text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
1.08k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
• The world’s first gay wedding took place at midnight on 1 April 2001, when Amsterdam Mayor Job Cohen married four same-sex couples. • Between 1 April 2001 and 1 January 2011, there were a total of 14,813 same-sex marriages in the Netherlands. The number of marriages between two women (7,522) was slightly higher than those between two men (7,291). In the same period, there were 761,010 marriages. • During that period, there were 1,078 same-sex divorces in the Netherlands, two-thirds of them between women (734), and 323,549 divorces in general. • Ten countries have legalised same-sex marriage: the Netherlands, Belgium, Spain, Canada, South Africa, Norway, Sweden, Portugal, Iceland and Argentina. In the United States it has been legalised in five states: Connecticut, Iowa, Massachusetts, New Hampshire and Vermont, as well as Washington, D.C.. In Mexico it has been legalised in Mexico City. • The total number of same-sex marriages in these countries is not clear. In many relevant statistics are not available, and in some such unions were only legalised last year. In Belgium there were 13,055 same-sex marriages between 2004 and 2009. Ten years after the Netherlands became the first country to legalise same-sex marriage, homosexual couples still marry far less often than heterosexual couples, partly because they still face obstacles when they wish to have children. Just 20 percent of Dutch homosexual couples are married, compared with 80 percent of heterosexual couples, fresh figures by Statistics Netherlands show. Since 1 April 2001, when the Netherlands became the first country to legalise same-sex marriage, some 15,000 gay and lesbian couples have tied the knot. That is two percent of all marriages celebrated in Holland, and just 20 percent of the 55,000 same-sex couples the country numbers. Among the country’s 4.1 million heterosexual couples, 80 percent are married. Divorce among same-sex couples accounts for one percent of all divorces. Marriage for love “The figures show that over the past ten years gay and lesbian couples have been behaving the same way as straight couples”, demographer Jan Latten of Statistics Netherlands says. “Many of them marry out of love, of course. But, just as with straight couples, the desire to have children and the resulting legal responsibilities often weigh even more for gay and lesbian couples. This could explain why gay couples marry less often than straight ones. Gay couples, especially gay men, still face considerable difficulties when they want to adopt children.” The similarities between gay and lesbian couples do not end there. “Some relationships last, other ones end”, Latten says. “But annual divorce percentages are pretty much the same for both groups”. And both gay and straight couples prefer to tie the knot in the spring or the summer. © Radio Netherlands Worldwide
<urn:uuid:23b21fe6-4fb4-48b5-9008-a59c5f68c4c8>
CC-MAIN-2014-35
http://www.rnw.nl/english/article/ten-years-same-sex-marriage-a-mixed-blessing
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500832155.37/warc/CC-MAIN-20140820021352-00005-ip-10-180-136-8.ec2.internal.warc.gz
en
0.952015
624
2.890625
3
Tim Paul Sr. is among the dozens of Nuu-chah-nulth soldiers who served the Allied forces during World War II. (Supplied photo) There is a postage stamp of green that lies amid the myriad of farm crops near a small French town off of the coast of Normandy. It is Bretteville-sur-Laize, a well-kept cemetery decorated with a large Canadian flag at its entrance. It contains the mortal remains of nearly 3,000 Canadian soldiers that died in the Battle of Normandy during World War II. Among the uniform rows of white headstones is one that bears the inscription: K.4147 Private E.J. Clutesi, The Calgary Highlanders, 29th August 1944 Age 26. Beneath the cold, statistical data are the heart-melting words: God alone knows how much I miss you. Remembered by your mother. His military records say he was a Hupacasath man (he may have been Tseshaht) when he fell with four buddies in the Battle of Normandy, but to his mother, Mabel Yukum, Edward John Clutesi was her beloved son. Despite the fact that his grave is halfway around the world, it is lovingly tended with a pillow of tiny purple flowers and surrounded by well-manicured lawns. When it comes to paying respects to fallen soldiers, there is no discrimination in a war veteran’s cemetery. Edward Clutesi died near the end of the Second World War in the Battle of Normandy. It was the battle that brought about the eventual surrender of Nazi Germany just months after Clutesi died. There were other Nuu-chah-nulth men that crossed the ocean to fight in World War II. Tim Paul Sr., a gunner, was sent to Normandy, where one of the largest amphibious military strikes in history took place. More than 156,000 British, American and Canadian troops landed on a 50 mile stretch of heavily fortified coastline. The Battle of Normandy, which lasted from June 1944 to August 1944, resulted in the Allied liberation of Western Europe from Nazi Germany’s control. With the Allied forces driving the Germans out of France and the Russian forces coming from the east, Nazi Germany was hemmed in with nowhere to go. On May 8, 1945, the Allies formally accepted the unconditional surrender of Nazi Germany. Tim Paul Sr. landed on the beaches of Normandy and needed to scramble up the sandy hills under enemy fire. Tim and his partner veered off to the side where they found a trail, two others from their company came up behind them, passed them and went up ahead. “The two that went ahead were blown to smithereens, and they (Tim and his buddy) saw that,” said Tim Paul, of his father. When Paul arrived home from the war he had to board the Princess Maquinna back home to Ceepeecee. “It was a real nice place back then and everyone came from all around to welcome him home,” recalled Tim Jr. There were once family photographs of the home-coming and they danced the kwii-kwathla (sparrow dance); they were really celebrating,” Tim fondly remembered. Even though Tim Sr. didn’t talk much about his experiences in the war, the family knew there were lasting effects. According to Tim Jr., a family member invited his father to a war movie and the very thought of it caused his father to tremble. “Every Remembrance Day he would wear his medals and watch the Remembrance Day events, he would be quiet, solemn,” recalled the younger Tim, whose brother Floyd, he later learned was named after his father’s war buddy. David Williams said his father’s full name was Frank Davis Williams Sr. “He was from Checklesaht but Ahousaht became his home,” said David. Indeed, Frank Sr. was an Ahousaht member at the time of his passing and his name is included on the memorial cairn at Ahousaht, with their other war veterans. It has been said that Frank Williams was injured during his time in the war. Two family members of other Nuu-chah-nulth war veterans recalled the story for Ha-Shilth-Sa. “Frank was hit in the legs almost right away,” said Tim Paul, sharing a story from his late father. Cody Gus also remembered the story. He said Frank was related to his wife and she said he had the bullets in his legs for decades. “I was so proud of him. You see, this is where I got the courage to stop drinking and drugging,” said David, of his father Frank Williams. David now volunteers his time for Victoria-area service organizations that deliver support services to the needy. Tseshaht elder Cody Gus says he remembers a lot of the Nuu-chah-nulth war veterans. Three of his older brothers served in WWII. Cody recalls being a young boy in Alberni Indian Residential School and seeing the veterans dressed in their uniforms on special occasions. He and the other AIRS students were transferred to Ahousaht Indian Residential School in 1938 after his own school burnt down for the second time. It was in Ahousaht that he got to know the war veterans from there. Gus said that his brother Fred and Oscar Gray of Pacheedaht were in the same station with the U.S. forces and were deployed to Japan. “They were on their way over, then the bomb dropped and so they turned around and came back,” said Gus. In Aug. 1945 the United States dropped two atomic bombs on the Japanese cities of Hiroshima and Nagasaki, effectively bringing to an end, World War II. “The explosion wiped out 90 percent of the city and immediately killed 80,000 people; tens of thousands more would later die of radiation exposure," states History.com. "Three days later, a second B-29 dropped another A-bomb on Nagasaki, killing an estimated 40,000 people. Japan’s Emperor Hirohito announced his country’s unconditional surrender in World War II in a radio address on August 15, citing the devastating power of “a new and most cruel bomb.” When asked why his brothers joined the military Gus said it was because they were drafted. Conscription, or drafting, is the compulsory enlistment of people in a national service. At that time, when one was called upon by the government to enlist in military services, they had no choice but to go. And there was another way aboriginal men were compelled to enlist. According to Gus, it was unlawful for Native Americans to drink alcohol or be intoxicated in public during the WWII era. Young aboriginal men caught drinking would be forced into military service or go to prison. Given the chaotic nature of war, there is no way of knowing the precise number of casualties in a battle. What is known is that more than 425,000 Allied and German troops were killed, wounded or went missing during the Battle of Normandy. That is nearly half a million people in one battle alone. Paul said that his father looked at it as his duty to defend what we have. “We may not have had it as good (as other Canadians) but we could have all ended up being German,” said Paul. Tim Paul recalls how his father quietly contemplated his time in Normandy; “He never liked the idea of killing and used to say, I hope I just got them in the legs and I hope they will be okay.” “It wasn’t their fault, they had no choice,” said Cody Gus.
<urn:uuid:a40f5b8d-996d-4d3b-a549-c3b199ef8512>
CC-MAIN-2018-26
https://www.hashilthsa.com/news/2017-11-10/theres-no-discrimination-war-veteran%E2%80%99s-cemetery-loving-memory-nuu-chah-nulth
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865438.16/warc/CC-MAIN-20180623225824-20180624005824-00072.warc.gz
en
0.988885
1,626
2.53125
3
Our goal is to simplify the information gathering and evaluating process. Our approach is to provide multiple perspectives from leading authorities and varies websites on autism related topics. This will provide our readers the opportunity to gather multiple viewpoints from a single location and form the best-educated decisions for their family’s needs. Disclaimer: The Autism Resource Foundation provides general information to the autism community. The information comes from a variety of sources, and the Autism Resource Foundation does not independently verify any of it, nor does it necessarily reflect the views and/or opinions of the Autism Resource Foundation. Nothing on this website should be construed as medical advice. Always consult your doctor regarding the needs of your family. Puppets, Play Therapy Can Improve Social Skills, Speech for Children with Autism Playing with puppets is an excellent way for children with autism and other special needs to practice spontaneous, imaginary, and symbolic play, which can help bring children who think concretely into the world of abstract concepts and ideas. Play dates can enhance social skills, emotional awareness, and learning, and symbolic play can take learning a step further by enabling kids to take part in scenarios to help them understand how the world works. Children with low verbal skills often undergo intensive verbal behavior analysis, speech therapy, and even oral motor exercises. These therapies are often successful to various degrees, but playing with puppets can also bring out speech development and help kids use what they have learned in a natural environment. In one class, some children spoke more during puppet play than during all other times combined. Emotional engagement and motivation are factors that contribute to potential increases in speech for certain children. Imitation and joint attention, two skills used in play therapy, have been shown to be early indicators of how well children with autism will learn language and other skills. Joint attention occurs when children use eye gaze or gestures such as pointing to communicate with others. Children can use imaginary play to communicate non-verbally through joint attention used during play. They can also begin to use words meaningfully, through emotions rather than through rote memorization. Several studies have shown that symbolic play skills are associated with language abilities in children with autism. The late Dr. Stanley Greenspan, founder of Floortime, wrote in his book Engaging Autism that emotion is critical to early language and cognitive development. “We believe the primary problem in individuals with autism spectrum disorders is a biological difficulty in connecting emotion to motor actions and later to symbols,” Greenspan wrote. “Emotions link different types of mental functioning.” When children are motivated and emotionally engaged, they are more likely to generalize skills learned, or use them in a real world environment. Playing with puppets can foster creativity, which is important for students who receive a steady diet of structured behavioral therapy. Imaginary play can encourage engagement, facilitate interaction, and promote the development of abstract thought. Creative play using puppets and stuffed animals can help children learn in a spontaneous way, which is invaluable because in life kids will have to often react on the fly instead of always having structure as a crutch. Humor and pretend play can help children generalize what they have learned so they can use it socially, and in meaningful ways in natural environments. By role-playing with puppets or stuffed animals, kids may also be able to improve their ability to experience empathy, or theory of mind – the ability to understand what others might be thinking. Another benefit of playing with puppets can be an improvement in fine motor skills as kids use their hands to control the puppets. Children may need a jump-start in acting out with puppets and stuffed animals, but once a facilitator begins activities, a goal should be for children to create ideas in a spur-of-the moment-fashion as much as possible. Therapists and parents can also follow the child’s lead because the child’s actions provide a window into the way he or she thinks, and what motivates the child. Below is a list of potential activities to start with when facilitating play with puppets. There are countless scenarios that can be played out. Puppets these days can be very realistic, but most kids already own stuffed animals that can be used as well. Many similar activities can be done with other toys. - Take an animal puppet and have it pretend to “bite” the child. Give the animal a timeout. Have the animal apologize. For the long version of a humorous routine, click here. (Note that for children who bite other people, this may not be the best scenario unless you use it as a learning tool to have the puppet talk about its feelings as a replacement after initially “biting” another puppet or person). - Have the puppets cheer each other up when one is “feeling sad.” - Sit the puppets in a semi-circle, pretend they are students and have the child pretend to be the teacher. - Set up the puppets at a table and sing “Happy Birthday” to them. Bring in a pretend cake and have one of the puppets blow out the candles. - Have the puppets order food and then eat. - “Whisper” to one of the puppets to chase one of the kids. Have the puppet look at the child, then look back at you, pausing dramatically before chasing. - Have some of the puppets ask the kids to take photos of them, especially if two of the puppets look alike and could be mother and son or brother and sister. - Make the puppets participate in the “Hokey Pokey.” - Have the puppets go to sleep. - Make a face and tell the puppets they have bad breath and have them to brush their teeth. - Throw one of the puppets into a box. If you miss, say, “Ouch!” and tell the puppet it should have worn a helmet. - Have one of the smaller puppets shake and be afraid of one of the larger ones. Have the smaller one stand up for itself to the larger one. - Slowly with anticipation put your finger near an animal puppet’s mouth and then all of a sudden recoil, pretending that it bit you. Pretend to be afraid of it. Remember that spontaneous play is unstructured so it can be a challenge to transition back to structured activities after playing with puppets. In addition, many kids with autism have a hard time controlling their emotions, including positive feelings, so they may get overly excited and have a hard time calming down. For these reasons and also because pretend play can be used as an incentive for finishing other play date activities, it may be best to leave puppets to the end of a play date. As children get used to the idea of pretend play, they will gradually become better at creating scenarios, but they may first need to be prompted by facilitators. Playing with puppets can help children understand symbolic play. Puppets can help kids learn to be spontaneous, and the engagement, interaction, and joint attention that arises from play therapy not only improves social skills, but can even in some cases spur language development.
<urn:uuid:0fc02a65-af76-4c71-bcc8-963bcfa91795>
CC-MAIN-2018-09
http://autismresourcefoundation.org/puppets-play-therapy-can-improve-social-skills-speech-for-children-with-autism/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812788.42/warc/CC-MAIN-20180219191343-20180219211343-00556.warc.gz
en
0.952386
1,490
3.421875
3
Re: when and how to teach your native language? I would start to teach her now. Her brain is at the perfect age to act like a sponge and pick it up. Start to throw in Russian words when you are speaking English. Say do you want МОЛОКО? And then point to the milk jug. As she gets used to the Russian word for milk start to change the entire question to Russian. At that point she'll understand the word for milk and will begin to understand the first part of the sentence. Also, look into a Russian program for preschoolers. That will be a great place for her to learn and have fun with other kids at the same time. If you are in a bigger town there will probably be one. Some friends of mine send their daughter (almost 5) to a German preschool. Her mom is German. They spend half the time in school speaking in German and the other half in English. When she is with her mom her mom only speaks German unless the daughter doesn't understand. Her dad usually speaks English, though he inderstands German. When the 3 are together they usually speak English. It works very well for the girl. She is very good with both languages. Good luck, it's a great idea for her to learn now, then when she's older she'll be lucky enough to already know a second language and it will be very special that she can communicate with your family. "Go slowly, breathe and smile" Thich Nhat Hanh
<urn:uuid:87d08a4d-1d68-4b39-ba7c-6b9e401f4b5f>
CC-MAIN-2014-15
http://www.healthboards.com/boards/parenting-issues/366271-when-how-teach-your-native-language.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609536300.49/warc/CC-MAIN-20140416005216-00232-ip-10-147-4-33.ec2.internal.warc.gz
en
0.979104
317
2.875
3
|Atmospheric pressure in Teddington:||1022.6 hPa| |Sea-level equivalent:||1023.6 hPa| |Three hour trend:||+0.3 hPa| |Time of measurement - made every 5 minutes (see note about UTC below):||15:30 UTC| There is no need to tap the screen..... The graphs below show the pressure in Teddington for the past 24 hours and 7 days. The barometric pressure data is derived from an on-line electronic pressure transducer. The measurement uncertainty of this on-line transducer is approximately ±0.3 hPa. The unit hectopascal (hPa) is numerically identical to the millibar (mbar) Link to pressure units. The pressure values shown are those at the point of measurement, that is approximately 10 metres above mean sea level. If a hole were dug to sea level, the pressure at the bottom would be about 1 hPa greater than at the top. Note that, when estimating a pressure value from the graphs, the uncertainty will be considerably higher than that of the measuring transducer because of limitations in screen resolution. When using the pressure values, particularly for checking another barometer, it is important to appreciate that the differences in altitude, distance from Teddington and weather conditions may seriously limit the validity of the comparison. Proper calibration of barometers can only be accomplished by direct pneumatic connection to an appropriate pressure standard and adherence to well defined procedures. For the latest weather forecast, see the Met Office Historical Barometric Pressure Data View historical barometric pressure data, going back until 1st January 1998, when the on-line barograph was first set up (excluding an eleven day period starting 09/08/02*). The historical barometric pressure data is derived from records starting 1st January 1998, (before 2nd April 2001 only an hourly average value was stored, so graphs relating to the earlier data therefore show slightly less fine-structure than measurements made after that date). The measurement uncertainty associated with each individual 5-minute measurement is ±0.3 hPa but the hourly averaging of the pre-2nd April 2001 data effectively increased the uncertainty by an amount which depended on the rate-of-change of pressure during the hour in question. *Due to a computer failure no data was recorded during an eleven day period starting on 9 August 2002. Please note that the graph plotting software used to display the historical barometric pressure data was designed to linearly interpolate (ie draw a straight line) between successive data points. Unfortunately this means that, should you elect to display a period that includes both 9 August and 20 August, the software will erroneously draw a straight line from the last data point recorded on 9 August to the first data point recorded on 20 August. This line probably bears no resemblance to real atmospheric pressure variations during the breakdown period.
<urn:uuid:2e82fe70-8890-48cf-b69c-fd8c6d61d621>
CC-MAIN-2015-22
http://resource.npl.co.uk/pressure/pressure.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928864.73/warc/CC-MAIN-20150521113208-00168-ip-10-180-206-219.ec2.internal.warc.gz
en
0.929786
608
2.515625
3
The purpose of this explorative online class to examine an unknown language without any prior knowledge of it. This is the classical field situation: you are stranded within a linguistically previously unexplored territory and want to find out as many details as possible about the language to which you are exposed. This is what the VLC supplies: - a native speaker - general information about the language - the linguistic methods and tools The class operates in a cascading fashion, i.e. the individual units will be activated successively. Questions about Class Description - Linguistic Fieldwork Want more info about Class Description - Linguistic Fieldwork? Get free advice from education experts and Noodle community members.
<urn:uuid:8c1a6d15-a834-4fb6-b6d9-e5eaa1cecf39>
CC-MAIN-2017-09
https://www.noodle.com/learn/details/25923/class-description-linguistic-fieldwork
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171418.79/warc/CC-MAIN-20170219104611-00243-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925292
141
3.015625
3
This is hill country, carved by glaciers and covered with towering oaks, hickories and sycamores, some more than 200 years old. This area was shaped by water gushing from a rapidly melting glacier more than 10,000 years ago. The meltwater dumped its sediment load at Bicentennial Woods, creating the preserve’s sandy hills. This nature preserve is part of the Cedar Creek Corridor, the largest forested corridor in the region. The mature forests found here are uncommon in our region today. Some of the largest oak trees in Bicentennial Woods sprouted during the Civil War. A variety of woodland birds can be seen and heard in spring and summer. Spring wildflowers include wild blue phlox, wild geranium, bloodroot and Jack-in-the-pulpit.
<urn:uuid:5de3c3f9-b6b6-4760-aa2d-598a5ed1ab24>
CC-MAIN-2023-23
https://acreslandtrust.org/preserve/bicentennial-woods/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00367.warc.gz
en
0.941014
172
2.9375
3
What is the largest green sea turtle? The largest green turtle ever found was 5 feet (152 cm) in length and 871 pounds (395 kg). Weight: Adults weigh between 240 and 420 pounds (110 – 190 kg). How big can green sea turtles get? 3 to 4 feet long Green turtles are the largest of all the hard-shelled sea turtles, but have a comparatively small head. A typical adult is 3 to 4 feet long and weighs 300 to 350 pounds. Are green sea turtles rare? Classified as endangered, green turtles are threatened by overharvesting of their eggs, hunting of adults, being caught in fishing gear and loss of nesting beach sites. Where does green sea turtle live? Green sea turtles are found around the world in warm subtropical and tropical ocean waters, and nesting occurs in over 80 countries. There are populations with different colorings and markings in the Atlantic, Indian, and Pacific Oceans. How big is a leatherback sea turtle? 550 – 1,500 lbsLeatherback sea turtle / Mass (Adult) Can you have a green sea turtle as a pet? Officially, only sea turtles have the name “green turtle” or “green sea turtle.” These massive turtles are endangered and are not kept as pets. What was the biggest turtle ever? Researchers have uncovered shells belonging to Stupendemys geographicus, the largest turtle that ever existed. Its shell reached nearly 10 feet in length and weighed 2,500 pounds.By studying the shells and lower jaw fossils, researchers discovered the males had horned shells to protect their skulls. What is the largest turtle ever recorded? The largest leatherback turtle ever recorded is a male found dead on the beach at Harlech, Gwynedd, on 23 September 1988. It measured 2.91 m (9 ft 5½ in) in total length over the carapace, 2.77 m (9 ft) across the front flippers and weighed 961.1 kg (2,120 lb). How much does a sea turtle cost? Water turtles are semi-aquatic creatures and as such, they require an aquarium or a pond. The initial cost of acquiring a turtle is generally between $20 and $200 depending on the species and the age of the turtle….Initial Average Cost Of Obtaining A Turtle. |First veterinarian check-up||~$55| What is the biggest pet turtle? - Sulcata Tortoise. For our top pick, we couldn’t find anything better (or bigger!) than the Sulcatas. - Pond Sliders. Instead of describing a certain species, people use the name ‘pond sliders’ to refer to the Cumberland and Red-Eared sliders. - African Sideneck Turtles. - Eastern Box Turtles.
<urn:uuid:0c1fd81c-75b3-4d56-81f4-bfd4e8decd75>
CC-MAIN-2023-40
https://fistofawesome.com/blog/what-is-the-largest-green-sea-turtle/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00419.warc.gz
en
0.928108
618
2.984375
3
Written by: Anne Marie Forgarty, RGN What is Sex Education? Sex education isn’t just limited to the sexual activity itself, that is, how to perform sexual intercourse, sex education caters to more than just the biological; it explores topics such as the importance of consent and how to establish healthy sexual relationships, all of which benefit young individuals later in their lives. Let’s briefly learn about each of these topics. Consent always matters Before engaging in any sexual activity, you should ask those involved whether they’re willing to engage in any sexual acts. And don’t assume that this is just a one-time task. You need to make sure that you and the other person involved are comfortable throughout. Remember, you have the right to revoke your consent; agreeing to a certain sexual act does not mean it has to lead to sex or that you are obliged to have sexual intercourse because you consented in the first place. Many young people don’t realise that being manipulated or emotionally blackmailed into saying yes to any sexual act is not consent. Worrying that you might upset the other person if you say no or if their behaviour forces you to say yes, your decision to choose is compromised. The concept of consent is so important that it is also taught at primary school, although applied to non-sexual situations. Ask, listen and respect is an effective technique that teaches individuals the importance of consent. Better safe than sorry Sexual health is one of the most important topics explored in sex education. Healthy sexual activity comes with certain precautions. Sexually transmitted infections or STIs, as they are more commonly known, unwanted pregnancies, especially amongst teens, and post-sex anxieties, are consequences of unprotected sex. To avoid transmitting sexual diseases and unwanted pregnancies, condoms (especially to avoid STIs) are important. There are other contraceptives aside from the physical ones, such as birth control pills to avoid getting pregnant. There are many methods of contraception around, it’s important to choose the one that suits you and your lifestyle best. One of the most important things to remember is to plan ahead, have access to the contraception you choose and seek medical advice before you start any method. Types of contraception include: The Condom – offers protection from STIs and unwanted pregnancy and is widely available. There are male and female condoms available. Hormonal Birth Control – comes in pills, (progestogen-only pill and combined pill), vaginal rings, patches, implants, and injections of various hormones. These hormones stop the release of the egg so that fertilisation cannot occur. These are fairly effective with over 90% effective rate if used correctly but only protect against pregnancy, not STIs. IUDs (Intrauterine Devices) – are small plastic devices inserted by a doctor or nurse into the uterus, with long-term protection. Vaginal Contraception – caps or diaphragms are barrier methods and are inserted into the vagina before sex. Which method is right for me? This depends on your age, whether or not you smoke, medical and family history and any medications you are taking. Always discuss your contraception decisions with a GP or sexual health professional. The emotional side of sex Just as learning about your body, consent, and safe sex is important, exploring the emotions surrounding sexual behaviour and relationships is equally important. Sex is not simply a physical act but an emotional one as well. Our emotions, what we feel about our partner(s) or how we view ourselves, the concept of love and intimacy, understanding others’ feelings, and respecting boundaries (sexual and general, too) all come under the emotional aspect of sex and teach individuals to build healthy relationships with others and themselves. Another very important topic is gender identity, and sexual orientation since young individuals begin to explore their gender identity and sexuality, which has to do with physical and emotional domains. These topics need to be taught in an inclusive, respectful, and empathetic manner
<urn:uuid:13399e50-4054-4d6c-97fc-a38aa94a8eea>
CC-MAIN-2023-50
https://free-resources.anatomystuff.co.uk/sex-education-free-downloads/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00359.warc.gz
en
0.937579
823
3.15625
3
The division of a parent cell into two identical daughter cells does not occur during any of the phases of mitosis. Rather, this physical separation occurs during cytokinesis, a process that takes place right after mitosis.Continue Reading Mitosis involves the division of the nucleus of a cell. It is divided into five phases: prophase, prometaphase, metaphase, anaphase and telophase. Cytokinesis, which involves the formation of a cleavage furrow, occurs after telophase. During cytokinesis, the parent cell that now contains two sets of chromosomes enveloped by their own nuclear membranes, is cleaved at the equator. This process is driven by the constant shifting of myosin and actin filaments. As a result of this movement, the parent cell splits into two daughter cells.Learn more about Cells
<urn:uuid:6b72df71-44ba-449c-a6b4-ee947e45d56a>
CC-MAIN-2017-39
https://www.reference.com/science/during-phase-mitosis-daughter-cells-produced-a1db1c22df9f6e5
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695375.98/warc/CC-MAIN-20170926085159-20170926105159-00429.warc.gz
en
0.946882
178
4.09375
4
Celebrating scienceNews, Student news, Alumni news 2014 marks 400 years since the birth of the Revd Dr John Wilkins, who in 1648 became Wadham College’s sixth Warden. Wilkins was an advocate of the new ‘experimental’ approach to science, and his informal Philosophical Club became the Royal Society. Science continues to be a core part of Wadham life today and the College boasts leading scientists among its Fellows, educating the talented undergraduate and graduate scientists of the future. Wilkins and the Royal Society Alumnus Melvyn Bragg (1958, History) describes Wadham, Oxford in the 1650s as “a melting pot of modern science.” According to historian Allan Chapman (1972, DPhil History of Science) in the Wadham College History, in the university world of 1650 most of his Wilkins’s interests would have been considered “fringe at best and downright eccentric at worst.” But Wilkins brought unprecedented intellectual energy to Wadham. “Any man who could accompany his induction in the politically sensitive Wardenship of Wadham with the publication of a book dealing with projected designs for submarines, flying machines and perpetual motion devices, as he did with Mathematical magick (1648), lacked neither courage nor confidence. His first book, when he was 24 years old, argued in favour of the feasibility of a voyage to the moon and a defence of Copernican astronomy.” During the dozen years of Wilkins’s Wardenship, Wadham became a European scientific hub. Wadham College became the regular meeting place for the nucleus of experimenters who after 1660 became the Royal Society. The informal ‘Philosophical Club’ of astronomers, anatomists, and chemists which regularly met at the Lodgings as friends of the Warden became England’s first real body to pursue systematic experimental research. Their ideas were original and deeply challenging to the traditional philosophy of ‘the Schools’ of ancient learning. Club members included Seth Ward, Thomas Willis and Robert Boyle, who employed as his assistant the young Robert Hooke who later recorded having experimented with flying machines in the Warden’s garden. Hooke, whose subsequent scientific career was strongly moulded by Wilkins, mentions several Wadham recollections in his writings. His book Micrographia (1665) used the newly invented microscope to study the wing structures of a variety of flying insects. At this time the young John Locke was involved in chemical projects in Wadham. Christopher Wren, who had distinguished himself as an astronomer and physicist had left Wadham to become a Fellow of All Souls in 1653, but continued to attend the Wadham meetings as a friend of the Warden. Wilkins’s influence as an inspirer of scientific ideas even extended to the College staff. The College Manciple (a steward responsible for food purchasing), Christopher Brooks, was a skilled instrument maker and the inventor of a new quadrant. Wilkins also recruited a former chef to the Prince of Wales as cook, allegedly for his expertise in botany. Chapman comments: “Wadham’s gardens were notable for their collection of mechanical contrivances, including a talking statue, a rainbow-maker, and glass beehives used to study the bee colony.” It was almost certainly in the garden at Wadham that the experiment which used a syringe to administer an opiate to Sir Christopher Wren's dog was performed in 1656 to see if the blood circulated, and could therefore get the drug to the brain faster that giving it orally – possibly the first scientifically conducted experiment using an intravenously administered drug. Chapman adds that: “Wilkins was a pioneer of the use of the English language as a vehicle for carrying the ‘new science’ beyond the scholarly community and had a visionary sense of how technology might change the world.” Following this scientific activity in the seventeenth Century, historian and Fellow Cliff Davies remarks that scientific activity at Wadham diminished considerably until the late nineteenth and early twentieth centuries. Notable Wadham scientists Since Wilkins’s day, Wadham has seen a number of notable scientists pass through its doors including Frederick Lindemann, Lord Cherwell (Physics), Churchill's principal scientific adviser in the Second World War; Charles Coulson (Professor of Maths and founder of Theoretical Chemistry); Allen Hill (alumnus and Honorary Fellow), chemistry; Nevil Storey-Maskelyne (Professor of Mineralogy, 1856-95); Robert Clifton, alumnus, professor (1865-1915), effectively creator of Clarendon Laboratory; Reginald Victor Jones, alumnus, Honorary Fellow and leading physicist who became a scientific and military expert involved in the establishment of radar during the Second World War; Botanist David Smith, Honorary Fellow and former Royal Society Research Fellow; Robert Williams, Emeritus Fellow, chemist, Fellow of the Royal Society; Professor David Macdonald CBE DSc FRSE (1969 Zoology), Director of Oxford’s Wildlife Conservation Research Unit (WildCRU); Mathematician and Emeritus Fellow Sir Roger Penrose OM; Professor Anthony Cheetham, (1965, Chemistry DPhil), Goldsmiths Professor of Materials at Cambridge, and Treasurer and Vice-President of the Royal Society; and Professor Marcus du Sautoy (1983, Mathematics), Simonyi Professor for the Public Understanding of Science. Studying the sciences at Wadham today Some 45% of Wadham’s undergraduate intake is for science courses (including Biochemistry, Chemistry, Physics, Biology, Engineering, Medicine, Maths, Psychology and Human Sciences). However natural scientists make up closer to 50% of the total undergraduate body, as the majority of scientists are on four-year degree programmes while most Humanities and Social Sciences students follow three-year courses.Undergraduate courses Graduate courses Approximately 45% of our post-graduate intake study for courses offered by Oxford University’s Mathematical, Physical & Life Sciences Division or Medical Sciences Division. Given that the proportion of graduate students studying multiple-year doctorates is higher in the sciences than in other fields, this means that around 60% of our graduate body are working in the natural sciences. Among undergraduate science subjects, Medicine receives the most applications, with around ten applicants competing for each place, both at Wadham and across the University as a whole. Maths is the second most popular science course, with five applications per place. At post-graduate level, courses in chemistry and medical engineering are amongst the most popular. Why Wadham for science? Scientific heritage aside, Wadham’s close proximity to the science departments is a big draw for students, given 9am start time for many lectures! Other factors that make Wadham a popular choice are its large faculty and excellent teaching, the College’s diverse and supportive ethos, the high number students from maintained-sector schools and the opportunity to get involved in ‘non-sciencey’ activities - the thriving political/charitable/theatrical/journalistic scene at Wadham appeals to those who don’t believe in the stereotypical notion of the ‘two cultures’. A library of science Wadham Library is fortunate to house in its rare book collections a range of highly significant scientific works, dating back as far as the 1580s. The books all came to the library as donations, often made by individuals with a close association to the college. Our first edition of Copernicus for example, came as the gift of Wadham Fellow Samuel Lee in 1653, while two books written by Wadham's 6th Warden John Wilkins were given by Joseph Grave, who received his M.A. from Wadham in 1656. The physician and Wadham alumnus John Mayow donated a copy of his own Tractatus Quinque Medico-Physici three years after it was published in 1674, and Alexander Thistlethwayte, who left around 1,500 titles to the library in 1771, gave us our copy of Thomas Willis's Cerebi Anatome. In the Victorian era Thomas Sprat's History of the Royal Society was given by the bibliographer and librarian Edward Gordon Duff, again a Wadham alumnus, while the complete run of the Philosophical Transactions of the Royal Society was presented in memory of the Reverend Robert Braithwaite-Batty who died in his early 30s in 1861. Visit the Wadham library virtual exhibition to view rare books from before the Royal Society Discover Isaac Newton, Philosophiae naturalis principia mathematica, one of the fundamental texts of Western science. Another landmark text of modern science here is Copernicus’s De Revolutionibus. Sebastian Munster's Cosmographia (1584 edition) tries to find accurate geometrical projection techniques whereby the three-dimensional Earth could be accurately projected upon a flat sheet of paper. The book is a sustained essay on mathematical practice and surveying: how to use the stars, solar shadows, and eclipses of the sun and moon to fix co-ordinate points on the surface of the Earth. Visit the Wadham and the Royal Society collection Here you’ll find The Royal Society, Philosophical Transactions of the Royal Society (1665- ); John Wilkins, A Discourse Concerning a New World (1640); John Wilkins, Mathematical Magick (1648); Robert Hooke, Micrographia (1665); Thomas Sprat, The history of the Royal Society (1667) Visit the 17th Century Medicine rare book exhibition On display is Thomas Willis Cerebri Anatome (1674), one of the foundational texts of modern scientific anatomy and physiology. In it Willis first coins the term "neurologie" [Greek: neuron, nerve ; logos, ordered knowledge] for the scientific study of the brain. Here also is John Mayow, Tractatus Quinque Medico-Physici (1674) written by one of the most brilliant experimental scientists of the age.
