulting with the student union about their system, and talking to people that use the mug wall, it was decided to install five collection points around the university. After consolidating the information gathered from interviews, statistical research, and precedent studies it was apparent that the most efficient solution for Sustainer was to put the onus on the user and develop a support system for them to maintain usage of their own container. System Design with Video Sketching Video sketching is a simple and quick method of rapid prototyping displaying accurate context along with different scenarios of how a user might interact with a product and/or system. Communicating a rich interaction between a user, a product, and a smartphone proved to be more difficult than anticipated. Maps, diagrams and other two-dimensional communication methods were deployed to try and communicate to instructors, friends and the public how the Sustainer system worked. After getting feedback it was realized that these methods were not getting the ideas across effectively. Video sketching then became the most obvious way to better understand the interactions users would have with the product. This form of rapid prototyping and visualization was fundamental to getting a handle on what elements of the system had holes and which elements seemed flushed out. Video sketching was helpful in showing the context along with how the user would ideally interact with the product and system. It was also extremely versatile as it could easily be shown on a computer, tablet or even phone for quick feedback. Behaviour Change Through Interaction While developing the main intervention point of the app, we looked at three possible options. First, when the user is at home; this is where we keep all of our belongings and where we spend the most time. Testing was done around receiving a reminder when the user leaves their home. The prompt would be a simple reminder telling them to bring their container. It was observed that when in a transition mode like leaving the house, the user was less susceptible to reminders and less likely to stop and follow through. The second intervention point was at the workplace. The issue here is that the chances of the user not having their container is much higher. This poses a problem when structuring the entire system around reminders. The third option was to intervene at the restaurant itself. The decision was made to focus on the restaurant as the primary time for Sustainer to intervene. When going to a restaurant, it was noted that users tended to be in a mindset of choice-making. When entering a restaurant the user has decided what restaurant to eat from and what food to eat. As such why can’t we also choose how to make that particular meal more sustainable? One of the exciting features that enables the Sustainer app to work in this area of intervention is a technology often referred to as ‘geofencing.’ Geofencing uses GPS (Global Positioning Systems) and other location based technologies to set up a digital boundary around a physical location. In the context of the Sustainer app, the user would geofence frequented restaurants so that the app would recognize when they entered the restaurant and send a prompt. Many precedent mobile applications were studied including Nike Plus, The Jawbone Up, Fitbit, and several others. These ‘meta products’ helped to inform the interaction the user would have with Sustainer. The Internet of Things During the early stages of iteration for the application, information was gathered from the book Meta Products. This book was instrumental in defining the interaction the user would have with their phone and the container and ultimately find the link the two shared. The book speaks to the idea of the Internet of things, where this vast digital network is translated from our screens into the products we love and use every day. This opens a whole new world for interaction, graphic, and industrial designers. A great precedent of this is Nike Plus, a system in which the user inserts a special tracking chip into their shoe, and allows access to real-time feedback about their run via their smartphone. The app also acts as a social platform where the user can post their run times, routes, and more to Twitter or Facebook. Once the general framework for the Sustainer app was laid out as well as the general physical dimensions and attributes of the container, the most challenging iterative process came when trying to push the link between the mobile application and container; they were great stand-alone products, but they lacked a relational dynamic. The Intersection of Digital and Physical Interaction The goal was to change the initial notion of ‘app plus container’ into ‘app equals container’. The first efforts towards this was the integration of a ‘smart’ element into an accessory for Sustainer. Either a fork or a strap were considered and would have become ‘smart’ by the implementation of RFID (radio frequency identification) technology. We decided to instead challenge this notion of literal smart smart technology and develop the link through a visual and tactile relationship. This direction would also avoid accessories becoming lost or damaged. The approach was to make the physical features and movements of the container be directly mirrored in the interactions of the app. This way the app and container became linked via their use and experience, not through an embedded chip. If someone interacts with the app on their phone, they should be able to pick up the container and intuitively use it as well. Design is an ever-evolving profession; with new technologies and hardware constantly being updated and released, it is the role of the designer to use these evolving technologies to stimulate how users use and interact with their products. There is a level of responsibility by the designer in this sense. The products that are successful will introduce different behaviors throughout culture. Multidisciplinary collaboration and iterative prototyping were instrumental to the finding of an effective solution. - City of Vancouver, Greenest City: 2020 Action Plan, 2012. Retrieved from: http://vancouver.ca/files/cov/Greenest-city-action-plan.pdf. - Córdoba, R.S., Hazenberg, W. and Huisman, M. Meta Products: Meaningful Design for Our Connected World. BIS, Amsterdam, 2011. - Franklin Associates. Characterization of Municipal Solid Waste in The United States: 1998 Update. U.S. Environmental Protection Agency Municipal and Industrial Solid Waste Division, 1999.
<urn:uuid:ba829d52-9e53-4e52-8fd4-3e2fbfeb5711>
CC-MAIN-2020-29
https://current.ecuad.ca/sustainer
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138752.92/warc/CC-MAIN-20200712144738-20200712174738-00328.warc.gz
en
0.964513
2,146
2.625
3
report by: Koen Wullus & Sebastien Mousty Base aérienne 133 Nancy-Ochey is a front-line French Air Force base located approximately 11 km west-southwest of Neuves-Maisons in the Département de Meurthe-et-Moselle, France. Ochey airfield was of particular importance to air operations during the latter stages of World War I. From 1917 onwards, No. 41 Wing of the Royal Flying Corps was flying a considerable number of sorties against strategic targets in Southwest Germany. It was also used by No. 3 Wing Royal Naval Air Service. The base was seized by the Germans in June 1940 during the Battle of France. The Luftwaffe, however did not station any flying units at the airfield until April 1943, when a glider unit, Luftlandegeschwader 2 (LLG 2), equipped with Heinkel He 111s medium bombers being used to tow Gotha Go 242 transport gliders. LLG 2 moved out in June, being replaced by Luftlandegeschwader 1 (LLG 1) in September 1943, equipped with Dornier Do 17/DFS 230 gliders. Nancy Air Base was liberated by Allied ground forces about 20 August 1944 during the Northern France Campaign. Almost immediately, the USAAF IX Engineering Command 826th Engineer Aviation Battalions began clearing the airport of mines and destroyed Luftwaffe aircraft, and repairing operational facilities for use by American aircraft. Subsequently, it became a USAAF Ninth Air Force combat airfield, designated as Advanced Landing Ground. During the early years of the Cold War, the French Government allocated Ochey airfield to the United States Air Force as an emergency NATO Dispersed Operating Base for its fighter aircraft stationed in France in the 1950s and 1960s. In French control after the war, Nancy-Ochey Air Base was completely rebuilt. The wartime east-west (07/25) concrete runway, severely damaged by the war was removed, and a modern 8000′ asphalt jet runway was laid down 01/19. In addition, three circular marguerite system of hardstands that could be revetted later with earth for added protection were laid out, two on the north end of the runway and one on the south. Each margueriete consisted of fifteen to eighteen hardstands around a large central hangar, with each hardstand capable of one or two aircraft, and allowed the planes to be spaced approximately 150 feet (46 m) apart. Each squadron was assigned to a separate hangar/hardstand . Today, Nancy Air Base is a front line French airfield, well equipped, flying state of the art aircraft. It is the home of EC01.003 ‘ Navarre ‘ with 3 squadrons of Dassault Mirage 2000D multirole fighters. The Dassault Mirage 2000N is a variant of the Mirage 2000 designed for nuclear strike. It forms the core of the French air-based strategic nuclear deterrent. The Mirage 2000D is its conventional attack counterpart. Dassault has also developed the Mirage 2000D, which is a development of the Mirage 2000N designed for long-range precision strikes with conventional weapons. This aircraft is exactly the same as the Mirage 2000N, but introduces support for conventional attack missiles such as the Apache and Scalp missiles, as well as the AASM weapons. The first aircraft, converted from the Mirage 2000N prototype, flew on 19 February 1991, and the French Air Force ordered a total of 86 aircraft. On June 30th and July 1st, 2018, a Meeting de l’Air was held on the “Base aérienne” 133 of Nancy-Ochey. The airshow did not bring a lot of foreign visitors, but the Armée de l’Air and other French Military Forces brought their front line equipments to the Airshow. The most special visitor was the last Mirage 2000N ‘357-125-CO’ wearing a nice looking special scheme. The event also marked the last official appearance of the Mirage 2000N before its final retirement. As expected from the French Air Force, their well-known tactical display team “Couteau Delta” as well as the Rafale Solo Display did a great job. But also notable were the other displays as well as a few interesting arrivals before the airshow for static displays. As it is now common with the FOSA Airshows ; we had for the flying display, a balanced mixture of preserved flying Aircraft and modern warfare.
<urn:uuid:d0fad1ce-cca5-4063-8256-3d6b9fe9c934>
CC-MAIN-2019-35
http://globalairpower.net/nancy-ochey-2018-airshow/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316075.15/warc/CC-MAIN-20190821152344-20190821174344-00126.warc.gz
en
0.965306
942
2.703125
3
Winter is the best time to transplant small oak tree seedlings as the trees are dormant. Oak seedlings must be under two years old for a successful move as the taproot on older trees is too deep to be excavated. If the taproot is severed from the tree, the seedling will die. Dig the transplant hole prior to excavating the oak seedling from its current location. The seedling is best removed from the ground when all leaves have fallen from the young tree. According to Douglas D. McCreary of the Integrated Hardwood Range Management Program, the new transplant hole should be at least two times the size of the estimated root ball on the young seedling. In this way the taproot will not be folded over. Loosen the soil inside the new transplant hole. Remove the transplant oak seedling from its current location. The height of the tree and the trunk diameter will give you a good indication as to how deep and wide the root ball must be dug, according to the University of Iowa's Forestry Extension. An oak's taproot is a third to half the overall height of the tree. In other words, if the oak seedling is 2 feet tall the root ball should be at least 18 inches deep. Make adjustments to the transplant hole as needed. Set the transplant into the new hole. Align the topsoil line from the transplant to the current soil level of the new transplant area. Back fill any loose soil around the root ball. Water in the new transplant with the garden hose. Add at least 10 gallons of water to the new transplant to remove any air from around the root ball. Install a wooden stake next to the new transplant if winter weather may cause the upper small trunk to tip over. The transplant may also be weakened by the move. North Dakota State University Extension Service recommends using a piece of twine to tie the trunk to the wooden stake for extra support. Do not place the wooden stake right next to the oak seedling transplant. Instead the stake should be well away from the new root ball of the seedling. If need be, install the wooden stake at an angle to meet the top of the new oak transplant.
<urn:uuid:f834d4e7-11ae-4c1a-83a2-bbb844bc8a1d>
CC-MAIN-2016-40
http://www.gardenguides.com/110106-plant-dormant-oak-trees-winter.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660882.14/warc/CC-MAIN-20160924173740-00003-ip-10-143-35-109.ec2.internal.warc.gz
en
0.909849
444
3.078125
3
How Spammers Get Your Email Address Spammers seem to have supernatural powers that enable them to guess email addresses accurately and quickly. But in reality, spammers harvest email addresses by pretty mundane means. You may even be contributing to the problem without realizing it. Here's the scoop on how spammers get email addresses, and steps you can take to protect your inbox... Is Your Email Address Vulnerable to Spammers? It can be maddening when your email inbox gets a fresh load of spam dumped into it. Equally frustrating is when spammers spoof your address as the sender, and your friends all start asking why YOU are sending them unwanted sales pitches for dubious products. Understanding how spammers get ahold of your email address can help to prevent both of these problems. Using web-crawling "spider" programs (not unlike the ones Google uses to index Web pages) spammers hunt down email addresses by looking for the telltale "@" symbol. Working swiftly and ceaselessly, spiders can harvest millions of email addresses automatically. To avoid being bitten by a spider, don't put your email address on the Web. That means not posting it to online forums or personal web pages. If it's included in online directories (school, work, clubs, etc.) ask to have it removed. Scan the web with a Google search to see where your email address is available, and work towards becoming invisible. If you must make your email address visible in public, you can obscure your address by avoiding the "@" symbol, i.e., use "joe at blow dot com" instead, or create an image with the address instead. "Dictionary attacks" are another standard way to collect email addresses. Spammers generate emails to made-up addresses, accepting millions of bounce-backs in exchange for a handful of replies from valid addresses. That's why the first rule of dealing with spam is "don't reply to it." Doing so just tells the spammer that you are a "live one" and worth hitting with more spam. You can make it harder for a dictionary attacker to guess your address by NOT choosing any combination of dictionary words, common first or last names, and a string of numbers. If your email address is firstname.lastname@example.org or email@example.com I can guarantee that you'll get loads of spam, no matter how careful you are. Those addresses are just easy targets, because they're so easy to guess. With apologies to Jimmy Buffett, some people claim that there's a hacker to blame, but you know, it's your own damn fault sometimes. Many people simply hand over their email addresses, no questions asked, just to get access to a contest, some free program, a ringtone, or other supposed "valuable prize." It's a good idea to have a "throwaway" email address that you can enter into Web forms, rather than using your everyday address. And if you have an email password that's easily guessable, spammers may hack into the email account and steal all of the contacts stored there. If your computer is not adequately protected from viruses, spyware and phishing attacks, all of the people in your email address book are vulnerable to spam attacks as well. See my article Is Your Password Hacker Proof? for help picking a secure password. Some people believe that email forwards play into the hands of spammers, because they accumulate a large number of addresses as the message spreads from one person to another. I'm not so sure this actually works, because there's no easy mechanism for the bloated messages to return to the spammer. But I will certainly agree that blindly forwarding every silly story doesn't contribute anything positive to the Internet. Cambodian midgets fighting lions? Nigerian prince wants your help transferring money? Really?? If you're tempted to forward something that seems dubious, check it out on Snopes.com before hitting the Send button. Hacking into a major company's databases can yield millions of high-quality email addresses at once, not to mention even more valuable data such as credit card numbers, Social Security Numbers, etc. Not long ago, Chase Bank was hacked, and 76 million customer email addresses were exposed. It seems every month another massive data breach makes news, affecting millions of consumers. There's not much you can do to prevent this, except hope that the companies you do business with have good security protocols in place. Spammers also trade in lists of email addresses. A list of a million addresses goes for as little as $100. Some online crooks don't even mail spam, but make their living harvesting and trading email addresses. It's almost impossible to hide your email address from spammers completely. At the least, you'll probably get a blind dictionary attack spam, eventually. But think before you give your email address to any website. The fewer entities that have your email address, the less spam you will receive. Keeping your own computer secured, and encouraging your friends and family to do likewise will also help. Got any additional tips for keeping your email address safe? Post your comment or question below... This article was posted by Bob Rankin on 13 Oct 2014 |For Fun: Buy Bob a Snickers.| Get Organized With Evernote or OneNote The Top Twenty Good News: Windows 10 is Coming! Post your Comments, Questions or Suggestions Free Tech Support -- Ask Bob Rankin Subscribe to AskBobRankin Updates: Free Newsletter Copyright © 2005 - Bob Rankin - All Rights Reserved Article information: AskBobRankin -- How Spammers Get Your Email Address (Posted: 13 Oct 2014) Copyright © 2005 - Bob Rankin - All Rights Reserved
<urn:uuid:c6c96228-b848-49fb-bbd9-ae17f6df4a65>
CC-MAIN-2015-06
http://askbobrankin.com/how_spammers_get_your_email_address.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122222204.92/warc/CC-MAIN-20150124175702-00120-ip-10-180-212-252.ec2.internal.warc.gz
en
0.935307
1,178
2.5625
3
Home Garden Apples (C 740)Download PDF - Site and Soil Requirements - Purchasing Trees - Variety Selection - Standard Trees versus Semi-dwarf and Dwarf Trees - Soil Preparation and Planting - Post-Planting Care - Pruning and Training Apple Trees - Annual Fruit Production through Thinning - How to Pick Apples - Diseases and Insects Apples are adapted to most areas of Georgia. Although the northern half of the state (Zones 1, 2, 3) is best suited for the more "conventional" apple varieties, you can have success in the southern half of Georgia with adapted varieties. Regardless of where you live, if you are not willing to provide timely care for your trees and fruit, then you might be happier in years to come if you choose plants that require less care. Sunlight, and plenty of it, is the key to increasing fruit production. Pick an area where the trees will be in the sun most or all of the day. The early morning sun is particularly important because it dries the dew from the leaves, thereby reducing the incidence of diseases. If the planting site does not get plenty of sun, then you can't expect the best performance from the tree. Although apple trees will grow well in a wide range of soil types, a deep soil ranging in texture from a sandy loam to a sandy clay loam is preferred. Apple trees will not thrive in soil that is poorly drained. Roots will die in areas of poor drainage, resulting in stunted growth and eventual tree death. Conversely, apple trees will also perform poorly on droughty soils. Shoot growth can be stunted, resulting in reduced fruit size and quality. Most fruit plants, including apples, grow best when the soil pH is near 6.5. Since the natural pH of most Georgia soils is below this level, you will need to incorporate lime before planting to raise the pH to the desired level. You can get information on soil testing and liming recommendations from your county Extension office. Check your soil pH about every three years. The soil test report will indicate if additional liming is required. The old adage "you get what you pay for" is an important consideration when buying apple trees. Often, bargain plants are not healthy or may not be a variety adapted to your area. Buy only trees of recommended varieties from a reliable source. Listed below are a few points to keep in mind when purchasing apple trees: - The preferred type of tree for planting is a healthy, one-year-old whip that is approximately 4 to 6 feet tall and has a good root system. - A small tree with a good root system is more desirable than a large tree with a poor root system. - Trees that are two years old or older do not usually grow as well as one-year-old trees. Frequently, older trees do not have sufficient buds on the lower portion of the trunk to develop a good framework. - Do not purchase trees that appear stunted, poorly grown, diseased or insect injured. - Check the trees closely to make sure that you are getting the variety and rootstock that you desire. - Inspect the tree roots to make sure they are in good condition. They should feel firm, not spongy or brittle. Cutting through the surface of the root should reveal white to creamy-colored tissue. A tan or brown color indicates damaged or dying roots. There are apple varieties adaptable to most parts of Georgia. In selecting varieties to plant, determine which Apple Zone you live in (see map). If you live in Zone 5, you should be aware that this area is not ideally suited for apples. In most years, late frost will kill some of the apple flowers on the two varieties recommended for this area, thus reducing the crop. Table 1 lists the recommended varieties for the various areas of the state. Some apple varieties such as Red Delicious and Golden Delicious are also available in various strains. A strain is a mutation of a certain variety selected for an improved characteristic, and vegetatively propagated by grafting. A strain may differ in fruit characteristics, tree characteristics or both. There are many strains of some varieties; for example, approximately 100 different strains of Red Delicious have been described and cultivated. The most common strain difference that the backyard grower needs to be concerned with is spur-strains versus non-spur-strains. Spur-types, because of their compact form of growth, are ideally suited for home gardeners with limited space. Growth on spur-types is more compact as fruit spurs and leaf buds are spaced closer than on non-spur trees. On spur-type trees, twoyear- old wood will usually form fruit buds rather than develop side shoots. Several varieties are available in spur and non-spur strains. As a general rule of thumb, spur strains of the same variety on the same kind of rootstock as non-spur strains will result in trees only 70 percent as large as the non-spurs. Thus, a spur type strain grown on a seedling rootstock will result in a semi-dwarf tree and a spur-type grown on a semidwarf rootstock will result in a dwarf tree. Table 1. Apple Varieties Recommended for Home Use for the Different Zones in Georgia |Anna||5||Excellent shaped fruit with a blush of red. Ripens mid-June to early July. Spur-type.||A| |Dorsett Golden||5||Yellow apple of good quality. Ripens mid-June to early July. Spur-type.||A| |Ginger Gold||1-2-3||Very early crisp yellow apple of excellent quality. Good for fresh eating, sauce and pies. Ripens late July to early August. Non-spur.||B| |Gala||1-2-3||Excellent quality apple. Good for fresh eating or salads. Ripens early August. Non-spur.||B| |Mollie's Delicious||1-2-3-4||A versatile apple. Good for fresh eating, pies and sauce. Ripens late July to early August. Nonspur.||B| |Ozark Gold||1-2-3||Matures in early August. Yellow, russet-free apple of excellent quality. Nonspur.||B| |Red Delicious||1-2-3-4||Early fall variety ripening in late August to early September. Large, firm, crisp, sweet. Good for fresh eating or salads. Non-spur and spur strains available.||B| |Jonagold||1-2-3||Ripens early September. Very large, yellow apple with a red blush. Very high quality, sweet, juicy apple.||C| |Golden Delicious||1-2-3-4||Ripens one to two weeks after Red Delicious. Good producer. Fruit good for sauce, fresh eating and pies. Nonspur and spur strains available.||C| |Fuji||1-2-3||Fall variety ripens early October. Does not color well, but quality is superb. Good for cooking, eating and baking. Nonspur strains available.||B| |Mutsu||1-2-3||Ripens early October. Yellow apple of exceptional quality. Crisp and juicy. Slightly tart. All-purpose. |Rome Beauty||1-2||Ripens early October. Red apple primarily grown for baking. Spur and non-spur strains available.||C| |Stayman||1-2||Ripens early October. Rusty red finish. Superb quality, tart, all-purpose apple. Fruit cracking a problem when dry period followed by rainy period.||C| |Yates||1-2-3-4||Late fall variety ripens late October. Small, dark red, juicy, mellow, sub-acid. Best keeper. Non-spur.||B| |Granny Smith||1-2-3-4||Matures late October to early November. Yellowgreen apple of excellent quality. Good all-purpose variety. Non-spur and spur strains available. 1 Listed in order of ripening. 2 See Apple Zone Map 3 Ripening dates for all varieties except Anna and Dorsett Golden are based on averages from Athens, Georgia. Ripening dates for Anna and Dorsett Golden are based on averages from Monticello, Florida. Non-spur and spur refer to growth habit, as previously described under "Variety Selection." 4 Varieties followed by a common letter bloom at approximately the same time. Since most apple varieties are self-unfruitful (require pollen from another variety to set fruit), plant two or more varieties that have the same letter so fruit set will result. Stayman, Mutsu and Jonagold have sterile pollen and should not be used as a pollen source for other varieties; therefore, plant at least two other varieties with any or all of these varieties. |Redfree||1, 2, 3||Fruit is crisp, juicy, russet-free. Ripens about six weeks before Delicious.| |Liberty||1, 2, 3||Fruit is crisp, juicy, sub-acid. Stores well, ripens about two weeks before Delicious.| |Freedom||1, 2, 3||Fruit is crisp, juicy, good for fresh and processing. Ripens with Delicious.| |Enterprise||1, 2, 3||Fruit is spicy and sub-acid. Stores well, matures late.| |Goldrush||1, 2, 3||Fruit is sweet, crisp, good for fresh and processing. Ripens late, stores very well.| |Variety||Apple Scab||Cedar Apple Rust||Powdery Mildew||Fireblight| 1 = Susceptible 9 = Immune The two major factors influencing tree size are rootstock and type of strain used (spur or non-spur). Other factors that will influence ultimate tree size include general care, variety, soil type, earliness of fruiting, location within the state, and timing and severity of pruning. Rootstock influences tree size: standard, semi-dwarf or dwarf. Standard trees are propagated on seedling rootstock and produce large trees that may get to be 20 feet tall or taller. Semi-dwarf trees are trees propagated on one of several clonal rootstocks (vegetatively propagated) that produce trees that will be about 50 to 80 percent the size of standard trees if grown under similar circumstances. The most common semidwarf rootstocks used for apples in Georgia are MM 106, MM 111 and M 7. Trees on M 7 will produce the smallest trees in the semi-dwarf category while MM 111 will produce trees nearly as large as trees on seedling rootstocks. True dwarf trees will be about 30 to 40 percent as large as standard trees and require support by either a trellis or a post. The two most common dwarfing rootstocks are M 9 and M 26. Trees grown on M 9 are the smaller of the two. Use dwarf and semi-dwarf trees if space is greatly limited. M 9, M 7 and MM 111 are better adapted to Zones 1, 2 and 3, while MM 106 has shown promise in the lower half of Zone 3 plus Zone 4. In Zone 5, only standard trees (seedling rootstock) are recommended due to poor performance of semi-dwarf and dwarf rootstocks. See Table 2 for tree spacing recommendations. Pollination - See footnote 4 below the variety table (Table 1). |Table 2. Suggested Tree Spacing Based on Rootstock and Tree Form (Non-spur versus spur).| |Rootstock||Between Trees in Row (feet)||Between Rows (feet)| |M 26||10||not recommended||16||not recommended| |M 9||8||not recommended||14||not recommended| When fruit trees arrive from the nursery, open the bundles immediately. Soak the roots in water for six to 12 hours if they are not moist. The trees should then be planted if the soil is not too wet. If the soil is not prepared where the trees are to be planted, or if the ground is too wet, heel the trees in by placing them in an open trench deep enough to cover all roots. The north side of a building is the best place for heeling because the trees will remain dormant longer. Place soil over the roots to the depth they will be planted in your yard. Before planting, prepare the soil thoroughly by plowing or spading followed by disking or raking to smooth the surface. If you have not adjusted the soil pH to 6.5 previously, liming should be done before you prepare the soil so that the lime will be incorporated. When added to the surface and not plowed in, lime takes years to move down into the soil. Lime an area 10' x 10' where each tree will be planted. Similar to lime, phosphorus moves down through the soil slowly and thus should be incorporated, based on soil test results, along with lime before planting. During planting, dig holes large enough to receive the roots freely without cramping or bending from their natural position. Before planting, cut off all dead, broken or mutilated parts of roots with a sharp knife or pruning shears. Keep root pruning to a minimum. Set the plants at the same depth they grew in the nursery. Work soil in and around the roots. When the hole is half filled, firm the soil with your feet before you finish filling the hole. When the hole is filled, pack the soil firmly. Do not leave a depression around the tree. Also, do not place fertilizer in the planting hole or fertilize immediately after planting. This should only be done after the soil is settled by a drenching rain. When the planting is completed, the graft union should be at least 2 inches above the soil line. After planting, apply sufficient water to thoroughly soak the soil in the area of the tree roots. This watering will help bring the soil into closer contact with the roots and eliminate air pockets around the roots. Keep weeds out of a 3' x 3' area around the tree because they compete with the tree for moisture and nutrients during the growing season. This will also keep mowers away from the trees and reduce trunk damage. Mulching will help control weeds as well as conserve moisture. Mulches should be kept about 12 inches away from tree trunks. The day you plant your trees is the day you begin to prune and train for future production. Too often backyard growers plant apple trees and leave them untended for several years. This neglect causes poor growth and delayed fruiting. The purpose of pruning a young tree is to control its shape by developing a strong, well-balanced framework of scaffold branches. Remove unwanted branches or cut them back early to avoid the necessity of large cuts in later years. Today, the recommended method of pruning and training is the Central Leader System, which exposes more foliage and fruits to direct sunlight than other tree forms. Prune in late winter. Winter pruning of apple trees consists of removing undesirable limbs as well as tipping terminals to encourage branching. Similar pruning can be performed in the summer and is most beneficial if done in early June and early August. At Planting: Whether you obtain a small unbranched whip or a larger branched tree, it is necessary to prune the tree at planting. Head the unbranched whip back to 24 to 30 inches from the ground (Figure 1). This will cause the buds just below the cut to grow and form scaffold branches. If branched one- or two-year-old trees are planted, then select four or five lateral branches with wide-angled crotches that are spaced equidistant around the tree and 2 to 5 inches apart vertically. The selected laterals should be no lower than 18 inches above the ground, and they should be pruned back slightly by cutting off one-fourth of each limb's length. First Growing Season: When 2 to 3 inches of growth have occurred, begin training the tree. Position wooden spring-type clothespins between the main branch and the new succulent growth (Figure 2). The clothespin will force the new growth outward and upward, thus forming the strong crotch angles needed to support the fruit load in years to come. The clothespins should be left on the tree for about six weeks. One Year Old: A number of branches should have developed after the first growing season, and if they were clothespinned, they should have good, wide crotch angles. The objective now is to develop a strong central leader and framework of scaffold branches. Here we can see the one-year-old tree before (Figure 3) and after (Figure 4) pruning. Note that we have left only four scaffold branches spaced around the tree. All the branches left, as well as the central leader, have been pruned back by about one-fourth. Always make sure the ends of the scaffold branches are below the end of the central leader after they have been pruned back. Second Growing Season: During the second growing season, develop a second layer of scaffolds on the central leader 24 to 30 inches above the scaffolds you established the year before. Be sure to use the clothespins on new succulent growth, particularly shoots that develop below the central leader pruning cut, so you will develop wide crotch angles. Figure 5 illustrates a properly trained apple tree in late May of the second growing season. Two Years Old: The use of limb spreaders can help bring about earlier fruit production, improved tree shape and strong crotch angles. Spreaders can either be short pieces of wood with sharpened nails driven into each end or sharpened metal rods. Limbs should be spread to a 45- to 60-degree angle but not below a 60-degree angle from the main trunk. Limbs spread wider than 60 degrees have a tendency to produce vigorous suckers along the top-side of the branch and may stop terminal shoot growth. The spreaders will need to remain in place for about six weeks until the wood "stiffens up." Figure 6 illustrates a two-year-old tree after pruning in which metal rods have been used as spreaders. Pruning consists of entirely removing undesirable limbs and, only where necessary, reducing the length of terminal scaffolds by one-fourth. Weaker side limbs should not be pruned (unless excessively long) so they can develop flower buds. Excessive and unnecessary pruning will invigorate a tree and delay fruit production. Figure 7 is a tree approximately four years old. Proper training, spreading and pruning have resulted in the development of flower buds that will produce a good crop in the coming season. Notice that the upper (second) set of scaffolds should be shorter than lower (first) set. The second and any succeeding scaffold layers should always be kept shorter by dormant pruning than the layer(s) below it. A properly trained and pruned central leader tree should conform to roughly a pyramidal (Christmas tree) shape. Pruning Neglected Apple Trees: Many people will purchase a house where an apple tree was planted on the property several years ago. Often, the previous owner did not take the time to properly prune the tree and the result is similar to Figure 8. The tree has become bushy and weak and will produce very poor quality apples. Such a tree requires extensive corrective pruning. The main objective in pruning such a tree is to try and open up the interior to allow good light penetration. The first step is to remove all the upright, vigorous growing shoots (at their base) that are shading the interior. As with the young apple trees, it is necessary to select three to five lower scaffold branches with good crotch angles that are spaced around the tree. Limbs with poor angles and excess scaffold limbs should be removed at their base. In some cases it is advisable to spread the corrective pruning over two to three seasons. When severe pruning is done in the winter, do not fertilize the trees that spring. Figure 9 is the same tree after the first season's pruning. The next year, it will be necessary to remove more limbs, especially on the left side. Note that most of the cuts were thinning types; that is, the wood was removed to its base or point of origin. When making these thinning cuts, make sure the cuts are flush along another limb. The remaining limbs can be pruned back by onefourth of their length to a side limb if it is desired to stiffen them. If you don't cut them back, the limbs may bend and/or break under a heavy crop load. Pruning and Training to the Trellis: Non-spur varieties on M 9 and M 26 and spur varieties on M 7 are the best to train to a trellis. To train trees to a trellis, start by planting the trees midway between the posts (Figure 10). Remember to keep the graft union above the ground. Cut the trees off at 24 inches high and loosely tie them to the bottom trellis wire. Allow young shoots to develop in spring and early summer. Some shoots will develop outside the plane of the trellis (project away from the wire). Remove them, or bend and tie them to the wire so they fit the plane. After the first growing season, tie the developed limbs to the wire so each will form a 45-degree angle with the main trunk (Figure 10). Avoid training limbs horizontally or flat along the wire as vigorous upright sprouts will develop along the upper surface of the limb at the expense of flower buds. Remove undesirable limbs. Prune back the terminals of the tied limbs as well as the central trunk. Pruning after the second growing season should be done similarly to the first season. Your goal is to fill the trellis area with limbs the first two or three years following planting to encourage tree growth. Once fruiting begins, the amount of necessary pruning will be reduced. Periodically, limbs get old and production decreases. If a limb starts declining, prune it out and train a new one to take its place. Girdling may result where the limbs and trunk are tied to the wires. Check these ties periodically to make sure they are still loose. Generally, apple trees in Georgia need fertilizing each year. Nitrogen is the most important nutrient needed. Phosphorous and potassium should be applied before planting based on soil test recommendations. After the trees mature, fertilization with phosphorus and potassium will probably not be required; however, periodic soil testing should be done to monitor levels of these elements and soil pH. To fertilize apple trees the year they are planted, broadcast over a 2-foot circle 1 cup of 10-10-10 fertilizer about one month after planting. Do not put any fertilizer in the hole before planting. In June following planting, broadcast another cup of 10-10-10 fertilizer around the tree. In early spring of the second season (when the tree is one year old), broadcast 2 cups of 10-10-10 fertilizer over a 3-foot circle. Repeat this again in June. In succeeding years, follow these guidelines for the different trees: Standard Trees: Increase the diameter of the broadcast circle and the amount of fertilizer (10-10-10) by 2 cups per year. When the tree is six years old and older, only nitrogen fertilizer is needed. Use 4 cups of ammonium nitrate per tree for trees six to eight years old and 6 cups for trees nine years old and older. If you severely prune the tree, do not apply any fertilizer that year. If growth is excessive, omit fertilizer for a year or two until growth is reduced to a desirable amount (terminal growth on bearing trees averaging 10 to 15 inches per year). Semi-dwarf Trees: Increase the diameter of the broadcast circle and the amount of fertilizer (10-10-10) by 2 cups per year. Once the trees reach four years of age, apply 8 cups of 10-10-10 per tree. Apply this amount in years five through seven. For trees eight years old and older, apply 4 cups of ammonium nitrate per tree. If, in any given year, you severely prune the trees or the trees are too vigorous, omit fertilizer that year. Dwarf Trees: During the third and fourth season, broadcast over a 4-foot circle 4 cups of 10-10-10 around each tree both years. Trees in their fifth and sixth seasons should receive 6 cups of 10-10-10 per tree broadcast over a 5-foot diameter circle. Sevenyear- old and older trees should receive only nitrogen at a rate of about 2 cups of ammonium nitrate per tree. Broadcast this over a 5-foot diameter area. Caution: When fertilizing, never dump large amounts in a small area. Root burn may result. Also, keep fertilizer 6 inches or more away from the trunk. Always broadcast the fertilizer evenly over the recommended area. Once the trees begin to bear fruit, use shoot growth to determine if you need to reduce or supplement the fertilization rates previously suggested. Ten to 15 inches of growth are ideal for bearing, non-spur type trees and 8 to 10 inches for spur type trees. If growth is more than this, apply less fertilizer. If growth is less, apply a little extra fertilizer the next season. Apple trees grown under favorable conditions will set more fruit than they can successfully carry to maturity. The removal of excess fruit from the trees is essential to ensure satisfactory development of color, shape and size of the apples remaining on the tree. Failure to remove the excess fruit will decrease flower formation for the following year and cause the tree to only produce a crop every other year. Remove fruit by hand, reducing the apples to one per cluster with fruiting clusters spaced about every 6 inches along the limb. To remove fruit without damaging the spur or other apples on the spur, hold the stem between the thumb and forefinger and push the fruit from the stem with the other fingers. This method will remove the apple, leaving the stem attached to the spur. The earlier hand-thinning is completed, the more effective it will be. Mid-summer thinning will help improve fruit size, but it will not aid the formation of next year's flower buds. Most of the flower buds for next year are initiated during a four- to six-week period following full bloom, so you need to thin before this time. When picking apples, be careful to avoid injuring the fruit. Remove the apple from the spur by pulling upward and outward while rotating the fruit slightly. On some of the thin, long-stemmed varieties such as Golden Delicious, it may be necessary to firmly place the index finger at the point of attachment of the stem and spur to prevent the spur from breaking. Pick apples with their stems attached to the fruit; otherwise, they will not keep as long. A grower who produces the best quality fruit controls diseases and insects. Several of these pests damage the tree and fruit. Diseases common to apples that should be controlled include scab, black rot, bitter rot, alternaria and fire blight. Damaging insects include apple tree borers, red spider mites, scales, aphids and fruit worms. For more information, check with your county Extension agent or visit the Georgia Cooperative Extension website at extension.uga.edu. The most successful home orchardist follows recommendations to the letter and uses the recommended kind and rate of spray material. It is imperative that complete coverage is maintained by applying the spray material at the proper time interval. The wise fruit gardener will also handle these pesticides as dangerous chemicals, keeping them stored in their original containers with labels intact, behind locked doors and out of reach of children and pets. Original publication developed by M. E. Ferree, Extension Horticulturist (retired)
<urn:uuid:38583a96-273d-4ba8-9391-7874247eafd5>
CC-MAIN-2014-42
http://extension.uga.edu/publications/detail.cfm?number=C740
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637899702.24/warc/CC-MAIN-20141030025819-00148-ip-10-16-133-185.ec2.internal.warc.gz
en
0.92657
5,865
3.234375
3
— Did you know — Laws are a critical part of the traffic safety equation to address distracted driving, but not the only component. A comprehensive approach to addressing distracted driving includes not only laws but several additional elements: Education: Drivers can be better informed about the risks of distracted driving through such channels as driver education and DMV manuals, community programs, the media, and by safety advocates. Enforcement: States should establish and consistently enforce distracted driving laws based on sound research and safety principles. Engineering: Roadway countermeasures that can help prevent distracted driving crashes and injuries include center and edge line rumble strips and stripes, guardrails, and median cable barriers. Consumer electronics products and in-vehicle technology to manage the use of wireless communications may play a role in future solutions to reducing distracted driving. Evaluation: Continued research is needed to determine the impact of and the most effective ways to curb distracted driving behaviors. Encouragement: You are part of the solution. Encourage your friends, family and neighbors to avoid distracted driving.
<urn:uuid:3e08dd45-8b64-49a1-ab98-ed81bf8d0dec>
CC-MAIN-2018-09
https://www.theautobodyshopny.com/2017/08/30/auto-body-collision-312/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812756.57/warc/CC-MAIN-20180219151705-20180219171705-00505.warc.gz
en
0.952481
215
3.4375
3
Question: On Martin Luther King Day we got together to talk with you about equality and justice. You said something interesting about receiving equality and justice. You said that receiving equality and justice is the equivalent of I Am that I Am. In the book of Exodus, Moses asked God’s name and God responded, “I Am that I Am.” Will you repeat that or maybe say it again for clarity? Higgins: You physicals talk about equality and justice as though they are qualities that are doled out to you and some get more and some get less. Further, when one of you is not treated well you go on as though someone else should do something. The government seems to be your favorite someone. In reality, the Universe is completely fair and impartial. That being so, fairness, equality, justice…the Universe meets these qualities out relentlessly. The receipt of said qualities cannot be avoided. What you need to know is not how to get others to treat you with equality and justice but instead, how it is that you draw what you draw so that you may draw towards you being treated with equality and justice. The crux of how to do that is, “I Am that I Am.” You are. You are and that is enough. When you learn to wake up in the morning knowing that you are already enough you will begin to know what it means to Be, to exist. It means I Am. It means you need not justify your existence. When you no longer need to justify your existence, when You Are because You Are, then the world around you will shift and you will be treated with equality and justice. Equality and justice are not what others give you. Equality and justice are behaviors you draw from others by your own certainty that you are already enough. Received January 21, 2018
<urn:uuid:117d7a6d-7441-4f1b-95a8-748665ec9d42>
CC-MAIN-2019-13
https://askhiggins.com/2018/01/21/martin-luther-king-jr/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202510.47/warc/CC-MAIN-20190321092320-20190321114320-00502.warc.gz
en
0.979071
379
2.890625
3
Health and Well-Being(Supplement)-Keep bacteria off your holiday table! An ounce of prevention can keep foodborne bacteria from becoming an uninvited guest at your holiday table. "Think sink, stove, and refrigerator," says Becky Gorham, RD, of the USDA/ARS Children's Nutrition Research Center at Baylor College of Medicine in Houston. "These kitchen staples are effective tools in preventing the growth of illness-causing bacteria." Here what she recommends: At the sink: • Wash hands before and after handling any food. Keep utensils, dishes, counters, cutting boards, sinks, sponges, and towels clean. Use two cutting boards, one for meat and one for other foods, to prevent cross-contamination. In the stove: • Roast the turkey at 325° F or higher to minimize the time bacteria have to grow. If you are using a meat thermometer, insert it into the thickest part of the thigh next to the body. Cook a whole turkey to an internal temperature of 180° F. • Use only pasteurized egg products and cooked ingredients, such as sautéed vegetables, cooked meats, and poached or sauteed oysters in stuffing. • Bake stuffing separately, or stuff the turkey just before roasting. Use a meat thermometer to make sure the stuffing is heated to at least 165° F before removing from oven. Immediately remove cooked stuffing from the bird. In the refrigerator: • Keep thawing birds cold. Place the bird in a sealed, heavy plastic bag and change the water every 30 minutes. Avoid thawing any frozen meat at room temperature. • Store raw meats in sealed bags, on trays, on the lowest shelf of the refrigerator to prevent raw meat juices from contaminating other foods. • Remove turkey meat from the bone to speed cooling of leftovers and store in a shallow container. • Refrigerate turkey, stuffing, gravy and egg-based pies within two hours of cooking. Use leftover turkey within four days; stuffing and gravy within two days. • Avoid overloading the refrigerator. The main compartment should be a maximum of 40° F degrees to inhibit bacterial growth.
<urn:uuid:8309c32d-cabd-49a5-b106-c92c106338a6>
CC-MAIN-2021-43
https://www.reliasmedia.com/articles/57734-health-and-well-being-supplement-keep-bacteria-off-your-holiday-table
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587593.0/warc/CC-MAIN-20211024173743-20211024203743-00435.warc.gz
en
0.909727
454
2.65625
3
The 192.168.0.10 is the default login IP address, reserved for specific modems and routers. On the other hand, it is also the private IP address that people use in their home network. Well-known router manufacturing companies use this IP address as their router’s default login. This address will help you in configuring the router. Most of the time, people take the assistance of a network professional. But, sometimes it’s not always possible. That is why it’s better to understand and know the entire process. Don’t worry, it’s not that tough or complicated. Just go through the points given below: Understanding the Login Page The 192.168.0.10 login page is the network as well as the router management page. With the help of this page, you can easily configure your router as per your requirement. In addition to that, the login page will also give you all the detailed information about all the network and router settings. Every router has its own desired management page. But, the user interface, the common network may differ in terms. The Configuration Process Of course, a mobile phone, tablet or computer is mandatory. According to the experts, the computer will be more convenient. If you have brought a new router, then as usual you have to unpack it and check whether all the desired accessories are in perfect condition or not. After that power up the router. In the case of a laptop, turn on the wireless network to detect the router. If you are using a desktop computer, then a LAN cable is required to establish the connection between the router and the desktop computer. A good quality LAN cable comes with the router. Connect one end of the cable to the highlighted WAN port of the router and the other end to the LAN port of the PC. Now, locate the 192.168.0.10 IP address, usually written on the label in the router. Open your computer’s default browser, type the address in the address bar. After pressing the Enter key, it will take you to the login page. Just click on the Login button and you will be able to access the management page easily. Now, you need to know whether you are using a static or a dynamic IP address. In the case of static IP, the network IP address will be configured automatically. It’s just the opposite, in the case of the dynamic IP. Make sure you have all the network credentials with you, by accessing the network settings tab. Assigning a Name and Password How can you identify your router? It is not always possible to remember the router model number as it is the default name of the device. So, you need to assign a name. Open the management page and find out the General Settings tab. There you can find out the blank space with the option named SSID. Below the SSID option, there is a space for assigning the password. Facing Issues with the Router? When the router is facing any error, you need to take the help of 192.168.0.10 and access its management page to figure out the reason. Apart from that, there are also other ways, too. The first one is rebooting the router, it can eliminate all types of network congestions and data packet loss. If this process doesn’t work, then the last and final procedure will be to reset the router. Grab a paper clip or a pen. Locate the reset button, usually at the backside of the router. Press and hold the reset button for about 8 to 10 seconds, using the pin. The LED lamps of the device will flash once. The reset process will roll back all the functions and settings of the device to its factory condition. After that, follow all the configuration processes as given above to reconfigure the router according to your requirements. Take care of the Router You must remember the router’s default IP address which is 192.168.0.10. Now, you must realize why you are purchasing a router. If you are into heavy gaming, then the standard router, available in the market, is not for you. There are gaming routers available, buy them. If you are willing to do ordinary tasks like streaming, uploading and downloading, then the standard routers are just enough. You need to have a security application to protect your system as well as the network. If any malicious files affect the firmware, then you will not be able to access the router management page with the 192.168.0.10 IP address. Always try to update the router’s firmware whenever any update is available. The outdated firmware might bring complications to the router functionalities. Apart from that, you can also use a VPN to secure your network. In general, a router can perform at its best when a limited number of devices are connected to it. If necessary, you can also restrict the download to some devices to prevent extreme network congestion.
<urn:uuid:44200dfa-d18d-4f30-b233-16175c7cb1c5>
CC-MAIN-2023-14
https://routerguide.org/192-168-0-10/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949958.54/warc/CC-MAIN-20230401094611-20230401124611-00704.warc.gz
en
0.918754
1,027
2.734375
3
When popping zits, you might notice a strange smell burst out of these popped pimples. Many people describe their zit smell quite variously. Some describe it similar to cheese, while some others may notice the smell of garlic, sulfur, and even soap. Most zits smell awful, causing people to wonder whether it is normal for them to have the smell. Why zit pus smells Zits commonly occur in men, although women may experience it, too. Although this skin breakout generally occurs on facial skin, zits may also spread all over the skin of the body. Zits are always filled with pus that is usually in solid white or yellow color. The pus is dead white blood cells combating infesting bacteria that are mostly anaerobic. As anaerobic bacteria, these bacteria do not require oxygen to survive. They are, instead, generating their own compounds of sulfur when growing and spreading. When a zit is popped, the drainage—pus mixed with blood, debris, and infesting bacteria oozes out. Strong odor may be noticed, if the zit is infested with anaerobic type of bacteria. On the other hand, bacteria growing and spreading with the role of oxygen do not usually trigger the foul odor. Mild zit problem does not usually lead this foul odor, while severe infection tends to end in the smell, as the body produces more pus contained in the zits. The stronger the smell is, generally the more likely the zit to be contagious. This means that if you are popping an odor zit and the drainage oozes out, the infesting bacteria will land inside other skin pores, causing another zit. Hence, it is important to clean any oozed out pus from a zit in order to prevent further infection and bacterial infestation as this will contribute to reducing the way a zit triggers a foul smell. What affects zit pus smell? There are some factors affecting how likely a zit smells, such as: Types of bacteria infesting the site There are various kinds of bacteria that can possibly infest the hair follicles, causing clogged pores that may end up in zits. These different types of bacteria give quite different effects on how these zits smell. Aerobic bacteria that depend on oxygen to grow do not usually trigger foul smell in zit pus, while those anaerobic bacteria that produces sulfur may cause the zit pus to have an unpleasant smell. Severity also plays a significant role of foul odor resulted from a zit. Mild zits are commonly filled with a small amount of pus and are not severely infected. As a result, smelly odor is lighter in this type of zits compared to the severely infected ones. However, mild zits infested with anaerobic, sulfur-producing bacteria might also smell bad, similar to those severely infected zits. The hygiene of the infection site plays a role in triggering zit pus smell, while personal hygiene does not really affect the possibility of making a zit smelly. People who do not care for the infection site hygiene will likely to have secondary infection by various bacteria. More severe infection, as stated, trigger more severe foul odor of the zit pus. However, unhygienic infection site is not the exact cause of how the zits smell. Instead, it simply contributes the already-existing foul smell. Keeping the site clean, therefore, is essential in that it will reduce the risk of having further infection that may result in larger amount of drainage causing foul odor. Is zit pus foul odor normal? Although foul odor occurring with zit pus commonly affects the severely infected skin wherein a large amount of pus presents, this should not be a health concern. Instead of trying to notice how your zits smell, it is more advised to carefully observe the resulted symptoms. Blind zits may be painful for some initial days, that you should be concerned when the pain does not improve for longer period and the inflammation does not decrease. Pus drainage present with zits, especially those with whiteheads is normal and should not be harmful, as long as you keep the site hygienic.
<urn:uuid:471e6e65-ebbd-4802-9640-f2933436f45b>
CC-MAIN-2019-22
http://www.dermanities.com/zit-pus-smell
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259757.86/warc/CC-MAIN-20190526205447-20190526231447-00019.warc.gz
en
0.923896
850
2.59375
3
A board game I created for my B1 students. It's for practising the past simple and the past continuous, which prove to be a bit problematic. You might want to pre-teach some vocabulary. I included a list of words/phrases your students might not be familiar with. Hope you'll find the worksheet useful.