<urn:uuid:5f464dde-3cc7-4bc2-9a5a-2b9f3f1fcb92>
CC-MAIN-2019-39
https://www.wadham.ox.ac.uk/news/2014/july/celebrating-science
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572516.46/warc/CC-MAIN-20190916080044-20190916102044-00299.warc.gz
en
0.944363
2,105
2.90625
3
Breaking News Emails The last thing most people want to do is get out of bed and take out their contacts, but stomach-churning photos of an eye ulcer that developed after one person slept with soft contact lenses in might change your mind. The pictures, which have been viewed over 30 million times, were posted to Facebook by Dr. Patrick Vollmer, an ophthalmologist at the Vita Eye Clinic in Shelby, North Carolina. Volmer explains that the patient developed a pseudomonas bacterial infection that lead to an ulcer. The condition described is called contact lens-related Pseudomonas keratitisis, an inflammation of the cornea. It is a medical emergency and can cause permanent blindness if not treated immediately with antibiotics. “Despite treatment, the patient is very likely to suffer some loss of vision,” Volmer said. The Pseudomonas microbe is present everywhere, mainly in soil, plants, animals and water. It likes warm, moist environments and tends to infect people with compromised immune systems, though any healthy individual can become infected under the right circumstances. The flesh-eating bacteria is commonly found in water, which is why doctors tell people to remove their contacts before hopping in the shower or a swimming pool. “I don’t ever recommend sleeping in any brand of SOFT contact lenses. The risks outweigh the benefits every time,” Vollmer said on Facebook. “It takes seconds to remove your contacts but a potential lifetime of irreversible damage if you choose to leave them in. People need to see these images and remind themselves/family/friends to also be aware of contact lens misuse.” Around a third of people who wear contact lenses have reported sleeping or napping in them. People who do have six to eight times the risk of developing eye infections, according to an Aug. 16 Morbidity and Mortality Weekly Report by the Centers for Disease Control and Prevention. The design of contact lenses makes it easier for people to develop infections. Contacts need to lay directly on the eye, but this allows bacteria and viruses to easily become trapped. When people don’t take their contacts out, the germs fester. Sleeping in contacts prevents the eye from being able heal itself. “Although extended wear contact lenses are safer for continuous use overnight then they were years ago, they can still set up the eye for troublesome and even damaging infections if worn while sleeping,” said Dr. John Torres, NBC News' medical correspondent. “Manufacturers and the FDA have approved some contacts for overnight use, but many eye doctors recommend removing them before going to bed anyway to prevent any of these issues.” “If left in overnight, it’s very important to follow the manufacturer’s direction for cleaning and disposing of the lenses carefully and to follow up with your eye doctor if you notice any pain, discharge, redness or vision changes,” Torres added. Some lenses are approved by the Food and Drug Administration for overnight wear, but even those are associated with an increased risk for infection when worn overnight. These overnight-wear lenses are considered class 3 medical devices, those that have the greatest risk of harm. Pseudomonas infections are rare and may not represent the typical infections most eye doctors see. Emergency eye infections occur in 1 in every 500 contact lens users. For context, an estimated 45 million Americans wear contact lenses according to the CDC. It is unknown if the patient referred to in the Facebook post was susceptible to infections or had other underlying health conditions that could have made them more likely to develop the extreme condition. The CDC recommends that contact lens wearers take simple steps to prevent contact-related complications such as not sleeping or swimming in lenses and replacing lenses and storage cases when recommended.
<urn:uuid:577d5596-143f-4ea7-a0d2-c768e9297cd1>
CC-MAIN-2019-22
https://www.nbcnews.com/health/health-news/eye-doctor-shares-graphic-pictures-warn-against-sleeping-contacts-n1001851
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256763.42/warc/CC-MAIN-20190522043027-20190522065027-00082.warc.gz
en
0.952677
787
2.84375
3
Hydrochloric (muriatic) acid is a toxic chemical with a variety of household and industrial uses. It is a dangerous liquid that should always be handled with extreme caution and used only when necessary. Inhalation of vapours can cause burns to all body tissues, lung damage and even death in extreme cases. Handling hydrochloric acid properly reduces your risk of inhalation of harmful fumes. A common household use for hydrochloric acid is cleaning concrete or masonry to prepare it for painting or sealing. In this context it is often referred to by the name "muriatic acid." According to the Environmental Protection Agency, hydrochloric acid has many industrial uses in food, textile, chloride, fertiliser, dye and rubber production, among other industrial and laboratory applications. Hydrochloric acid fumes are very corrosive and may lead to lung damage. When inhaled, hydrochloric acid causes irritation, coughing and choking. It also causes nose, throat and respiratory inflammation. In more extreme cases of inhalation, it can result in circulatory failure, pulmonary oedema or death. The vapours can irritate and damage the eyes. The EPA reports that chronic occupational exposure to fumes can erode the teeth and result in gastritis, chronic bronchitis, dermatitis and photosensitization. Hydrochloric acid fumes may also aggravate pre-existing eye diseases and skin disorders. When hydrochloric acid fumes have been inhaled, immediately remove the victim to fresh air. Seek immediate medical attention and administer artificial respiration if the victim is not breathing. If the victim's eyes are burning due to vapour exposure, flush the eyes continuously for 15 minutes, occasionally lifting the upper and lower lids to flush out the eyes. Only a medical professional can determine what damage has occurred and an appropriate course of treatment, so always seek medical help immediately regardless of severity of symptoms. To reduce your risk of harmful inhalation of hydrochloric acid fumes, always take the proper precautions for storing, handling and disposing of it. Use hydrochloric acid outside or with adequate ventilation. Never use it in an enclosed space. Wear a National Institute for Occupational Safety and Health (NIOSH)-approved personal respirator, acid-resistant rubber gauntlet gloves, safety goggles or a face shield, rubber boots and an acid-resistant apron or coveralls. Store hydrochloric acid in a tightly sealed container away from heat, direct sunlight and moisture. Do not reuse the container. Dispose of unused acid and the container as hazardous waste according to local, state or federal guidelines. Hydrochloric acid does not biodegrade and leaches into groundwater if disposed of improperly.
<urn:uuid:e03416b3-6725-4ed2-9985-b3f2a32ca123>
CC-MAIN-2017-22
http://www.ehow.co.uk/info_7883207_effects-hydrochloric-acid-fumes.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607242.32/warc/CC-MAIN-20170522230356-20170523010356-00638.warc.gz
en
0.89549
548
3.28125
3
The Djinni’s Offer: see below… |Caps, Part 2 online worksheet||Multiplication Tables: Square Numbers/Radical Diagonal||Review of yesterday’s intro.||Khan Academy continuing Exponents online worksheet||Day 17 ExitSlips| Lesson Plan, Day 17 In our Learning Toolbox: San Diego Public Library system (was there a public library in 1838 Baltimore?) (1. ordering books, 2. InterLibrary Loan, 3. Reference Librarians) Copy into your notes, and Mind Map each word: Reading Comp. Vocab. Grammar Vocabulary Math Vocabulary Test-taking Skills two of three: Exponents, part 2 of Reading comp. lecture Contemplate Proper noun repeated addition Diagonal on times table Reflect upon Noun repeated multiplication Squares Consider Specific Exponential form Cubes Nationalism Particular perfect squares Consecutive, even Turn of the century individual Square numbers context 6pm: Spend one minute contemplating nationalism. Write one or two sentences explaining why you think nationalism is either important, or dangerous, or both. 6:02 Continue on work from your folder (on Reading/Literature/Science/Social Studies). 7pm: Stand up & Stretch, if you wish… 7:00 to 7:07 Reading Comprehension 7:07 to 7:15 we will have our Grammar lecture, using this passage 7:15 to 7:25 we will have our math lecture, also using this same passage. 7:25-7:30 We will do the first question/problem from each online worksheet together, then you finish the online activities from all three lectures individually on the classroom computers, on your laptop or, on your smart phone. 7:00-7:07 Reading Comprehension: What conclusion has the author drawn and “Nationalism sparked intense competition between European nations. by the turn of the twentieth century. a fierce rivalry had developed among Europe’s most powerful countries. Those countries were Germany, Austria-Hungary, Great britain, Russia, Italy, and France. In June 1914, World war I began.” (Today’s reading comes from P. 285 of Peterson’s Master the HiSET, 2nd Edition …) Where are the proper nouns in this passage? Is there any lack of capitalization in this passage? Where are the missing capital letters in this passage? Where are the other Grammatical errors? 7:07 Grammar lecture: Capitalizing proper nouns Capitalize the titles of officials when used with or before their names. Do not capitalize the civil title if it is used instead of the name. The president will address Congress. All senators are expected to attend. The governors, lieutenant governors, and attorneys general called for a special task force. Governor Connelly, Lieutenant Governor Martinez, and Senators James and Hennessy will attend the Capitalize a title when used as a direct address even when the person is not Will you be holding a press conference, Madame President? Please give us your opinion of this latest development, Senator. We need your response quickly, Mr. We need your response quickly, Will you help me with my homework, When you use the complete names of departments, capitalize. You may also capitalize a shortened form of a department. Do not capitalize when these words are used as adjectives or the United Nations General the General Assembly a congressional committee Capitalize civil titles only when used with the name following or when Councilman James Harris James Harris, councilman How are you voting, Councilman? If you are working on government documents or you are representing a government agency, then you may capitalize words like City, County, and District when they stand Example: The County will implement the plan approved by the voters last When you refer back to a proper noun using a shortened version of the original name, you may The District Water Plan allocates … The Plan calls for … The Federal Bureau of Investigation has taken the case. The Bureau has sent out a bulletin to other federal departments to enlist their help in capturing the fugitive. However, if you are not working on government documents or are not representing a government agency, do not capitalize generic or shortened terms. The county will implement the plan … The plan calls for … The bureau has sent out a bulletin … Please write one sentence using a proper noun (i.e. “Lincoln wrote The Emancipation Proclamation on the back of an envelope.”) 7:15 Mathematics: Exponents, part 2/2: Anything to the 0 th & 1 st, Pwrs of 0, What was my SmartAlec answer to “Express 100 in exponential form?” So what is any # raised to the 1st power? What might any # raised to the 0 How might we evaluate 23 How about .2*.2*.2? How would we do this in fractional form? In decimal What is .2*.2*.2 in exponential form? What do you notice about the exponent and the number of decimal places? Let’s summarize on a chart: Arithmetic form, Fractional form, decimal form, Continuing from yesterday for a fun group activity: If you want to partner up with a classmate, work together for 7 minutes to take a crack at: The Djinni’s Offer: “After opening an ancient bottle you find on the beach, a Djinni appears. In payment for his freedom, he gives you a choice of either 50,000 gold coins or one magical gold coin. The magic coin will turn into two gold coins on the first day. The two coins will turn into four coins total at the end of two days. By the end or the third day there will be eight gold coins total. The Djinni explains that the magic coins will continue this pattern of doubling each day for one moon cycle, 28 days. Which prize do you choose? When you have made your choice, answer these questions: The number of coins on the third day will be 2×2×2. Can you write another expression using exponents for the number of coins there will be on the third day? Write an expression for the number of coins there will be on the 28th day. Is this more or less than a million coins?” Now, let’s do the first online Grammar worksheet question together: Now let’s do the first online math worksheet problem together: 1.) Please do the rest of our online grammar worksheet: 2.) Please do the remainder of online math worksheet: Mathematics work online and/or in books from 7:45 until 8:45. 8:40 Exit Questions: Tuesday, day 17 1. Write one sentence explaining the difference between the four forms we used today. 2. What is nationalism? 3. Write one fourth as a fraction, decimal and a percent and in some exponential form (i.e. 9/10*9/10=.9*.9=.81=81%) 4. Please write one sentence explaining how many decimal places an exponent gives when multiplying decimals. 8:45 Turn in Exit Slip, Dismissal some Action Items in support of literacy (and Gold!) that you can take right now: 1.) Download some public domain version of a classic story about djinn, 2.) Make a bet with some friends that you’ll have more gold after 30 days than they could ask for in one lump sum from the tricky Djinni! 3.) Share how the bet went: who won? 4.) Write a novel that references a classic book, tells a good story, and makes a difference. I’m working on that through my historical fantasy #WiP, #WhoByFireIWill. Once published, donate one or more copies to your local public library, as I intend to do. Other ideas welcome on how to #EndPoverty, #EndHomelessness, & #EndMoneyBail, starting with improving these four parts of our good #PublicDomainInfrastructure: 2. #ProBono legal aid and Education, 3. #UniversalHealthCare, and 4. good #publictransport
<urn:uuid:188cca5d-57ca-419c-b439-3bd7c38accf1>
CC-MAIN-2020-50
https://shiradest.wordpress.com/2020/09/23/day-17-of-high-school-in-5-months-ill-1838-baltimore-and-djinn-gold-12020-he-the-holocene-calendar/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141189141.23/warc/CC-MAIN-20201127044624-20201127074624-00434.warc.gz
en
0.837189
1,852
3.53125
4
A text field of indeterminate length in a database, as opposed to the traditional fixed-length field. Origin: From the data type name, itself from variable character. A varchar or Variable Character Field is a set of character data of indeterminate length. The term varchar refers to a data type of a field in a database management system. Varchar fields can be of any size up to a limit, which varies by databases: an Oracle 9i database has a limit of 4000 bytes, a MySQL database has a limit of 65,535 bytes and Microsoft SQL Server 2005 has a limit of 8000 bytes. The numerical value of VARCHAR in Chaldean Numerology is: 2 The numerical value of VARCHAR in Pythagorean Numerology is: 8 Images & Illustrations of VARCHAR Translations for VARCHAR From our Multilingual Translation Dictionary Get even more translations for VARCHAR » Find a translation for the VARCHAR definition in other languages: Select another language:
<urn:uuid:1ec8c2cd-e67a-4da3-93e2-a14b348084d1>
CC-MAIN-2017-43
http://www.definitions.net/definition/VARCHAR
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822739.16/warc/CC-MAIN-20171018032625-20171018052625-00649.warc.gz
en
0.743546
218
3.203125
3
UNESCO and Italy launch new cooperation to restore and conserve cultural heritage in Bamiyan, Afghanistan Most people know Bamiyan as the site where giant statutes of the Buddha were destroyed by the Taliban in 2001. But it is the location of other important archaeological sites too, such as Shahr-i-Zohak (Red City), an impressive mass of ruins that was once the fortress protecting the entrance to Bamiyan in the 12th and 13th centuries. Now this site will be restored and conserved as part of a new project in Afghanistan sponsored by UNESCO and the Government of Italy. UNESCO’s Director-General, Irina Bokova, and Italy’s ambassador to Afghanistan, Luciano Pezzotti, made the announcement during the Director-General’s recent mission to Kabul (17 and 18 May). Bamiyan contains numerous Buddhist monasteries as well as forts from the Islamic period that testify to the interchange of Indian, Greek, Roman, Sasanian and Islamic influences. The project - totalling 900,000 Euros - will include training in heritage management and awareness-raising of other archaeological sites that are on the Tentative List of UNESCO’s World Heritage, including Herat, Balkh and the Gardens of Babur. Herat dates back to the Avestan times and has a number of historic sites, including the Herat Citadel and the Mosallah Complex. Balkh is an ancient city and centre of Zoroastrianism in northern Afghanistan. The Garden of Babur is an historic park in Kabul. UNESCO and the Governments of Italy and Afghanistan have cooperated on heritage protection for more than five decades thanks to the work of Italian organizations and universities. Activities include expert missions to the Minaret of Jam and Herat, led by UNESCO with expert guidance from Professor Andrea Bruno, as well as excavations led by Professor Giuseppe Tucci, founder of the Italian Archaeological Mission in Ghazni. UNESCO-Italy collaboration gained new impetus after 2002, when Italy rehabilitated the Mausoleum Abdul al-Razzaq in Ghazni, protected of the Minaret of Jam from seasonal flooding, and took emergency measures to protect the Fifth Minaret in the Musalla Complex in Herat. In her recent visit to Afghanistan, the Director-General of UNESCO expressed the Organization’s gratitude to Ambassador Pezzotti. The ambassador emphasized Italy’s commitment to international support for cultural development in Afghanistan. This new initiative will complement existing funding from the Government of Japan and Swiss Development Cooperation to safeguard the World Heritage site of Bamiyan. The coordinated approach will engage a range of international and Afghan institutional partners to safeguard Afghan heritage and stimulate development at the Bamiyan Valley. UNESCO will coordinate the project which will target the conservation and development of the ancient Islamic remains of Shar-e- Gholghola in Bamiyan involving the Ministry of Information and Culture of Afghanistan, the Délégation archéologique française en Afghanistan (DAFA), and the International Council on Monuments and Sites (ICOMOS Germany) with the scientific expertise of Professor Andrea Bruno. An audio-visual record of conservation works will also be developed as integral part of the project by Italian TV journalist and documentary film maker Duilio Giammaria in order to raise awareness both inside and outside Afghanistan on the importance of heritage protection and cultural development. As part of UNESCO’s coordination role in the culture sector in Afghanistan, Italy has also agreed to host two important meetings convened by UNESCO later this year: on the history, art and archaeology of Ghazni in Naples, and the 12th Bamiyan Expert Working Group in Orvieto. These coordination mechanisms aim to advise the Afghan authorities on issues of conservation, archaeology, urban development, management and planning for heritage sites. Italy will also lend its financial support to UNESCO and the Ministry of Information and Culture of Afghanistan to organize the Second International Conference for the Safeguarding of Afghanistan’s Cultural Heritage in September 2013. The conference will bring together a range of national and international partners, communities and government representatives to highlight the role and potential of culture as a pillar of sustainable development in Afghanistan.Back to top
<urn:uuid:af828265-1639-4c9f-a4a2-e524d2dd1db1>
CC-MAIN-2016-50
http://www.unesco.org/new/en/media-services/in-focus-articles/unesco-and-italy-launch-new-cooperation-to-restore-and-conserve-cultural-heritage-in-bamiyan-afghanistan/
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541324.73/warc/CC-MAIN-20161202170901-00246-ip-10-31-129-80.ec2.internal.warc.gz
en
0.916842
868
2.625
3
Nature builds flawless diamonds, sapphires and other gems. Now a Northwestern University research team is the first to build near-perfect single crystals out of nanoparticles and DNA, using the same structure favored by nature. “Single crystals are the backbone of many things we rely on — diamonds for beauty as well as industrial applications, sapphires for lasers and silicon for electronics,” said nanoscientist Chad A. Mirkin. “The precise placement of atoms within a well-defined lattice defines these high-quality crystals. “Now we can do the same with nanomaterials and DNA, the blueprint of life,” Mirkin said. “Our method could lead to novel technologies and even enable new industries, much as the ability to grow silicon in perfect crystalline arrangements made possible the multibillion-dollar semiconductor industry.” His research group developed the “recipe” for using nanomaterials as atoms, DNA as bonds and a little heat to form tiny crystals. This single-crystal recipe builds on superlattice techniques Mirkin’s lab has been developing for nearly two decades. In this recent work, Mirkin, an experimentalist, teamed up with Monica Olvera de la Cruz, a theoretician, to evaluate the new technique and develop an understanding of it. Given a set of nanoparticles and a specific type of DNA, Olvera de la Cruz showed they can accurately predict the 3-D structure, or crystal shape, into which the disordered components will self-assemble. Mirkin is the George B. Rathmann Professor of Chemistry in the Weinberg College of Arts and Sciences. Olvera de la Cruz is a Lawyer Taylor Professor and professor of materials science and engineering in the McCormick School of Engineering and Applied Science. The two are senior co-authors of the study. The results will be published Nov. 27 in the journal Nature. The general set of instructions gives researchers unprecedented control over the type and shape of crystals they can build. The Northwestern team worked with gold nanoparticles, but the recipe can be applied to a variety of materials, with potential applications in the fields of materials science, photonics, electronics and catalysis. A single crystal has order: its crystal lattice is continuous and unbroken throughout. The absence of defects in the material can give these crystals unique mechanical, optical and electrical properties, making them very desirable. In the Northwestern study, strands of complementary DNA act as bonds between disordered gold nanoparticles, transforming them into an orderly crystal. The researchers determined that the ratio of the DNA linker’s length to the size of the nanoparticle is critical. “If you get the right ratio it makes a perfect crystal — isn’t that fun?” said Olvera de la Cruz, who also is a professor of chemistry in the Weinberg College of Arts and Sciences. “That’s the fascinating thing, that you have to have the right ratio. We are learning so many rules for calculating things that other people cannot compute in atoms, in atomic crystals.” The ratio affects the energy of the faces of the crystals, which determines the final crystal shape. Ratios that don’t follow the recipe lead to large fluctuations in energy and result in a sphere, not a faceted crystal, she explained. With the correct ratio, the energies fluctuate less and result in a crystal every time. “Imagine having a million balls of two colors, some red, some blue, in a container, and you try shaking them until you get alternating red and blue balls,” Mirkin explained. “It will never happen. “But if you attach DNA that is complementary to nanoparticles — the red has one kind of DNA, say, the blue its complement — and now you shake, or in our case, just stir in water, all the particles will find one another and link together,” he said. “They beautifully assemble into a three-dimensional crystal that we predicted computationally and realized experimentally.” To achieve a self-assembling single crystal in the lab, the research team reports taking two sets of gold nanoparticles outfitted with complementary DNA linker strands. Working with approximately 1 million nanoparticles in water, they heated the solution to a temperature just above the DNA linkers’ melting point and then slowly cooled the solution to room temperature, which took two or three days. The very slow cooling process encouraged the single-stranded DNA to find its complement, resulting in a high-quality single crystal approximately three microns wide. “The process gives the system enough time and energy for all the particles to arrange themselves and find the spots they should be in,” Mirkin said. The researchers determined that the length of DNA connected to each gold nanoparticle can’t be much longer than the size of the nanoparticle. In the study, the gold nanoparticles varied from five to 20 nanometers in diameter; for each, the DNA length that led to crystal formation was about 18 base pairs and six single-base “sticky ends. “There’s no reason we can’t grow extraordinarily large single crystals in the future using modifications of our technique,” said Mirkin, who also is a professor of medicine, chemical and biological engineering, biomedical engineering and materials science and engineering and director of Northwestern’s International Institute for Nanotechnology. The Air Force Office of Scientific Research (Multidisciplinary University Research Initiative, grant FA9550-11-1-0275) supported the research. The title of the paper is “DNA-mediated nanoparticle crystallization into Wulff polyhedra.” In addition to Mirkin and Olvera de la Cruz, authors of the paper are Evelyn Auyeung (first author), Ting I. N. G. Li, Andrew J. Senesi, Abrin L. Schmucker and Bridget C. Pals, all from Northwestern.
<urn:uuid:14504030-d406-45ff-88f9-9f57fbede85a>
CC-MAIN-2020-24
https://scienceblog.com/68725/slowly-cooled-dna-transforms-disordered-nanoparticles-into-orderly-crystal/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413551.52/warc/CC-MAIN-20200531151414-20200531181414-00203.warc.gz
en
0.923012
1,261
3.25
3
The villages of Nagypáli and Kispáli belonged under the patronship of the Pápoc Augustine Provostry, founded in 1365. As a result of the Rába’s frequent floods, Kispáli became depopulated over time. The current church was built in 1642 at the behest of Provost Matthias Nyeki Weöres on the site of the wooden church already standing in Nagypáli. It was burned and looted by the Turks in 1683. Renovated in 1693, the tower was added by Pápoc Provost Kristóf Schogg in 1770. The Pope’s proclaimed place of pilgrimage was enlarged in 1804 with side aisles at the expense of Provost Antal Majláth. The high altarpiece of the Assumption of Mary, created at that time, is the work of Viennese artist Josef Schied. The sanctuary’s vaulting features a fresco of the Holy Trinity, while the side altars feature images of St Ladislaus and Mary of Lourdes. The church’s most valuable painting is a scene from the life of St John of Alexandria.(The relic of the Patriarch of Alexandria, who lived at the turn of the 6th and 7th centuries and is famous for his gifts, was preserved in the Royal Chapel of Buda during the reign of Matthias Corvinus. From there, they were taken to the Pauline Monastery of Máriavölgy and finally to Bratislava, to the coronation capital’s church of St Martin, where the relic is still held in high regard.) The Calvaria next to the church was built in 1696 on the site of the former wooden church sanctuary.There is a crucifix and a stone statue of Mary and St John standing in front of the open, horseshoe-shaped wall. It is one of the earliest such monuments in Hungary and served as a model for 18th-century Hungarian Calvarias. Two of the village’s statues in the public space erected in 1690 are the Pietà at the Vág junction and the “Christ on the Mount of Olives” behind the church.Other sacral public works include the Pusztakút wooden cross (1877), the wooden cross besides Vadosfai Road (1886), the American cross (1904), the Holy Trinity statue (1931) and the marble cross in front of the church.