<urn:uuid:38bbe6ad-e322-4eb5-8e94-0ed88df677dc>
CC-MAIN-2018-09
https://en.islcollective.com/resources/printables/worksheets_doc_docx/past_simple_vs_past_continuous_game/past-simple-vs/94065
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814292.75/warc/CC-MAIN-20180222220118-20180223000118-00640.warc.gz
en
0.960618
70
3.046875
3
Today (or possibly yesterday, but I forgot) is the first of the Halcyon Days which will last until just before the end of December. The Halcyon Days are the fortnight of supposedly calm weather in midwinter during which the halcyon, or kingfisher, lays her eggs. The eminent biologist/meteorologist Ovid explains that Ceyx and Alcyone were lovers. Ceyx had to go to sea for some reason and every day Alcyone (the girl) would go down to the shore to look for his returning vessel. She continued this vigil until she was informed by the utterly reliable medium of a dream that the ship had sunk and Ceyx had drowned. At this news, as Chaucer so movingly put it, "Allas!" quod she for sorwe And deyede within the thridde morwe. [quod=said sorwe=sorrow deyede=died thridde=third morwe=day] Anyway, everybody was terribly upset including the gods who decided on their tried and tested fall-back plan of turning both the lovers into birds (avification was only just behind stellafication in the Attic list of divine mercies). The gods then went further and decided to make the sea calm and the weather bright for one fortnight a year starting on the 14th/15th of December so that the Alcyon could explore and develop her newfound egg-laying capabilities, for which I'm sure the young lady was profoundly grateful. Anyway, the usual modern sense of the halcyon days as being the happy days before all the trouble started is a figurative extension of this precise ornithometeorlogical usage. Note the wings forming
<urn:uuid:3f91f0a1-2f73-44e3-a540-e81f14ed71e2>
CC-MAIN-2015-18
http://blog.inkyfool.com/2009/12/halcyon-days.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246651727.46/warc/CC-MAIN-20150417045731-00235-ip-10-235-10-82.ec2.internal.warc.gz
en
0.979029
364
2.546875
3
FREQUENTLY ASKED QUESTIONS 2. Your book is about the “everyday” women, not the famous and legendary women we read about. What are your reasons for focusing on common women rather then famous women? Why do “everyday” women not think of themselves as courageous? 1. What is courage according to your book? I can share with you what it is and give you a few examples. First of all, courage is the first of human virtues because it makes the other virtues possible—Aristotle believed this and so do I. For over three years, I interviewed qualified women, women who identified themselves as courageous. My research distilled 12 behaviors of courage. What was interesting was their stories of courage had certain aspects in common. The same themes such as conquering fear, speaking up, or overcoming loss, maintaining faith, kept coming up. I ended up with the 12 behaviors of courage on the “Source Wheel.” I illustrate each of these behaviors with a real-life story. A few brief examples would be: - Courage is speaking up when a cold shoulder is turned to you. - It takes courage to halt injustice by confronting it openly. - It takes courage to let go of denial and face the truth about an illness or loss. It takes courage to have faith when hope seems gone, to remain strong and determined in the face of setbacks. - It takes courage to acknowledge fears and vulnerabilities, to admit being afraid. 2. Your book is about the “everyday” women, not the famous and legendary women we read about. What are your reasons for focusing on common women rather then famous women? Why do “everyday” women not think of themselves as courageous? First, our folklore has not been kind to women. Many of the women that we think of as “everyday” or common would have achieved notoriety and fame if society knew their heart and spirit. For example, Paul Revere rode a horse through a town on one night yelling, “The British are coming!” Our society heralds his courage. During that time of his ride, how many common women also had acts of courage? The reason why we don’t know these behaviors is because society did not recognize their acts as courageous, nor did they claim them. That’s why this book is so important. When you read about courageous men, society recognizes it. 3. Why did you write this book? I had gone through the normal bumps, obstacles, and changes in my life that all human beings go through; however, one particular event occurred that made me think about the ingredients I use to keep going. I discovered I always use or drawn upon a critical, but silent source of energy, which of course is courage. This virtue makes me get up each morning and try again. These normal events made me ask the question: “I wonder if other women consciously use this energy?” Maybe I should ask them? What gives them strength to get up each morning and keep going—very different from men—no platitudes, no gripper, no WWII charges. I wrote this book to help EveryWoman understand what courage really is, why society rarely recognizes women as courageous, and why such recognition is vital to knowing ourselves. I work with women on how to reclaim a powerful virtue they already possess—courage! 4. Why don’t women show courage? Women do show courage, they just don’t recognize their behaviors as such. Many times when women show their courage they are labeled by some unflattering word to keep them down or they catch hell in some way. You know society and women themselves under-appreciate courage in women. Also, women do not talk about courage or stake their courage, much less pass this virtue on to their daughters. In today’s culture, the word courage is used to describe dealing with physically dangerous situations. I take the word courage back to its origin corage, meaning heart and spirit. Courage is the forgotten virtue because women do not recognize their everyday actions as significant. The book salutes courageous women. It is the answer to the problem of the lack of recognition of women’s courage. It is a celebration to the unsung courage in the every day woman. 5. What brings out courage in a woman, that is, what taps that reservoir? It’s not what causes or triggers women to be courageous; the courage is in them—it was always there. The premise of the book is that women can reclaim courage by understanding the Source Wheel—the 12 behaviors of courage. As far as what “brings out” courageous acts or thoughts in women, it’s the same as men: there is a mighty need for change. In other words, something demands attention-a new way of thinking or doing. The old ways are not working and comfort must yield to possibility. 6. In what ways does language play a role in integrating courage? Words and language play a great role in what we believe is possible for women. By the 12th century, virtue in Old French was vertu “desirable male qualities, worth, virtue, or virility.” In Latin, virtue was virs, or energy. Virtue and virile are links to men. This suggests that if women aren’t virtuous they can’t be courageous. If we sex-link attributes through language, such as “manly acts” (implying women cannot be courageous), then society tends not to recognize courage in women. 7. How does the concept of women as courageous relate to honoring women on Mother’s Day? Any day that honors women in any way is an opportunity for us to understand and value their hearts and spirits. Mother’s Day is perhaps the ideal occasion to expose and reclaim this strength. 8. What is the cost to a woman for not being aware of her courage? In other words, what does she lose by not harnessing the feminine energy? That can range from a life of mediocrity to a life of pain and suffering, depending on the situation. For the woman who does not speak up and state directly why she is qualified to be the COO (Chief Operating Officer), there is a missed opportunity. For the woman who misses the opportunity to stop her husband from preying on their daughter, an unimaginable blow to her spirit that can lead to dis-ease. The woman who faces a life-threatening disease recognizes a peaceful night sleep as a distant memory. The woman who can’t remember happiness in her soul dies a slow, dull death of spirit. When you don’t recognize your potential for courage, your spirit erodes. 9. How can men be supportive of courageous women? Men can learn to recognize those acts or events in a woman’s life that require risk without physical valor: when a woman asserts herself to a superior at work; when she takes on two jobs to keep the family afloat in tough times; when she puts herself in the limelight to point out injustice, even at great personal emotional or material cost. We all need to step outside the parameters of tradition to realize this “new” definition of courage. 10. Sandra says, “The virtue of courage has not been perceived as feminine; this is a societal aliment.” If women claim their strength and courage, in what ways would that benefit society? The more that women recognize the energy of their courage, the more society will break from its stereotypical understanding of courage as physical or daring. We learn from the models around us. When you explode the myth that women can be courageous, it gives women permission to be courageous. Everybody knows that role models help people achieve higher goals. With a wider definition and acceptance of courage as a feminine virtue, the greater the possibility of raising sensitive, concerned, caring, and open-minded children—both male and female—in a society that seems more and more to have lost its sense of the humane. 11. Do you (Sandra) see yourself as courageous? Where do you most easily see that? You bet I am courageous! Just getting up each morning, knowing my survival depends on my performance that day takes courage. I face adversity head on when I compete against the famous authors and large publishing houses. I see my courage in my choices. I turned down “big” agents to start Bona Dea Publishing (Italian for Good Goddess) so I could control the creative design of the book. My choices paid off, I received an award from the Colorado Independent Publishers Association. Overall, I am unwilling to let anyone but myself design my life. 12. As a woman, what strengths do you consciously call upon in the “defining moments” of your life? Courage is a source of energy that I draw upon in those defining moments. Aristotle believed that courage is the first of human virtues because it makes the other virtues possible. I implement my courage by speaking up to express what I feel. I used courage to reinvent myself when, as a baby boomer, I started my fifth career as an author/publisher/speaker. The courage to manifest a vision was a driving force in my five-year journey to write and publish my book. I expressed the courage of strength and determination to not roll over when, at the very end of my journey, at the last minute I had to fire the technician who was typesetting my book for printing. 13. You speak of a three-step process for integrating courage, could you go over the 3 steps? The book provides an innovative three-step process to integrate courage. This process allows women to understand and reclaim the essence of their hearts and spirits—the origin of the word. - Step One is Self-Discovery: this process requires you to discover the patterns of behavior that are keeping you from creating the life you desire—the things that scare you—many times these are unconscious and instinctual in behavior. You make a list of the things that paralyze you or make you feel ashamed—the things you don’t share—the shoulda, coulda, woulda’s. I refer to this task to action in the book as the “Stepping Stones in My Life.” Such as overcoming a childhood illness, giving a child up for adoption, confronting your husband when you think he might be preying on your daughter (choosing to move to a new state with the man you are to marry). Once you have identified the habits that are holding you back, you can take the second step. Step Two includes sourcing the Source Wheel —going to the diagram on page 90, take that list and sit it right next to the Source Wheel, and identify those actions on the chart that you want to reclaim. The chart identifies the actions to get started to consciously commit to changing your life. This is the heart of the book—Part 3. It reveals the years of research and interviews of the women-their stories, their action steps to source their courage, and the benefits for doing so. - The final step is to identify one or two actions on the Source Wheel that you will incorporate into your daily routine to reclaim courage—this requires taking action—today! This isn’t going to be easy. You’ve already made a list of things that are difficult for you. But the three-step process looks at a very overwhelming problem, and successfully breaks it down into small pieces that can be conquered.Changing the way you use language is an important part of taking action. It may require changing your conversations with your friends-applying the courage to be vulnerable. This is not easy, but you have decided consciously to do it, such as giving your child up for adoption. This behavior and subsequent action is not what we would normally characterize as heroic in women, and yet the absence of it is debilitating. Not all of us are Oprah! This also shifts cultural norms-the key is first changing your own behavior to courageously reclaim the female energy-that collective feminine energy will take off, just like when an airplane hits that speed that they have no choice but to take off. In The Wizard of Oz, the good witch said, “You’ve always had the power my dear, you’ve always had the power 14. When I think of courageous women, I think of Joan of Arc or Oprah Winfrey. Why did you focus on everyday women in your book? That’s the point—most people do acknowledge Joan and Oprah. Frankly, I focused on the everyday woman because there was not enough folklore that establishes and defines the feminine behaviors of courage. What’s interesting is that Joan of Arc was burned at the stake for speaking her convictions—the lesson her story teaches us is that strong women get burned! Oprah on the other hand challenges daily the long-held myths of the past. Her role model example gives other permission to do the same. This is the first step to shifting cultural norms—this is part of step one in the three-step process for integrating courage. I just saw a bumper sticker: “Well-behaved women rarely make history.” What does that tell you? In time, society will recognize women’s collective courageous acts and banish the unwritten rules that keep women from realizing their personal courage. This is why it is so important to refashion our own scripts and images that clutter our minds. By doing that, we can courageously reclaim the female creative power. 15. The subtitle of your book is Reclaiming the Forgotten Virtue. Why is courage the forgotten virtue? Courage is the forgotten virtue because women do not recognize their everyday actions as significant. My book is a practical guide for women to discover and integrate courage into their lives. Reclaiming courage means you operate at the next level.
<urn:uuid:b2963db6-00d9-48ba-bddc-41d0ed338e66>
CC-MAIN-2021-10
https://www.sandrawalston.com/book/courage/faqs/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178361510.12/warc/CC-MAIN-20210228145113-20210228175113-00295.warc.gz
en
0.959561
2,875
2.5625
3
(Phys.org)—Abnormal climatic conditions in the Indian and Pacific Oceans during the 2010-2011 La Niña event combined to create the extreme marine heatwave seen off the Western Australia coast in 2011, according to a new paper published in Nature Scientific Reports. Lead author Dr Ming Feng, from CSIRO's Wealth from Oceans Flagship, says the marine heatwave was driven by unusual features in the Leeuwin Current - a warm ocean current which flows southwards near the west coast of Australia – which was affected by extreme ocean and atmospheric conditions in the Pacific and Indian Ocean during the 2010-2011 La Niña. "Record easterly wind in the eastern Pacific and record northerly wind in the southeast Indian Ocean combined to produce an unseasonable surge of the southward-flowing Leeuwin Current and extreme ocean warming off the west coast of Australia," Dr Feng said. Water temperatures were recorded by satellite, robotic Argo profilers and continental shelf moorings operated as part of Australia's Integrated Marine Observing System. During the heatwave water temperatures were more than 3ºC above long-term seasonal averages, climbing up to 5ºC above for a two-week period at the peak of the event, and causing widespread impacts on marine ecology, including fish kills and coral bleaching. Water temperatures affect the growth, survival, abundance and distribution of most marine species. Rapid short-term temperature rises can be harmful or even lethal to marine organisms, as in the case with coral bleaching and fish mortality, and have potentially catastrophic impacts on marine ecosystems throughout the world's oceans. The seasonal sea surface temperature warming off the west coast of Australia has been termed a 'Ningaloo Niño', an analogy to other eastern continental boundary current warming phenomena such as El Niño in the Pacific and the Benguela Niño in the Atlantic. "Understanding the factors that influence the formation of events like the 2011 Ningaloo Niño is a vital first step in preparing for impacts from extreme warming events in the future," said Dr. Feng. Co-author, Dr Michael McPhaden of the Pacific Marine Environmental Laboratory, NOAA, said the research demonstrated the significance of far-away events to our own backyard. "Nature always finds a way to surprise us and the Ningaloo Niño is just the latest episode in this continuing saga. "This is research that matters to society because it tells us that what happens in your backyard can be influenced by events happening in far away places and at times in the distant past," Dr McPhaden said. Explore further: Unprecedented Indian Ocean heatwave creates melting pot More information: Feng, M., et al. La Niña forces unprecedented Leeuwin Current warming in 2011. Scientific Reports 3, 1277; DOI:10.1038/srep01277 (2013). Background information on the ecological impact of the 2011 marine heatwave can be found in a report prepared for the Western Australia fisheries department.
<urn:uuid:43d571db-c2c3-4ce4-9405-60b4ea926e7d>
CC-MAIN-2018-13
https://phys.org/news/2013-02-ningaloo-nino-story-massive-western.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257644877.27/warc/CC-MAIN-20180317100705-20180317120705-00718.warc.gz
en
0.927337
610
3.640625
4
The Macquarie dictionary (Sixth Edition 2013) defines misogyny as: noun 1. hatred of women. - entrenched prejudice against women. OHPI stands against misogynistic speech made online particularly on social media. In particular, we campaign against rape jokes, threats and intimidation, slut-shaming, cyber-mobbing a woman to push her out of the discussion, and revenge porn. Below is a list of our publications documenting, reporting and highlighting instances of online misogynist speech. October 9, 2016: Misogyny and Politics June 1, 2016: Trolling the AFL with racism and misogyny January 21, 2016: Revenge Porn: What the law must do? January 5, 2016: WIN: misogynistic bullying account terminated January 3, 2016: Social Media Violence Against Women: Carla’s tale of a misogynistic bully January 10, 2016: Report Misogyny & Abuse on Twitter Nov 24, 2015: Crossing the line on political speech October 21, 2015: Some UPF supporters engage in extreme misogyny August 31, 2015: Report YouTube video promoting violence against women June 21, 2015: Promoting Dylann Roof’s Extremism on Facebook June 20, 2015: Facebook Fails to Protect Free Speech Against Hate June 5, 2015: Restore Australia’s cyberbullying of Mariam Veiszadeh June 5, 2015: Online Rants and Free Speech June 5, 2015: Report “Rape Joke” Facebook group May 8, 2015: Steps taken by Twitter to combat abuse March 8, 2015: An experience of online violence against women (Australian feminist campaigner Caitlin Roper shares her experience of online misogyny) September 29, 2013: Misogyny – Hate Against Women COMMENTARY & MEDIA COVERAGE November 24, 2015: Crossing the line on political speech September 18, 2015: OHPI in the Jewish Taskforce Newsletter March 24, 2015: Success! OHPI gets hate removed March 7, 2015: Australian feminist shares her experience of online misogyny (press release) December 15, 2014: New tool in fighting online hate (Australian Jewish News) December 11, 2014: OHPI: Tracking down the data to combat online hate (The Big Smoke) December 10, 2014: Hitting Back Against Hate (MX) December 9, 2014: Fight Against Hate Launched (OHPI Press Release) Council Bulletin (National Council of Jewish Women of Australia Ltd.) Misogyny and the Internet
<urn:uuid:d74937fe-ad50-468f-86f7-a926c9b58739>
CC-MAIN-2018-17
http://ohpi.org.au/misogyny/
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945459.17/warc/CC-MAIN-20180421223015-20180422003015-00596.warc.gz
en
0.81177
525
2.609375
3
Baoli in Hindi means stepwell. Built by successive rulers of Delhi to provide constant water supply to the city, baolis are an important aspect of Delhi~ez_rsquo~s architecture. Though not as ornate as the medieval Gujarati stepwell or vav, Delhi~ez_rsquo~s baolis are, nevertheless, unique and grand in their structure. A baoli consists of two parts: A vertical shaft from which water is drawn and the surrounding inclined subterranean passageways, chambers and steps which provide access to the well. The galleries and chambers surrounding these wells are often carved profusely and become cool, quiet retreats during summers. The chambers in some of the baolis are seven or eight levels below the ground level and thereby provide the much needed relief from summer heat. There are more than 30 baolis in Delhi. Originally used for storing rainwater, a majority of these are in ruins now. The oldest existing baoli of Delhi is Anangtal near Mehrauli, built in the 10th century during the reign of the Tomar dynasty. Gandhak ki Baoli near Qutab Minar - so called because of the smell of sulphur in water - and Hauz-i-Shamsi in South Delhi are two of the other old baolis. Some of the best preserved baolis are Rajon Ki Baoli in Mehrauli, Hauz Khas Baoli near Deer Park and Ugrasen ki Baoli near Connaught Place.
<urn:uuid:8b45a424-4f0e-4432-89b8-c3ccb20632e7>
CC-MAIN-2016-26
http://www.india9.com/i9show/Baoli-61723.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00100-ip-10-164-35-72.ec2.internal.warc.gz
en
0.945293
311
3.125
3
In structural systems the floor and roof components support not only gravity loads, but also act as a diaphragm to transfer lateral loads (such as wind and seismic forces). These components also provide bracing to vertical elements and protect them against abnormal loading. Precast concrete floor and roof systems can be designed and used as diaphragms. Hollow-core systems may utilize perimeter reinforcing and grouted joints or may use a reinforced concrete topping. Double tee systems may include untopped or pre-topped tees, pre-topped tees with pour strips at the ends, or tees with cast in place topping. More information on diaphragm design can be found in the PCI Design Handbook.
<urn:uuid:c27c1212-6936-4e0e-8320-b183e1faf226>
CC-MAIN-2022-21
https://www.pci.org/PCIMidwest/BuildingEngineeringResources
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662577757.82/warc/CC-MAIN-20220524233716-20220525023716-00586.warc.gz
en
0.910171
151
2.765625
3
Back in 2013, we created a timeline of events from crossword history as part of our celebration of the hundredth anniversary of the crossword. Although 105 isn’t as prestigious as 100, and the anniversary is technically tomorrow, we thought we’d honor the day this year by updating our comprehensive look at the long (yet surprisingly short) road it took to get to that marvelous centennial! So, without further ado or folderol, we proudly present: A Brief History of the Crossword (Updated) 16th – 11th century BC Inscriptions from New Kingdom-era Egypt (Eighteenth to Twentieth Dynasties) of horizontal and vertical lines of text divided into equal squares, that can be read both across the rows and down the columns, are made. These inscriptions are later referred to by Egyptologists as “Egyptian crossword puzzles.” 19th century AD Rudimentary crosswords, similar to word squares, begin appearing in England, and later elsewhere in Europe. June 22, 1871 Future inventor of the crossword, Arthur Wynne, is born. March 23, 1897 Future New York Times crossword editor Margaret Farrar is born. February 25, 1907 Future New York Times crossword editor Will Weng is born. December 21, 1913 The New York World publishes the first crossword, invented by Liverpool journalist Arthur Wynne. (The puzzle is originally known as a word-cross.) January 6, 1916 Future New York Times crossword editor Eugene T. Maleska is born. Margaret Farrar is hired by The New York World as a secretary, but soon finds herself assisting Arthur Wynne with proofreading puzzles. Her puzzles soon exceed Wynne’s in popularity. Colonel H.W. Hill publishes the first Crossword Dictionary. Margaret Farrar revises the cluing system for crosswords, sorting them into “Horizontal” and “Vertical” clues by number. (It wouldn’t be until the 1940s that the more familiar “Across” and “Down” terminology became the norm.) Margaret Farrar publishes the first book of crossword puzzles under contract for Richard L. Simon and Max Schuster, “The Cross-Word Puzzle Book.” It was an instant bestseller, launching Simon & Schuster as a major publisher. (Additional information available below the timeline.) The Daily Express, founded in 1900, becomes the first newspaper in the United Kingdom to carry crosswords. Crossword-themed novelty songs hit the airwaves as the puzzle craze intensifies, most notably “Crossword Mama, You Puzzle Me (But Papa’s Gonna Figure You Out).” The Amateur Crossword Puzzle League of America, a self-appointed group of puzzle enthusiasts, lobbies for rotational symmetry in crosswords, which becomes the standard. Solver Ruth Franc von Phul becomes a minor celebrity after winning The New York Herald-Tribune’s National All Comers Cross Word Puzzle Tournament at the age of 20. (She would win again 2 years later.) January 15, 1925 “Felix All Puzzled,” the first animated short to feature a crossword, is released. February 2, 1925 The crossword-fueled musical revue “Puzzles of 1925” opens on Broadway. It runs until May of 1925. February 15, 1925 Disney releases a crossword-themed animated short, “Alice Solves the Puzzle.” The cryptic crossword is invented by Edward Powys Mathers, who publishes under the pseudonym Torquemada. He devises them for The Observer newspaper. First reported instances of Braille crosswords, as newspapers mention Helen Keller solving Braille crosswords and recommending them to the blind. Dell Puzzle Magazines begins publishing. (Dell Publishing itself was founded in 1921.) Dell Pocket Crossword Puzzles first published. (The magazine continues to this day.) February 15, 1942 The New York Times runs its first Sunday edition crossword. (Additional information available below the timeline.) June 2, 1944 Physics teacher and crossword constructor Leonard Dawe is questioned by authorities after several words coinciding with D-Day invasion plans appear in London’s Daily Telegraph. (Additional information available below the timeline.) The crossword becomes a daily feature in The New York Times. August 26, 1952 Future New York Times crossword editor Will Shortz is born. Lyricist Stephen Sondheim begins creating cryptic crosswords for New York Magazine, helping introduce Americans to British-style crosswords. Will Weng succeeds Margaret Farrar as the second crossword editor for The New York Times. Penny Press is founded. Eugene T. Maleska succeeds Will Weng as the third crossword editor for The New York Times. First year of the American Crossword Puzzle Tournament, later featured in the documentary Wordplay. 149 contestants compete for the title in the first national crossword tournament since the 1930s. Howard Garns creates the modern Sudoku puzzle for Dell Magazines (under the name Number Place), the first pen-and-paper puzzle to rival the crossword in popularity (though this spike in popularity would occur decades later under the name Sudoku). June 11, 1984 Margaret Farrar, while working on the 134th volume in Simon & Schuster’s crossword puzzle book series, passes away. Will Shortz succeeds Eugene T. Maleska as the fourth crossword editor for The New York Times. November 5, 1996 One of the most clever and famous crosswords of all time is published, the election-preceding crossword where either BOB DOLE ELECTED or CLINTON ELECTED could read out, depending on the solver’s answers. The Wall Street Journal adds a crossword to its newspaper, and Mike Shenk is appointed editor. June 23, 2006 Wordplay documentary hits theaters, featuring celebrity solvers of crosswords as well as the participants and organizers of the 2005 edition of the American Crossword Puzzle Tournament. February 29 – March 2, 2008 Thanks in part to the Wordplay documentary, the American Crossword Puzzle Tournament outgrows its previous setting and moves to Brooklyn. June 6, 2008 Matt Gaffney launches his Weekly Crossword Contest (MGWCC). Lollapuzzoola, a crossword-solving tournament with a more tongue-in-cheek, freeform style, launches in Jackson Heights, New York. October 6, 2008 Patrick Blindauer’s famous dollar bill-inspired crossword puzzle is published. The city of Lvov, Ukraine, creates a crossword that spans an entire side of a 100-foot-tall residential building, with clues scattered around the city’s major landmarks and attractions. It’s awesome. October 11, 2011 PuzzleNation.com goes live. David Steinberg launches the Pre-Shortzian Puzzle Project, designed to compile a complete database of every New York Times crossword. August 13, 2012 PuzzleNation Blog is launched. June 14, 2013 Matt Gaffney celebrates five years of MGWCC, stating that MGWCC will run for 1000 weeks (which puts the final edition around August 6th, 2027). December 21, 2013 The Crossword officially turns one hundred years old. 1924: The publishing house Simon & Schuster, agreed to a small (3,600-copy) run of a crossword puzzle book, prompted by founder Richard L. Simon’s aunt, who wanted to give such a book to a friend. It became “a runaway bestseller.” In no time the publisher had to put the book back on press; through repeated printings, it sold more than 100,000 copies. Soon a second collection followed, and then a third and a fourth. In 1924 and 1925 the crossword books were among the top 10 nonfiction bestsellers for the year, besting, among others, The Autobiography of Mark Twain and George Bernard Shaw’s Saint Joan. February 15, 1942: The New York Times initially regarded crosswords as frivolous, calling them “a primitive form of mental exercise”; the motivating impulse for the Times to finally run the puzzle (which took over 20 years even though its publisher, Arthur Hays Sulzberger, was a longtime crossword fan) appears to have been the bombing of Pearl Harbor. In a memo dated December 18, 1941, an editor conceded that the puzzle deserved space in the paper, considering what was happening elsewhere in the world and that readers might need something to occupy themselves during blackouts. The puzzle proved popular, and Sulzberger himself would author a Times puzzle before the year was out. June 2, 1944: The words Omaha (codename for one of Normandy’s beaches), Utah (another Normandy beach codename), Overlord (the name for the plan to land at Normandy on June 6th), mulberry (nickname for a portable harbor built for D-Day), and Neptune (name for the naval portion of the invasion) all appeared in Daily Telegraph crosswords during the month preceding the D-Day landing. This has been attributed to either an incredible coincidence or Dawe somehow overhearing these words (possibly slipped by soldiers involved) and incorporating them into puzzles unwittingly. Do you have any suggestions for additions for our Crossword Timeline? Let us know in the comments section below! We’d love to hear from you! Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation! You can also share your pictures with us on Instagram, friend us on Facebook, check us out on Twitter, Pinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!
<urn:uuid:50ae65e9-2c12-45d9-9a99-30eb08441b9c>
CC-MAIN-2019-04
https://blog.puzzlenation.com/tag/lvov/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659890.6/warc/CC-MAIN-20190118045835-20190118071835-00366.warc.gz
en
0.909716
2,101
2.65625
3
known. Solvent labels, LCSSs, or other sources of information can be consulted to learn the flash point, vapor pressure, and explosive limit in air of each chemical handled. While all flammable substances should be handled prudently, the extreme flammability of some materials requires additional precautions. To ensure that laboratory workers respond appropriately, they should be briefed on the necessary steps to take in case of a fire. The laboratory should be set up in such a way that the locations of fire alarms, pull stations, fire extinguishers, safety showers, and other emergency equipment are marked and all laboratory personnel alerted to them (see section 5.C.11 below). Exit routes in case of fire should be reviewed. Fire extinguishers in the immediate vicinity of an experiment should be appropriate to the particular fire hazards. Proper extinguishers must be used because fires can be exacerbated by use of an inappropriate extinguisher. Telephone numbers to call in case of an accident should be readily available. Scale-up of reactions from those producing a few milligrams or grams to those producing more than 100 g of a product may represent several orders of magnitude of added risk. The attitudes, procedures, and controls applicable to large-scale laboratory reactions are fundamentally the same as those for smaller scale procedures. However, differences in heat transfer, stirring effects, times for dissolution, and effects of concentration and the fact that substantial amounts of materials are being used introduce the need for special vigilance for scaled-up work. Careful planning and consultation with experienced workers to prepare for any eventuality are essential for large-scale laboratory work. Although it is not always possible to predict whether a scaled-up reaction has increased risk, hazards should be evaluated if the following conditions exist: The starting material and/or intermediates contain functional groups that have a history of being explosive-e.g., N-N, N-O, N-halogen, O-O, and O-halogen bonds-or that could explode to give a large increase in pressure. A reactant or product is unstable near the reaction or work-up temperature. A preliminary test consists of heating a small sample in a melting point tube. A reaction is delayed; that is, an induction period is required. Gaseous by-products are formed. A reaction is exothermic. What can be done to provide cooling if the reaction begins to run away? A reaction requires a long reflux period. What will happen if solvent is lost owing to poor condenser cooling? A reaction requires temperatures below 0 °C. What will happen if the reaction warms to room temperature? In addition, thermal phenomena that produce significant effects on a larger scale may not have been detected in smaller-scale reactions and therefore could be less obvious than toxic and/or environmental hazards. Thermal analytical techniques should be used to determine whether any process modifications are necessary. Generally, it is prudent to avoid working alone at the bench in a laboratory building. Individuals working in separate laboratories outside of working hours should make arrangements to check on each other periodically, or ask security guards to check on them. Experiments known to be hazardous should not be undertaken by a worker who is alone in a laboratory. Under unusually hazardous conditions, special rules may be necessary. Laboratory operations involving hazardous substances are sometimes carried out continuously or overnight with no one present. It is the responsibility of the worker to design these experiments so as to prevent the release of hazardous substances in the event of interruptions in utility services such as electricity, cooling water, and inert gas. Laboratory lights should be left on, and signs should be posted identifying the nature of the experiment and the hazardous substances in use. If appropriate, arrangements should be made for other workers to periodically inspect the operation. Information should be posted indicating how to contact the responsible individual in the event of an emergency. All laboratory personnel should know what to do in case of an emergency. Laboratory work should not
<urn:uuid:a7e060a0-10fe-41ca-bbbb-6c3636512cce>
CC-MAIN-2015-06
http://books.nap.edu/openbook.php?record_id=4911&page=86
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115860277.59/warc/CC-MAIN-20150124161100-00216-ip-10-180-212-252.ec2.internal.warc.gz
en
0.925176
805
4.0625
4
NASAs Total Ozone Mapping Spectrometer (TOMS) provides measurements that enable scientists to accurately estimate how much of the suns UV-B (290 to 320 nm) radiation reaches the Earth's surface. Too much exposure to these wavelengths causes sunburn in human skin. The false-color image above is a global map, averaged from TOMS snapshots collected every day over a one-month period, showing where more or less UV radiation reaches the surface. Yellow pixels show the highest levels of radiation at the surface, red and pink hues are intermediate values, and white indicates little or no UV exposure. The TOMS sensor flies in a polar orbit, crossing the equator every day at 12 noon local time, allowing it to measure the total amount of ozone in a column of atmosphere as well as cloud cover over the entire globe. Ozone and clouds absorb most of the ultraviolet light passing through the atmosphere. TOMS also measures the amount of solar radiation escaping from the top of the atmosphere. It is the combination of those three measurements that enables scientists to accurately estimate the amount of UV radiation that reaches the Earth's surface. Ultraviolet radiation exposure data and images. Data courtesy TOMS science team, NASA Goddard Space Flight Center
<urn:uuid:28f98322-205f-48e3-9212-20505f30883d>
CC-MAIN-2015-48
http://earthobservatory.nasa.gov/IOTD/view.php?id=998&eocn=image&eoci=related_image
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447860.26/warc/CC-MAIN-20151124205407-00301-ip-10-71-132-137.ec2.internal.warc.gz
en
0.890831
253
4.1875
4
Oral lichen planus This white lacelike patch on the interior surface of the cheek is typical for oral lichen planus. Oral lichen planus (LIE-kun PLAY-nus) is an ongoing (chronic) inflammatory condition that affects mucous membranes inside your mouth. Oral lichen planus may appear as white, lacy patches; red, swollen tissues; or open sores. These lesions may cause burning, pain or other discomfort. Oral lichen planus can't be passed from one person to another. The disorder occurs when the immune system mounts an attack against cells of the oral mucous membranes for unknown reasons. Symptoms can usually be managed, but people who have oral lichen planus need regular monitoring because they may be at risk of developing mouth cancer in the affected areas. Products & Services Signs and symptoms of oral lichen planus affect the mucous membranes of the mouth. The lesions may appear as: - Lacy, white, raised patches of tissues - Red, swollen, tender patches of tissues - Open sores These lesions may appear on the: - Inside of the cheeks, the most common location - Inner tissues of the lips Pain or discomfort The white, lacy patches may not cause discomfort when they appear on the inside of the cheeks. However, symptoms accompanying red, swollen patches and open sores may include: - Burning sensation or pain - Sensitivity to hot, acidic or spicy foods - Bleeding and irritation with tooth brushing - Inflammation of the gums (gingivitis) - Painful, thickened patches on the tongue - Discomfort when speaking, chewing or swallowing Other types of lichen planus If you have oral lichen planus, you may have lichen planus lesions affecting other parts of your body. - Skin. Lesions usually appear as purplish, flat-topped bumps that are often itchy. - Genitals. Lesions on the female genitalia often cause pain or burning and discomfort with intercourse. The lesions are usually red and eroded and occasionally appear as white areas. Lesions can also occur on male genitalia. - Ears. Lichen planus of the ears can lead to hearing loss. - Scalp. When skin lesions appear on the scalp, they may cause temporary or permanent hair loss. - Nails. Though rare, lichen planus of the toenails or fingernails may result in ridges on the nails, thinning or splitting of nails, and temporary or permanent nail loss. - Eyes. Rarely, lichen planus may involve the mucous membrane surfaces of the eyes, and can cause scarring and blindness. - Esophagus. Lichen planus of the esophagus is rare, but when it occurs, it may result in a narrowing of the esophagus or the formation of tightened, ringlike bands in the esophagus that can make swallowing difficult. When to see a doctor See your doctor or dentist if you have any signs or symptoms listed above. From Mayo Clinic to your inbox Sign up for free, and stay up to date on research advancements, health tips and current health topics, like COVID-19, plus expertise on managing health. ErrorEmail field is required ErrorInclude a valid email address To provide you with the most relevant and helpful information, and understand which information is beneficial, we may combine your email and website usage information with other information we have about you. If you are a Mayo Clinic patient, this could include protected health information. If we combine this information with your protected health information, we will treat all of that information as protected health information and will only use or disclose that information as set forth in our notice of privacy practices. You may opt-out of email communications at any time by clicking on the unsubscribe link in the e-mail. Thank you for subscribing Our Housecall e-newsletter will keep you up-to-date on the latest health information. Sorry something went wrong with your subscription Please, try again in a couple of minutes It's not known what causes oral lichen planus. However, T lymphocytes — certain white blood cells involved in inflammation — appear to be activated in oral lichen planus. This could indicate an immune disorder, and genetic factors may be involved. But more research is needed to determine the exact cause. It's possible that, in some people, oral lichen planus may be triggered by certain medications, mouth injury, infection or allergy-causing agents such as dental materials. Stress may be involved in symptoms becoming worse or recurring. However, these causes are not confirmed. Anyone can develop oral lichen planus, but it's more common in middle-aged women. Some factors may increase your risk of developing oral lichen planus, such as having a disorder that lowers your immunity or taking certain medications, though more research is needed. Severe cases of oral lichen planus may increase the risk of: - Significant pain - Weight loss or nutritional deficiency - Stress or anxiety - Scarring from erosive lesions - Secondary oral yeast or fungal infections - Oral cancer Dec. 06, 2019
<urn:uuid:2beeeb9e-d9c7-4d02-8d7c-3899fb12ebb4>
CC-MAIN-2022-21
https://www.mayoclinic.org/diseases-conditions/oral-lichen-planus/symptoms-causes/syc-20350869
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662533972.17/warc/CC-MAIN-20220520160139-20220520190139-00481.warc.gz
en
0.892404
1,142
2.703125
3
Hemp is one of the most versatile plants on earth. I once heard a statistic that hemp can be used to make up to 25,000 different things. I didn’t personally see the list, so I don’t know the accuracy of that claim, but I think it’s safe to say that hemp is amazing. The hemp plant can be used to make hempcrete, which is a substance that can be used to build houses and other structures. Hemp can be used to make food, paper, and fiber. Hemp has even been used to make car parts. Hemp used as a decontaminant Hemp is very efficient at pulling heavy metals from soil. It’s what helps it grow so hearty and so quickly. Trees take decades to harvest, whereas hemp only takes months. Because of hemp’s ability to pull metals from the soil, it can be used very effectively to clean up areas that are contaminated. One town in Italy (Taranto) is using hemp to clean up a contaminated area that has housed Europe’s largest steel plant for a long time. The steel plant, which opened in 1965, has ravaged the local ecosystem, pumping toxic levels of contaminants into the ground. It is estimated that from 2005-2012 alone, upwards of 11,000 local residents died as a result of health issues directly related to the steel plant. “A long time ago, a choice was made to sacrifice this part of Italy, jeopardizing the health of the citizens of Taranto and its community and the biodiversity of the two seas,” said politician Domenico Finiguerra, according to Slate. “It was decided to sacrifice this land in the name of Italy’s economic future, supplying its industry with all the steel it needed.” Hemp has been cultivated near the site of the steel plant for the last five years, with production increasing from 3 hectares to 300. About 100 farmers grow hemp, with the harvest being sold to manufacturers to be made into various products. Hemp works, so why isn’t its use more widespread? Taranto, Italy is not the first time that hemp has been used to decontaminate the soil. For many centuries hemp was used as a rotation crop because it essentially flushed out the soil so it could be better conditioned for other crops. Hemp was planted at the site of the nuclear meltdown at Chernobyl, along with various other plants such as sunflower plants. Hemp has consistently proven to be the best plant at decontaminating the soil it is planted in because of hemp’s tremendous uptake ability. Unfortunately, the reason why hemp isn’t used more often is entirely for political reasons. It’s certainly not for scientific reasons. Hemp is non-toxic. According to an estimate from the movie Hempsters, a person would have to smoke a joint the size of a telephone pole in order to feel euphoria from hemp. To overdose on it is humanly impossible. The fact of the matter is that opponents have fought hemp legalization at all costs because of the plant’s versatility, and the likely dramatic affect reform would have on many industries. It’s not coincidence that many of the same people that have historically opposed hemp also come from industries that hemp reform would directly affect. It’s a shame too, because science is clearly on the side of hemp reform. I don’t know that I would go as far as some people and claim that hemp will save the world, but I do feel confident in saying that hemp could go a long ways in helping improve the world in many ways.
<urn:uuid:6c46cc60-dea8-4d0f-865c-d90e3016f456>
CC-MAIN-2021-10
https://news.green-flower.com/hemp-used-decontaminate-europe-largest-steel-plant-site/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178355944.41/warc/CC-MAIN-20210226001221-20210226031221-00118.warc.gz
en
0.96633
758
2.90625
3
1911 Encyclopædia Britannica/Wyandotte WYANDOTTE, a city of Wayne county, Michigan, U.S.A., on the Detroit river, about 6 m. S. by W. of Detroit. Pop. (1900) 5183, of whom 1267 were foreign-born; (1904) 5425; (1910) 8287. It is served by the Michigan Central, the Lake Shore & Michigan Southern, the Detroit, Toledo & Ironton, and (for freight only) the Detroit & Toledo Shore Line railways, and by two interurban electric lines. Salt and limestone are found here and the city has various manufactures. Wyandotte was first settled about 1820, was laid out as a town in 1854, and chartered as a city in 1867.
<urn:uuid:61afca43-dd93-4604-9e15-49e2d7a07426>
CC-MAIN-2015-18
http://en.wikisource.org/wiki/1911_Encyclop%C3%A6dia_Britannica/Wyandotte
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246660493.3/warc/CC-MAIN-20150417045740-00128-ip-10-235-10-82.ec2.internal.warc.gz
en
0.954562
172
2.625
3
Published on : Mar 29, 2016 As stead by the American Autoimmune Related Diseases Association (AARDA), autoimmune diseases affect almost 50 million Americans. In the instance of autoimmune diseases, the body’s immune system targets and destroys healthy tissues in the body rather than targeting foreign bodies. Contrarily, if the body functions normal the immune system protects the body against diseases. Autoimmune disorders cause significant pain, inflammation, and sometimes can even lead to organ damage. These conditions affect nervous system, cardiovascular system, and musculoskeletal system or even individual organs such as kidneys, glands, skin, lungs, and joints. The number of autoimmune diseases are as much as 80. Many of these have similar symptoms, thus makes it difficult to diagnose. Autoimmune diseases may be present in more than one in number. These diseases usually fluctuate between periods of little or no symptoms to worsening symptoms. Currently, there is no curative therapy for autoimmune diseases, thus clinical research is focused on relieving symptoms for these conditions. Predominantly, autoimmune diseases run in families, and as per AARDA 75% of individuals affected with the condition are women. In particular, in North America, Hispanics, African Americans, and Native Americans have an increased risk of developing autoimmune diseases. Some common autoimmune diseases are Addison’s disease, psoriasis, Sjögren’s syndrome, reactive arthritis, systemic lupus erythematosus, rheumatoid arthritis, celiac sprue disease, pernicious anemia, inflammatory bowel diseases, Grave’s disease, scleroderma, vitiligo, and type 1 diabetes. The causes for autoimmune diseases are unknown, however, theories that are related to trigger these conditions include bacterial or viral infections, chemical irritants, drugs, and environmental irritants. Individuals that have a family member with autoimmune disorders are more susceptible to developing the condition. Because autoimmune diseases are of different types, the symptoms vary from each other. However some common symptoms include fever, fatigue, and general malaise. In the event of autoimmune disorders, symptoms worsen at the time of flare-up and reduce during remission.
<urn:uuid:20028734-c217-42e9-b870-ac41b603daf7>
CC-MAIN-2017-26
http://www.researchmoz.us/article/autoimmune-diseases-market-in-expansion-mode-to-seek-curative-therapies
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320209.66/warc/CC-MAIN-20170624013626-20170624033626-00091.warc.gz
en
0.920154
445
3.15625
3
KVM is an acronym for Keyboard, Video (monitor) and Mouse, which is sometimes also called a PC switch or an Electronic switch. A KVM switch however, is quite different when compared to a conventional data switch. The main function of a KVM switch is to control, switch and manage many PCs via a single keyboard, monitor and mouse. When a typical PC is starting up, the operating system will automatically try to detect the signals of the keyboard and mouse. After confirmation of connectivity, the screen then displays the start up page. As a result, the start-up operations of a single PC (CPU/Server) are intricately involved with that of its keyboard and mouse. If you need to control multiple PCs, then you need to purchase several sets of keyboard, mouse and monitor. This is not the most effective management since not only is it space-consuming but also costly. Also keeping a row of large CRT monitors with keyboards and mice may be problematic. Thus the KVM switch was "born" from the demands of saving space, costs, and increasing management efficiency. When purchasing a KVM, the choice is often based on the number of PCs that you need to control. KVMs with only a few ports are generally more convenient to use without the need for installing extra software. They can also easily be managed using hot keys or switch keys. Additionally, some of these KVMs, equipped with only a few ports, do not even need an external power supply. Due to environmental (space) needs, high-level KVM switches with multiple ports can be installed in a server rack using only 1U or 2U in space. These KVM switches can also use IP networks to manage power point outlets and control the start up or shut down of PCs. The main function of a KVM switch is to use only one set of keyboard, monitor and mouse to start multiple PCs. It is important that the KVM switch ensures the simulated keyboard and mouse signals reach each PC and that during switching there is no affect on the PCs CPU operations. A KVM switch must also provide stable video resolution, support multiple computer platforms and operating systems, and be able to interface with many different brands of keyboards and mice. Each KVM switch can only support a maximum number of PC connections, i.e. the total number of ports. A single KVM switch can provide as few as two CPU ports, while a multiple KVM switch installation can offer more than 4000 CPU ports. As the number of connected computers increase, the technology needs, for example signal identification, are higher in order to cope with multiple input and output signals. Correspondingly the management complexity increases as well to provide features such as Remote Control, Multiple Segmentation, and High-level Security. Remote Control solutions currently use either hardware driven KVM switches or software such as PCAnywhere, VNC, OpenSSH, and Microsoft Telnet Service. Please refer to our Remote Control Solutions column for a comparison of KVM versus Software Remote Control solutions. Previously, KVMs have primarily been used in server rooms and data information centers equipped with multiple servers. An average-sized server room could contain 16 to 32 servers, whereas a larger server room may well contain over 100 servers. Since PCs costs are increasingly priced lower the average consumer can now afford a second or multiple PCs. Therefore, nowadays, consumers are purchasing KVMs for both convenience and space-saving needs in the home. KVM switches are constantly evolving in order to support new needs such as advancements in technology, new specifications, innovative concepts, and new applications. Some examples of the latest KVM technologies include KVM + Peripheral / KVMP¡BKVM + Fast Ethernet / KVME, Wireless KVM, and KVM over the Net. These new KVM technologies are also increasingly popular in a consumer market exploding with new personal home technologies. Lately Digital Appliances are becoming mainstream with consumers. Multi-faceted development of KVM switches can cater to this market as well and create new concepts that may not have been previously possible. Some basic terminology for KVM Switch specifications include: The number of ports is indicative of the number of PCs that can connect to the KVM. For example, for an 8 Port KVM Switch, a single keyboard, monitor and mouse can control up to 8 PCs. Currently, the most common number of ports equipped in a KVM switch is either 2, 4, 8, 16 or 32 Ports. When the number of PCs surpasses thirty-two, cascading or daisy chaining the KVMs is then used to connect to the PCs. In order to more conveniently control and run multiple PCs, some KVM have various functions to assist in management such as hot keys, On Screen Display (OSD), and Broadcasting. Some innovative KVM companies have also developed proprietary embedded core logic chips in order to increase operational stability and the efficiency of the signal execution. Note: Please refer to the high-end KVM feature article to find out more about connectivity. The console is the input/output station for a computer including monitor, keyboard and mouse (if required). However in KVM terms this refers to the control that is used to manage the keyboard, monitor and mouse of the PC. Normally, a console has three different ports for the keyboard, mouse and monitor. The specifications for the keyboard and mouse connector are USB and PS/2, whereas the specifications for the monitor are DVI and HDB 15. Note: Some KVM Consoles supporting audio also have ports for the microphone and speakers. KVMs that are specifically designed for use with SUN and MAC computers have different ports. This term refers to the connected PC. A single CPU port on a KVM has three different signal ports (keyboard, mouse and monitor) to connect with the ports on the PC. In order to save on the Bill of Material (BOM) and to increase the convenience of installation, some companies manufacture their own proprietary cables combining the aforementioned three cables into one. Using three cables in one simplifies the desktop space by reducing the clutter of multiple cables. The cable signals can easily be affected by interference from external and even internal sources. Therefore it is recommended to choose a professional KVM brand to minimize these problems. Note: KVMs that support audio also have ports for both the microphone and speakers available on the CPU/KVM port. KVM switch categories can be divided as follows: - small office and home office (SOHO) - small and medium-sized business (SMB) - large or high-end global enterprise-level KVM Many KVM companies then further divide high-end KVM to remote-controlled high-end KVM and nearby-controlled high-end KVM. For further explanation of the different types of KVMs, please visit the ATEN home page at www.aten.com.
<urn:uuid:360fc174-4b79-46fb-bfff-eae69db866ac>
CC-MAIN-2015-18
http://www.aten.com/data/solution/what_is_kvm/what_is_kvm.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246634331.38/warc/CC-MAIN-20150417045714-00024-ip-10-235-10-82.ec2.internal.warc.gz
en
0.941451
1,423
3.046875
3
Wednesday, 7 October 2015 Bible Reading: Daniel 5v13-31 'Ultimate Accountability' The stage is set in v1-12 and in verse 13 as Daniel comes before Belshazzar it is almost as if the king reminds him of his position; that he is an exile, taken from his land, subject to the power and might of the Bablyonian empire. But, verse 17, Daniel’s motivation isn’t rewards but faithfulness to God and that is seen clearly in his response to the king that is phrased in the form of a rebuke. Daniel begins by emphasising and exalting the sovereignty of the very one that Belshazzar began the evening mocking as he drank from the cups from the temple. And the rebuke continues as Daniel teaches the king the lessons of history he should have learnt from the life of Nebuchadnezzar. But the emphasis in Daniel's words is on God not Nebuchadnezzar: “the most high gave…he gave him…he was deposed…he was driven…until he acknowledged that the Most High God is sovereign…” Then in verse 22-23 the charges begin. Daniel uses “But…” to draw a clear contrast between Nebuchadnezzar and Belshazzar... “you…” emphasises the personal nature of the charge sheet God has against Belshazzar being read out by Daniel. Hegel once said “the only thing we learn from history is that we have learnt nothing from history”. That is certainly true of Belshazzar, despite knowing all that had happened to his ancestor, despite having access to that he has learnt none of the lessons. And that failure leads him to foolishly stand against and mock Yahweh. It's worth noticing that another theme of the book appears again in verse 23: the stupidity of worshipping idols “which cannot see or hear or understand.” in contrast with God who “holds in his hands your life and all your ways.” The result of the charge sheet, of sins, is this judgement from God “…he sent the hand…” The writing reads; Mene = from the verb to number, Tekel = from the verb to weigh or assess, Peres = to divide or to part. God has weighed Belshazzar found him wanting, numbered his days and is judging and the kingdom will be divided and given to Medes and Persians. Unlike with Nebuchadnezzar's dream there is no stump, a warning that we cannot presume on God’s grace. And verse 30 shows us the immediacy of the judgement – “That very night…” It seems likely that the city was under siege already, and that Belshazzar us holding the feats as a show of his confidence in his strength and defences. The city was very well protected against siege and had years worth of stores of food. But Xenophon records the city was taken during a night festival and the king slain. Chapter 5 reminds us again that God is sovereign and he judges just as he said events change, empires and rulers rise and fall (c/f ch 2 – end of Babylonian empire), but God and his kingdom endure. Opposition to God is futile, failure to learn the lessons leads to judgement.
<urn:uuid:713f4630-282c-4292-aa87-7927b8272baa>
CC-MAIN-2017-34
http://graceinthecommunity.blogspot.com/2015/10/bible-reading-daniel-5v13-31-ultimate.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886116921.70/warc/CC-MAIN-20170823000718-20170823020718-00464.warc.gz
en
0.976023
695
2.828125
3
We often talk about what we need as teachers in order to be effective. What about what we don’t need? Especially if you’re new, it can be daunting to decide what you want to include. So, to that end, here’s a list of things you can potentially skip and still teach effectively. Disclaimer: there’s no judgment on any of these items and they’re all wonderful on their own or in any combination. This is just an exercise in what might be involved in being essential as a teacher. An Interesting Sequence We can get caught up in the idea that in order to be popular or desirable as a teacher, we need to teach interesting, ever changing sequences. A well thought out, anatomically sound class, taught regularly can be challenging, effective and attractive to students of all levels. An In-Depth Knowledge Of Sanskrit This one’s a little trickier. There’s some basic Sanskrit you should know and be able to pronounce correctly when you teach. You should know the Sanskrit for the poses you teach, even if you’re teaching in English primarily. Using clear, action oriented phrases is understandable to all. Some styles of yoga and training encourage primary use of Sanskrit. Just be sure whatever you say, you are pronouncing it correctly and can explain what it means. Using music is entirely optional and should not be seen as a requirement for teaching, unless you and the studio owner have found that the class style requires it. If we use the general guidelines of inversions, arm balances and binds being characteristics of many of the more advanced postures, one could suggest that an effective class can proceed without any of these. More than reading, speak from your heart and share openly. One should never feel they are spending more than a few minutes selecting a reading for class and they should be used judiciously so as not to sound preachy or be distracting. Generally speaking, readings don’t need to be used at all. While lovely to use, they can bring up allergies and reactions to smell for some people. Jokes Or Stories If the spirit moves you, they’re great to share but it’s not necessary that you be using either of these to make your classes more attractive to students. We should always feel that we can leave students with the instruction for the pose, cueing on the breath and that’s it. Expensive Or Brand Name Yoga Clothing You should look neat and professional. Whether you’re wearing the latest in yoga gear or an older, less popular style, your teaching quality has nothing to do with what you wear. A Yoga Mat This might sound crazy but truly, you should be able to walk into a room, anywhere, and teach a class. You might do a pose or two every now and then in order to illustrate a point but that might be it. Whatever you do decide to include in your classes, don’t forget the most important thing: your true nature and the commitment to always being yourself.
<urn:uuid:65018b60-a50a-4257-8c77-f7126c283230>
CC-MAIN-2018-43
https://www.doyouyoga.com/9-things-you-dont-need-to-teach-yoga/
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511122.49/warc/CC-MAIN-20181017090419-20181017111919-00243.warc.gz
en
0.944903
635
2.59375
3
The Bard and the Bible The Bard and the Bible (A Shakespeare Devotional) pairs 365 short passages from each of the two greatest works of English literature ever created, which were compiled in the same period and in the same city. It offers a year of daily readings based on verses from the King James Version of the Bible and lines from Shakespeare's plays and sonnets. The poetry of the Bard and the power of God's Word will enrich your understanding and appreciation of both, provide new ways to encounter and respond to God, and yield both intellectual stimulation and spiritual inspiration. Available NOW from Amazon, Barnes and Noble, CBD, and in fine bookstores everywhere. Tag Archives: King John Bet you didn’t know that both the King James Version of the Bible and the Bard’s works mentioned baseball repeatedly, did you? It’s true. Last week, in honor of the start of Spring Training, this blog featured a listing of … Continue reading This week’s episode on The Bard and the Bible Podcast is now live. You can also easily subscribe to the podcast on iTunes, to ensure that you never miss an episode in the future. It is really extraordinary that this exists: a 118-year-old silent movie scene from Shakespeare’s King John, portraying the death of the king.
<urn:uuid:05a572e2-693a-4e76-bb83-54ee69b6c554>
CC-MAIN-2018-39
https://bardandbible.wordpress.com/tag/king-john/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155561.35/warc/CC-MAIN-20180918150229-20180918170229-00038.warc.gz
en
0.944117
272
2.53125
3
Cookbook:Sauces(Redirected from Cookbook:Spreads) Sauces are thickened liquid additions to a recipe, used to enhance the flavor or appearance, or to add moisture. In the 1800s, the French chefs Antonin Carême and Auguste Escoffier developed a systematic categorization of sauces, based on five "mother sauces". All sauces were considered to be a variation of one of these sauces. As other cuisines and ingredients have become more common to world cuisine, the number of mother sauces and sauce families has expanded slightly, but most sauces can be seen as a variation or adaptation of a few basics. The sauces below are grouped by their family. The first five groups are the traditional sauce families, with the modern additions following. Except for the Dessert family, the top sauce in each family is that family's "mother sauce". Many of the mother sauces use a roux as the thickening agent. Roux itself is not really a sauce, as it would not be used alone.