<urn:uuid:715a69c8-aa68-4028-904b-cfefa539b7a8>
CC-MAIN-2021-25
https://sacravelo.eu/en_GB/gyor-moson-sopron-county/pali
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487610841.7/warc/CC-MAIN-20210613192529-20210613222529-00323.warc.gz
en
0.964773
525
2.796875
3
The current drought has inspired many Californians to pull up their lawns, their thirsty garden shrubbery, and to become more receptive to alternative landscapes. Happily many re-landscapes are including our native plants, or if not natives, drought tolerant plants from other Mediterranean or desert regions of the world. There is however a common public misconception that because our plants are adapted to drought that they can be planted and once established left on their own for mother nature to care for. So let's start with this test question. Choose the correct answer For the following statement: California native plants require.... A.) no supplemental irrigation B.) supplemental irrigation a few times during the summer dry period C.) regular weekly or twice a month irrigation during the dry season D.) I don't know Don't you wish "I don't know" was a test option when you were in school? Well for today's question D.) "I don't know" is the correct answer. A plant's tolerance to drought - or in a garden setting the lack of supplemental irrigation - is conditional upon a great many factors but principally by the three which make up the magic triangle of horticultural: Provenance, Soil Type, and Climate. Actually there really is no such thing as a magic triangle of horticulture. Google it for yourself. I just made it up to serve my purpose here. These considerations are very important however and I will address each of them in more detail shortly. For now let's just state that while a majority of our native plants do have lower water requirements than conventional landscape plants they are not all created equal in their water thriftiness. But before we get into our discussion just remember this: Watering your native plants too much or too little will either kill them or at best they will look really really ugly. Native plants are beautiful and if you are growing really ugly plants in your yard it gives California native plant gardening a bad rap. So we will all strive to provide just the right amount of supplemental water so our native plants will thrive and look as gorgeous as they should look! So, how much and how often do you water native plants? Without understanding a little about your plant's provenance, your soil, and local climate there is no simple answer to this question. You pretty much have to figure this out for yourself and this process is called gardening. But I want to help and not be snobby about this so let's get back to the magic triangle of horticulture noted in the diagram above and let's start with... Provenance refers to an object's place or source of origin, or better stated, where did it come from? Why is this so important? A native plant's inclinations and preferences are encoded in their DNA by their provenance or where they evolved. So when we move plants from, say, their cool and moist place of origin to a hot and dry region, they need some help to be happy in their new environment. Do keep in mind that a plant's provenance is not the nursery where they were grown or where you purchased them. The Irishman is not going to tan better just because he was born in southern California southern California. Right? Here are two maps I have selected to help illustrate my point. You ask what point am I trying to make? OK, fair enough. Where our native plants come from, their provenance, (their Provenance) makes a big difference on how drought tolerant they will be. So now back to the maps. You can click on the map to view them larger. Do this, study the maps and the legends, and then we will continue. (a big thank you to Oregon Climate Service and NOAA) So now you have memorized the maps. Good. For an example, let's use a very popular native landscape tree, the coast redwood (Sequoia sempervirens). Now these plants, even though they grow in the fog belt of California's pacific northwest, are quite adaptable and widely grown around the state in parks, along some freeways, and in many larger home gardens. Now they grow wonderfully with little to no supplemental irrigation near the central to northern coast (within their local provenance area) but bring them inland and they will require a whole lot of water to be happy and beautiful, i.e. not really really ugly. Remember, no ugly native plants. And if you live anywhere east or south of the central and north coast ranges and want to save water...do not plant sequoias. Choose something more local to your region. For another example of how these maps and knowing a plant's provenance can help us to better coordinate our garden and maintain our plants, we will look at some plants in my garden. Beautiful aren't they? Here in this view of my garden are a hybrid buckwheat (Eriogonum molle x fasciculatum), a silver sage brush (Artemisia ludoviciana), a salvia cultivar (Salvia 'Allen Chickering') and a desert mallow (Sphaeralcea ambigua). Now, these four plants thrive in my garden, all are drought tolerant, but only one is "local" or native to my part of California, i.e. of local provenance. The other three are imports, tourists, or immigrants, if you wish, who originated from other places in the state. Before I get into any specifics about the differences in these plants I want to answer the question which I am certain you have been wanting to ask. "How can we know where a plant comes from?" Well fortunately there are many good folks in the state who work very hard to maintain data bases of California plants. My favorite and easiest to use for this topic is Calflora. I have linked the silver sage and the desert mallow above to the Cal Flora website. Click on them and you will see a map which shows where in the state they have been documented growing naturally. You can then compare these sites with the temperature and precipitation maps to get a better idea of how suitable to your region a given plant might be. I did not link the other two plants as being of hybrid origin they have a more complicated provenance. Cultivars and hybrids are not listed on Calflora so you have to know the parentage to find out their provenance. The Salvia is a hybrid between Salvia leucophylla and Salvia clevelandii. In my garden when the weather turns hot and soil moisture is low, even when this Salvia's leaves are curling from a lack of soil moisture, the foliage of the silver sage, which grows in a canyon about 12 miles from us (local provenance), and the desert mallow (desert provenance) are full and lush. If you look up Salvia leucophylla on the Calflora website you will find that it grows in the inner and outer south coast range, areas which, though it is quite dry and warm during the summer, are moderated by the local coastal influence. Salvia clevelandii from San Diego County grows mostly inland from the coast but at higher elevations in the Cleveland National Forest. So though my Salvia is nicely drought tolerant it requires more water in my warm inland valley area. In case you are curious about the buckwheat, the mom of this hybrid is from an island off the coast of Baja California (Eriogonum molle). However this selection growing in my yard is more like its dad, the common and very drought-tolerant California buckwheat (Eriogonum fasciculatum), and thus while it is not as resistant to drought as the silver sage or the desert mallow it is more so than the salvia. Making any sense? The take home point here is that in general if you want to use less water in your landscape choose plants from your local region, desert plants, or if you can afford to, move closer to the coast. Now, in my garden the soil is quite sandy and this brings us to the second of our Very Important Considerations: soil type. Now learning about plants and geography is fun but studying soil is, well, pretty dull by comparison so I will keep this section really short. With my sandy soil having relatively large particles it does not compact and accepts and drains water quickly. Having large spaces between soil particles there is also less water retention and more air-holding capability. If I were growing my same plants in a heavier soil with more tightly packed moisture-holding clay or silt I would not have to water the Salvia as frequently. In fact, I would have to be wary that I do not drown the plants by filling in those teeny tiny air spaces with excess water. Too much moisture, especially in the warm months when our native plants are not accustomed to getting water, provides a great environment for root rot fungi, the bane and grim reaper of native plants. So our take home point here is, the lighter and sandier your soil the more water you may need to provide your plants and the more frequently you will need to provide it. The heavier your soil the more slowly you need to apply water, and you need to be cautious not to over water your natives. I could not find an author to credit for this illustration so to whomever made the soil particle drawing in this section, it is very nice. Thank you. Climate and micro-climates are the last of the Very Important Considerations of the magic horticultural triangle. Thank you clipartpanda.com for this happy sun art work. The region where you live and garden is affected by the local climate. I know, duh. But we Californians with our abundant water resources have been loathe to accept or even consider this. California is blessed with lots and lots of varied climates and the climate where you live and garden will have a strong bearing on how drought tolerant your plant will be. Additionally, no matter where you live your home and property also has micro climates, smaller regions where the bigger climate is varied by local conditions. Think the north and south sides of your home. Micro climate variation is also created by the shade of a tree or large shrub, and swales which receive more water from rains and cool air settling at night. Slope direction and sites protected from prevailing winds also create varied micro climates. I know we are not supposed to have leaky faucets, but even these create micro climates. To illustrate, let's say you want to have a cactus collection at your home in San Luis Obispo. Well, this cool and often foggy coastal climate is not too ideal for desert plants. However, selecting a south- or west-facing slope for your plants, just as you would for your solar panels, will provide the warmest and driest site for your sun-loving succulents. Or take that flannel bush (Fremontodendron) that you have tried and tried to grow and repeatedly killed. Being that it is sensitive to summer watering try planting it on the well-drained and warm south- and west-facing slopes. And those water guzzling native willows, alder, redwood sorrel or creek monkey flower which you just have to have in your garden but which you also know you don't have any business trying to grow in your region? Maybe they should be relegated to the moist and more humid north side of your house or garden shed. You can also sneak them a little extra water late at night when no neighbors are watching. Now there is nothing better than failure to teach us valuable lessons, right? For another example of the influence of micro climate here for all the world to read is my "I should have known better" lesson. This is a specimen of Ceanothus 'Wheeler Canyon' which grew wonderfully in my garden for about 6 years and which I had planted on the east side of my house. Being cheap and lazy, when I installed my irrigation system I put the whole section on one valve, so when I ran it all the plants received about the same amount of water. As you can imagine, the soil nearest the house is shaded all afternoon and thus holds moisture much longer than the same soil 10 or 15 feet out. Thus, even with my well-drained-soil watering for my native plants in the outer hot and dry part of the garden, I over watered the Ceanothus and lost it to the grim reaper of native plants, root rot. So the take-away lesson here is that micro climates provide us with opportunities that can and should be used to our advantage to get the most water savings from the plants in our gardens. And the more you garden with your local climate in mind, the less water your plants will need....and success will likely come more easily to you. There is a popular food movement to buy local. So to get the most bang for your water buck and have a beautiful landscape, know your soil, garden within the limits of your climate, and grow local. Michael Wall - Hemet, CA
<urn:uuid:69a69962-842d-4d41-8bfc-aaa860fbb3f4>
CC-MAIN-2023-50
https://www.mynativeplants.net/garden-diary/category/california-native-plants
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.53/warc/CC-MAIN-20231203193127-20231203223127-00020.warc.gz
en
0.958471
2,705
2.71875
3
Douglas Futuyma (2005) p. 162Let’s think about the number of mutations that could accumulate in a population over time. A few pages ago we looked at the origin of antibiotic resistance in bacteria in order to prove that mutations occur randomly. Now we’ll consider just how frequency those mutations could arise in bacteria. Then we’ll ask how frequently mutations occur in humans. Our model bacterium is Esherichia coli the common, and mostly benign, intestinal bacterium. The entire genome was sequenced in 1997 (Blattner et al., 1997) and its size is 4,200,000 base pairs (4.2 × 106 bp). Every time a bacterium divides this amount of DNA has to be replicated; that’s 8,400,000 nucleotides (8.4 × 106). The most common source of mutation is due to mistakes made during DNA replication when an incorrect nucleotide is incorporated into newly synthesized DNA. The mutation rate due to errors made by the DNA polymerase III replisome is one error for every one hundred million bases (nucleotides) that are incorporated into DNA. This is an error rate of 1/100,000,000, commonly written as 10-8 in exponential notation. Technically, these aren't mutations; they count as DNA damage until the problem with mismatched bases in the double-stranded DNA has been resolved. The DNA repair mechanism fixes 99% of this damage but 1% escapes repair and becomes a mutation. The error rate of repair is 10-2 so the overall error rate during DNA replication is 10-10 nucleotides per replication (10-8 × 10-2) (Tago et al., 2005). Since the overall mutation rate is lower than the size of the E. coli genome, on average there won’t be any mistakes made when the cell divides into two daughter cells. That is, the DNA will usually be replicated error free. However, one error will occur for every 10 billion nucleotides (10-10) that are incorporated into DNA. This means one mutation, on average, every 1200 replications (8.4 × 106 × 1200 is about ten billion). This may not seem like much even if the average generation time of E. coli is 24 hours. It would seem to take four months for each mutation. But bacteria divide exponentially so the actual rate of mutation in a growing culture is much faster. Each cell produces two daughter cells so that after two generations there are four cells and after three generations there are eight cells. It takes only eleven generations to get 2048 cells (211 = 2048). At that point you have 2048 cells dividing and the amount of DNA that is replication in the entire population is enough to ensure at least one error every generation. In the laboratory experiment the bacteria divided every half hour so after only a few hours the culture was accumulating mutations every time the bacteria divided. This is an unrealistic rate of growth in the real world but even if bacteria only divide every 24 hours there are still so many of them that mutations are abundant. For example, in your intestine there are billions and billions of bacteria. This means that every day these bacteria accumulate millions of mutations. That’s why there’s a great danger of developing drug resistance in a very short time. Calculating the rate of evolution in terms of nucleotide substitutions seems to give a value so high that many of the mutations must be neutral ones. Motoo Kimura (1968)I based my estimate of mutation rate on what we know about the properties of the replisome and repair enzymes. Independent measures of mutation rates in bacteria are consistent with this estimate. For example, the measured value for E. coli is 5.4 × 10-10 per nucleotide per replication (Drake et al., 1998). Many of these mutations are expected to be neutral. The rate of fixation of neutral mutations is equal to the mutation rate so by measuring the accumulation of neutral mutations in various lineages of bacteria you can estimate the mutation rate provided you know the time of divergence and the generation time. (Ochman et al., 1999) have estimated that the mutation rate in bacteria is close to 10-10 assuming that bacteria divide infrequently. The mutation rate in eukaryotes should be about the same since the properties of the DNA replication machinery are similar to those in eukaryotes. Measured values of mutation rates in yeast, Caenorhabditis elegans, Drosophila melanogaster, mouse and humans are all close to 10-10 (Drake et al., 1998). The haploid human genome is about 3 × 109 base pairs in size. Every time this genome is replicated about 0.3 mutations, on average, will be passed on to one of the daughter cells. We are interested in knowing how many mutations are passed on to the fertilized egg (zygote) from its parents. In order to calculate this number we need to know how many DNA replications there are between the time that one parental zygote was formed and the time that the egg or sperm cell that unite to form the progeny zygote are produced. In the case of females, this number is about 30, which means that each female egg is the product of 30 cell divisions from the time the zygote was formed (Vogel and Rathenberg, 1975). Human females have about 500 eggs. In males, the number of cell divisions leading to mature sperm in a 30 year old male is about 400 (Vogel and Motulsky, 1997). This means that about 9 mutations (0.3 × 30) accumulate in the egg and about 120 mutations (0.3 × 400) accumulate in a sperm cell. Thus, each newly formed human zygote has approximately 129 new spontaneous mutations. This value is somewhat less than the number in most textbooks where it's common to see 300-350 mutations per genome. The updated value reflects a better estimate of the overall rate of mutation during DNA replication and a better estimate of the number of cell divisions during gametogenesis. With a population of 6 billion individuals on the planet, there will be 120 × 6 × 109 = 7.2 × 1011 new mutations in the population every generation. This means that every single nucleotide in our genome will be mutated in the human population every 20 years or so. Blattner,F.R., Plunkett,G., Bloch,C.A., Perna,N.T., Burland,V., Riley,M., ColladoVides,J., Glasner,J.D., Rode,C.K., Mayhew,G.F., Gregor,J., Davis,N.W., Kirkpatrick,H.A., Goeden,M.A., Rose,D.J., Mau,B., and Shao,Y. (1997) The complete genome sequence of Escherichia coli K-12. Science 277:1453-1474.©Laurence A. Moran (2007) Drake,J.W., Charlesworth,B., Charlesworth,D., and Crow,J.F. (1998) Rates of spontaneous mutation. Genetics 148:1667-1686. Ochman,H., Elwyn,S., and Moran,N.A. (1999) Calibrating bacterial evolution. Proc. Natl. Acad. Sci. (USA) 96:12638-12643. Tago,Y., Imai,M., Ihara,M., Atofuji,H., Nagata,Y., and Yamamoto,K. (2005) Escherichia coli mutator Delta polA is defective in base mismatch correction: The nature of in vivo DNA replication errors. J. Mol. Biol. 351:299-308. Vogel,F. and Motulsky,A. (1997) Human Genetics: Problems and Approaches. (Berlin, New York: Springer-Verlag). Vogel,F. and Rathenberg,R. (1975) Spontaneous Mutation in Man. Adv. Hum. Genet. 5:223-318.
<urn:uuid:d844de3c-69a6-4a73-b335-0cf42ad2304b>
CC-MAIN-2016-36
http://sandwalk.blogspot.com/2007/07/mutation-rates.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982968912.71/warc/CC-MAIN-20160823200928-00296-ip-10-153-172-175.ec2.internal.warc.gz
en
0.912369
1,703
3.6875
4
Posts for: June, 2018 Your child is growing by leaps and bounds, so it should go without saying that the foods they consume can provide ample energy and fuel their mind and body, or they can cause deficiencies, mood swings, sluggishness, and health problems. Your child’s nutrition is of the utmost importance and establishing healthy eating habits early on can greatly benefit your child for both the short-term and for the future. With childhood obesity still being a very serious and real problem in our country, it’s never too early to start your child eating a healthy, balanced diet. It’s amazing how what you eat can either help or harm your health. Here are some tips to support good nutrition in your little one. Don’t Forget Breakfast While busy parents might forget to eat first thing in the morning (or turn to coffee to get that burst of energy) growing children should not skip out on breakfast. Making sure they have a hearty protein-rich breakfast will help them stay fuller longer. Greek yogurt or eggs can be a great source of protein. Couple that with whole grains and some veggies and you have the ultimate, energized breakfast. Let Your Child Be an Active Participant If you just tell your child what to eat all the time it’s can be far more challenging to have them eat what they should and children don’t really understand for themselves why certain foods are good for them. Getting your child actively involved in their own nutrition is a great and invaluable lesson that they will carry with them throughout life. Let them choose their favorite fruits and vegetables. Plant a garden together and show them how to tend to herbs and vegetables. Make cooking together a priority and enjoy time with the family while teaching your child how to cook. Revamp Your Diet We know that it can be difficult to completely transition your child into a healthier lifestyle, particularly if eating habits haven’t been the best so far; however, a pediatrician can help guide you through the process to help you make simple decisions that could greatly improve your child’s diet. Simply swapping out certain unhealthy options for healthier ones might be all you need. For example, replace soda with flavored water, ice cream with yogurt, and potato chips with mixed nuts. Sugar in Moderation Okay, we know it’s impossible to prevent your child from ever consuming sugar (after all, what’s a birthday party without the birthday cake?); however, you should limit how much sugar your child consumes each day. Keep sodas, sports drinks, desserts and the like out of the house to prevent temptation. Sure, these treats aren’t that bad for you when consumed sparingly, but we all know the negative effect sugar has on our physical and mental health. If you have questions about your child’s nutritional habits or their health, it’s important that you have a pediatrician that you trust to provide you with the comprehensive and understanding care you and your little one need. Turn to a pediatrician today to have all your questions and concerns addressed regarding your child’s nutrition and lifestyle. You call your Brookline, MA, pediatrician for your child's acute illnesses or problems--that painful earache, the flu or suturing of a small laceration. However, the professional staff at Pediatrics at 1180 wants to see your child more often for what the American Academy of Pediatrics calls a well-child visit. Find out why these periodic exams are important to your child's health and well-being. They start early Your child's first well-child visit is in the hospital when he or she is a newborn. Then, visits continue at regular intervals throughout childhood and adolescence until age 21. Your Brookline pediatrician checks vital signs, height, weight, vision, hearing, and developmental milestones and possible delays (speech, learning, walking, puberty). Also, the doctor provides those critical immunizations, conferring protection against communicable diseases. Additionally, well-child visits give parent and doctor opportunity to discuss: - Safety issues (car seats, involvement in sports) - Behavioral and learning issues - Family dynamics - Exercise and fitness level - Nutrition, including information on and help with breastfeeding and bottle feeding A place for growth and care The American Academy of Pediatrics urges parents to think of their pediatrician's office as the "medical home" for their children. The doctor partners with Mom and Dad, coordinating ancillary services such as orthopedics, psychological testing, and more as needed. Your pediatrician also maintains your child's health record all the way through college, providing physicals for sports, camp, and other extracurricular activities. The staff at Pediatrics at 1180 routinely updates health records with every well-child visit. As your pediatrician gets to know you and your child well, he or she can anticipate a variety of care needs, including those very special needs children with emotional, developmental or physical delays or impairments have. Many times, your pediatrician can prevent larger health problems and their impact on the patient and family with some early interventions. Partner with us At Pediatrics at 1180, the physicians and support team offer wise and compassionate well-child care. Would you care to join us in helping your child grow into a healthy young adult? Please call our office at (617) 232-2915 for an appointment or with any question or concern you may have.
<urn:uuid:33f2998f-76aa-4f1f-b127-8c8ebed40f0f>
CC-MAIN-2019-22
http://www.rebeccahornepediatrics.com/blog/date/2018-06-01.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257497.4/warc/CC-MAIN-20190524024253-20190524050253-00044.warc.gz
en
0.943965
1,123
2.921875
3
It’s not uncommon to be plodding along in any given computer program when disaster strikes. For whatever reason, the program locks up and ultimately crashes completely - maybe even taking down the entire system in the process. But have you ever wondered why that is the case or what caused the issue? Dr. Steve Bagley from Computerphile recently published a YouTube video that shines some light on what’s happening behind the scenes. In the clip, he uses an Atari Falcon from the early ‘90s for the simple fact that it can really only run one program at a time. This makes it easier to crash a program and see what went wrong versus using a modern, more complex computer. The video covers everything from basic and “bad” software crashes to hardware faults and even cosmic rays! Found is a TechSpot feature where we share clever, funny or otherwise interesting stuff from around the web.
<urn:uuid:816ec3b2-f327-45c9-880c-04b35ac0f730>
CC-MAIN-2015-18
http://www.techspot.com/news/57127-this-video-explains-why-your-computer-crashes.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246639057.4/warc/CC-MAIN-20150417045719-00201-ip-10-235-10-82.ec2.internal.warc.gz
en
0.936734
190
2.734375
3
What Is Mugwort Oil? Mugwort is a tree that grows in England and other European countries and is both famous and infamous for its uses because, in ancient times, it was used in black magic and witchcraft. The essential oil is popularly known for its medicinal properties to treat various ailments. The essential oil can be extracted from flowering tops, buds and leaves of the mugwort tree by steam distillation. The chief constituents of mugwort essential oi include camphene, cineole, alpha-thujone and beta-thujone. Uses of Mugwort Oil Mugwort oil blends well with other essential oils such as oakmoss, rosemary, clary sage, cedarwood, lavender and lavandin. Mugwort oil when used in mild doses can serve as a useful home remedy for various ailments. Mugwort oil is used in the following ways: - As a room cleanser - As a deworming agent - As an insect repellent - In anti-aging treatments - As a liver tonic - As a sedative Benefits of Mugwort Oil The health benefits of mugwort oil can be attributed to its vermifuge, diuretic, digestive, cordial, anti-hysteric, uterine, emmenagogue and stimulant properties. The main health benefits of mugwort oil include: 1. Treats nervous disorders Mugwort oil is an excellent tonic for the nerves. It helps in strengthening the nerves and treating nervous afflictions. This essential oil contains stimulant and relaxant properties that sedate the nerves and relaxes them in cases of shock and epileptic attacks. Mugwort oil also stimulates the brain to make it more alert and active. 2. Increases urination Mugwort oil is a diuretic, which increases urine output and frequency. Increased urination helps eliminate excess water, fats, uric acid, salt and other harmful toxins from the body. This essential oil is an excellent remedy for those suffering from water retention, hypertension, renal calculi and obesity. It also effectively treats gout, rheumatism and arthritis. 3. Regulates menstrual cycle Mugwort oil contains emmenagogue properties, which clear obstructed menses and make them more regular. It also helps alleviate menstrual cycle associated symptoms like cramps, headaches, nausea, abdominal pain and fatigue. Mugwort oil can also be used to prevent early menopause. 4. Cures digestive disorders Mugwort oil is efficient in curing digestive disorders and microbial infections. It stimulates the flow of digestive juices in the stomach, prevents stomach infections and also helps stimulate appetite and facilitate digestion. 5. Acts as a stimulant Mugwort oil is a natural stimulant that helps the vital functions in the body such as the discharge of bile, secretions of hormones, nervous responses, blood circulation, enzyme secretions, menstrual discharge and production of breast milk. 6. Kills intestinal worms Worms stop the absorption of nutrients in the body and affect normal development. Due to its toxic nature, mugwort oil is effective against intestinal worms. It kills worms and helps re-establish a normal growth pattern in the body. It should be administered in mild doses. 7. Delays aging process Aging is a natural process; however, due to stress and anxiety, many people fall victim to premature aging. Mugwort oil is an effective remedy to counteract signs of aging and delay the aging process. It is a natural moisturizer that gets deeply absorbed into the skin and reduces the appearance of wrinkles and fine lines. 8. Prevents bacterial infections Mugwort oil is loaded with anti-bacterial properties that prevent bacterial growth in the body and fight infections. Mugwort oil also helps kill germs in the environment, hence spraying in mild doses can kill bacteria present in the air. Side Effects of Mugwort Oil Since mugwort oil contains thujone, it is neurotoxic, abortifacient and an irritant. - Mugwort oil is known to have narcotic effects on the brain and also irritate the skin. - Pregnant women must never use mugwort oil as it can cause early uterine contractions and abortion. - Breastfeeding mothers are also advised not to use mugwort oil as the toxicity can pass through breast milk. - A patch test is recommended before using this essential oil.
<urn:uuid:0ceb7230-a0e6-442f-9ba5-dedb3ec5c3fd>
CC-MAIN-2020-29
https://www.zliving.com/health/essential-oils/mugwort-oil-114413/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896169.35/warc/CC-MAIN-20200708000016-20200708030016-00594.warc.gz
en
0.934156
954
2.6875
3
f you somehow haven’t noticed yet, I really love bread! I love making bread, and I sure do love eating all kinds of bread (not just baguette). I simply enjoy browsing through enormous shelves filled with all kinds of flour and picking the right one for my next recipe, or just trying out a new one to see how it will turn out in one of the well-known recipes. As for the yeast, I actually prefer the fresh one over the dry yeast, because I find that it gives the dough more volume. Of course, if I don’t plan ahead, dry yeast is just fine, especially if I am too lazy to go to the store! If you would like to learn more about yeast, check my post about . 2 Types of Yeast Doughs There are two main types of yeast-raised doughs: - Lean yeast dough contains four basic ingredients: flour, water, salt, and yeast, with a possible addition of small quantities of sugar and fats. Those are ingredients that are used for making most savory breads. - Enriched yeast dough contains the same four ingredients, but they also call for extra fat (butter), some sugar and eggs. With proper manipulation of all the ingredients, you can make a large variety of breads. How to Make Yeast Dough? Scaling the Ingredients It is important to measure ingredients accurately, and it is preferable to have them at the proper temperature. All ingredients combined and well kneaded should reach 25ºC (77°F). The amount of flour may vary, depending on the humidity level and the amount of protein in the flour. Flour with more protein will absorb more water. Mixing and Kneading the Dough The yeast dough must be kneaded properly, so the ingredients are combined uniformly, and the gluten is developed. There are several methods of mixing the yeast dough: - Straight Dough Method is the simplest and the most common method of mixing yeast dough. Yeast is first dissolved in water, and then it is added to flour and salt mixture. After that, the dough is kneaded until it becomes smooth and elastic. - Sponge Method has two stages. First we mix yeast, liquid and half of flour to make a thick batter – sponge (Fr. poolisch). The sponge is then left to rise until doubled in size (this mixture can be prepared for up to 16 hours in advance, depending on the quantity of yeast). After that, the remaining ingredients are added, and the dough is kneaded and left to ferment again. This method gives lighter texture and different flavor to the breads. - Old Dough Method (Fr. pâte fermentée [pat fεrmɑ̃te]) is a method of adding a piece of dough from the previous batch to a new batch at the end of mixing. Up to an equal amount by weight of old dough can be added to the new batch of dough that will improve the flavor of the bread. Old dough can be stored in the refrigerator for up to 3 days. - Sourdough Starter Method is based on a sourdough starter – dough that contains wild yeasts and bacteria which gives the acidity and specific flavor to the bread. Sourdough is also called a natural starter, and it is prepared by mixing flour and water and letting this mixture stand until wild yeasts begin to ferment. Starter is “fed” with flour and water each day until the yeast develops, and then it is used to leaven bread. A piece of the starter is saved and mixed with more flour and water so it can be used again the next day. This stage of making yeast dough refers to leaving the whole mass of the dough to rise. Fermentation is a process in which yeast feeds on starches in the dough converting them into carbon dioxide and ethanol. Carbon dioxide stays “trapped” in the dough thanks to elastic gluten strands. Place the dough into a container large enough that the dough can double in volume and oil the dough, so it doesn’t dry out. Cover the dough and place it at a temperature between 24°C (75°F) and 29°C (84°F). Punching Down the Dough After bulk fermentation, the dough is gently punched with a hand to redistribute the air pockets. It also evens the dough temperature and relaxes the gluten. Portioning and Rounding the Dough After punching, it is time to portion the dough. The best way is to scale the dough in desired weight, whether you are making loaves or bread rolls. The dough can be cut with a chef’s knife or a dough cutter and rounded into smooth round balls which helps later shaping of the dough and holds the gasses. Shaping, Makeup, and Panning Yeast doughs can be shaped into a large variety of forms – loaves, free-form rounds, rolls or buns. When you want the dough to hold the specific shape, it is best to put it in a matching pan at this stage. You can make free-form shapes, but you can also use baskets that will hold the shape of the dough and leave a distinctive imprint on the bread. Proofing is the second and final fermentation of yeast dough before it is baked. The temperature should be between 27°C (80°F) and 46°C (114°F). If you don’t prove the dough enough, bread won’t rise enough in baking, and it won’t have good texture. On the contrary, if you overproof the dough, you will get a paler crust, poor volume and sour flavor. Just before baking, the wash can be applied, that will impact the color and the texture of baked crust, depending on the type of the wash. Egg yolk gives shine and darker and softer crust while egg white results with shine and firm crust. Bread is often topped with flour instead of wash before baking, which gives texture and contrast. Melted butter, oil or starch wash are applied on the dough immediately after baking. Just before baking we can improve the appearance of the bread by cutting its top with a knife, scissors or a razor. That way, even after the crust is baked, the gasses are allowed to escape, and the dough rises uniformly. If the bread is not properly scored, the crust could break randomly. Most breads are best baked in the oven preheated to 220°C-230°C (428°F-446°F). Bread is baked when it gains deep brown crust, and when tapped on the bottom, it sounds hollow. Cooling and storing Bread and other yeast dough products should be cooled on racks (to avoid condensation of the moisture on the bottom), and they should be cooled completely before cutting. Well, it isn’t as complicated as it seems, and once you make your own bread, you will become addicted to bread making! I know I am. And with this thought, I am off to make simple bread rolls! Well, what do you think about this post? I read and really appreciate all the comments, even though I do not always have the time to respond to each one. So – keep me in the loop and try to create some sweetness every day because – Sweetness is happiness!!
<urn:uuid:f9cb81ee-6a1e-4747-a6e2-86f6035938c1>
CC-MAIN-2023-50
https://pastrymaestra.com/doughs-and-batters/how-to-become-the-boss-of-yeast-dough/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00137.warc.gz
en
0.948686
1,521
2.6875
3
HEALTHY TREATS FOR YOUR DOG Updated: Oct 27, 2020 We all like to have snacks in between meals including our dogs. People spend lots of money on treats, cookies and snack food for their pets. These treats purchased at the store are often filled with chemicals that are toxic, have large amounts of sugar and are not species appropriate treats for our dogs. Store bought treats have the same problem as kibble, the processing makes the food depleted of nutrients. They lack good nutrition and are high in calories! Many times, creating unwanted health issues such as allergies or in some terrible cases death due to the chemicals in those treats. Please be ever vigilant in providing only healthy organic treats to protect your dog. As pet parents we can create good healthy snacks for our dogs that are nutritious, low caloric and fun to eat. We can bake our own cookies or give them raw uncooked treats. But where do we start? What is nutritious and how can we give them to our dog safely? Here are some healthy, nutritious and low caloric treats that are safe for your dog and many of these snacks may already be in your refrigerator. Blueberries- A handful of fresh blueberries provide anti-oxidants to support the immune system, eyes and healthy brain chemistry. Add small handful (8-10) blueberries, for a special treat. Apple slices- Many dogs like apples they are sweet, crunchy and taste so good. They provide fiber, vitamins A & C and other plant phyto-nutrients for good health. No seeds they are poisonous!! Carrots- Carrots are great low caloric treats that add fiber and beta-carotenes to your dog’s diet. A few small carrots taste sweet and can be added to treat dispensers to add mental stimulation for your dog. Green Beans- This is another food source of fiber along with the Vitamins C & K. They are crunchy raw or can be used as a frozen treat. They are a good treat for dogs that need low calorie treats. Sweet Potatoes- Sweet potatoes are great sources of fiber, beta-carotenes, and manganese, along with vitamins B & C. Slice them up and dehydrate them in the oven to create great crunchy nutritious chewy snacks. Mozzarella String Cheese- Small pieces of string cheese can be used as special treats during training sessions or rewards during walks. They provide small amounts of protein and calcium for bone and muscle support. Yogurt- A tasty and nutritious treat with calcium and protein along with pro-biotics for good digestive health. Make sure it is organic, low in sugar (no artificial sugars) and live bacteria. Plain or vanilla flavors are best. Freezing yogurt in paper cups (remove paper cup after frozen) or ice cube trays are great ways to keep your dog busy for awhile during a summer day. Healthy snacks create good healthy dogs. Healthy dogs are happy dogs to live with!!!
<urn:uuid:92aed6a1-8da3-4595-be86-cd48dc3dae2f>
CC-MAIN-2021-49
https://www.florapaws.com/post/healthy-treats-for-your-dog
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358591.95/warc/CC-MAIN-20211128194436-20211128224436-00633.warc.gz
en
0.952369
612
2.59375
3
Diabetes-related kidney disease deadly: study NEW YORK (Reuters Health) - Results of a study confirm that the outlook is poor for type 1 diabetic patients who develop end-stage renal disease (ESRD) -- the most advanced form of kidney disease. "End stage renal disease remains a dreadful complication in patients with type 1 diabetes, and great effort to prevent kidney disease in these young patients is needed," write researchers in the medical journal Diabetes Care. In ESRD, the kidneys lose their ability to filter waste products from the blood and excrete them in the urine. People with ESRD need kidney dialysis or a kidney transplant to stay alive. Diabetes is the most important cause of ESRD. Researchers examined the epidemiology and long-term survival of patients with ESRD by diabetic status in Australia and New Zealand (ANZ). Dr. Emmanuel Villar, of the ANZDATA Registry in Woodville, South Australia, and colleagues included in their study all patients at least 16 years of age who started renal replacement therapy from April 1, 1991 to December 31, 2005. Analyses centered on 1,284 type 1 diabetic patients, 8,560 type 2 diabetic patients, and 18,704 non-diabetic patients. Compared with non-diabetic patients, the risk of death after the first renal replacement therapy was 64 percent higher in those with type 1 diabetes and 13 percent higher in those with type 2 diabetes, Villar and colleagues found. There was no change in survival per 5-year period in type 1 diabetic patients, but significant improvements were observed in type 2 diabetic patients and in non-diabetic patients. Summing up, the researchers note that "despite high access to renal transplants, type 1 diabetic patients had a poor prognosis after starting renal replacement therapy." Risk factors for kidney disease in patients with type 1 diabetes include high blood pressure and high lipid levels, as well as longer disease duration, elevated blood sugar levels, and male gender. SOURCE: Diabetes Care, December 2007.