<urn:uuid:c3b611b8-08b1-45fb-a6c4-073ca53af605>
CC-MAIN-2017-39
https://en.m.wikibooks.org/wiki/Cookbook:Spreads
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689471.25/warc/CC-MAIN-20170923033313-20170923053313-00097.warc.gz
en
0.96159
214
2.796875
3
Learn something new every day More Info... by email Signage is a general term for any sort of graphic display intended to convey information to an audience. There are many different types of signage, and it has existed for thousands of years. Most modern signage relies on words, often in tandem with images, but a great deal of historical signage used only images, and much modern signage geared towards an international audience also omits text entirely. Custom-made signage is usually designed for a business, to convey the name and location of the business, or to promote a specific service or product that the business offers. Custom-made signage may be as simple as a small hand-written sign hung in the window of a shop, or it may be a very intentional bit of branding put together by a large-scale marketing company and present on thousands of outlets of a single corporation. This type of signage comes in all shapes and sizes, and there are very few common themes among the different types. Often custom-made signage meant to promote a business will include the name of the business, but the most effective forms of signage tend to have a central element aside from the name that becomes iconic. The signage used for the McDonalds™ company is an excellent example of this. The iconic Golden Arches used in their signage have become as well-recognized as their name, making them immediately visible from great distances, and giving them limitless branding opportunities. Another ever-present form of signage is street-signage, meant to give information to pedestrians or drivers. Actual street signs, for example, such as those seen in many cities throughout the United States with white lettering on a green background, give the names of streets and cross-streets to help people navigate their way around a city or town. Although these signs have changed over the years, since their primary goal is to communicate location to busy, often fast-moving people, they tend to focus on legibility above all else. Hazard and instructional signs are another form of street-signage which can be seen in most countries throughout the world. Since these signs need to be easily recognized from a distance, and also need to be comprehensible to anyone who may be driving, including those who do not speak the native language, they nearly always feature some sort of design theme or infographic, either accompanied by text or alone. For example, a street sign indicating deer may be crossing the road sporadically, meant to warn drivers to slow down, may simply show a picture of a deer, in the United States generally in a simple black silhouette on a yellow background. Similarly, a Stop sign, as it needs to be easily recognized from a distance, and in poor visibility conditions, is a unique red color and a unique octagonal shape. With the advent of the internet, the concept of signage has made its way into the digital world. Digital signage is a term used to describe logos, banners, and other navigational devices found online, even though they are not technically signs. They do, however, serve much the same purpose as real world signage, and often rely on a similar design aesthetic. One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK!
<urn:uuid:cae6a674-cbf3-449e-ba60-9506527e7917>
CC-MAIN-2016-36
http://www.wisegeek.com/what-is-signage.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982296020.34/warc/CC-MAIN-20160823195816-00045-ip-10-153-172-175.ec2.internal.warc.gz
en
0.965799
685
2.796875
3
Astronomer astronomer and he 24-9-2015 news about isaac newton commentary and a biography of sir isaac newton the physicist and mathematician archival information. The story of isaac newton's much of modern physics yet he had explaining the universe in mathematical terms newton also hunted out new. Image via wikipedia who knew the infamous english physicist and mathematician isaac newton, well known for major contributions to the scientific community, also. Sir isaac newton (1642-1727) was an english scientist and mathematician he made major contributions in mathematics and theoretical and experimental physics and. English physicist and mathematician the basic principles of investigation that newton defined, together with his scientific work, laid the foundations for modern. Sir isaac newton biography pdf history of physics sir isaac newton biography in sir isaac newton was an english physicist, astronomer, mathematician. Sir isaac newton prs (25 december 1642 – 20 march 1726/27) was an english physicist and mathematician who is widely recognised as one of the most. Sir isaac newton prs mp (25 december 1642 – 20 march 1727) was an english physicist and mathematician who is widely regarded as one of the most influential. Biography of isaac newton mathematics, optics, physics english: on sir isaac newton’s flrst solution of the problem for flnding the relations. Isaac newton, biography newton, sir isaac (1642-1727), english by combining action-at-a-distance and mathematics, newton transformed the mechanical. Mathematical physics refers to the development of mathematical methods for application to problems in isaac newton (1642–1727 the english physicist lord. Sir isaac newton’s (1642-1727) english mathematician, physicist sir isaac newton’s numerous contributions to the fields of physics, mathematics. If i have seen further, it is by standing upon the shoulders of giants sir isaac newton was an english physicist, mathematician, astronomer, alchemist, inventor and. Sir isaac newton was an english physicist, mathematician, astronomer, natural philosopher, alchemist, and theologian philosophiæ naturalis principia mathematica. Sir isaac newton prs (/ was an english mathematician enlightening science videos on newton's biography, optics, physics. Isaac newton's birthday and biography isaac newton was an english physicist and mathematician best known for his law of gravitation his formulation of calculus, the. Isaac newton, english physicist, mathematician, father of modern science, who developed the law of gravity and declared if i have seen further it is by standing. Lucidcafé's profile of sir isaac newton his accomplishments in mathematics, optics, and physics laid the the comprehensive a&e biography of sir isaac newton. Isaac newton acting an alpha male in a portrait find this pin and more on science and god by ojarrondo newton isaac: english mathematician & physicist, one of the. Home biographies of famous scientists isaac newton biography mathematics and physics isaac newton made a series of original the great english. Biography of a mathematician: sir isaac newton essay biography of a mathematician: sir isaac newton newton was an english physicist and mathematician. Isaac newton's life newton, sir isaac (1642-1727), mathematician and newton read recent work on optics and light by the english physicists robert boyle and. English physicist and mathematician who was born into a poor farming family luckily for humanity, newton was not a good farmer, and was sent to cambridge to study to. English physicist and mathematician sir isaac newton isaac of all trades english scientist and mathematician isaac newton is most isaac newton biography. Luckily shoes on jordan michael essays for humanity, newton was not a 8-7-2016 born in england, isaac newton was a highly influential physicist, astronomer. Discover unexpected relationships between famous figures when you explore our famous mathematicians new biography on isaac newton english physicist and. Sir isaac newton prs mp was an english physicist and mathematician sir isaac newton prs mp was an english physicist and mathematician biography.
<urn:uuid:c231c868-7e71-4b80-8249-946145726525>
CC-MAIN-2018-17
http://iypaperqtlg.fieldbee.us/a-biography-of-isaac-newton-the-english-physicist-and-mathematician.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945648.77/warc/CC-MAIN-20180422193501-20180422213501-00100.warc.gz
en
0.941287
927
3.234375
3
What causes stress at work? Stress impacts all of us. It causes health problems and accidents and affects the national economy. In my management career, I observed that incompetent managers cause stress their employees. These managers seem to always adopt a crisis mindset when managing. They rarely listen to others; they lack creativity and rely on old habits. Their approaches cause stress for people they manage. Incompetent managers give unclear directions, apply unrealistic expectations, and micro-manage their employees. All of this causes stress for people. People also bring stress from home. This mix of personal concerns, poor management, and constant pressure to perform to external expectations at work can cause much stress. When stress is bad Stress is bad when expectations are not clear at work and people are confused about what they are supposed to do. When people have challenging work and they don’t have the right skills, it leads to burn-out and stress. When one is not challenged at work and has skills, which are not being used, it can lead to boredom and then stress as a result. Stress is bad when a person has inadequate coping methods for dealing with the stress. Some people react to stress with increased anxiety and openly show their anger. Others resist things and get suppressed. Another group of people give in easily and finally give up. All these approaches are not healthy. People cause their own stress. Initially, generated thoughts of doubt and fears cause anxiety. Those who don’t know how to deal with it experience stress as a chronic state. Work related and personal events can raise the potential of stress that all people react differently. What influences how we react to stress? There are many factors which will determine how we react to stress. Most of our reactions are learned behavior. The ways we condition ourselves will have a big impact on the way we react to stress. For example, one person might notice that his or her manager didn’t smile or say hello in the morning. By the evening this person will cancel the family vacation, child’s dental braces, and a new coat as a result of being convinced to be fired soon. Another person in the same situation might think, “Oh, I guess the boss has something on the mind” spending less than a few seconds on this. Money pressures, health pressures, lack of joy at work, relationship issues, all can lead to stress at work. Again, how we react is what is most important. How to manage stress in the best way Individuals can actually manage and even defeat stress through multiple strategies. For example, adopting an internal locus of control can defeat stress. Learning to control your own thoughts and behaviors from within can defeat the habit of always overreacting to external events, opinions, and behavior. Having great health resiliency can help to defeat stress too. This can include sleeping well, to eat healthy food, and to get lots of exercises. Being in a great shape can make a person feel so good, strong, and full of energy that even having the most negative person around can’t be a problem. Finally, having a strong social network can reduce the possibility of stress. Having close friends, peers, and the positive social network can help to reduce stress. You will often notice that The Best Manager usually has a strong social network. It is also important just to measure and be aware of your own stress levels. Start to become aware when you are more tired, confused, upset, and distracted. This is the time when you will need to use your stress defeating strategies. The art of reframing can help one to reduce the stress. For example, when experiencing a stressful situation, you can ask yourself, “Do you realize that… (Think of a positive answer to the question which can reduce your stress)?” I like these sorts of questions, “Isn’t it great that…” and “I am grateful for….” This reframing causes your mind to refocus from the negative thoughts reducing the influence of the external event and instead focus on an internally generated question and event. Much of the time these external events can trigger stress but remember it’s the meaning we place on the words or event which can cause the stress! Of course, many stressful events will not go away especially at work. A person of greater resiliency has a better position for defeating the negative effects of stress.The best managers take good care of themselves. They balance their life, build physical and psychological resiliency and learn to relax more. The best managers learn to trigger thoughts and behavior from the inside out while maintaining a strong social network. Stress will always be present, but how we deal with it will determine how we feel and react to it. Learning summary and next steps Identify the factors which cause you the most stress at work. Make a second list and identify what you can do to reduce and or defeat the stress. Think through how these factors might affect others who you lead as well. Identify specific internal things you can do to defeat the stress. Recognize your physical, emotional, and mental responses which would defeat and or reduce the most stressful elements you experience at work.
<urn:uuid:9c344ed9-d40b-4a65-8071-1c5f6cb34e61>
CC-MAIN-2018-39
https://drcraignathanson.com/how-to-defeat-stress-at-work/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158766.65/warc/CC-MAIN-20180923000827-20180923021227-00536.warc.gz
en
0.962668
1,066
2.5625
3
Hormone spray appears to strengthen connections between dogs, owners A recent study published in Proceedings of the National Academy of Sciences found that a new oxytocin-based spray appears capable of improving interactions between humans and dogs, according to Discovery News. Oxytocin, a hormone released by the pituitary gland that is believed to play a role in childbirth, lactation, maternal behavior, mother-infant bonding, and pair bonding, seemed to create closer ties between dogs and owners after dogs were sprayed with the formula, researchers said. The study followed 16 dogs of various breeds as they interacted with familiar dogs as well as their owners, both before and after being sprayed. Researchers paid attention to behaviors such as sniffing, licking, gentle touching with the nose or paw, playing, and resting in contact with the other's body, as well as how much attention dogs paid to familiar dogs or their owners. "We found that after receiving the oxytocin spray, dogs displayed more affiliative behaviors and paid more attention to their owners than during the controls," lead author Teresa Romero told Discovery News. Dogs also appeared to be more likely to approach each other when dosed with the oxytocin spray versus a placebo. And when dogs approached each other, researchers found that the interactions induced dogs' brains to produce their own oxytocin. "Additionally, the exchange of socio-positive behaviors with dog partners triggered the release of endogenous oxytocin, highlighting the involvement of oxytocin in the development of social relationships in the domestic dog," researchers wrote in the study abstract. According to Discovery News, the spray has multiple potential applications including strengthening existing relationships between dogs or between dogs and their owners, or even helping previously abused dogs that are slow in warming up to their new owners.
<urn:uuid:6976cbb1-ebc9-44b0-a6cb-44cf34f43afc>
CC-MAIN-2023-40
https://www.aaha.org/publications/newstat/articles/2014-06/hormone-spray-appears-to-strengthen-connections-between-dogs-owners/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00524.warc.gz
en
0.975639
365
2.75
3
Lisa Stubbs and colleagues gain valuable information from ORNL's mouse collection. Photograph by Tom Cerniglio. ou have a unique identity, home address, and body structure. So does every human gene. The current emphasis of the Human Genome Program, co-sponsored by the Department of Energy, has been to determine the identity, location, and sequence of the chemical building blocks of each of the estimated 80,000 genes in the human genome. Now that more is known about where genes are and what they look like, ORNL is positioning itself for the next logical step of the programfinding out what genes do. When information on the entire human genome becomes accessible, experiments on gene function can be approached on a whole genome basis, not just one gene at a timehence the term "functional genomics." ORNL is positioning itself for the next logical step of the programfinding out what genes do. In a sense, the Human Genome Program is developing a "telephone book" that lists the name, address, and phone number of each of the human genes. For the science of functional genomics, biologists will use the "phone number" for each listed gene to "call up" groups of genes to ask questions about what they dothrough gene function experiments. ORNL has the experts and model organisms to use this limited information to link the location and structure of genes to the actual function they control (e.g., breathing). Functional genomics has become a goal of ORNL's efforts because our researchers both have proven proficiencies in analyzing the functions of genes and have developed technologies that can be used to facilitate these experiments. In the past, we first learned about mouse genes by exposing mice to radiation and observing body changes (e.g., altered fur color) that could be related to altered genes. Similar mutations were produced in mice at ORNL, using chemical agents. Today, we produce mouse mutants through both chemical mutagenesis and a form of genetic engineering called targeted mutagenesis. In this technique, we "make" new mice by inserting an engineered gene into a mouse in the embryonic stage, ultimately causing a disruption of the corresponding gene in the host animal. If the disruption causes an abnormality, impaired function, or a disease in the mouse, then it is possible to determine which gene is partly responsible for the defective trait or function (e.g., a poorly working kidney). At ORNL "mouse models" for polycystic kidney disease, Type II diabetes, sickle cell anemia, cleft palate, genetic-based obesity, immunological defects, neurological disorders, and many other conditions have been developed. The information they provide about altered gene function could lead to a cure for at least one human genetic disease. A new ORNL initiative in functional genomics, which will be supported by internal funding for the next four years, will enhance the Laboratory's capabilities in support of the DOE mission. With a focus on mouse mutagenesis, the functional genomics initiative will build on our expertise in mouse mutagenesis and our extensive mouse mutant resource being maintained in the Biology Divisionour unique colony of more than 120,000 mice. In a broader sense, it will combine ORNL's expertise in mammalian genetics with our competencies in structural biology, computational sciences, robotics, automation, and instrumentation development. Integration of the expertise of molecular biologists with computer scientists and mathematicians is particularly important because analysis of the sequences of whole genomes has been hastened by creation of new algorithms and other mathematical feats. Our biologists' collaborations with computer scientists, analytical chemists, and engineers is providing highly productive experimental capabilities and technological breakthroughs for genetics research. ORNL also has strong capabilities in analyzing structure and function of proteins, or gene products. Mutations of genes in living organisms give rise to mutated proteins that must be isolated and characterized to understand their consequences in the body. Mutated proteins encoded by relevant genes can also be generated in the laboratory by both chemical and genetic means. Protein engineering through recombinant DNA technology enables rational redesign of protein structure. This powerful approach will enhance our ability to understand protein function and tailor the properties of proteins in animals and plants for use in medicine, industry, agriculture, and biotechnology. Our research in functional genomics will help us continue our tradition of successes in the biological sciences, thereby serving the needs of DOE and our society, and it will facilitate expanded outreach and partnerships under industry and academia. These multidisciplinary achievements, which bridge basic and applied research, have been honored by two Enrico Fermi Awards from DOE and more than a dozen memberships in the National Academy of Sciences. Brad Yoder examines mouse embryos that turn blue, indicating the expression of the disrupted gene that causes polycystic kidney disease. Photograph by Tom Cerniglio. Thanks to our mice and other research tools, we have discovered that health effects of radiation exposure are related to the intensity of the doses and that radiation is especially harmful to embryos in the early stages of development, prompting rules limiting the use of X rays on pregnant women. We found that the presence of a Y chromosome specifies male gender and that only one of two X chromosomes in a cell is active. We performed the world's first experimental bone-marrow transplants in mice. We performed the world's first successful freezing, thawing, and implantation of mouse embryos, which were brought to term in surrogate mother mice, establishing the basis for modern animal breeding and human fertility treatment. Apart from mouse genetics, we have enjoyed other stunning successes: the first analytical separation of the building blocks of DNA and RNA, codiscovery of the nucleosome (the basic structural component of chromosomes) and low-level resolution of its structure by X-ray crystallography, codiscovery of messenger RNA (which conveys genetic information to the protein-synthesizing apparatus in all cells), discovery of biochemical pathways for repairing damaged DNA (thereby preventing mutations and cancers), rational design of enzyme inhibitors (a cornerstone of drug discovery), and development of the zonal centrifuge (for production-scale preparation of vaccines). As an extension of these studies, we are attempting to unravel the role of RNA in the regulation of cell growth and differentiation. We are exploring the use of antibodies to deliver chemotherapeutic agents to certain organs or cell types. We are also using sophisticated techniques of genetic engineering to systematically redesign proteins found in nature in the hope of improving biomass yields (for food and energy) and developing effective drugs for treating cancer. Fortunately, DOE's Office of Health and Environmental Research is an advocate and sponsor of our research. This support should help us not only play an important role in the second stage of the Human Genome Program but also contribute to the multifaceted missions of DOE in the life sciences.
<urn:uuid:af6ec333-e5e9-406c-9f71-4f37eff4138f>
CC-MAIN-2014-23
http://web.ornl.gov/info/ornlreview/rev29-12/text/gene.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997889255.54/warc/CC-MAIN-20140722025809-00135-ip-10-33-131-23.ec2.internal.warc.gz
en
0.929072
1,383
3.53125
4
While syringe services programs have existed in the United States since the 1980s, several states did not have laws in place until recently that allowed for the establishment of syringe services programs. In addition, states that did allow them, such as Maryland and Massachusetts, limited the number of syringe programs or limited the location of the programs. Below is an overview of a few states with new laws allowing for these programs. The impetus behind the new laws in these states has been the opioid overdose epidemic, as well as increasing rates of injection drug use and HCV and HIV in areas that previously had low prevalence of both injection drug use and HCV and HIV. Kentucky Harm Reduction Coalition maintains a list of syringe services programs located in Kentucky. They are located within county health departments and provide screening for infectious disease, the opioid overdose antidote naloxone, and other services for people who inject drugs. As the map below shows, of the 220 counties identified by CDC to be at-risk for increased HIV rates, 54 are in Kentucky. The Commonwealth has moved quickly to make certain that syringe services programs programs are available in many of the at-risk counties, with more planned. In 2015, the Kentucky legislature passed a comprehensive law addressing burgeoning rates of heroin use and overdose death. This legislation allowed county health departments to establish Harm Reduction and Syringe Exchange Programs. The legislation took effect under an emergency provision in May 2015 and requires local approval under a three-step process for an exchange program to be operated. There must first be a local needs assessment, then community collaboration and lastly a determination of how best to reach individuals in need of the program. Other states should consider the severity of their situation and whether requiring such a process will prevent the swift establishment of syringe services programs in their community. The Kentucky Public Health Department guidelines also list other issues to consider such as how the syringes will be delivered and what outcome measures will be gathered. In the 2016 Kentucky legislature, the law was revised to require that needle exchange programs provide one for one exchange. Meaning that one needle must be handed in for a clean needle to be provided. Kentucky code is here. Syringe service programs became legal in 2016 with the signing of HB972. Passage of the bill allows governments and non-governmental entities to establish syringe services programs. It also allows for limited immunity to those using or working in the programs. The Act states that the purpose of such programs is to “Reduce the spread of HIV, AIDS, viral hepatitis, and other bloodborne diseases in this State. (2) Reduce needle stick injuries to law enforcement officers and other emergency personnel. (3) Encourage individuals who inject drugs to enroll in evidence-based treatment.” It also allows for limited immunity for possession or a needle or residual controlled substance in the needle or other device if the individual has documentation that the needle was provided to the individual from an exchange program developed pursuant to the law. The North Carolina Harm Reduction Coalition has an overview of the law and how it is applied in North Carolina. The National Harm Reduction Coalition lists syringe exchange programs in North Carolina on its site. Syringe exchange programs in North Carolina vary from fixed sites to mobile. Link to the North Carolina General Assembly website is here. The first syringe services program in West Virginia was in Morgantown, West Virginia in 2015. Since then, others have been established, including locations in Huntington and Charleston WV. The West Virginia Department of Health and Human Resources partnered with the city of Huntington and the Cabell Huntington Health Department to initiate their syringe services program. The Huntington and Charleston syringe services programs both partner with a local recovery center to provide peer support to clients. Read more about Huntington’s strategic plan to address the opioid crisis here. Find West Virginia’s code here. The first syringe services program in West Virginia was in a free clinic in Morgantown WV in 2015. Others have since been established then and are affiliated with county health clinics. The syringe services programs are usually limited to half a day one day a week at the community health clinics. Screening for infectious disease and referrals to treatment are provided at all the clinics. The Kanawha County Clinic partners with local recovery organizations to answer questions and provide treatment referrals and support for individuals coming to the syringe services program. More on the Kanawha County program is here. Additional State Laws In 2017, Virginia also passed legislation allowing syringe services programs. The law allows Virginia’s Commissioner of Health to establish and operate harm reduction programs that include sterile syringe distribution, during a public health emergency. For a state by state look at laws relating to syringe access, LawAtlas updated as of May 2016.
<urn:uuid:fec9d6ea-4eaf-4853-9590-c6fac090ff5a>
CC-MAIN-2019-51
https://harmreduction.org/ruralsyringe/state-laws/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540484815.34/warc/CC-MAIN-20191206050236-20191206074236-00194.warc.gz
en
0.954433
965
2.640625
3
Random Search Program As a part of a comprehensive campus safety program, the Charleston County School District (CCSD) employs a Random Search Program. Although this program is primarily used in high schools, some components may also be seen in the middle schools. Random searches are conducted to deter individuals from bringing weapons and contraband to school or school-sponsored activities, curtail the threat of violence, and foster a safe learning environment. Schools have a responsibility to ensure that its students are safe. If a student feels that he/she may be subjected to a search while at school, he/she will hopefully be less likely to bring contraband, such as a weapon, to school. Random searches in schools involve the search of individuals and their personal belongings selected based on a pre-determined, systematic pattern or guideline. For example, students in a randomly selected classroom, riding on a randomly selected bus, or entering the school through a randomly selected door may be searched. These random searches are conducted in a manner consistent with a search you would undergo when preparing to board an airplane, enter a government building, attend an event at a performance venue, or enter a theme park.
<urn:uuid:e1ec46e6-baa6-44ba-bcca-5be5ce7257d9>
CC-MAIN-2022-27
https://www.ccsdschools.com/Page/1478
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103035636.10/warc/CC-MAIN-20220625125944-20220625155944-00495.warc.gz
en
0.945045
241
3.0625
3
The Azores: Nine Islands – A Geopark The Azores originated as a result of the 1766 volcanoes that are to be found in this archipelago, nine of which are still active. The Azores Geopark was born out of all this natural wealth, as part of the European and Global Network of Geoparks. Its aim is to promote and protect the geological heritage of the archipelago. The Azores Geopark is unique worldwide because it offers 121 geosites scattered throughout the nine islands and surrounding marine area, mirroring the vast volcanic geodiversity of the archipelago. There are nine islands, but only one Geopark! In the subsoil, there are nearly three hundred volcanic cavities in the form of caves, grottoes and crevices. On the landscape, there are dry calderas, lakes in craters, fumarolic fields and hot springs. Underwater geothermal sources are found out at sea. The majestic mountain of Pico, whose cone is still intact, seems to protect all these geological riches. As a testimony to the power of nature, the archipelago’s volcanic history is impressive for the diversity of the region’s geological heritage that reflects a geological memory of 10 million years. The Azores Geopark Association has created new services, routes and interpretative products, implementing a high level of quality geotourism in the region, in close connection with other strands of Nature Tourism.
<urn:uuid:3211780d-e509-44e2-86e1-3ab682c8f000>
CC-MAIN-2015-11
https://www.visitportugal.com/en/node/73829
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00296-ip-10-28-5-156.ec2.internal.warc.gz
en
0.935177
309
3.015625
3
The Abatement of Lead Paint Hazards* Under Maryland law, lead paint abatement is "a set of measures designed to eliminate or reduce lead-based paint hazards." Anyone who provides a lead paint abatement service be accredited by the Maryland Department of the Environment. An accredited contractor must follow procedures covered in State regulations. Anyone who removes lead paint, or who conducts any other maintenance or home improvement activity which creates a hazard by disturbing lead paint, should follow the safe practices which are included in these regulations. CAUTION: Work which spreads lead dust, fumes, or debris can be highly dangerous for adults as well as children. There is no established safe level of lead in the human body. No exposure to lead can be regarded as free from potential harm. It has long been known that high levels of lead exposure can cause serious disability or death. Recent research has focused on the toxic effects of low level exposure. The brain and nerves are particularly susceptible to lead poisoning. Lead poisoning interferes with the formation of blood cells, which may cause anemia. It can also damage the kidneys, digestive system, reproductive system (for both men and women) and other organs. Low level exposure can damage hearing, learning ability, and coordination. Lead has been used in making paint, solder, plumbing, ammunition, gasoline and many other products. When lead is burned or heated, anyone who breathes the fumes will take lead into his/her body. People can also swallow lead; for example, lead dust can get onto food or cigarettes. Lead may also be found in drinking water. Following exposure, lead accumulates in the body. Lead poisoning usually results from many small exposures over a period of weeks or years. Lead is stored throughout the body. Lead stays in the blood for weeks, it remains in the brain and other soft tissues for several months, and it can be stored in bones for many decades. Lead released from storage in bone can also cause lead poisoning years after the original exposure. Lead Poisoning in Children Young children, less than six years of age, are of special concern because their developing brains and other organs can easily be damaged by lead. It is normal for young children to put everything, including hands, pacifiers and toys, into their mouths. Anything that contains lead, from small dust particles to large paint chips, can cause harm if swallowed. Lead poisoning causes learning and behavior problems that may be permanent in young children. Lead poisoning often goes unnoticed. A child with lead poisoning may seem to be well, and symptoms usually do not develop until the condition becomes quite serious. When symptoms occur, they are easy to confuse with symptoms of other illnesses such as the "flu." Blood lead tests are the only way to detect lead poisoning early and are part of the routine health care recommended for all young children. Lead Poisoning In Adults The most important sources of lead exposure for adults are found in the work place. People who breathe lead fumes from activities such as the removal of old paint or the manufacture of lead products are at high risk for lead poisoning. Workers with lead dust on their hands can also contaminate the food that they eat and the cigarettes that they smoke. An adult who has lead poisoning may notice fatigue, irritability, headache, weight loss, stomachache, or constipation. But lead can cause damage without any symptoms. Blood tests are important for anyone who works with lead on the job, in a hobby, or in any other activity. Lead Poisoning in Pregnancy Research now shows that lead at very low levels can have toxic effects on the developing fetus. Lead carried in the mother's blood is passed to her unborn child. Lead toxicity may cause miscarriage or premature birth. Infants born with only slightly elevated blood lead levels have been found to have developmental problems. A mother's exposure to lead early in her life can also affect her unborn baby. During pregnancy, lead stored in a mother's bones is released, along with calcium needed by the fetus, into the mother's blood stream. 1. Read and Follow the Regulations Regulations have been designed to protect the occupants of a building to be abated, the abatement workers, and the environment. The Lead Paint Hazard Fact Sheets in this series provide guidance which is consistent with Maryland's regulations. Be sure to follow those regulations which apply to your project. Failure to follow regulations may result in the creation of hazardous conditions, the assessment of fines or other penalties, and costly delays or revisions to your project. For more information, contact: - Environmental Lead Division, Maryland Department of the Environment (MDE) at 410-537-3825 regarding State requirements for lead hazard abatement. - Maryland Occupational Safety and Health (MOSH) at 410-880-4970 regarding worker safety. - Child Poisoning Prevention Program, Baltimore City Health Department at 443-984-2460 regarding Baltimore City lead hazard abatement requirements. 2. Take Required Training and Become Accredited Maryland regulations require that any worker, supervisor, project designer, inspector or risk assessor involved in a lead abatement project be trained in safe and appropriate abatement procedures. Contact the MDE Lead Poisoning Prevention Program at 410-537-3825, for a list of approved training providers. Contracting businesses (including self-employed individuals), supervisors, project designers, inspectors, and risk assessors must be accredited by MDE. 3. Restrict Entry To Work Area All residents, including pets, must be relocated if work will take longer then 24 hours. Residents must stay out of the building until cleanup and any required inspections have been completed. Exceptions may be made if the abatement is limited to an isolated work area. Post warning signs immediately outside all entrances and exits to the work area. Only workers or individuals directly involved in the project may enter the work area. Pregnant women and young children are not to be involved in any paint removal activity and must stay out of the work area until cleanup has been completed. 4. Pick the Safest Method Select the most appropriate methods for your project. 5. Wear Appropriate Clothing Disposable coveralls minimize contamination of clothing by lead dust and to help prevent the spread of lead dust outside of the work area. Gloves and other special clothing may be required for protection from other work site hazards. Non-disposable coveralls may be used; however they must be cleaned at a commercial laundry which accepts lead-contaminated clothing. 6. Use Appropriate Safety Equipment A respirator with HEPA cartridges is required when using an electric heat gun, HEPA sander, or other methods which produce high levels of lead fumes or dust. A respirator is also recommended during the demolition phase of abatement or at other times when airborne lead levels can be expected to be higher. Check with Maryland Occupational Safety and Health (MOSH) to be sure that you select the right respirator and filters. The respirator must be tested to assure proper fit. A paper dust mask will not protect you from lead dust. You may also need further safety equipment, special clothing, or additional respiratory protection to protect yourself from caustic strippers, organic vapors, or other hazards that are identified at a particular job site. 7. Do Not Smoke or Eat In the Work Area Lead dust can easily get on your food or cigarettes. Store any eating or smoking materials away from the work area. Leave the work area and wash your hands and face before eating or smoking. 8. Contain Lead Dust and Debris within the Work Area Keep lead dust and debris in the work area. Wear disposable shoe covers, and remove them when you leave the work area. 9. Change Clothes and Wash Hands and Face Change your clothes and wash your hands and face when you leave the work area. Dust from work clothes and shoes which are brought home from the work site can expose family members to toxic levels of lead. 10. Do Not Use Unsafe Methods Burning, dry sanding and dry scraping of lead paint are prohibited by Maryland lead paint abatement regulations. - NEVER BURN LEAD PAINT WITH AN OPEN FLAME TORCH. Burning produces very high levels of lead dust and fumes. - DO NOT SAND OR SCRAPE DRY LEAD PAINT. Sanding or scraping a dry surface produces very high levels of lead dust. 11. Work Safely with Chemicals When using any chemical stripper, follow the manufacturer's instructions carefully. Any product which is strong enough to remove paint will probably be harmful to humans if not used properly. Use strippers which contain methylene chloride only for touch-up work in well-ventilated areas. Maryland's "Right To Know" law requires that workers receive essential information for working with all hazardous chemicals encountered at their work place. Contact Maryland Occupational Safety and Health at 410-333-4135 for requirements under this law. 12. Check with Your Doctor Ask about a blood lead test if your work involves contact with lead. People who work in construction, painting, repair, maintenance or demolition in old buildings are likely to be exposed to lead. A medical evaluation is needed in order to wear a respirator. During the medical exam, the physician can also evaluate problems which you may have working with lead or other hazardous materials. *This guidance is consistent with Maryland Lead Paint Abatement Regulations (COMAR 26.02.07) and Departmental policies.
<urn:uuid:2ed5ffc6-7220-40e2-b8ec-8c38bf6964ff>
CC-MAIN-2014-10
http://www.mde.state.md.us/programs/Land/LeadPoisoningPrevention/Parents/Pages/programs/landprograms/leadcoordination/parents/parents_abatement.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394020561126/warc/CC-MAIN-20140305115601-00019-ip-10-183-142-35.ec2.internal.warc.gz
en
0.943367
1,958
3.03125
3
RICHMOND, Va. (AP) — A commission Virginia Gov. Ralph Northam tasked with researching racist laws from the state’s past recommended Thursday that dozens be repealed in order to purge the state’s books of discriminatory language. While most of the pieces of legislation are outdated and “have no legal effect,” they are still enshrined in law, the nine-member commission of attorneys, judges, scholars and community leaders wrote in an interim report. “The Commission believes that such vestiges of Virginia’s segregationist past should no longer have official status,” said the report, which urged repeal of the laws in the legislative session that starts in January. These racist laws include measures that helped enforce the state’s strategy of “Massive Resistance” to federally mandated school integration, instituted a poll tax intended to keep black Virginians from voting, mandated racially segregated transportation and prohibited interracial marriage. Northam, a Democrat, announced the formation of the commission in June during a ceremonial signing of a bill repealing Jim Crow-era minimum wage exemptions for jobs traditionally held by African Americans, such as ushers and doormen. The announcement came several months after a scandal erupted over a racist photo of someone in blackface and someone in KKK robes on his medical school yearbook page, nearly forcing him from office. Northam resisted widespread calls to resign and pledged to focus the remainder of his term on addressing Virginia’s long history of racism and racial inequities. The commission also reviewed acts regarding Confederate statues and other issues related to the Confederacy, but declined to make any recommendations about those items, citing pending litigation and the efforts of lawmakers to deal with the issue during the upcoming legislative session. A violent white supremacist rally in Charlottesville two years ago renewed the debate over whether Confederate monuments should remain in public spaces, but a law currently codified in state code protects memorials to war veterans. “The Commission will continue its careful and deliberate review of the Acts concerning the Confederacy and will await orderly judicial or legislative actions,” the report said. The group also noted that its work is not done, and that its recommendations for repeal are not comprehensive. Given the scope of the record the commission was tasked with reviewing, it began by examining only the state’s Acts of Assembly — the complete written legislative record of the General Assembly — from 1900 to 1960. Within that period, the report said the panel focused especially on three periods: 1900 to 1910, when many states were taking action to undo progress made during Reconstruction; 1918 through the 1920s, marking the second rise of the Ku Klux Klan; and the mid- and late-1950s, when Southern states fought school desegregation following the landmark Supreme Court decision in Brown vs. Board of Education of Topeka. Undergraduate and law school students and staff from the governor’s office assisted with research, which was made more difficult because the records of many of the Acts are only in paper form, the report said. “There remain many volumes of the Acts that have not been reviewed, and assuredly, additional measures can be found by more complete review of those that have been studied for the first time,” the report said.
<urn:uuid:0f20f5da-a33d-49df-9bc0-4140d10fe8bb>
CC-MAIN-2020-34
https://www.wavy.com/news/virginia/dozens-of-racist-laws-should-be-purged-from-virginia-books-commission-says/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738609.73/warc/CC-MAIN-20200810042140-20200810072140-00322.warc.gz
en
0.967876
671
2.8125
3
Students often make mistakes when trying to use make or do. Unfortunately there is no hard rule in English concerning the use of make or do. The verb make goes with some words and the verb do with other words. DO is used : – for indefinite activities : do something / nothing / anything / everything – for work : do work/ the shopping/ the garden/ a job/ business/ homework/ the windows/ laundry/ the dishes/ the housework/ exercise/ chores/ a translation/ a test – in the informal structure do ……….. ing when talking about activities that take a certain time or are repeated jobs or hobbies. There is usually a determiner: the, some, my, much… Example: I’m going to do some walking. He wants to do some bird-watching. – in common fixed expressions: do harm/ good/ one’s best/ a favour / sport / exercise / one’s hair/ one’s teeth/ 100mph / MAKE is used for some creative activities. These activities usually create something you can touch and involves something you choose to do. You make: breakfast/ lunch/ dinner/ a cup of tea/ your bed/ a mess/ friends/ love / a journey/ a decision/ a promise/ an effort/ a suggestion/ an appointment/ an arrangement/ a complaint/ an excuse/ a complaint/ a mistake/ a speech/ a statement/ room for something/ money/ a fortune/ a profit/ a loss/ a telephone call/ a choice/ a reservation/ However, sometimes the context needs to dictate the choice between “do” or “ make”. Here’s the example: He’s doing the crossword puzzle. But the person who created that crossword puzzle probably makes crossword puzzles for living and earns money for that. Teachers make homework and exams and students do homework and take exams. In the end, here’s a piece of advice to you. Make your own list of “do” and “ make” expressions. Use “make” where you could use “create” and “do” elsewhere. Here are a few quizes if you want to check your knowledge:
<urn:uuid:b886d5fd-eada-4286-afa7-6bccbadf9966>
CC-MAIN-2017-17
https://engleziranje.wordpress.com/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122619.60/warc/CC-MAIN-20170423031202-00626-ip-10-145-167-34.ec2.internal.warc.gz
en
0.907669
476
3.578125
4
Health Tip: Why Babies Wake at Night -- Many babies and young children struggle to sleep all night, which makes for tired parents. The University of Michigan Health System says potential risk factors for night waking include: - Having birth complications, including premature birth. - Having a difficult temperament. - Being breast-fed. - Co-sleeping with parents. - Feeding at night, because the toddler requires it or it's become a habit. - Having family issues that involve stress or depression. Posted: January 2014 Recommended for you
<urn:uuid:57a3b2a1-2442-4bf6-86eb-9dfc8364f247>
CC-MAIN-2017-39
https://www.drugs.com/news/health-tip-why-babies-wake-night-49896.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693940.84/warc/CC-MAIN-20170926013935-20170926033935-00106.warc.gz
en
0.929846
116
2.890625
3
Initially, Andrew Taylor Still's osteopathy concept was focusing only on problems of the musculoskeletal system and their manual correction. One of his students, William Gamer Sutherland, extended this knowledge up to the skull area. The skull (cranium) and the sacral bone (os sacrum) were key of his studies, that's why he named his concept "craniosacral therapy". The sutures are flexibly connected to each other with membranes. The movement accrues because of the flow of the CFS, the cerebrospinal fluid, which creates a rhythm. These very subtle pumping movements are affecting the tissue respiration, and the respiratory centre in the brain. The craniosacral system is closely connected to the nervous system, the respiratory system and the immune When does craniosacral therapy help: Therapy of lesions after diseases, accidents, infections, traumas, abatement of headache, migraine, stress, sinusitis, back pain, pelvic obliquity and other restrictions of the musculoskeletal Lesions are solved without pain by using subtle touches and techniques. The energy flow is stimulated. Deep relaxation comes into being. I encourage every rider to get a cranio treatment done on a regular basis. 2014 - Kraniosakrale Energiearbeit am Menschen Teil 1 mit Nadja Bacchi - Kraniosakrale Energiearbeit am Menschen Teil 2 mit Nadja Bacchi - Kraniosakrale Energiearbeit am Menschen Teil 3 mit Nadja Bacchi
<urn:uuid:d166f185-f9be-48a4-9829-dda1441a7c8d>
CC-MAIN-2022-40
https://www.horseconnect.at/english/craniosacral-therapy-for-humans/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00639.warc.gz
en
0.790697
352
2.609375
3
BBOB HIRSHON (host): Recognizing the average face. I’m Bob Hirshon and this is Science Update. Even sophisticated computer programs aren’t very good at recognizing human faces. That’s because our appearance changes from day to day. But psychologist Rob Jenkins of the University of Glasgow in Scotland has a solution. In a recent study, he and colleague Mike Burton created computerized composite photos of celebrities, by averaging dramatically different photos of each person. ROB JENKINS (University of Glasgow, Scotland): You had changes in hairstyle, facial hair, decades of aging, changes in weight and health, and changes in conditions under which the photo was taken. Popular face recognition software identified the composites with 100 percent accuracy, compared to 54 percent for normal photos. Jenkins says that putting these composites on passports or other ID cards could make it possible to design rock-solid security systems. I’m Bob Hirshon for AAAS, the science society.
<urn:uuid:e023ecca-cd0c-472a-9c39-70ed747b806a>
CC-MAIN-2024-10
https://www.scienceupdate.com/2008/02/averaging-faces/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.13/warc/CC-MAIN-20240222161802-20240222191802-00074.warc.gz
en
0.920623
213
3.03125
3
A new nationwide survey has shown that the existence of HIV strains resistant to at least one of the drugs in the cocktail used to treat Aids is higher among asymptomatic virus carriers who live in the city of São Paulo than in other parts of the country. The survey analyzed the pathogen profile of a group of 387 patients from 13 cities- recently diagnosed patients or patients chronically infected by the virus – but who had not come into contact with the medications because they had not yet manifested symptoms of the disease – and found 22 individuals with the resistant HIV. Thirteen of these patients (59.1%) live in the capital city. “Statistically, this data on São Paulo is important,” says Marcelo Soares, from the Federal University of Rio de Janeiro/UFRJ, one of the coordinators of the study, published on the 18th of last month in the scientific journal AIDS Research and Human Retroviruses. The history of Aids in São Paulo is a long one. The first confirmed cases of the disease in Brazil, in the early 1980’s, were identified in São Paulo, and the city has the highest number of cases registered in the three decades since the outbreak of the epidemic: more than 71 thousand patients, not including thousands of asymptomatic carriers. The other municipal regions did not report increased risks of infection by forms of HIV with genetic alterations that reduce the efficacy of the antiviral drugs, medications that hamper the multiplication of the virus in the organism. Strangely, the scientific study did not find any HIV strains resistant to the drugs in the cocktail in any of the 20 analyzed patients from the city of Santos. Ever since the outbreak of Aids in Brazil, this city on the São Paulo State coast is associated with an Aids epidemic and researchers had expected to detect a considerable number of resistant strains of the virus among asymptomatic carriers, in line with the results obtained from other surveys. “Perhaps the sample of patients that we focused on in the study is not entirely representative of the city of Santos,” says infectologist Eduardo Sprinz, from the Federal University of Rio Grande do Sul/UFRGS, the first author of the study. The Brazilians who participated in this study – two-thirds of whom were men and one third were women, all over the age of 18, live in eight states and represent all of the country’s regions, with the exception of the North. Prepared by a national pool of researchers from 20 study centers, the study found that 5.7% of the group had resistant HIV, a proportion that is equal to the proportion verified in a similar survey reported in 2003. In North America and Europe, similar studies indicate that the percentage of individuals contaminated by the Aids virus with mutations associated with resistance to some drug in the cocktail is double or triple the percentage verified in Brazil. Although they carry the virus in their blood, all the people who took part in this study are in good health and are not being medicated with the anti-Aids cocktail. Therefore, in the case of the 22 participants in the study who have strains of the virus with some level of resistance to the medication, it is possible to conclude that they may have been infected with forms of HIV already resistant to some drug in the cocktail. The resistance was not developed in their organisms. It was developed in the organisms of third parties, probably in contaminated patients with Aids symptoms undergoing anti-retroviral therapy, who had transmitted a mutated version of the virus to the referred participants. Public health policy Since the early 1990’s, Brazil’s Ministry of Health has maintained a policy of providing free treatment with anti-retroviral drugs only when HIV-positive patients manifest health problems related to the disease. Asymptomatic carriers do not get free medication. This strategy has been praised internationally. Some developed countries have chosen to provide anti-retroviral medication to healthy HIV-positive individuals. The problem is that the prolonged use of anti-Aids medication can reduce the efficacy of certain drugs in some people, in addition to provoking side effects. In this case, one or two drugs that are part of the cocktail – usually a blend of drugs from three anti-retroviral classes – are prescribed in the following combination: two nucleoside inhibitors of reverse transcriptase and a non-nucleoside inhibitor of reverse transcriptase or a protease inhibitor. The reverse transcriptase and the protease are viral enzymes that are vital to the HIV’s replication process. Nearly all the patients in the study with resistance to some drug of the cocktail (19 out of 22 cases) showed this resistance to drugs from only one anti-retroviral class (the reverse transcriptase inhibitors); two were resistant to drugs from two classes and only one individual was resistant to the drugs of all three classes. “We noticed an increase in the number of mutations that provoke the resistance to non nucleoside inhibitors of reverse transcriptase,” says Soares. “We know that, in this kind of medication, one or two mutations lead to this.” As only a few cases of resistance to multiple drugs have been reported and at present there are 19 kinds of medications available from the public health system to prepare the cocktail, it is usually possible to prescribe a personalized combined therapy by choosing the drugs to which the organism of each patient will respond accordingly. Of the carriers of the virus with some kind of mutation, 91% (20 cases) had been contaminated with the subtype B of the HIV virus, the most common Aids virus in the country. Only 9% (2 cases) had been contaminated with the subtype C, which had come to Brazil more recently and is basically restricted to the South Region. Indirectly, data from the study also seems to confirm the suspicion voiced by some specialists: safe sex, with the use of condoms, is not the rule even in the case of HIV-positive couples. Nearly half of the patients with HIV resistant to some antiretroviral drug admitted that his or her partner had Aids and was on medication. It is very likely that they acquired the mutated virus from their own partners. SPRINZ, E. et al. Primary antiretroviral drug resistance among HIV Type 1-Infected Individuals in Brazil. AIDS Research and Human Retroviruses. Published on-line on August 18, 2009.
<urn:uuid:83e359b9-2fba-4b31-b9cc-1b3a74773f19>
CC-MAIN-2021-04
https://revistapesquisa.fapesp.br/en/concentrated-risk/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514796.13/warc/CC-MAIN-20210118123320-20210118153320-00262.warc.gz
en
0.964135
1,326
2.578125
3
Succes at school Are girls better at languages than boys? And are boys better at maths and the science subjects? Or does it depend on the stage of their intellectual development? How can you ensure that schoolchildren can learn to concentrate better? Does it matter if the teacher is young or old? What is the effect of a good breakfast on children’s school performance? Do they achieve more if they know how their brains work? Or if they go to bed earlier? These and many other questions are at the heart of a large-scale research project that is currently being carried out by the Amsterdam Zwolle Institute for Research in Education (AZIRE) in collaboration with other institutions. The research is concentrating on schoolchildren in primary and secondary education. Almost 1,000 children aged between 10 and 18 are taking part in the research project by filling in questionnaires; it also comprises a neuropsychological survey that will measure their abilities using cognitive tests. The parents of the children have also been approached as part of the research project. They can give their opinions of the abilities and school performance of their children via a questionnaire. But there is more to it than that. Not only the children and their parents, but also the teachers feature in the research project: how do they process information? How does this change during the course of a working day? And what is the difference between younger and older teachers? By analysing this information, it is possible to assess which factors are responsible for success at school and for the motivation to learn, and also to find out what characteristics of a child and its environment lead to impulsive behaviour and other problems (whether learning-related or not). The researchers believe that, apart from the teachers, there are biological factors, the domestic situation, the gender and physiological aspects of a child that can play a significant role in levels of achievement and motivation to do well at school. Experimental research on this large scale involving schoolchildren, parents and teachers provides knowledge that can be useful in bringing about improvements in education, and help motivate and enhance the achievements of pupils and teachers. This method is a relatively new trend in education research in the Netherlands, known as ‘evidence based education’: in other words, education that is scientifically proven to work. It is a potentially groundbreaking research approach that involves universities, colleges, secondary schools and primary schools working intensively together. The added value of this research is that three fields yield a tangible ‘product’, with both fundamental knowledge and applied insights – in other words, to gain insights into the area of new educational interventions for schoolchildren and teachers that can be applied in practice. For more information, please go to AZIRE. This is a research project of the Amsterdam Zwolle Institute for Research in Education (AZIRE).
<urn:uuid:be1202da-e289-4a85-95ac-00c4b8fde9e8>
CC-MAIN-2018-17
https://vu.nl/en/research/vision-strategy/research-at-vu/succes-school/index.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947654.26/warc/CC-MAIN-20180425001823-20180425021823-00165.warc.gz
en
0.964652
573
3.890625
4
Exhibits from the Near East Collection at Beinecke Rare Book and Manuscript Library & Yale University Library Exhibit "Islamic Book and Bookbinding" Stamped and gilt leather binding (1544 A.D. / 951 A.H.) Al-Qamus al-muhit. An Arabic dictionary written by Muhammad ibn Ya`qub al-Firuzabadi (d. 1414 or 15). By the 16th century, Persian binders began to add gilding to the stamped designs. The areas to be decorated were dampened and painted with gold, then pressed with a hot metal stamp, leaving a deep impression on the leather. In this example, the design is highlighted with dark brown and the inside of the binding is painted with simple gold patterns. Beinecke; Salisbury ms. 4
<urn:uuid:a8014cca-26ae-4e08-a6a2-09a1d998f8a8>
CC-MAIN-2014-10
http://www.library.yale.edu/neareast/exhibitions/Islamic_Book/e17.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011085177/warc/CC-MAIN-20140305091805-00035-ip-10-183-142-35.ec2.internal.warc.gz
en
0.913846
178
2.875
3
Search and find articles and topics quickly and accurately! See different advanced ways to search for articles on this site. Why Didn't Jesus Plainly Say He Was God? Christians usually give verses from the Bible where Jesus says, "I am the resurrection and the life", "I am the way, the truth, the life", "I am the bread of life", etc. to prove that Jesus claimed to be God. All of these arguments have been proven false to show that Jesus claimed divinity. As for these claims that Jesus made, we have to remember that Jesus used to talk figuratively. But then when he talked plainly with his disciples he made it clear that he was sent FROM God and that he did not say that he WAS God. 25"Though I have been speaking figuratively (paroimia), a time is coming when I will no longer use this kind of language but will tell you plainly about my Father. 26In that day you will ask in my name. I am not saying that I will ask the Father on your behalf. 27No, the Father himself loves you because you have loved me and have believed that I came from God. 28I came from the Father and entered the world; now I am leaving the world and going back to the Father." 29Then Jesus' disciples said, "Now you are speaking clearly and without figures of speech. 30Now we can see that you know all things and that you do not even need to have anyone ask you questions. This makes us believe that you came from God." 31"You believe at last!"[b] Jesus answered. 32"But a time is coming, and has come, when you will be scattered, each to his own home. You will leave me all alone. Yet I am not alone, for my Father is with me. 33"I have told you these things, so that in me you may have peace. In this world you will have trouble. But take heart! I have overcome the world." The word paroimia could mean... 1) a saying out of the usual course or deviating from the usual manner of speaking a) a current or trite saying, a proverb 2) any dark saying which shadows forth some didactic truth a) esp. a symbolic or figurative saying b) speech or discourse in which a thing is illustrated by the use of similes and comparisons c) an allegory 1) extended and elaborate metaphor Christians usually argue that Jesus used to talk in parables and therefore his disciples might not have understood him clear enough. However, in the passage I just cited we see that Jesus was talking plainly and not figuratively. Now if Jesus was talking plainly then why didn't the disciples just go and say that they knew Jesus was God and not just sent by God? Back to My Rebuttals, and exposing the lies of the Answering Islam team section. Women in Islam and the Bible. Rebuttals by Bassam Zawadi. Islam and the Noble Quran - Questions and Answers. Contradictions and History of Corruption in the Bible. Questions about Jesus that trinitarian Christians don't have logical answers for. What parts of the Bible do Muslims believe are closest to the Truth? and Why? "Allah" was GOD Almighty's original Name in the Bible according to the Hebrew and Aramaic sources. Scientific Miracles in Islam and the Noble Quran. Most of the Bible's books and gospels were written by mysterious people! Jesus mentioned Muhammad by the name in the Bible. Did Isaiah 53 really prophesies about the crucifixion of Jesus? It supports Islam's claims about Jesus peace be upon him never died on the cross. I also addressed John 19:36-37 from the Bible and proved that Jesus never got crucified, since GOD Almighty promised that he will protect Jesus' body and not let even a single bone be broken. My question to all Christians is: How in the world is it possible for the feet to get nailed on the cross without any penetration to the bones by the nails, hence breaking part of the feet's bones?! I also added refutations to Exodus 12:46, Numbers 9:12, Zechariah 12:10 and Psalm 34:20, which supposedly prove the Christians' belief about Jesus crucifixion. I proved that this dogma has no truth what so ever and exposed the wrong Trinitarian English translation of Zechariah 12:10. Send your comments. Back to Main Page.