<urn:uuid:ea75ed35-b6da-4706-a5c4-ba1695fd473f>
CC-MAIN-2014-35
http://www.enn.com/top_stories/article/28189
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500804220.17/warc/CC-MAIN-20140820021324-00446-ip-10-180-136-8.ec2.internal.warc.gz
en
0.937171
417
3.015625
3
Our curriculum enables children in the community to access additional educational, cultural and social opportunities to ensure that they have equal opportunities to achieve. Class sizes are limited to 10 in Primary and 15 in Secondary in order to maximise the amount of support learners receive. The English, Mathematics and Science Programmes are delivered in line with the English National Curriculum. Black History and Culture Our history and culture is embedded throughout the curriculum. We support young people to explore their African and Caribbean heritage so they can express themselves, grow and be aspirational. The mathematics programme focuses on learning and appreciating maths in the world around us. Learners will be introduced to interactive lessons that help them to develop their analytical and problem-solving skills that can then be applied across subjects and in many different job roles. Our objective is to improve and promote high standards of language and literacy skills. Learners will be introduced to a more diverse range of fiction and non-fiction text. They will be encouraged to use their imagination and write creatively. Support will also be given in helping them identify and apply grammatical concepts in their writing. We provide weekly support with English, Verbal Reasoning, Maths, and Non Verbal Reasoning to help learners prepare for Grammar School or Independent school entrance exams. We allow children to enjoy science again and reminds them that we are all scientists at heart. Our lessons hope to cover all learning style and techniques, ensuring that the children think, question, suggest, engage and reassess their understanding of how something can be. We also support our young people to achieve their cultural and sporting ambitions. Our enrichment activities include cultural visits, guest lecturers, sports and outdoor education. Personal and cultural history is embedded throughout all our programmes so that we can supplement what mainstream school does not provide: learning about ourselves and the world. There is an African centric understanding that ‘it takes a village to raise a child’ and Louise Da-Cocodia Education Trust believe in this tenet. We are dedicated not just to the education of children but where possible, to also support the wider family. Similarly, we believe that learning is a continued process of life’s journey hence, the rolling out of our family learning programme. It is anticipated that the family learning programme will create lasting change in how education is approached within families in African and African Caribbean heritage families. Benefits from engaging with the family learning programme include: an understanding that learning is fun generating a desire for further learning improved relationship between inter-generations of family members improved self-confidence, health and wellbeing increased parental involvement in their children’s schools and or local community increased social networking opportunities increased parental ability to support their children’s learning at home improved capacity to advocate on their children’s behalf improved ability to gain employment or start a business Supplementary students enjoyed a trip to the Black History Archive in London Our sporting activities help young people to: Keep fit and have fun Eat well and exercising Work in groups Build confidence and self-esteem Make them stronger - physically and mentally Meet new people and making friends Develop a positive mental attitude at school, at home and in the community
<urn:uuid:1d279670-1ab5-4ec7-9c26-b0c2a3d721a5>
CC-MAIN-2021-49
https://www.dacocodiatrust.org.uk/curriculum
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359073.63/warc/CC-MAIN-20211130201935-20211130231935-00276.warc.gz
en
0.949674
729
3.65625
4
Meaning of CABLE in English n. & v. n. 1 a thick rope of wire or hemp. 2 an encased group of insulated wires for transmitting electricity or electrical signals. 3 a cablegram. 4 a Naut. the chain of an anchor. b a measure of 200 yards. 5 (in full cable stitch) a knitted stitch resembling twisted rope. 6 Archit. a rope-shaped ornament. v. 1 a tr. transmit (a message) by cablegram. b tr. inform (a person) by cablegram. c intr. send a cablegram. 2 tr. furnish or fasten with a cable or cables. 3 Archit. tr. furnish with cables. cable-car 1 a small cabin (often one of a series) suspended on an endless cable and drawn up and down a mountainside etc. by an engine at one end. 2 a carriage drawn along a cable railway. cable-laid (of rope) having three triple strands. cable railway a railway along which carriages are drawn by an endless cable. cable television a broadcasting system with signals transmitted by cable to subscribers' sets. [ ME f. OF chable, ult. f. LL capulum halter f. Arab. habl ] Concise Oxford English dictionary. Краткий оксфордский словарь английского языка. 2012
<urn:uuid:3e7f80f5-7af2-451d-ba3b-eafdd770e4ee>
CC-MAIN-2018-34
https://slovar-vocab.com/english/concise-oxford-dictionary/cable-6746508.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213158.51/warc/CC-MAIN-20180817221817-20180818001817-00590.warc.gz
en
0.826098
321
3.0625
3
For centuries, Western legal tradition relied on the assumption “pater semper incertus est” (“the father is always uncertain”). But starting in the early twentieth century, scientists began a quest for a biological marker of paternity that could unambiguously link a child to his or her progenitor. Prior to the advent of DNA testing, scientists from around the world experimented with fingerprints, dental evidence, ear shape, and blood typing. Nara Milanich, associate professor of history at Barnard College, examines the link between the history of the paternity test and the history of gender, family, and changing ideas about kinship. Although today paternity can be determined with over 99 percent accuracy, biological certainty by no means displaces legal and social constructions of family. In the age of modern biomedicine, the definition of parentage is arguably as “uncertain” as ever.
<urn:uuid:474f7c91-61a5-486c-a6f2-3757063d4cc1>
CC-MAIN-2014-35
http://www.barnard.edu/events/global-history-paternity-test
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835699.86/warc/CC-MAIN-20140820021355-00343-ip-10-180-136-8.ec2.internal.warc.gz
en
0.943221
187
3.421875
3
I keep hearing smart watches, wearables, internet of things etc. which got me thinking about the hardware and embedded systems used to create them. As much as I love soldering and reading resister codes I’m ashamed to say the most complicated thing I’ve made was an FM transmitter. Since I had an Arduino lying around I decided to build a watch to learn more about the hardware side of things. The plan was to build a POC clock using the Arduino and then shrink it to a watch using an ATtiny . So I decided on 24 LEDs, 1 each for hours and minutes at 5 minute intervals. They could blink to show seconds ticking (stretch goal). Another (much cooler) idea was to use 4 LEDs to display the hours in binary… but then again, no way will I be able tell the time after a few beers 🙂 I’ve heard Arduino is not very good at keeping time accurately. So I wrote a quick sketch to test this. Fortunatly after a few hours of testing with this code, the Arduino seems to keep time reasonably well. Now I have to individually control 24 LEDs using much lesser number of output pins from the Arduino. This was the hard bit, but few searches later the answer was to use a ‘serial to parallel converter’. Lucky I found this excellent post by DrLuke http://bildr.org/2011/08/74hc595-breakout-arduino/ on how to do this using a 74HC595. You can find a great explanation about each pin out there, but basically they have 3 pins. The clock/SRCLK (or stepper as I like to call it), the input/SER and the RCLK which is like a paint() or draw() function. Every time you give a pulse using the clock, the 74HC595 will take the value of the input pin and assign it to output pin 1 and cascade/shift down the value of pin 1 to pin 2 etc. Since the chip only have 8 outputs, I will need 3 of these. So I opted for a PCB with pre drilled holes. First thing I did was place all 24 LED’s in two circles and soldered the cathodes or the negative pins together. As a software dev I KNOW to test at every step 🙂 so I attached a crocodile clip to the negatives and tested each of the LEDs using a 3v battery pack for bad soldering joints and short circuits. Now to the hardest part, solder the rest of the 24 LED positive pins to the 3 74HC595s. Unfortunately it was after I soldered 48 LED pins and 48 pins of the three 74HC595s, I learnt about charlie plexing, which could avoided the three serial to parallel converters all together! Facepalm! Seventy percent of all archaeology is done in the library.” -Indiana Jones. I guess “Seventy percent of all electronics should be done in Google”. Since I want to use the Arduino for other projects I replaced it with an ATTiny84 which was programmed using the Arduino, but that is post for another time. I used an IC socket for the ATTiny so I can remove it to reprogram it/set the time. I had a issue with the ATTiny resetting when all 24 LED’s were lit at the same time to indicate seconds ticking. This was caused by a voltage drop due to high load. A 10μF capacitor between Vcc & GND fixed it.
<urn:uuid:477c69f5-eeb3-4cdf-93dc-d6b7e1321b08>
CC-MAIN-2016-40
http://chris.gunawardena.id.au/software-development/building-a-clock-based-on-arduino/
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660181.83/warc/CC-MAIN-20160924173740-00265-ip-10-143-35-109.ec2.internal.warc.gz
en
0.954608
737
2.59375
3
Item Code: IDJ594 by Martin OudejansPaperback (Edition: 1997) Central Chinmaya Mission Trust, Mumbai Size: 8.2" X 5.3" Pages: 106 (Black & White Illus: 2) Price: $8.00 Shipping Free Earliest man was dependent on bountiful Mother Earth to provide his food and shelter for survival; therefore, he began to observe her daily rhythms and cycles of seasons, along with the reoccurring heavenly phenomena. To the different manifestations he gave names of the gods and worshipped them as servants of a greater, unknowable God. Many of those gods remain with us today in our universal religious symbols: the mountain as the ascent to the Divine, the river as the flow of life, water as a cleansing agent, and the wind as the holy spirit. Living in harmony with the natural creation and all creatures, man discovered a harmony, connection, and unity with the wonderful world. Further, the enormous diversity of living and material forms inspired awe man began to look for a cause, or creator, for the diversity. Harmony and beauty go together. The problem arises when scientists try to discover harmony in the laws of nature without talking in account the beauty of the parts and their unity. While modern man tears nature apart to discover its secrets - the cycles of growth, the mutual interdependence of plants and animals - the ancients explored the phenomena of harmony and beauty in their world by going inside their own inner being to discover the greatest mystery of all: God, man, and the world are one. To reach a comprehensive explanation of nature in relation to man in this issue, we begin our investigation of harmony and beauty with a reviews by Alexander Skutch of their definitions. He postulates that harmony can only exist where there is unity of the parts. He further concludes that beauty is necessary for the spiritual evolution of man, for it is because of the beauty of creation that man is inspired to investigate its nature and thus discover the underlying goodness and unity. Rabindranath Tagore investigates man's relation to nature and attributes Western man's self-centeredness to his disharmony with nature. He contrasts this attitude with the way of life in Vedic India which has molded the mind of the people there. Part one concludes with a conversation between Albert Einstein and Rabindranath Tagore in which Tagore insists that beauty of the world and truth of divinity are in fact dependent on the existence the human being. The great splendor and variety of natural beauty ever remind man of the greatness of the creator. When he closely observes the world, he becomes aware of a harmony and beauty within himself which seems a part of the very harmony and beauty of nature. Communion with nature can open a passage to his divine self, for it is often in quiet meditation in solitary natural settings that man meets the Divine. When he does so he experiences a new level of connection with all of nature's aspect: the elements and their interplay. In Part two three great lovers of nature - Ralph Waldo Emerson, Henry David Thoreau, and Swami Tapovan - share some of their thoughts, experiences, and appreciation for our beautiful planet Earth. Part Three treats the relationship of the many, diverse phenomena of the world with the one essential reality. The Upanisads continually extol God as the sole reality. When in a natural setting we behold the wonder of our world we intuitively affirm that all of this is God, but the problem comes when we try to understand how God is all of this. In the third chapter, G. de Purucker examines how the many aspects of the world contribute to the mutual interdependence and cooperation of all things. Many misunderstand that the point of view that all of this is an expression of God means that no emphasis is to be laid on the world; however, Collum asserts that in fact a belief in the unity of the world necessitates a compassion for our fellow sojourners and an ultimatum that we must work in harmony with all. Then, using selections from the seventh and ninth chapters of the Bhagavad Gita, Swami Chinmayananda explains the great secret of how the One is also the many manifestations. In fact it is only because of this one underlying Reality in and through all things and beings that there is a mutual cooperation possible in the world. The native American Indian had such a confidence in the unity of man, nature, and God that they went to nature to seek wisdom for the welfare of their people and spiritual understanding for themselves. This tradition is reminiscent of the quest for truth of Satyakama of the Chandogya Upanisad. While out tending cattle for his guru, the student obtained such an absorption into the totality of Nature that he was taught the knowledge of the four parts of Brahama (the creator) by fire and three animals: a bull, swan, and diver-bird. When Satyakama returned to his guru, the teacher questioned him, "Verily, my son, you shine like a knower of Brahma. Who, pray tell, has instructed you" "Those other than man" the student honestly replied. The fourth section begins with an account, given by the Sioux holy man Black Elk, of a ritual in which a "lamenter" asks for a message from nature to his people in their attempt to live in harmony with the Great Spirit. The subject of living in harmony in the world is further explored by the Christian theologian, Dr. Jeremy Taylor, and the Buddhist master, Shunryu Suzuki, Swami Chinmaynanda completes the subject with an overview of the dynamics of living a life of harmony and poise in the world around us to ultimately being us to the experience of oneness with of creation. Harmony and Beauty The Vedic songs of ancient India extol again and again the wonder of wonders Man, Creation, and God are One. Both the creation and man come from one great source. The harmony and beauty of the creation is an indicator of this highly skilled, intelligent, creative orchestrator. In the wonder of nature, man not only experiences in the wonder of nature, man not only experience a beauty in himself, but also a harmony with the oneness of the entire creation. In an attempt to reach a comprehensive understanding of man in relation to the harmony and beauty, the subject is divided into four sections. Man and His World: The unique role harmony and beauty plan in man's relationship with the world to bring him to a deeper understanding of his own innate nature. Reflections on Nature: Personal experiences of persons who have gone to natural places to partake the wonder of nature's beauty and realize their place in the infinite unity beyond the world of natural necessities. The Unity in Diversity: Describes the One behind the many that includes all of the seeming diversity of the world, yet remains ever whole. Harmony in Living: Techniques and thoughts on bringing the harmony. |PART ONE | MAN AND HIS WORLD |I||The message of Beauty||8| |by Dr. Alexander F. Skutch| |Man and His Environment||9| |The Role of Beauty in Evolution||11| |The World Process||12| |II||The Relation of the Individual and the Universe||16| |by Rabindranath Tagore| |Man's Kinship with Nature||17| |Fundamental Unity of Creation||18| |Power of Union||20| |III||On the Nature of Reality||23| |by Rabindranath Tagore| |Truth, Harmony and Beauty||24| |The Value of Truth||25| REFLECTIONS ON NATURE |IV||Nature and Beauty||32| |by Ralph Waldo Emerson| |Harmony of Man and Nature||33| |The Love of Beauty||35| |V||The Splendor of Nature||38| |by Swami Tapovan| |Glory of the Divine Himalayas||38| |Kindness of the Villagers||41| |The Celestial Mountain||44| |VI||At Walden Pond||47| |by Henry David Thoreau| |Morning and Wakefulness||47| |Fulfillment in Solitude||52| |PART THREE | THE UNITY IN DIVERSITY |VII||The Harmony in Diversity||58| |by G. de Purucker| |All Things Contribute to All Things||59| |Unity in Cooperation||61| |VIII||The Divine Pattern of Harmony||63| |Divine Compassion and Unity||63| |The Lost Ideal||66| |The Meaning of Individuality||68| |PART FOUR | HARMONY IN LIVING |X||That We May Live||82| |by Black Elk| |Reporting of a Vision||84| |XI||Practice of the Presence of God||88| |by Jeremy Taylor, D. D.| |Exercising this Practice||89| |Benefits of the Exercise||91| |XII||Zazen in Daily Living||94| |by Shunryu Suzuki| |Flowers and Weeds||95| |A Weed is a Treasure||97| |XIII||A Life of Harmony and Poise||99| |by Swami Chinmayananda| |A Vision of Totality||99| |The Cooperative Spirit||101| |Culmination of Evolution||102| |The Experience of Oneness||104|
<urn:uuid:427cc6e5-26dd-4977-b3a2-b89bc7c89db5>
CC-MAIN-2014-23
http://www.exoticindiaart.com/book/details/harmony-and-beauty-in-man-and-his-world-IDJ594/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997877670.44/warc/CC-MAIN-20140722025757-00134-ip-10-33-131-23.ec2.internal.warc.gz
en
0.913025
2,022
2.59375
3
Summary and Info This new edition of the classic text incorporates the many advances in knowledge about liquid crystals that have taken place since its initial publication in 1974. Entirely new chapters describe the types and properties of liquid crystals in terms of both recently discovered phases and current insight into the nature of local order and isotropic-to-nematic transition. There is an extensive discussion of the symmetrical, macroscopic, dynamic, and defective properties of smectics and columnar phases, with emphasis on order-of-magnitude considerations, all illustrated with numerous descriptions of experimental arrangements. The final chapter is devoted to phase transitions in smectics, including the celebrated analogy between smectic A and superconductors. This new version's topicality and breadth of coverage will ensure that it remains an indispensable guide for researchers and graduate students in mechanics and engineering, and in chemical, solid state, and statistical physics. More About the Author Pierre-Gilles de Gennes (French: [ʒɛn]; October 24, 1932 – May 18, 2007) was a French physicist and the Nobel Prize laureate in physics in 1991. Review and Comments Rate the Book The physics of liquid crystals 0 out of 5 stars based on 0 ratings.
<urn:uuid:5b1414b2-1c8c-4c4d-be1b-55b3167f8edc>
CC-MAIN-2017-04
http://libdl.ir/book/183396/the-physics-of-liquid-crystals
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00461-ip-10-171-10-70.ec2.internal.warc.gz
en
0.916053
258
2.78125
3
Usually, my ‘Science for Fun’ piece is an experiment for people to try, or an explanation of a science topic. This time, I am taking a look at some examples of loose language in science – some harmless and some less so. As a science communicator, accurate language is something that I take extremely seriously, and I see a lot of use of inaccurate language in all forms of media. Recently a Chemistry in Australia reader pointed out to the editor some examples of inaccurate science they have observed. These are the subject of my column. I have a prescription medication that boldly states ‘Do not take potassium without medical advice’. I wouldn’t take potassium even if it was prescribed by my doctor! This misinformation is technically incorrect, but unlikely to be dangerous. The reader was referring to the element potassium (atomic symbol K), a very reactive metal. If you put metallic potassium in water, it will react violently. Depending on the size of the piece of metal, it may fizz, catch fire or explode. In schools and universities, small amounts of potassium (or similar metals such as sodium) are put into water to demonstrate their high levels of reactivity. A video showing the reactivity of these metals with water can be seen at bit.ly/2BSz5kf. Potassium in elemental form is not going to be part of a medication. However, potassium in the form of ions (K+) is an important part of some medicines, and indeed a crucial component of the human body. This distinction between forms of chemicals is extremely important, and sometimes deliberately manipulated to provide misleading information. A classic example of this is the issue of mercury as a preservative in vaccines. Yes, mercury is a very toxic heavy metal. Yes, some vaccines contained mercury. However, the mercury was only present in small amounts – way below established safety thresholds, and in a chemical form (called thimerosal) that allowed rapid excretion from the body. The evidence in this case still shows that exposure to mercury from vaccines was safe, but public perception and fear resulted in removal of all mercury from vaccines. See a fact sheet about thimerosal at bit.ly/2CJiPyX. In our local media there have been ads for ‘chemical-free food’. Can food be ‘chemical free’? I know for sure that our reader knows the correct answer to this. By definition, literally everything is chemicals. The intention with the term ‘chemical free’ is to market something as being perhaps organic, natural, healthy, clean, safe etc., but unfortunately this use of language can result in an unnecessary and dangerous phobia of ‘chemicals’. Now don’t get me wrong, I’m not suggesting that minimising or avoiding toxic or harmful chemicals is a bad thing – far from it! It is the use of language that I disagree with. Perhaps people conveniently forget that some of the most dangerous chemicals known – including components of snake venom, botox and cigarette smoke – are ‘organic’ and ‘natural’. In addition, as with the example of mercury, the toxicity of all chemicals is dependent upon the dose. Even water is toxic if you consume enough of it (bit.ly/1XfYcio). Our previous Prime Minister reportedly said that ‘carbon dioxide is a weightless gas’. The political debate around climate change, and the carbon tax is full of loosely used language such as this. Carbon dioxide is not weightless, and is indeed a more dense gas than the air around us. Even by a less scientific definition, ‘weightless’ refers to something ‘lacking apparent gravitational pull’. A simple experiment, where one balloon is filled with air, and another is filled with carbon dioxide, provides evidence that this gas is in no way weightless. Drop both balloons at the same time and the carbon dioxide balloon will fall to the floor due to gravity much more quickly than the air balloon. Again, this may not be critical misinformation, but is further evidence of the loose language used in discussions of scientific issues. It seems to me that one of the major problems in science journalism in Australia is the decline of specialised science journalists in the mainstream media. This, among other reasons, has contributed to an increase in the careless or inaccurate language. I won’t address these ideas in detail here, as they were succinctly covered last year by Professor Joan Leach, Director of the Centre for the Public Awareness of Science at ANU, in an article in The Conversation entitled ‘Science journalism is in Australia’s interest, but needs support to thrive’ (bit.ly/2GMcrtg). Professor Leach discusses the importance of accurate scientific reporting, and reasons for the decline of specialised science journalists. She points out that, thankfully, ‘as the number of science correspondents has fallen, the science sector has rushed in to fill the online void with blogs and social media sites’. In answer to the reader’s question, my opinion is that yes, we should be doing all we can to assist in the accurate portrayal of science in the mainstream media. How exactly to do this though, I honestly don’t know. Ultimately, this is of critical importance, as more accurate reporting allows the public to make more informed decisions when it comes to things such as voting for our government, who creates and enforces policy.
<urn:uuid:a1330331-04e1-4a8b-bc5d-1c352a520c16>
CC-MAIN-2018-22
http://chemaust.raci.org.au/article/may-2018/targeting-loose-language-about-science.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868316.29/warc/CC-MAIN-20180527131037-20180527151037-00457.warc.gz
en
0.950922
1,132
3.390625
3
Dendrobium species live as epiphytes and lithophytes in New Guinea, Southern China, Thailand, Japan, Australia, New Zealand, Tahiti and more. As a result, it’s hard to generalize how to care for these types of orchids. Some of them require cool nights of 50 to 59°F (10 to 15°C) while some of them require warm temperatures in the 80s°F (27°C). That’s why it’s so important to understand their natural environment so that you can make them happy. Learn more about Dendrobium orchids. Once you develop more than a passing interest in orchids, you will quickly notice how diverse this exotic plant family is. Encompassing genera that yield both the vanilla you love to bake with and fragrances you love to wear, each flower has unique characteristics and care requirements. Compare your plants to some of the most commonly cultivated orchids to help you determine what type of orchid you are growing.
<urn:uuid:276dad9a-2b60-4871-8552-02e7668c61f0>
CC-MAIN-2019-43
https://orchids-gardening.info/oncidium-orchid-repotting-orchid-potting-mix-walmart-canada.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986702077.71/warc/CC-MAIN-20191020024805-20191020052305-00448.warc.gz
en
0.925513
216
3
3
When you develop a lung disease such as asthma or chronic obstructive pulmonary disease, it becomes a part of your life. The big question is: How can I breathe better? The first step is getting the diagnosis straight. Some asthma and COPD differences are subtle, and there’s even a third possibility: asthma-COPD overlap syndrome. Here's a look at how two affected people are coping with their circumstances. Mitchell Spanjers, 20, a college junior in Minnesota, found out he had asthma in kindergarten. “I live in a suburb with a decently sized backyard, and I was running around and it got hard to breathe,” he recalls. His pediatrician soon made the diagnosis.
<urn:uuid:eaa8531c-6977-4ee9-94aa-22044d99f556>
CC-MAIN-2017-17
http://www.newshub.org/m/asthma-copd-11987156.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123172.42/warc/CC-MAIN-20170423031203-00146-ip-10-145-167-34.ec2.internal.warc.gz
en
0.977577
148
2.625
3
The findings presented here are subject to gradual change through new discoveries and reinterpretation of the evidence. As the skull-types demonstrate, the Australian Homo erectus specimens are of both the earlier flat-cranium ‘archaic’ and receding forehead ‘late’ forms, followed by both ‘archaic’ and ‘modern’ Homo sapiens. Three small skull-types may represent a pygmy-size race of Homo with ‘modern’ features of considerable antiquity. One skull-type suggests a primate presence in Pleistocene Australia at a remote period. From New Zealand evidence of penetration there by Homo erectus is presented by two skull-types; an endocast of the ‘archaic’, and mineralised skull of the ‘late’forms. A word about the skull-types: These are either of limestone, mudstone or ironstone mineralisation, and are either endocasts [ie internal casts formed by sediments filling the skull interior which solidified prior to the loss of the bone covering] or completely mineralised skulls. As these skulls have all suffered various degrees of geological distortion in the early stages of burial beneath varying depths of sediments, their identification has been arrived at through reconstruction. In the dating of these skulls these and other factors, such as the approximate ages of overlying geological deposits have also been taken into account in arriving at their various [approximate] ages. We shall now proceed to study each skull-type in detail….
<urn:uuid:afa7d48a-51b1-4e47-9104-11584018bddb>
CC-MAIN-2017-26
http://mysteriousaustralia.com/rexgilroy-skull-collection-mainpage.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00531.warc.gz
en
0.944423
316
3.46875
3
Human lives lost to wildlife-human conflict should be compensated better: Scientists Higher compensation could improve conservation efforts, and help narrow down species to prioritise in conflict-prone zones, the study said. The lives of people lost due to wildlife-human conflicts are not adequately compensated in India, according to a new study which says changing the approach to this estimate can improve conservation efforts, and help understand which species to prioritise at conflict-prone zones. The research, published in the journal PNAS, surveyed 5,196 households living near 11 wildlife reserves in India, and self-reported annual costs including crop and livestock losses, injuries, and human deaths. "Human casualties contribute overwhelmingly to overall damages from wildlife interactions. This is despite the use of a relatively low valuation of human life from the literature," study lead author, Sumeet Gulati from The University of British Columbia in Canada, told PTI. The researchers said compensation for human death ranges from Rs 76,400 in Haryana, to Rs 8,73,995 in Maharashtra. The study reports that the average compensation paid for human death in the country is Rs 1,91,437, and the average compensation paid for injury is Rs 6,185. According to Gulati, these compensation values, known as value of a statistical life (VSL) are typically calculated from labour market comparisons. "Controlling for how productive workers are across different industries, economists estimate how much of the compensation paid can be attributed to the risk of injury or death across occupations," Gulati explained. "One obvious way to improve this estimate is to have more studies estimating the VSL using data from developing countries," he added. According to the researchers, better compensation for human fatalities can likely reduce animosity towards the species conservationists intend to preserve. "More importantly, if governments invested in measures to reduce conflict based on an accurate understanding of the real value of the loss of human life, conflict would be reduced, and animosity would fall, making both those living near the forest and those who care about the beings in the forest better off," Gulati explained. According to the wildlife conservationist, the dominance of the costs of human casualties rationalises the innate fear and respect towards large species like elephants displayed by those living with wildlife in India. Based on the findings, the scientists said focusing on the cost of human casualties while estimating losses from wildlife conflict is necessary. "Our research is one of the largest scientific assessments of human-wildlife conflict globally," said study co-author Krithi Karanth from the Centre for Wildlife Studies in Bengaluru. "We find that farmers experiencing a negative interaction with an elephant over the last year incur damages on average that are 600 and 900 times those incurred by farmers with negative interactions with the next most costly herbivore -- the pig and the nilgai," Karanth said. Similarly, she said farmers experiencing a negative interaction with a tiger over the last year incur damage that is on average three times that inflicted by a leopard, and a 100 times from a wolf. Although a species is associated with a rare occurrence of human fatalities, the scientists said the expected cost of death from a negative interaction could be much higher than the expected cost of frequently occurring crop or livestock damage. "Conservation managers have to prioritise human casualties and improve assistance provided to people," Karanth added. So-called endemic species — plants and animals found exclusively in a specific area — will be hit hardest in a warming world. The protesters and the government last had a formal dialogue over the contentious issue on 22 January but the impasse continued Farmers protesting against Haryana CM lathicharged; Manohar Lal Khattar's chopper landing site shifted Two people, including a police personnel and an elderly farmer, were injured in the incident that took place outside a private university in Rohtak
<urn:uuid:d1dd95f3-658f-420c-92f9-a63008762f59>
CC-MAIN-2021-17
https://www.firstpost.com/india/human-lives-lost-to-wildlife-human-conflict-should-be-compensated-better-scientists-9351371.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077336.28/warc/CC-MAIN-20210414064832-20210414094832-00373.warc.gz
en
0.952056
795
3
3