<urn:uuid:d2fb023e-70f4-4c76-b0d5-14b861835bcb>
CC-MAIN-2020-05
http://quransearch.com/bassam_zawadi/jesus_no_god.htm
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251688806.91/warc/CC-MAIN-20200126104828-20200126134828-00377.warc.gz
en
0.961024
939
2.640625
3
Skip to main content It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results. You will find eBooks in the library catalog, which you can read online or download. Here is a title that may help you find biographical information about your mathematician: Dictionary of Scientific Biography (Set) "This standard reference source contains more than 5,000 biographies of mathematicians and natural scientists from all countries and from all historical periods." Mathematical Time Capsules by Dick Jardine. Biographical sketches may be at the end of chapters. Find articles, definitions and facts by searching these reference databases: Oxford Reference Online Oxford Reference Online brings together over 100 fully searchable reference works. Frequently updated, all disciplines will find this resource useful. VMI Library Catalog Find books about the history of mathematics by using Preston Library's catalog. Use the search box below. For a more complicated search use Advanced Search. The URL is http://vmi.worldcat.org/advancedsearch . Tips for searching are: - Limit by format, author, date, and more You can also browse the mathematics section of the 500 level [QA] for additional material. Here is a list of Library Subject Headings and call numbers: QA 1-43 General QA 47-59 Tables QA 71-90 Instruments and machines QA 101-145 Elementary mathematics. Arithmetic QA 150-272 Algebra QA 273-280 Probabilities. Mathematical statistics QA 299-433 Analysis QA 440-699 Geometry. Trigonometry. Topology QA 801-939 Analytic mechanics
<urn:uuid:2e10464f-ba94-4c81-af72-e371650c4bfb>
CC-MAIN-2021-10
https://libguides.vmi.edu/c.php?g=36306&p=229679
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359624.36/warc/CC-MAIN-20210227234501-20210228024501-00635.warc.gz
en
0.785181
386
2.671875
3
Find a quiet place, alone and apart from distractions. Be comfortably alert, still, and at peace. Say the Lord’s Prayer. Sing or cant the Jesus Prayer. Pray for family, friends, neighbors, and yourself. Slowly and carefully read the passage of Scripture. 1. Members of the religious establishment, consisting of the scribes, Pharisees, and Sadducees (Matthew and Mark include the Herodians), these groups that were most often opposed to each other, band together in an attempt to trap Jesus and see then that the Romans deal with Him. 2. These antagonists were watching Jesus carefully, hoping to find a way to bring charges against Him. Already these had gone to Judas Iscariot and enlisted him to find a way to arrest Jesus. 3. Now, only two or three days before Jesus would be arrested and then crucified, Jesus’ enemies ask Him if it is right to pay tribute, or a tax, to Caesar. The Romans were severe about this and monitored this closely. 4. Jesus asks that a denarius be shown to Him, and the Roman coin, and probably with the likeness of Tiberius, the current Caesar, on one side of the coin, and with “Pontifex Maximus” on the reverse side. 5. He then says to give to Caesar what is required, yes paying the tax, but give to God the things that are God’s. 6. If Jesus had said “No” to paying the tax, the authorities would look at Jesus as a traitor and law breaker. If Jesus had said “Yes” to paying the tax, many of the Jewish people would be angry at that, especially the religious authorities who would have lost the most. 7. Jesus’ antagonists became silent at that point.
<urn:uuid:cff5ae91-ae36-4dbf-bea7-fedcf063d8e5>
CC-MAIN-2023-23
http://kentphilpott.com/2023/04/25/paying-taxes-to-caesar/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00423.warc.gz
en
0.972257
392
2.890625
3
On environmental matters, California often leads the way for the nation and even the world. This is as it should be. We have much to protect. Our home has the finest coast in the United States, the tallest mountains in the lower 48, the hottest deserts, the lushest northern forests and the biggest single patch of prime farm soil on earth. But the seminal California Environmental Quality Act, more often known as CEQA, is badly in need of reform because it presents a potential roadblock to desperately needed renewable energy projects. CEQA requires state and local agencies to identify and disclose the potential environmental impacts of projects and then take steps to mitigate those impacts. It is undoubtedly the most important environmental law on the books after the federal law. But over the past four decades CEQA has grown labyrinthine in its process and grievous in its costs. With clever enough lawyers, a determined opponent of development can obstruct, delay or deny a project for environmental offenses as trivial as blocking mountain views. To avoid catastrophic carbon levels, state officials believe that California must cut its carbon emissions from 470 million tons a year to 85 million tons a year by 2050. Much of the work will be done by eliminating fossil fuels in transportation. But electric cars do us no net good if the electricity to power them is carbon intensive. That means that by 2050, nearly all of California’s electricity will need to come from renewable sources. The state is well on track to achieve the goal of a third of all energy coming from renewable by 2020. We’re at 20 percent. But the pace of new energy projects will only quicken. And we cannot afford for those projects to die in CEQA’s capricious web. Two cases in point. In San Luis Obispo County, wildlife advocates delayed proposals to build 800 megawatts of solar power because of concerns about species such as the San Joaquin kit fox. The dispute was resolved with wildlife pathways and somewhat lower power outputs. In Lompoc, a 97.5-megawatt wind farm initially proposed in 2006 has yet to appear, thanks mostly to a lawsuit from nearby landowners that started with complaints about ruined views and noise. In the solar case, there’s a tough balance between preserving vulnerable ecology and generating clean energy. We believe the outcome was a good compromise. But in the wind farm’s case, we simply cannot allow a single landowner’s gripes about ocean views derail an important project. We are too deep into climate trouble for such games. The problem is that CEQA’s current framework gives no credit to the carbon-reducing aspects of renewable energy projects. It’s true that bold city councils and boards of supervisors have the power to pass a project over environmental objections. They must declare that an “overriding interest” exists and risk litigation. Climate change most certainly fits the bill of overriding interest. But with local governments cash-strapped and weary of court battles, why demand profiles in courage when a legislative fix is readily available? CEQA contains a list of what are called categorical exemptions. The list lays out categories of projects that are exempt unless they presents an unusually large impact of some sort. Wetland restoration projects are an example of an exempt category. We urge legislators to add renewable energy projects to that list. And the Governor’s Office of Planning and Research should clarify guiding language about “visual impacts.” California’s lovely landscapes make it unique, but we must also make way for renewable energy.
<urn:uuid:c9d5726f-6539-41e6-8ddf-0e3b187cd4f3>
CC-MAIN-2016-18
http://www.pacbiztimes.com/2012/12/14/editorial-dont-let-ceqa-rule-out-renewable-energy-projects/
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860126502.50/warc/CC-MAIN-20160428161526-00210-ip-10-239-7-51.ec2.internal.warc.gz
en
0.941828
735
2.796875
3
Understand Installation Types The "Understand Installation Types" module provides you with the instructions and devices to develop your hands on skills in the following topics: Understand Removable Media Installation, Understand Installation over a Network. The Understand Installation Types module provides you with the instructions and devices to develop your hands on skills in the following topics. - Understand Removable Media Installation - Understand Installation over a Network Exercise 1 - Understand Removable Media Installation There are plenty of options available for installing a new operating system in a new computer. In this exercise, you will install Windows 8.1 using removable media. Exercise 2 - Understand Installation over a Network In this exercise, you will use Windows Deployment Services to install Windows 8.1 with limited user intervention. Windows Deployment Services provides Zero Touch Installation (ZTI) and Lite Touch Installation (LTI) because minimal user interaction is required to install Windows on a new computer. IT & Cybersecurity certification hands on practice labs and practice exams for certifications and skill development. See the full benefits of our immersive learning experience with interactive courses and guided career paths.
<urn:uuid:af8076dc-5bc8-4bf6-9362-73f3ea269afb>
CC-MAIN-2021-21
https://www.cybrary.it/catalog/practice-labs-module/understand-installation-types-db557da7-fa43-432b-a387-e10f2bc66e6b/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991557.62/warc/CC-MAIN-20210517023244-20210517053244-00459.warc.gz
en
0.81581
230
2.625
3
Theory and Experimentation Traditionally the 2 main aspects of science were theory and experimentation. For the theory part, scientists would use a pen and paper to try to think about and describe the mathematical nature of the physical process they were studying. They would then solve the equations and try to see if the predictions made by the equations match reality. This is where experiments come in. What we mean by the predictions matching reality is whether the predictions match the results of well controlled experiments. Experimentation is a time honoured tradition in science. When a scientist performs an experiment, he is attempting to measure certain aspects of the physical system he is interested in, under certain conditions. For example, a scientist may drop a weight off a tall platform and measure the amount of time taken to reach the ground. The scientist may have a theory about the effect of gravity on the falling weight. If the predictions of the theory match the results he gets from experiments, the scientist can conclude that theory may be correct. He still isn't sure. But if the predictions of the theory are different from the experimental results, he knows for sure that the theory is wrong. Since significant computing power has become available to the scientific community in the last 20 years or so, scientists have been able to tackle scientific problems via computer simulation. In a computer simulation, the theory part or the experiment part can replaced by computer programs. For example, imagine that the scientist in the above example had a theory for which the mathematical equations were too complicated to solve with a pen and paper. Most of these equations can be solved by a computer using approximate solution methods. Now that the scientist can solve the equations he or she can compare the experimental results to the computed theoretical results. This is one area of computational science. These days scientists consider computation/simulation as an important field of science. There are now three fields of science which interact with each other - these are Theory, Experiment and Simulation (or computation). These fields and their relationships are shown in the picture above. A further example of computational science could be that the scientists' equations actually have no pen and paper solution, but again an approximate answer can be computed. In other examples of computational science, scientists use simulation to perform "computer experiments" where the real experiments are either too expensive, too dangerous or are not possible to perform with current technology. Instead of performing the physical experiment, scientists can perform simulations to test what would happen in these cases. Some examples include crash testing cars, simulating new aircraft designs in flight, rocket simulation and others. What is HPC? Do you know what is happening when your computer takes ages to perform a task and you are sitting there waiting for it to finish? While you are waiting, the computer is accessing and processing data. The speed at which the computer is able to perform this operation and the time it takes to complete it depends on the speed of the computer's processor. The processor is accessing and processing data in a special sequence which was written in the program which is running. The task the computer is performing may be loading a game, a word document, etc... In the science and business worlds, scientists and software developers design computer programs to solve scientific problems which are too big or too complicated to be solved by people. Sometimes these problems are so big and complicated that a regular computer would take hours or even days or weeks to complete the task. Sometimes regular computers are not even capable of attempting these problems since their hard drives and memory are just too small! What scientists and programmers do in this case is use a special computing system which is much more powerful than a regular computer. Quite often these systems are just multiple computers linked together by a fast switch which can transfer data from each of the computers in the "cluster" to the other. This way, the job gets split up into parts with each section of the system working on its own part and the job gets done a lot faster. It's like if you are doing the drying the dishes after dinner and there are two people doing it together - the work should get done roughly twice as fast. It's the same with computing, if the programmer has designed the program well, the work should get done faster the more computers that are in the system that the programmer is using. HPC (High Performance Computing) or Supercomputing is the name given to this method of solving large computational problems by sharing the workload between multiple computers, usually in a specially designed computer system. The details of the top 500 largest computers currently in operation in the world can be seen at the top 500 web site.
<urn:uuid:f5af3002-d94e-4be7-9565-ba7cb3590139>
CC-MAIN-2015-32
http://www.tchpc.tcd.ie/computational-science
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988308.23/warc/CC-MAIN-20150728002308-00164-ip-10-236-191-2.ec2.internal.warc.gz
en
0.959854
934
3.578125
4
A TRAILSNext™ presentation Learn about how to evaluate an existing trail network to identify projects and opportunities to create a connected trail and greenway network in an urban area. |The Boston region has an extensive collection of rail trails, river paths, and separated bike lanes, and more in planning and design. However we are far from a connected network. MAPC, the regional planning agency for Boston, has come up with a plan for a connected trail and greenway network. Branded LandLine, the network vision helps build partnerships at all levels of government to ensure coordination of greenway development and build support for completion. This presentation will describe the elements of the plan, accomplishments to date, and the future steps. The Plan is transportation focused with the goal of incorporating more active transportation trips throughout the region between work, home and leisure. https://www.mapc.org/transport... Learning Objectives: Evaluate an existing trail network to identify projects and opportunities to create a connected trail and greenway network in an urban area. This paper outlines ways to achieve two key goals: First, to create career paths for young people; and secondly, to improve the U.S.’ ability to counter, and adapt to climate change, especially in communities that have suffered from environmental injustices. This updated Rails-with-Trails: Lessons Learned report documents how the state of the practice, perspectives, and context for rails-with-trails have evolved since 2002 and includes updated effective practices. The Beerline Trail Neighborhood Development Project was created to ensure the next phases of trail development serve the needs of the community. Understanding Federal Funding for Natural Surface Trails
<urn:uuid:27b3b1f1-b8a6-48eb-9f13-c16d3dc5b8dd>
CC-MAIN-2021-39
https://www.americantrails.org/resources/land-line-a-1-400-mile-trail-and-greenway-plan-for-metro-boston
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057882.56/warc/CC-MAIN-20210926144658-20210926174658-00086.warc.gz
en
0.923687
340
2.75
3
(Mendele Moykher-Sforim; 1835–1917), Hebrew and Yiddish writer. Sholem Yankev Abramovitsh is acknowledged, almost universally, as the founder of modern artistic prose in Hebrew and Yiddish. Born to a middle-class family in the Belorussian town of Kapulye (Kopyl), he lost all familial support at the age of 15. After spending several years as a student at various yeshivas, he made an adventuresome, perilous trek south to Ukraine on foot and in the company of itinerant beggars, arriving in Kamenets Podolski in 1853, where he stayed for five years as a teacher and then as the son-in-law of a middle-class family. He cultivated the friendship of the few local exponents of the Haskalah (especially Avraham Ber Gottlober) and began writing on matters pertaining to education. Sholem Yankev Abramovitsh at his writing desk, Odessa, 1910. From Mendele Jubilee Album (Vilna, Warsaw, New York; ca. 1935). (YIVO) After the dissolution of his first marriage, Abramovitsh married the daughter of a respected notary from Berdichev and moved to that bustling commercial center in Volhynia, where he spent a restful decade (1858–1868). At the home of his in-laws, Abramovitsh devoted his time to secular studies, a series of literary projects, and communal and charitable activities. It was at this time that he developed a keen sensitivity to the travails of the poor and the exploited. As a writer, Abramovitsh launched his career quite ambitiously in four different directions. His presence in Hebrew literature was felt as early as 1860 when he created a scandal by attacking a literary miscellany edited by an older fellow maskil (Eli‘ezer Zweifel). At the same time, he became known as a journalist and essayist. He dedicated much time to what he regarded then as his central project: preparation of scientific textbooks in Hebrew, of which the earliest was the first volume of Toldot ha-teva‘ (Natural History; 1862). He also began writing a didactic Hebrew novel, Limdu hetev (Learn to Do Good), the first part of which appeared in 1862. This movement between genres indicated not only that Abramovitsh was still searching for his true literary vocation, but also that he was bringing to this writing a rather complex notion of what form literature should take and should accomplish. Two qualities characterized this early phase of Abramovitsh’s development. First, from the outset he showed himself to be an innovator. Not only was he one of the founders of Hebrew literary criticism as a professional discipline with his notorious essay of 1860, but his activity as a novelist who focused on contemporary Jewish life in Eastern Europe proved equally precocious. Second, Abramovitsh’s disparate efforts were unified by his central idea of orienting the minds of Hebrew readers toward a tangible reality and distancing them from abstractions. The Jewish people had to acknowledge their existence within the physical surroundings of space, time, and the existential cycle of life. Such acknowledgment, which could only arise through the disciplined study of natural sciences, would banish foggy mysticism and superstition (but not pure religion; Abramovitsh, like most maskilim, was not an atheist), and prepare Jewish youth to enter contemporary society. Abramovitsh soon saw that another element had to be integrated into this synthesis: the Yiddish language. Spoken and understood by virtually all Jews in Eastern Europe, its use was dictated logically by the reality principle. Putting aside all other projects, Abramovitsh published his first Yiddish story in 1864, the novella Dos kleyne mentshele (lit., both The Little Man and The Pupil [of the eye]). A year later, he published “Dos vintshfingerl” (The Magic Ring). Such projects as the launching in 1862 of the first Yiddish weekly magazine, Kol mevaser, undoubtedly encouraged his switch from Hebrew to Yiddish; nevertheless, the decision to do so was difficult for Abramovitsh. He knew that by adopting Yiddish he was crossing a cultural boundary, for as far as the proponents of the Haskalah were concerned, Yiddish was regarded as a language devoid of normative grammar, without cultural status, and unworthy of serious intellectual and literary use. Therefore, in publishing both stories, the author took every precaution to hide his identity. His first story was published anonymously in Kol mevaser, and presented as an authentic testament that had been entrusted to a real local book peddler, known by the name of Senderl, changed by the editor to Mendele, who was charged with the task of making the document public. The second story, published as a pamphlet, was signed with the acronym alef, yod, shin (ish, Hebrew for man). It was offered to the public (whether seriously or not is unclear) by the same itinerant book peddler, Mendele, as an introduction to and advertisement for a forthcoming Yiddish text on the natural sciences. Sholem Yankev Abramovitsh (Mendele Moykher-Sforim) and his grandchildren, ca. 1900. (YIVO) Both stories are presented as authentic autobiographies, organized around the theme of disillusionment and involving a fallacious perception of reality that ultimately yields to a sober one based on reason and morality. They clearly reflect the agenda of young Abramovitsh, which he shared with most maskilim: education was the panacea, the singular solution to the many problems that contemporary Jewry faced. Critical to the formation of the mind and heart of Jewish youth, positive educational tools would usher in a generation of happy, economically independent, and morally grounded individuals. Thus, “Dos vintshfingerl”—an allusion to the superstitious belief in miraculous solutions (including messianism)—should be replaced by the realism and sobriety of science, the “natural magic ring,” which alone could offer true solutions to all problems. Gradually, however, the hold of this typical creed of the maskil on Abramovitsh weakened. Traditionally, the Jewish Enlightenment and its Hebrew representatives had cast their lot with the mercantile middle class. They relied on the patronage of this expanding group of large and middle-scale entrepreneurs participating in the development of capitalism in Eastern Europe, and, moreover, assumed that this group would be the source from which rationality, common sense, and liberal attitudes would spread among the Jewish population as a whole. Abramovitsh originally shared this belief, yet, after encountering the power hierarchy in Berdichev, he concluded that the middle classes cared only about their own economic privileges. They had little concern either for morality or for the freedom of the individual, and were quite willing to collaborate with “benighted” elements such as Hasidic dynasts and corrupt communal leaders at the expense of the poor. Abramovitsh’s gradual estrangement from the socio-ideological moorings of the Haskalah was undoubtedly connected to his switch to Yiddish, signifying not only a shift in language and narrative mode—no longer authorial, omniscient, objective, but colloquial, monologic-dramatic, subjective—but also marking a change in his subject matter. In the two Yiddish works he published in 1869, Abramovitsh drastically shifted the social focus of his fiction. In one, “Fishke der krumer” (Fishke the Lame), a simpleminded cripple tells the story of his life in the Jewish underworld to two members of the lower middle class: Mendele the book peddler and Alter, a fellow bookseller. Though uneducated, the cripple is a mentsh (a decent person), and the outcome of the story, in which the two booksellers are morally edified by Fishke’s unintentionally stirring words, serves to subvert the notion of formal education as the panacea of all of Jewish life. In questioning the central ethos of the Haskalah, Abramovitsh appears here as a radical writer, in touch with the new European wave of interest in poverty, the lower depths of society, and moral issues popularized by the likes of Victor Hugo, Eugène Sue, Charles Dickens, and early Dostoevsky. The story’s subtitle, “A mayse fun oreme-layt” (A Story of Poor People), underlines this connection. In the second work and his first drama, Di takse (The Tax [on kosher meat]; 1869), Abramovitsh invested effort in differentiating the various representatives of the middle class. However, the differentiation serves only to emphasize their common denominator: the readiness of all to cooperate as long as it was profitable, as well as the general desire to exploit the poor and powerless. The raisonneur of the piece, Shloyme Veker, tries to help the poor, yet in doing so arouses the malevolence of the bourgeois. The notion that education could effect a significant difference is presented in this Swiftian satire as preposterous. The educator himself is gobbled up before he manages to impart any knowledge. Abramovitsh claimed that the publication of Di takse necessitated his departure from Berdichev in 1869 after powerful members of the community whom he had exposed in his drama threatened his life and the well-being of his family. However, he actually had left Berdichev and settled in the Volhynian capital of Zhitomir a few months before the publication of his savage satire. The move was triggered by the death of his father-in-law, whose business had been deteriorating for some time. Suddenly, the 33-year-old Abramovitsh, now responsible for a growing family, had to earn a livelihood. The 1870s were the most trying years of his life. Although he was ordained at the government-sponsored rabbinical seminary in Zhitomir as a crown rabbi after a brief period of study, he failed to find a position. Unable to make ends meet, he wasted much energy on hack work. Nevertheless, it was in this period that he came of age as a writer. In 1873, he wrote his brilliant allegorical and satirical novel Di klyatshe (The Nag), and he scored a second artistic triumph in 1878 with the publication of the first part of his mock epic: Kitser masoes Binyomin hashlishi (The Brief Travels of Benjamin the Third; further parts never appeared). While his earlier fictions were rudimentary and skeletal, the achievements of the 1870s radiated with the full light of the author’s extraordinary talent. Montage of portraits of members of the committee for the celebration of the centennial of Yiddish writer Mendele Moykher-Sforim (Sholem Yankev Abramovitsh) at the I. L. Peretz Jewish Library, Ejszyszki, Poland (now Eišiškės, Lith.), 1936. (Bottom, center) Yiddish writer Daniel Tsharni. (YIVO) Having wrenched himself free of the habitual concerns of the Haskalah, Abramovitsh began to contemplate the dynamics and evolution of Jewish history. He perceived, for example, that antisemitism was not merely a remnant of the Middle Ages but an integral part of the European mindset that showed no sign of disappearing, merely changing its outward forms. His new insights (first worked out in a writer’s diary of which mere fragments survive) found expression in Di klyatshe and the long allegorical poem, Yudl (1875), as well as in extended Hebrew essays such as “Mah anu?” (Who Are We?; 1875) and in “Ahavah le’umit ve-toldotehah” (Patriotism and Its Consequences; 1878); the latter warned against the consequences of chauvinism. In Di klyatshe, the protagonist, Isrolik, a typical maskilic rationalist educator, encounters the essence of his own national historical identity as personified by a miserable and beleaguered nag. Isrolik initially offers the beast the conventional Haskalah cure: self-improvement through education, but low-spirited and submissive as the horse is, she has learned from her long historical experience of persecution. As the story unfolds, the nag waxes increasingly frank and intimate with her self-appointed benefactor. “How could a hungry and persecuted creature be expected to improve itself through education?” she asks. Is the stipulation that help to the needy should depend on self-improvement realistic, fair, or morally tenable? Her negative answer, “No dancing before feeding,” is devastatingly logical on both moral and practical grounds. Thus, the intellectual and educated Isrolik, rather like Mendele and Alter in “Fishke der krumer,” is reduced to the role of a humble student, and the ignorant nag becomes his teacher. As a moral allegory, a psychologically convincing fantasy, and a novel of ideas, Di klyatshe is akin to Voltaire’s Candide and Swift’s Gulliver’s Travels. In 1881, in the midst of a personal crisis (among other woes, his oldest son, Mikhail, a political radical, converted to Christianity and married a Christian woman), Abramovitsh was invited to direct a new school founded by the Jewish community of Odessa. He gladly accepted this assurance of financial stability and the chance to move to the city that had emerged in the second half of the nineteenth century as the crucible of both modern Jewish literary culture and the nascent Zionist movement in its East European, pre-Herzlian guise. He was quickly absorbed into Odessa’s circle of Jewish nationalist intellectuals, and the invigorating atmosphere revived his flagging literary élan. Starting with his melodrama, Der priziv (The Conscription [Military Service]; 1884), new publications followed in abundance. Alter Druyanow (left) with (left to right) writers Ḥayim Naḥman Bialik, Yehoshu‘a Ḥana Ravnitski, Mendele Moykher-Sforim, and Yitsḥak Dov Berkowitz, Odessa (?), ca. 1910. (Asher Barash Gnazim Institute, Tel Aviv) Abramovitsh now developed a two-pronged literary agenda: completely rewriting all of his earlier works, and attempting to give expression to the mood that had emerged in the wake of the pogroms of 1881–1882 and the consequent enlivening of Jewish national politics. The former project gradually took over Abramovitsh’s literary activity and occupied him for the rest of his active life. He wrote only one completely new novel, the autobiographical Shloyme Reb Khayims (never completed; 1899–1912). His earlier stories, particularly “Fishke der krumer” (1888) and “Dos vintshfingerl” (1888–1909), emerged in their now canonical versions as novels. The second project led to about a dozen short stories and novellas written almost exclusively in Hebrew. These stories included “Be-Seter ra‘am” (In the Secret Places of Thunder; 1886–1887), “Shem va-Yefet ba-‘agalah” (Shem and Japheth in the Train Compartment; 1890), “Lo naḥat be-Ya‘akov” (There Is No Good in Jacob; 1892), “Bi-Yeme ha-ra‘ash” (In Days of Tumult; 1894), and “Bi-Yeshivah shel ma‘alah uvi-yeshivah shel mata” (In the Heavenly Assembly and the Earthly One; 1894–1895). They capture the dense atmosphere of Jewish life in tsarist Russia during the last two decades of the nineteenth century, but view this tumultuous period from an ironic distance that allowed for both restrained pathos and for subtle but razor-sharp wit. The works are addressed primarily to readers of the burgeoning Hebrew literature of the day whose attention to these moods and issues was more urgent than that of the Yiddish audience. In these years, Abramovitsh insisted on recasting almost all of his Yiddish extended fictions (except “Dos kleyne mentshele”) in Hebrew, translating or rather artistically reenacting them. Thus, “Masoes Binyomin” appeared as “Mas‘ot Binyamin ha-Shelishi” in 1896 together with Theodor (Benjamin) Herzl’s Judenstaat. “Dos vintshfingerl,” now titled “Be-‘Emek ha-bakha’” (In the Vale of Tears, after Yosef Ha-Kohen’ssixteenth-century chronicle of the Spanish expulsion) was published in installments from 1897 to 1909. Shloyme Reb Khayims appeared in Hebrew at the same time that it was published in Yiddish (starting in 1900, sometimes Hebrew chapters preceded Yiddish ones) under two titles, Ba-yamim ha-hem (In Those Bygone Days) and Ḥaye Shelomoh (The Life of Solomon). “Fishke der krumer” was published as “Sefer ha-kabtsanim” (The Book of Beggars) in a Hebrew version prepared by Ḥayim Naḥman Bialik in 1902 and then in a new version in that language by Abramovitsh himself (1909). Di klyatshe was reworked and enlarged as “Susati” (My Mare), included in the jubilee edition of Abramovitsh’s Hebrew works (1909–1912). Set design by Robert Fal'k for Mendele Moykher-Sforim's Kitser masoes Binyomin hashlishi (The Brief Travels of Benjamin III), produced by Aleksandr Granovskii, Moscow State Yiddish Theater, 1927. Oil on canvas. (GDC 989. 313889; © Federal State Institution of Culture "A.A. Bakhrushin State Central Theatrical Museum," Moscow) The veneration and celebration that attached itself to Abramovitsh was captured by the young Sholem Aleichem who, in 1888, dubbed him “the grandfather” of Yiddish literature. Furthermore, with many readers wrongly assuming that Abramovitsh’s chief fictional character, Mendele Moykher-Sforim, was a pen name, Mendele became a household intimate. The author’s heroic status was a consequence first and foremost of his artistic accomplishments. It was also facilitated by the rise of Jewish nationalism and the cultural function that Jewish literature appropriated for itself at the time. The perception of Yiddish was transformed from a mere jargon into a national language on a par with Hebrew. Abramovitsh, now the paragon of Yiddish–Hebrew bilingualism, maintained that for a Jewish writer, expression in both languages was like breathing through both nostrils. Thus, two “jubilee editions” of his life work were published, in Hebrew (1909–1912) and in Yiddish (1911–1913). Abramovitsh’s monumental contribution to modern Jewish literary culture is reflected by the vast critical and scholarly literature dealing with his work. During the last decades of his life, this literature was characterized by the assumption that his achievement inhered in his mimetic representation of social reality. Descriptive verisimilitude, in Jewish literature of the Haskalah, existed only in a primitive form, it was claimed, before Abramovitsh forged the stylistic roots necessary for artistic mimesis. For critics reared on nineteenth-century Russian realist fiction (especially Turgenev and Tolstoy), such mimetic verisimilitude was of the greatest importance. By creating an artistic replica of Jewish reality, it was presumed that Abramovitsh produced a veritable historical–ethnographical treasure trove. Other critics emphasized that Abramovitsh’s realism infused his work with an extraordinary moral verve. He awakened in his readers the dormant sense of an empirical reality. Upon reading his works, one could not avoid introspection and self-criticism, what the Hebrew novelist Yosef Ḥayim Brenner called ha-‘arakhat atsmenu (self-evaluation). Thus, art encouraged constructive change. As this claim emphasized the writer’s ties to the Haskalah and its ideological legacy, it did not dovetail with the view of the apotheosis of art as the acme of painterly realism. In this way, the criticism of Brenner, and of critics close to the Bund, differed greatly from that of David Frishman, Bialik, Shmuel Niger, and a host of others. The latter further claimed that in structure and plot Abramovitsh’s stories manifest traits peculiar to Jewish storytelling characterized by intricate and artificial subplots emphasizing the small descriptive unit at the expense of an overall architectural plan, a penchant for which was regarded as “un-Jewish.” Bialik even compared the waywardness of Abramovitsh’s narratives to the Talmudic argument. In short, Abramovitsh’s work affirmatively answered the question that preoccupied a generation of nationalist writers: was there a specifically Jewish art, a specifically Jewish sense of beauty? Critiques of Abramovitsh changed in the interwar period. In the West, modernism undermined the ideal of mimetic verisimilitude, dismissing works written in this fashion as reductive and bereft of spiritual and religious dimensions. In the USSR, however, Abramovitsh’s scathing realism and withering critique of traditional Jewish life were still regarded positively. On the other hand, Soviet scholars exploded the myth of Abramovitsh’s “Jewish” originality by showing how his work was related to European novelistic traditions that preceded mature nineteenth-century realism and reflected a social order that had not yet assumed the characteristics of late capitalism. Abramovitsh, it was claimed, did not produce well-rounded novels in the spirit of Turgenev because the society reflected in his work was of an older, more primitive phase in the development of the bourgeoisie. Scholars and linguists, in the USSR and the West, studied Abramovitsh’s use of language, showing how, out of a spoken dialect, he fashioned a literary idiom that retained the idiomatic pungency of the language of the people. Purifying it of localisms and dialectological idiosyncrasies, he produced a Yiddish available to speakers of the language in all regions. Almost all great writers of Yiddish followed his lead in this realm. As for his Hebrew stylistic legacy, by blending the various historical layers of the language, particularly the biblical and the Mishnaic—with a good measure of Talmudic Aramaic—Abramovitsh all but invented normative pre-Israeli Hebrew prose. No writer before him had produced a compound that was as smoothly blended and potent as the one he created. Since the Holocaust, critics have insisted on reading Abramovitsh’s novels and stories as artistic constructs rather than as mimetic replicas of historic realities. Thus, for example, Mendele is now understood as a full-fledged fictional character and not as a pen name. Indeed, Mendele is the most elaborate fictional character created by Abramovitsh (who, as such, belied the allegation of some critics that the writer’s realism was devoid of psychological depth), but also a mask and a persona, an in-between and not always reliable narrator and commentator who constantly traverses the distance between the world of the stories and that of the reader. Critics now study the Mendele persona, the reasons for his growth from a mere editor to a major character—the folksy “philosopher” of the writer’s works—and the fictional and supramimetic nature of the “world” made of such satirical abstractions as towns with names like Pauperville, Fools’ Town, Hypocrites’ Village, and Idlers’ Place. Mendele’s cultural and literary role is seen as that of a Janus-faced intermediary between the author and his “other”—the traditional Jew he once was but now rejects. The cultural significance of Abramovitsh’s work consists of two differences: that distancing Mendele from the world he comments on, and that separating the implied author (and us) from Mendele and his caustic wisdom. This insight leads to a new understanding of Abramovitsh’s revolutionary role in modern Yiddish and Hebrew fiction: through Mendele, Abramovitsh, for the first time in the history of modern Jewish fiction (which had sprung from a world different from and inimical to that of traditional Jewry), bridged the gap between the dramatic-subjective presentation of reality—letting the traditional Jew speak for himself and unintentionally reveal his limitations—and that of the earlier distanced pseudoepic of his predecessors that employed a hostile omniscient narrator using Germanized Yiddish or biblical Hebrew. Abramovitsh was the writer who, more than any other, contributed to the creation of a lively and credible epic tonality in both Yiddish and Hebrew fiction. It was he who helped this fiction to surmount the most formidable impediment created by the literary culture of the Haskalah: the all but unbridgeable gap separating the telling from what is told. Ḥayim Naḥman Bialik, “Mendele u-sheloshet ha-kerakhim” and “Yotser ha-nusaḥ,” in Kol kitve Ḥ. N. Bialik, pp. 236–239, 240–241 (Tel Aviv, 1937/38); Yosef Ḥayim Brener, “Ha-‘Arakhat ‘atsmenu bi-sheloshet ha-kerakhim,” Ketavim, vol. 4, pp. 1225–1296 (Tel Aviv, 1985); Jacob Fikhman, “Mendele,” in Amat ha-binyan, pp. 11–121 (Jerusalem, 1950/51); David Frishman, “Mendele Mokher-Sefarim,” in Kol kitve David Frishman, vol. 7, pp. 70–111 (Warsaw and New York, 1931); Y. Goldberg, “Der veg roman un der intimer stil,” Shriftn fun vaysrusishn melukhe-universitet 1 (1929): 45–60; A. (Aron) Gurshteyn, “Sakhaklen fun der Mendele-forshung,” Tsaytshrift 3–4 (1928): 485–524; Avraham Kariv, ‘Atarah le-yoshnah (Tel Aviv, 1956), pp. 30–115; Joseph Klausner, Historyah shel ha-sifrut ha-‘ivrit ha-ḥadashah, vol. 6 (Jerusalem, 1950), pp. 315–453; Nachman Mayzel, ed., Dos Mendele-bukh (New York, 1959); M. Mezheritski, “Fishke der krumer: Stil un kompozitsye,” Di royte velt 12 (1927): 104–128; Dan Miron, “Der onheyb fun aktueln hebreishn roman: Historishe un kritishe bamerkungen tsu Sh. Y. Abramovitsh’s Limdu hetev,” in Limdu hetev, by Sh. Y. Abramovitsh, pp. 1–88 (New York, 1969); Dan Miron, A Traveler Disguised: The Rise of Modern Yiddish Fiction in the Nineteenth Century (New York, 1973); Samuel Niger, Mendele Moykher-Sforim: Zayn lebn, zayne gezelshaftlekhe un literarishe oyftuungen (New York, 1970); Menaḥem Peri, “Ha-Analogyah u-mekomah be-mivneh ha-roman shel Mendele Mokher-Sefarim,” Ha-Sifrut 1 (1968): 65–100; Sanford Pinsker, “Mendele Mocher Seforim: Hasidic Tradition and the Individual Artist,” Modern Language Quarterly 30 (1969): 234–247; Gershon Shaked, Ben seḥok le-dema‘ (Ramat Gan, Isr., 1965); Samuel Werses, “Ha-Roman ha-‘ivri ha-ri’shon shel Mendele ve-gilgulav,” in Sipur ve-shorsho, pp. 60–87 (Ramat Gan, Isr., 1971).
<urn:uuid:2303b7b0-bd07-4b86-84b8-47be331f5050>
CC-MAIN-2014-42
http://www.yivoencyclopedia.org/article.aspx/Abramovitsh_Sholem_Yankev
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443451.12/warc/CC-MAIN-20141017005723-00096-ip-10-16-133-185.ec2.internal.warc.gz
en
0.955144
6,352
2.65625
3
- Antimetabolites are a type of chemotherapy medication to treat cancer. - They work in the S phase of the cell cycle - Chemotherapy precautions must be taken - Administration considerations - Chemo certified nurses - Agents include: - Antimetabolites destroy cancer cells by blocking enzymes needed for DNA creation and work in the S phase of cell division. - They work in cells that in this the S phase often- rapidly dividing - Most effective on fast-growing tumors - Side effects → rapidly dividing cells susceptible to destruction also - Bone marrow suppression - Pancytopenia → low white blood cells, platelets, and low hemoglobin - Risk of infection, bleeding, and anemia - GI toxicities - Nausea and vomiting - Mucositis/ ulcers - Hand-foot syndrome → damage to tissue on hands and feet - With Capecitabine - Cerebellar toxicities - With Cytarabine - Hand-foot syndrome → damage to tissue on hands and feet - Bone marrow suppression - Used to treat MANY cancers and often as part of a combination of different therapies - Some examples →Leukemias, breast cancer, ovarian cancer, and intestinal cancers - Infection prevention - Neutropenic precautions - Hand hygiene - Food preparation - Avoid large crowds - Bleeding precautions - Shaving with an electric razor - Fall prevention - Oral care - Managing side effects - Chemo-specific considerations - Skin changes Cornell Note-Taking System Instructions: - Record: During the lecture, use the note-taking column to record the lecture using telegraphic sentences. - Questions: As soon after class as possible, formulate questions based onthe notes in the right-hand column. Writing questions helps to clarifymeanings, reveal relationships, establish continuity, and strengthenmemory. Also, the writing of questions sets up a perfect stage for exam-studying later. - Recite: Cover the note-taking column with a sheet of paper. Then, looking at the questions or cue-words in the question and cue column only, say aloud, in your own words, the answers to the questions, facts, or ideas indicated by the cue-words. - Reflect: Reflect on the material by asking yourself questions, for example: “What’s the significance of these facts? What principle are they based on? How can I apply them? How do they fit in with what I already know? What’s beyond them? - Review: Spend at least ten minutes every week reviewing all your previous notes. If you do, you’ll retain a great deal for current use, as well as, for the exam. For more information, visit www.nursing.com/cornell All right. Hi guys. Today, we’re talking about antimetabolites, which is a classification of chemotherapy, multiple medications fall under this category. So we’re going to kind of talk in broad terms about anti-metabolites. So I did just mention antimetabolites are a type of chemotherapy, so we need to adhere to chemo precautions. There’s a lot of considerations when we’re administering chemotherapy. I encourage you to check out the antineoplastic lecture to learn more about chemo precautions, but specific to antimetabolites. I need to mention that they are cell cycle specific, and we’re going to talk more about that on the next slide, but just to review what the cell cycle is: one cell goes into the cell cycle, right? It goes through several steps and two cells come out and chemo basically stops the cell cycle at some point, for antimetabolites that’s within the S phase of the cell cycle. And some of the medications you’ll hear are cytarabine or 5FU or Flurouracil is the other name for that, but you’ll pretty much only hear it called 5FU. And then methotrexate is another one. And again, there are many others also. Okay. So let’s just talk a little bit more about how these work they’re really fascinating how these anti-metabolites work. So, as I said, they work within the S phase of the cell cycle, and that’s when our, our DNA is being duplicated, right? So they block enzymes in the DNA creation. And this is an example of how methotrexate blocks folic acid. So our body usually uses this folic acid within the DNA strand, but the goal would be for it to get confused when methotrexate is in the blood cells and it will use methotrexate in place of this folic acid. So instead of this, going into this spot right here, the methotrexate will go in and that essentially will block the folic acid from being where it’s supposed to be. And that creates DNA destruction, basically. So this only works within the S phase and that’s important because we need to make sure that the chemotherapy is within the bloodstream. This picture here is our, our veins and the methotrexate we’re talking about. Right. We want to make sure it’s in the bloodstream when the cell is in the cell cycle during the S phase. So it’s only going to work if it is present when we need that folic acid in the DNA creation. So because of that, it works best on fast growing tumors that are frequently within the cell cycle and administration timing is very important. So these medications are given frequently, like as frequently as every eight hours, IV infusions, every eight hours of chemotherapy, or even they’re given over like a 72 hour period or a 96 hour period. So I’m an inpatient oncology nurse. And I give these medications a lot. A lot of times these patients are admitted to get these chemos because they’re given so frequently. So an outpatient oncology center can’t give an infusion that needs to be done more than once a day. So they’ll have to be admitted to get these medications. Okay. And side effects are kind of generic for many different chemotherapies. Bone marrow suppression is a big one. You’ll also hear myelosuppression or pancytopenia. And what that’s referring to is to a decrease in white blood cell, decrease in platelets and decrease in red blood cells, which equates to a decrease in hemoglobin, right? So basically our blood counts are low because the bone marrow was fast growing. So these medications are also going to be targeting these other healthy, fast growing cells. And another fast growing cell is GI cells, right? So we have several GI toxicities. We have the nausea, vomiting, diarrhea that can occur. And then more specific to anti-metabolites is the mucositis Or ulcers mouth ulcers, it should say. So we do very meticulous mouth care with these patients- at least once a shift, we have them on my unit, rinse their mouth with sodium bicarb and sodium chloride. And that’s just try to try to treat or prevent these mouth sores and then organ specific side effects of anti-metabolites: certainmedications cause specific ones. So, one that I want to mention is hand foot syndrome, And that occurs with capcytabine. And that’s a rash that can occur, basically it is cell destructions on the palms and the soles of the feet, so that can be a dose limiting toxicity. So we have to stop giving that chemo if that occurs. And then cerebellar toxicity is a big one with cytarabine. So damage to that cerebellum, if you remember, the cerebellum has a lot to do with coordination. So we’ll see people kind of stumbling or not quite in control of their extremities, if they’re getting toxicity to the cerebellum. And again, that’s a dose limiting side effects. We’ll have to stop giving the medication if that gets severe. Okay. And what type of cancers do these treat? Well, they treat a ton of different cancers. I had to mention leukemias because I’m an inpatient oncology nurse on a bone marrow transplant unit. So I treat a lot of leukemias. I see these often, but they also treat breast and ovarian cancers and intestinal cancers and several other cancers. And I just want to mention, like I’ve said this before in many of the other lectures, but I need to mention here that we often give these in combination. Sometimes they’re given as single agents, but most often it’s given in combination. Socthey’re getting other chemotherapies at this same time. Okay. In patient education, like with any chemotherapies, we need to educate our patients about preventing infections. So with that would be neutropenic precautions because they often have low white blood cells, right? So you need to talk to them about hand hygiene, preparing their food appropriately, avoiding large crowds, wearing their masks out in public. Bleeding precautions because they have the low platelets, right? So that would be shaving within electric razors, fall prevention, good oral care, and just recognizing signs of bleeding, managing side effects. Of course, the nausea, vomiting, diarrhea, and those mouth sores are big ones with anti-metabolites. Chemo, specific education. I’m talking more about that hand foot syndrome, or plantar-palmer syndrome and then also the cerebellar toxicity. So we just need to educate our patients about what to watch for, what are those dose limiting side effects? Nursing concepts. So we’ll briefly review these. Cellular regulation is interrupted, right? So we’re trying to target that S phase of the cell cycle. Lab values. We talked about pancytopenia right, low white blood cells, low platelets and low blood cells can occur. And then patient education is huge with anyone getting chemotherapy. Okay. So some key points with anti-metabolites: they are cell cycle specific. So they target the rapidly dividing cells. And timing is very important, we need to adhere to chemo precautions because this is a chemotherapy. Side effects, organ toxicities, especially the brain, right. We’re talking about cerebellar, right? And then the GI tract and then combination therapy. These chemos are often given with other chemotherapies and they can be single agents, but often you’ll see them combined with other therapies. All right. That’s all I have for you. We love you guys. Go out and be your best self today and as always happy nursing.
<urn:uuid:436fcf59-3a7f-4356-9e61-2f10381005a9>
CC-MAIN-2021-25
https://nursing.com/lesson/30-03-antimetabolites/
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487653461.74/warc/CC-MAIN-20210619233720-20210620023720-00605.warc.gz
en
0.928258
2,305
3.03125
3
Walnut Creek Gopher control Gophers are one of the worst rodents to deal with, and are also commonly referred to as pocket gophers to homeowners. They are considered “pocket gophers” because they have a pocket that helps to transport food around. Gophers are known to be a mid-sized rodent with a range of different colors for skins and furs. Anything from black, brown, gray, or white can be seen on a gopher. Gophers are notorious for causing landscape and garden havoc. Many people have seen the famous movie, “Caddyshack.” In the movie you will see how gophers move and destroy land so easily. No one likes dealing with these elusive and destructive rodents. Creating gopher holes, burrows, and dens is their specialty, at the expense of a ruined yard. Gopher tunnels can vary greatly, anywhere from a few inches to a couple hundred feet per tunnel. The most active time for gophers to create networks is during the spring and fall, when the soil is perfect for creating elaborate tunnels. If you're a victim to multiple gopher tunnels and networks on your property, call the best gopher control experts in Walnut Creek today at (925) 329-3366 Setting Up Gopher Traps for Gopher Control Along with destroying your lawn or garden with various different gopher subterranean networks, they have are constantly destroying plants. Plant roots, stems, weeds, peanuts, potatoes, and other vegetation related foods are apart of a gopher’s diet. To get through tunnels gophers create they must rip through vegetation roots, this is a problem if you're a serious gardener. There are several different animals that prey on gophers, to name a few of the many: weasels, foxes, skunks, wolves, bobcats, coyotes etc. Some birds like owls and hawks can prey on gophers when they come out of there protected tunnels. Many other rodent animals can be mistaken for gophers such as, moles, garden voles, squirrels, and groundhogs. Gopher reproduction may be different for other species, but generally speaking the springtime is when gopher offspring is born. Each gopher batch will have anywhere from three to five young babies. By the time the late summer/fall comes around the young gophers will be mature enough to leave their tunnel behind and start a new life. Gophers only live for a couple years, never past three years. Short lives are a common thing for gophers to deal with. The biggest indicator of a gopher problem or gopher infestation is when you see clear damage to the landscape of your property. When multiple gopher holes are created with distinct networks connecting something is wrong. The sight of one gopher may be enough to prove a gopher infestation is present. Dealing with a gopher family can be a stressful plan, especially since the rodents are able to escape below surface to their dens or burrows. Getting rid of gophers is possible with the right knowledge, experience, and technique. There are many techniques gopher control experts like to implement. As a homeowner you have to decide what the best way to kill gophers is. Professional gopher control companies can use gopher poison, gopher traps, gopher repellent, and gopher bait to exterminate the annoying rodents. Trapping gophers may the least lethal method, but doesn’t really get rid of the problem because the gophers are released back into the environment. One of the best ways to get rid of a gopher family is to simply fill up all the gopher holes with cement or barbed wire. If they have no way to run around from their tunnels they will leave. The best gopher killer is having the capability to end the situation with the most effective method. A lot of times regular homeowners have no idea how to control and exterminate gophers. Reaching out to the best gophers professionals in Walnut Creek is the best solution to all your issues. Save time and money by getting rid of a gopher infestation problem the first time. Gophers will not leave a piece of property unless there uninvited or effectively exterminated. Our gopher control company only uses the best gopher traps, poisons, repellents, and baits. Why would you add more stress and worry to your already busy days, call the best gopher exterminators in town today. Contact (925) 329-3366 Walnut Creek Pest Control 1630 N Main St Suite 210 Walnut Creek, CA 94596
<urn:uuid:463d0038-7686-4a62-bb97-d9cef55c106e>
CC-MAIN-2021-17
https://www.walnutcreekpests.com/gopher-control.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038119532.50/warc/CC-MAIN-20210417102129-20210417132129-00371.warc.gz
en
0.941
950
2.859375
3
Making musical instruments can be an educational project for child or adult do-it-yourselfers. A copper flute may not have all of the tonal qualities of a professionally designed instrument, but it can provide plenty of musical fun. Learning to play your copper flute may take time if you are not already a flute player. It will be easiest to get a sound with all of the holes closed (covered by your fingers) until you learn how to blow across the mouth hole properly. Practice on a real flute or by blowing across a half-empty soda bottle, as the lower pitch of these items can be easier to produce for beginners. Things You'll Need - 1/2-inch inner diameter copper pipe, 16 inches long - 1/2-inch diameter wood dowel, 24 inches long - Straight edge - Dry-erase marker - Measuring tape - Drill press - 3/8-inch drill bit - 1/4-inch drill bit Video of the Day Place a dowel inside your copper pipe to ensure it holds its round shape as you drill into it. If the dowel doesn't fit well, sand down its entire surface with sandpaper until it slides inside the copper. Hard copper tubing is best, rather than softer copper such as refrigerator tubing. Hold a straight edge along the length of your copper tube and draw a line from one end to the other. All of your holes will be along this line. Measure 3 inches down from one end of the tube and make a small "X" on your line. Make more "X" marks at 8, 9, 10, 12, 13 and 14 inches down along the pipe. Place a 3/8-inch bit in your drill press and line up the bit with the "X" you made 3 inches from the end. Drill out the hole completely, allowing the bit to drill into the wood but not out the other side of the pipe. This is the mouth hole for your flute. Replace the 3/8-inch bit with a 1/4-inch bit and drill out the rest of your holes. These are your finger holes. File down any sharp edges of the copper with a round or semi-round file. Press a cork into the end of the copper pipe nearest the mouth hole. Make sure the cork seals the opening entirely. Wipe off any remaining marker with a rag. To play your flute, rest your bottom lip on the edge of the mouth hole and cover the finger holes with your first, middle and ring fingers of each hand. Uncover different holes to change the pitch.