FERN provides for an early means of detecting threat agents in the American food supply FERN prepares the nation's laboratories to be able to respond to food-related emergencies FERN offers significant surge capacity that will strengthen the nation's response towards widespread complex emergencies, intentional or inadvertent related to agents in food The FERN network of laboratories enhances the ability of the country to restore confidence in the food supply following a threat or an actual emergency targeting the nation's food supply The Food Emergency Response Network (FERN) is composed of four components: the FERN Steering Committee, the FERN National Program Office (NPO), FERN Support Programs, and the FERN Regional Coordination Centers (RCCs). Organizations with representatives on the FERN Steering Committee include state agriculture, environmental, public health, and veterinary diagnostic laboratories as well as federal partners from Health and Human Services (Food and Drug Administration, Centers for Disease Control), United States Department of Agriculture (Food Safety and Inspection Service, Animal and Plant Health Inspection Service, Agricultural Marketing Service, Grain Inspection, Packers, and Stockyard Administration), US Customs, Department of Defense, Federal Bureau of Investigation, Environmental Protection Agency, and Department of Homeland Security. The FERN Steering Committee is co-chaired by senior executives from the USDA's Food Safety and Inspection Service (FSIS) and HHS's Food and Drug Administration (FDA) and the day to day operations of FERN are a joint venture between the USDA-FSIS and the FDA. The operational structure of FERN consists of the National Program Office (NPO) with personnel located in Athens, Georgia and Rockville, Maryland. Additionally, there are Regional Coordination Centers, (RCCs), located in each of the (5) FDA regions across the United States. The FERN has held Regional Coordination Center (RCC) meetings to establish operational and communication guidelines within each FERN region; communicating its objectives, policies and current activities; enhancing collaboration between FERN laboratories within a region, and providing an opportunity for individual regions to tailor response plans to their state policies and regional needs. The FERN National Program Office coordinates support program activities in the following areas: Method Development and Validation, Training, Proficiency Testing, Surveillance, and Electronic Communication. Introduction to FERN Why Was FERN Created? What is FERN's Mission? Who are FERN's Members? Become a FERN Lab The Food Emergency Response Network (FERN) integrates the nation's food-testing laboratories at the local, state, and federal levels into a network that is able to respond to emergencies involving biological, chemical, or radiological contamination of food. The FERN structure is organized to ensure federal and state inter-agency participation and cooperation in the formation, development, and operation of the network. For more information about applying to become a FERN member Lab, please contact us at: FERN FERN in Action The vulnerability of the nation's food supply to an intentional act of contamination is a credible concern to our government, food safety experts, and consumers. Surveillance programs designed to detect foodborne pathogens and toxins, enhance a regulatory agency’s ability to proactively assist with removal of contaminated product from retail shelves to protect the consumer as well as provide data to regulatory agencies regarding the risks and/or food safety practices associated with certain food commodities and manufacturers. The Colorado Department of Agriculture-Biochemistry Laboratory (CDA-BCL) has been funded by USDA FSIS FERN to perform targeted surveillance activities since 2008. As part of USDA FSIS microbiology surveillance testing, the CDA-BCL was the first FSIS FERN CAP laboratory to detect a food defense target in a retail food sample. The FSIS FERN-funded testing performed by the CDA-BCL led to a national recall of over 50,000 pounds of breaded chicken product due to detection of Staphylococcal enterotoxin (SE). The CDA-BCL detected SE in two separate breaded chicken products from the same manufacturer. Results of this surveillance testing by the CDA-BCL and further investigation and testing by USDA FSIS led to a national recall of 31,689 pounds of breaded chicken product in October 2014 and a recall of 20,232 pounds of breaded chicken nuggets in July 2015. The CDA-BCL also isolated Salmonella enteritidis from the breaded chicken product. This isolate was matched through Pulsed-field Gel Electrophoresis (PFGE) and CDC PulseNet to an outbreak strain resulting in expansion of an on-going nationwide recall for Salmonella in chicken. Although Staphylococcal enterotoxins are indicative of poor hygiene practices and common, they are classified by Health and Human Services (HHS) as select agent toxins and pose a serious health risk to the consumer as the enterotoxins produced by the Staphylococcus bacteria are not inactivated by heat used in normal cooking temperatures. During the surveillance testing of breaded chicken products for SE, the CDA-BCL notified FSIS FERN NPO of a potential matrix interference issue with raw and/or breaded chicken. The CDA-BCL performed a sample extraction method comparison for extraction of SE from problematic matrices such as raw and breaded chicken. A method improvement suggestion was brought to FSIS FERN NPO and was fully supported. In addition, the SE identification test kit used by the FDA, USDA, public health, and FERN laboratory community for confirmation of SE in foods was being discontinued by the manufacturer. This created a testing gap in identification and secondary confirmation for samples which test “positive” for SE by the screening method only. Because validation of new methodology and enhancement of current FERN methods is a critical function of the FSIS FERN CAP and FERN mission, our laboratory has been able to expand on projects as needed. Through our funding and support from the FSIS FERN CAP, the CDA-BCL was able to lead a validation workgroup to address these method gaps and extraction method improvement issues. For FY17, a workgroup consisting of seven state FERN CAP laboratories was formed to validate a new ELISA test kit for the identification of SE type in FSIS regulated food. The workgroup performed a multi-laboratory validation for the identification of SE in FSIS regulated products using the RIDASCREEN® SE ELISA test kit. This workgroup is continuing method improvement work in FY18 to validate the use of a single extraction method for the detection and identification of SE in FSIS regulated products. The overall goal of this validation work is to provide FSIS FERN NPO with a validated method for testing FSIS regulated products and to provide a written procedure that can be used by the FERN laboratory network to enhance testing capabilities and further enhance FERN’s mission to be able to rapidly and accurately detect bio-threat agents in the nation’s food supply. The CDA-BCL feels that the FSIS FERN CAP Microbiology Food Defense Surveillance program is critical to the FERN’s mission to rapidly and accurately respond to potential threats to the nation’s food supply. Through participation in the FSIS FERN CAP, the CDA-BCL was able to detect Staphylococcal enterotoxins in chicken products from the same manufacturer, which led to this product being removed from the retail market and potentially led to prevention of a future foodborne illness. The CDA-BCL has been able to dramatically increase our testing capabilities and we believe that this surveillance program has been improved by the lessons learned and procedural changes made to the program as a result of the recalls associated with this surveillance. In April 2015, routine surveillance samples of ice cream were submitted to the Nebraska Department of Agriculture (NDA) Food Laboratory. Screening and confirmation tests identified Listeria monocytogenes in one of the ice creams. The culture was sent to the FDA Denver District Laboratory for subsequent testing, which confirmed the finding. To protect the public, the manufacturer recalled all of their ice cream products and temporarily closed all retail scoop shops. The recall was reported by multiple national news organizations. No illnesses were reported related to this incident. This investigation showcases the effectiveness of an Integrated Food Safety System to prevent foodborne illness. The NDA Laboratory has been a FERN member since September 2005 and credits frequent participation in FERN capability and capacity exercises to maintaining operational readiness for food safety and food defense challenges. The Deepwater Horizon Oil Spill was caused by an explosion on a drilling rig on April 20, 2010 that released several million barrels of crude oil into the Gulf of Mexico until the wellhead was capped on July 15, 2010. The oil from the Deepwater Horizon well contaminated a large number of Gulf state fisheries in Louisiana, Alabama, Mississippi, and Florida which resulted in an almost total shutdown of the industry. NOAA, FDA and State governments all became involved in closing of state and federal waters to commercial fishing. The closures were based on the public health threat from contamination of seafood by polyaromatic hydrocarbons (PAHs), the principal toxicologic concern. To address this threat, a detailed state waters reopening protocol was implemented involving an extensive chemistry testing program. This protocol outlined specific levels of concern for each PAH that the labs were tasked to measure. FERN laboratories (including FDA Office of Regulatory Affairs Field Laboratories and FERN Cooperative Agreement Laboratories) were used to analyze these reopening samples. Two methods were used in the chemistry testing portion of the protocol, a method developed by NOAA and a PAH screening method developed by the FDA. FERN Cooperative Agreement Program laboratories were critical to the development and implementation of this PAH screening procedure. Without the analyses performed by FERN laboratories and the development of a rapid screening method, the safe and rapid reopening of the Gulf state fisheries would not have been possible. The FERN was activated in May, 2010. Immediately after, the FERN began to assess network capabilities and capacities for the NOAA method, and worked with selected FERN Cooperative Agreement Program laboratories to develop capability for this methodology in those laboratories. Additionally, the FERN Storeroom ordered and stocked standards and reagents required for performing the NOAA method. Reagent requests were filled on a prioritized basis, with first priority going to Gulf State laboratories and laboratories conducting FERN directed testing. Over the course of the FERN Activation, over 300 finfish, crab, oyster and shrimp samples from Florida, Alabama, Mississippi and Louisiana were analyzed for PAHs using the LC-MS alternative screening method as part of the state reopening process. Approximately 20% of those samples received parallel analysis using the NOAA method. In addition to the reopening samples, approximately 100 state baseline samples were analyzed using the NOAA method. The FERN was deactivated for this incident in November, 2010, but continues to support the PAH testing efforts of FERN laboratories in the Gulf. Fall 2008 and Winter 2009 brought an outbreak of 714 cases of Salmonella Typhimurium infection in 46 states linked to consumption of products containing peanut butter produced by the Peanut Corporation of America (PCA) Blakely, GA plant. Over 2800 products were identified that contained peanut butter produced by this plant. FERN laboratories were not officially activated, but there were strong contributions to the investigation from FERN laboratories in MN, MI, OH, and CT. FERN storeroom reagents were made available as well as technical guidance, methods, and molecular fingerprinting (PFGE) support. During the spring and summer of 2008, the 2nd largest outbreak of Salmonella Saintpaul ever reported in the United States was identified by PulseNet (>1400 cases) in 43 states, DC, and Canada. Initial epidemiologic reports indicated tomatoes as a potential common food source, but further investigation by the FERN and other public health agencies and laboratories led to the identification of an indistinguishable Saintpaul isolate from a jalapeno pepper which was traced back through a distribution center in Texas to a grower in Mexico. The FERN was activated and 12 FERN microbiology laboratories analyzed pepper, cilantro and basil samples collected through state and FDA coordinated efforts. FERN testing augmented and complemented concurrent FDA ORA testing efforts. All told, FDA tested a total of 1618 samples, and found 75 positives (39 unique Salmonella serotypes), and FERN tested a total of 290 samples, and found 13 positives (6 unique Salmonella serotypes). In 2008, melamine resurfaced as an adulterant added to infant formula and other food products (e.g. chocolate) linked to producers in China, and the FERN was activated. New HPLC-MS/MS methods were developed and validated by FDA for infant formula and other dairy products, and LC-MS methods with increased sensitivity over the melamine GC-MS method were developed and implemented as well. These methods were used by USDA, FDA, FERN, and the states in the analysis of milk based products for melamine. USDA and FDA have analyzed thousands of samples since 2007 for melamine and its analogs, and FERN chemistry laboratories assisted FDA in the CFSAN Melamine Import Assignment for the analysis of milk and soy protein based samples. FERN laboratories analyzed a total 340 samples, found 14 detections for melamine and/or analogs, and were a key factor in clearing an FDA sample backlog, which arose due to very high collection rates. Complete for system access
<urn:uuid:9fb358e5-a010-4e92-93ec-b32ea8028bcc>
CC-MAIN-2021-31
https://www.fernlab.org/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153709.26/warc/CC-MAIN-20210728092200-20210728122200-00254.warc.gz
en
0.946278
2,773
2.59375
3
The onions are the well known aromatic veggie that brings a magnificent flavor to any salad or cooked meal. Its scent might make us ‘cry’ while we chop it, but the health benefits of onions are numerous! However, even though this is a vegetable, and our guinea pigs are vegetarians, we must check if they can eat onions. Can guinea pigs eat onions? No, guinea pigs cannot eat onions. In fact, the onions are toxic for the guinea pig because they contain a compound called disulfide which is unhealthy for the guinea pigs. This compound can cause eye irritation, excess salivation, nasal secretions, and even respiratory problems too. Apart from these, another possible problem is damage to the red blood cells in the blood of the guinea pig. When the blood cells are damaged in any way, they transfer less oxygen throughout the whole body – hence there is risks of anemia, fatigue, bad immunity and again, the breathing problems! So, we have seen that the onions are not good at all for the guinea pigs. At first, we would think that the odor or aroma would be just too much to handle for the gentle stomach of the guinea pigs. But, it seems there are more complications coming from onions that are very serious for the guinea pigs. However, in the coming sections will discuss the onion nutrients, also we will mention the nutritional facts for onions, as well as the risks for the guinea pigs. Health Benefits of Guinea Pigs Eating Onions Sadly, the only benefit from onions for guinea pigs is vitamin C. However, since they cannot consume the onions, they can’t get vitamin C from this vegetable. Consuming onions makes very serious problems for the guinea pigs, not just the typical urinary issues they could get from most foods. There will be complications of internal and external organs, and also the aroma and taste of onions itself is very strong for their fragile stomachs. See more about the risks in the sections below. Nutrition Facts of Onions These are the nutrients in 100g (3 oz) of onion: - Relatively low in calories – the onion is not very caloric so it has just 40 calories per 100 g. This caloric amount is not bad for maintaining a healthy weight in general. - Carbs and proteins – there are 9.3 g of carbs and 1.1 g of protein. These two give energy and warmth for the whole day ahead. These amounts might not be much, but they are enough considering this is a vegetable. - Fiber – 1.7 g. Onions have a bit of fiber too, which is an essential compound for good digestion and healthy bowel movements. - Sugar – 4.2 g. This amount of sugar is not good for the guinea pig because it will cause bad digestion and stomach pains. But, of course, cavies cannot eat onions in the first place, so this shouldn’t worry you anyway. - Low in fat and no cholesterol – 0.1 g fat and also zero cholesterol. The low-fat amount won’t affect weight in any way, and also together with the zero cholesterol, this contributes to healthy and unclogged blood vessels. So, the whole cardiovascular system works well because of these amounts of fat and cholesterol. - Vitamin C – 12 %. The vitamin C is essential for everyone’s health. Mostly, it is vital for repairing the body tissues, internal as well as external ones. Also, it forms collagen which is crucial for tissues in the body and healthy skin too. This vitamin also speeds up the healing of wounds and makes immunity stronger. For guinea pigs, it keeps them safe from scurvy, but sadly they can’t receive this vitamin from an onion because they can’t consume it. - Vitamin B6 – 6 %. This vitamin is good for proper growth and development of fetuses, especially for good brain development. Also, B6 creates the happy hormone serotonin that reduces stress and anxiety but also helps with better sleep. - Calcium – 23 mg. This amount of calcium is too much for guinea pigs if we consider they could eat onions, which isn’t the case. Too much calcium creates many urinary problems in guinea pigs. - Potassium – 146 mg. This compound regulates the blood pressure and balances the water and electrolytes (salts) in the body, overall this makes the cardiovascular system much healthier. Risks to Consider When Feeding Onions to Guinea Pigs - Urinary problems – If the guinea pigs could consume onions, they would cause great damage to their urinary system. This is because onion has calcium, and when calcium piles up in their kidneys, there is a risk from urinary stones which make painful urination. Also, there will be a risk of blood in the urine or urinary infections and all this can be fatal for the poor little guinea pig! - Digestion problems – The onion contains fibers and sugar. If the guinea pig consumes too much fiber, or excess of sugar together with the fiber, it will have painful digestion, loose stool, and similar gastrointestinal complications. - Other serious complications – We mentioned above that onions contain the compound disulfide. This will affect mostly the respiratory system of the guinea pigs. The disulfide damages red blood cells – the main carriers of oxygen in the body. So, when the organism doesn’t get enough oxygen from head to toe, the breathing is the first and most serious problem noticed. The consequences of lack of oxygen will also result in bad health of the blood (because of damaged red blood cells) that can later develop anemia. When anemia is diagnosed the symptoms are loss of appetite, weight loss, paleness, fatigue, and feeling cold all the time. Other complications due to disulfide are secretion from the nose, irritation of the eyes, as well as increased salivation in guinea pigs. Quick Facts on Onions - Onions have been consumed by people for more than 7,000 years, and first traces of onions were found to date back to 5000 B.C. - The ancient Egyptians liked onions a lot and even worshipped them. They believed the shape of onion and its many layers inside signify eternity. They used to put them on pharaohs’ tombs for good afterlife. - Onions were once considered a currency! Back in the Middle Ages, when someone didn’t have money for rent, he would offer onions instead. They were also given as gifts too! - We ‘cry’ when we cut the onions because they contain the sulfuric acid (hence irritation in guinea pig’s eyes too!) - The largest grown onion in the world was found in the UK, and it holds the record of an amazing 18 pounds! - The onions are a natural remedy for skin issues, such as bug bites or burns. Onions have many good nutrients, one of them is vitamin C. But, how to substitute onion with another vegetable to give my cavy his vitamin C? You don’t have to risk your guinea pig’s health to give him vitamin C from an onion! So instead, feed him broccoli, cauliflower, bell peppers, leafy greens, zucchini, and squash too. There are many foods with vitamin C that your guinea pig can eat safely! So, guinea pigs cannot eat onion. But, can they at least try garlic to receive the similar benefits onion has? No! Guinea pigs cannot consume garlic either, because this veggie contains oxalic acid. This compound could cause allergy for the guinea pig. Also, garlic is a bulb veggie and guinea pigs can’t eat these veggies. Plus, garlic has an even stronger aroma and taste than onion, so this would certainly accentuate digestion problems and stomach pains too! Before I let you go, one final thought on food. With food, you can’t ever be too careful which is why I get all guinea pig food from a reliable source such as Amazon. If you are not sure what to order but believe your little piggies deserve some great treats please check our Helpful Guide to the Best Guinea Pig Treats to get some ideas. We have also made a full list of foods that guinea pigs can and can’t eat (150+ Types of Foods). Be sure to also check our recommended products page for everything you will ever need to assure a happy life for your Guinea Pigs. Hope this information was helpful and you have found the answer you were looking for. If you found this post useful, would you mind helping out by sharing it? Just click one of the handy social media sharing buttons below so others can also learn about guinea pig food and diet!
<urn:uuid:d3cd87a4-44bc-4d94-bc16-a5982807d578>
CC-MAIN-2019-39
https://www.guineapigtube.com/can-guinea-pigs-eat-onions/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573759.32/warc/CC-MAIN-20190919224954-20190920010954-00425.warc.gz
en
0.950365
1,822
2.84375
3
During a chance encounter, two nearly identical boys, one a poor beggar and the other a prince, decide to exchange places. The pauper, now living in the royal palace, is constantly filled with the dread of being discovered for who and what he really is while the Prince, dressed in rags, lives on the street enduring hardships he never thought possible. Both children soon discover that neither life is as carefree as they expected. Mandarin Companion: New graded readers for a new generation of Chinese learners. Now you can read book in Chinese that are fun and accelerate your language learning. Every book in the Mandarin Companion series is carefully written to use characters, words, and grammar that a learner is likely to know. Level 1 is written using approximately 300 unique Chinese characters and intended for Chinese learners at an upper-elementary level. Most learners will be able to approach this book after one to two years of formal study, depending on the learner and program. This series is designed to combine simplicity of characters with an easy-to-understand storyline that helps beginners grow their vocabulary and language comprehension abilities. **Traditional Chinese Edition**
<urn:uuid:04a11bba-71fb-4613-89c8-472ea16a56c7>
CC-MAIN-2023-40
https://books.apple.com/us/book/the-prince-and-the-pauper/id1221777997
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511170.92/warc/CC-MAIN-20231003160453-20231003190453-00066.warc.gz
en
0.950765
244
2.640625
3
NATURAL RESOURCES DEFENSE COUNCIL, Petitioner v. ENVIRONMENTAL PROTECTION AGENCY and Michael O. Leavitt, Administrator, U.S. Environmental Protection Agency, Respondents Methyl Bromide Industry Panel of the American Chemistry Council, Intervenor. The United States and other countries entered into the Montreal Protocol on Substances that Deplete the Ozone Layer, Sept. 16, 1987, S. Treaty Doc. NO. 100-10, 1522 U.N.T.S. 29 (“Montreal Protocol”), a treaty in which the signatory nations agreed to reduce the use of certain substances, including methyl bromide, that degrade the stratospheric ozone layer. The Environmental Protection Agency issued a rule implementing “ critical use” exemptions from the treaty's general ban on production and consumption of methyl bromide. Protection of Stratospheric Ozone: Process for Exempting Critical Uses From the Phaseout of Methyl Bromide, 69 Fed.Reg. 76,982 (Dec. 23, 2004) (codified at 40 C.F.R. pt. 82) (“Final Rule”). We dismissed the Natural Resources Defense Council's petition for judicial review for lack of standing. Natural Res. Def. Council v. EPA, 440 F.3d 476, 477-78 (D.C.Cir.2006) ( “NRDC I ”). In their respective petition for and opposition to rehearing, NRDC and EPA offered new information that has led us to change our view of the standing issue. We therefore grant the petition for rehearing, withdraw our previous opinion, and decide the merits. Fed. R. App. P. 40(a)(4)(A); see, e.g., Moldea v. New York Times Co., 22 F.3d 310, 311-12 (D.C.Cir.1994). In the mid-1970s, scientists discovered that certain man-made chemicals can destroy the layer of ozone gas in the stratosphere approximately ten to twenty-five miles above the Earth's surface. Stratospheric ozone absorbs ultraviolet radiation; as the ozone layer thins, less radiation is absorbed. Increased human exposure to ultraviolet radiation is linked to a range of ailments, including skin cancer and cataracts. Amidst growing international concern about ozone depletion, the United States and twenty-four other nations entered into the Montreal Protocol. The Protocol requires signatory nations-which now number 189-to reduce and eliminate their production and use of ozone-depleting chemicals in accordance with agreed-upon timetables. Montreal Protocol arts. 2-2I. The Senate ratified the treaty in 1988, and Congress incorporated its terms into domestic law through the Clean Air Act Amendments of 1990, Pub.L. No. 101-549, tit. VI, 104 Stat. 2399, 2648. Since then, the United States has reduced its use of methyl bromide to less than 39% of its 1991 baseline. In 1997, the Parties “adjusted” the Protocol to require developed-country Parties to cease “production” and “consumption” 1 of methyl bromide by 2005. See Montreal Protocol art. 2H(5).2 In response, Congress amended the Clean Air Act to require EPA to “promulgate rules for reductions in, and terminate the production, importation, and consumption of, methyl bromide under a schedule that is in accordance with, but not more stringent than, the phaseout schedule of the Montreal Protocol Treaty as in effect on October 21, 1998.” 42 U.S.C. § 7671c(h). Methyl bromide is a naturally occurring gas produced by oceans, grass and forest fires, and volcanoes. U.S. Dep't of Agric., Agric. Research Serv., Soil Physics & Pesticide Research: Methyl Bromide 1 (2005), http://www.ars. usda.gov/Research/docs.htm?docid =10408. It is also man-made and used as a broad-spectrum pesticide. See Final Rule, 69 Fed.Reg. at 76,983. Methyl bromide is typically injected into soil as a fumigant before several types of crops are planted. The United States regulates methyl bromide as a “class I” ozone-depleting substance. See 42 U.S.C. § 7671c(h). Methyl bromide has an “ozone depletion potential” (“ODP”) of 0.38-0.60. This puts it in the middle range of substances scheduled for elimination under the Protocol. It is not nearly as destructive as chlorofluorocarbons and most other class I substances, almost all of which were phased out in 2000. 42 U.S.C. § 7671c(b). On the other hand, it is significantly more destructive than “class II” substances, which are to be phased out in 2030. See 42 U.S.C. § 7671d(b). In light of methyl bromide's wide use and the lack of comparable substitute pesticides, see Final Rule, 69 Fed.Reg. at 76,985, the Protocol allows exemptions from the general ban “to the extent that the Parties decide to permit the level of production or consumption that is necessary to satisfy uses agreed by them to be critical uses.” Montreal Protocol art. 2H(5); see also 42 U.S.C. § 7671c(d)(6) (“To the extent consistent with the Montreal Protocol, the [EPA] Administrator ․ may exempt the production, importation, and consumption of methyl bromide for critical uses.”). The Parties to the Protocol meet annually to “decide to permit the level of production or consumption that is necessary to satisfy uses agreed by them to be critical uses.” Montreal Protocol art. 2H(5). At one of these meetings the Parties set general guidelines for implementing the critical-use exemptions, see Ninth Report, supra note 2, at 26-27 (“Decision IX/6”), and at another the Parties approved exemptions for 2005. The United States formally began the process of establishing its 2005 critical-use exemptions in May 2002, when EPA published a notice in the Federal Register seeking applications for 2005 and 2006 critical uses of methyl bromide and the amounts of new production and consumption needed to satisfy those uses. See Protection of Stratospheric Ozone: Process for Exempting Critical Uses From the Phaseout of Methyl Bromide, 67 Fed.Reg. 31,798 (May 10, 2002). EPA teams composed of biologists and economists reviewed each application and decided which to include in the aggregate U.S. nomination to the Parties. The final U.S. nomination, submitted to the Montreal Protocol's administrative body (the “Ozone Secretariat”) in February 2003, requested a total exemption of about ten-thousand metric tons of methyl bromide for sixteen different uses. The process then moved to the international stage. Two working groups operating under the auspices of the Ozone Secretariat-the “Methyl Bromide Technical Options Committee” and the “Technology and Economic Assessment Panel”-evaluated each country's nomination and made a recommendation to the Parties at their November 2003 meeting. At that meeting, the Parties deadlocked over the proposed critical-use exemptions and called an “extraordinary meeting” to make the final decisions. See U.N. Env't Programme, Report of the Fifteenth Meeting of the Parties to the Montreal Protocol on Substances that Deplete the Ozone Layer, U.N. Doc. UNEP/OzL.Pro.15/9, at 8-11, 77-78 (Nov. 11, 2003). The Parties reached agreement at their First Extraordinary Meeting in March 2004. They granted the United States critical uses in sixteen categories, amounting to 8,942 metric tons of methyl bromide. To satisfy these critical uses, the Parties authorized 7,659 metric tons of new production and consumption, with the remainder (1,283 metric tons) to be made up from existing stocks of methyl bromide. See U.N. Env't Programme, Report of the First Extraordinary Meeting of the Parties to the Montreal Protocol on Substances that Deplete the Ozone Layer, U.N. Doc. UNEP/OzL.Pro.ExMP/1/3, at 14-15, 26 (Mar. 27, 2004) (“Decision Ex.I/3”). Decision Ex.I/3 noted that “each Party which has an agreed critical use should ensure that the criteria in paragraph 1 of decision IX/6[ 3 ] are applied when ․ authorizing the use of methyl bromide and that such procedures take into account available stocks.” Id. ¶ 5. With Decision Ex.I/3 in hand, EPA proposed rules to implement the critical-use exemption. See Protection of Stratospheric Ozone: Process for Exempting Critical Uses From the Phaseout of Methyl Bromide, 69 Fed.Reg. 52,366 (Aug. 25, 2004). Many parties, including NRDC, submitted comments. The Final Rule, issued in December 2004, authorized new production and consumption up to the limit established in Decision Ex.I/3. Final Rule, 69 Fed.Reg. at 76,990 tbl.1. It also authorized the use of stocks as permitted by the decision, id. at 76,986, 76,991 tbl.2, and permitted noncritical users to draw upon existing stocks, id. at 76,988.4 NRDC believes the Final Rule violated Decision IX/6 and Decision Ex.I/3 because EPA failed to disclose the full amount of existing stocks, failed to offset new production and consumption by the full amount of these stocks, and failed to reserve the stocks for critical uses, and because the total amount of methyl bromide critical use the Final Rule authorized is not the technically and economically feasible minimum.5 These claims depend upon the legal status of Decisions IX/6 and Ex.I/3. After oral argument, we ordered supplemental briefing to address the question whether consensus decisions of the Parties are “cognizable in federal court actions brought to enforce the Protocol and the relevant terms of the Clean Air Act.” EPA and NRDC agree that the decisions are not “adjustments” to the Protocol. But they disagree on the legal consequences of the decisions. In order for this court to have Article III jurisdiction, NRDC had to establish that at least one of its members has standing to sue in his own right, the interests the association seeks to protect are germane to its purpose, and individual members need not participate in the lawsuit themselves. Sierra Club v. EPA, 292 F.3d 895, 898 (D.C.Cir.2002) (citing Hunt v. Wash. State Apple Adver. Comm'n, 432 U.S. 333, 342-43, 97 S.Ct. 2434, 53 L.Ed.2d 383 (1977)). We have no reason to doubt that NRDC meets the second and third requirements. As to the first, NRDC had to demonstrate that at least one member satisfied the “irreducible constitutional minimum” of standing: injury-in-fact, causation, and redressability. Lujan v. Defenders of Wildlife, 504 U.S. 555, 560, 112 S.Ct. 2130, 119 L.Ed.2d 351 (1992). NRDC claimed that its members faced increased health risks from EPA's rule. Although this claim does not fit comfortably within the Supreme Court's description of what constitutes an “injury in fact” sufficient to confer standing-such injuries must be “actual or imminent, not ‘conjectural’ or ‘hypothetical,’ ” Whitmore v. Arkansas, 495 U.S. 149, 155, 110 S.Ct. 1717, 109 L.Ed.2d 135 (1990) (quoting City of Los Angeles v. Lyons, 461 U.S. 95, 101-02, 103 S.Ct. 1660, 75 L.Ed.2d 675 (1983))-we have recognized that increases in risk can at times be “injuries in fact” sufficient to confer standing. See Mountain States Legal Found. v. Glickman, 92 F.3d 1228, 1234-35 (D.C.Cir.1996). Environmental and health injuries often are purely probabilistic. See NRDC I, 440 F.3d at 483; cf. 520 S. Mich. Ave. Assocs., Ltd. v. Devine, 433 F.3d 961, 962-63 (7th Cir.2006). We have cautioned that this category of injury may be too expansive. “[W]ere all purely speculative ‘increased risks' deemed injurious, the entire requirement of ‘actual or imminent injury’ would be rendered moot, because all hypothesized, nonimminent ‘injuries' could be dressed up as ‘increased risk of future injury.’ ” Ctr. for Law & Educ. v. Dep't of Educ., 396 F.3d 1152, 1161 (D.C.Cir.2005). We therefore generally require that petitioners demonstrate a “substantial probability” that they will be injured. See Sierra Club, 292 F.3d at 898, 899; Am. Petroleum Inst. v. EPA, 216 F.3d 50, 63-64, 67 (D.C.Cir.2000); La. Envtl. Action Network v. EPA, 172 F.3d 65, 68 (D.C.Cir.1999). Mountain States Legal Foundation v. Glickman, which found that an increased risk of forest fire created by a Forest Service logging rule was enough to support standing, held that the relevant variations in risk must be “non-trivial,” 92 F.3d at 1235, and “sufficient ․ to take a suit out of the category of the hypothetical,” id. at 1234-35 (quoting Vill. of Elk Grove Vill. v. Evans, 997 F.2d 328, 329 (7th Cir.1993)). NRDC's expert quantified the increased risk posed by EPA's rule in an affidavit stating that “it is reasonable to expect more than 10 deaths, more than 2,000 nonfatal skin cancer cases, and more than 700 cataract cases to result from the 16.8 million pounds of new production and consumption allowed by the 2005 exemption rule.” Aff. of Dr. Sasha Madronich ¶ 8. Intervenor Methyl Bromide Industry Panel argued that the probability of injury to NRDC's members is too small. In NRDC I, we found the annualized risk posed to NRDC members to be trivial. 440 F.3d at 481-82 & n. 8, 484. The parties vigorously dispute whether we were correct to hold as a quantitative matter that NRDC's alleged injury was trivial or whether, in NRDC's words, any “scientifically demonstrable increase in the threat of death or serious illness,” Pet. for Reh'g or Reh'g En Banc 4, is sufficient for standing. This question has given rise to a conflict among the circuits. Compare Baur v. Veneman, 352 F.3d 625, 634 (2d Cir.2003); Cent. Delta Water Agency v. United States, 306 F.3d 938, 947-48 (9th Cir.2002); Friends of the Earth, Inc. v. Gaston Copper Recycling Corp., 204 F.3d 149, 160 (4th Cir.2000) (en banc), with Shain v. Veneman, 376 F.3d 815, 818 (8th Cir.2004); Baur, 352 F.3d at 651 & n. 3 (Pooler, J., dissenting). On reconsideration, we have determined that the question is one we do not have to answer in this case. EPA's expert, who built the quantitative model on which both sides rely, now informs us that “[e]xpressing the risk in annualized terms is not practical” and “it is more appropriate to express the risk as a population's cumulative or lifetime risk.” 6 Decl. of Reva Rubenstein ¶ 20. The lifetime risk that an individual will develop nonfatal skin cancer as a result of EPA's rule is about 1 in 200,000 by the intervenor's lights, see Aff. of Dr. Louis Anthony Cox, Jr. ¶ 13, or 1 in 129,000 by EPA's, Decl. of Reva Rubenstein ¶¶ 8-9. Even if a quantitative approach is appropriate-an issue on which we express no opinion-this risk is sufficient to support standing. One may infer from the statistical analysis that two to four of NRDC's nearly half a million members will develop cancer as a result of the rule. As to causation, NRDC's asserted injuries are linked to EPA's action through a fairly straightforward chain: EPA has permitted too much new production and consumption of methyl bromide, which will result in more emissions, which will increase ozone depletion, which will adversely affect the health of NRDC's members. This injury can be redressed if EPA does not permit such excessive production and consumption of methyl bromide. On the merits, NRDC argues that “EPA's 2005 critical-use rule violates the express terms of the Montreal Protocol Parties' unanimous Decisions,” Final Opening Br. for Pet'r 20, and therefore is “not in accordance with law.” 42 U.S.C. § 7607(d)(9)(A); see Allied Local & Reg'l Mfrs. Caucus v. EPA, 215 F.3d 61, 68 (D.C.Cir.2000). Decision Ex.I/3, in which the Parties reached agreement on methyl bromide critical-use exemptions for 2005, stated that the United States had a critical need for 8,942 metric tons of methyl bromide. Id. Annex II.A. To meet this need, the Parties agreed to allow new production and consumption in the amount of 7,659 metric tons, id. Annex II.B, with the remaining critical uses to be met by drawing down existing stocks. Id. ¶ 2. The decision also stated that each Party “which has an agreed critical use should ensure that the criteria in paragraph 1 of decision IX/6 are applied” when implementing the exemption, “and that such procedures take into account available stocks.” Id. ¶ 5 (emphasis added). Paragraph 1 of Decision IX/6 directs the Parties to authorize new production and consumption of methyl bromide only if it “is not available in sufficient quantity and quality from existing stocks,” Decision IX/6 ¶ 1(b)(ii), and only after “[a]ll technically and economically feasible steps have been taken to minimize the critical use,” id. ¶ 1(b)(i). NRDC believes EPA's rule departs from these post-treaty agreements in three respects. First, the rule authorizes 7,659 metric tons of new production and consumption-the maximum agreed upon in Decision Ex.I/3-without offsetting this amount by existing stocks. See Final Rule, 69 Fed.Reg. at 76,989. EPA declined to disclose the size of the total nationwide methyl bromide stockpile,see id. at 76,990-an action NRDC claims is itself a violation of the Clean Air Act, 42 U.S.C. § 7607(d)(4)(B)(i). Still, the record suggests that the stockpile is at least as large as the United States' total critical-use allocation for 2005. Second, EPA's rule allows noncritical users to draw down existing stocks. See Final Rule, 69 Fed.Reg. at 76,987-88. NRDC claims that the “decisions” implicitly reserve the stocks for critical users only. Third, EPA approved 8,942 metric tons of critical uses-again the maximum agreed upon in Decision Ex.I/3-without considering anew whether this was the minimum amount feasible. Id. at 76,989. EPA counters that it adhered to the agreed-upon critical-use and new production and consumption levels, and that the remainder of the decisions are “hortatory.” Id. at 76,987. NRDC fashions the entirety of its argument around the proposition that the “decisions” under the Protocol are “law.” This premise is flawed. The “decisions” of the Parties-post-ratification side agreements reached by consensus among 189 nations-are not “law” within the meaning of the Clean Air Act and are not enforceable in federal court. The Clean Air Act authorizes EPA to “exempt the production, importation, and consumption of methyl bromide for critical uses” only “[t]o the extent consistent with the Montreal Protocol.” 