<urn:uuid:c3f4ecb9-c573-462c-ad84-c9b7ae004a5a>
CC-MAIN-2018-51
https://www.ehow.com/how_6697278_make-homemade-flute-out-copper.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823895.25/warc/CC-MAIN-20181212134123-20181212155623-00055.warc.gz
en
0.927339
547
3.140625
3
HTTP full form is Hypertext Transfer Protocol, which is an application layer network protocol built on top of TCP. HTTP provides a standard for web browsers and servers to communicate. Hypertext Transfer Protocol defines how computers send packets of data to each other. In this article, we have shared all the basic information about HTTP and how it works, Types of Hyperlink transfer protocols. what is the difference between HTTP and HTTPS? So let’s start with the basic topic like what is HTTP? What is HTTP? (Hypertext Transfer Protocol) HTTP (Hypertext Transfer Protocol) is a set of rules for moving data over the internet, including text, photos, audio, video, and other multimedia files. HTTP is used indirectly as soon as a person opens their web browser. HTTP is an application protocol that runs on top of the TCP/IP protocol stack, which is the internet’s basics. HTTP/2, which was released in May 2015, is the most recent version of HTTP. It is a replacement for HTTP 1.1, although it does not render HTTP 1.1 obsolete. Must Read ➜ Application Layer Protocols How does HTTP (Hypertext Transfer Protocol) work? Resources are exchanged between client devices and servers via the internet via the HTTP protocol. Client devices make requests to servers for the resources required to load a web page, and the servers respond with replies that satisfy the requests. - Sub-documents — such as data on pictures, text, text layouts, and so on — are shared between requests and responses and are stitched together by a client web browser to show the whole web page file. - A web server contains an HTTP (Hypertext Transfer Protocol) daemon, a software that waits for HTTP requests and handles them when they arrive, in addition to the web page files it can serve. - A web browser is an HTTP client that communicates with servers by sending requests. - When a browser user requests a file by typing in a URL or clicking on a hypertext link, the browser generates an HTTP request and delivers it to the Internet Protocol address (IP address) provided by the URL. - The request is received by the HTTP (Hypertext Transfer Protocol) daemon on the destination server, which then delivers back the requested file or files. - HTTP is the protocol used by client devices to communicate with servers online and access web pages. To continue with this example, a user would like to go to Google.com When the user puts in a web address, the computer sends a “GET” request to the server that hosts the URL. The GET request uses HTTP to inform the TechTarget server that the user is looking for the HTML (Hypertext Markup Language) code that structures and gives the login page its appearance. The login page’s text is included in the HTML response, but other elements of the page, particularly its graphics and videos, are retrieved and returned separately via HTTP requests and responses. The more calls made — for example, to call a page with many images — the longer it takes the server to answer and the user’s system to load the page. TCP/IP is used to reduce and transmit information in small packets of binary sequences of ones and zeros when these request/response pairs are sent. Electric wires, fiber optic cables, and wireless networks are used to send these messages. ASCII code is used in the requests and responses that servers and clients utilize to communicate data. Requests specify what data the client wants from the server, while answers contain code that the client’s browser will interpret as a web page. HTTP vs. HTTPS: What’s the Difference? Under conventional HTTP application layering, HTTPS is the use of Secure Sockets Layer (SSL) or Transport Layer Security (TLS) as a sublayer. HTTP encrypts and decrypts either user HTTP page requests and the web server’s response pages. Eavesdropping and man-in-the-middle (MitM) attacks are likewise protected. Netscape was the first to implement HTTPS. Migrating from HTTP to HTTPS is advantageous because it adds a layer of security and trust. Must Read ➜ Congestion Control Requests and replies through HTTP(Hypertext Transfer Protocol) A message is a name given to each interaction between the client and the server. HTTP requests and answers are both messages. Client devices transmit HTTP requests to servers, which then respond with HTTP responses to the clients. HTTP requests are made. This occurs when a client device, like an internet browser, requests information from the server in order to load a webpage. The request gives the server the information it needs to customize the server’s response to the client device. Each HTTP request comprises encoded data, including the following: After then, the specific version of HTTP was used. The two versions : A web address. This is a hyperlink to a web resource. This is an HTTP method. This specifies the particular action that the request wants the server to take in response. Headers of HTTP requests. This information contains things like the browser being used and the data the request is looking for from the server. Cookies, which show information previously sent from the server handling the request, can also be included. The body of an HTTP request. This is optional information that the server needs from the request, such as user forms that are sent to the website, such as username/password logins, short responses, and file uploads. Responses to HTTP requests. The data received by a client device from the webserver is represented by the HTTP response message. The response is the server’s answer to an HTTP request, as the name implies. The information in an HTTP response is adapted to the context provided by the request to the server. The following information is commonly included in HTTP responses: The HTTP status code informs the client device about the status of the request. Success, an informative answer, a redirect, or faults on the server or client-side are all possible responses. Headers in HTTP responses that send information about the server and the resources requested. The body of an HTTP request (optional). If a request is successful, the response contains the requested data in the form of HTML code, which the client browser converts into a web page. Must Read ➜ Types of Routing Protocols Status codes on the HTTP protocol Servers frequently send response codes in response to HTTP requests, indicating whether the request is being processed, whether there was an error in the request, or whether the request is being redirected. The following are examples of common response codes: - OK with 200. This indicates that the request, such as GET or POST, was successful and is being processed. - 300 has been permanently relocated. This response code indicates that the requested resource’s URL has been permanently changed. - the number 401 Unauthorized access. The client, or the person who is making the server request, has not been authenticated. - Forbidden with a 403 code. The client’s identity is known, but no access authorization has been granted. - There was a 404 error. This is the most common type of error code. It indicates that the URL is invalid or that the resource at the specified address does not exist. - Internal Server Error 500 The server has come upon a circumstance that it is unsure how to handle. Proxies in the HTTP protocol Application-layer servers, computers, or other entities that sit between the client device and the server are known as proxies or proxy servers. Proxies act as a conduit between the client and the server, relaying HTTP requests and responses. For each client-server interaction, one or more proxies are often used. Proxies can be either transparent or opaque. Transparent proxies do not alter the client’s request and instead relay it to the server unchanged. Client requests will be modified in some way by non-transparent proxies. Non-transparent proxies can be used for a variety of purposes, including speeding up server retrieval. Proxies can be used by web developers for the following purposes: - Caching is a term that refers to the act of Cache servers can save web pages and other internet content locally, allowing for faster content retrieval and lower bandwidth usage. - Authentication is the process of verifying someone’s identity. Controlling application and internet information access privileges. - Logging is a type of data collection. Historical data, such as the IP addresses of clients that made queries to the server, is saved. - Filtering of the internet. Controlling access to online pages that may pose a security risk or contain offensive information. - Load balancing is a term that refers to the process of balancing the Multiple servers, rather than just one, that can manage client requests to the server.
<urn:uuid:3cbf2003-b817-4e32-9b32-144e7800746a>
CC-MAIN-2022-05
https://edukedar.com/hypertext-transfer-protocol/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303747.41/warc/CC-MAIN-20220122043216-20220122073216-00480.warc.gz
en
0.901842
1,857
4.40625
4
The first signs of spring are still a few weeks away, but we are starting to see a few more birds in our neighborhood. So I thought it would be a good time to try one of the fun hands-on nature study activities suggested in NaturExplorers: Beautiful Birds, which is to make a bird nesting bag! I had no idea that birds could use a little help making nests. I always thought they just used twigs. But birds can use lots of materials to construct their nests, including some of the things we might throw away. This was a great project to share with the kids, because it showed them that we can actually help animals to build their homes. See how to make this simple nature craft and try it to see if your kids like it for a spring project! Hands-On Nature Study: Make a Bird Nesting Bag Here’s what you’ll need to make a bird nesting bag: - Mesh bag (I used the one that came with our onions) - Twigs and grass leaves - Brown paper bags - Paper napkins Just a tip: If you’re going to use an onion bag (like we did), be sure to leave the bottom end sealed. It usually has a metal clip on the end for keeping the bag closed. If you keep that intact, then you’ll only have to close the nesting bag at one end. I let the kids run out in the backyard to gather the twigs and weeds. (We don’t have grass in our yard, but I don’t think the birds are that picky.) We used scissors to cut the paper bags into thin strips. We did the same with the paper napkins. Then we just mixed them into a pile with the weeds, twigs, and yarn clippings. After we removed the tag from the mesh onion bag, we just stuffed all of our materials into the bag opening. We cut a long piece of yarn (about two feet in length) and used one end to cinch the mesh bag closed. It’s finished! Now we just need to hang it up. We used the yarn to hang it from a low tree branch. And now it’s ready! Since the mesh bag has plenty of holes, birds can just fly up to it and grab some things for constructing their nests. It’ll be interesting to check in a few weeks to see what’s been used already. You’ll love all of these easy nature study books. I loved this project. It was so simple and it was a nice way to get outside with the kids and start thinking about the signs of spring that we’ll see soon. Plus, it was cool to extend a little “invitation” to the birds in our neighborhood to stop by and pick up a few building supplies. Try some of these other nature study activities with your children!
<urn:uuid:78d1e4e1-f3d3-4763-8649-90ec4a5e58ab>
CC-MAIN-2021-39
https://www.tinasdynamichomeschoolplus.com/bird-nesting-bag/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056856.4/warc/CC-MAIN-20210919095911-20210919125911-00458.warc.gz
en
0.956205
616
2.859375
3
There is a ‘right’ place to look when running indoors. When you run outside, you don’t think twice about where to stare: You look straight ahead in the direction that you’re traveling. But the treadmill presents more options for your gaze—a TV screen overhead, an instructor moving about the room, a magazine covering up your console. And as it turns out, where you look can help or hurt performance. That’s because your gaze has a lot to do with the positioning of your head. When your head is balanced, you won’t inadvertently strain any muscles, compromise your breathing, veer off course, or slow down to readjust your footing, says Alan Hedge, Ph.D., director of the Human Factors and Ergonomics Laboratory at Cornell University. The optimal angle for your gaze—no matter what you’re doing—is 60 degrees above the floor, says Jeffrey Fairbrother, Ph.D., a professor of motor behavior and kinesiology at the University of Tennessee Knoxville. Which means: Many gyms place their televisions too high, says Hedge. Tilt your head upward to watch and you’ll shift your balance, which could shorten your stride length and slow you down, says William E. Buckley, Ph.D., a professor of exercise, sport science, and health education at Penn State University. Even more? When you look up, your neck, shoulders, and upper back muscles contract to hold your 10-pound head in place. This strains these muscles, especially as the body bounces up and down with each stride, which could lead to injury, Hedge says. Reading causes the opposite problem: Muscles over-stretch as you hang your head downward. Looking down too far could also compress both your carotid arteries (blood vessels in your neck), which could reduce blood flow to the brain; and your trachea, which can reduce air flow, according to Hedge. These may seem like extreme side effects, but they are the consequences of poor neck posture, says Hedge. If you’re going to watch TV, choosing a treadmill that’s farther away from the screen helps ensure you don’t tilt your head as much. Better yet, skip it. And as Fairbrother puts it, practice should replicate real-life settings. Ask yourself, he says: “Do you want to get good at running while watching TV? [Your] training goals would be better served by using the treadmill as an opportunity to engage in simultaneous mental practice of imagery to prepare for real-world demands.” And resist the opportunity to socialize. If you’re running next to a friend, make sure not to turn your head toward them while you talk. You’re likely to rotate your trunk when you rotate your head, which causes veering,says Michael Cinelli, Ph.D., an associate professor of kinesiology and physical education at Wilfrid Laurier University. This can also cause you to slow down and you may decelerate even further as you work to correct the natural impulse, he says.
<urn:uuid:1552cbd4-5d0d-46d0-8686-ffcbcd6758b9>
CC-MAIN-2022-27
https://dkr-origin-furthermore.equinox.com/articles/2016/10/treadmill-gaze
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103271864.14/warc/CC-MAIN-20220626192142-20220626222142-00115.warc.gz
en
0.94746
649
2.6875
3
McCarthyism and the Red Scare In the end, President Eisenhower had no choice but to fight back against Senator Joseph McCarthy—and he did. The struggle for civil rights The age of Eisenhower was a time of racial turmoil. Following World War II, African Americans demanded equality before the law. Eisenhower expanded America's commitment to the French war in Indochina but decided against unilateral American intervention. D-Day in the age of Trump "In 2018," writes Will Hitchcock for CNN, "We live in a political climate that denigrates the very sources of strength that made the D-Day invasion such a dramatic success." In its review of The Age of Eisenhower, the Wall Street Journal calls our 34th president "an artist in iron" and praises Will Hitchcock's "rich narrative." Eisenhower and Billy Graham "Ike and Billy formed a powerful tandem, twin exemplars of the public piety and fatherly certainty that marked — and marred — midcentury America," writes Will Hitchcock in the Washington Post. About the author William I. Hitchcock is professor of history at the University of Virginia. His work and teaching focus on the international, diplomatic, and military history of the 20th Century, in particular the era of the world wars and the Cold War. He has written widely on trans-Atlantic relations, the politics of the 1950s, and European history and politics. He received his BA degree from Kenyon College in 1986 and his PhD from Yale in 1994, working under the supervision of Paul Kennedy.
<urn:uuid:8fe92e30-df00-4673-b271-5d7dad7ce44d>
CC-MAIN-2020-34
https://millercenter.org/the-presidency/educational-resources/age-of-eisenhower
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738913.60/warc/CC-MAIN-20200812171125-20200812201125-00523.warc.gz
en
0.9427
318
3.65625
4
What are algae? Algae are simple, aquatic, plant-like organisms that do not have true roots, stems and leaves. Many are single-celled so can only be seen using a microscope, while others grow in filaments or mats that are quite conspicuous. Algae have chlorophyll and can make their own food through the process of photosynthesis. Although algal growths can often be seen in the water, a microscope is required to appreciate their beauty and complexity. Spirogyra under a microscope Why are algae important? - Algae produce oxygen as a waste product of photosynthesis. Cyanobacteria are amongst the most ancient forms of life and they have been contributing oxygen to the world’s atmosphere for the last three billion years. - Cyanobacteria are able to fix nitrogen from the atmosphere. All organisms require large amounts of nitrogen for their metabolism and cyanobacteria play an important role in making atmospheric nitrogen available in nutrient cycles. - Algae help to ‘purify’ water by absorbing nutrients and heavy metals from streams and rivers. - Algae are the basis of most aquatic food webs. They are food for many small aquatic invertebrates, and in turn, these small creatures are food for larger animals such as fish. Algae also provide important habitats for invertebrates and fish. Without organisms that can capture energy from the sun by photosynthesis, none of the higher organisms would exist. - Algae can be valuable indicators of environmental quality. Many are sensitive to changes in pH, in nutrient levels or in temperature. Monitoring species abundance and composition can be useful to identify changes in water quality caused by changes in surrounding land use. Where are algae found? Freshwater algae are found growing underwater on rocks and mud in streams and rivers. They are usually more abundant in slower streams than in fast flowing rivers. Didymo, the exotic pest alga commonly known as ‘rock snot’, is one of the few species that grow well in swift rivers. However, even didymo cannot withstand turbulent flood waters. What types of freshwater algae are there? The main groups of algae found in streams are the green algae (Chlorophyta), red algae (Rhodophyta), blue-green algae (Cyanobacteria) and diatoms (Bacillariophyta). Green algae: Green algae often look like strands of green hair flowing in the current. Spirogyra is a common green alga. Under a microscope its chloroplasts are clearly seen as spirals. Red algae: Red algae, such as Audouinella, uses a different part of the light spectrum it is able to grow in places where the other algae can’t, so tends to be found in shaded places such as under rocks or banks. Blue-green algae: The chlorophyll in the alga Cyanobacteria is not in chloroplasts but diffused throughout the cell. Pigments, other than chlorophyll, contribute to their colouration so cyanobacteria are not usually bright green. Nostoc is another cyanobacteria that is often conspicuous in streams. It looks like bubbles of firm jelly attached to the rocks. The ‘bubbles’ are masses of small chains of cells. . Diatoms: Mats of brown growth, fluffy masses or slimy layers on rocks are some of the ways diatoms appear to the naked eye. Gomphoneis forms thick, glistening, light-brownish mats on river substances and is often mistaken for didymo. However, didymo has much larger cells and grows in tougher, more fibrous mats. Can algae be bad? - Excessive nutrients in runoff from land used for intensive agriculture will alter the natural composition of algae in streams and rivers. If the natural balance is disturbed algal blooms may occur, causing undesirable discolouration, scum and odours and even toxic effects. - Didymo (Didymosphenia geminata) is an example of an introduced organism that has grown into unsightly mats over stream and river bottoms. In many places it has out-competed the native algae and destroyed invertebrate and fish habitat. Be fastidious in taking measures to stop the spread of didymo. Follow the simple rules – Check, Clean, Dry – when moving from one waterway to another.
<urn:uuid:98437373-a81b-418d-a6ed-de59bf9eb58a>
CC-MAIN-2021-31
https://www.doc.govt.nz/nature/native-plants/freshwater-algae/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154321.31/warc/CC-MAIN-20210802141221-20210802171221-00386.warc.gz
en
0.938233
913
3.921875
4
Table of Contents C. elegans detect and respond to diverse mechanical stimuli using neuronal circuitry that has been defined by decades of work by C. elegans researchers. In this WormMethods chapter, we review and comment on the techniques currently used to assess mechanosensory response. This methods review is intended both as an introduction for those new to the field and a convenient compendium for the expert. A brief discussion of commonly used mechanosensory assays is provided, along with a discussion of the neural circuits involved, consideration of critical protocol details, and references to the primary literature. C. elegans senses a variety of mechanical stimuli. These stimuli include gentle touch stimulus delivered to the body (Chalfie and Sulston, 1981; Sulston et al., 1975), harsh touch to the midbody (Way and Chalfie, 1989), harsh touch to the head or tail (Chalfie and Wolinsky, 1990), nose touch (Kaplan and Horvitz, 1993), and texture (Sawin et al., 2000). Gentle touch to the body is sensed by six sensory neurons (ALML/R, PLML/R, AVM, and PVM). An important feature of any assay for gentle touch mediated by these cells is that it not be confused with the response to other mechanical signals. Thus, care should be taken to touch the animals in a way that will not stimulate other mechanosensory neurons. In practice, one should avoid too harsh a stimulus and not touch the animals too near the tip of the head or tail. The initial and most generally used method to test for gentle touch sensitivity is to stroke the animals with an eyebrow hair that has been glued to the end of a toothpick (Chalfie and Sulston, 1981) (Figure 1). Eyebrow hairs are used because they are usually not cut and are, thus, finely tapered. They also can be obtained with a minimum of discomfort. Some papers stated that the hairs are from eyelashes. However, removing eyelashes is a much more painful process. Various glues can be used to secure the hairs, but the hair should be placed so that its shaft extends straight from the end of the toothpick and does not curve away from the tip. The hair is sterilized by dipping it into a 70% ethanol solution and dried by shaking (don't flame sterilize the hair). Sometimes bacteria accumulate on the hair; they can be removed by poking the hair into the agar on a spare plate. Animals are touched by stroking the hair across the body just behind the pharynx (for the anterior touch response) or just before the anus (for the posterior touch response; see Figure 1). Actually touching the animals in any position along the touch receptor processes will generate a response. Touching the animals near the middle of the body (near the vulva in adult hermaphrodites), however, yields ambiguous results because both the anterior and posterior touch circuits can be activated. The animals should not be poked with the end of the hair, since this provides a stronger stimulus and can sometimes evoke a response, even in touch-insensitive animals. Similarly, animals should not be touched with the end of a platinum worm pick. Animals should not be touched at either the tip of the nose or the tip of the tail as even animals lacking the six touch sensing cells often respond. The touch assay is really a differential assay, since animals that are dead or paralyzed will also not respond to the stroking. Routinely, animals are said to be touch-sensitive if they respond to stroking with the eyebrow hair by stopping movement toward the hair or move away from the hair (sometimes the touch stops moving animals without having them reverse their direction of movement). Touch-insensitive (Mec) animals fail to respond to the hair, but do respond to prodding with a worm pick. A partial response is one in which the animals react to only some of the touches. Touch sensitivity mediated by the anterior touch cells can be assayed in severely uncoordinated animals by monitoring pharyngeal pumping (Chalfie et al., 1985; M. Chalfie, unpublished data). Touching animals in the anterior slows the rate of pharyngeal pumping. Another output of the touch circuitry is the defecation rhythm, which is reset by stroking the anterior of the animal with the eyebrow hair and is dependent on genes needed for the function of the touch receptor (mec-4, mec-5, and mec-9; Thomas, 1990). Wild-type animals will move (adults usually reverse direction) in response to their plate being tapped (Chalfie and Sulston, 1981). This stimulus often happens when plates are placed on the stage of a dissecting microscope. Touch-insensitive animals do not respond to this tapping. Although not as accurate a measure of touch sensitivity as touching with an eyebrow hair, this is a rapid assay that has been used to screen for touch-insensitive mutants (Chalfie and Au, 1989). Plates with F2 progeny of mutagenized parents were dropped from about 1-2 cm above the stage of the microscope and then examined for animals that did not move. Candidate touch mutants were then tested with the eyebrow hair and worm pick to determine if they were touch insensitive. Catharine Rankin and coworkers designed an electric tapper to deliver taps to plates at defined intervals for their studies examining the touch circuitry and habituation of the touch response (Rankin, 1991; Wicks and Rankin, 1995). The above assays treat touch sensitivity as an all-or-none phenomenon. But, even touch-insensitive animals sometimes respond to the first touch. Two methods below provide a more quantitative measure of the touch response: counting the responses to multiple touches, and touching with defined stimuli. The first instance of using multiple touches with an eyebrow hair to measure the degree of insensitivity to touch was by Hobert et al. (1999). In this assay animals are touched ten times (alternating head and tail touches) and a score is given for the number of positive responses. At least thirty animals are examined and mean percentage score is obtained. Since individual touches are not always the same, the values obtained in this assay are not truly quantitative. Nonetheless, by using multiple animals, relatively subtle difference in touch sensitivity can be revealed (e.g., Hobert et al., 1999; Zhang and Chalfie, 2002). In addition, by separately scoring head and tail responses, differences between the two can also be uncovered (Zhang et al., 2004; Chen and Chalfie, 2014). In using this method one should be careful to distinguish between animals that habituate more rapidly than wild type from those that respond less frequently to the touch stimulus. The animals with the former defect should show a response pattern in which the animals respond less frequently to successive touches; animals with the latter defect should show no pattern to the failures. The experimenter should also determine whether the animals are responding equally (in terms of number of responses) to touches in the head or tail. This method can be further modified by gently placing the hair next to the animals instead of stroking the hair. This modification identifies subtler diffderences in the touch response (Chen and Chalfie, 2014). von Frey hairs have been used clinically for over a century to test human touch sensitivity. They consist of a series of flexible fibers that are touched end-on to skin and bend once a specific force has been applied. The longer and thinner the fiber, the less force is required to bend it. These calibrated fibers are then used to determine the forces needed to provoke a touch sensation when placed on the skin. We adapted this method to C. elegans by using fine monofilament nylon sutures (7-0 and smaller; Iris Chin, M. Goodman, and M. Chalfie, unpublished data). A short length of suture (Sharpoint™, Surgical Specialties Corporation) is attached perpendicularly to the end of a glass capillary (100 μL volume) with epoxy and calibrated using an analytical balance. The force (in μnewtons (μN)) required for bending is calculated as the weight (in mg) found for the bent fiber X 9.8 m/s2. A limitation of this method is that fibers that deliver less than 10 μN of force are difficult to use and calibrate because they bend with the air currents normally found in the lab. Typically, we mount the capillary on a manual micromanipulator with the fiber perpendicular to the agar surface, position a worm underneath the fiber, and make contact by moving the z-axis of the micromanipulator. Animals are touched in the same locations as described above for testing body touch with eyebrow hairs, and the response is noted. Ninety percent of wild-type hermaphrodites respond to a 10 μN of force; virtually all animals respond to forces >100 μN. In contrast, hermaphrodites homozygous for mec-3 and mec-6 null mutations fail to respond to a 100 μN force. Approximately 10% of mec-4 (u253) animals respond to a 100 μN force (the difference may reflect some activity from the PVD cells, which are defective in mec-3 animals). Whether using human hairs or nylon fibers, classical methods for delivering mechanical stimulation provide limited control over stimulus strength. New devices based on micro-electrical mechanical systems (MEMS) techniques and soft-lithography for designing and fabricating silicon devices provide such control and have been developed to measure body mechanics and touch sensation in worms (Park et al., 2007; Doll et al., 2009; Park et al., 2011; Petzold et al., 2011; Ghanbari et al., 2012; Petzold et al., 2013). An integrated system for analysis of gentle body touch consists of a force-sensing cantilever integrated into a feedback circuit enabling experimenters to control the size and duration of mechanical stimulation. With this system, either displacement or force can be controlled. Stimuli are delivered from above to animals crawling on an agar surface and the system also includes a digital camera for recording behavioral output. With this system, Petzold et al. (2013) showed that wild-type worms can detect sub-μN forces and sub-μm indentations. Harsh touch to the body was originally measured by prodding animals with a platinum wire in the midsection of the body (Chalfie and Sulston, 1981; Way and Chalfie, 1989). Nonmoving gravid adults are prodded at or just posterior to the vulva. Animals respond by initiating locomotion, usually by backing up. Animals to be assayed should be grown in the continuous presence of food. Animals who are starved and animals that have passed through the dauer stage often fail to respond to harsh touch regardless of the functional status of the PVD sensory neurons (Way and Chalfie, 1989). Harsh touch is assessed in animals in which the function of the ALM and PLM neurons have been perturbed as these neurons mediate response to both gentle and harsh touch. Response to harsh touch is mediated by the PVD sensory neurons and perhaps the FLP sensory neurons (Way and Chalfie, 1989; Chatzigeorgiou et al., 2010b). The phenotype is called “Touch abnormal” (abbreviated Tab) to distinguish it from “Mechanosensory defective” (abbreviated Mec) animals, i.e., animals that cannot respond to gentle touch. Subsequent research on harsh touch has refined the methodology. Li et al. (2011), used a platinum pick with a 20 μm thick and 30 μm long flattened tip. Force is applied from above animals by pressing down with the edge of the pick. Five trials are delivered in this manner with a 2-10 minute inter-trial interval. These authors estimated the force delivered by recording similar pressure on an analytical balance, recording the change in mass produced by stimulation, and converting this to force according to F = Δma, where a is the gravitational force (9.8 m/s2) and Δm is the change in mass. Forces on the order of 100 μN are generated by this method. Although the animals are reported to avoid the edge of an agar chunk, little is known about this behavior. C. elegans dauers can be observed atop mold filaments moving in an undulating fashion independent of plate orientation. (Croll and Matthews, 1977) An overtly similar behavior called nictation likely plays a role in the dispersal of other nematode dauers including infectious species or Pristionchus pacificus (Brown et al., 2011). C. elegans dauer nictation can be assessed by placing dauers on fields of 25 μm tall agar posts with a radius and a spacing of 25 μm (Lee et al., 2011), or by laying cotton gauze on the agar surface. Nictation requires functional IL2 neurons and is required for C. elegans dispersal in laboratory assays using Drosophila as carriers. The nose of C. elegans generally moves in a rhythmic dorsal/ventral pattern as animals feed on a bacterial lawn on the surface of agar plates. In this context, rhythmic nose swinging is called foraging. Aberrant foraging rates and patterns of movement can be observed in animals with defective OLQ and IL1 labial neurons or in animals with defects in RMD motorneurons, which are synaptic targets of these labial neurons (Hart et al., 1995). Animals respond to touch to the side of the nose by rapidly moving their nose away from the stimulus; this is called head withdrawal. Response is mediated by the OLQ and IL1 labial sensory neurons. Genes required for head withdrawal include glr-1 and trpa-1, but not mec-4 or osm-9 (Hart et al., 1995; Kindt et al., 2007b). A hair, similar in size to the hair used in the nose touch assay, is placed on the agar plate parallel to the direction of forward locomotion, so that the side of the animal's nose will just touch the hair at the maximal extent of the foraging nose swings. Animals respond to contact by rapidly moving their nose away from the hair or initiating a reversal. Practice is required to learn where to lay down the hair and to discriminate between the rapid withdrawal motion versus normal foraging motion. Foraging and head withdrawal assays should be undertaken by observers blind to genotype or treatment. Thin bacterial lawns for these assays can be prepared by releasing a single drop of an overnight OP50 culture over a standard NGM plate. Allow the liquid to soak into the plate. The plate should be used within a few hours or should be sealed with Parafilm® and stored at 4oC for weeks. Allow stored plates to return to room temperature before use. The tap-withdrawal protocol measures the responses of a worm to a single tap or a series of successive taps (trains of taps), given to the side of a standard NGM agar plate. The taps/trains cause the worm's environment to vibrate briefly, and this causes the adult worm to swim backwards for some distance (termed a reversal). This technique produces a quantifiable measure of both the frequency and the magnitude of this reversal response. The tap is a complex stimulus as it activates both anterior and posterior body-touch cells, as well as PVD (Wicks and Rankin, 1995). The head cell activation promotes backward movement while the tail cell activation promotes forward movement and so the response to tap is an integration of the activation of opposing subcircuits (Wicks and Rankin, 1995). The response to tap can be studied using video recording and manual scoring, or by automated tracker (see WormBook chapter Keeping track of worm trackers). For both types of assays worms are placed on an NGM agar filled plate and are recorded either by a high-resolution camera lens alone, or through the lens of a dissecting microscope. A mechanical tapper is arranged to hit the center of one side of the plate. In the original, manually scored, experiments the tapper was composed of an electromagnetic relay run by a stimulator (Rankin et al., 1990) that delivered a force of approximately 1 to 2 newtons (N) per tap. In the tracker based experiments, a variety of tappers have been used including a Mindstorm robot (i.e., Kindt et al., 2007a) and a solenoid mounted so that the plunger strikes the Petri plate (i.e., Swierczek et al., 2011). Regardless of the source of the tap the reversal response to tap can be affected by several variables: The age of the worm. Chiba and Rankin (1990), showed that as worms got larger so too did reversals, while Timbers et al. (2013) showed that younger worms reacted differently to stimuli of different intensities and older worms were less sensitive to changes in intensity. Timbers et al. (2013) measured tap intensity using Laser Doppler vibrometry (LDV) (OFV-5000, Polytec Inc.), which measures the velocity (m/s) or displacement (m) of a moving surface by detecting the Doppler shift of a reflected laser beam. The agar in the plates. As agar plates age they dry out and lead to differences in the ease with which worms can move. This can be controlled for by only using plates within a certain age range, or by weighing plates prior to use. The ambient temperature and humidity in the room where the testing is done. This is probably the result of changes in the agar and ease of movement; it is an important variable to control. At the very least, experimental and control animals must always be run together, on the same day, at about the same time, under all of the same conditions. By taking note of temperature and humidity conditions for each animal it will be possible to determine whether variations in either variable affected the outcome of the experiment. Other sources of stimulation. It is important to leave the lids on the plates during testing: the stimulus of removing the lid changes the worms behavior, and can lead to problems as the agar dries our. Experience. The tap response decrements with previous exposure to taps (Giles and Rankin, 2009). In addition, mechanosensory experience in general can affect the response to tap. For example, if plates are kept in an incubator with a vibrating fan, or if plates are handled a lot prior to testing, worms will respond to tap differently than worms without that experience. Once an experiment has been run and recorded, the behavior must be scored. This can be done by hand or by using software with one of the tracker programs (see Keeping track of worm trackers). For manual scoring, each animal's movement is scored by tracing movement from the video image onto a transparent acetate sheet taped to the video monitor, going frame by frame through the video. The adult worm will usually (90% to 95% of the time) respond to the tap with a reversal response, with the size and number of the responses decreasing as stimuli are repeated through the habituation run. In a typical reversal response, a stopped or forward-moving animal moves backwards for a distance (usually less than 1 or 2 worm lengths) and then either remains still or re-initiates forward movement in a new direction. To score the response, a person notes the pre-tap position of the worm, and then traces the total distance the worm reversed (i.e., track length) onto the acetate sheet. Because the head of the worm often makes small side-to side foraging movements, reversals are most accurately scored by tracing the path of the tail. These “scored” tracings are then scanned into a computer and the length of each is measured using NIH Image. The values from this program, representing the reversal/acceleration magnitude, can then be directly transported into a statistical package for data analysis. Alternatively, response to tap can be quantified using more recently developed automated systems that combine stimulus delivery with image capture and analysis (e.g., Swierczek et al., 2011). With any of these analyses it is important to define the parameters for identifying and scoring a reversal. A scoring manual should be developed with rules for scoring variations from this behavior (i.e., the reversal must occur within 1 second of the tap, or if the worm is already swimming backwards when the tap is delivered this is a “missing data point”, etc.). In some cases, an animal will respond with acceleration forward rather than a reversal. In a typical acceleration response, a stopped or forward-moving worm either initiates forward movement or increases its speed, respectively. Generally, in experiments with adult wild-type worms, these acceleration responses are simply scored as missing data points (an adult worm will accelerate to tap only about 5% of the time). Under other circumstances or protocols, such as with larval, mutant, or laser-ablated animals, the acceleration response occurs more often and is therefore scored. If a worm accelerates after the tap, the acceleration is scored by measuring either the distance the worm moves or the speed the animal moves during the 1 sec interval before the tap and subtracting it from the distance/speed the worm moves during the 1 sec interval after the tap. If the measurement for the sec after the tap is ? 1.75 X the measurement for the sec before the tap, the response is considered an acceleration. It is important to note that the reversal response and the acceleration response are two qualitatively different outcomes that cannot easily be compared. The frequency of reversals and accelerations are also important measures of the behavior of the worm, and are scored simply by counting the number of instances of either response. Reversal magnitude and reversal probability appear to be independent measures and can be affected differently by a given mutation (Kindt et al., 2007a). Prior to undertaking tap reflex experiments, it would be advisable to also read further about the tap reflex (Giles and Rankin, 2009). C. elegans responds to gentle touch to the nose by initiating backward locomotion. (Kaplan and Horvitz, 1993) This response is the “Nose touch response” or Not assay. Response to nose touch is mediated by the ASH, OLQ and FLP sensory neurons. The two polymodal ASH sensory neurons mediated 60% of the wild type response to nose touch. Their ciliated, sensory endings are located at the tip of the nose where they detect numerous noxious stimuli, often in combination with other neurons. ASH neurons play a role in response to light touch to the nose, high osmolarity (Hart et al., 1999), low pH (Sambongi et al., 1999), heavy metal ions (Bargmann et al., 1990; Sambongi et al., 1999), UV light (Ward et al., 2008), volatile repellent chemicals (Troemel, 1999), quinine, and detergents (Hilliard et al., 2004). Nose touch is assayed by laying a hair on the surface of the plate in front of the animal. As an animal moves forward, it contacts the hair with the tip of the nose perpendicular to the direction of movement. Some practice is required to anticipate where the hair must be laid down for an animal to run into it at 90 degrees. Normal animals immediately initiate backward locomotion. Defective animals either hurdle over the hair or slide their nose along the hair. An individual animal is tested no more than 10 times in a row to avoid inducing habituation. You cannot induce lethargic animals to move or reverse direction by touching them as this diminishes response to nose touch, but you can raise the assay plate 1 cm and let it drop onto the stage. Nose touch can be assayed either on very thin bacterial lawns or off food. Response on food is more robust and is preferred. Animals that are moved to thin lawns recover within 10 min and respond in roughly 90% of trials. Response by animals who have wandered off the bacterial lawn is slightly diminished: animals respond in roughly 80% of trials. Response is dramatically reduced in animals that have been recently moved by the investigator to a plate lacking food: animals respond in roughly 30% of trials (Chao et al., 2004). The hair should be wiped off every few trials to eliminate bacteria and water that may adhere. Normal animals will ignore a wet or slimy hair. A folded Kimwipe type wiper or clean bare fingers can be used. In the latter case, avoid using lotions, creams, or other surfactants. Don't flame the hair. Individual hairs can be reused used for weeks. The hair used in the Not assay must be of an appropriate size. Too thick will result in all animals responding, too thin will cause even animals of mutant genotype to respond. Hair thickness has definite variation between individuals; arm hair from a female researcher or an eyelash from a male researcher would be a good place to start. Fine paintbrush hairs can also be used. The root of a hair is taped to the small end of a glass Pasteur pipette or to a thin wooden stick. Slightly thicker hairs are required for nose touch assays on food. Generally the very tip of a hair is too thin and the animal must impact a thicker (and less distal) part of the hair in the nose touch trial. Thin bacterial lawns for nose touch assays can be prepared by releasing a single drop of an overnight OP50 culture over a standard NGM plate (see Maintenance of C. elegans, Section 3). Allow the liquid to soak into the plate. To prevent bacterial growth and too much thickening of the bacterial lawn, the plate should be used within a few hours or should be sealed with Parafilm and stored at 4oC for weeks. Allow stored plates to return to room temperature before use. If the bacterial lawn is too thick, the animals may crawl through the food over or under the hair and avoid the nose touch stimulus. Each hair is tested by comparing the response of N2 and glr-1 animals. (Hart et al., 1995). N2 animals should respond robustly; glr-1 animals should fail in 90% of trials. (Note that eat-4 animals are so defective in their response to nose touch that they are not useful as a control (Lee et al., 1999; Raizen and Avery, 1994)). At a bare minimum at least 5 animals should be tested at 10 trials each on two different days along with controls. Response is expressed as fractional or % response. C. elegans adapt to nose touch after a rapid series of repeated trials. The nose touch trials must be given in fairly rapid succession to adapt the animals’ response (without accidentally hitting the animal over the head with the hair). To measure habituation, compare the % response in the first 10 trials to the % response in the trials 40 through 50. Controlled mechanical stimuli have been delivered to worms during electrophysiological recordings or optical imaging. Mechanical stimuli can be defined as a function applied displacement (Suzuki et al., 2003; Kindt et al., 2007a; Kang et al., 2010; Li et al., 2011; Chen and Chalfie, 2014) or force (O'Hagan et al., 2005; Bounoutas et al., 2009; Arnadóttir et al., 2011; Geffeney et al., 2011). The choice between the two measures has been largely a matter of technical convenience, since it was unknown whether C. elegans senses the indentation or the force applied by the stimulator probe. When delivering force pulses, the size of the probe also affects the stimulus achieved, since the force applied via a small probe generates a larger stress (pressure) than the same force applied by a larger probe. A study by Petzold et al. (2013) used a custom-designed and fabricated (micro-electrical mechanical) MEMS-based device to show that behavioral responses evoked by stimulating the receptive field of the touch receptor neurons follow indentation more closely than force. This new finding suggests that controlling displacement and measuring body indentation will be the method of choice going forward. Table 1. Mechanical stimulation during electrical recording |Neuron||Stimulus||Amplitude (min-max)||Probe diameter||Citation| |PLM||Force||0.05-5 µN||10-20 µm||O'Hagan et al. 2005; Bounoutas et al., 2009; Arnadóttir et al., 2011| |PLM||Displacement||ns||ns||Kang et al. 2010| |CEP||Displacement||0.5-4 µm||ns||Kang et al. 2010| |PDE||Displacement||10 µm||ns||Li et al., 2011| |PVD||Displacement||20 µm||ns||Li et al., 2011| |ASH||Force||5 – 80 µN||20 µm||Geffeney et al., 2011| |ns = not specified| Table 2. Mechanical stimulation during calcium imaging |Neuron||Stimulus||Amplitude (max)||Probe diameter||Indicator||Citation| |ALM||Displacement||10 µm||15 µm, glass and platinum||Cameleon YC2.12 and YC2.13||Suzuki et al., 2003| |ASH||Displacement||ns||50 µm, glass||Cameleon YC2.12*†||Hilliard et al., 2005| |ASH||Displacement||8 µm||10 µm, glass||Cameleon YC2.12*||Kindt et al., 2007b| |OLQ||Displacement||8 µm||15 µm, glass||Cameleon YCD3||Kindt et al., 2007b| |ALM, PLM||Displacement||15 µm, glass||Cameleon YC3.12||Kindt et al., 2007a| |CEP||Displacement||10 µm, glass||Cameleon YC2.1||Kindt et al, 2007a| |ALM||Displacement||10 µm||ns||Cameleon, YC2.12||Chatzigeorgiou et al., 2010a| |ALM||Displacement||‘harsh’: 30-50 µm at 2.8 µm/s||‘sharp’ glass||Cameleon, YC3.12||Chatzigeorgiou et al., 2010b| |ALM||Displacement||‘gentle’: 10 µm||10 µm||Cameleon, YC3.12||Chatzigeorgiou et al., 2010b| |ALM||Displacement||6 μm||22 μm||GCaMP3||Chen and Chalfie, 2014| |PVD||Displacement||‘harsh’: 30-50 µm at 2.8 µm/s||‘sharp’ glass||Cameleon, YC2.3||Chatzigeorgiou et al., 2010b| |FLP||Displacement||Nose touch: 8 µm||ns||Cameleon, YC2.3†||Chatzigeorgiou et al., 2011| |FLP||Displacement||Body touch: 2 µm||ns||Cameleon, YC2.3||Chatzigeorgiou et al., 2011| |ns: not specificied; *pretreated with UV illumination for 60s: †imaged in the presence of 5 mM serotonin.| By contrast with the fibers used for classical behavioral assays, probes suitable for stimulation during electrophysiological or optical recordings are made from glass rods or capillaries. In a few instances, platinum wires have also been used. This is because worms are immobilized and immersed in physiological saline during cellular recordings and glass is stiff enough to move smoothly through aqueous solutions. To make a glass probe, use a pipette puller (e.g., Sutter P-97 or similar) to pull a glass rod (OD 1.0 mm or 1.5 mm) to a fine tip (ca. 1-2 μm in diameter). Next, use a microforge to fire polish the tip to create a large ball at the end of the rod. To deliver forces reliably, the probe must be softer than the worm. Conversely, to faithfully indent the worm, the probe should be at least as stiff as the worm. Wild type (N2) worms have a body stiffness of approximately ~1 N/m (Park et al., 2007; Park et al., 2011; Petzold et al., 2011; Petzold et al., 2013). (Note that stiffness depends on cuticle composition and muscle tone, since manipulations that alter these factors are known to both increase and decrease body stiffness (Park et al., 2007; Petzold et al., 2011; Petzold et al., 2013)). Several techniques have been reported in the literature that enable experimenters to control the timing and intensity of mechanical stimulation during electrical or optical recordings (Suzuki et al., 2003; O'Hagan et al., 2005; Kang et al. 2010; Chatzigeorgiou et al., 2010a; Chatzigeorgiou et al., 2010b; Chatzigeorgiou et al., 2011; Geffeney et al., 2011). They share the use of piezoelectric devices or motorized manipulators to generate controlled movements. A report by Hao et al. (2013) of piezoelectrical strategies for indenting cultured mammalian sensory neurons provides a useful overview of what is possible with today's technology. We measure force in units of newtons, but force is not measured directly. Whether the probe is crafted from nylon, glass or silicon, we infer force from a model and a measurement of another quantity related to force according to the model. The model behind the calibration procedure for von Frey hairs is called ‘Euler Buckling’ and, roughly speaking, it says that pushing a flexible fiber against a harder object causes the fiber to buckle, applying a force that depends on the length and thickness of the fiber. Once buckling has occurred, no additional force is delivered to the object. This is the principle behind calibrating a von Frey fiber by pressing it against the pan of an analytical balance, which measures mass. But mass still is not force and another model, namely the relationship between mass and the gravitational force, F = ma is needed to compute force. Note that the geometry of the procedure matters, the von Frey hair must be pushed against the object at a right angle and not brushed along its surface. The latter situation is ruled by a different and much more complex model. Hooke's law, F = -kx, is the model that describes how glass probes have been used to deliver force to worms (O'Hagan et al., 2005; Geffeney et al., 2011). In this model, the probe is like a spring attached to a solid surface and force, F, is inferred from, x, the displacement of the probe and its spring constant, k. So, in order to infer F, we need to measure x during each stimulation and determine k for each probe. The next section discusses procedures for making these measurements. Generally speaking, we apply a known force and measure the resulting displacement and use Hooke's law relating force to displacement to compute a spring constant, k. The simplest method for applying a known force is gravity: hang a known mass from the tip of the probe (F = ma, where a is the gravitational constant) and measure the resulting displacement. The known mass can be made from a short piece of metal wire (copper or gold) and the gravity-induced displacement can be measured by mounting the probe on a horizontal microscope such as the one integrated into certain microforges (e.g., Narishige). Once these measures are in place, the spring constant, k, is computed according to: kref = (m•a)/d Where, m is the wire's mass, a is the gravitational constant, and d is the displacement produced by the mass. A probe intended for experiments can be calibrated directly or indirectly, the choice depends on the range of spring constant needed to deliver the desired forces. The gentle touch receptor neurons detect forces between 10-8 and 10-6 N (O'Hagan et al., 2005), while the ASH nociceptor detects forces between 10-6 and 10-4 N (Geffeney et al., 2011). An indirect method was used for probes crafted to stimulate the TRNs. Briefly, O'Hagan et al. (2005) made a stiffer (higher spring constant) reference probe. The spring constant for the reference probe was calculated from Hooke's law after measuring the displacement produced by a known force applied by hanging a small mass (a length of fine copper or gold wire) from the end of the probe: The reference probe then provides a known force and is used to bend the stimulation probe while measuring the resulting displacement. This measurement has an error of at least 10%, which means that forces inferred from probe displacement cannot be more accurate than this. Geffeney et al. (2011) used an alternative indirect method in which the reference probe was a microelectromechanical systems (MEMS)-based force-sensor. The principle is the same, but, because the MEMS-based probe measures displacement directly and is calibrated with more precision, this alternative method is more accurate and precise. A simple method for measuring force probe displacement during electrical or optical recording is to collect videos of probe movement in free solution, dfree, and while being pressed against the side or nose of a worm, dstim. Next, measure dfree and dstim from the videos. O'Hagan et al. (2005) did this ‘by hand’ using ImageJ, while Geffeney et al. (2011) used Visible™ motion detection software (Reify Corporation) to make these measurements. The difference between dfree and dstim gives the distance that the probe was bent during contact with the worm. Next, calculate force from Hooke's Law: F = (dfree – dstim) kstim. MC was funded by NIH grant GM30997. MBG is funded by NIH grants NS047715 (MBG) and EB006745 (MBG and B. L. Pruitt). ACH is funded by NS055813. CHR is funded by an NSERC Discovery grant. Arnadóttir, J., O'Hagan, R,. Chen, Y., Goodman, M.B., and Chalfie, M. (2011). The DEG/ENaC protein MEC-10 regulates the transduction channel complex in Caenorhabditis elegans touch receptor neurons. J. Neurosci. 31, 12695–12704. Abstract Article Bargmann, C.I., Thomas, J.H., and Horvitz, H.R. (1990). Chemosensory cell function in the behavior and development of Caenorhabditis elegans. Cold Spring Harb. Symp. Quant. Biol. 55, 529–538. Abstract Article Chalfie, M., Sulston, J.E., White, J.G., Southgate, E., Thomson, J.N., and Brenner, S. (1985). The neural circuit for touch sensitivity in C. elegans. J. Neurosci. 5, 956–964. Abstract Chatzigeorgiou, M., Grundy, L., Kindt, K.S., Lee, W.H., Driscoll, M., and Schafer, W.R. (2010a). Spatial asymmetry in the mechanosensory phenotypes of the C. elegans DEG/ENaC gene mec-10. J. Neurophys. 104, 3334–3344. Abstract Article Chatzigeorgiou, M., Yoo, S., Watson, J.D., Lee, W.H., Spencer, W.C., Kindt, K.S., and Schafer, W.R. (2010b). Specific roles for DEG/ENaC and TRP channels in touch and thermosensation in C. elegans nociceptors. Nat. Neurosci. 13, 861–868. Abstract Article Chao, M.Y., Komatsu, H., Fukuto, H.S., Dionne, H.M., and Hart, A.C. (2004). Feeding status and serotonin rapidly and reversibly modulate a Caenorhabditis elegans chemosensory circuit. Proc. Natl. Acad. Sci. U. S. A. 101, 15512–15517. Abstract Article Croll, N.A. (1975). Components and patterns in the behavior of the nematode Caenorhabditis elegans. J. Zool. 176, 159–176. Article Croll, N.A., and Matthews, B.E. (1977). Biology of Nematodes (New York: John Wiley & Sons). Abstract Doll, J.C., Harjee, N., Klejwa, N., Kwon, R., Coulthard, S.M., Petzold, B., Goodman, M.B., and Pruitt, B.L. (2009) SU-8 force sensing pillar arrays for biological measurements. Lab Chip 9, 1449–1454. Abstract Article Geffeney, S.L, Cueva, J.G., Glauser, D.A., Doll, J.C., Lee, T.H., Montoya, M., Karania, S., Garakani, A.M., Pruitt, B.L., and Goodman, M.B. (2011). DEG/ENaC but not TRP channels are the major mechanoelectrical transduction channels in a C. elegans nociceptor. Neuron 71, 845–857. Abstract Article Ghanbari, A., Nock, V., Johari, S., Blaikie, R., Chen, X., and Wang, W. (2012). A micropillar-based on-chip system for continuous force measurement of C. elegans J. Micromech. Microeng. 22 095009 doi:10.1088/0960-1317/22/9/095009 Article Hart, A.C., Kass, J., Shapiro, J.E., and Kaplan, J.M. (1999). Distinct signaling pathways mediate touch and osmosensory responses in a polymodal sensory neuron. J. Neurosci. 19, 1952–1958. Abstract Hilliard, M.A., Bergamasco, C., Arbucci, S., Plasterk, R.H., and Bazzicalupo, P. (2004). Worms taste bitter: ASH neurons, QUI-1, GPA-3 and ODR-3 mediate quinine avoidance in Caenorhabditis elegans. EMBO J. 23, 1101–1111. Abstract Article Hobert, O., Moerman, D.G., Clark, K.A., Beckerle, M.C., and Ruvkun, G. (1999). A conserved LIM protein that affects muscular adherens junction integrity and mechanosensory function in Caenorhabditis elegans. J. Cell Biol. 144, 45–57. Abstract Article Husson, S.J., Steuer Costa, W., Schmitt, C., and Gottschalk, A. Keeping track of worm trackers (September 10, 2012), WormBook, ed. The C. elegans Research Community, WormBook, doi/10.1895/wormbook.1.156.1, http://www.wormbook.org. Kang, L., Gao, J., Schafer, W.R., Xie, Z., and Xu, X.Z. (2010). C. elegans TRP family protein TRP-4 is a pore-forming subunit of a native mechanotransduction channel. Neuron 67, 381–391. Abstract Article Kindt, K.S., Quast, K.B., Giles, A.C., Hendrey, D., Nicastro, I,. Rankin, C.H. and Schafer, W.R. (2007a). Dopamine mediates food dependent modulation of sensory plasticity in C. elegans. Neuron 55, 662–676. Abstract Article Kindt, K.S., Viswanath, V., Macpherson, L., Quast, K., Hu, H., Patapoutian, A., and Schafer, W.R. (2007b). Caenorhabditis elegans TRPA-1 functions in mechanosensation. Nat. Neurosci. 10, 568–577. Abstract Article Lee, H., Choi, M.K., Lee, D., Kim, H.S., Hwang H., Kim, H., Park, S., Paik, Y.K., and Lee, J. (2011). Nictation, a dispersal behavior of the nematode Caenorhabditis elegans, is regulated by IL2 neurons. Nat. Neurosci. 15, 107–112. Abstract Article Lee, R.Y., Sawin, E.R., Chalfie, M., Horvitz, H.R., and Avery, L. (1999). EAT-4, a homolog of a mammalian sodium-dependent inorganic phosphate cotransporter, is necessary for glutamatergic neurotransmission in Caenorhabditis elegans. J. Neurosci. 19, 159–167. Abstract Li, W., Kang, L., Piggott, B.J., Feng, Z., and Xu, X.Z. (2011). The neural circuits and sensory channels mediating harsh touch sensation in Caenorhabditis elegans. Nat. Commun. 2, 315. Abstract Article Petzold, B.C., Park, S.J., Mazzochette, E.A., Goodman, M.B., and Pruitt, B.L. (2013). MEMS-based force-clamp analysis of the role of body stiffness in C. elegans touch sensation. Integr. Biol. (Camb) 5, 853–864. Abstract Article Petzold, B.C., Park, S.J., Ponce, P., Roozeboom, C., Powell, C., Goodman, M.B., and Pruitt, B.L. (2011). Caenorhabditis elegans body mechanics are regulated by body wall muscle tone. Biophys. J. 100, 1977–1985. Abstract Article Sambongi, Y., Nagae, T., Liu, Y., Yoshimizu, T., Takeda, K., Wada, Y., and Futai, M. (1999). Sensing of cadmium and copper ions by externally exposed ADL, ASE, and ASH neurons elicits avoidance response in Caenorhabditis elegans. Neuroreport 10, 753–757. Abstract Article Sanyal, S., Wintle, R.F., Kindt, K.S., Nuttley, W.M., Arvan, R., Fitzmaurice, P., Bigras, E., Merz, D.C., Hébert, T.E., and Van Der Kooy, D. (2004). Dopamine modulates the plasticity of mechanosensory responses in Caenorhabditis elegans. EMBO J. 23, 473–482. Article Sawin, E.R., Ranganathan, R., and Horvitz, H.R. (2000). C. elegans locomotory rate is modulated by the environment through a dopaminergic pathway and by experience through a serotonergic pathway. Neuron 26, 619–631. Abstract Article Suzuki, H., Kerr, R., Bianchi, L., Frøkjaer-Jensen, C., Slone, D., Xue, J., Gerstbrein, B., Driscoll, M., and Schafer, W.R. (2003). In vivo imaging of C. elegans mechanosensory neurons demonstrates a specific role for the MEC-4 channel in the process of gentle touch sensation. Neuron 39, 1005–1017. Abstract Article Thomas, J.H. (1990). Genetic analysis of defecation in Caenorhabditis elegans. Genetics 124, 855–872. Abstract Timbers, T.A., Giles, A.C., Ardiel, E.A., Kerr, R.A., and Rankin, C.H. (2013). Intensity discrimination deficits cause habituation changes in middle-aged Caenorhabditis elegans, Neurobiol. Aging 34, 621–631. Abstract Article Way, J.C., and Chalfie, M. (1989). The mec-3 gene of Caenorhabditis elegans requires its own product for maintained expression and is expressed in three neuronal cell types. Genes Dev. 3, 1823–1833. Abstract Article Wicks, S.R., and Rankin, C.H. (1995). Integration of mechanosensory stimuli in Caenorhabditis elegans. J. Neurosci. 15, 2434–2444. Abstract Zhang, S., Arnadottir, J., Keller, C., Caldwell, G.A., Yao, C.A., and Chalfie, M. (2004). MEC-2 is recruited to the putative mechanosensory complex in C. elegans touch receptor neurons through its stomatin-like domain. Curr. Biol. 14, 1888–1896. Abstract Article *Edited by: Oliver Hobert Last revised: July 1, 2013. Published July 31, 2014. This chapter should be cited as: Chalfie M., et al. Assaying mechanosensation (July 31, 2014), WormBook, ed. The C. elegans Research Community, WormBook, doi/10.1895/wormbook.1.172.1, http://www.wormbook.org. Copyright: © 2014 Martin Chalfie, Anne C. Hart, Catharine H. Rankin and Miriam B. Goodman. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
<urn:uuid:adb5a21b-124c-4611-9c31-421e98f1f640>
CC-MAIN-2018-26
http://wormbook.org/chapters/www_amchnosensation/amchnosensation.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863206.9/warc/CC-MAIN-20180619212507-20180619232507-00213.warc.gz
en
0.879146
10,796
2.921875
3
Hi, I'm just trying to get my head around beta decay and would appreciate it if someone could correct me if I'm wrong. Beta minus decay involves the transformation of a neutron into a proton, electron and electron antineutrino. This is all mediated by the weak nuclear force and involves W and Z bosons. In the case of beta minus decay it involves a W- boson which is released when the neutron turns into a proton. The W- boson then rapidly decays into an electron and an antielectron neutrino. The mass of the products is less than the mass of the reactants which is explained by binding energy where the products (electrons and antineutrinos) have high kinetic energy which compensates for the missing mass. I just had a couple of questions: As I understand it, the neutron undergoes a quark flavor change which is why it transforms into a proton. What causes the flavor change? Is it the W- boson? Also, could someone clarify what is meant by a virtual particle? As I understand it, the term is somewhat arbitrary and refers to a particle that is very short lived, e.g. W- boson. Is the W- boson in beta minus decay a virtual particle? How do scientists prove virtual particles exist?
<urn:uuid:d6a3ff62-95e5-43f1-ba64-0e1d4a4372e8>
CC-MAIN-2018-13
https://www.physicsforums.com/threads/beta-minus-decay.783737/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648113.87/warc/CC-MAIN-20180323004957-20180323024957-00520.warc.gz
en
0.944962
271
2.953125
3
Negative Ions- the invisible healer. Negative ions enhance our mood, stimulate our senses, improve appetite and sexual drive, provide relief from hay fever, sinusitis, bronchial asthma, allergies, migraines, even post operative pain and burns. Negative ions stimulate the reticuloendothelial system which is a group of defense cells in our bodies which marshal our resistance to disease. Negative ions promote alpha brain waves and increased brain wave amplitude which results in a higher awareness level. The body is better able to absorb oxygen into the blood cells, oxidize serotonin and filter airborne contaminants. Normal ion counts in fresh country air is 2,000-4,000 negative ions per cubic centimeter. At a large water fall you might find over 100,000 negative ions. Polluted air such as in large cities might have less than 100 ions. The above pictures are of a highly energized negative ion state using our NEV technology. The brilliant greens and reds of the filter- Blend 2. The top is without the filter the bottom is with the filter applied. You might have noticed that you feel more refreshed near the ocean, a waterfall or even taking a shower. This is because all of these areas have a higher concentration of negative ions to positive ones. The ocean typically has 2000 negative ions and 1000 positive. The force or energy of the falling or splashing water causes splitting of neutral particles of air, freeing electrons which attach to other air molecules causing a negative charge. Indoor air also has concentrations of positive and negative ions just like the air outside. A well ventilated home will have similar concentrations of air ions as the outdoor air. Normal outdoor air (unless you are at the ocean or in the country) will have slightly more positive ions compared to negative ions. Indoor air can receive a higher negative ion count through simple things like showering or having a water source like an indoor fountain or a artificial negative ion generator. The air can also become positively charged or have an abundance of positive ions through pollution and static electricity in your home. Polluted air with a high particulate count of dust will become statically charged. This static charge will attract the negative ions subsequently depleting or absorbing them. The end result will be indoor air with a depleted supply of negative ions an an oversupply of positive ions. Static can also come from synthetic building materials, synthetic carpets, synthetic furniture, synthetic fabrics and clothing, plastics, urethane finishes, as well as EMF’s. All of these synthetic materials and objects will greatly upset the normal ion balance. Indoor air that has a higher concentration of positive ions can lead to Sick Building Syndrome or even symptoms usually associated with Seasonal Affective Disorder or the “winter blahs”. Studies suggest that air with a overall depleted ion count (positive and negative) or an abundance of positive ions and a lack of negative ions, does not promote a healthy environment and should be treated as polluted air. Again the top picture is without the filter, the bottom picture is with the filter applied. This is lifeless water in a back water, no life. It is actually detrimental to your energy field sitting close to this. There would be more positive ions than negative ions. Compare both pictures and you can clearly see the difference in energy patterns. Vivid bright compered to dull and patternless. Time in a healthy environment is the best medicine.
<urn:uuid:97ea79e3-2601-4c5b-b524-8d7ff8e8a46a>
CC-MAIN-2018-51
https://pranaviewaustralia.wordpress.com/2012/03/27/the-power-of-negative-ions-the-ocean-and-bodies-of-water/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376832559.95/warc/CC-MAIN-20181219151124-20181219173124-00072.warc.gz
en
0.92438
699
2.703125
3
Download a brochure explaining corneal collagen crosslinking Corneal collagen crosslinking is a relatively new procedure that aims to strengthen the cornea in order to slow or halt progression in keratoconus. It achieves this through a chemical reaction using a combination of riboflavin (vitamin B2) and ultraviolet (UVA) light to strengthen the crosslinks between the collagen fibres within the stroma layer of the cornea. It is currently the only procedure available that can slow or halt progressive keratoconus. Crosslinking may result in a slight flattening of the cornea, leading to small improvements in vision in certain cases. However patients should not expect a reversal in existing vision loss from crosslinking nor should it be considered a cure for keratoconus. Most patients in Australia with keratoconus are being treated today with crosslinking after being monitored for progression for a period of 3 to 6 months. Crosslinking should be done to only one eye at a time unless there are exceptional circumstances. Usually the worst eye (the one progressing fastest) is done first. Crosslinking cannot be performed on patients: - if their cornea is too thin (generally less than 350-400 microns) - with an active ocular disease other than keratoconus - with herpes simplex keratitis, a corneal infection caused by the herpes simplex virus (cold sore) - who are pregnant - with active, uncontrolled eye allergies - with corneal scarring that significantly affects their vision A variety of protocols are being used to perform crosslinking. The most widely adopted and extensively studied remains the Dresden protocol. Under the protocol, the epithelium (outer) layer of the cornea is removed. The eye is then soaked in riboflavin drops for about 30 minutes. Riboflavin acts a photosensitiser to create the reaction with the ultraviolet light and absorbs it to protect the endothelium layer of the cornea and the back of the eye from UV damage during the procedure. The cornea is then irradiated with ultraviolet A light for about 30 minutes. Riboflavin drops are inserted regularly during that stage. Other protocols being adopted today include the epithelium-on method which leaves the epithelium intact to lower the risk of infection and reduce the post-operative pain and healing period for the patient. Accelerated crosslinking involves the use of a stronger UVA source to deliver the same crosslinking effect in a shorter period of time. Crosslinking under the Dresden protocol appears to be safe and has a success rate of around 70-90% in stabilizing keratoconus, depending on the patient. Younger patients generally have more aggressive keratoconus and may progress again after a period of stabilization. There is less evidence on the safety and efficacy of the other protocols at this time. Crosslinking is also being done in combination with other procedures including laser refractive surgery and intracorneal rings. Crosslinking and children CXL is used less frequently in children and has been studied less than in adults. That being said some studies have performed CXL in children as young as 9 years old and have not found safety of the procedure to be any different from adults. However, how long CXL will last in children and side effects of the procedure are more uncertain than in adults. Although several studies have shown CXL to stop progression in a similar way to adults, some have found it is less effective with 1 in 4 children progressing despite CXL. Complications include hazing of vision which generally resolves within 12 months, corneal swelling (sometimes permanent), infections and sterile infiltrates or white spots on the cornea. Haze in the cornea is by the most common of these complications and 9 in every 100 patients still are experiencing haze that affects their vision after 12 months, according to some studies. In about 3 out of every 100 patients having crosslinking, these complications will cause a worsening in vision. In the rare cases in which scarring occurs, vision can be restored only by replacing the entire cornea via corneal transplantation. This is a major operation with more risks, long recovery and the chance of rejection at any time. Since May 1, 2018, Medicare is paying a benefit of up to $1,200 per eye for crosslinking. The rebate applies to crosslinking for patients with progressive keratoconus. Public patients should now be able to access the operation with no out-of-pocket expense. Private patients can expect to pay around AUS$2,500-$4,000 per eye for crosslinking. It is not yet clear what rebate private health insurers will offer on crosslinking. A referral from an optometrist (or GP) is required for an appointment with a corneal surgeon and preferably with a history of progression in the patient's keratoconus. Other things to know We urge all patients considering crosslinking to ask the following key questions to their corneal surgeon Is my eye suffering from progressive keratoconus? If so, what type of crosslinking are you proposing. Is it the Dresden protocol (the current gold standard based on randomized clinical studies) or some other protocol? What evidence is there to support the use of this protocol and what results have been achieved to date? Are you submitting your results to the Save Sight Keratoconus Registry which began operating in late 2015? If not, why not?
<urn:uuid:7a955234-39fb-42da-aded-70ea233ccc22>
CC-MAIN-2023-06
https://www.keratoconus.org.au/treatments/corneal-collagen-crosslinking/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494974.98/warc/CC-MAIN-20230127065356-20230127095356-00246.warc.gz
en
0.930226
1,173
2.671875
3
Method 1: Using Math.random() function: The Math.random() function is used to return a floating-point pseudo-random number between range [0,1) , 0 (inclusive) and 1 (exclusive). This random number can then be scaled according to the desired range. Example 1: This example generate an integer random number between 1(min) and 5(max). Random Number between 1 and 5: 1.0573617826058959 Example 2: This example generate random integer number between 1(min) and 100(max). Random Number between 1 and 100: 87 Example 3: This example generate random whole number between 1(min) and 10(max) both inclusive. Random Number between 1 and 10: 3
<urn:uuid:65ba41c4-9253-43a3-ac3b-527b8742e302>
CC-MAIN-2022-27
https://www.geeksforgeeks.org/how-to-generate-random-number-in-given-range-using-javascript/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103850139.45/warc/CC-MAIN-20220630153307-20220630183307-00313.warc.gz
en
0.707134
290
2.9375
3
BRUNSWICK, Ga. - Officials say three gravesites that had been lost to history for more than two centuries have been discovered at the site of a former middle school in Glynn County, near Georgia's coast. The Brunswick News reports that the discovery comes after much speculation that the area in Brunswick was part of a Colonial-era cemetery. Brunswick City Manager Bill Weeks and a public works department crew on Thursday unearthed evidence of at least three graves in what had once been known as Wright Square. Officials say workers didn't dig deep enough to expose any coffins, but archaeologist Fred Cook based his conclusion on the condition of the layer of dirt that was exposed and evidence of nails. Crews also found what appeared to be a bone and a casket handle. Copyright 2012 by The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
<urn:uuid:e88e82e5-5654-4dd2-90bb-206bbf045198>
CC-MAIN-2017-26
http://www.news4jax.com/news/local/crews-find-evidence-of-long-forgotten-cemetery-in-brunswick
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320261.6/warc/CC-MAIN-20170624115542-20170624135542-00144.warc.gz
en
0.978161
185
2.796875
3
Earth Day 2022: The pollution challenge On Friday, April 22, 2022, the world celebrated the Earth Day, an annual event by the United Nations, to among other things; demonstrate support for environmental protection, remind humanity that the Earth and its ecosystems provide us with life and sustenance, that the healthier our ecosystems are, the healthier the planet – and its people. And most importantly, reminds all that restoring our damaged ecosystems will help to end poverty, combat climate change and prevent mass extinction, but we will only succeed if everyone plays a part. The official theme for 2022 is Invest In Our Planet. First held on April 22, 1970, and includes a wide range of events coordinated globally, Earth Day was first observed in the United States when some 20 million people took to the streets to protest against the 1969 Santa Barbara oil spill. Since then, the occasion has played an important role in raising awareness of other environmental issues. In fact, the landmark Paris Agreement, which was signed by nearly 200 countries to set a common target to reduce global greenhouse emissions, was signed on Earth Day in 2016. Essentially, a feeling of confusion naturally comes flooding when one reflects on the environmental challenge in the Niger Delta region, a region according to the latest data from the National Oil Spill Detection and Response Agency (NOSDRA), that recorded a total of 4,486 cases of the oil spill, amounting to 242,193 barrels of oil, from 2015 to 2021. The reported figure of oil spill cases is equivalent to 38.5 million litres of crude loss, representing an average of about 62 cases and 3,362 barrels of oil spills in a month, per data from NOSDRA’s satellite website on April 16. Oil spillage as we know is the release of a liquid petroleum hydrocarbon or distilled products into the environment, especially the marine ecosystem. A typical example of, and freshest of such ordeal that comes to mind is the large scale oil spill at Benikrukru community, Warri-South Local Government Area of Delta State, in the early hours of February 17, 2021, from one of the major facilities of a multinational oil company operating in the community, resulting in deadly pollution, environmental degradation, and disruption of both fishing and farming activities in the community and adjourning villages. Qualifying this occurrence as a reality to worry about is the awareness that despite the excruciating pains that stemmed from the ugly development that the victims and the community have stoically endured, the Oil prospecting/production has neither provided relief materials to the affected individuals nor shown remorse for their failings and failures or deemed it necessary to take an active step to clean up of the affected areas through environmental remediation/upgrade. The community in a recent statement lamented that they expected the Oil giant to come up with a conceptualized remediation plan and proposal for compensation for affected individuals and communities. But contrary to that expectation, the Oil giant persistently, via series of statements/releases absolved itself of any wrongdoing-stating that the said spillage neither emanated from nor has anything to do with their facilities. This high level of crass corporate irresponsibility/rascality, the community added, continued until a Joint Investigation (JIV) was on April 2nd and 10th, 2022, carried out. The result established beyond reasonable doubt that the Oil Company’s facility installed in the year 1972, has recorded what the report described as two pin holes through which the crude oil was emptied into rivers and devastated the environment. The JIV team according to the report included but was not limited to; staff of the multinational Oil Company, representatives from the National Oil Detective And Response Agency (NOSDRA), staff of the Nigerian Upstream Regulatory Commission of the Ministry of Environment, Delta state, Commissioner for Oil and Gas, Delta state, and representatives of affected communities in Gbaramatu Kingdom. However, even as the JIV report ended the Company’s season of lies and established its culpability, the Oil Giant which prides itself as one of the best organizations in the country when it comes to Corporate Social Responsibility (CSR) has not bothered to provide the community with relief materials. And the world which has benefitted from their God-given natural resource especially the federal government of Nigeria has looked on while the people of the community suffer this form of hardship. In reality, there is in my view, no question that Benikrukru and of course Niger Delta region will continue to face such challenges as there is no end in sight to spillage and environmental pollution of the region. There are reasons that support this assertion. First is the frequency of spillage that occurs in the region. According to NOSRA latest report, Oil spill incidents occurred 921 times in 2015, resulting in a loss of 47,714 barrels of oil, the highest within the period under review. In 2016, 688 cases of oil spills occurred, culminating in a volume of 42,744 barrels of oil. In 2017 and 2018, 596 and 706 cases of oil spills occurred and resulted in the spillage of 34,887 and 27,985 barrels of oil, respectively. Oil spills occurred on 732 occasions, spewing 41,381 barrels of oil in 2019, and 455 cases were recorded in 2020 with 23,526 barrels of oil. In 2021, companies reported 388 incidents, resulting in 23,956 barrels of oil. The second reason has to do with weak/poor regulations/monitoring. In Nigeria, there are laid down principles guiding the handling of oil spills. For instance, oil spills should be closed off within 24 hours. But no operator can claim a clean hand when it comes to obeying such law in Nigeria and the regulatory agencies have never bothered to hold them accountable for such failures. Again, according to NOSDRA, oil companies are required to fund the clean-up of each spill and pay compensation to local communities affected, if the incident was the company’s fault. Yet, there exists no appreciable instance where such obligations to host communities have been obeyed. Thirdly is the government’s attitude of listening without being attentive to the hazards (both health and environmental) caused by crude oil exploration and production. This challenge is further fed by FG’s erroneous belief that so far the eggs are secured, the condition of the goose that laid the eggs becomes secondary and exacerbated by the government’s constant expression of more interest in promoting petroleum production, without giving symbolic attention to environmental protection process or any substantial action to environmental issues in the region. For the nation to enthrone a new order within the sector, the Federal Government must intervene and address Benikrukru community pollution challenge. Demonstration of such a new attitude will not only be characterized as rewarding to the community but illustrates FG’s newfound capacity to hold Oil companies in Nigeria accountable for their misdeeds. Until this is done, the majority of the oil companies operating in the Niger Delta region will continue to view the call for corporate responsibility as a dangerous fiction imposed upon the wealthy and powerful. And not even the recently enacted Petroleum Industry Act (PIA) will serve or save the region. Utomi is the programme coordinator (Media and Public Policy), Social and Economic Justice Advocacy (SEJA), Lagos. He could be reached via;firstname.lastname@example.org/08032725374.
<urn:uuid:33a49bf4-812a-477e-b45e-b6cc49937a8d>
CC-MAIN-2022-21
https://guardian.ng/opinion/earth-day-2022-the-pollution-challenge/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530553.34/warc/CC-MAIN-20220519235259-20220520025259-00752.warc.gz
en
0.955068
1,522
3.328125
3
Farm Horizons, May 2000 Tiling has its pros and cons By Andrea Vargo Does tiling a field to drain the wet areas make sense? This is a hot topic with farmers, government agencies, and environmental agencies. Farmers like Dean Terning of Cokato want to use all of their farmland to produce crops, and tiling the wet spots is a way to do that, he said. "There might, possibly, even be ducks in there, and that is "basically wasteland (for a farmer)," Terning said. Tiling helps farmers stay competitive in the world market, he said. Although he has never figured out the number of dollars each area can produce once it is tiled, he thought that (using a very wet piece of ground as an example) it might be around $50 per acre more than if it were not tiled. A wet spot could produce 20 to 30 bushels of corn per acre more, if it is tiled, Terning said. The tax base doesn't change on his land, whether it is tiled or not, so why not produce something on it, he added. The average farmer is trying to produce himself into prosperity, and Terning said it is a catch-22. As far as alternative uses of the wetlands are concerned, Terning said he has yet to see anyone standing at his door, checkbook in hand, to pay him to use his wetlands. A lot of the government programs look good only on the surface, he said. Terning said he will put in 10,000 to 20,000 feet of tile this year. Deron Ruesch of the Wright Soil and Water Conservation District and district conservationist for the United States Department of Agriculture (USDA), Natural Resources Conservation Service (NRCS) gave a little background on tiling. Farmers could tile what they wanted before 1985. That was the year the USDA came out with the National Food Security Act. It said that any producer receiving federal benefits has to follow several provisions. Highly erodible land and wetlands became an issue for producers in farm programs, he said. Now, anytime a farmer does something regarding tiling, the NRCS must review the property and determine if the area being tiled is a wetland, Ruesch said. Official word is if it is a wetland and a new tiling job, the answer is "no," he said. If it is an existing tile system, the farmer is allowed to maintain it to the exact original specifications. "Unfortunately, a lot of farmers don't even tell us they are tiling. If we find out a converted wetland exists, it is usually because someone has called us," Ruesch added. Farmers are doing the tiling on their own, and there are consequences, if they get caught. All the federal benefits received by the farmer since the tiling was done must be paid back to the government and the farmer is taken off the federal farm program, he explained. The only way to get back on the farm program list is to plug the ditch, rip out the tile, or restore another area to wetland. First of all, losing wetlands means losing wildlife habitat, Ruesch said. In addition, certain wetlands act as a ground water recharge area, and in dry years they act to replenish the ground water. Rainy years find wetlands acting as a sort of dam, holding back lots of heavy rains. Tile is a direct route that funnels manure and chemicals that attach to soils into the nearest county tile and then into the Mississippi River. Fence posts that are placed in the middle of fields generally point out the location of field tile. This affects everyone downstream, he said. One field in Wright County has 12 tile intakes, Ruesch said. Some tiling is beneficial and some is not. It is a very complicated process, he stated. SWCD is a free service to help farmers manage their property, he said. Compliance with the regulations is the job of the NRCS, and Ruesch said, "If both urban and rural landowners did a better job (of taking care of their land and the environment), I would be out of a job." Stories | Columns | Classifieds | Obituaries Community Guides | Special Topics | Cool Stuff | Search | Home Page
<urn:uuid:9f6b2ed1-6f73-4e21-ae9c-fe91613f2597>
CC-MAIN-2014-35
http://www.herald-journal.com/farmhorizons/1999/tiling.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919886.18/warc/CC-MAIN-20140909055002-00462-ip-10-180-136-8.ec2.internal.warc.gz
en
0.969141
920
2.640625
3
What To Do At Work, Home and School Preparing for an unexpected emergency allows you and your family to respond quickly to the threat or presence of an emergency. You should be prepared for an emergency whether you are at work, school, or at home. These plans should include emergency preparedness issues whether the family is together or in separate locations. Your plan should address: - Awareness: be informed of what is happening around you on a daily basis. At home or at work, keep a radio tuned to a local channel, which will allow you to hear weather advisories and breaking news. At school, students will have to depend on the school staff to keep them advised. Awareness also involves developing a plan so that one can respond to different emergency scenarios. - Response: putting your plan into action. Seeking shelter is normally your first action. No matter where you are you should know how to find shelter. At work or school the area for shelter will normally be designated for you. At home, your shelter area will depend on the threat and the level of protection you will need. It may vary from going to the lowest level of your home during a tornado warning, or to a sealed room in a biological or chemical attack. If you are out in public during an emergency you can go to a public place and ask for directions to the nearest shelter. - If your family is not all together, set up a phone contact person, and call that person to let them know who is with you and where you are. Get out your emergency kit and have it ready to use. Whether or not the emergency passes you by unscathed, the final phase of preparedness is always recovery. - Recovery is the process of returning your life to the way that it was before the emergency. It may be as simple as putting your emergency kit back in its place and continuing on with your daily activities or it may be more involved depending upon the impact of the emergency on your family. - Getting your family back together if they were separated during the emergency. Have a meeting place away from your neighborhood, such as a store or school. Establishing a meeting place will keep family members from having to search numerous possible places for each other and it will let you know for sure if a family member is missing which will help local authorities. - Replacing what was lost to the emergency. Your insurance agent can help you in this process. As part of your emergency planning, your agent can show you how to inventory your belongings and keep track of recovery costs. After an emergency, your agent can assist you in obtaining temporary housing, clothing, and food. - Recovering your state of well-being and security. This part may require the help of a mental health expert as well as support from family members and friends. For more information on emergency preparedness you can contact the Liberty Fire Department at 816-439-4310, the Missouri State Emergency Management Agency or Federal Emergency Management Agency (FEMA).
<urn:uuid:4a458924-34a6-4008-b897-37bea8285c17>
CC-MAIN-2019-39
https://www.libertymissouri.gov/2547/Emergency-Preparedness
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574058.75/warc/CC-MAIN-20190920175834-20190920201834-00355.warc.gz
en
0.963884
607
3.0625
3
PDF Download (2.1 MB) JIVE AND SWING by Harold & Meredith Sears A LITTLE HISTORY— It's hard to nail down the beginnings of most social phenomena. They don't begin abruptly. Instead, they gradually emerge or develop out of earlier phenomena. But it is probably safe to suggest that the social upheaval of World War I and the musical revolution of jazz were major factors in the development of the swinging, jivey, jitterbuggy dancing of the early part of the twentieth century. In 1926, the Savoy Ballroom opened in Harlem, and swing dancing acquired all sorts of lifts, flips, throws, and slides. In 1927, Charles Lindbergh made his famous flight or "hop" across the Atlantic and so provided the perfect name for this acrobatic and aerial style of dance. One story is that it was named the Lindy Hop by a Harlem dancer named "Shorty George" Snowden. You can see some of these "aerials" in Steven Spielberg’s 1979 movie, 1941, and there is some of the real thing in Public Television's History of Jazz.East Coast Swing, Jive, and Lindy are mostly triple rhythms. One figure pattern is 1, 2, 3/&, 4; 5/&, 6, over a measure and a half. You might rock and recover on the "1, 2" or walk two or "swivel, swivel." Then you might chassé, hitch, or "step/lock, step" through the two triples. Another common figure pattern is 1, 2, 3/&, 4; 1, 2, 3/&, 4; over two measures. This pattern is often called "whip timing" after the Whip Turn. You might rock, recover, chassé a triple; hook, unwind, and chassé a triple. Within these patterns and others, we turn, twirl, and spin in a variety of ways. West Coast Swing came along a little later—it evolved out of Lindy in the 1930s. It is a slower, smoother rhythm. It is the official state dance of California, and it dances well to slow blues or beach music. Where East Coast, Jive, and Lindy are circular dances in which the man and woman travel around each other, West Coast is a slot dance in which the woman dances up and down within a 3 X 6 foot rectangle on the dance floor. The man might block her movement and send her back, or he might get out of her way, let her pass, and then get back in the slot. It works particularly well on a crowded dance floor. All of these rhythms are mostly non-progressive and so keep you in one spot on the floor. A much more recent addition to the swing family is the Hustle, which had it roots in New York City in the early 1970s. It has been said that, in the '60s, the Twist all but destroyed ballroom dancing. No longer did the dancer need to learn steps or even have a partner. Then the Hustle came along and partner dancing was back. Dancers could touch. The Hustle was hugely popular. The word "hustle" makes this dance rhythm sound a lot faster and more frantic than it really is. The music is a pounding disco, but the tempo is slow—closer to West Coast Swing than to East Coast Swing or Jive. Hustle is light, smooth, and flat, a soft gliding back and forth in the slot, with the man moving gracefully out of the woman's way. There are a lot of changes of directions and turns and spins by both the woman and the man. She especially may get to feeling like a yo-yo, but a smooth and flowing yo-yo, not a jerky bouncy one. If you want to see what Hustle looks like, take a look at the movie, Saturday Night Fever. LEAD & FOLLOW— Leading and following in these swing rhythms comes much more through joined hands, rather than directly through the frame, as in the Smooth Rhythms. After all, you spend much less time in any kind of closed position and more time in an open facing position. However, a well-toned frame is still important. Keep your upper bodies relatively still, your shoulders parallel and horizontal, your arms not stiff but firmly toned. In this way, your body movements will be transmitted down your arms and to your partner. The lead will come from your frame but indirectly through the arms and hands. So, if you want your partner to move toward you, don't bend your arm and pull on her. Instead, step back with a toned upper body and so draw her toward you. Keep your hand connection low. Her center of gravity is at hip level, so movement directed there will move her body most effectively. If you aim a lead at a shoulder, only her shoulders will respond, not the whole body. Don't raise your handhold unless you want her to turn under. The characteristic swing handhold aids in this kind of lead and follow. The man holds his hand in front of his body with his palm toward himself, his thumb up, and his fingers pointing across his body (e.g., fingers of left hand pointing right). The woman holds her hand up so that her palm faces her partner. Her fingers are up and her thumb points across her body (e.g., her right thumb points to her left). She then curls her fingers over the ridge formed by his palm edge and forefinger, sort of like she's hanging onto a branch. As he steps back, his palm and fingers will pull on her fingers. As he steps forward, the back of his hand and fingers will push against her palm. His thumb will gently lie on the tops of her fingers and allow him to move her hand to the right or left. The lead flows from the leader's frame, through his arm and hand, into her hand, arm, and frame. JIVE / SWING— We may think more about Lindy, West Coast Swing, and Hustle at another time, but let's look at the more common rhythms now. In Round Dancing, we don't distinguish clearly between Swing and Jive. For the most part, we use International Jive figures, and we refer to the rhythm as "Jive," but we usually dance the figures to the slower Swing tempo (maybe 25–35 measures per minute), rather than to the faster Jive tempo (35–45 measures per minute). As we mentioned above, the dominant style is East Coast or triple swing. Many figures are written to span a measure and a half with a rock, recover, and two triples (1, 2, 3/&, 4; 1/&, 2, with the "&" taking 1/2 beat in Swing and more like 1/4 beat in Jive—more of an "a" than an "&"). The Link Rock is a common example. Another group of figures spans two measures with a one, two, and a triple; one, two, and a second triple. The Lindy Catch is a good example of this kind of timing. Within this rhythm, there are some interesting variations that are not common but are fun. Some of our Jives are written not as Triple Swing but as Single Swing. Here, each 6-count figure becomes, rock, recover, step, step (q,q,s,-; s,-,), four steps over the six beats of music. In essence, each triple chasse is replaced with a single slow step. Less common is "Double Swing" with six steps or actions over the six beats: rock L, recover R, press or tap L, step L; press or tap R, step R, (q,q,q,q; q,q,) (of course, the woman begins with her right foot and mirrors or dances the "natural opposite"). Almost all of our round dances are written as one rhythm, triple, double, or single, but it works perfectly well to use all three within one dance if the music tells you to do that. Once, we watched a dancer use some Double Swing in an otherwise normal Triple Jive. Moreover he replaced the "press" actions in the Double Swing with sharp, vertical kicks or points. He danced a rock, recover, kick, step; kick, step. More specifically, on beats 3 and 5, he raised the free knee, drawing that foot up along the supporting leg, and then kicked or stabbed straight down with a little recoil and even a slight bounce, all of that in just one beat (rock L, recover R, knee/stab L/recoil, step L; knee/stab R/recoil, step R). We haven't had the courage to actually try it, but it looked good. (We're referring to Tom Hicks and Betty Easterday dancing Sugarfoot Stomp at the Round-A-Rama Institute, August 2004, if you happen to have that video.) Again, we tend not to draw a sharp distinction between Swing and Jive, but there are a few recognizable "Jive characteristics." If you are dancing a Jive to music that is faster than average, try these features to make it look more "jivey" rather than "swingy" and to get through the choreography without wearing yourself out quite as much. 1. The music is making you speed the dance up, so make your steps smaller. Where a Swing would chassé, side/close, side, a Jive should chassé, in place/step, side. Dance more under your body. Travel less. Be tidy, efficient. 2. Jive has more knee action than Swing has. Instead of dancing your triples 1/a, 2, 3/a, 4; insert another little "a" count in front of each chassé and in that moment, lift the free knee and point that foot straight down, parallel to the supporting leg. Your chassé becomes knee/step/step, side, or a/1/a, 2. You might get a little of the feel of peddling a bicycle—lift one knee and press with the other foot. 3. Jive has a slight but somewhat sharp vertical bounce that you don't see in Swing. The Jive bounce is in the knees, not in the feet or ankles, and definitely not in the upper body and arms. Don't thrash about. As you raise one knee, straighten the supporting knee a little. As you step, soften that knee. These actions/reactions become a springiness that translates into small hops or scoots on the side steps. You might think that a bounce would demand more work, but it actually comes out of a natural resonance that you would have to work to control if you didn't want it, so using the Jive bounce is actually less tiring. 4. Jive has jumps and kicks, as well as bounce and hops. Use your knee for the kicks, too. Raise the knee, stab with a pointed foot toward the floor out in front, on a diagonal, or off to the side, and then bring the leg back to a bent knee as if it were on a spring. You might count a/1, a/2,—knee/point, knee/close, or knee/kick, recoil/close. 5. Jive engages the hips and the rib cage more than Swing does. As you chassé to the left, stretch the left side just a little, and as you take that third step, shift your hips to the left and stretch the right side a little. The stretch is not so much that it creates real sway—it's more of a straightening of the leading side and a little crunch to the trailing side. You'll feel something like a "step step side/hip/knee." Keep your shoulders and head still. Your frame should remain toned and steady, allowing your hips to shift within or under that frame. 6. The speed of Jive keeps you up on the balls of your feet and gives you a little more forward body poise. The authorities tell us that every step should be taken ball-flat, but the speed and the bounce don't really allow it, and it is primarily the first step of each chassé that is ball only. Dance "knee/ball/ball-flat, ball-flat, (a1a, 2,). You might think that the second "a" count is awfully short for a full "ball-flat" step, but if you just do a little scooting closing step, it can actually be ball-flat. All of this feels like a lot to remember. If you just think, put your heel down on every step except the first of each triple, then you only have to remember one thing. 7. During the "rock, recover" it looks nice and "jivey" to open the woman out a bit on the rock and then bring her back in on the recover. Maintain tone in the lead arms, and use just a little pressure out and in. Most of the lead in the Swing rhythms comes through the arms and hands. 8. Finally, the man leads the woman to open out, to rock, to swivel, but he does less of these actions than she does. For instance, during jive walks or swivel walks, she will open and close, swivel right and left. He will provide the firm foundation and the lead against which she will perform. (These points were demonstrated by Bill & Carol Goss at the URDC Convention in 2001; again, you might have that video.) From the the Dixie Round Dance Council (DRDC) Newsletter, April 2006. If you would like to read other articles on dance position, technique, styling, and specific dance rhythms, you may visit the article TOC. If you are not a member of DRDC, do consider joining. The group sponsors triquarterly weekends with great dancing and teaching, and the newsletter is one of the most informative available. Past DRDC Educational Articles archived here. Aditional articles and dance helps by Sandi & Dan Finch Gert-Jan & Susie Rotscheid (see Notebook) Go beyond this site. Find other references on our Sources and Links pages. Page last revised
<urn:uuid:77079064-cf18-4510-b3ca-38cc25a3e127>
CC-MAIN-2016-26
http://www.rounddancing.net/dance/articles/jiveswing.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398516.82/warc/CC-MAIN-20160624154958-00073-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956742
2,995
2.921875
3
Have you ever been watching a movie or been walking around San Jose at night and felt terrified. I know that I have, especially since stopping drinking and not having alcohol shut down my common sense. But it’s not quite that simple, as a study published Sunday in Nature Neuroscience demonstrates. One of the best ways to figure out how parts of the brain work is to study people who have damage in those specific areas. Take a patient known as SM, a middle-aged woman with a rare condition called Urbach-Wiethe disease that has damaged the amygdala on both sides of her brain. A few years ago, SM told Justin Feinstein, then a graduate student at the University of Iowa in Iowa City, that she’d never felt fear, even when she’d been confronted by a knife-wielding assailant. Feinstein put her claim to the test. His group had SM handle a snake, took her on a tour of a haunted house and showed her scenes from scary movies like The Shining. SM was unfazed. But another University of Iowa researcher, neuroscientist John Wemmie, had a different test for SM: breathing carbon dioxide. In people without brain damage, exposure to high levels of carbon dioxide evokes fear and a hunger for air. In some, it can even set off a panic attack. “The body is not so good at detecting low levels of oxygen but is really good at detecting high levels of carbon dioxide,” Wemmie says. And so Feinstein, Wemmie and their colleagues administered a new test to SM, along with a pair of twin sisters with similar brain lesions from the same rare disease. All three volunteers were exposed to high concentrations of the gas. The researchers thought that the patients would be insensitive to the test. “We were pretty shocked when exactly the opposite happened,” Wemmie says. A few seconds after inhaling the gas, SM started to wave her hand towards the mask covering her face, crying “help me!” to a nearby experimenter. After the mask was removed, SM’s skin was flushed, her nostrils flared and her eyes were wide open. When asked about the emotions the experience caused, SM replied: “Panic mostly, ’cause I didn’t know what the hell was going on.” The other two patients had similar panic attacks, saying they felt like they were suffocating. One even named her feeling as “fear.” “All the patients found the experience highly aversive, and none of them found it pleasurable in a way that they’d want to do it again,” says Feinstein, now a postdoctoral researcher at the California Institute of Technology. “This is interesting because it shows that the loss of the amygdala does not prevent [these patients] from experiencing fear altogether,” says Caltech neurobiologist and Howard Hughes Medical Institute investigator David Anderson, who wasn’t involved in the study. However, he notes, other studies have found that some patients with a damaged amygdala are capable of being afraid. “There is more to fear than just the amygdala,” he says. Feinstein thinks that the fear induced internally by carbon dioxide may be processed differently in the brain than the fear caused by an outside source like a scary movie. It may be that learned fears and innate ones are handled differently. “We’re still learning a lot about how the brain processes fear,” he says, “and what this finding suggests is we still have a long way to go.” by SARAH ZIELINSKI, NPR.com
<urn:uuid:f26bc8c6-921e-4219-a345-a499e6ab694b>
CC-MAIN-2018-47
https://www.costaricantimes.com/what-makes-you-feel-fear/11481
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743282.69/warc/CC-MAIN-20181117040838-20181117062838-00136.warc.gz
en
0.969256
764
3.078125
3
A team of researchers in Japan has discovered a gigantic streak structure in the cloud tops of Venus. The discovery is based on observations of Venus by the Japanese spacecraft Akatsuki. The findings were published in January 9th in the journal Nature Communications. Venus is unlike any other planet in the Solar System. The entire planet is shrouded in thick clouds of sulfuric acid between altitudes of 45 km to 70 km. This thick shroud has prevented scientists from studying Earth’s so-called “sister planet” in detail. But Japanese researchers are making progress. In the coming decades, NASA and other space agencies hope to mount some ambitious missions to other planets in our Solar System. In addition to studying Mars and the outer Solar System in greater detail, NASA intends to send a mission to Venus to learn more about the planet’s past. This will include studying Venus’ upper atmosphere to determine if the planet once had liquid water (and maybe even life) on its surface. In order to tackle this daunting challenge, NASA recently partnered with Black Swift Technologies – a Boulder-based company specializing in unmanned aerial systems (UAS) – to build a drone that could survive in Venus’ upper atmosphere. This will be no easy task, but if their designs should prove equal to the task, NASA will be awarding the company a lucrative contract for a Venus aerial drone. In recent years, NASA has taken a renewed interest in Venus, thanks to climate models that have indicated that it (much like Mars) may have also had liquid water on its surface at one time. This would have likely consisted of a shallow ocean that covered much of the planet’s surface roughly 2 billion years ago, before the planet suffered a runaway Greenhouse Effect that left it the hot and hellish world it is today. In addition, a recent study – which included scientists from NASA’s Ames Research Center and Jet Propulsion Laboratory – indicated that there could be microbial life in Venus’ cloud tops. As such, there is considerable motivation to send aerial platforms to Venus that would be capable of studying Venus’ cloud tops and determining if there are any traces of organic life or indications of the planet’s past surface water there. As Jack Elston, the co-founded of Black Swift Technologies, explained in an interview with the Daily Camera: “They’re looking for vehicles to explore just above the cloud layer. The pressure and temperatures are similar to what you’d find on Earth, so it could be a good environment for looking for evidence of life. The winds in the upper atmosphere of Venus are incredibly strong, which creates design challenge.” To meet this challenge, the company intends to create a drone that will use these strong winds to keep the craft aloft while reducing the amount of electricity it needs. So far, NASA has awarded an initial six-month contract to the company to design a drone and provided specifications on what it needs. This contract included a $125,000 grant by the federal governments’ Small Business Innovation Research program. This program aims to encourage “domestic small businesses to engage in Federal Research/Research and Development (R/R&D) that has the potential for commercialization.” The company hopes to use some of this grant money to take on more staff and build a drone that NASA would be confident about sending int Venus’ upper atmosphere, where conditions are particularly challenging. As Elston explained to Universe Today via email, these challenges represent an opportunity for innovation: “Our project centers around a unique aircraft and method for harvesting energy from Venus’s upper atmosphere that doesn’t require additional sources of energy for propulsion. Our experience working on unmanned aircraft systems that interact with severe convective storms on Earth will hopefully provide a valuable contribution to the ongoing discussion for how best to explore this turbulent environment. Additionally, the work we do will help inform better designs of our own aircraft and should lead to longer observation times and more robust aircraft to observe everything from volcanic plumes to hurricanes.” At the end of the six month period, Black Swift will present its concept to NASA for approval. “If they like what we’ve come up with, they’ll fund another two-year project to build prototypes,” said Elston. “That second-phase contract is expected to be worth $750,000.” This is not the first time that Black Swift has partnered with NASA to created unmanned aerial vehicles to study harsh environments. Last year, the company was awarded a second phase contract worth $875,000 to build a drone that could monitor the temperature, gas levels, winds and pressure levels inside the volcanoes of Costa Rica. After a series of test flights, the drone is expected to be deployed to Hawaii, where it will study the geothermal activity occurring there. All of these missions aim to reach Venus and brave its harsh conditions in order to determine whether or not “Earth’s Sister Planet” was once a more habitable planet, and how it evolved over time to become the hot and hellish place it is today. Venus’ atmosphere is as mysterious as it is dense and scorching. For generations, scientists have sought to study it using ground-based telescopes, orbital missions, and the occasional atmospheric probe. And in 2006, the ESA’s Venus Express mission became the first probe to conduct long-term observations of the planet’s atmosphere, which revealed much about its dynamics. Using this data, a team of international scientists – led by researchers from the Japan Aerospace and Exploration Agency (JAXA) – recently conducted a study that characterized the wind and upper cloud patterns on the night side of Venus. In addition to being the first of its kind, this study also revealed that the atmosphere behaves differently on the night side, which was unexpected. The study, titled “Stationary Waves and Slowly Moving Features in the Night Upper Clouds of Venus“, recently appeared in the scientific journal Nature Astronomy. Led by Javier Peralta, the International Top Young Fellow of JAXA, the team consulted data obtained by Venus Express’ suite of scientific instruments in order to study the planet’s previously-unseen cloud types, morphologies, and dynamics. Whereas plenty of studies have been conducted of Venus’ atmosphere from soace, this was the first time that a study was not focused on the dayside of the planet. As Dr. Peralta explained in an ESA press statement: “This is the first time we’ve been able to characterize how the atmosphere circulates on the night side of Venus on a global scale. While the atmospheric circulation on the planet’s dayside has been extensively explored, there was still much to discover about the night side. We found that the cloud patterns there are different to those on the dayside, and influenced by Venus’ topography.“ Since the 1960s, astronomers have been aware that Venus’ atmosphere behaves much differently that those of other terrestrial planets. Whereas Earth and Mars have atmospheres that co-rotate at approximately the same speed as the planet, Venus’ atmosphere can reach speeds of more than 360 km/h (224 mph). So while the planet takes 243 days to rotate once on its axis, the atmosphere takes only 4 days. This phenomena, known as “super-rotation”, essentially means that the atmosphere moves over 60 times faster than the planet itself. In addition, measurements in the past have shown that the fastest clouds are located at the upper cloud level, 65 to 72 km (40 to 45 mi) above the surface. Despite decades of study, atmospheric models have been unable to reproduce super-rotation, which indicated that some of the mechanics were unknown. “We focused on the night side because it had been poorly explored; we can see the upper clouds on the planet’s night side via their thermal emission, but it’s been difficult to observe them properly because the contrast in our infrared images was too low to pick up enough detail.” This consisted of observing Venus’ night side clouds with the probe’s Visible and Infrared Thermal Imaging Spectrometer (VIRTIS). The instrument gathered hundreds of images simultaneously and different wavelengths, which the team then combined to improve the visibility of the clouds. This allowed the team to see them properly for the first time, and also revealed some unexpected things about Venus’ night side atmosphere. What they saw was that atmospheric rotation appeared to be more chaotic on the night side than what has been observed in the past on the dayside. The upper clouds also formed different shapes and morphologies – i.e. large, wavy, patchy, irregular and filament-like patterns – and were dominated by stationary waves, where two waves moving in opposite directions cancel each other out and create a static weather pattern. The 3D properties of these stationary waves were also obtained by combining VIRTIS data with radio-science data from the Venus Radio Science experiment (VeRa). Naturally, the team was surprised to find these kinds of atmospheric behaviors since they were inconsistent with what has been routinely observed on the dayside. Moreover, they contradict the best models for explaining the dynamics of Venus’ atmosphere. Known as Global Circulation Models (GCMs), these models predict that on Venus, super-rotation would occur in much the same way on both the dayside and the night side. What’s more, they noticed that stationary waves on the night side appeared to coincide with high-elevation features. As Agustin Sánchez-Lavega, a researcher from the University del País Vasco and a co-author on the paper, explained: “Stationary waves are probably what we’d call gravity waves–in other words, rising waves generated lower in Venus’ atmosphere that appear not to move with the planet’s rotation. These waves are concentrated over steep, mountainous areas of Venus; this suggests that the planet’s topography is affecting what happens way up above in the clouds.“ This is not the first time that scientists have spotted a possible link between Venus’ topography and its atmospheric motion. Last year, a team of European astronomers produced a study that showed how weather patterns and rising waves on the dayside appeared to be directly connected to topographical features. These findings were based on UV images taken by the Venus Monitoring Camera (VMC) on board the Venus Express. Finding something similar happening on the night side was something of a surprise, until they realized they weren’t the only ones to spot them. As Peralta indicated: “It was an exciting moment when we realized that some of the cloud features in the VIRTIS images didn’t move along with the atmosphere. We had a long debate about whether the results were real–until we realised that another team, led by co-author Dr. Kouyama, had also independently discovered stationary clouds on the night side using NASA’s Infrared Telescope Facility (IRTF) in Hawaii! Our findings were confirmed when JAXA’s Akatsuki spacecraft was inserted into orbit around Venus and immediately spotted the biggest stationary wave ever observed in the Solar System on Venus’ dayside.“ These findings also challenge existing models of stationary waves, which are expected to form from the interaction of surface wind and high-elevation surface features. However, previous measurements conducted by the Soviet-era Venera landers have indicated that surface winds might too weak for this to happen on Venus. In addition, the southern hemisphere, which the team observed for their study, is quite low in elevation. And as Ricardo Hueso of the University of the Basque Country (and a co-author on the paper) indicated, they did not detect corresponding stationary waves in the lower cloud levels. “We expected to find these waves in the lower levels because we see them in the upper levels, and we thought that they rose up through the cloud from the surface,” he said. “It’s an unexpected result for sure, and we’ll all need to revisit our models of Venus to explore its meaning.” From this information, it seems that topography and elevation are linked when it comes to Venus’ atmospheric behavior, but not consistently. So the standing waves observed on Venus’ night side may be the result of some other undetected mechanism at work. Alas, it seems that Venus’ atmosphere – in particular, the key aspect of super-rotation – still has some mysteries for us. The study also demonstrated the effectiveness of combining data from multiple sources to get a more detailed picture of a planet’s dynamics. With further improvements in instrumentation and data-sharing (and perhaps another mission or two to the surface) we can expect to get a clearer picture of what is powering Venus’ atmospheric dynamics before long. With a little luck, there may yet come a day when we can model the atmosphere of Venus and predict its weather patterns as accurately as we do those of Earth. As the morning star, the evening star, and the brightest natural object in the sky (after the Moon), human beings have been aware of Venus since time immemorial. Even though it would be many thousands of years before it was recognized as being a planet, its has been a part of human culture since the beginning of recorded history. Because of this, the planet has played a vital role in the mythology and astrological systems of countless peoples. With the dawn of the modern age, interest in Venus has grown, and observations made about its position in the sky, changes in appearance, and similar characteristics to Earth have taught us much about our Solar System. Size, Mass, and Orbit: Because of its similar size, mass, proximity to the Sun, and composition, Venus is often referred to as Earth’s “sister planet”. With a mass of 4.8676×1024 kg, a surface area of 4.60 x 108 km², and a volume of 9.28×1011 km3, Venus is 81.5% as massive as Earth, and has 90% of its surface area and 86.6% of its volume. Venus orbits the Sun at an average distance of about 0.72 AU (108,000,000 km/67,000,000 mi) with almost no eccentricity. In fact, with its farthest orbit (aphelion) of 0.728 AU (108,939,000 km) and closest orbit (perihelion) of 0.718 AU (107,477,000 km), it has the most circular orbit of any planet in the Solar System. When Venus lies between Earth and the Sun, a position known as inferior conjunction, it makes the closest approach to Earth of any planet, at an average distance of 41 million km (making it the closest planet to Earth). This takes place, on average, once every 584 days. The planet completes an orbit around the Sun every 224.65 days, meaning that a year on Venus is 61.5% as long as a year on Earth. Unlike most other planets in the Solar System, which rotate on their axes in an counter-clockwise direction, Venus rotates clockwise (called “retrograde” rotation). It also rotates very slowly, taking 243 Earth days to complete a single rotation. This is not only the slowest rotation period of any planet, it also means that a sidereal day on Venus lasts longer than a Venusian year. Composition and Surface Features: Little direct information is available on the internal structure of Venus. However, based on its similarities in mass and density to Earth, scientists believe that they share a similar internal structure – a core, mantle, and crust. Like that of Earth, the Venusian core is believed to be at least be partially liquid because the two planets have been cooling at about the same rate. One difference between the two planets is the lack of evidence for plate tectonics, which could be due to its crust being too strong to subduct without water to make it less viscous. This results in reduced heat loss from the planet, preventing it from cooling and the possibility that internal heat is lost in periodic major resurfacing events. This is also suggested as a possible reason for why Venus has no internally generated magnetic field. Venus’ surface appears to have been shaped by extensive volcanic activity. Venus also has several times as many volcanoes as Earth, and has 167 large volcanoes that are over 100 km across. The presence of these volcanoes is due to the lack of plate tectonics, which results in an older, more preserved crust. Whereas Earth’s oceanic crust is subject to subduction at its plate boundaries, and is on average ~100 million years old, the Venusian surface is estimated to be 300-600 million years of age. There are indications that volcanic activity may be ongoing on Venus. Missions performed by the Soviet space program in 1970s and more recently by the European Space Agency have detected lightning storms in Venus’ atmosphere. Since Venus does not experience rainfall (except in the form of sulfuric acid), it has been theorized that the lightning is being caused by a volcanic eruption. Other evidence is the periodic rise and fall of sulfur dioxide concentrations in the atmosphere, which could be the result of periodic, large volcanic eruptions. And finally, localized infrared hot spots (likely to be in the range of 800 – 1100 K) have appeared on the surface, which could represent lava freshly released by volcanic eruptions. The preservation of Venus’ surface is also responsible for its impact craters, which are impeccably preserved. Almost a thousand craters exist, which are evenly distributed across the surface and range from 3 km to 280 km in diameter. No craters smaller than 3 km exist because of the effect the dense atmosphere has on incoming objects. Essentially, objects with less than a certain amount of kinetic energy are slowed down so much by the atmosphere that they do not create an impact crater. And incoming projectiles less than 50 meters in diameter will fragment and burn up in the atmosphere before reaching the ground. Atmosphere and Climate: Surface observations of Venus have been difficult in the past, due to its extremely dense atmosphere, which is composed primarily of carbon dioxide with a small amount of nitrogen. At 92 bar (9.2 MPa), the atmospheric mass is 93 times that of Earth’s atmosphere and the pressure at the planet’s surface is about 92 times that at Earth’s surface. Venus is also the hottest planet in our Solar System, with a mean surface temperature of 735 K (462 °C/863.6 °F). This is due to the CO²-rich atmosphere which, along with thick clouds of sulfur dioxide, generates the strongest greenhouse effect in the Solar System. Above the dense CO² layer, thick clouds consisting mainly of sulfur dioxide and sulfuric acid droplets scatter about 90% of the sunlight back into space. The surface of Venus is effectively isothermal, which means that their is virtually no variation in Venus’ surface temperature between day and night, or the equator and the poles. The planet’s minute axial tilt – less than 3° compared to Earth’s 23° – also minimizes seasonal temperature variation. The only appreciable variation in temperature occurs with altitude. The highest point on Venus, Maxwell Montes, is therefore the coolest point on the planet, with a temperature of about 655 K (380 °C) and an atmospheric pressure of about 4.5 MPa (45 bar). Another common phenomena is Venus’ strong winds, which reach speeds of up to 85 m/s (300 km/h; 186.4 mph) at the cloud tops and circle the planet every four to five Earth days. At this speed, these winds move up to 60 times the speed of the planet’s rotation, whereas Earth’s fastest winds are only 10-20% of the planet’s rotational speed. Venus flybys have also indicated that its dense clouds are capable of producing lightning, much like the clouds on Earth. Their intermittent appearance indicates a pattern associated with weather activity, and the lightning rate is at least half of that on Earth. Although ancients peoples knew about Venus, some of the cultures thought it was two separate celestial objects – the evening star and the morning star. Although the Babylonians realized that these two “stars” were in fact the same object – as indicated in the Venus tablet of Ammisaduqa, dated 1581 BCE – it was not until the 6th century BCE that this became a common scientific understanding. Many cultures have identified the planet with their respective goddess of love and beauty. Venus is the Roman name for the goddess of love, while the Babylonians named it Ishtar and the Greeks called it Aphrodite. The Romans also designated the morning aspect of Venus Lucifer (literally “Light-Bringer”) and the evening aspect as Vesper (“evening”, “supper”, “west”), both of which were literal translations of the respective Greek names (Phosphorus and Hesperus). The transit of Venus in front of the Sun was first observed in 1032 by the Persian astronomer Avicenna, who concluded that Venus is closer to Earth than the Sun. In the 12th century, the Andalusian astronomer Ibn Bajjah observed two black spots in front of the sun, which were later identified as the transits of Venus and Mercury by Iranian astronomer Qotb al-Din Shirazi in the 13th century. By the early 17th century, the transit of Venus was observed by English astronomer Jeremiah Horrocks on December 4th, 1639, from his home. William Crabtree, a fellow English astronomer and friend of Horrocks’, observed the transit at the same time, also from his home. When the Galileo Galilei first observed the planet in the early 17th century, he found it showed phases like the Moon, varying from crescent to gibbous to full, and vice versa. This behavior, which could only be possible if Venus’ orbited the Sun, became part of Galileo’s challenge to the Ptolemaic geocentric model and his advocacy of the Copernican heliocentric model. The atmosphere of Venus was discovered in 1761 by Russian polymath Mikhail Lomonosov, and then observed in 1790 by German astronomer Johann Schröter. Schröter found when the planet was a thin crescent, the cusps extended through more than 180°. He correctly surmised this was due to the scattering of sunlight in a dense atmosphere. In December 1866, American astronomer Chester Smith Lyman made observations of Venus from the Yale Observatory, where he was on the board of managers. While observing the planet, he spotted a complete ring of light around the dark side of the planet when it was at inferior conjunction, providing further evidence for an atmosphere. Little else was discovered about Venus until the 20th century, when the development of spectroscopic, radar, and ultraviolet observations made it possible to scan the surface. The first UV observations were carried out in the 1920s, when Frank E. Ross found that UV photographs revealed considerable detail, which appeared to be the result of a dense, yellow lower atmosphere with high cirrus clouds above it. Spectroscopic observations in the early 20th century also gave the first clues about the Venusian rotation. Vesto Slipher tried to measure the Doppler shift of light from Venus. After finding that he could not detect any rotation, he surmised the planet must have a very long rotation period. Later work in the 1950s showed the rotation was retrograde. Radar observations of Venus were first carried out in the 1960s, and provided the first measurements of the rotation period, which were close to the modern value. Radar observations in the 1970s, using the radio telescope at the Arecibo Observatory in Puerto Rico revealed details of the Venusian surface for the first time – such as the presence of the Maxwell Montes mountains. Exploration of Venus: The first attempts to explore Venus were mounted by the Soviets in the 1960s through the Venera Program. The first spacecraft, Venera-1 (also known in the west as Sputnik-8) was launched on February 12th, 1961. However, contact was lost seven days into the mission when the probe was about 2 million km from Earth. By mid-may, it was estimated that the probe had passed within 100,000 km (62,000 miles) of Venus. The United States launched the Mariner 1 probe on July 22nd, 1962, with the intent of conducting a Venus flyby; but here too, contact was lost during launch. The Mariner 2 mission, which launched on December 14th, 1962, became the first successful interplanetary mission and passed within 34,833 km (21,644 mi) of Venus’ surface. Its observations confirmed earlier ground-based observations which indicated that though the cloud tops were cool, the surface was extremely hot – at least 425 °C (797 °F). This put an end all speculation that the planet might harbor life. Mariner 2 also obtained improved estimates of Venus’s mass, but was unable to detect either a magnetic field or radiation belts. The Venera-3 spacecraft was the Soviets second attempt to reach Venus, and their first attempted to place a lander on the planet’s surface. The spacecraft cash-landed on Venus on March 1st, 1966, and was the first man-made object to enter the atmosphere and strike the surface of another planet. Unfortunately, its communication system failed before it was able to return any planetary data. On October 18th, 1967, the Soviets tried again with the Venera-4 spacecraft. After reaching the planet, the probe successfully entered the atmosphere and began studying the atmosphere. In addition to noting the prevalence of carbon dioxide (90-95%), it measured temperatures in excess of what Mariner 2 observed, reaching almost 500 °C. Due to the thickness of Venus’ atmosphere, the probe descended slower than anticipated, and its batteries ran out after 93 minutes when the probe was still 24.96 km from the surface. One day later, on October 19th, 1967, Mariner 5 conducted a fly-by at a distance of less than 4000 km above the cloud tops. Originally built as a backup for the Mars-bound Mariner 4, the probe was refitted for a Venus mission after Venera-4‘s success. The probe managed to collect information on the composition, pressure and density of the Venusian atmosphere, which was then analyzed alongside the Venera-4 data by a Soviet-American science team during a series of symposiums. Venera-5 and Venera-6 were launched in January of 1969, and reached Venus on 16th and 17th of May. Taking into account the extreme density and pressure of Venus’ atmosphere, these probes were able to achieve a faster descent and reached an altitude of 20 km before being crushed – but not before returning over 50 minutes of atmospheric data. The Venera-7 was built with the intent of returning data from the planet’s surface, and was construed with a reinforced descent module capable of withstanding intense pressure. While entering the atmosphere on December 15th, 1970, the probe crashed on the surface, apparently due to a ripped parachute. Luckily, it managed to return 23 minutes of temperature data and the first telemetry from the another planet’s surface before going offline. The Soviets launched three more Venera probes between 1972 and 1975. The first landed on Venus on July 22nd, 1972, and managed to transmit data for 50 minutes. Venera-9 and 10 – which entered Venus’ atmosphere on October 22nd and October 25th, 1975, respectively – both managed to send back images of Venus’ surface, the first images ever taken of another planet’s landscape. On November 3rd, 1973, the United States had sent the Mariner 10probe on a gravitational slingshot trajectory past Venus on its way to Mercury. By February 5th, 1974, the probe passed within 5790 km of Venus, returning over 4000 photographs. The images, which were the best to date, showed the planet to be almost featureless in visible light; but revealed never-before-seen details about the clouds in ultraviolet light. By the late seventies, NASA commenced the Pioneer Venus Project, which consisted of two separate missions. The first was the Pioneer Venus Orbiter, which inserted into an elliptical orbit around Venus on December 4th, 1978, where it studied its atmosphere and mapped the surface for a period of 13 days. The second, the Pioneer Venus Multiprobe, released a total of four probes which entered the atmosphere on December 9th, 1978, returning data on its composition, winds and heat fluxes. Four more Venera lander missions took place between the late 70s and early 80s. Venera 11 and Venera 12 detected Venusian electrical storms; and Venera 13 andVenera 14 landed on the planet on March 1st and 5th, 1982, returning the first color photographs of the surface. The Venera program came to a close in October 1983, when Venera 15 and Venera 16 were placed in orbit to conduct mapping of the Venusian terrain with synthetic aperture radar. In 1985, the Soviets participated in a collaborative venture with several European states to launch the Vega Program. This two-spacecraft initiative was intended to take advantage of the appearance of Halley’s Comet in the inner Solar System, and combine a mission to it with a flyby of Venus. While en route to Halley on June 11th and 15th, the two Vega spacecraft dropped Venera-style probes supported by balloons into the upper atmosphere – which discovered that it was more turbulent than previously estimated, and subject to high winds and powerful convection cells. NASA’s Magellan spacecraft was launched on May 4th, 1989, with a mission to map the surface of Venus with radar. In the course of its four and a half year mission, Magellan provided the most high-resolution images to date of the planet and was able to map 98% of the surface and 95% of its gravity field. In 1994, at the end of its mission, Magellan was sent to its destruction into the atmosphere of Venus to quantify its density. Venus was observed by the Galileo and Cassini spacecraft during flybys on their respective missions to the outer planets, but Magellan was the last dedicated mission to Venus for over a decade. It was not until October of 2006 and June of 2007 that the MESSENGER probe would conduct a flyby of Venus (and collect data) in order to slow its trajectory for an eventual orbital insertion of Mercury. The Japan Aerospace Exploration Agency (JAXA) devised a Venus orbiter – Akatsuki (formerly “Planet-C”) – to conduct surface imaging with an infrared camera, studies on Venus’ lightning, and to determine the existence of current volcanism. The craft was launched on May 20th, 2010, but the craft failed to enter orbit in December 2010. Its main engine is still offline, but its controllers will attempt to use its small attitude control thrusters to make another orbital insertion attempt on December 7th, 2015. In late 2013, NASA launched the Venus Spectral Rocket Experiment, a sub-orbital space telescope. This experimented is intended to conduct ultraviolet light studies of Venus’s atmosphere, for the purpose of learning more about the history of water on Venus. The European Space Agency’s (ESA) BepiColombo mission, which will launch in January 2017, will perform two flybys of Venus before it reaches Mercury orbit in 2020. NASA will launch the Solar Probe Plusin 2018, which will perform seven Venus flybys during its six-year mission to study the Sun. Under its New Frontiers Program, NASA has proposed mounting a lander mission to Venus called the Venus In-Situ Explorer by 2022. The purpose will be to study Venus’ surface conditions and investigate the elemental and mineralogical features of the regolith. The probe would be equipped with a core sampler to drill into the surface and study pristine rock samples not weathered by the harsh surface conditions. The Venera-D spacecraft is a proposed Russian space probe to Venus, which is scheduled to be launched around 2024. This mission will conduct remote-sensing observations around the planet and deploy a lander, based on the Venera design, capable of surviving for a long duration on the surface. Because of its proximity to Earth, and its similarity in size, mass and composition, Venus was once believed to hold life. In fact, the idea of Venus being a tropical world persisted well into the 20th century, until the Venera and Mariner programs demonstrated the absolute hellish conditions that actually exist on the planet. Nevertheless, it is believed that Venus may once have been much like Earth, with a similar atmosphere and warm, flowing water on its surface. This notion is supported by the fact that Venus sits within the inner edge of the Sun’s habitable zone and has an ozone layer. However, owing to the runaway greenhouse effect and the lack of a magnetic field, this water disappeared many billions of years ago. Still, there are those who believed that Venus could one day support human colonies. Currently, the atmospheric pressure near to the ground is far too extreme for settlements to be built on the surface. But 50 km above the surface, both the temperature and air pressure are similar to Earth’s, and both nitrogen and oxygen are believed to exist. This has led to proposals for “floating cities” to be built in the Venusian atmosphere and the exploration of the atmosphere using Airships. In addition, proposals have been made suggesting the Venus should be terraformed. These have ranged from installing a huge space-shade to combat the greenhouse effect, to crashing comets into the surface to blow the atmosphere off. Other ideas involve converting the atmosphere using calcium and magnesium to sequester the carbon away. Much like proposals to terraform Mars, these ideas are all in their infancy and are hard-pressed to address the long-term challenges associated with changing the planet’s climate. However, they do show that humanity’s fascination with Venus has not diminished over time. From being a central to our mythology and the first star we saw in the morning (and the last one we saw at night), Venus has since gone on to become a subject of fascination for astronomers and a possible prospect for off-world real estate. But until such time as technology improves, Venus will remain Earth’s hostile and inhospitable “sister planet”, with intense pressure, sulfuric acid rains, and a toxic atmosphere.