42 U.S.C. § 7671c(d)(6); see also id. § 7671m(b).7 The Protocol bans the production or consumption of methyl bromide after December 31, 2004, except “to the extent that the Parties decide to permit the level of production or consumption that is necessary to satisfy uses agreed by them to be critical uses.” Montreal Protocol art. 2H(5). NRDC argues that because the Clean Air Act requires EPA to abide by the Protocol, and because the Protocol authorizes future agreements concerning the scope of the critical-use exemption, those future agreements must “define the scope of EPA's Clean Air Act authority.” Supp. Br. for Pet'r 4. NRDC's interpretation raises significant constitutional problems. If the “decisions” are “law”-enforceable in federal court like statutes or legislative rules-then Congress either has delegated lawmaking authority to an international body or authorized amendments to a treaty without presidential signature or Senate ratification, in violation of Article II of the Constitution. The Supreme Court has not determined whether decisions of an international body created by treaty are judicially enforceable. But there is a close analogy in this court. The United States is a party to a treaty establishing the International Court of Justice (ICJ). In Committee of United States Citizens Living in Nicaragua v. Reagan, 859 F.2d 929 (D.C.Cir.1988), we held that rulings of the ICJ do not provide “substantive legal standards for reviewing agency actions,” id. at 942, because the rulings, though authorized by the ratified treaty, were not themselves self-executing treaties. Id. at 937-38; see, e.g., Medellin v. Dretke, 544 U.S. 660, 682-84, 125 S.Ct. 2088, 161 L.Ed.2d 982 (2005) (O'Connor, J., dissenting). Although Committee of United States Citizens is highly suggestive of the outcome in this case, several features of the Montreal Protocol “decisions” may distinguish them from ICJ “adjudications.” For one thing, Congress implemented the Montreal Protocol with a direction to EPA to abide by its terms. See 42 U.S.C. §§ 7671c(d)(6), 7671m(b). For another, Montreal Protocol “decisions” are not adjudications between parties; instead, they purport to set rules for implementing ongoing treaty commitments. The legal status of “decisions” of this sort appears to be a question of first impression. There is significant debate over the constitutionality of assigning lawmaking functions to international bodies. See, e.g., Julian G. Ku, The Delegation of Federal Power to International Organizations: New Problems with Old Solutions, 85 Minn. L. Rev. 71 (2000); Edward T. Swaine, The Constitutionality of International Delegations, 104 Colum. L. Rev.. 1492 (2004). A holding that the Parties' post-ratification side agreements were “law” would raise serious constitutional questions in light of the nondelegation doctrine, numerous constitutional procedural requirements for making law, and the separation of powers. We need not confront the “serious likelihood that the statute will be held unconstitutional.” Almendarez-Torres v. United States, 523 U.S. 224, 238, 118 S.Ct. 1219, 140 L.Ed.2d 350 (1998); see also id. at 250, 118 S.Ct. 1219 (Scalia, J., dissenting). It is far more plausible to interpret the Clean Air Act and Montreal Protocol as creating an ongoing international political commitment rather than a delegation of lawmaking authority to annual meetings of the Parties. Cf. Mistretta v. United States, 488 U.S. 361, 373 n. 7, 109 S.Ct. 647, 102 L.Ed.2d 714 (1989). Nowhere does the Protocol suggest that the Parties' post-ratification consensus agreements about how to implement the critical-use exemption are binding in domestic courts. The only pertinent language in Article 2H(5) states that the Parties will “decide to permit” production and consumption necessary to satisfy those uses that they “agree[ ]” to be critical uses. The Protocol is silent on any specific conditions accompanying the critical-use exemption. Post-ratification agreements setting these conditions are not the Protocol. To illustrate, suppose the President signed and the Senate ratified a treaty with Germany and France to conserve fossil fuel. How this is to be accomplished the treaty does not specify. In a later meeting of representatives of the signatory countries at the United Nations, a consensus is reached to lower the speed limits on all major highways of the signatory nations to a maximum of 45 miles per hour. No one would say that United States law has thus been made. EPA characterizes the decisions as “subsequent consensus agreements of the Parties that address the interpretation and application of the critical use provision ․” Final Rule, 69 Fed.Reg. at 76,985. This may be so. Like any interpretive tool, however, the “decisions” are useful only to the extent they shed light on ambiguous terms in the Protocol. But the details of the critical-use exemption are not ambiguous. They are nonexistent. The “decisions” do not interpret treaty language. They fill in treaty gaps. Article 2H(5) thus constitutes an “agreement to agree.” The parties agree in the Protocol to reach an agreement concerning the types of uses for which new production and consumption will be permitted, and the amounts that will be permitted. “Agreements to agree” are usually not enforceable in contract. See 1 Richard A. Lord, Williston on Contracts § 3:5, at 223-24 & n.17 (4th ed.1990); cf. El Al Israel Airlines, Ltd. v. Tsui Yuan Tseng, 525 U.S. 155, 167, 119 S.Ct. 662, 142 L.Ed.2d 576 (1999); Zicherman v. Korean Air Lines Co., Ltd., 516 U.S. 217, 226, 116 S.Ct. 629, 133 L.Ed.2d 596 (1996); Foster v. Neilson, 27 U.S. (2 Pet.) 253, 314, 7 L.Ed. 415 (1829) ( “A treaty is in its nature a contract between ․ nations.”). And the fruits of those agreements are enforceable only to the extent that they themselves are contracts. There is no doubt that the “ decisions” are not treaties. The Parties' post-ratification actions suggest their common understanding that the decisions are international political commitments rather than judicially enforceable domestic law. See Olympic Airways v. Husain, 540 U.S. 644, 650, 124 S.Ct. 1221, 157 L.Ed.2d 1146 (2004); Tseng, 525 U.S. at 167, 119 S.Ct. 662; Restatement (Third) of Foreign Relations Law of the United States § 325(2) (1987) (“Any subsequent ․ practice between the parties in the application of the agreement [is] to be taken into account in its interpretation.”). The Parties met to decide the 2006 critical-use exemptions well after EPA's rule went into effect. See Second Extraordinary Report, supra note 4. Yet they did not invoke the Protocol's internal noncompliance procedure against the United States, see Montreal Protocol art. 8, nor did they admonish the United States to change its interpretation of the previous decisions.8 This course of dealing suggests that the Parties intended the side agreements to be enforceable as a political matter at the negotiating table. Our holding in this case in no way diminishes the power of the Executive to enter into international agreements that constrain its own behavior within the confines of statutory and treaty law. The Executive has the power to implement ongoing collective endeavors with other countries. See Louis Henkin, Foreign Affairs and the United States Constitution 219-20 (2d ed.1996). Without congressional action, however, side agreements reached after a treaty has been ratified are not the law of the land; they are enforceable not through the federal courts, but through international negotiations. NRDC claims that EPA violated the Clean Air Act when it failed to disclose the amount of existing domestic stockpiled methyl bromide. See 42 U.S.C. § 7607(d)(4)(B)(i). In doing so, EPA merely followed its own regulation that precluded disclosure of the information pending the resolution of reverse FOIA litigation. See 40 C.F.R. § 2.205(f)(2). NRDC's own FOIA request for the aggregate stockpile information was denied on this basis. See NRDC v. Leavitt, No. 04-01295, 2006 WL 667327 (D.D.C. Mar.14, 2006). EPA's actions were in accordance with law and neither arbitrary nor capricious. * * * * * * Because we now conclude that NRDC has standing to pursue its claim, we grant the petition for rehearing and withdraw our prior opinion. Because the post-ratification agreements of the parties are not “law,” EPA's rule-even if inconsistent with those agreements-is not in violation of any domestic law within the meaning of the Clean Air Act, 42 U.S.C. § 7607(d) (9)(A), the petition for review is denied. I agree that increases in risk can be “injuries in fact” sufficient to confer Article III standing, and I concur in the judgment that the risk demonstrated by petitioners in this case is sufficient to support standing. I also agree that, on the merits, petitioners' claim fails. As the majority opinion notes, NRDC's principal argument is that “EPA's 2005 critical-use rule violates the express terms of the Montreal Protocol Parties' unanimous Decisions,” Final Opening Br. for Pet'r at 20, and therefore is “not in accordance with law,” 42 U.S.C. § 7607(d)(9)(A). In rejecting this claim, our holding is precise and limited: The “decisions” of the Parties-post-ratification side agreements reached by consensus among 189 nations-are not “law” within the meaning of the Clean Air Act and are not enforceable in federal court. Maj. Op. at 8. On the record before us, this holding is eminently correct for two reasons. First, “[n]owhere does the Protocol suggest that the Parties' post-ratification consensus agreements about how to implement the critical-use exemption are binding in domestic courts.” Maj. Op. at 9. Second, and, in my view, most important, the disputed “decisions” do not shed light on any ambiguous terms in the Protocol: [T]he details of the critical-use exemption are not ambiguous. They are nonexistent. The “decisions” do not interpret treaty language. They fill in treaty gaps. Article 2H(5) thus constitutes an “agreement to agree.” ․ And the fruits of those agreements are enforceable only to the extent that they themselves are contracts. There is no doubt that the “decisions” are not treaties. Maj. Op. at 10. As I see it, these two points control our disposition of petitioners' claim on the merits. Absent procedural defaults, the Supreme Court has indicated that “we should give respectful consideration to the interpretation of an international treaty rendered by an international court with jurisdiction to interpret such.” Breard v. Greene, 523 U.S. 371, 375, 118 S.Ct. 1352, 140 L.Ed.2d 529 (1998) (per curiam). As the majority opinion makes clear, however, the disputed “decisions” in this case do not involve “interpretations” of a treaty “by an international court with jurisdiction to interpret such.” The Supreme Court has yet to explain whether, “once the United States undertakes a substantive obligation (as it did in the Vienna Convention), and at the same time undertakes to abide by the result of a specified dispute resolution process (as it did by submitting to the [International Court of Justice's] jurisdiction ․), it is bound by the rules generated by that process no less than it is by the treaty that is the source of the substantive obligation.” Medellin v. Dretke, 544 U.S. 660, 683, 125 S.Ct. 2088, 161 L.Ed.2d 982 (2005) (O'Connor, J., dissenting). In other words, it is unclear whether a judgment by a body such as the ICJ, “decided on the back of a self-executing treaty, ․ must be given effect in our domestic legal system just as the treaty itself must be.” Id. The bewildering array of views found in the per curiam, concurring, and dissenting opinions filed in Medellin make it clear that the Court has not yet come to grips with this issue. Nor do we. The majority opinion should not be taken to suggest that this court's decision in Committee of United States Citizens Living in Nicaragua v. Reagan, 859 F.2d 929 (D.C.Cir.1988), offers an answer to the perplexing issue that was skirted in Medellin. Committee of United States Citizens does not address the issue that was left open in Medellin, nor does it address the issue raised by petitioners in this case. The dispute in Committee of United States Citizens originated with a 1986 decision by the International Court of Justice (ICJ), which held that America's support of military actions by the so-called “Contras” against the government of Nicaragua violated both customary international law and a treaty between the United States and Nicaragua. The ICJ concluded that the United States “is under a duty immediately to cease and to refrain from all such acts as may constitute breaches of the foregoing legal obligations.” ․ Prior to the ICJ's decision, the United States withdrew from the merits phase of the court's proceedings, contending that the court lacked jurisdiction over Nicaragua's application․ [T]he President [then] requested and Congress ․ approved continued funding for the Contras of the sort that the ICJ found illegal․ Unhappy with their government's failure to abide by the ICJ decision and believing that continued funding of the Contras injures their own interests, appellants filed suit in the United States District Court for the District of Columbia. The suit sought [inter alia ] injunctive and declaratory relief against the funding of the Contras on grounds that such funding violates ․ Article 94 of the U.N. Charter․ 859 F.2d at 932. The court rejected this claim on narrow grounds: Since appellants allege that Congress has breached Article 94, we must determine whether such a claim could ever prevail. The claim could succeed only if appellants could prove that a prior treaty-the U.N. Charter-preempts a subsequent statute, namely the legislation that funds the Contras. It is precisely that argument that the precedents of the Supreme Court and of this court foreclose. We therefore hold that appellants' claims based on treaty violations must fail. Id. at 937. There is no suggestion in the present case that Congress modified or denounced the disputed Protocol and that, as a result, a prior treaty obligation has been overridden by a subsequent act of Congress. See Diggs v. Shultz, 470 F.2d 461, 466-67 (D.C.Cir.1972) (“Congress can denounce treaties if it sees fit to do so, and there is nothing the other branches of government can do about it.”), overruled on other grounds, Dellums v. U.S. Nuclear Regulatory Comm'n, 863 F.2d 968 (D.C.Cir.1988). The decision in Committee of United States Citizens is therefore inapposite. Petitioners' claim in this case seems more akin to the claim raised in Day v. Trans World Airlines, Inc., 528 F.2d 31 (2d Cir.1975). The dispute in Day concerned whether an airline was liable for damages to passengers who were injured during a terrorist attack while waiting to board an international flight after surrendering their tickets and passing through passport control. The Warsaw Convention assigns liability to the airline for injuries sustained “on board the aircraft or in the course of any of the operations of embarking or disembarking.” Id. at 33. TWA argued that the Warsaw convention did not apply because the passengers had not started the embarking process that, in their view, began when a passenger “steps through the terminal gate.” Id. The court looked to a subsequent agreement entered into by the world's major airlines as clear evidence that the purpose of the Warsaw Convention was to provide maximum protection to the passengers. Those called upon to construe a treaty should ․ strive to give the specific words of a treaty a meaning consistent with the genuine shared expectations of the contracting parties. These expectations can, of course, change over time. Conditions and new methods may arise not present at the precise moment of drafting․ The conduct of the parties subsequent to ratification of a treaty may, thus, be relevant in ascertaining the proper construction to accord the treaty's various provisions. In divining the purposes of the Warsaw treaty, we find the adoption in 1966 of the Montreal Agreement particularly instructive. This Agreement did not alter the language of Article 17 of the Warsaw Convention. But it provides decisive evidence of the goals and expectations currently shared by the parties to the Warsaw Convention. Id. at 35-36 (internal quotation and citation omitted). But see Buonocore v. Trans World Airlines, Inc., 900 F.2d 8, 11 (2d Cir.1990) (noting that Day had come “under some criticism over the years on the ground that it construed Article 17 too broadly in favor of liability”). Even the broadest reading of Day, however, offers no solace for petitioners in this case. In Day, the court was asked to divine the meaning of an ambiguous term of the Warsaw Convention and then to enforce the term in accordance with the parties' intent. In this case, the disputed “decisions” do not purport to interpret any treaty language, nor do they purport to adjudicate disagreements between the parties over the meaning of the Protocol. The Protocol provision upon which petitioners rely is nothing more than an “agreement to agree.” Therefore, on the facts of this case, we have no authority to address a claim that rests on side agreements that extend beyond the enforceable terms of the Protocol. In sum, we do not decide here whether, once the United States undertakes a substantive obligation in a treaty, and at the same time undertakes to abide by the result of a specified dispute resolution process before an international tribunal, it is bound by the judgments of the tribunal no less than it is by the treaty that is the source of the substantive obligation. That question is not before us. 1. “Production” is defined as “the amount of controlled substances produced, minus the amount destroyed [under the Protocol] and minus the amount entirely used [to produce other chemicals].” Montreal Protocol art. 1(5). “Consumption” is “production plus imports minus exports of controlled substances.” Id. art. 1(6). 2. Current article 2H was added by “adjustment” at the Ninth Meeting of the Parties. See U.N. Env't Programme, Report of the Ninth Meeting of the Parties to the Montreal Protocol on Substances that Deplete the Ozone Layer, U.N. Doc. UNEP/OzL.Pro.9/12, Annex III (Sept. 25, 1997) (“Ninth Report ”). The Protocol allows “adjustments” to be made without formal amendment and ratification. See Montreal Protocol art. 2(9). In incorporating the Protocol into domestic law, Congress defined the Protocol to include “adjustments adopted by the Parties thereto and amendments that have entered into force.” 42 U.S.C. § 7671(9). 3. Decision IX/6 permits exemptions only when all technically and economically feasible steps have been taken to minimize the required use and when methyl bromide is not available from existing stocks. Id. ¶ 1(b)(i), (ii). 4. After NRDC filed its petition for judicial review, the Parties met again and approved 2006 critical uses, see U.N. Env't Programme, Report of the Second Extraordinary Meeting of the Parties to the Montreal Protocol on Substances that Deplete the Ozone Layer, U.N. Doc. UNEP/OzL.Pro.ExMP/2/3, at 5-6 (July 1, 2005) (“Second Extraordinary Report ”), with no apparent comment on the United States's 2005 domestic process. EPA has issued a rule to implement the 2006 exemptions. See Protection of Stratospheric Ozone: The 2006 Critical Use Exemption from the Phaseout of Methyl Bromide, 71 Fed.Reg. 5985 (Feb. 6, 2006) (to be codified at 40 C.F.R. pt. 82). 5. EPA argues that the decisions do not require that a party exhaust existing stocks of methyl bromide before carrying out exempted production and consumption or that existing stocks be restricted to critical uses. 6. Both EPA and the intervenor argue that NRDC has procedurally defaulted or waived the arguments it makes in its rehearing petition. Although petitioners bear the burden of demonstrating their standing “by affidavit or other evidence,” Sierra Club, 292 F.3d at 899-900 (quoting Lujan v. Defenders of Wildlife, 504 U.S. 555, 561, 112 S.Ct. 2130, 119 L.Ed.2d 351 (1992)), that does not preclude NRDC (or its opposing parties) from correcting a panel's misperception of the evidence in a petition for rehearing. See Am. Library Ass'n v. FCC, 401 F.3d 489, 493-94 (D.C.Cir.2005). 7. The Montreal Protocol includes the Protocol itself and any “adjustments adopted by Parties thereto and amendments that have entered into force.” 42 U.S.C. § 7671(9). NRDC and EPA agree that the “decisions” are not “adjustments” to the Protocol. Supp. Br. for Pet'r 1; Supp Br. for the Resp. 2-5. 8. NRDC points to a change in the language from Decision Ex.I/3 (the 2005 decision) to Decision Ex.II/1 (the 2006 decision). Compare Decision Ex.I/3 ¶ 5 (“[Each Party] should ensure that the criteria in paragraph 1 of decision IX/6 are applied ․” (emphasis added)), with Second Extraordinary Report, supra note 4, at 5-6 ¶ 5 (“Decision Ex.II/1”) (“[Each Party] renews its commitment to ensure that the criteria in paragraph 1 of decision IX/6 are applied ․” (emphasis added)). But this change in diplomatic language can hardly be said to change the United States' substantive commitments under the Protocol. Opinion for the Court filed by Circuit Judge RANDOLPH. Concurring opinion filed by Senior Circuit Judge EDWARDS.
<urn:uuid:271d60a2-6c6b-4fb7-a6dd-4b3bfe03b9dc>
CC-MAIN-2018-09
http://caselaw.findlaw.com/us-dc-circuit/1328729.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816094.78/warc/CC-MAIN-20180225031153-20180225051153-00200.warc.gz
en
0.919087
9,626
2.6875
3
Learn git in less than 5 minutes and use it for 5 years 3 min read Git is a version control system that is widely used by developers to track changes to their codebase. It allows developers to collaborate on projects, revert back to previous versions, and maintain a clear history of their work. Git has a number of commands that are essential for working with it effectively. In this blog post, I'll cover some of the most common git commands that every developer should know and you'll use the thousands of times during the course of your career. Before we move on, you can see an actual example of a git repository at https://github.com/dotenx/dotenx and the end result at https://dotenx.com. Make sure to check them out as both the repository and the tool can come in handy someday. Now, let's take a look at the commands. First, create a new directory for your project and navigate into it: mkdir myproject cd myproject Initialize a new Git repository in this directory: Create some files for your project and make some changes to them: echo "Initial version" > file.txt echo "This is a new line" >> file.txt git status to check the status of your repository: git status # On branch master # Changes not staged for commit: # (use "git add <file>..." to update what will be committed) # (use "git checkout -- <file>..." to discard changes in working directory) # # modified: file.txt # # no changes added to commit (use "git add" and/or "git commit -a") git add to add new files or changes to files in the staging area: git add file.txt This time, if we run git status, this is what we'll see: git status # On branch master # Changes to be committed: # (use "git reset HEAD <file>..." to unstage) # # modified: file.txt # Now it's time to commit the changes to the local repository with a commit message: git commit -m "Add a new line to file.txt" To view the commit history, use git log # commit 2f1e3c5d5e4f3e2d1c0b9a8f7e6d5c4b3a2b1a0b (HEAD -> master) # Author: Your Name <firstname.lastname@example.org> # Date: Fri Dec 17 14:00:00 2022 +0000 # # Added a new line to file.txt # # commit a1b2c3d4e5f6a7b8c9d0a1b2c3d4e5f6 (initial commit) # Author: Your Name <email@example.com> # Date: Fri Dec 17 13:00:00 2022 +0000 # # Initial commit # Create a new branch called "dev" with git branch dev We can use git checkout to switch between branches: git checkout dev You can add the remote repository as the "origin" to your local repository with git remote add: git remote add origin https://github.com/user/myproject.git Now, if you make some more changes, and commit them you can push them to the remote repository. echo "This is another new line" >> file.txt git add file.txt git commit -m "Add another new line to file.txt" git push origin dev Now if your teammate wants to get this repository, all they need to do is: git clone https://github.com/user/myproject.git If they make any changes to the repository and you want to get their changes, you can use Git is a very powerful tool that you'll use daily as a software developer and these commands are amongst the most common commands you'll use when working with git. Each of these commands gets multiple options that help you achieve what you need. In another post, I'll focus only on merging branches and how you can do it in multiple ways.
<urn:uuid:e2ee4ca8-c918-4b15-84fa-8e4628224147>
CC-MAIN-2023-23
https://blog.dotenx.com/learn-git-in-less-than-5-minutes-and-use-it-for-5-years
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653501.53/warc/CC-MAIN-20230607010703-20230607040703-00156.warc.gz
en
0.861407
918
3.296875
3
This site contains terms and definitions from many IBM software and hardware products as well as general computing terms. A special 10-bit character used to indicate the beginning of a transmission word that performs Fibre Channel control and signaling functions. The first seven bits of the character are the comma pattern. See also comma. - Chinese characters or ideograms used in Japanese writing. The characters may have different meanings from their Chinese counterparts. See also Hiragana, Katakana. - A graphic character set consisting of symbols used in Japanese ideographic alphabets. Each character is represented by 2 bytes. See kilobits per second. See key distribution center. - A TCP/IP mechanism where a small packet is sent across the network at predefined intervals to determine whether the socket is still working correctly. - Pertaining to the amount of time that elapses before a message is sent to verify a connection. In Internet communications, a message sent among nodes when no data traffic has been detected for a given period of time. This communication ensures the vitality of the session by keeping the link "alive." See key-encrypting key. A network authentication protocol that is based on symmetric key cryptography. Kerberos assigns a unique key, called a ticket, to each user who logs on to the network. The ticket is embedded in messages that are sent over the network. The receiver of a message uses the ticket to authenticate the sender. In Kerberos, a service or user that is known to the Kerberos system. See also principal name. A transparent application mechanism that transmits the identity of an initiating principal to its target. A simple ticket contains the identity of the principal, a session key, a timestamp, and other information, which are sealed using the secret key of the target. - In OSI, a session-layer functional unit that supports the basic session services required to establish connections, transfer normal data, and release connections. - The part of an operating system that contains programs for such tasks as input/output, management and control of hardware, and the scheduling of user tasks. See also kernel address space. - The part of an operating system that performs basic functions, such as allocating hardware resources. kernel address space The address space containing support for z/OS UNIX services. See also kernel. kernel device driver See device head. See system dump. A component of CICSPlex SM that is responsible for building data structures and managing the interfaces between the other CICSPlex SM components. The environment built by Kernel Linkage is known as the method call environment. The state in which a process runs kernel code. See also user mode. - A distinct part of an operating system kernel that provides a specific support or function. For example, kernel modules can be device drivers or support programs for file systems. Kernel modules are either built into the kernel or are compiled as separate object files that can be dynamically loaded into the kernel, as needed. - A piece of code that can be loaded into the kernel upon demand to extend functionality without requiring to reboot the system. - The placement of characters such that their bounding boxes (character boxes) overlap. This allows for a more natural-looking spacing between characters. - The adjustment of horizontal space between individual characters in a line of text. Adjustments in kerning are especially important in large display and headline text lines. Without kerning adjustments, many letter combinations can look awkward. The objective of kerning is to create visually equal spaces between all letters so that the eye can move smoothly along the text. The API that is used to access the Pentaho data transformation engine that is capable of doing many different functions, including reading, manipulating, and writing data to and from various data sources. - A column or an ordered collection of columns that is identified in the description of an index, unique constraint, or referential constraint. An index key can also be an expression, an ordered collection of expressions, or an ordered collection of columns and expressions. See also composite key. - A cryptographic mathematical value that is used to digitally sign, verify, encrypt, or decrypt a message. See also key table, private key, public key. - One or more characters within an item of data that are used to uniquely identify a record and establish its order with respect to other records. See also alternate-index record. - A button on a keyboard or key pad. - In sorting, a string of weights which can be used to compare characters or character strings. - A column or an ordered collection of columns that is identified in the description of a table, index, or referential constraint. The same column can be part of more than one key. - Information that characterizes and uniquely identifies the real-world entity that is being tracked by a monitoring context. In DDS, a characteristic that can be specified for a field in a display file that automatically shifts the display station keyboard to control what the display station user can enter into the field. In IDDU and DDS, the keyboard shift can also be specified in database files, but only applies when these fields are referred to in a display file. In EJB query language, a class that is used to create or find an entity bean. It represents the identity of the entity bean, corresponding to the primary-key columns of a row in a relational database. In an ODM table, a column that forms the unique (non-repeatable) key to the table. For example, if the key columns of a scheduling application are DepartmentName, Workday and Shift, no two rows in the table can contain the same DepartmentName, Workday and Shift. In security, a storage object, either a file or a hardware cryptographic card, where identities and private keys are stored for authentication and encryption purposes. Some key databases also contain public keys. See also stash file. key database file See also keystore file. key distribution center (KDC) A network service that provides tickets and temporary session keys. The KDC maintains a database of principals (users and services) and their associated secret keys. It is composed of the authentication server and the ticket granting ticket server. keyed data queue An i5/OS data queue that contains individual pieces of data (messages) that are associated with a key value. Messages can be received from a keyed data queue by specifying the key value or a relational operator. The system-recognized identifier for the object type is *DTAQ. An order in which records are retrieved that is based on the contents of key fields in records. See also arrival sequence. keyed sequential access In the Virtual Storage Access Method (VSAM), the retrieval or storage of a data record in its key or relative-record sequence, relative to the previously retrieved or stored record as defined by the sequence set of an index. keyed sequential retrieval A type of record access that uses keyed direct retrieval to recover subsequent records implicitly in key or relative record-number sequence without specifying another key or relative record number. The effect that results when a key on a keyboard is actuated, depending on the level of force, and possibly by a concurrent operation of a qualifier key or keys. The key effect may be the generation of a graphic character or of a control function (see ISO/IEC 9995-1). key-encrypting key (KEK) A key that is used exclusively for encrypting and decrypting keys. See also data-encrypting key. key exchange protocol A protocol governing how two parties exchange keys to use in securing a transaction. Once keys have been exchanged, data can be encrypted at the sender’s end and decrypted at the receiver’s end. - The field in a database segment used to store segment occurrences in sequential ascending order. A key field is also a search field. See also search field. - See sequence field. - In EJB query language, a container-managed field in an entity bean that corresponds to one of the primary-key columns of a row in a relational database. Each key field is a member of the entity bean key class. - A field used to arrange the records of a particular type within a file member. - The portion of a record that is used (possibly with other key fields) to locate a data record in a key file See also alternate key. - A field in a data file that contains the values that Gentran Server for Windows uses to determine the trading partnership code. - A field that uniquely identifies a data item in a data type. key field level specification Data description specification coded on the lines following the last field specification. Key field level specifications are permitted only for physical files or logical files. - See key ring. - In computer security, a file that contains public keys, private keys, trusted roots, and certificates. - The unique name associated with the key for a thread in a process. - The key used to indicate how the information for the signing key is included in the WS-Security header of the message. A portal component that provides a view of multiple metrics in a single view. The view contains a list of the metrics and attributes of the metrics, such as actual values, threshold values, and percentage of actual to threshold. In computer security, a public key and a private key. When the key pair is used for encryption, the sender uses the receiver's public key to encrypt the message, and the recipient uses their private key to decrypt the message. When the key pair is used for signing, the signer uses their private key to encrypt a representation of the message, and the recipient uses the sender's public key to decrypt the representation of the message for signature verification. - A quantifiable measure that is designed to track one of the critical success factors of a business process. - A metric that is computed from performance data that indicates a level of compliance against expectations. For example, the acknowledgment response time to an order, an order fill rate, or an on time shipment rate. - A measurable quantity against which specific performance criteria can be set when a service level agreement is written. A product that is not being substantially redesigned or rewritten. New products will be classified as flagship or non-key. Existing key products will be reclassified as flagship if they are undergoing substantial re-engineering. See also flagship product, legacy product, non-key product. The two key fields signifying a range of records to be processed sequentially. The range of records is selected by specifying either key values that bound the records to be selected or an individual key value for which all matching records should be selected in a shared index. - See key file. - In computer security, a file that contains public keys, private keys, trusted roots, and certificates. The collating sequence of data records, determined by the value of the key field in each of the data records. It can be the same as, or different from, the entry sequence of the records. See also entry sequence. - A repository that contains password information. - A repository of security certificates. - In security, a file or a hardware cryptographic card where identities and private keys are stored, for authentication and encryption purposes. Some keystores also contain trusted or public keys. See also certificate signing request, keytool, truststore. - See key database. A key ring that contains both public keys that are stored as signer certificates and private keys that are stored in personal certificates. See also key database file. The part of the Front End Programming Interface that allows a front-end application to specify a sequence of keystroke-like commands, which is used to define input to a back-end application. In telephony, the type of telephone system that provides telephones with more than one line for users. Outside lines appear directly on the telephones instead of being routed through an operator and transferred, as in PBX systems. - See keytab file. - In the Kerberos protocol, a file that contains service principal names and secret keys. The secret keys should be known only to the services that use the key table file and to the key distribution center (KDC). See also key. In capacity planning, the time between interactive transactions such as typing, thinking, idle time, and so on. As an interactive user's proficiency with the application improves, the user's key/think time is likely to reduce, which can result in an increase in the observed throughput. A utility used for creating SSL encryption keys and managing the keystores where they are maintained. See also keystore. Information that is expressed as a paired set of parameters. For example, if you want to express that the specific sport is football, this data can be expressed as key=sport and value=football. See also tag group. - A word that is used to conduct searching operations. - See reserved word. - A word that a customer enters in a website when searching for an item. - One of the predefined words of a programming language, artificial language, application, or command. See also keyword operand, operand, parameter, positional operand. - A symbol that identifies a parameter in job control language (JCL). - A list of strings that can be used by a customer using the web channel application when searching for a category. - A statement or group of statements that one can reuse in test scripts. keyword driven testing A scripting technique that uses data files to contain not only test data and expected results, but also keywords related to the application being tested. The keywords are interpreted by special supporting scripts that are called by the control script for the test. (ISTQB) See also data driven testing. In REXX, one or more clauses, the first of which starts with a keyword that identifies the instruction. Some keyword instructions affect the flow of control, while others provide services to the programmer. CALL, DO, and PARSE are examples of keyword instructions. A multiple-choice field that lets users make selections by clicking, rather than typing, an entry. Keywords fields can display in several formats, including a drop-down list box, a check box, and a radio button. A computer program that proves to be so popular and valuable that it drives the success of whatever technology that it is associated with. For example, Lotus 1-2-3 drove the sale of the IBM PC. A threshold that restarts the system. See also throttle threshold. - For processor storage, real and virtual storage, and channel volume, 2 to the power of 10 or 1024 bits. - For disk storage capacity and communications volume, 1000 bits. kilobits per second (kbps) A measure of bandwidth on a data transmission medium, where 1 kbps = 1000 bits per second. This contrasts with units of storage where 1 Kb = 1024 bits (note upper case K). See also gigabits per second, megabits per second. A form of a node test that can select nodes based on their kind and name. See also node test. - A collection of kit components. - A collection of catalog entries that are ordered as a single SKU. See also bundle, prebuilt kit. A meta-package that is used to install other components. Kit components support the installation of the following dependencies: kit component dependencies on other kit components, OS package dependencies on packages in an OS distribution, and kit dependencies on packages within the kit. See knowledge management. See Keyhole Markup Language. A question that is asked of candidates at the beginning of an application process to assess their suitability for a position. See also default question. - See corpus. - A collection of data that may be interpreted as a set of facts and rules considered true in a possible world. - See software knowledge base. The process of acquiring knowledge from various sources for use in knowledge management. For example, in social business, knowledge capture takes place when an expert shares a strategy in a social forum, where it can then be compiled and used again later. See also knowledge management. A model that consolidates typed entities, their relationships, their properties, and hierarchical taxonomies to represent an organization of concepts for a given domain. After the knowledge graph store is loaded with input from structured and unstructured data sources, users and applications can access the knowledge graph to explore key elements of knowledge for a specific domain, explore interactions, and discover additional relationships. knowledge management (KM) Efficient, effective use of enterprise knowledge to achieve common objectives across a corporation. See also knowledge capture. See knock out. A neural network that can be used to cluster a data set into distinct groups. When processing is complete, records that are similar should be close together on the output map, while records that are different will be far apart. See also neural network. Korean non-Hangeul/non-Hanja character set A subset of the Korean DBCS, consisting of non-Hangeul/non-Hanja characters, such as Greek, Russian, Roman numeric, alphanumeric and related symbols, Katakana, Hiragana, and special symbols. There are 940 characters in this set. - An interactive command interpreter and a command programming language. - A command interpreter developed for UNIX, which forms the basis for the z/OS shell. See key performance indicator. A numeric value that ranges from 0-100 and indicates key performance indicator reliability. Performance is considered reliable if the value is less than or equal to the configured performance tolerance. If the actual performance is always within tolerance, then the KPI value is 100. Otherwise, the KPI value is 0. Many KPI values are calculated over time to give an average rating. See thousands of power-on hours. See key-sequenced data set. See Korn shell. See kernel tap. See kernel-based virtual machine. See keyboard video mouse console.