<urn:uuid:1f654358-96a1-4c4e-b740-4c365e22f380>
CC-MAIN-2019-04
https://www.universetoday.com/tag/venus-atmosphere/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583884996.76/warc/CC-MAIN-20190123023710-20190123045710-00449.warc.gz
en
0.954339
7,306
4.15625
4
|William Jefferson "Bill" Clinton| William Jefferson Clinton was born on August 19, 1946, in Hope, Arkansas. As a delegate to Boys Nation while in high school, he met President John Kennedy in the White House Rose Garden. The encounter led him to enter a life of public service. Clinton graduated from Georgetown University and in 1968 won a Rhodes Scholarship to Oxford University. He received a law degree from Yale University in 1973, and shortly thereafter entered politics in Arkansas. He was defeated in his campaign for Congress in Arkansas's Third District in 1974. The next year he married Hillary Rodham, a graduate of Wellesley College and Yale Law School. In 1980, Chelsea, their only child, was born. Clinton was elected Arkansas Attorney General in 1976, and won the governorship in 1978. After losing a bid for a second term, he regained the office two years later, and served until his 1992 bid for the Presidency of the United States. Elected President of the United States in 1992, and again in 1996, President Clinton was the first Democratic president to be awarded a second term in six decades. Under his leadership, the United States enjoyed the strongest economy in a generation and the longest economic expansion in U.S. history. President Clinton’s core values of building community, creating opportunity, and demanding responsibility resulted in unprecedented progress for America, including moving the nation from record deficits to record surpluses; the creation of over 22 million jobs—more than any other administration; low levels of unemployment, poverty and crime; and the highest homeownership and college enrollment rates in history. His accomplishments as president include increasing investment in education, providing tax relief for working families, helping millions of Americans move from welfare to work, expanding access to technology, encouraging investment in underserved communities, protecting the environment, countering the threat of terrorism and promoting peace and strengthening democracy around the world. His Administration’s economic policies fostered the largest peacetime economic expansion in history. President Clinton previously served as the Governor of Arkansas, chairman of the National Governors’ Association and Attorney General of Arkansas. As former chairman of the Democratic Leadership Council, he is one of the original architects and leading advocates of the Third Way movement. After leaving the White House, President Clinton established the William J. Clinton Foundation with the mission to strengthen the capacity of people in the United States and throughout the world to meet the challenges of global interdependence. To achieve this, the Clinton Foundation is focused on four critical areas: health security, with an emphasis on HIV/AIDS; economic empowerment; leadership development and citizen service; and racial, ethnic and religious reconciliation. The Clinton Presidential Center, located in Little Rock, Arkansas, is comprised of the Library, the archives, Clinton Foundation offices and the Clinton School of Public Service. Following the 2002 Barcelona AIDS Conference, President Clinton began the Clinton Foundation HIV/AIDS Initiative (CHAI) to assist countries in implementing large-scale, integrated, care, treatment and prevention programs that will turn the tide on the epidemic. It partners with countries in Africa, the Caribbean and Asia to develop operational business plans to scale-up care and treatment. CHAI works with individual governments and provides them with technical assistance, human and financial resources, and know-how from the sharing of the best practices across projects. The ultimate objective in each of these countries is to scale up public health systems to ensure broad access to high-quality care and treatment. The Initiative’s long-term goal is to develop replicable models for the scale-up of integrated programs in resource-poor settings. CHAI is currently bringing life-saving care and treatment to over a quarter of a million people around the world. In September 2005, President Clinton hosted the inaugural meeting of the Clinton Global Initiative (CGI). CGI is a non-partisan catalyst for action, bringing together a community of global leaders to devise and implement innovative solutions to some of the world’s most pressing challenges. The inaugural meeting brought together 35 current and 10 former heads of state along with hundreds of other leaders from governments, the business community, and NGOs who contributed to innovative solutions to alleviate poverty, promote effective governance, reconcile religious conflicts, and protect the environment. Nearly 300 commitments were made to improve the lives of people living on 6 continents, with private corporations and non-profit organizations pledging almost 70% of all commitments, which are valued in excess of $2.5 billion. In the United States, President Clinton also works through the Clinton Foundation Urban Enterprise Initiative to help small businesses acquire the tools they need to compete in the ever-changing urban marketplace. He also works along with the American Heart Association on the Alliance for a Healthier Generation to combat childhood obesity and reverse this deadly trend facing American children. Following Hurricane Katrina in August 2005, President Clinton and former President Bush led a nationwide fundraising effort and established the Bush-Clinton Katrina Fund to assist survivors in the rebuilding effort. This campaign was the second collaboration for the former presidents, the first being their work on relief and recovery following the Indian Ocean tsunami. President Clinton also serves as Special Envoy for Tsunami Recovery, as appointed by United Nations Secretary-General Kofi Annan in 2005. President Clinton is also a best selling author, and is married to Senator Hillary Rodham Clinton (D-NY). They reside in New York.
<urn:uuid:4ce83ef6-8770-4114-8882-26b2c7420217>
CC-MAIN-2020-50
https://www.ourcampaigns.com/CandidateDetail.html?CandidateID=4019
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141187753.32/warc/CC-MAIN-20201126084625-20201126114625-00671.warc.gz
en
0.956635
1,082
2.734375
3
Large-volume 3D laser scanners play an essential role in manufacturing large products (e.g., airplane wings), making measurements for large-scale construction (e.g., bridges), and other applications where very large structures must be measured in three dimensions. At present, however, there is no comprehensive standard to judge how well the instruments perform. As part of an effort by NIST’s Physical Measurement Laboratory to produce an international performance evaluation standard for these instruments, scientists at the Engineering Physics Division (EPD) designed and constructed a calibration facility to evaluate proposed tests in a draft ASTM International standard, which is being developed under the EPD’s leadership. In May 2016, major manufacturers of 3D laser scanners from all over the world converged at NIST to put their scanners through the paces. This laser scanner “runoff” was orchestrated by EPD’s Bala Muralikrishnan, Meghan Shilling, and Prem Rachakonda, with key assistance from Gerry Cheok of the Engineering Laboratory at NIST and Luc Cournoyer from the National Research Council (NRC) of Canada. An invitation was sent to all leading manufacturers of 3D laser scanners to visit NIST and run the approximately 100 tests specified in the draft standard. Four of the manufacturers traveled to NIST (one each from Germany and France) to participate in the runoff. Another sent an instrument during the week for testing. Two other manufacturers who could not attend in May have expressed interest in visiting NIST soon to try out the tests. These seven manufacturers represent about four-fifths of the entire market for large volume laser scanners. Additional participants included representatives from a company interested in entering the 3D scanner market and a company manufacturing precision spheres that are used as targets. The draft standard specifying the test procedures was the product of three years of work by a standards committee led by Muralikrishnan that met biweekly. “With large volume 3D laser scanners, you basically put them in the center of the room, and they sweep across the room, producing 3D point clouds,” Muralikrishnan explains. “The only current standard for these types of instruments evaluates the instrument only along one axis. That standard was released in 2015. “The standard released in 2015 was envisioned to be one of several standards. Thus, we decided that we should extend this so that it covers the entire volumetric space. We started work in the summer of 2013 to come up with test procedures that would evaluate the performance of these instruments over the work volume.” “After three years, we had a document that was mostly complete,” Muralikrishnan explains, “but we didn’t want to publish it until we could realize all of the test procedures. That’s what we did here at NIST this month. A participant performing relative range measurements in the long length tape tunnel facility at NIST. Credit: Sean Kelley/PML “The NIST team set up facilities to enable all the test procedures from the draft standard in the NIST dimensional metrology facilities, and participating manufacturers brought their instruments to NIST. There were three full days of testing across two NIST labs containing multiple experiments, each of which contained multiple tests. Often, two manufacturers were running tests on the same day with staggered times and locations. On average, it took each manufacturer an entire day to complete the full suite of tests. One set of tasks involved measuring point-to-point distances on a calibrated grid of spheres in the EPD’s large-scale laboratory at NIST. Once performance testing was completed, the manufacturers met with NIST and NRC staff to provide feedback on the process. While the manufacturer’s overall experience was extremely positive, the clear consensus was that the number of tests needed to be reduced in order for the standard to become more practical to use. This will be a key consideration as the draft standard is revised. Cournoyer elaborates: “We want the test to be useful, but we also want it to be feasible. It shouldn’t take a day. It should be done within a few hours at the most, without sacrificing too much of the performance evaluation. We think we can accommodate most of the concerns that the manufacturers were discussing. We will revise the document and discuss again.” The standard needs to be practical for both end-users, who might not have access to ideal measurement facilities, as well as the manufacturers, while maintaining sensitivity to known error sources. And, in cases where the users do not have the necessary facilities to run the tests, there needs to be a way for manufacturers to generate an accurate set of specifications. “If someone in an organization wants to know which scanner to buy, he or she will look at the specs,” Cournoyer explains. “And the specs will mean the same thing because they were tested against the same type of standards and the same type of objects. Today, that’s not the case at all.” Thanks to the NIST run-off, users are an important step closer to having these comparable specifications available. The willing participation of the world’s major manufacturers of 3D scanners in this effort, at their own expense, indicates the importance of performance evaluation standards in the buying and selling of manufacturing technology. Along with the important next step of revising the draft standard, the NIST scientists will be spending many hours perusing the vast quantity of data acquired during the runoff. “Now that we’ve had the opportunity to test all of the instruments and get data from all of the instruments, we can now analyze all of the data and see what type of algorithms make sense,” Muralikrishnan explains. “That is something that was not possible before this runoff. By having the manufacturers bring their instruments here and scan them in our facility with us controlling how they collected the data, we have the chance to do that now.” NIST’s role in orchestrating the runoff, acquiring these important data, and completing the standard is critical according to Cournoyer: “None of this would’ve happened without the NIST installation, the NIST people, and the NIST desire to complete the standard.” Source By phys.org…Share:
<urn:uuid:598241db-4042-4473-9c41-16ef9a5701cc>
CC-MAIN-2018-30
http://edeologist.com/3d-laser-scanner-runoff-pushes-new-standard-towards-the-finish-line/
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591455.76/warc/CC-MAIN-20180720002543-20180720022543-00100.warc.gz
en
0.958215
1,322
2.734375
3
Children’s National Health System and five other major pediatric hospitals have developed and tested a pilot “trigger” tool aimed at identifying the most common causes of harm in pediatric inpatient settings. David C. Stockwell, MD, MBA, a Children’s National critical care specialist, led the design of the study, which determined that efficient and reliable processes for measuring harm related to medical care are needed to advance pediatric safety. The study is being published in the June issue of Pediatrics. Children’s National “has a strong track record of improving the safety and quality of the care we deliver to our patients,” said David Wessel, MD, Executive Vice President and Chief Medical Officer, Hospital and Specialty Services, noting that the study “found no harm that was related to patient deaths. However, this does represent a new tool to survey the electronic medical record. It is one of many initiatives that are showing us where the opportunities reside to improve care.” The study used the adult-focused Global Trigger Tool developed by the Institute for Healthcare Improvement as a model for the design of a pediatric tool. The tool, named the Pediatric All-Cause Harm Measurement Tool (PACHMT) was tested at six freestanding children’s hospitals from different areas of the country, using a retrospective chart review of patients discharged in February 2012. A random sample of 100 patients from each site was included in the study. A total of 240 harms were detected from the 600 patient charts reviewed, a rate of 40 harms per 100 patients admitted. Almost 70 percent of the harms detected were rated as level E, the lowest severity on the harm scale developed by the National Coordination Council for Medication Error Reporting and Prevention, and included constipation, skin rash or bruising. Of the total harms documented, 45 percent were classified as probably or definitely preventable. The use of active surveillance tools that detect potential harm can help hospitals direct their efforts to improving the safety and quality of care. In addition to Children’s National, the other study sites included Boston Children’s Hospital, Children’s Hospital Central California, Children’s Hospital Colorado, Cincinnati Children’s Hospital Medical Center, and Lucile Packard Children’s Hospital Stanford. With a commitment to provide the highest quality patient care, Children’s National continually works to identify areas for improvement in quality and safety. In addition to this Pediatrics study, Children’s National conducts internal as well external quality and safety data analyses and collaborates with other hospitals to identify the causes of avoidable causes of harm and the necessary interventions to prevent future harm. Contact: Emily Hartman at 202-476-4500.###
<urn:uuid:e2b0cb0b-8e9c-4a36-9f52-3dbf52e39aeb>
CC-MAIN-2017-30
https://childrensnational.org/news-and-events/childrens-newsroom/2015/study-evaluating-tool-to-improve-quality-reduce-harm-in-patient-care
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423320.19/warc/CC-MAIN-20170720181829-20170720201829-00346.warc.gz
en
0.950987
558
2.671875
3
The origin of the Waterhouse Club could be said to rest in a South Australian State Cabinet meeting in the mid 1980’s during which spending proposals from North Terrace’s major institutions were considered. Initially, the Museum’s proposal was favoured but later government money was not available. Faced with this reality, in 1987, the Museum Board challenged a firm of public relations consultants to devise a plan to increase the Museum’s share of the dwindling government pie. A New Type of Support Group The consultants recommended a new type of support group to be called the Waterhouse Club after the Museum’s first Director. Its membership would be drawn from the upper echelons of government, business and society on the premise that with supporters of this calibre, the government would take more notice. To attract membership, the Club needed to offer exceptional experiences, showcasing all that was great in the Museum. Progress was made by early Club Presidents, Ms Judith Barr, Ms Suzanne Ackerman and Ms Judith Quigley who built a wide and influential network. The First Event In 1990, President Judith Quigley shifted the emphasis from money losing black-tie dinners to engaging picnics set among the attractive sandstone buildings behind the Museum. Judith invited Tony Brooks, public relations consultant, to set the future tone of the Club’s events. Tony drove fun and irreverent events, banishing stuffy stereotypes, and famously “teetering on the brink of bad taste”. He organised auctions for sale of the right to name a recently discovered species in perpetuity, now widely copied, then so innovative that London’s ‘The Times’ reported the event. The First Expedition The expedition concept came in 1992 with Ant Simpson’s return from an African safari organised by Harvard University. Ant had witnessed the power of combining a quality local tour operator with world-renowned scientists with exceptional communication skills. Using this model, an expedition was planned to visit South Australia’s premier outback tourist destination, the Flinders Ranges. Three scientists, Philip Jones from anthropology, Steve Donnellan from biology and Neville Pledge from palaeontology showed expeditioners how to “See the world through the eyes of the SA Museum”. With a sweep of the arm, the palaeontologist described how geological forces shaped the landscape and described the mega fauna; the biologist took over and showed how plants and animals adapted to the changing climate and the anthropologist told the story of how the Aboriginal Australians adapted to and settled the harsh land, followed by the European who also had to adapt. The Club’s first expedition changed the way its participants looked at the landscape. One surgeon wrote, “Outside my life in surgery, it was the most exciting time in my life”. Expeditions have met the expectations for those attending, including a retired premier, cabinet ministers and leaders in business and the professions. A Very Different Dinner In 1995, an epoch making event occurred – Tony Brooks’ “The Totally Stuffed Dinner”. The first of a series, it was startling and different; diners were seated in the mammal gallery and, as the lights came up, naked dancers who had been positioned in the glass cases among the animals, peered out at the guests as if they were an alien species. In time the dancers emerged and walked among the guests, observing them intently and silently, to the consternation of many. The observers observed! The dinner was a run-away success, establishing the Club as the talk of the town and a truly different support group. The Club was written up in the ‘The Australian’ (see below). The Museum’s director, Dr Chris Anderson, said of the Club “We couldn’t live without them; they provide a fantastically sophisticated level of support”. In 1995, Ant Simpson became President. During his presidency, the Club’s philosophy has been more tightly defined with focus on organising unique and higher priced events that represent the true value of the Museum association. The prices allowed better experiences to be provided, which in turn raised participants’ satisfaction and attracted senior members of the community. The Club has succeeded beyond its original expectations with a vibrant membership and enthusiastic support from the Museum’s scientists, providing a robust flow of untied cash to the SA Museum Foundation. It remains a unique entity in the world of museum support groups. Article published in ‘The Australian’ 28/11/97 (click to expand)
<urn:uuid:d0f1e49b-ae13-448b-81c5-bf45113602ee>
CC-MAIN-2022-05
https://waterhouseclub.com/origin-of-the-waterhouse-club/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304883.8/warc/CC-MAIN-20220129092458-20220129122458-00125.warc.gz
en
0.954401
945
2.671875
3
Ergonomics is the science of fitting the job to the worker. When there is a mismatch between the physical requirements of the job and the physical capacity of the worker, work-related musculoskeletal disorders (MSDs) can result. Ergonomics encompasses the practice of designing equipment and work tasks to conform to the capability of the worker. It provides a means for adjusting the work environment and work practices to prevent injuries before they occur. PPE includes devices for protecting the eyes, face, head and extremities as well as protective clothing, protective shields and barriers. Work-related Musculoskeletal Disorders (MSDs) Although definitions vary, the National Institute for Occupational Safety and Health (NIOSH) describes the general term “musculoskeletal disorders” or MSDs as follows: disorders of the muscles, nerves, tendons, ligaments, joints, cartilage or spinal discs disorders that are not typically the result of any instantaneous or acute event (such as a slip, trip or fall) but reflect a more gradual or chronic development disorders diagnosed by a medical history, physical examination, or other medical tests that can range in severity from mild and intermittent to debilitating and chronic disorders with several distinct features (such as carpel tunnel syndrome) as well as disorders defined primarily by the location of the pain (i.e., low back pain) The term “Work-Related Musculoskeletal Disorders” refers to: (1) musculoskeletal disorders to which the work environment and the performance of work contribute significantly, or (2) musculoskeletal disorders that are made worse or longer lasting by work conditions. Neither the Federal Occupational Safety and Health Administration (OSHA) nor New Jersey PEOSH have a specific ergonomics standard. At present, serious ergonomics hazards in New Jersey public sector workplaces are addressed following federal OSHA's lead, under the General Duty Clause. The General Duty Clause of the PEOSH Act describes the employer's obligation to "furnish to each of his employees employment and a place of employment which are free from recognized hazards that are causing or are likely to cause death or serious physical harm to his employees." This clause is utilized to cite serious hazards where no specific PEOSH standard exists to address the hazard, as is the case with ergonomic stressors. When PEOSH uses the General Duty Clause to cite an employer, it must demonstrate that: the employer failed to keep the workplace free of a hazard to which employees were exposed, the hazard was causing or likely to cause death or serious physical harm, the hazard was recognized, and a feasible means of abatement for that hazard exists. Although a mandatory ergonomics standard does not exist, PEOSH and OSHA have issued the following voluntary guidelines: PEOSH Computer Workstation Guidelines One occupational setting where a large number of public employees in New Jersey work is the office building. PEOSH developed these guidelines for preventing musculoskeletal disorders in workplaces where employees use computer workstations. The guidelines are designed to help provide computer operators with ergonomically designed furniture and equipment, workstations that have well-designed lighting, appropriate training and vision care information. Federal OSHA Guidelines for High Risk Industries Federal OSHA has developed five sets of industry and task-specific guidelines for industries with high rates of musculoskeletal disorders: Nursing Homes, Retail Grocery Stores, Shipyards, Poultry Processing and Meatpacking Plants. Employers in other industries for which guidelines have not been developed may find this information useful in implementing their own ergonomics programs. Management leadership and employee involvement are complementary and essential elements of a sound safety and health program. Commitment by management provides the organizational resources and motivating force necessary to deal effectively with ergonomic hazards. Employee involvement and feedback through clearly established procedures are likewise essential, both to identify existing and potential hazards and to develop and implement an effective way to abate such hazards. Additional employee input can be sought: by speaking with employees by conducting symptom surveys through use of employee questionnaires Workplace analysis identifies existing hazards and conditions, operations that create hazards, and areas where hazards may develop. Be aware of common contributing conditions within your industry or job classifications. If other companies in the same industry have ergonomic-related problems, then it is possible these potential problems are also your concern. Workplace analysis also includes close scrutiny and tracking of injury and illness records to identify patterns that may indicate development of MSDs. Review and analyze injury and illness records to determine whether there is a pattern of ergonomic-related injuries in certain jobs or work tasks. NJOSH 300 Logs NJOSH 301 forms or the first report of injury Workers' Compensation claims Analyze the jobs or work tasks themselves to identify potential ergonomic problems before employee injuries occur. Ergonomic risk factors to consider may include, but are not limited to: prolonged work with hands above the head or with the elbows above the shoulders prolonged work with the neck bent squatting, kneeling, or lifting handling objects with back bent or twisted repeated or sustained bending or twisting of wrists, knees, hips or shoulders forceful and repeated gripping or pinching Forceful Lifting, Pushing or Pulling handling heavy objects moving bulky or slippery objects assuming awkward postures while moving objects Prolonged Repetitive Motion using tools or knives packaging, handling, or manipulating objects repeated contact with hard or sharp objects, like desk or table edges Once ergonomic hazards are identified through the systematic worksite analysis discussed above, the next step is to design measures to prevent or control these hazards. A three-tier hierarchy of controls is widely accepted as an intervention strategy for controlling workplace hazards: 1) engineering controls; 2) administrative controls, and; 3) personal protective equipment. Although engineering controls are preferred, administrative controls can be helpful as temporary measures or until engineering controls can be implemented. NIOSH recommends the following steps in hazard control: Reduce or eliminate potentially hazardous conditions using engineering controls Change the way materials, parts and products are transported Reduce the need for manual lifting or use of manual force Use adjustable height work stations and material containers Modify workstation layout to keep tools and materials within short reaching distances Improve tool design Change work practices and management policies to reduce or prevent exposures to ergonomic risk factors Alter schedules to include more rest breaks Rotate workers through jobs that are physically tiring Broaden or vary the job content to offset risk factors Adjust work pace to relieve repetitive motion risks and give workers more control Train workers to recognize ergonomic risk factors and learn techniques for reducing stress and strain while performing their worktasks PPE should be selected with ergonomic stressors in mind. It should not contribute to extreme postures and excessive forces. Whether the use of PPE worn or used by the employee (such as wrist supports, back belts or vibration attenuating gloves) offers protection against ergonomic hazards remains open to question. On the basis of a review of the scientific literature, NIOSH concluded that there is insufficient evidence to prove the effectiveness of back belts in preventing back injuries related to manual handling jobs (see NIOSH's Back Belts - Do They Prevent Injury?). Less controversial types of PPE are vibration attenuating gloves and knee pads for carpet layers. Implementation of a medical management system is a major element in the employer's ergonomics program. Proper medical management is necessary to eliminate or materially reduce the risk of MSD signs and symptoms through early identification and treatment. Thus an effective medical management program is essential to the success of an employer's ergonomics program. In an effective program, health care providers will be part of the team, interacting with and exchanging information routinely in order to prevent and properly treat MSDs. Training and Education For ergonomics, the overall goal of training is to enable managers, supervisors, and employees to identify aspects of job tasks that may increase a worker's risk of developing MSDs, recognize the signs and symptoms of disorders, and participate in development of strategies to control or prevent them. The program should be designed and implemented by qualified persons and tailored to the specific concerns in the workplace. Special training should be provided for persons administering the program. NIOSH recommends the following levels of ergonomics training and associated objectives based on employee categories: Type of Employee Type of Training Ergonomics Awareness Training with the following objectives: Recognize workplace risk factors for MSDs Identify signs and symptoms for MSDs Know the process the employer is using to control risk factors and how to participate Understand procedures for reporting MSDs and ergonomic risk factors Every employee in a job with ergonomic risk factors Formal Awareness Instruction and Job-Specific Training Awareness training plus: Demonstrate how to use selected control measures Every employee involved in job hazard analysis and control development Training in Job Hazard Analysis and Control Measures with the following objectives: Demonstrate the way to do a job analysis for identifying risk factors for musculoskeletal disorders Select says to implement and evaluate control measures Ergonomics team or work group Training in Problem-Solving Identify the departments, areas, and jobs with risk factors through a review of company reports, records, walk-through observations, and special surveys Identify tools and techniques that can be used to conduct job analyses and serve as a basis for recommendations Develop skills in team building, consensus development, and problem-solving Recommend ways to control ergonomic hazards using employee and professional input
<urn:uuid:97a4bee3-01de-493c-86f4-96b1fcb25872>
CC-MAIN-2014-49
http://nj.gov/health/peosh/ergonomics.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931006637.79/warc/CC-MAIN-20141125155646-00171-ip-10-235-23-156.ec2.internal.warc.gz
en
0.916381
2,005
2.8125
3
Ship to Shore Overnight Program A field trip like no other! The Mystic Seaport Ship to Shore Overnight Program offers your school group the opportunity to immerse itself in American history. By exploring the Museum’s seaport village and sleeping aboard the 1882 full-rigged ship Joseph Conrad, students will experience history in a way that simply can’t be done in the classroom. The past is made tangible at Mystic Seaport—from feeling the weight of a harpoon to seeing the view from the rigging of a historic ship. These immersive experiences augment and reinforce learning that goes on in the classroom, fostering an unparalleled sense of what the past was like and how it shaped who we are today. Sea History Alive We understand that every student learns differently. Some will learn best from speaking with our experienced interpreters and Museum teachers, while others will respond best to the feel of the shipsmith’s hammer in their hand as they help shape a piece of hot iron. Our goal during the Ship to Shore Overnight Program is to help students gain a tactile understanding of the nation’s past. From setting type on a 19th-century printing press to cooking over an open flame in a historical kitchen, students will respond, engage, and most importantly, remember. There’s a lot to discover at Mystic Seaport, whether you’re interested in American history, the whaling industry, or the science and technology of navigating at sea. We work hard to tailor our agenda to fit the needs of your curriculum. From analyzing artifacts and primary sources in Primary Source Workshops to an examination of the role of music at sea with one of our chanteymen, Ship to Shore can work across subject divisions to provide a holistic educational experience. Here are a few of our most popular themes, but we’re happy to let you mix and match. Life in a Seaport Town: Learn about living and working in a coastal New England town. Hands-on explorations of specific professions (shipsmith, printer, etc.). All in the Same Boat: An overview of the New England whaling industry in the 19th century. Tour includes a harpoon throw and an option to row whaleboats. Haul Together; A Team-building Program Through the Eyes of a Sailor: Visitors Grade 4 and above discover the basic skills of mariners, discussing why these skills were important historically, and how/if they developed through history to the modern day. Mighty Mariners: In the classroom and on the water, students Grade 4 and up spend their day learning to sail with Mystic Seaport Museum’s Sailing Instructors, and in the evening learn the fundamentals of navigation. The Ship to Shore Overnight Program is offered in either a 2-day, 1-night format or a 3-day, 2-night format. The longer program allows you to select two themes for the trip, such as All in the Same Boat and Life in a Seaport Town. Below is a sample schedule for a 3-day, 2-night program: Noon: Arrival and Orientation 2:00-4:00: Afternoon Hands-On Workshops (activities depend on theme but may include harpoon throw, making rope, or metalworking with the shipsmith) 4:15: Planetarium Program 5:00: Dogwatch (break time for students) 5:30: Dinner at the Galley Restaurant 7:00: Evening Activity (such as Roleplayer, craft, or chantey show) 9:00: Lights Out 8:15: Breakfast at the Galley Restaurant 9:00: Introduction to today’s theme 10:00: Morning Workshops (activities depend on theme, but may include lanyard-making or knot-tying) 12:00: Lunch at the Galley Restaurant 1:00: Dogwatch (break time for students) 1:45: Intro to Afternoon Workshops and Tours 2:00-4:00: Afternoon Workshops and Tours (including time on historic vessels and inside our village) 3:45: Wrap-Up and Snack 5:00: Evening Activity or Show (chantey show or similar) 5:45: Dinner at the Galley Restaurant 6:15: 19th-century games on the Village Green 7:00: Seaport Jeopardy 9:00: Lights out 7:00: Reveille/Pack Gear 7:30: Deck Chores/Clean the Conrad 8:15: Breakfast at the Galley Restaurant 9:00: Rigging Climb aboard the Conrad (weather permitting) 10:00: Free Choice Touring and Shopping with Chaperones 11:00: Boxed lunches at the Galley Restaurant 12:00: Loading and Departure
<urn:uuid:4d394e0b-f0e2-426a-a70a-8735699c6305>
CC-MAIN-2018-34
https://www.mysticseaport.org/learn/k-12-programs/ship-to-shore/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210105.8/warc/CC-MAIN-20180815122304-20180815142304-00395.warc.gz
en
0.913764
1,020
2.765625
3
Circumtropical. Indian Ocean: Reunion and Mauritius and Christmas Island. Western Pacific: Palau, and the Hawaiian Islands. Western Atlantic: Bermuda, Bahamas, and Caribbean Sea; may occur in southern Florida, USA and northwestern Gulf of Mexico. Reported from Bahia, Brazil. Eastern Atlantic: around oceanic islands. A benthic species and solitary species, inhabiting outer reef slopes. Occurs under ledges and in holes of reef slopes Has the habit of puffing its head like a cobra when approached. Secretive and nocturnal. Fisheries: subsistence fisheries; aquarium: commercial High to very high vulnerability Channomuraena bennettii (Günther, 1870) Channomuraena cubensis Poey, 1868 Channomuraena vittatus (Richardson, 1845) Gymnomuraena bennettii Günther, 1870 Gymnomuraena vittata (Richardson, 1845) Ichthyophis vittatus Richardson, 1845 Nettastoma vittata (Richardson, 1845) Uropterygius bennetti (Günther, 1870)
<urn:uuid:83b7f4dc-e4fd-41f7-844b-8a8af3d0bc9c>
CC-MAIN-2020-40
https://pl.reeflex.net/tiere/4608_Channomuraena_vittata.htm
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400221980.49/warc/CC-MAIN-20200925021647-20200925051647-00235.warc.gz
en
0.722946
266
2.703125
3
Download and print these infographics with ideas linked to the tutorial to learn more about the underlying causes and effects of dyslexia. Dyslexia is a brain-based learning disability that specifically impairs a person’s ability to read. Studies report fundamental differences in brain development and activation patterns between individuals with dyslexia and those without. Breaking down the truth about Dyslexia. Signs of typical reading development and possible indicators of risk for dyslexia. Ask the Experts Find out what experts have to say about dyslexia. Expert: Guinevere Eden Ph.D. Expert: Susan Lowell Expert: Jack Fletcher, Ph.D. Expert: John Gabrieli Ph.D. What is Dyslexia? To better understand the experiences of students with dyslexia, and how we can support them, it is important to develop an understanding of what dyslexia is. Explore these resources to learn more about what dyslexia is. What Causes Dyslexia? Dyslexia is a brain-based learning disability that specifically impairs a person’s ability to read. Explore these resources to find out what research says about what causes and does not cause dyslexia. What are the Effects of Dyslexia? Explore these resources to learn more about what the effects of dyslexia are, and ways to support students with dyslexia. The research reported here is funded by awards to the National Center on Improving Literacy from the Office of Elementary and Secondary Education, in partnership with the Office of Special Education Programs (Award #: S283D160003). The opinions expressed are those of the authors and do not represent views of OESE, OSEP, or the U.S. Department of Education. Copyright © 2020 National Center on Improving Literacy. https://improvingliterarcy.org
<urn:uuid:87482656-f630-4ad0-9ba0-3ac092869dc7>
CC-MAIN-2020-50
https://improvingliteracy.org/kit/understanding-dyslexia
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141163411.0/warc/CC-MAIN-20201123153826-20201123183826-00412.warc.gz
en
0.896609
398
4.03125
4
Delving Deeper Into the Teacher Effectiveness Gap Here’s something you already may know: Mathematica Policy Research’s two, large-scale studies on the distribution of effective teachers across schools have made quite a splash in the research and policy worlds. So why yet another blog post on them? Because most of us need help translating meticulous research so we can use it in the field! That’s why I asked some of the authors of Access to Effective Teaching for Disadvantaged Students—Eric Isenberg, Philip Gleason, and Jeffrey Max from Mathematica, and Michael Hansen from American Institutes for Research—what the results mean, and what we still don’t know. First, the study findings. On average, in 29 mostly large school districts across the country, with poverty ranging from 34 percent to 78 percent, researchers found that (1) poor students in Grades 4–8 were taught by less effective math and English teachers than students who aren’t poor, (2) shrinking that teacher effectiveness gap would reduce the achievement gap by 2 percentile points, and (3) some districts are doing a much better job than others of maintaining equitable distribution of effective teachers. Teacher effectiveness was measured using value-added scores. According to the research, the typical poor student has a teacher at the 47th percentile of the distribution of teachers in English/language arts, compared to the typical non-poor student who has a teacher at the 56th percentile. In math, these differences are between a teacher at the 48th percentile for a typical poor student and the 53rd percentile for the typical non-poor student. Statistically significant, yes—but a large difference? The authors say no. “The distribution of measured effectiveness is bell-shaped,” they explained in a joint response, “so the difference between percentiles in the thick middle of the distribution is not that much.” Eliminating teacher effectiveness differences like these, Michael Hansen says, would add roughly two additional weeks of learning for poor students. Still, these differences are for a single year only. So, the authors explained, “We do not know how the one-year difference in access to effective teaching would aggregate over time. In other words, we looked at the effect on the student achievement gap that would result from having equal access in a single year but we have not yet examined the effect of having equal access over multiple years.” What else don’t we know? Why there was such variation in how equitably those effective teachers are distributed within different districts, what explains those differences, and how we can help make effective teacher distribution equitable in more districts. Later reports that cover two more years of data collection will examine these questions. Although we don’t have answers yet, the authors noted that in English/language arts, the more urban the district, the more unequal its access to effective teaching. And in math, access is greater in medium-sized districts than in larger districts. By region, southern districts are the most inequitable. Bottom line, we still need to better understand why some districts are struggling more than others to ensure that all of their students get access to the most effective teachers. In districts with inequitable distribution, why do poor students get assigned to less effective teachers? Are effective teachers leaving? Are ineffective teachers staying? Are less experienced teachers being assigned to poor students? Closer scrutiny of these districts should inform policymaking. Still on the edge of your seat? You can get up-close and personal with the researchers at an IES/Mathematica forum from 11 a.m. to 12:30 p.m. ET, on Tuesday, December 10, 2013, at Mathematica’s D.C. office or via live webinar. So tell us, did this blog help unpack the study’s findings? What questions do you still have that would inform your work as a practitioner, researcher, or policymaker?
<urn:uuid:358a937d-be5d-4068-8655-97e8c3659d0d>
CC-MAIN-2020-40
https://gtlcenter.org/blog/delving-deeper-teacher-effectiveness-gap
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400206133.46/warc/CC-MAIN-20200922125920-20200922155920-00598.warc.gz
en
0.960956
822
3.03125
3
Photojournalism is a particular form of journalism (the collecting, editing, and presenting of news material for publication or broadcast) that employs images in order to tell a news story. It is now usually understood to refer only to still images, but in some cases the term also refers to video used in broadcast journalism. Photojournalism is distinguished from other close branches of photography (e.g., documentary photography, social documentary photography, street photography or celebrity photography) by complying with a rigid ethical framework which demands that the work be both honest and impartial whilst telling the story in strictly journalistic terms. Photojournalists create pictures that contribute to the news media, and help communities connect with one other. Photojournalists must be well informed and knowledgeable about events happening right outside their door. They deliver news in a creative format that is not only informative, but also entertaining. Like a writer, a photojournalist is a reporter, but they must often make decisions instantly and carry photographic equipment, often while exposed to significant obstacles (e.g., physical danger, weather, crowds, physical access). Origins in war photography The practice of illustrating news stories with photographs was made possible by printing and photography innovations that occurred in the mid 19th century. Although early illustrations had appeared in newspapers, such as an illustration of the funeral of Lord Horatio Nelson in The Times (1806), the first weekly illustrated newspaper was the Illustrated London News, first printed in 1842. The illustrations were printed with the use of engravings. The first photograph to be used in illustration of a newspaper story was a depiction of barricades in Paris during the June Days uprising taken on 25 June 1848; the photo was published as an engraving in L'Illustration of 1–8 July 1848. During the Crimean War, the ILN pioneered the birth of early photojournalism by printing pictures of the war that had been taken by Roger Fenton. Fenton was the first official war photographer and his work included documenting the effects of the war on the troops, panoramas of the landscapes where the battles took place, model representations of the action, and portraits of commanders, which laid the groundwork for modern photojournalism. Other photographers of the war included William Simpson and Carol Szathmari. Similarly, the American Civil War photographs of Mathew Brady were engraved before publication in Harper's Weekly. The technology had not yet developed to the point of being able to print photographs in newspapers, which greatly restricted the audience of Brady's photographs. However, it was still common for photographs to be engraved and subsequently printed in newspapers or periodicals throughout the war. Disaster, including train wrecks and city fires, was also a popular subject for illustrated newspapers in the early days. The printing of images in newspapers remained an isolated occurrence in this period. Photos were used to enhance the text rather than to act as a medium of information in its own right. This began to change with the work of one of the pioneers of photojournalism, John Thomson, in the late 1870s. In collaboration with the radical journalist Adolphe Smith, he began publishing a monthly magazine, Street Life in London, from 1876 to 1877. The project documented in photographs and text, the lives of the street people of London and established social documentary photography as a form of photojournalism. Instead of the images acting as a supplement to the text, he pioneered the use of printed photographs as the predominant medium for the imparting of information, successfully combining photography with the printed word. In March 1886, when General George Crook received word that the Apache leader Geronimo would negotiate surrender terms, photographer C. S. Fly took his equipment and attached himself to the military column. During the three days of negotiations, Fly took about 15 exposures on 8 by 10 inches (200 by 250 mm) glass negatives. His photos of Geronimo and the other free Apaches, taken on March 25 and 26, are the only known photographs taken of American Indians while still at war with the United States. Fly coolly posed his subjects, asking them to move and turn their heads and faces, to improve his composition. The popular publication Harper's Weekly published six of his images in their April 24, 1886 issue. In 1887, flash powder was invented, enabling journalists such as Jacob Riis to photograph informal subjects indoors, which led to the landmark work How the Other Half Lives. By 1897, it became possible to reproduce halftone photographs on printing presses running at full speed. In France, agencies such as Rol, Branger and Chusseau-Flaviens (ca. 1880–1910) syndicated photographs from around the world to meet the need for timely new illustration. Despite these innovations, limitations remained, and many of the sensational newspaper and magazine stories in the period from 1897 to 1927 were illustrated with engravings. In 1921, the wirephoto made it possible to transmit pictures almost as quickly as news itself could travel. The "Golden Age of Photojournalism" is often considered to be roughly the 1930s through the 1950s. It was made possible by the development of the compact commercial 35mm Leica camera in 1925, and the first flash bulbs between 1927 and 1930, which allowed the journalist true flexibility in taking pictures. A new style of magazine and newspaper appeared that used photography more than text to tell stories. The Berliner Illustrirte Zeitung was the first to pioneer the format of the illustrated news magazine. Beginning in 1901, it began to print photographs inside the magazine, a revolutionary innovation. In the successive decades, it was developed into the prototype of the modern news magazine. It pioneered the photo-essay, had a specialised staff and production unit for pictures and maintained a photo library. It also introduced the use of candid photographs taken with the new smaller cameras. The magazine sought out reporters who could tell a story using photographs, notably the pioneer sports photographer Martin Munkácsi, the first staff photographer, and Erich Salomon, one of the founders of photojournalism. Other magazines included, Arbeiter-Illustrierte-Zeitung (Berlin), Vu (France), Life (USA), Look (USA), Picture Post (London)); and newspapers, The Daily Mirror (London) and The New York Daily News. Famous photographers of the era included Robert Capa, Romano Cagnoni, Alfred Eisenstaedt, Margaret Bourke-White and W. Eugene Smith. Henri Cartier-Bresson is held by some to be the father of modern photojournalism, although this appellation has been applied to various other photographers, such as Erich Salomon, whose candid pictures of political figures were novel in the 1930s. American journalist Julien Bryan photographed and filmed the beginning of the Second World War being under heavy German bombardment in September 1939 in Poland. He was pioneer worker in color photography, Kodachrome. Soldier Tony Vaccaro is also recognized as one of the pre-eminent photographers of World War II. His images taken with the modest Argus C3 captured horrific moments in war, similar to Capa's Spanish soldier being shot. Capa himself was on Omaha Beach on D-Day and captured pivotal images of the conflict on that occasion. Vaccaro is also known for having developed his own images in soldier's helmets, and using chemicals found in the ruins of a camera store in 1944. Until the 1980s, most large newspapers were printed with turn-of-the-century "letterpress" technology using easily smudged oil-based ink, off-white, low-quality "newsprint" paper, and coarse engraving screens. While letterpresses produced legible text, the photoengraving dots that formed pictures often bled or smeared and became fuzzy and indistinct. In this way, even when newspapers used photographs well — a good crop, a respectable size — murky reproduction often left readers re-reading the caption to see what the photo was all about. The Wall Street Journal adopted stippled hedcuts in 1979 to publish portraits and avoid the limitations of letterpress printing. Not until the 1980s did a majority of newspapers switch to "offset" presses that reproduce photos with fidelity on better, whiter paper. By contrast Life, one of America's most popular weekly magazines from 1936 through the early 1970s, was filled with photographs reproduced beautifully on oversize 11×14-inch pages, using fine engraving screens, high-quality inks, and glossy paper. Life often published a United Press International (UPI) or Associated Press (AP) photo that had been first reproduced in newspapers, but the quality magazine version appeared to be a different photo altogether. In large part because their pictures were clear enough to be appreciated, and because their name always appeared with their work, magazine photographers achieved near-celebrity status. Life became a standard by which the public judged photography, and many of today's photo books celebrate "photojournalism" as if it had been the exclusive province of near-celebrity magazine photographers. In 1947 a few famous photographers founded the international photographic cooperative Magnum Photos. In 1989 Corbis Corporation and in 1995 Getty Images were founded. These powerful image libraries sell the rights to photographs and other still images. The Golden Age of Photojournalism ended in the 1970s when many photo-magazines ceased publication. They found that they could not compete with other media for advertising revenue to sustain their large circulations and high costs. Still, those magazines taught journalism much about the photographic essay and the power of still images. However, since the late 1970s, photojournalism and documentary photography have increasingly been accorded a place in art galleries alongside fine art photography. Luc Delahaye, Manuel Rivera-Ortiz and the members of VII Photo Agency are among many who regularly exhibit in galleries and museums. The Danish Union of Press Photographers (Pressefotografforbundet) was the first national organization for newspaper photographers in the world. It was founded in 1912 in Copenhagen, Denmark by six press photographers. Today it has over 800 members. The National Press Photographers Association (NPPA) was founded in 1946 in the U.S., and has about 10,000 members. Others around the world include the British Press Photographers Association (BPPA) founded in 1984, then relaunched in 2003, and now has around 450 members. Hong Kong Press Photographers Association (1989), Northern Ireland Press Photographers Association (2000), Pressfotografernas Klubb (Sweden, 1930), and PK — Pressefotografenes Klubb (Norway). Magnum Photos was founded in 1947 by Robert Capa, David "Chim" Seymour, Henri Cartier-Bresson, George Rodger, William Vandivert, Rita Vandivert and Maria Eisner, being one of the first photographic cooperatives, owned and administered entirely by its members worldwide. VII Photo Agency was founded in September 2001 and got its name from the original seven founders, Alexandra Boulat, Ron Haviv, Gary Knight, Antonin Kratochvil, Christopher Morris, James Nachtwey and John Stanmeyer. Today it has 30 members, along with a mentor program. News organizations and journalism schools run many different awards for photojournalists. Since 1968, Pulitzer Prizes have been awarded for the following categories of photojournalism: 'Feature Photography', 'Spot News Photography'. Other awards are World Press Photo, Best of Photojournalism, and Pictures of the Year as well as the UK based The Press Photographer's Year. This section needs additional citations for verification. (September 2015) (Learn how and when to remove this template message) Photojournalism works within the same ethical approaches to objectivity that are applied by other journalists. What to shoot, how to frame and how to edit are constant considerations. Photographing news for an assignment is one of the most ethical problems photographers face. Photojournalists have a moral responsibility to decide what pictures to take, what picture to stage, and what pictures to show the public. For example, photographs of violence and tragedy are prevalent in American journalism because as an understated rule of thumb, that "if it bleeds, it leads". The public is attracted to gruesome photographs and dramatic stories. A lot of controversy arises when deciding which photographs are too violent to show the public. Photographs of the dead or injured arouse controversy because, more often than not, the name of person depicted in the photograph is not given in the caption. The family of the person is often not informed of the photograph until they see it published. The photograph of the street execution of a suspected Viet Cong soldier during the Vietnam War provoked a lot of interest because it captured the exact moment of death. The family of the victim was also not informed that the picture would run publicly. Being exposed to such violence can have physiological and psychological effects on those who document it and is but one of many different forms of emotional labor that photojournalists report experiencing. Other issues involving photojournalism include the right to privacy, negotiating how the subject desires to be depicted, and questions of whether compensation is warranted. Especially regarding pictures of violence, photojournalists face the ethical dilemma of whether or not to publish images of the victims. The victim's right to privacy is sometimes not addressed or the picture is printed without their knowledge or consent. The compensation of the subject is another issue. Subjects often want to be paid in order for the picture to be published, especially if the picture is of a controversial subject. Another major issue of photojournalism is photo manipulation – what degree is acceptable? Some pictures are simply manipulated for color enhancement, whereas others are manipulated to the extent where people are edited in or out of the picture. War photography has always been a genre of photojournalism that is frequently staged. Due to the bulkiness and types of cameras present during past wars in history, it was rare when a photograph could capture a spontaneous news event. Subjects were carefully composed and staged in order to capture better images. Another ethical issue is false or misleading captioning. The 2006 Lebanon War photographs controversies is a notable example of some of these issue, and see photo manipulation: use in journalism for other examples. The emergence of digital photography offers whole new realms of opportunity for the manipulation, reproduction, and transmission of images. It has inevitably complicated many of the ethical issues involved. Often, ethical conflicts can be mitigated or enhanced by the actions of a sub-editor or picture editor, who takes control of the images once they have been delivered to the news organization. The photojournalist often has no control as to how images are ultimately used. The National Press Photographers Association (NPPA) is an American professional society that emphasizes photojournalism. Members of the NPPA accept the following code of ethics - The practice of photojournalism, both as a science and art, is worthy of the very best thought and effort of those who enter into it as a profession. - Photojournalism affords an opportunity to serve the public that is equaled by few other vocations and all members of the profession should strive by example and influence to maintain high standards of ethical conduct free of mercenary considerations of any kind. - It is the individual responsibility of every photojournalist at all times to strive for pictures that report truthfully, honestly and objectively. - Business promotion in its many forms is essential, but untrue statements of any nature are not worthy of a professional photojournalist and we severely condemn any such practice. - It is our duty to encourage and assist all members of our profession, individually and collectively, so that the quality of photojournalism may constantly be raised to higher standards. - It is the duty of every photojournalist to work to preserve all freedom-of-the-press rights recognized by law and to work to protect and expand freedom-of-access to all sources of news and visual information. - Our standards of business dealings, ambitions and relations shall have in them a note of sympathy for our common humanity and shall always require us to take into consideration our highest duties as members of society. In every situation in our business life, in every responsibility that comes before us, our chief thought shall be to fulfill that responsibility and discharge that duty so that when each of us is finished we shall have endeavored to lift the level of human ideals and achievement higher than we found it. - No Code of Ethics can prejudge every situation, thus common sense and good judgment are required in applying ethical principles. Most photojournalists consider stage-managed shots presented as candid to be unethical. There have been examples in the history of photojournalism of photographers purposefully deceiving their audience by doing so. Mike Meadows, a veteran photographer of the Los Angeles Times, was covering a major wild fire sweeping southern California on 27 October 1993. His picture of a Los Angeles County firefighter, Mike Alves cooling himself off with water in a pool in Altadena ran both in the Times and nationally. Prior to submitting the photograph for a Pulitzer Prize, Meadows' assignment editor, Fred Sweets, contacted the firefighter, who reportedly said he had been asked by Meadows to go to the pool and splash water on his head. Meadows denied the accusation, claiming "I may have been guilty of saying this would make a nice shot, but to the best of my recollection, I did not directly ask him to do that. ... I've been doing breaking news stories for years and years and I've never in my life set up a picture." Meadows was suspended without pay for a week and picture was withdrawn from any prize competitions – the Times called it a "fabrication" and the paper's photography director, Larry Armstrong, said "when you manipulate the situation, you manipulate the news." Edward Keating, a Pulitzer Prize winner from The New York Times, photographed a young boy pointing a toy gun outside a Middle Eastern grocery store, near a town where the FBI raided an alleged Al Qaeda cell. Other photographers at the scene claimed that Keating pointed with his own arm to show the boy which way to look and aim the gun. After the Columbia Journalism Review reported the incident, Keating was forced to leave the paper. Impact of new technologies As early as the Crimean War in the mid-19th century, photographers were using the novel technology of the glass plate camera to record images of British soldiers in the field. As a result, they had to deal with not only war conditions, but their pictures often required long shutter speeds, and they had to prepare each plate before taking the shot and develop it immediately after. This led to, for example, Roger Fenton traveling around in a transportable dark room, which at times made him a target of the enemy. These technological barriers are why he was unable to obtain any direct images of the action. The use of photography as a way of reporting news did not become widespread until the advent of smaller, more portable cameras that used an enlargeable film negative to record images. The introduction of the 35 mm Leica camera in 1925 made it possible for photographers to move with the action, take multiple shots of events as they were unfolding, as well as be more able to create a narrative through their photographs alone. Since the 1960s, motor drives, electronic flash, auto-focus, better lenses and other camera enhancements have made picture-taking easier. New digital cameras free photojournalists from the limitation of film roll length. Although the number depends on the amount of megapixels the camera contains, whether one's shooting mode is JPEG or raw, and what size of memory card one is using, it is possible to store thousands of images on a single memory card. Social media are playing a big part in revealing world events to a vast audience. Whenever there is a major event in the world, there are usually people with camera phones ready to capture photos and post them on various social networks. Such convenience allows the Associated Press and other companies to reach out to the citizen journalist who holds ownership of the photos and get permission to use those photos in news outlets. The content of photos tends to outweigh their quality when it comes to news value. On February 18, 2004, The New York Times published on their front page a photo of AT&T CEO John Zeglis which was taken with a camera phone. Content remains the most important element of photojournalism, but the ability to extend deadlines with rapid gathering and editing of images has brought significant changes. As recently as 15 years ago, nearly 30 minutes were needed to scan and transmit a single color photograph from a remote location to a news office for printing. Now, equipped with a digital camera, a mobile phone and a laptop computer, a photojournalist can send a high-quality image in minutes, even seconds after an event occurs. Camera phones and portable satellite links increasingly allow for the mobile transmission of images from almost any point on the earth. There is some concern by news photographers that the profession of photojournalism as it is known today could change to such a degree that it is unrecognizable as image-capturing technology naturally progresses. Staff photojournalism jobs continue to dwindle in the 2010s and some of the largest news media outlets in the U.S. now rely on freelancers for the majority of their needs. For example, in 2016, the New York Times employed 52 photo editors and relied on freelancers to provide 50 percent or more of its visuals; The Wall Street Journal employed 24 photo editors and relied on freelancers for 66 percent of its features imagery and 33 percent of its news imagery; The Washington Post employed 19 photo editors and relied on freelancers for 80 percent of its international news imagery, 50 percent of its political news imagery, and between 60 and 80 percent of its national news imagery. The age of the citizen journalist and the providing of news photos by amateur bystanders have contributed to the art of photojournalism. Paul Levinson attributes this shift to the Kodak camera, one of the first cheap and accessible photo technologies that "put a piece of visual reality into every person's potential grasp." The empowered news audience with the advent of the Internet sparked the creation of blogs, podcasts and online news, independent of the traditional outlets, and "for the first time in our history, the news increasingly is produced by companies outside journalism". Dan Chung, a former photojournalist for The Guardian and Reuters, believes that professional photojournalists will have to adapt to video to make a living. Most digital single lens reflex bodies are being equipped with video capabilities. Phone journalism is a relatively new and even controversial means of photojournalism, which involves the use of pictures taken and edited on phones by professional or non-professional photographers. In recent years, as social media has become major platform on which people receive news and share events, Phone photography is gaining popularity as the primary tool for online visual communication. A phone is easy to carry and always accessible in a pocket, and the immediacy in taking pictures can reduce the intervention of the scene and subjects to a minimum. With the assistance of abundant applications, photographers can achieve a highly aesthetic way of conveying messages. Once the pictures are uploaded onto social media, photographers can immediately expose their work to a wide range of audiences and receive real-time feedback from them. With a large number of active participants online, the pictures could also be spread out in a short period of time, thus evoking profound influence on society. Having noticed the advantages of the combination of social media and Phoneography, some well-known newspapers, news magazines and professional photojournalists decided to employ Phone journalism as a new approach. When the London Bombings happened in July 2005, for the first time, both the New York Times and the Washington Post ran photos on their front pages made by citizen journalists with camera phones. As work of witnesses and survivors, the images were less the outcome of documentary intent than a response to a traumatic shock. These photos represented 'vivid, factual accounts of history as it explodes around us', as described by Washington Post journalist Robert MacMillan. In another instance, when superstorm Sandy hit the East Coast, causing great damage and casualty, Time sent out five photographers with iPhones to document the devastation. Photographers dived deep into the site and captured pictures in close proximity to the storm and human suffering. One of the shots, raging ocean waves collapsing on Coney Island in Brooklyn, taken by Benjamin Lowy, made the cover of Time's November 12 issue. Then in 2013, the Chicago Sun-Times got rid of its entire staff of 28 photographers, including John H. White, a Pulitzer Prize winner in photography. The newspaper cited viewers shifting towards more video as a reason. They then employed freelance photographers and required them to train in how to use an iPhone for photography to fill the gap. Some viewers online were quick to point out an at times reduction in quality in comparison to the newspaper's previous full-time professionals. - VII Photo Agency - Associated Press - JPG (magazine) - List of photojournalists - Magnum Photos - Photo caption - ZUMA Press - History of Spanish photojournalism - Laurel Brake; Marysa Demoor; Margaret Beetham (2009). Dictionary of Nineteenth-century Journalism in Great Britain and Ireland. Academia Press. p. 495. ISBN 9789038213408. - "Barricades in Rue Saint-Maur-Popincourt, 25th June 1848". PBS LearningMedia. Retrieved 9 December 2017. - Hudson, Berkley (2009). Sterling, Christopher H. (ed.). Encyclopedia of Journalism. Thousand Oaks, Calif.: SAGE. pp. 1060–67. ISBN 978-0-7619-2957-4. - Keith Hayward; Mike Presdee (2010). Framing Crime: Cultural Criminology and the Image. Routledge. p. 38. ISBN 9780203880753. - Harding, Colin (11 November 2012). "Photographing Conflict: Roger Fenton and the Crimean War". National Science and Media Museum blog. National Science and Media Museum. Retrieved 1 May 2020. - Carlebach, Michael L. (1992). The Origins of Photojournalism in America. Smithsonian Institution Press. ISBN 978-1-56098-159-6. - Elliott S. Parker (1977). John Thomson, Photojournalist in Asia, 1862–1872. - "The photographs of John Thomson". National Library of Scotland. - Ovenden, Richard (1997). John Thomson (1837–1921) Photographer. Edinburgh: National Library of Scotland. p. 42. ISBN 978-0114958336. - "Welcome to... / Bienvenue r". Collections.ic.gc.ca. 2001-05-01. Archived from the original on 2011-11-03. Retrieved 2011-12-10. - Vaughan, Thomas (1989). "C.S. Fly Pioneer Photojournalist". The Journal of Arizona History (Autumn, 1989 ed.). 30 (3): 303–318. JSTOR 41695766. - "Mary "Mollie" E. Fly (1847–1925)". Archived from the original on 23 October 2014. Retrieved 22 October 2014. - How the Other Half Lives complete text and photos online - Robert Taft, Photography and the American scene: A social history, 1839–1889 (New York: Dover, 1964), 446 - Campbell, W. Joseph (2004). "1897 American journalism's exceptional year". Journalism History. Winter. ISSN 0094-7679. Retrieved 17 April 2013. - Gervais, Thierry (May 2005). "Photographies de presse". Études Photographiques (in French) (16): 166–181. Retrieved 13 June 2012. - Moran, Terence P. Introduction to the History of Communication: Evolutions & Revolutions. Peter Lang Publishing, 2010. p. 181. - Mila Ganeva, Women in Weimar Fashion: Discourses and Displays in German Culture, 1918–1933, Screen cultures, Rochester, New York: Camden House, 2008, ISBN 9781571132055, p. 53. - Mary Warner Marien, Photography: A Cultural History, Upper Saddle River, New Jersey: Prentice Hall, 2002, ISBN 9780810905597, p. 235. - Corey Ross (2008). Media and the Making of Modern Germany: Mass Communications, Society, and Politics from the Empire to the Third Reich. Oxford/New York: Oxford University. p. 30. ISBN 9780191557293. - Brett Abbott (2010), Engaged Observers: Documentary Photography Since the Sixties Exhibition catalogue, Los Angeles: J. Paul Getty Museum, p. 6, ISBN 9781606060223 - Tim Gidal, "Modern Photojournalism: The First Years", Creative Camera, July/August 1982, repr. in: David Brittain, ed., Creative Camera: 30 Years of Writing, Critical Image, Manchester: Manchester University, 1999, ISBN 9780719058042, pp. 73–80, p. 75. - Maria Morris Hambourg, "Photography between the Wars: Selections from the Ford Motor Company Collection", The Metropolitan Museum of Art Bulletin N.S. 45.4, Spring 1988, pp. 5–56, p. 17. - Sherre Lynn Paris, "Raising Press Photography to Visual Communication in American Schools of Journalism, with Attention to the Universities of Missouri and Texas, 1880s–1990s", Dissertation, University of Texas, 2007, OCLC 311853822, p. 116. - "Father of photo-journalism, Cartier-Bresson, dies at 96". The Guardian. - "Erich Salomon, photographer". Eduardo Comesaña. - "Photography exhibit sparks symposium". Abraham Lincoln Brigade Archives (ALBA). - "Underfire: The Untold Story of Pfc. Tony Vaccaro' reveals the intimate relationship between a war photographer and war itself". LA Times. - Stovall, Jim (2005). "Magazines and Photojournalism's Golden Age". Jprof.com. Archived from the original on 2013-03-09. Retrieved 2012-09-16. - Malo, Alejandro. "Documentary Art". ZoneZero. Retrieved 2010-12-05. - "Historie" (in Danish). pressefotografforbundet.dk. Archived from the original on 2002-06-09. - British Press Photographers Association; Hong Kong Press Photographers Association; Northern Ireland Press Photographers Association Archived 2008-10-19 at the Wayback Machine; (in Swedish) Pressfotografernas Klubb; (in Norwegian) Fotojournalisten. - World Press Photo; Best of Photojournalism Archived 2012-07-22 at the Wayback Machine; Pictures of the Year; The Press Photographer's Year - Thomson, TJ (2018-09-07). "Mapping the emotional labor and work of visual journalism" (PDF). Journalism: 146488491879922. doi:10.1177/1464884918799227. ISSN 1464-8849. - Thomson, T. J. (2019). "SAGE Journals: Your gateway to world-class journal research" (PDF). Journalism & Communication Monographs. 21: 4–65. doi:10.1177/1522637918823261. - USNPPA Code of Ethics - Foreman, Gene (2015). The Ethical Journalist: Making Responsible Decisions in the Digital Age. United States: John Wiley & Sons. p. 354. ISBN 9781119031734. - Kurtz, Howard (2 February 1994). "L.A. TIMES GETS BURNED BY DISASTER PHOTOGRAPH". Washington Post. Retrieved 11 March 2017. - Kenneth Kobre. 2008. Photojournalism: The Professionals' Approach - Anderson, Fay (2014). "Chasing the pictures: press and magazine photography". Media International Australia Incorporating Culture and Policy. 150: 47. doi:10.1177/1329878X1415000112. - Keller, Jared. "Photojournalism in the Age of New Media". theatlantic.com. theatlantic.com. - Quinn, Stephen (2005). Convergent journalism : the fundamentals of multimedia reporting. New York: Peter Lang. p. 35. ISBN 978-0820474526. - "Lament for a Dying Field: Photojournalism," New York Times, August 10, 2009 - Thomson, T. J. (2016-08-12). "Freelance Photojournalists and Photo Editors" (PDF). Journalism Studies. 0 (6): 803–823. doi:10.1080/1461670X.2016.1215851. ISSN 1461-670X. - Paul Levinson. 1997. The Soft Edge: a Natural History and Future of the Information Revolution, Routledge, London and New York, p. 39 - Kovach, B.; Rosenstiel, T. (2006). "The Elements of Journalism; What Newspeople Should Know and the Public Should Expect". journalism.org. Archived from the original on 2013-10-02. - "Gamma's Bankruptcy Shows Shift in Photojournalism". New York Times. August 10, 2009. - dpreview.com 'No Future in Photojournalism' Interview: Dan Chung Barney Britton Feb 10, 2012. - Lavoie, Vincent (2012-05-24). "War and the iPhone". Études Photographiques (29). ISSN 1270-9050. - Channick, Robert (May 30, 2013). "Chicago Tribune". - Beaujon, Andrew (May 31, 2013). "Poynter". - Schiller, Jakob (July 16, 2013). "Wired". - Kenneth Kobre, Photojournalism : The Professional's Approach 6th edition Focal Press, 2008. - Don McCullin. Hearts of Darkness (1980 – much reprinted). - Zavoina, Susan C., and John H. Davidson, Digital Photojournalism (Allyn & Bacon, 2002). ISBN 0-205-33240-4 - The Photograph, Graham Clarke, ISBN 0-19-284200-5 - An Hand Book: Photo Journalism |Wikimedia Commons has media related to Photojournalism.| - Perpignan International Center for Photojournalism - "A Brief History of Photography and Photojournalism, by Ross Collins, North Dakota State University, Fargo - La Bruja, Cuba – an example of photojournalism - An example of ethics guidelines for photo-journalism by DigitalCustom - Photojournalism article at the Victoria and Albert Museum website - The British Press Photographers' Association - Gaia – Photojournalism from around the world - How To Become a Photojournalist, CubReporters.org - Photojournalism at norcc.org - Pressphotos freelance photographers associations around the world - Women Photojournalists
<urn:uuid:50916e42-795f-4f09-b57b-e603028fa200>
CC-MAIN-2021-10
http://wiki-offline.jakearchibald.com/wiki/Press_photography
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369721.76/warc/CC-MAIN-20210305030131-20210305060131-00380.warc.gz
en
0.921902
7,309
3.359375
3
Weeds are a nuisance whether they are growing on your driveway, patio, on the lawn, or in the soil prepared for planting. If left untreated, they become an eyesore or worse, will strangulate the roots of the healthy plants and grass. You might think that diesel is an effective weed killer, but have concerns over its use. Diesel fuel is toxic to all plant material and, as such, kills any unwanted weeds and grasses. Although it is highly effective when used with extreme care. Accidental spillage or spraying will also cause healthy plants and shrubs to wither and die. Diesel is only effective for one season. The weeds will have already dropped seeds in the soil that are protected by hard husks and shells that the diesel cannot penetrate. Therefore, the following spring, the seeds will germinate, weeds grow, and so the cycle begins again. Table of Contents How to Use Diesel to Kill Weeds The task is best undertaken early in the morning on a still, dry day where no rain is forecast. - Use a funnel to decant diesel from its storage container into a spray bottle. Ensure the bottle has a direct spray function to attack the target area and avoid the surrounding areas. - Diesel has a thick viscosity and requires the appropriate nozzle for the liquid to flow freely. - Get down close to the affected area and spray liberally directly on the roots. If you're aiming at a crack in slabs, apply directly into the gap. - Do not overspray; any excess will run away and potentially kill healthy plants. - Return any unused diesel to the main container. Label the spray bottle to avoid hazardous cross-contamination. The Effect Diesel has on Plants Weed and grass species react differently to diesel; some are more tolerant than others. Rough meadow grasses have a particular intolerance and die off quickly. Some of the hardier, more substantial weeds may require a second dousing if there is no sign of their decline within 24-hours. How Long Before the Diesel Takes Effect You should notice wilting and signs of discoloration within a few short hours of treatment. Wait for 48-hours before clearing the area of any dead weeds; if possible, also remove the top inch of soil. It will not only rid the zone of most of the diesel but also of seeds in the soil. If there has been an accidental spillage of diesel, take at least 6-inches of the contaminated soil. Is Diesel a Permanent Solution to Weed Problems Although toxic diesel kills the leaves, stems, and roots of weeds, the seeds remain. Without the intervention of another weedkilling method, the weeds will return the following season. Any diesel in the soil is either removed when the dead weeds are cleared or washed away, diluting the effectiveness. Traces of diesel remaining in the soil that might otherwise pollute the environment become a source of energy for naturally occurring micro-organisms. This process is known as bioremediation and relies on fungi, bacteria, and yeast to convert toxic substances into less harmful ones. With the soil free from contaminants, seeds can once again germinate. Is it Safe to Use Diesel to Kill Weeds? It is not advisable to use diesel for weedkilling if your property relies on water from a well. If allowed to soak into the soil in great quantities, it will leach into the water supply, causing contamination. Vapors and toxic fumes are harmful to your yard and the environment; if used in the correct manner and quantity, diesel is safe. If you have further concerns, wear a face mask and use the diesel sparingly. Diesel is a combustible liquid with a higher flashpoint than gasoline, which is flammable. Although diesel does burn, it won't burst into flames; instead, it takes time to get going. Diesel should be stored safely, in a cool, dry area, and with a tightly-sealed cap. Only buy and keep as much as you need. When stored and used carefully, diesel is not a fire hazard. Is Diesel Harmful to the Garden Diesel kills anything in its path, including plants and flowers that you wish to keep. We recommend using a different, less intrusive method to remove weeds in flower beds and patches. Using diesel to kill weeds is a double-edged sword; it also kills bugs and micro-organisms in the soil, many of which are beneficial. These life-forms maintain its health and acidity levels, ensuring it is a hospitable place for things to grow. Ways to Avoid Using Diesel as a Weed Killer Establishing a good gardening regime often prevents weeds from growing. - Leave grass longer; the shade creates an environment that weeds find difficult to grow in. - Water deep twice a week. The roots of the grass will grow long and strong, crowding out any germinating weeds. - Try organic methods, such as mulching, solarizing, or using boiled water. - Use two-layers of weed control beneath the bark, stone chippings, paved areas. It is advisable to remove weeds before they cause irreparable, irreversible damage to your yard. Using diesel to kill weeds is a safe and effective method in small areas. However, it isn't a long term solution; other non-toxic methods and products are worthy of consideration. Although using diesel is an inexpensive and effective option to clear weeds from between paving stones and chippings, it renders soil out-of-action for new planting for long periods.
<urn:uuid:fae0581c-c2e7-4b83-9288-a7c1bb0ceeb3>
CC-MAIN-2021-43
https://seedsnflowers.com/does-diesel-kill-weeds/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583408.93/warc/CC-MAIN-20211016013436-20211016043436-00457.warc.gz
en
0.931688
1,163
2.59375
3
Water Sensitive Urban Design is the integration of urban, site & building design with constructed elements that can provide on-site stormwater quality treatment and its re-use in the built form. Why is it important to treat Stormwater? The primary purpose of treating stormwater is to protect surface water and ground waters in our lakes and rivers. The treatment will also help to reduce the effect of peak stormwater flows and protect the surface water from stormwater pollutants. Increased nitrogen and phosphorous in water ways can lead to unwanted growth of algae which can have a detrimental effect on plant life, aquatic life and animals due to a decrease of oxygen levels in water. For example, the STORM tool sets the following criteria as the benchmark against which performance is measured: • Suspended solids (SS) – 80 per cent retention of the typical urban annual load • Total phosphorus (TP) – 45 per cent retention of the typical urban annual load • Total nitrogen (TN) – 45 per cent retention of the typical urban annual load • Litter – 70 per cent retention of typical urban annual load • Flows – maintain discharges for the 1.5 year ARI at pre-development levels When is WSUD report or Stormwater Management Plan needed? The councils of Bayside, Campaspe, Casey, Bass Coast, Monash, Moonee Valley, Yarra, Stonnington, Port Phillip, and Melbourne require any new development which is less than 3 dwellings in a subdivision, extensions which are 50 m² or greater and subdivisions in commercial zones to submit a WSUD report or Stormwater Management Plan. In addition, all CASBE councils will require a BESS assessment which includes the STORM rating What is the difference between a STORM Rating and WSUD Management Plan? A STORM rating is only a component of a WSUD Management Plan. A WSUD Management Plan needs to clearly show the STORM calculation and a site plan which shows the areas included into the calculation and their method of treatment. Furthermore, the rain harvesting and re-use strategy and stormwater maintenance plan are included along with the selected treatment option to deal with run off during construction. Which councils require WSUD reports ? WSUD policies are built into some council’s planning schemes (Bayside, Campaspe, Casey, Bass Coast, Monash, Moonee Valley, Yarra, Stonnington, Port Phillip, and Melbourne) and is a mandatory section in the Built Environmental Sustainability Scorecard (BESS). BESS is a requirement for all CASBE councils within Victoria (There are 19 of them – http://www.mav.asn.au/policy-services/planning-building/sustainable-buildings/council-alliance-sustainable-built-environment/Pages/default.aspx) at the town planning stage of a project. How important is the STORM rating in the BESS tool? Are there any other stormwater management options taken into consideration? Within BESS, Stormwater is a mandatory credit in which you must receive 100% to pass a BESS assessment. The total weighting of the stormwater section is 13.5% of the total score within BESS. It is important to remember that the water section and stormwater section of BESS are different mandatory credits (water requires a minimum 50% score to pass BESS). However, they are interrelated as the water section of BESS relates to potable water use reduction and stormwater treatment options (ie rainwater storage and reuse) have a big impact on this. What are the most common strategies used to treat stormwater? Common treatment methods include collecting rainwater from roofs and storing in rainwater tanks which can then be used to flush toilets or irrigate landscaped areas, or raingardens which treat water run-off from hard surfaces such as driveways and pathways before discharging it to the municipal stormwater system. Other options for water treatment which are less common for typical residential stormwater treatment but may be applicable in either are ponds, wetlands, buffer strips, sandy loams and gross pollutant traps. industrial or municipal stormwater systems.In some very large developments where a STORM rating of 100% cannot be achieved or is not practical, there is an option to pay a one-off Melbourne Water contribution to the creation of wetlands. If complying via this method, you will need council approval. Are there any issues with certain strategies? All stormwater syStem treatments require regular maintenance depending on the type of treatment. In the case of rainwater harvesting systems., roofs should be periodically cleaned to remove debris and stop any potential blockages in the piping of the system. With regard to rainwater systems, sludge will accumulate in the tanks over time.That being said, sludge and biofilm is part of the purification process which occurs within the tank therefore it should only be removed when it is smelly or affecting the water quality. only occurs when the tank level is Discoloured water or malodorous water is drawn from the sludge level. Only professional tank cleaners should clean rainwater tanks. In the case of raingardens, filter media should be typically recommended to be inspected every 3 months and also after significant storm events for sediment build up at inflow and outlet points. Plants need to be checked periodically for overall health and general weeding should be carried out regularly. An annual test for adequate flow should also be undertaken. How does a raingarden work? Raingardens ideally contain drought tolerant plants which help filter stormwater (reducing nitrogen, phosphorus and suspended solids) run off before it enters our water ways. Storm water runs into the rain garden where it goes through a filter media which the plants are embedded. A filter media ensures that the stormwater drains before the stormwater enters waterways. Where can I find more information about raingardens? Melbourne Water has all the information relating to rain gardens and how to build and maintain them SUHO has a wide range of experience producing WSUD reports and BESS assessments for projects in the planning stage whilst providing practical and cost effective solutions with developers & architects. For more information about the various options give us a call.
<urn:uuid:d346e810-b771-4a93-a274-2a291382297a>
CC-MAIN-2017-34
https://suho.com.au/water-sensitive-urban-design-wsud/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105700.94/warc/CC-MAIN-20170819162833-20170819182833-00278.warc.gz
en
0.920666
1,301
2.65625
3
Subject: Water - drinking cold water instead of hot to aid in weight loss. Date: Tue Feb 20 09:23:43 2001 Posted by Brenda Grade level: 7-9 School: Sunderland Public School City: Sunderland State/Province: Ontario Area of science: Biochemistry I am a 12 year old female. I am attending TOPS (eating sensibly to held loose weight). I was told that drinking 4 cups of COLD water 1/2 hour before breakfast and lunch and 4 cups COLD water 1 hour before dinner better aided in weight loss RATHER THAN drinking HOT water. Why does cold water aid in loosing weight rather than hot water? Re: Water - drinking cold water instead of hot to aid in weight loss. Current Queue | Current Queue for Biochemistry | Try the links in the MadSci Library for more information on Biochemistry. MadSci Home | Information | Random Knowledge Generator | MadSci Archives | Mad Library | MAD Labs | MAD FAQs | Ask a ? | Join Us! | Help Support MadSci © 1995-2001. All rights reserved.
<urn:uuid:0f072275-9e48-4bb0-a42c-fc2c43952d9b>
CC-MAIN-2014-52
http://www.madsci.org/posts/archives/2001-02/983909380.Bc.q.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802773058.130/warc/CC-MAIN-20141217075253-00091-ip-10-231-17-201.ec2.internal.warc.gz
en
0.839527
251
2.953125
3
The figure model of Mr. Lincoln debuted at the State of Illinois Pavillion during the 1964 New York World’s Fair, appearing with other Disney-designed attractions like The Carousel of Progress (General Electric), It’s a Small World (Pepsi Cola), and The Primeval World (Ford Motor Company).The likeness of Abraham Lincoln was created as the first fully functioning audio-animatronic human figure. In a presentation entitled, “Great Moments with Mr. Lincoln”, the moving model of Abraham Lincoln stands, speaks, and gestures to the audience. Walt Disney decided to design attractions for the World’s Fair because he realized that he could promote the technology, knowledge, and engineering skill which would help the theme park industry without using funds from Disney. In addition, the companies agreed to allow Disney to ship the attractions to Disneyland at the fair’s completion. The audio-animatronic Lincoln was manufactured and tested at W.E.D. Enterprises in California before being shipped to New York. Testing was perfect at the studio but upon arrival in New York the equipment failed to operate properly. W.E.D. Designers worked around the clock before the scheduled debut show. When Walt Disney was told that the figure just would not work he went on stage in front of the waiting audience to say that “it just isn’t ready.” Eventually the figure starting responding to its programming and the show could go on. When the fair was over, the figure was shipped back to California. “Great Moments with Mr. Lincoln” first opened at Disneyland on July 18th, 1966. Again, problems arrived with the figure. Sometimes, Mr. Lincoln would start having spasms or just bow forward and stop in the middle of the show. Eventually all of these technical problems were worked out. “Great Moments with Mr. Lincoln” is situated at the Main Street Play House on the south end of Main Street near the Bank of Main Street. In the lobby, pre-show exhibits feature Walt Disney. There are mock-ups of his working office, as well as his formal office, in much the same condition as he left them. There is also a short film clip showing the building of Disneyland. Displays include various historical Disneyland items like a bust of Abraham Lincoln sculpted by Imagineer Blaine Gibson, one of the original audio animatronic birds from The Enchanted Tiki Room, and. a scale model of the Capital Building in Washington, D.C.. Upon entering the theater, the show begins with a short film titled “Two Brothers”, detailing the story of two brothers who fought on opposing sides in the Civil War. After the short film a speech, actually given by Abraham Lincoln, is played to artwork of the famous president. Curtains then rise to reveal the audio-animatronic figure of Abraham Lincoln which speaks, stands, gestures and moves. For the conclusion of the show, the song “Golden Dream” plays. As you exit the theater, you will see a giant mural featuring innovators and people who have changed the face of history. In 1973, “Great Moments with Mr. Lincoln” was changed to “The Walt Disney Story featuring ‘Great Moments with Mr. Lincoln.'” The exhibit would feature items which display the heritage and history of the man behind the dream of Disneyland, Walt Disney. Exhibited in the lobby of Great Moments with Mr. Lincoln is Walt Disney’s private and executive offices as they appeared when Walt Disney used them. Everything in them from the carpet to the ceiling tiles are from Walt’s original office in Burbank California. Great Moments with Mr. Lincoln Media: Full Attraction Audio to “Great Moments With Mr. Lincoln.”
<urn:uuid:621c35bc-1f42-4899-a4ec-3b3deb6dc37b>
CC-MAIN-2020-29
http://www.justdisney.com/features/great_moments_with_mr_lincoln/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655883439.15/warc/CC-MAIN-20200703215640-20200704005640-00236.warc.gz
en
0.961701
789
2.890625
3
Right foods is the only answer to your question on how to improve gut health. Digestive problems are very common in our society and they cause a considerable amount of discomfort and pain, and lead to a poor quality of life. Problems such as irritable bowel, constipation, diarrhea, bloating, gas, heartburn and reflux are now present in 1 out of 3 people and are becoming increasingly prevalent. Some of the top selling drugs in America and other western countries are for digestive problems – these health issues literally cost us billions of dollars every year. There are more than 200 over-the-counter (OTC) remedies for digestive disorders, many of which can create additional digestive problems. Visits to doctors for intestinal and digestive problems are on the rise and are exceedingly common. However, I have much worse news for you if you thought that digestive problems are merely limited to those listed above. Problems in your gut can and do lead to systemic and serious health conditions such as arthritis, allergies, eczema, psoriasis, auto immune diseases (crohn’s disease, graves thyroid disease), asthma, autism, dementia, memory problems and even cancer. A Healthy Gut Critical For Good Systemic Health You see your gut or intestinal tract (small and large intestine) is merely an extension of your skin. If you think about it, your gut is directly connected to the outside world – and it is because of this fact that potential problems can and do occur. Your gut is then not just responsible for digestion of food and nutrients, but it is linked to your whole body in many ways and is critical for your entire health. An unhealthy gut will lead to numerous problems within the body, some of which may seem completely unrelated to the gut. Almost always, when people tell me that they have chronic health problems they will have a gut related problem, which is contributing greatly to their poor health. And in many cases, once the complete gut is cleansed and healed, a marked in improvement in their overall health results. In short, you need to have a close look at your gut if you have any long term persistent health problem. Later I will tell you how you can heal your gut for perfect health. Immune System In Your Gut The largest part of the immune system in our body is in the mucosal lining in the gut. Our immune system is responsible for keeping out any harmful substance, whether it be a bacteria, a virus, a fungi or a toxin, from crossing the gut wall and getting into the bloodstream where it could potentially circulate all over the body causing harm. Your gut is permeable to some extent as it must allow the absorption of nutrients ingested to get through into your blood, where they can be used for energy and other bodily functions. “A healthy gut will only allow the absorption of necessary nutrients and will keep out toxins, allergens and microbes. A healthy gut is therefore of prime importance too, and is directly linked to the health of the entire body.” Your entire immune system (and your body) is protected from the all the bugs and toxins in your gut by a very thin layer which is only 1 cell thick. This delicate 1 cell layer is all that is between your body and the sewer system that is your gut! If this thin layer becomes damaged in any way, there is the potential for toxins, bacteria, virus, fungi (candida) and foreign proteins (i.e, gluten) to enter your blood. When this happens, your immune system (which is very prominent in your gut and ready for action) then kicks into gear and mounts an immune reaction in order to protect you from the breach in security. This is when major systemic problems start in other parts of the body that seem completely unrelated to your gut. The results of this over-reactive immune system are inflammation throughout the body. It is inflammation which is responsible for arthritis, allergies, eczema, heart disease, alzheimer’s, and even cancer. It is inflammation which leads to a rapid aging of the body and organs. Your gut is the key for regulating inflammation within your body, and a healthy gut is very important for reducing or even eliminating inflammation. Why Is Your Gut Unhealthy? In the world we live in it is easy to see why so many people have problems with their gut or digestive system. The main causes of an unbalanced or sick gut are: - A low fiber, processed food and nutrient poor diet that contains too many carbohydrates and sugars. This is a breeding ground for unhealthy bacteria and fungi or yeast to grow in the gut, which leads to a poorly functioning gut with a damaged lining. Hence, local inflammation starts and often becomes systemic. - Medications can directly damage the gut wall as well – like anti-inflammatory drugs, antibiotics, acid blocking drugs, and steroids. Anyone that has taken these drugs in the past is highly likely to have a damaged gut. - Alcohol can also lead to a damaged gut wall leading to inflammation and to a leaky gut syndrome. - Chronic low-grade infections or gut imbalances – the proliferation of harmful bacteria in the small intestine, yeast overgrowth or parasites etc, can lead to a damaged gut. The toxins released by these pathogens can also potentially find their way into the blood stream if there is a breach in the 1 layer thick protection barrier. - Toxins damage the gut such as mercury, and mold toxins. Toxins damage the delicate gut lining, leading to inflammation and system toxicity. - Poor digestive enzyme function – which can come from acid blocking medication, zinc deficiency, or with advancing age. If food cannot be broken down then the large proteins may be absorbed through the gut wall leading to further immune reactions. Once again inflammation is the result! - Stress can directly inhibit the gut nervous system causing a leaky gut and change the normal bacteria in the gut. As I have mentioned, it is so imperative to know that many diseases that seem totally unrelated to the gut, such as psoriasis, arthritis or auto immune disorders, are actually caused by gut problems. So How Do You Make Your Gut Healthy? The first and most important step is to perform a complete Gut Cleansing & Healing Program – to undo the damage caused by years of neglect and abuse to your gut from poor nutrition, stress, alcohol, drugs, and other factors, your gut (small and large intestines) needs a complete clean out from top to bottom. Neogen Anti Aging has the latest medical gut cleansing & healing program available that will give you the ultimate gut cleansing and rebuilding experience for much improved health and vitality. This program will, - Remove any infections or overgrowth of bugs like parasites, small bowel bacteria or yeasts – these cause massive inflammation so by eliminating them you are well on your way to much improved gut and body health. - Remove the long term toxicity in your gut from toxins using ozone colon hydrotherapy and other methods – chronic toxicity in the bowel is the cause of many health problems. Once your gut is clean, you will feel and look much healthier. - Improve digestion and breakdown of your food – eliminate bloating and reflux, and reduce inflammation. - Provide high dose live probiotics from a coconut water fresh ferment, to re-colonize your gut with the healthy bacteria required for excellent gut health. - Reduce inflammation using anti inflammatory natural nutrients. - Repair your gut wall using natural gut repairing nutrients. For more information on gut cleansing and health, whole body ozone therapy, whole body detoxification, stem cell therapy, cancer, heart disease, arthritis, and diabetes reversal programs feel free to contact me at firstname.lastname@example.org Dr Theodore is an Australian Medical Doctor now living in Asia. His Major Specialties are; Anti Aging Medicine, Whole Body Detoxification, Stem Cell Therapy, Whole Body Ozone Therapy, Bio Identical Hormone Replacement Therapy, Heart Disease Reversal, Holistic Cancer Therapy, Diabetes Reversal, Natural Health and Healing, Male & Female Sexual Enhancement, Fat Loss and Body Re-Sculpting, Exercise With Oxygen Therapy, Metabolic Typing Nutritional Programs, Life Coaching, Pranic & Raja Yoga, Mantra Meditation and Spiritual Guidance. He has trained in Australia and also in the USA (Boston, Chicago, LA) and Europe. He is the Founder of the Asian Society of Anti Aging Medicine (ASOAAM), and a Member of the American Academy of Anti Aging Medicine and the World Anti Aging Academy of Medicine. He is a Lecturer and Trainer in Anti Aging Medicine, Whole Body Ozone Therapy, Whole Body Detoxification, Natural Health and Healing. Article Source: http://EzineArticles.com/4591434
<urn:uuid:96180b3c-2daf-4990-9737-a0b1770a1d56>
CC-MAIN-2021-43
https://patientcast.org/heal-your-gut-heal-your-body/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585348.66/warc/CC-MAIN-20211020183354-20211020213354-00295.warc.gz
en
0.928695
1,808
2.609375
3
Dire winter triggers livestock disaster in Mongolia 21 000 families at risk of food insecurity and poverty Beijing/Ulaanbaatar, 2 February 2010 – Temperatures plunging to -50°C have killed 1.7 million head of livestock in Mongolia, threatening the livelihoods of 21 000 herder families and putting them at risk of food insecurity, FAO warned today. An FAO rapid needs assessment on the impact of the disaster has found that urgent external assistance of some $6 million is needed over the next two to three months to help the herders make it through to spring. A spell of intense cold, with temperatures plummeting to minus 40-50°C followed a very dry and long summer and autumn which produced insufficient fodder to feed livestock during the winter months. Such extreme weather is known locally as a Dzud. More deaths feared The ongoing Dzud has resulted in huge livestock losses, with 1.7 million deaths counted as of 31 January. If current conditions persist, the government estimates that losses could reach 3-4 million head of livestock by spring. One third of the population of Mongolia lead nomadic lives and depend entirely on livestock for a living. Their cattle, sheep, goats, horses and camels are the main household asset and are perishing from cold, exhaustion or starvation. Total economic losses so far are estimated at $62 million. Also, substantial numbers of wildlife are dying. Fourteen of Mongolia’s 21 provinces are considered seriously affected. According to the FAO assessment mission, in eight provinces 21 000 herder families owning between 100 and 300 head of livestock each have lost more than 50 percent of their herds. The affected families face increased levels of food and livelihood insecurity as their cash income rapidly declines and prices of fodder climb sharply compared to last year. If assistance is not provided soon, the mission warned, spreading poverty will lead to mass migration to the cities later this year. The FAO mission stressed the urgent need to strengthen household food security for the most vulnerable families to prevent further loss of their assets, and proposed immediate livestock input support for the most vulnerable herders as a top priority. In parallel, fodder, supplementary feed and veterinary care is urgently needed for weak and stressed animals until mid-April, with funding requirements of $6 million. Detailed project profiles are under preparation for submission to donors. FAO's Animal Production and Health Commission for Asia and the Pacific has provided 5 000 doses of medicinal food supplement for dairy cows, pregnant heifers and young bulls as immediate assistance. Medium-term interventions should focus on disaster preparedness and risk reduction plans and strategies, and FAO is ready to provide assistance to the country as required. Mongolia covers an area of 1.6 million square kilometers, an area roughly the size of Western Europe. The FAO mission visited Mongolia from 27 January to 1 February.
<urn:uuid:c04f3e80-51f5-4b4e-a97c-a93391bf5031>
CC-MAIN-2015-06
http://www.fao.org/news/story/en/item/39634/icode/
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122691893.34/warc/CC-MAIN-20150124180451-00195-ip-10-180-212-252.ec2.internal.warc.gz
en
0.945483
594
2.59375
3
Water bodies across the state of California are listed under Clean Water Act section 303(d) as mercury-impaired. Consumption of contaminated fish is the primary pathway of human exposure to mercury, a developmental neurotoxin, and sensitive populations including infants, children, and pregnant women are at greatest risk for exposure. The Office of Environmental Health Hazard Assessment (OEHHA) has issued both site-specific and statewide fish consumption advisories in an effort to provide healthy eating guidelines for people who consume locally caught fish. However, it is not currently mandated that waterbody managers post this information, even though the consumption of contaminated fish may pose an imminent threat to public health. In the Sierra Nevada region TSF has posted applicable fish consumption advisories annually since 2015 through our volunteer “Post It Day” effort to increase access to this important information. Unfortunately, in many areas of the state fish advisories are posted haphazardly or not at all. Inconsistency in posting may lead anglers to believe that a waterbody without a posted advisory contains fish that are safe to eat, which is often not the case. The next step in advancing the Post It Day project and our effort to reduce mercury exposure is to work toward consistent, statewide posting of fish consumption advisories at all California water bodies. This Spring, California Assemblymember Bill Quirk introduced Assembly Bill 762 to improve statewide access to information about healthy eating guidelines for populations that consume locally caught fish. The bill would require local health officers to post health warnings upon the issuance of a site-specific fish or shellfish advisory. This strengthens language contained in the Water Code (Division 7, Chapter 3, Article 4 Section 13177.5 (e)) which urges health officers to post health warnings pursuant to a health advisory. Assembly Bill 762 would require fish advisories to be posted at specified locations, and would require local health officers to coordinate with the State Department of Public Health, the Department of Fish and Wildlife, and the appropriate Regional Water Quality Control Board to identify appropriate posting locations and signage. This bill has passed the Assembly Environmental Safety & Toxic Materials Committee and is moving through the system. We are working closely with Dr. Quirk to ensure that his bill is enforceable, effective and successful. To facilitate this effort, on May 23rd, staff of TSF traveled to the State Capitol, where we convened a special meeting of our Headwater Mercury Source Reduction (HMSR)Technical Advisory Committee (TAC) on the topic of Mercury Exposure. The TAC examined best-practices for risk communication and leveraged the expertise of public health officials, agency leaders, outreach experts and on-the-ground stakeholders to evaluate the pros and cons of different implementation approaches for requiring the posting of state-issued fish consumption advisories. In attendance were 22 representatives from key stakeholder groups including the Office of Environmental Health Hazard Assessment, California Department of Public Health, California Department of Conservation, Delta Mercury Exposure Reduction Program/Sacramento-San Joaquin Delta Conservancy, California Department of Water Resources, UC Merced , CSU Chico, Central Valley Regional Water Quality Control Board, San Francisco Bay Regional Water Quality Control Board, several consulting firms and NGOs, and State Assemblymember Bill Quirk and staff.
<urn:uuid:9fcf6a32-55a8-48c8-9bc4-107f112a5938>
CC-MAIN-2021-04
https://sierrafund.org/mercury-exposure-tac/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517966.39/warc/CC-MAIN-20210119042046-20210119072046-00723.warc.gz
en
0.941407
663
2.6875
3
Democracy in America A list of listing buildings THE British Parliament's Clock Tower (more commonly known as Big Ben) is leaning north-west by 0.26 degrees, or 17 inches (43.5cm), according to documents that were recently made public. But Big Ben isn't alone; architects have been correcting the Leaning Tower of Pisa since the 1170s when it was still being built. Germany's Leaning Tower of Suurhusen, which at an angle of 5.19 degrees holds the Guinness World Record for the most tilted tower in the world, dates back to the 1450s. In modern times, many buildings have been designed at a deliberate slant. The 165-metre Montréal Tower, finished in 1987, is the world's tallest man-made leaning tower and inclines at a 45-degree angle. In 1996, the Puerta de Europa in Spain was completed with two towers sloping towards each other at a 15-degree angle. Late this year the Capital Gate is set to be finished in Abu Dhabi at a slant of 18 degrees. Clarification: The Montréal Tower was finished in 1987, not built then, as we originally stated. This was changed on October 25th 2011.
<urn:uuid:3c74a1e7-c910-4b16-9fd8-4ccf396062a1>
CC-MAIN-2015-06
http://www.economist.com/blogs/dailychart/2011/10/leaning-buildings
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422121981339.16/warc/CC-MAIN-20150124175301-00146-ip-10-180-212-252.ec2.internal.warc.gz
en
0.981225
257
3.234375
3
To introduce plotting scatter graphs and understanding correlation I ask students to think about the relationships between different variables and to describe how they might be related. Here’s my starter activity which students discuss in pairs then present to me on mini-whiteboards. When the students have had time to discuss the matching pairs we talk about how each graph is likely to look if we were to plot eight typical samples. As we begin the first example we discuss the type of relationship we expect to see when time spent reading is plotted against time spent watching TV for a sample of ten people. The consensus is the more time people spend reading the less time they are likely to spend watching TV. I ask the class to sketch on their mini-whiteboards what the scatter graph might look like if our hypothesis is correct. For the first couple of examples I provide the scaled axes for the class. In later examples on plotting scatter graphs and understanding correlation I expect students to choose and draw their own axes on A4 graph paper with appropriate scaling. When we have plotted the points, I introduce the term correlation as a means to describe the relationship between two variables. There are two types of correlation. If two variables are not related the points will be scattered so no correlation is apparent. A line of best fit can be used to clearly illustrate the directional trend of the data. The closer the points are to the line of best fit the stronger the correlation. We discuss the strength of the correlation as an indication of how closely two variables are related. The line of best fit also helps to predict the value of one variable when the other is known. It is noted in several examiners reports by AQA and Edexcel that students are more likely to correctly estimate the value of a missing data point and identify anomalous data points if they use a line of best fit. In my experience, there are three main misconceptions when drawing lines of best fit. The line of best fit connects to the origin. The line of best fit is drawn as a line segment connecting the extreme value to the origin. The line of best fit passes through each of the points. As an extended plenary I challenge the students to create a scatter graph based on their own hand and foot size. Before we collect any data, I ask the students to write down their own hypothesis at the top of the A4 graph paper. This is a fun activity which requires the group to work together so everyone has everybody else’s data. Whenever I do this it amazes me which student steps up to take charge of organising everyone. I do my best to keep out of the way and let the students manage the data collection so it is fair and accurate. In the next lesson we go on to discuss the limitation of using scatter graphs and correlation to identify causation. We consider examples such as the number of ice creams sold and drownings would correlate in the summer months as increased temperatures causes people to go swimming and eat ice cream. However, eating ice creams do not cause people to drown. My name is Jonathan Robinson and I am passionate about teaching mathematics. I am currently Head of Maths in the South East of England and have been teaching for over 15 years. I am proud to have helped teachers all over the world to continue to engage and inspire their students with my lessons. Higher GCSE maths students are required to plot and interpret histograms with unequal class widths. Drawing histograms with unequal class widths are very common in GCSE maths papers. Using the rules of indices students learn how to evaluate expressions in index notation. Four new problem solving lessons to develop student’s mathematical reasoning and communication skills. How to teach performing and describing negative scale factor enlargements.
<urn:uuid:dff58378-deaf-4ce8-929d-12580a61a036>
CC-MAIN-2020-50
https://mr-mathematics.com/plotting-scatter-graphs-and-understanding-correlation/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141197278.54/warc/CC-MAIN-20201129063812-20201129093812-00277.warc.gz
en
0.947285
765
3.890625
4