<urn:uuid:832deb4b-36d3-4723-87d1-047dcef5c296>
CC-MAIN-2015-35
http://www-01.ibm.com/software/globalization/terminology/k.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645356369.70/warc/CC-MAIN-20150827031556-00165-ip-10-171-96-226.ec2.internal.warc.gz
en
0.884875
3,753
3
3
This year we are choosing a holiday other than Christmas to learn about. We chose Hanukkah and I created some Hanukkah Themed I-Spy pages for my kids so they can be introduced to the different items and traditions that are typical for a Hanukkah celebration. Resources for Teaching About Hanukkah with Children If you are not familiar with Hanukkah, I wanted to give you some links for further research and other activities you can do with your children. Hanukkah (Chanukah) is a Jewish holiday celebrated for 8 nights in December (in 2020 it is December 10-18). It is also referred to as the “festival of lights” and is celebrated nightly with the lighting of the Menorah, saying special prayers, and eating fried foods. You can read more about the history of Hanukkah here. We have some friends who grew up celebrating Hanukkah and we also live in an area that has a lot of German/Jewish heritage. I also want my children to be introduced to other cultures and holidays that they might not be as familiar with. If you personally celebrate Hanukkah and have some suggestions for resources I could list here, I'd love to hear from you. Just comment below with your suggestions. Hanukkah Printables from Teachers Pay Teachers – We will be using this printable packet to introduce Hanukkah, along with some of the other resources below. What is Hanukkah? from Chabad Hanukkah 2020 from My Jewish Learning We also purchased this Menorah Complete Set. Benefits of I-Spy Pages There are some great benefits to I-Spy pages or I-Spy games. Some of these benefits include: - promotes working memory skills - can improve visual discrimination – recognizing details in a picture and discriminating between shapes and letters - exposure to more vocabulary – describing and naming what they see Free Hanukkah I-Spy Pages & Slides I created some Hanukkah-themed I-Spy Pages with accompanying Google Slides for virtual activities and telehealth services. The I-Spy PDF pages include color and a black/white option. Access to the Google Slide option is included in the PDF once you download it. To get your PDF download and Google Slide access, enter your email address into the form below. Click the green “click here” button and you'll be redirected to a success page. Then head to your email inbox and download the file directly from your email. Then open the PDF download to access the Google Slide file inside. You will need to click the Google Slide link and then copy the file to your personal Google Drive. You will be prompted to do this once you click the link inside the PDF. You'll also receive my weekly child development tips newsletter. I share a lot of free downloads and other resources I use and enjoy with you. You can unsubscribe at any time. Looking for more free resources? Check out the links below.
<urn:uuid:a3ca26b8-6aeb-47e2-bd3e-974fb43fa9e1>
CC-MAIN-2021-25
https://www.growinghandsonkids.com/hanukkah-themed-i-spy-pages-slides.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488273983.63/warc/CC-MAIN-20210621120456-20210621150456-00345.warc.gz
en
0.936992
639
3.359375
3
The media public trial is not just a phenomenon of gossip, but a mechanism for creating unjust cases? Have you ever felt that such a public trial by the media seems a bit too much? How about letting the media go to trial? In a word, excessive exaggeration by the media will greatly infringe on the privacy and reputation of those involved. Moreover, the incident has become the focus of the public, and it has also condensed a strong atmosphere of distrust. It has also produced many unnecessary interventions in the way of investigation or trial, severely hitting the defense of a fair trial, and even excessively deepening our perception of severe punishment. expect. In particular, Taiwan will launch a system of “national judges” in the future . If the phenomenon of “public trials by the media” cannot be effectively restrained, it is more likely that the good will of the people to participate in trials will be severely damaged. That is to say, a public trial by the media is not just a report with the theme of social news, but also a complex phenomenon that spans different levels of “public-media-judiciary” and runs through the entire criminal procedure. Through intensive media reports, the parties involved in the judicial system or the public sector, or the audience in society, will be involved in such fluctuations. Looking back, after the lifting of martial law in our country, all kinds of restrictions on the media were lifted along the way. Radio and TV channels were opened one after another, and news stations were also created in large numbers like mushrooms after rain. In order to break out the competition, the news media not only launched a large number of crime reports, but also tried their best to attract the attention of the content. As scholars sort out , reporting techniques often appear: 1. Repeated reporting of crime news for a long time. 2. The content of the report often uses exaggerated and sensational terms. 3. The crime report presents detailed criminal methods. 4. Selective non-comprehensive reporting. 5. Take a claim that needs to be proven as a fact. 6. Suggestively making accusations against the parties—reports and comments are inseparable. 7. Let problems such as the principle of the presumption of innocence and the non-disclosure of investigations exist. Therefore, this kind of reporting mode, for the parties concerned, not only directly causes mental pressure on the criminal suspect and his family life, but also because of the biased reporting of “presumption of guilt”-even if the verdict is not guilty, the lost credibility in the process, relatives, etc. tearing apart, poor career, or exclusion from the community, causing irreparable damage to the personality, reputation, privacy, or property rights of innocent defendants. As for the public sector, as scholars describe : “In the past, many people in the procuratorial system were full of heroic thinking and handling methods. Detention, criticism of prosecutorial governance “. In addition, in the social atmosphere of presumption of guilt, populists have also appeared to put pressure on the judiciary, forcing prosecutors or courts, and even witnesses to have to consider the voice of public opinion. And even if everyone can fight against this phenomenon, the more powerful the media is, the more difficult it is to reverse the impression of the presumption of guilt in society: once the court later acquits, it is very easy for the people to be disappointed with the judiciary; such a cycle “Judicial prestige” will continue to be diminished. On the other hand, if even judicial judges who have received professional training and are accustomed to such an atmosphere on weekdays will be affected by it-for the ” national judges ” who will participate in trials in the future, it may be even more difficult to resist. Finally, for the general public, media public trials will also deepen their fear of crime. For example , the literature pointed out that National Chung Cheng University conducted a telephone survey and analysis of the public and found that the main source of citizens’ overall public security feelings is “news media reports” (62.2%), followed by “communications with relatives and friends” (16.9%), indicating that “they have been victimized by crimes.” only 11.2%. Therefore, when the public reads a lot of crime news, and the media overreports crime news, not only the fear of being killed is aroused, but also people may have more expectations for severe punishments. of the quagmire. Why still report? The original intention of press freedom? In order to implement democratic governance, it is actually dependent on the media to report on the administration one by one and arouse people’s comments, so that the government can be effectively supervised. As stated in the Judicial Yuan Interpretation No. 689, “In order to ensure that the news media can provide diverse information with news value, promote the full circulation of information, satisfy the people’s right to know, form public opinion and achieve public supervision, in order to maintain Freedom of the press is an indispensable mechanism for the normal development of a democratic and pluralistic society, and should be guaranteed by Article 11 of the Constitution.” In addition to the separation of powers in traditional countries, the perspective of checks and balances in governance is why the media is called the fourth power. Therefore, in order to ensure the stable operation of the government, the media has more or less room to report on major and minor issues of governance; if the reporting of criminal incidents is completely prohibited, the media’s function of monitoring the development of criminal policies will be lost. However, the reason why the news media enjoys a special status in a democratic society is because it has two major tasks of “forming public opinion and supervising politics”; it also makes the news media have to fulfill those public tasks before they can fully advocate non-interference freedom of the press. Otherwise, if you just use the banner of freedom of the press, continue to sell fear in crime reports, attract readers to read, leave the ideal of the “fourth estate” behind, and become a profit-oriented puppet, then there is no tolerance room. Therefore , Judicial Yuan Interpretation No. 623 pointed out that: on the premise of complying with the principle of proportionality in Article 23 of the Constitution, legislators can impose appropriate restrictions on speech through clear provisions of the law; Tongyuan Interpretation No. 509 also stated: To protect reputation and privacy In order to safeguard the public interest, the state may impose appropriate restrictions on freedom of speech. That is to say, if the media report satisfies the audience’s desire to pursue the truth, it overly impacts the rights and interests of the parties involved, causing the downfall of the fair court and the rule of law culture; using a news report to impact the interests of all parties only In order to achieve the media’s own profits, it is necessary to appropriately use laws to draw reasonable restrictions on such reports. Legal restrictions on reporting: Investigations are not public In order to improve judicial operations and reduce the impact of media public trials on litigation, the Presidential Palace released the ” Report on the Results of the National Judicial Reform Conference ” in September 2017 , aiming to implement the boundaries of “undisclosed investigations”. Filming and broadcasting images of criminal suspects or related persons”, “Holding the administrative, disciplinary or criminal responsibility of those who neglect their duties”, “Empowering the parties and interested parties to correct wrong reports”, “Assisting the media to review the current relevant self-regulatory mechanisms and specifications” etc. And what is undisclosed investigation? How does the current system work? Is there anything missing? For example, at the poker table, we often say that the hole cards are seen by others, so it is difficult to win. Similarly, if during the investigation of a crime, someone discloses important information to the suspect or the media, then the follow-up investigation will be even more difficult; It will cause great harm to the other party’s future life. Therefore, the “Criminal Procedure Law” contains the so-called ” undisclosed investigation ” important regulation, which is to alleviate the phenomenon of public trials by the media, so that the “procuratorate and police” can more accurately investigate and judge, and moderately protect criminal suspects or relationships human rights. In order to fully implement the non-disclosure of investigations, the “Criminal Procedure Law” authorizes the Judicial Yuan and the Executive Yuan to formulate more detailed ” Operational Measures for Non-disclosure of Investigations .” However, these measures are inevitably questionable. The subject of undisclosed investigation is limited to public agencies, not the media? This problem stems from the provisions of the ” Secret Investigation Operation Measures “: Personnel who should follow the non-disclosure of investigation refer to prosecutors, public prosecutors, judicial police officers, judicial police, defenders, prosecutors, or other persons who are legally involved in the investigation process. personnel performing duties. It seems that it has nothing to do with people other than “executing duties according to law”. However , it is also mentioned later in the same method : Prosecutors, public prosecutors, judicial police officers, and judicial police may inform the defendant, criminal suspect, victim, or other interested parties of the regulations on the non-disclosure of investigations, and inform them of “do not disclose or disclose” investigations. Known procedures and content. This also seems to make those “defendants, criminal suspects, victims or other interested parties” also bear the responsibility of keeping the investigation secret. However, even if the above-mentioned regulations continue to expand the objects that comply with the “secrecy of investigation”, they do not directly mention those media who are closely related to the development of the case (Note). And if the media is not within the scope of control, it does not necessarily have to bear the criminal and administrative responsibility for subsequent leaks of the case. Unclear reporting boundaries? The so-called “secrecy of investigation” is not an absolute prohibition without exception. The ” Criminal Procedure Law ” stipulates that if it is “in accordance with laws and regulations” or for “safeguarding public interests” and “protecting legitimate rights and interests,” criminal information can be disclosed appropriately. In order to clarify which matters meet the aforementioned exceptions, the ” Operation Measures for Non-disclosure of Investigations ” further stipulates seven specific disclosures. This is because media reports can also call for clues, and are an important “tool” for the prosecutors and police to solve crimes; and moderate disclosure of investigation information can also call on the public to pay more attention to avoid further damage and ensure social order. However, water can carry a boat, and it can also overturn it. Some of the requirements for controlling the disclosure of information may be a bit abstract, which also leaves a wide room for interpretation to the front-line personnel; it also makes some prosecutors happy to use the media. Strengthen your own litigation advantages. In the end, in terms of practical operation, the principle of non-disclosure of investigations is in vain, and “disclosure of investigations” can be freely expanded and expanded according to the needs of handling cases. What if the report is wrong? Can it be amended and punished with contempt of court? Regarding the mistakes, whether it is possible to ask for corrections, this involves the concept of media access rights. Under the operation of the current regulations, it can be divided into two types: ” right of reply ” and ” right of correction ” (the link is an example clause); the former allows people to be reported to the media to request a considerable opportunity to reply, and the media cannot refuse ; the latter gives relevant persons the right to request the media to correct errors within a time limit. Those who have been reported can use those rights to initiate a plea or request correction of misinformation in less time than defamation crimes or civil law damages require time-consuming proceedings. However, as the scholar mentioned in the paper : “The effectiveness of this method actually depends on the critical strength of public opinion, the subjective opinions of the media on the event, and even the appearance, eloquence and personality charm of the parties themselves… and other uncertain factors. If If you are not careful, choosing “On the Line of Fire” to exercise the right of correction and right of reply will easily lead to a second public trial by the media, which will lead to a vicious circle.” Furthermore, not all media types are legally obliged to provide media access rights. As in Interpretation No. 689 of Judicial Yuan Interpretation , Justice Chen Chunsheng once stated in an opinion letter : “The right to request correction and refutation of the reported person is not complete (including print media without regulations, and electronic media only have Article 23 of the Radio and Television Law. Article 62 of the Law on Cable TV and Article 31 of the Law on Satellite Broadcasting and Television)…At present in our country, if a media has newspapers, radio, TV, cable TV, etc. at the same time, its print media workers will follow up and report. It will lead to the fact that the pursued person has no right to request correction and refutation even if he admits that there has been a violation, and if the same enterprise group uses electronic media to quote it, it will form a loophole in the protection of audio-visual persons. It violates the constitutional requirements of the national protection obligation.” In addition, some people will say that the punishment of “contempt of court” can be added to deal with the media’s indiscriminate reporting of criminal news. But opposing voices believe that the violation of the principle of non-disclosure of investigations in our country is often the “credit” of the prosecutors and police investigators. If the media is only held accountable for crimes, it will easily cause a chilling effect. When a specific judicial case becomes the focus, the public trial by the media will inevitably involve the parties involved in the case, their relatives and friends, and even various judicial personnel, as well as the lively crowd waiting by the side, to be involved in this passionate drama. Although all of this is to protect the “right to know” of the audience, it is difficult to implement the principle of “non-disclosure of investigation” in the process. It will bring a lot of interference and controversy to fair trials and even future penalty policies. However, in the face of such a predicament, the relevant legal system related to the public trial of the media can be said to be quite insufficient, and it is difficult to relieve the entangled tension between the aforementioned parties ; It is more likely to push criminal cases step by step into the abyss of unjust cases. We should all urge legislators to quickly fill this gap in the legal system. Such repeated weighing, as the author said in ” Freedom of Speech and the Guarantee of Democracy Suspended at Both Ends of the Scale “: “In the inseparable cross-strait histories, the domestic factions that separate and combine, and the treacherous and ever-changing international situation, the justice and Foreign referees gave some directions for thinking, so that we can find ways to struggle between the two floating issues of “avoiding democratic failure” and “avoiding excessive suppression of speech” before the day of world peace, so we often hear people Saying: Taiwan is really a treasure trove of public law.” Decline in GameStop’s Quarterly Revenue According to financial data, digital gaming sales growth at the Grapevine, Texas, store is not compensating for a drop in in-store purchases. Despite the company’s best attempts to offset the fall in physical sales with growth in digital transactions, GameStop Corp. just reported its worst quarterly revenue dip in two years. In the three months leading up to October 29th, net sales dropped 8.5% to $1.19 billion, which was lower than the $1.39 billion predicted by two analysts. Loss per share after adjustments came in at 31 cents, which was higher than the predicted loss of 29 cents. The company is only worth $7 billion, and its stock is extremely volatile, therefore very few analysts cover it. Since becoming chairman of the board this year, Ryan Cohen has been working to reinvigorate GameStop’s growth in Grapevine, which has slowed as customers switch from purchasing game CDs to purchasing digital downloads. To make matters worse, COVID-19 lockdowns crippled GameStop’s retail operation, and supply shortages on consoles have further impacted profits. According to market research firm NPD Group, overall spending in the gaming business fell 5% in the third quarter compared to the same period a year ago. Earlier this week, Axios reported that GameStop has begun a new wave of layoffs, with a particular focus on the team developing the company’s blockchain wallet. GameStop also announced layoffs of an undisclosed number of employees and the departure of CFO Mike Recupero in July. In its earnings release, GameStop said nothing about layoffs Cohen has been trying to get GameStop involved in digital assets, but it’s been difficult. The company began transitioning into nonfungible tokens in September, when it announced a partnership with cryptocurrency exchange FTX US. The parties agreed to work together on some new e-commerce and online marketing projects and stock some stores with FTX gift cards. However, the crypto market went into a tailspin in November after FTX imploded with $9 billion in liabilities and filed for Chapter 11 bankruptcy. CEO Matt Furlong stated on an earnings call with analysts that GameStop does not have “a meaningful balance of any cryptocurrency.” We have not and will not put significant shareholder capital at risk by entering this market. Furlong has stated his optimism for the continued development of digital assets GameStop became a symbol of the meme-stock mania that swept the retail trading community during the pandemic, in which the price of specific stocks was driven up by online discussion of such stocks on Reddit and other social media platforms rather than by any actual business fundamentals. The stock price, which is down 40% so far this year, rose by around 1% in after-hours trading on Wednesday in response to the news. Newcomers Chris Sacca, Jack Dorsey, and Kalanick Three of the most famous people in the tech business are Chris Sacca, Jack Dorsey, and Travis Kalanick. They’ve all achieved phenomenal success in technology and been in the front of some of the industry’s most game-changing developments. Sacca is a well-known businessman and investor who put money into companies like Twitter, Uber, and Instagram at an early stage. Dorsey co-founded and currently leads Twitter, while Kalanick created and resigned as head of Uber. Chris Sacca, Jack Dorsey, and Travis Kalanick: Who Are They? Can You Introduce Me to Chris Sacca, Jack Dorsey, and Travis Kalanick? The tech industry is led by visionaries like Chris Sacca, Jack Dorsey, and Travis Kalanick. Chris Sacca is a successful businessman, investor, and entrepreneur from the United States. The likes of Twitter, Uber, Instagram, and Kickstarter all counted on his early financial support. Jack Dorsey founded Square and serves as its CEO. He is also a co-founder of Twitter. He is considered a forerunner in the fields of microblogging and online monetary transactions. Uber, the groundbreaking ride-hailing service founded by Travis Kalanick, has completely altered the transportation landscape. It is widely believed that Kalanick single-handedly destroyed the traditional taxi sector with his work on mobile app-based transportation services. All three of these men are quite young yet have already made significant contributions to the technology sector. How did these three people get where they are today? Three of the most successful businesspeople alive now are Chris Sacca, Jack Dorsey, and Travis Kalanick. The remarkable success of their individual companies has made these three men household names, and they have become IT industry icons. It’s not surprising that these businesspeople have succeeded, given their combined intelligence and doggedness. Chris Sacca, an early investor in Twitter and Uber, was the first of the three to find financial success. Sacca’s knowledge of the tech business allowed him to see the potential in the social network, and his investment in Twitter allowed Jack Dorsey to start the company. Jack Dorsey played a key role in the development of Twitter and laid the groundwork for the service to go global. Finally, Travis Kalanick entered the digital industry late yet created Uber into a global powerhouse, cementing his place in history as one of the most successful and important business leaders of all time. These three gentlemen all have the requisite smarts and guts to start their own businesses and make a killing. The Effects of Their Achievements Chris Sacca, Jack Dorsey, and Travis Kalanick’s achievements have had a significant effect. These three men have built successful careers as technological pioneers and entrepreneurs. They have contributed to the development of today’s advanced technological landscape. Twitter, Uber, and Lowercase Capital are the three founders’ most notable accomplishments. Twitter has grown into an important resource for users to keep up with the latest news, trends, and other events, making it one of the most popular social media platforms in the world. The ride-hailing sector has been shaken up by Uber, which has become ubiquitous. Lowercase Capital is a VC firm that has helped launch the careers of numerous entrepreneurs by investing in over 200 different software businesses. The achievements of Sacca, Dorsey, and Kalanick are not limited to the realms of the businesses they founded. They have a track record of investing in successful tech startups, which in turn inspires new generations of business owners to launch their own ground-breaking ventures. In addition, many people now have jobs because of their investments. Many would-be business owners have looked to Sacca, Dorsey, and Kalanick as examples of success. They have demonstrated that it is possible to achieve one’s goals through perseverance and hard effort. They have also demonstrated that a small number of innovative ideas can have a significant impact on the technological world. Because of this, numerous up-and-comers have been encouraged to follow in their footsteps and develop ground-breaking goods and services. Perspectives on the “Newcomer” The names Chris Sacca, Jack Dorsey, and Kalanick have become virtually inseparable from the modern information technology sector. These three “up-and-comers” changed the game by daring to challenge the status quo and taking calculated risks. Lowercase Capital was established by Chris Sacca, who has gone on to invest in the likes of Twitter, Uber, and Instagram. Jack Dorsey started both Twitter and Square and currently serves as CEO of both companies. Kalanick is the Uber founder and CEO, and his company has had a profound impact on the transportation sector. These three “newcomers” have all changed the face of technology forever, and their achievements have served as models for other would-be business owners. Is there any guidance we may glean from their experiences? Is there any guidance we may glean from their experiences? Current examples of people who have achieved great success include Chris Sacca, Jack Dorsey, and Travis Kalanick. These people have made names for themselves in the business and technology communities thanks to their accomplishments in disciplines as diverse as venture capital and entrepreneurship. However, aspiring businesspeople can learn a lot from their experiences. To begin, despite facing setbacks and defeat, all three of these individuals have remained steadfast in their dedication to the undertakings they’ve undertaken. They have shown they are willing to take chances by investing both time and money in their projects. They have also demonstrated skill at establishing and maintaining connections with other powerful individuals. All three of these men exemplify the traits that are crucial for success in business, and by learning from their experiences we may develop our own set of abilities and outlook. Newcomers to the tech business who have made significant contributions include Chris Sacca, Jack Dorsey, and Kalanick. Each of them rose from obscurity to become a household name and a major force in their respective fields. These three guys have altered the course of technology with their respective venture capital investments (Sacca), startup (Twitter’s Jack Dorsey), and startup (Uber’s Travis Kalanick). They have inspired a new generation of entrepreneurs by demonstrating that anyone, regardless of background, can make a substantial impact on the world. Case of the alphabet U.S. drone operations expansion: Wing wants FAA’s blessing D.C. (Reuters) The Google subsidiary Wing Aviation has applied for a waiver from some FAA drone regulations so that it can expand its operations beyond a single small city in Virginia, according to a notification published by the FAA on Friday. As of early 2019, Wing has supplied a multitude of services for locals of Christiansburg, Virginia, including both scheduled and emergency deliveries. With the goal of serving more people, “Wing is now aiming to expand and improve upon these operations,” the company claimed in its request for waivers from some FAA drone regulations. The organization promised to listen to petitioners before reaching a final call. The FAA was informed by Wing that the company had “made major investments targeted to strengthen both the safety and capacity” of drone operations in the United States. More than 17 months have passed with no reported incidents. Wing seeks FAA clearance to move remote pilot activities “to regional operations centers that can monitor and safely handle a greater number of airliners at once. When it grows, Wing aims to utilize a variant “that has been demonstrated to be dependable in commercial operations and is extremely comparable in its operating characteristics,” Wing said. Yet “to identify and accept this alternate aircraft version,” approval from the FAA is required. In addition, during the interval, Wing requested that the FAA conduct operator line inspections once every 12 months rather than every three. According to the report, “current limitations will make it infeasible to grow a light-footprint, distributed operation across a neighborhood,” therefore the amendments “will assist assure that more American homes may experience the benefits of (drone) technology.” Small drones can now legally fly over people and at night without special permission under new FAA regulations that went into effect on Wednesday. The long-awaited guidelines require remote identification technology in most situations to enable drone identification from the ground, which is intended to alleviate security concerns. Credit6 months ago 10 Tips for using your Credit Cards Finance6 months ago Top 10 tips for buying student insurance Finance7 months ago Classification and perception of pension systems around the World Business6 months ago How to find a name for your company Health6 months ago Is it Safe to Travel abroad for Heart Disease? 5 Preparations before Departure and 6 Points for Boarding News7 months ago BETTERCLOUD, WHICH HELPS COMPANIES CONTROL THEIR SAAS USAGE, INCREASES $75M SERIES F DIRECTED BY WARBURG PINCUS, GETTING ITS TOTAL RAISED IN ORDER TO $187M Agenda News6 months ago Dish Complains To FCC That T-Mobile, Its Partner For Wireless Services, Plans To Shut Down The CDMA Network Used By Millions Of Dish’s Boost Mobile Users Finance7 months ago Car Financing: Everything You Need To Know
<urn:uuid:5e482aab-9b18-4d69-9744-cb1cda9fce0f>
CC-MAIN-2023-23
https://lifefinanceblog.com/the-media-public-trial-is-not-just-a-phenomenon-of-gossip-but-a-mechanism-for-creating-unjust-cases/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657735.85/warc/CC-MAIN-20230610164417-20230610194417-00228.warc.gz
en
0.954442
5,854
2.578125
3
|MemSQL start[c]up Round 1| Piegirl has found a monster and a book about monsters and pies. When she is reading the book, she found out that there are n types of monsters, each with an ID between 1 and n. If you feed a pie to a monster, the monster will split into some number of monsters (possibly zero), and at least one colorful diamond. Monsters may be able to split in multiple ways. At the begining Piegirl has exactly one monster. She begins by feeding the monster a pie. She continues feeding pies to monsters until no more monsters are left. Then she collects all the diamonds that were created. You will be given a list of split rules describing the way in which the various monsters can split. Every monster can split in at least one way, and if a monster can split in multiple ways then each time when it splits Piegirl can choose the way it splits. For each monster, determine the smallest and the largest number of diamonds Piegirl can possibly collect, if initially she has a single instance of that monster. Piegirl has an unlimited supply of pies. The first line contains two integers: m and n (1 ≤ m, n ≤ 105), the number of possible splits and the number of different monster types. Each of the following m lines contains a split rule. Each split rule starts with an integer (a monster ID) mi (1 ≤ mi ≤ n), and a positive integer li indicating the number of monsters and diamonds the current monster can split into. This is followed by li integers, with positive integers representing a monster ID and -1 representing a diamond. Each monster will have at least one split rule. Each split rule will have at least one diamond. The sum of li across all split rules will be at most 105. For each monster, in order of their IDs, print a line with two integers: the smallest and the largest number of diamonds that can possibly be collected by starting with that monster. If Piegirl cannot possibly end up in a state without monsters, print -1 for both smallest and the largest value. If she can collect an arbitrarily large number of diamonds, print -2 as the largest number of diamonds. If any number in output exceeds 314000000 (but is finite), print 314000000 instead of that number. 1 3 -1 1 -1 1 2 -1 -1 2 3 -1 3 -1 2 3 -1 -1 -1 3 2 -1 -1 4 2 4 -1 1 2 1 -1 2 2 -1 -1 2 3 2 1 -1
<urn:uuid:2b946c03-bd50-4ffd-a997-945cae1a4def>
CC-MAIN-2018-09
http://codeforces.com/problemset/problem/325/C
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813803.28/warc/CC-MAIN-20180221202619-20180221222619-00548.warc.gz
en
0.914615
539
3.109375
3
Tomorrow morning the dump trucks will likely resume barreling over the old rail bed through South Bay, raising clouds of dust, to bring aggregate to the dock. People in the Second Ward are presumed to be happy because only half as many trucks--the empty ones coming from the dock--now rattle through their neighborhood, but as Fifth Ward alderman Dick Goetz said at the informal Common Council meeting, "An empty truck can hit a kid just as well as a loaded truck." The long history of moving rock--first coral and shell marble, now aggregate--from Becraft Mountain to the river seems to have some recurring themes--one of them being that what you think is the case isn't always. How a path through South Bay came to be, in 1874, the "stone route" is so uncannily similar to what's happening today, it's worth retelling. Fred Jones, the owner of New York Coral and Shell Marble Company, first proposed building a railroad for his use on State Street, but the people of Hudson protested. Jones tried to sweeten the deal by promising to have passenger cars on the train and let everyone ride for free, but the people weren't buying it. State Street was densely populated, and no one wanted a railroad running down the middle of it. So Jones proposed what some believe he wanted all along: a railroad on a trestle through South Bay. The people of Hudson found Jones's second proposal a preferrable alternative. They probably believed that the railroad would have an acceptably low impact on South Bay and wouldn't interfere significantly with a water body that was part of the texture of life in Hudson. Unfortunately, they didn't get what they thought they were going to get. Work commenced on the trestle railroad in 1874, but it wasn't completed until 1889. It was soon discovered that South Bay had a "bad bottom" that couldn't support the trestle, so a berm through South Bay had to be created for the railroad--a berm that has evolved into what many today like to call the "causeway." A hundred and thirty-seven years later, the people of Hudson are still discovering what they believe about the "causeway" isn't always true. In the fall of 2007, when the Waterfront Advisory Steering Committee handed the Local Waterfront Revitalization Program (LWRP) over to the Common Council, there was no statement that promoted the "causeway" as the City-sanctioned route to the river from the quarry. But two years later, when the document reappeared on the aldermen's desks, many were horrified to find this statement repeated at least three times in the 262-page document: "The City supports plans proposed by Holcim (US) and its tenant [O&G] to reroute heavy truck traffic from the Holcim mine in Greenport, New York, to the deep water dock port via the South Bay causeway" (quoted from page 18 of the November 2009 Draft LWRP). After great public protest, this language has been tempered slightly in the May 2011 "Final" LWRP with the phrase "As a temporary measure," but who knows what it says now? The LWRP has disappeared again and is being copy edited and proofread by city attorney Cheryl Roberts and the planners at BFJ, to eliminate inconsistencies introduced during years of revising the weighty document. The Generic Environmental Impact Study (GEIS) provides another example of people believing things that turn out not to be the case. When, early in 2009, the Common Council approved undertaking a GEIS, the aldermen who thought about it at all thought they were approving a study that--as far as the "causeway" was concerned--looked at ten possible ways to get aggregate from the quarry to the river in order to determine which had the least negative impact on the city and the environment. It turned out what the Council approved was a study that looked at nine alternatives to see if any were equal to or better than the route "the City" supported--that is, the "causeway." On February 17, 2009, when the scoping for the GEIS was discussed at a Common Council meeting, some aldermen objected to including alternatives that they considered unacceptable--for example, taking dump trucks down upper Union Street to the railroad tracks at Seventh Street and then having the trucks follow the path of the railroad tracks to the waterfront. These aldermen were told by Roberts, as recorded in the Council minutes, that "only feasible alternatives were legally required to be addressed" and "the alternatives would not be adequate unless all alternatives were addressed." What wasn't revealed at the time was that three days earlier, Mayor Scalera had received a letter from CSX that rendered any alternative involving the use of CSX right of way not feasible. Now, more than two years later, it seems equally hard to comprehend what is the truth about the legality of the current use of the old rail bed. In October 2009, Roberts sent a letter to Ken Faroni of O&G which stated: "Though the City [of Hudson] has steadfastly maintained that O&G will require site plan approval from the City of Hudson Planning Commission prior to undertaking this action [i.e., "the construction of a roadway beginning in a mine owned by Holcim, LTD, in Greenport, New York, and terminating at the deep water port located in Hudson, New York"], the City Planning Commission has not received a permit application from O&G to date." She goes on to warn that "seeking approval from the Town of Greenport Planning Board in advance of a declaration of lead agency and undertaking a coordinated review . . . amounts to segmentation in violation of 6 NYCRR 617.3(g)." Just weeks ago, however, Scalera attributed to Roberts the opinion that site plan review and approval were not required for O&G/Holcim to pave the path through South Bay, but O&G "would likely need approval to begin actively trucking on the causeway." Many eyewitnesses will attest that O&G is now "actively trucking on the causeway," but there's no evidence that an application for a site plan review was ever submitted to the Hudson Planning Commission, and no one in City Hall--except for a few aldermen--seems concerned about it. Rock-paper-scissors--in Hudson, for generations, rock seems to win every time. Is that the only thing we can count on to be the case?
<urn:uuid:d6ef7084-2d12-469f-8400-a990793d3259>
CC-MAIN-2016-36
http://gossipsofrivertown.blogspot.com/2011/07/contemplating-causeway.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982295383.20/warc/CC-MAIN-20160823195815-00276-ip-10-153-172-175.ec2.internal.warc.gz
en
0.977002
1,347
2.71875
3
A MANDARIN OF DISTINCTION IN HIS HABIT OF CEREMONY Historical Chinese costume in 1799. Qing dynasty (1644-1911) THE dress of a Chinese is suited to the gravity of his demeanor. It consists, in general, of a long vest extending to the ankle: the sleeves are wide at the shoulder, are gradually narrower at the wrist, and are rounded off in the form of a horse-shoe, covering the whole hand when it is not lifted up. No man of rank is allowed to appear in public without boots which have no heels, and are made of satin, silk, or calico. In full dress he wears a long silk gown, generally of a blue color and heavily embroidered; over this is placed a fur-coat of silk, which reaches to the hand and descends below the knee. From his neck is suspended a string of costly coral beads. His cap is edged with satin, velvet, or fur, and on the crown is a red ball with a peacock’s feather hanging from it. These are badges of distinction conferred by the emperor. The embroidered bird upon the breast is worn only by mandarins high in civil rank, while the military mandarins are distinguished by an embroidered dragon. All colors are not suffered to be worn indiscriminately. The emperor, and the princes of the blood only, are allowed to wear yellow; although violet color is sometimes chosen by mandarins of rank on days of ceremony. The common people seldom wear any other than blue or black, and white is universally adopted for mourning. – In their dispositions the Chinese are mild and humane, carefully avoiding every word or gesture which may betray either anger or any violent emotion of the mind. They entertain the highest reverence for their parents, and respect for the aged. They are enthusiastic admirers of virtue, and venerate the memory of such of their nation as have been celebrated for a love of justice and of their country. With this singular people neither riches nor birth can establish the smallest claim to honors. Personal merit is the soIe basis upon which any man can raise himself to distinguished rank. Talents and virtue are indispensably requisite for those in power, and where they are deficient, every adventitious or hereditary pretension is totally disallowed. The Costume of China by George Henry Mason published by W. Miller, Old Bond Street, London May 4,1799. Chinese people at their occupations and applying their crafts.
<urn:uuid:f5624ceb-8869-425a-82d2-9ccd937b41fa>
CC-MAIN-2021-10
https://world4.eu/historical-chinese-costume/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178357929.4/warc/CC-MAIN-20210226145416-20210226175416-00303.warc.gz
en
0.955783
518
3.265625
3
Obesity's rise trumps smoking's decline when it comes to life expectancy When it comes to smoking and obesity, what goes up must come down. A new study predicts that in the future, as smoking rates continue to decline and life expectancy increases, obesity figures will continue to rise, ultimately slowing those rates and contributing to poorer quality of life. The New England Journal of Medicine study released today looked at previous health trends culled from national health surveys to forecast life expectancy and quality of life for a typical 18-year-old from 2005 through 2020. Past declines in smoking over the last 15 years would give that 18-year-old an increased life expectancy of 0.31 year. However, growing body mass index rates would also mean that that teen would have a reduced life expectancy of 1.02 years, giving a net life expectancy reduction of 0.71 year. Researchers from Harvard University, the University of Michigan and the National Bureau of Economic Research point out that while life expectancy will still increase in the future due to factors such as overall healthcare improvements, better nutrition and education, rising obesity rates may eventually slow that progression. "This is a bit of a wake up call," says Dr. Allison Rosen, assistant professor of internal medicine and health management policy at the University of Michigan and co-author of the study. "We have always attributed so many of our health problems to smoking, and this emphasizes that we're getting health improvements from declines in smoking. But changes in the rates of obesity are starting to outweigh the declines in smoking. I wasn't sure what to expect from the results. Part of me thought obesity would be the driving factor, but I was surprised by the extent of our findings." When it comes to life expectancy, some would rather have cheesecake now than an extra few months of life years down the road. Rosen says people should think more in the short-term: "I’ve had patients lose weight and stop smoking, and the changes in their quality of life can be dramatic. One patient lost 55 pounds, and before that he was in a wheelchair half the time. I know smokers who like to go run around with their friends, but they get short of breath and tired rapidly. Life expectancy may not come until years later, but you can experience quality of life right now." -- Jeannine Stein Photo credit: Rogelio V. Solis / AP
<urn:uuid:996dc072-b8a1-4726-9967-8afc8ed239f6>
CC-MAIN-2017-43
http://latimesblogs.latimes.com/booster_shots/2009/12/obesitys-rise-trumps-smokings-decline-when-it-comes-to-life-expectancy.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823350.23/warc/CC-MAIN-20171019160040-20171019180040-00248.warc.gz
en
0.971727
488
2.53125
3
An oddball called WASP-12b, an exoplanet orbiting a star somewhat heftier than the sun, is the “blackest” planet we’ve found so far. NASA’s Hubble Space Telescope turned its lens towards WASP’s patch of the galaxy — some 1,400 light-years away — to find that this hot Jupiter traps at least 94 percent of the visible starlight falling into its atmosphere. Hot Jupiters are gas giants that orbit extremely close to their parent stars. Being in such proximity, their orbital period is very short, typically less than 10 days. In WASP-12b’s case, it takes 1.09 Earth days to complete a full revolution. That’s around the main yellow dwarf star, since WASP is actually a trinary system and further includes two red dwarf stars, each roughly 37 percent and 38 percent of the sun’s mass, respectively. Orbiting so close to the planet also forced WASP-12b into a tidal lock, with one side always facing the sun while another is shrouded, just like our moon. On the day side of the planet, the surface gets blistering hot sitting at roughly 2,500°C (4,600 degrees Fahrenheit), enough to melt some metals. A light eater The day side is so hot it can’t possibly sustain any clouds, so the extremely intense light emanating from WASP just punches through the planet’s atmosphere where it’s absorbed by hydrogen atoms. Almost nothing is reflected, back making this planet darker than asphalt. “We did not expect to find such a dark exoplanet,” said Taylor Bell of McGill University and the Institute for Research on Exoplanets in Montreal, Quebec, Canada. “Most hot Jupiters reflect about 40 percent of starlight.” The dark side of WASP-12b is a different matter altogether, as one would expect. It’s a full 1,090°C (2,000 degrees Fahrenheit) colder than the day side, a temperature still really high, but low enough to allow cloud formation. Previously, observations of the day-night interface detected evidence of water vapor and possibly clouds and hazes in the atmosphere. All of this goes to show that there’s still much we don’t know about hot Jupiters. Right now, anything between 2,500°C (4,600 degrees F) and 1,200°C (2,200 degrees F) is considered a hot Jupiter, and WASP-12b falls like an arc between these limits with its day-night sides. WASP-12b also comes as a friendly reminder that exoplanets come in all colors. Previously, Hubble detected another hot Jupiter with a glowing water atmosphere. Another Jupiter-like world called HD 189733b is a deep cobalt blue that’s reminiscent of Earth’s color as seen from space. Now, black is on the palette too.
<urn:uuid:0084ccf3-b0a8-4a97-8cc3-564010281b09>
CC-MAIN-2019-26
https://www.zmescience.com/science/news-science/pitch-black-planet-0432432/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999620.99/warc/CC-MAIN-20190624171058-20190624193058-00066.warc.gz
en
0.922364
633
3.96875
4
Reformers of the 19th Century Support Women's Rights!!! Women's Rights MovementIn 1948, more than 300 women participated in a women's rights movement, including Elizabeth Cady Stanton and Lucretia Mott. Elizabeth Cady Stanton and Lucretia Mott Become an Abolitionists!!! Nat Turner was a Virginian slave and, in August 1831, escaped to lead 50 followers in a revolt. Him and his followers killed 60 and he was eventually caught and executed. Abolitionist MovementIn the 1820's the Abolitionist Movement was movement meant to free African Americans from slavery. An abolition leader was known as Lloyd Garrison. Another well known abolitionist was Frederick Douglass and he began an anti-slavery newspaper, North Star. The Capture of Nat Turner Reduce All Alcohol!!! Temperance MovementThe Temperance Movement began to reduce the use of alcoholic beverages.The American Temperance Society, also known as the American Society for the Promotion of Temperance, was established on February 13, 1826 in Boston, MA. It was formed in 1826 and spread quickly, with thousands of chapters throughout the country. Help the Prison!!! The Prison Reform's Greatest leader was Dorothea Dix. She wanted to create separate facilities for prisoners and the mentally ill since prisons were so abusive. By the time she dies, there was 100 facilities established in the U.S. Tranquilizing chair used as a treatment for the mentally ill. Until the 19th century, juveniles offenders were passed into the custody of their parents. During the time of prison and asylum reform, juvenile detention centers like the House of Refuge in New York were built to reform children of delinquent behavior. Education for Generations!!! Educational Reformers wanted to improve public schools. Horace Mann was one of the greatest leaders in the movement. The educational reform established teacher training programs, improved curriculum, and doubled money Massachusetts spent on schools.
<urn:uuid:1def07ae-75ae-4a1f-a4b3-a4ae770bb501>
CC-MAIN-2018-43
https://www.smore.com/2shkw
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583519859.77/warc/CC-MAIN-20181024042701-20181024064201-00408.warc.gz
en
0.970795
405
3.984375
4
Whenever rains hit Cleveland hard in the summer, there is always the risk that the city will have to close the beaches for a few days. The excess water from a storm can overwhelm the sewage system and force the city to flush it with raw sewage into Lake Erie. It has to do this to avoid having its streets flooded and its water treatment plants damaged. The discharges lead to bacteria, pathogens and other pollutants lowering the quality of the water in the lake, killing fish and threatening public health. In short: one of the Great Lakes of North America becomes unsafe to swim close to shore. «Sometimes after a heavy rain they have to close the beaches at Edgewater,» said a local television reporter during a broadcast from the lakeshore park more than a year ago. «That is the end-result of a problem that will cost $3 billion to fix.» That is how much this city in the eastern U.S. state of Ohio is spending to address a problem that has plagued it for as long as a century. «As in most urban areas across the nation, Greater Cleveland's earliest sewers… are combined sewers,» explains the local water authority on its website. «Built around the turn of the nineteenth century, these sewers carry sewage, industrial waste, and stormwater in a single pipe.» Every year, Cleveland discharges an estimated 4.5 billion gallons of raw sewage into the lake. Although the volume is half of what it was in the 1970s, the city needs to reduce it even more to meet standards set under the Clean Water Act. Since 2011, it has been working on Project Clean Lake, part of a broader effort to collect, store and treat these waters and reduce the level of pollution in the lake. The investment is huge, but it will be made over the course of 25 years. By then, Cleveland expects to have reduced the annual volume of discharges to 494 million gallons. That means more than 98% of the heavy flows of rain water and sewage in the combined sewer system will be treated and rendered safe, according to the local water authority, known as the Northeast Ohio Regional Sewer District. The project, one of the city’s largest for infrastructure, includes the construction of eight storage tunnels and the upgrading of water three treatment plants. Workers have just started on the Dugway Storage Tunnel. The Mill Creek Tunnel was completed several years ago and the Euclid Creek Tunnel System in 2015. The Dugway is being built by Salini Impregilo SA Healy JV, a joint venture between Salini Impregilo and SA Healy, a subsidiary of Lane Construction, itself part of Salini Impregilo. It is the latest of a number of projects being done by the Group that has a focus on the environment. In Washington, D.C., it is excavating a tunnel to help the capital do the same thing: reduce sewage discharges in its rivers. The Dugway will be 27 feet in diameter and stretch for 4.5 kilometres under east Cleveland. Once precast segmental concrete line its walls, the internal diameter will be more like 24 feet. The $153 million tunnel will range in depth from 200 to 230 feet below ground. It will have six shafts of varying diameters and depths. The Dugway will store and convey combined sewer overflow from ancillary collection and relief sewers. Rather than replace the existing pipes, it will handle any additional flow created by a storm or heavy rains. It will store up to 58 million gallons of water and sewage and hold them until the rains subside and the Easterly Sewage Treatment Plant has the capacity to treat them. Work on the Dugway is scheduled to be completed in 2020. CLEVELAND IS WORKING ON A PROJECT TO REDUCE THE AMOUNT OF SEWAGE DISCHARGED INTO LAKE ERIE PROJECT CLEAN LAKE FORESEES EIGHT NEW STORAGE TUNNELS AND THREE UPGRADED TREATMENTS PLANTS THE PROJECT WILL COST $3 BILLION AND TAKE 25 YEARS TO COMPLETE SO MUCH SEWAGE GETS DUMPED INTO THE LAKE THAT ITS WATERS OFTEN BECOME UNSAFE TO SWIM NEAR THE SHORE
<urn:uuid:435f987a-2020-4639-8813-70b64cc091ef>
CC-MAIN-2019-30
https://www.webuildvalue.com/en/stories-behind-projects/saving-the-waters-of-lake-erie.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526948.55/warc/CC-MAIN-20190721102738-20190721124738-00024.warc.gz
en
0.93183
893
3.375
3
Highly recommended for getting to know each other in a new group. Tell your partner three things about yourself - two of which are true and one of which is a lie. For example, you might tell your partner about your hobbies, your work, where you live, your family or where you have travelled. Afterwards, your partner tries to guess which was the lie. You might choose to tell three everyday facts or three more unusual things - but remember - only one of them should be a lie. Make sure each person listens carefully to what their partner says! |Learning Objectives:||To encourage a group to get to know each other |Recommended time for activity:||15-20 minutes|
<urn:uuid:7622c3fe-9fb3-4eb7-819d-4fe845fae2e7>
CC-MAIN-2015-11
http://www.dramaresource.com/games/icebreakers/two-truths-one-lie
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460576.24/warc/CC-MAIN-20150226074100-00085-ip-10-28-5-156.ec2.internal.warc.gz
en
0.950104
142
2.6875
3
The term “whiplash” was originally coined to describe the manner in which a head is moved suddenly to produce a sprain in the neck. The more appropriate term used among doctors today is “whiplash syndrome,” which is a complex condition that is comprised of many injuries to the cervical spine. So what is whiplash syndrome, and how is it treated? Simply worded, whiplash syndrome refers to the symptoms that occur following a whiplash injury. These can include physical symptoms like headaches, neck pain, and shoulder pain, as well as overall changes that can affect mood, like fatigue, anxiety, insomnia, forgetfulness, and lack of concentration. Car collisions are a common source of whiplash injuries, but these conditions can occur in other ways. A blow to the head can cause the head and neck to move in such a way that whiplash syndrome can result. Falling down can cause a whiplash injury, whether from a slip on a slick floor or from a skiing accident, especially when the head quickly hits the floor or hard surface. One kind of injury that is very prone to occur during motor vehicle collisions is ligament damage. Ligaments are the tissues that hold your bones together, including the bones in your neck (cervical spine). When your neck gets whipped to and fro (which happens so fast, most of the time you don’t know how dramatically it occurred), the ligaments in your neck get stretched and essentially aren’t able to do their job like they should: namely, making sure those neck bones (vertebrae) don’t slip and slide on one another. Atlas Orthogonal Chiropractic has been scientifically proven to reduce whiplash syndrome and effectively aid in the body’s natural healing ability after a whiplash injury. In a study published in the peer-reviewed medical journal, Journal of Whiplash and related disorders, 221 patients diagnosed with whiplash syndrome were treated with Atlas Orthogonal Chiropractic care. After treatment, 84% of the patients experienced complete or near complete resolution of their pain and other neck related complications. All of the patients reported significant improvements in their conditions. If you know anyone who has been in a car accident, or had a nasty fall while hitting the slopes, and is suffering from any of the symptoms we listed, let them know that help is out there for their whiplash injury. Schedule an appointment today to safely and effectively get out of pain and onto the road to natural healing.
<urn:uuid:37d7452e-0a69-4418-9be6-cbc0acf392dd>
CC-MAIN-2015-14
http://lakemeridianchiropractic.com/conditions/whiplash/
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298576.76/warc/CC-MAIN-20150323172138-00032-ip-10-168-14-71.ec2.internal.warc.gz
en
0.961949
529
2.765625
3
Truth About Pet Food.com reports that since late December 2020, hundreds of pets have died due to contaminated pet food; the deaths could have been prevented through proper monitoring of ingredients and pet foods. In the same timeframe – but only after pets died – 60 million pounds of corn-based dog and cat food were recalled containing deadly levels of aflatoxins, poisons produced by molds on agricultural crops. The FDA maximum limit of aflatoxin in pet food is 20 parts per billion. FDA states: “Pets with aflatoxin poisoning may experience symptoms such as sluggishness, loss of appetite, vomiting, jaundice, and/or diarrhea. In some cases, this toxicity can cause long-term liver issues and/or death.” Pet owners across the US sent an urgent plea to Dr. Steven Solomon, FDA Center for Veterinary Medicine to take preventive action against mycotoxins in pet food; telling the Agency recalls are not enough. “Proper monitoring of hazards and prevention is vital to pet food safety” said veterinarian Dr. Laurie Coger. “More immediate and consistent action needs to be taken by the FDA, veterinarians, and corn-inclusive pet food manufacturers.” The FDA allows pet food to include inferior quality corn, including corn rejected for human consumption due to high risk of mycotoxin producing mold. Increasing the risk, most substandard corn is stored outside exposed to moisture and animal infestations – creating ideal conditions for mold and mycotoxin production. While many manufacturers follow Good Manufacturing Practices, some do not. Unless ingredients and pet foods are tested, mycotoxins will wind up in pets’ bowls leading to sickness and death. “It’s one of the most dangerous threats to pets. Seven hundred thousand tons more corn is used in pet foods than any other ingredient,” said consumer advocate Susan Thixton. “We have asked the FDA to investigate more aggressively and issue alerts in a similar manner as the agency has investigated other issues,” states documentary filmmaker Kohl Harrington. “We need action taken immediately.” Pet owners have asked FDA to: - Request veterinarians and pet owners to report any pet illness or death over the last 12 months to the FDA for pets fed any type of corn ingredient pet product; - Identify the toxic corn suppliers and trace all customers over the last 24 months; - Implement random mycotoxin testing for pet foods and treats that contain a corn ingredient over for the next 12 months; and - Issue monthly updates to pet owners providing the number of mycotoxin adverse events received and test results. Pet advocates are asking pet food manufacturers to take preventive action; the potential for more deaths is inevitable if nothing is done. Manufacturers of corn included pet foods are asked to: - Provide pet owners aflatoxin test results on the brand’s website for every batch of pet food produced; - Provide aflatoxin test results on the brand’s website for every load of corn (corn-based) ingredient(s) received. “We cannot wait months and months, as with the melamine recalls in 2007 where 10,000+ cats and dogs died from 150 contaminated brands. Action is necessary now,” said Thixton. Dr. Laurie S. Coger is an integrative veterinarian and founder of Check Your Pet Food which provides a means of independent pet food testing for both safety and nutritional integrity. Kohl Harrington produced the documentary film Pet Fooled about the pet food industry. He is currently working on a sequel. Susan Thixton has been advocating for pet food consumers with regulatory authorities for more than fifteen years. SOURCE: Truth About Pet Food
<urn:uuid:0f043a14-ccda-47af-85bb-7b044bda81c9>
CC-MAIN-2021-17
https://www.dogingtonpost.com/surge-of-pet-deaths-linked-to-the-most-common-pet-food-ingredient/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038862159.64/warc/CC-MAIN-20210418224306-20210419014306-00462.warc.gz
en
0.935624
771
2.671875
3
Many regional councils have in place sophisticated Geographic Information Systems (GIS) with data used for comprehensive, contingency, transportation and other planning activities. GIS has become an integral part of nearly all planning projects. The strength of GIS is its ability to create distinct map layers for different types of information, and then to combine them in any way desired or needed. A person reading a map can select the modeling of various scenarios to determine results of actions. For instance, a community involved in municipal planning may want to know how suitable different areas of the town are for development – where growth is happening. GIS can map various conditions including topography of a building site, available utilities, business retail markets, transportation hubs, road and bridge conditions, flood frequency and wetlands. Planners and local officials can also use GIS to make more informed decisions about agricultural land preservation, building permits, parcel/tax mapping, emergency dispatching (9-1-1), and zoning designations. To learn more visit the following regional council GIS sites: • Tri- County RPC Maps and Apps Gallery • Springfield-Sangamon County RPC GIS Apps • CMAP Land Use Inventories • Coles County RP&DC GIS Portal • Champaign County GIS Consortium • Bi-State GIS Mapping Services • NCICG GIS Mapping Services • SCIRP&DC GIS Services • Morgan County RPC GIS Services
<urn:uuid:16c347cc-f446-4aaa-be7e-e4c0a2f33979>
CC-MAIN-2019-43
https://ilarconline.org/about/services/profile/gismapping
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986673538.21/warc/CC-MAIN-20191017095726-20191017123226-00011.warc.gz
en
0.898108
298
3.09375
3
Terms, ideas, and concepts from and inspired by 1984. Newspeak – The fictional language designed to restrict the words, and hence the thoughts, of the citizens of Oceania. Eliminates alternate or implied meanings of terms in such a way that only direct, literal meaning persists. doublethink – The power of holding two contradictory beliefs in one’s mind simultaneously, and accepting both of them. A sort of voluntary mind control. prole – A lower class citizen or a member of the working class. A member of the proletariat, especially one viewed as a subhuman or treated as such. thought police – A group that aims to control what other people think. thoughtcrime – A crime committed by having unorthodox or unofficial thoughts. Political resistance or even indifference which may be evidenced by subconscious activity and body language as easily as by voice and action. Big Brother – A disparaging name for government surveillance considered to be too intrusive. Any omnipresent figurehead representing oppressive control. historical revisionism – The systematic alteration of historical facts to forge a past more favorable to the reputation or motives of a particular group. Ingsoc – The fictional “English Socialism” ideology of Oceania, also referred to as oligarchical collectivism. Makes provisions for historical revision, perpetual war, and stark class division in the form of the Inner Party, the Outer Party, and the Proles. telescreen – A type of two-way television which is used for surveillance as well as the distribution of propaganda. Instills fear by the implication of constant surveillance, while not necessarily having to be monitored at all times. reality control – A method of oppression of thought in which all outside stimuli are coordinated to suggest a false world is true. doublespeak – Language that deliberately disguises, distorts, or reverses the meaning of words. Could be interpreted as euphemisms or innuendo, but is ultimately used to both state and veil the truth.
<urn:uuid:ba527b80-38ff-405a-b728-3d7550422f36>
CC-MAIN-2021-39
https://utopianlanguage.wordpress.com/orwellian-language/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057447.52/warc/CC-MAIN-20210923195546-20210923225546-00364.warc.gz
en
0.949573
406
2.890625
3
"The Lost Secrets of Maya Technology reveals what a scientifically advanced people the Maya really were. Relying on his background as a professional engineer, James O'Kon is able to analyze Maya architecture and write about it with the scientific terminology it truly merits. The book places Maya engineers shoulder to shoulder with the Romans or any other ancient culture one could compare them against. As an archaeologist with 20+ years of field experience, this book opened my eyes to Maya scientific achievements that I would previously not thought possible."--Edwin Barnhart, Ph.D., archaeologist and Director of Maya Exploration Center"James O'Kon's book addresses a neglected field, and his wide-ranging discussion sheds new light on many aspects of Maya studies. His training as an engineer keeps the book focused on reality. His writing is full of sudden insights…when he gets to the nitty-gritty of real science, this book shines. The final chapter addresses the engineering flaws that led to their fall…they pushed their environment too far."--Mark Van Stone, Ph.D., author of 2012: Science and Prophecy of the Ancient Maya"Great introduction to the unrecognized technological achievements of the Maya. This was my first introduction to Maya tool making. I found those chapters very interesting. Very informative well written and provided me with new material on Maya technology.".--Thomas L. Sever, Ph.D., NASA ArchaeologistThe Maya have been an enigma since their discovery in the mid- 19th century. Maya science developed an elegant mathematic system, an incredibly accurate astronomy, and one of the world's five original written languages. This technology was more advanced than similar European technology by more than a thousand years.In this book, you'll see how James O'Kon, a professional engineer, synergistically applied field exploration, research, forensic engineering, and 3-D virtual reconstruction of Maya projects to discover lost Maya technological achievements. These lost principles of technology enabled Maya engineers to construct grand cities that towered above the rainforest, water systems with underground reservoirs for water storage, miles of all-weather paved roads tracking through the jungle, and the longest bridge in the ancient world.Maya engineers developed structural mechanics for multi-story buildings that were not exceeded in height until the first "skyscraper" built in Chicago in 1885, invented the blast furnace 2,000 years before it was patented in England, and developed the vulcanization of rubber more than 2,600 years before Charles Goodyear. Discover a host of unknown wonders in The Lost Secrets of Maya Technology. About James A. O'Kon See more books from this Author Published April 1, 2012 by New Page Books. History, Religion & Spirituality, Arts & Photography, Professional & Technical.
<urn:uuid:06ff90c6-b1fd-4093-a703-13dc626f3d53>
CC-MAIN-2016-44
http://idreambooks.com/The-Lost-Secrets-of-Maya-Technology-by-James-A-O-Kon/reviews/142522
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00023-ip-10-171-6-4.ec2.internal.warc.gz
en
0.941945
562
2.59375
3
Czech Subjects Interned in Mauritius, · Searching the Database This database contains records of 299 Czech Jews interned on Mauritius, 1941-1945. Prior to the arrival in Haifa of the immigrant ships Pacific, Milos, and Atlantic, in November 1940, the British government announced that all further arrivals of refugees without entry permits would be deported to "another British colony," which turned out to be Mauritius, off the south-east coast of Africa. About 1,800 people from the Pacific and Milos were loaded on the old French liner Patria. On 23 Nov 1940, an explosion occurred on the Patria, blowing a hole in the side of the ship which capsized. Over 250 people were killed in this disaster. The Haganah had smuggled a bomb on board with the intention of disabling the engines. On the initiative of Winston Churchill, the survivors of the Patria were permitted to remain in Israel, but the other arrivals, including those on the Atlantic, which arrived on 24 Nov 1940, were deported. They, including the 299 people on this list, remained in Mauritius until August 1945 when they were repatriated to Palestine. This database includes 299 records of Czechs interned on Mauritius. The fields for this database are as follows: Note A (Record #s): Note B (Note abbreviations): The information contained in this database was indexed from the files available from the Foreign Office files at the British National Archives (FO 371/29161/p103-133). Paul Silverstone compiled the list. In addition, thanks to JewishGen Inc. for providing the website and database expertise to make this database accessible. Special thanks to Warren Blatt and Michael Tobias for their continued contributions to Jewish genealogy. Particular thanks to Nolan Altman, coordinator of Holocaust files. Coordinator - Holocaust Database |JewishGen Databases||JewishGen Home Page|
<urn:uuid:e0790137-e75e-4738-80bf-0b8f91839b81>
CC-MAIN-2015-40
http://www.jewishgen.org/databases/holocaust/0240_Czechs_in_Mauritus.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737913815.59/warc/CC-MAIN-20151001221833-00174-ip-10-137-6-227.ec2.internal.warc.gz
en
0.934786
394
2.515625
3
Canadian artist Alfred Joseph Casson was born in Toronto, Ontario of an English father and a Canadian mother. His family moved to Hamilton in 1912, and there he studied under John S. Gordon at the Hamilton Technical School. At the age of 16 he was apprenticed to the Laidlaw Lithography Company in Hamilton, where he retouched photographs, laid patterns and engraved on zinc plates. Casson was then hired by the Commercial Engravers Company in Hamilton. When his family moved back to Toronto in 1915, he worked as a freelance designer. In the evenings he attended the Central Technical School, where he studied under Alfred Howell from 1915 to 1917. He then studied at the Ontario College of Art under J.W. Beatty and took private classes under Harry Britton who first taught him water colour techniques and introduced him to oil painting. In 1919, Casson was employed by the firm of Rous & Mann Limited as assistant designer to Franklin Carmichael, serving a seven-year apprenticeship which led him back to the field of freelance designing. During this period he benefited greatly from Carmichael’s high standards in daily work and became a good friend and sketching companion. Through Carmichael, Casson met members of the Group of Seven at the Arts and Letters Club. In 1921 Casson made his first extended painting trip with Carmichael to Lake Rosseau in the Muskoka district, and exhibited for the first time with the Ontario Society of Artists. In 1923, his work ‘Clearing’ was purchased by the National Gallery of Canada. While working in oils, Casson was also developing his watercolour skills, and in 1925 with Carmichael and F.H. Brigden he formed the Canadian Society of Painters in Water Colour “to encourage and foster the art of water-colour in Canada”. In 1926, Casson was invited to join the Group of Seven when F.H. Johnston – who wanted to paint more marketable, realistic scenes – departed the group. In the same year, Casson started work for the firm of Sampson-Matthews and continued to sketch with Carmichael on the weekends. In the Yearbook of Arts in Canada, F.B. Housser wrote, “Carmichael and Casson are painting in water colours… giving to Canadian landscape a statement in water colour as bold and untraditional as that which some of their associates have given in oils.” Many of Casson’s large canvases were done between 1926 and 1930, when he sketched in the Haliburton and Lake Superior regions. The early emergence of his individuality was noted by Paul Duval, as was later his change in style in 1944, when pattern became the vital element in his work. It was around 1924 that Casson began to focus on the Ontario village. He made many sketches of structural details which became a valuable reference for his larger studies in oils, like his magnificent ‘Anglican Church At Magnetawan’, painted in 1933. A fall while skating in 1924 agitated a kidney stone, and he was advised by his doctor to avoid outdoor sketching for a year. Instead, he spent weekends painting flowers in the greenhouses of the Allen Gardens in Toronto, and produced a series of small glowing panels of flowers and still lifes. Casson’s strong sense of design may have been due to his growing interest in various types of reproduction. As Vice President and Art Director for Sampson-Matthews for almost 20 years, he was responsible for the technical development of programmes in connection with reproduction of artists’ works carried out by the National Gallery of Canada, Canadian Pulp and Paper Association and Sampson-Matthews Limited. His article entitled ‘The Possibilities of Silk Screen Reproduction’ appeared in Canadian Art in 1949, in which one of his own prints, ‘Mill Village’ was reproduced. His heraldic work was also reproduced by Sampson-Matthews, including armorial bearings of Canada and her ten provinces, and a series of landscapes including ‘White Pine’, ‘Fisherman’s Point’, ‘Summer Morning’, ‘McGregor Bay’ and ‘Poplar’. His paintings of northern Ontario landscapes and villages won him several awards. Casson was a prolific artist. He did many small sketches in oils on panels in various sizes, many of which he later destroyed as he considered them beneath the standards he achieved in later years. Only a few were saved for friends. Some public collections include these small sketches, including that of the late Professor O.J. Firestone of Ottawa, who faithfully acquired 138 works covering Casson’s entire painting career from 1918 to 1976. This collection was donated by the O.J. Firestone Collection to the Ontario Heritage Foundation in 1972. Bob and Signe McMichael assembled their magnificent McMichael Conservation Collection of Art in Kleinburg, Ontario – which includes 45 or more Casson works. Their collection was also donated to the Ontario Heritage Foundation in 1965. Casson lived in North Toronto with his wife until his death at the age of 93. He was not only one of Canada’s most able artists, but also one of the most highly regarded. He is represented in many public Canadian collections including the National Gallery of Canada, the Art Gallery of Ontario, the McMichael Canadian Art Collection, Hart House, the Art Gallery of Hamilton, LRA&HM in London, Gallery Lambton in Sarnia, the Montreal Museum of Fine Art and many private collections. He was involved in several art organisations including the Ontario Society of Artists, the Canadian Society of Painters in Water Colour, the Group of Seven, the Royal Canadian Academy and the Canadian Group of Painters.
<urn:uuid:0124adf7-0ac5-42cc-8d4f-683dee639370>
CC-MAIN-2023-23
http://www.sampsonmatthewsprints.com/artists/alfred-joseph-casson/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00024.warc.gz
en
0.983585
1,188
2.90625
3
Official Name: Hong Kong Special Administrative Region of the People’s Republic of China Established: 29 August 1842 (Treaty of Nanking), 1 July 1997 (Transfer from the United Kingdom) Population: 7,500,700 (2019 estimate) Religion: Buddhism 20%, Confucianism 20%, and Taoism 20%, Christianity 12%, Islam 4% Language(s): Chinese, English Capital: Hong Kong Order of Visit: Twenty-Eigthth First Visit: 9 August 2006 Last Visit: 30 October 2018 Duration: 14 Days Visit Highlights: Stanley Market, Victoria Peak, Sampans, Ladies Market, Disneyland, Giant Buddha (Po Lin monastery), Cathay Pacific First Class Lounges Places Visited: Hong Kong Hong Kong Journal Entries History and Geography Hong Kong is a metropolitan area and special administrative region of the People’s Republic of China on the eastern Pearl River Delta of the South China Sea having a high density with over 7.5 million residents located in a 1,104 square kilometres. Earliest known human traces in Hong Kong are dated by some to 35,000 and 39,000 years ago during the Paleolithic period. During the Middle Neolithic period, about 6,000 years ago, the region had been widely occupied by humans. Neolithic to Bronze Age Hong Kong settlers were semi-coastal people. The Qin dynasty incorporated the Hong Kong area into China for the first time in 214 BCE. During the Mongol conquest of China in the 13th century, the Southern Song court was briefly located in modern-day Kowloon City (the Sung Wong Toi site) before its final defeat in the 1279 Battle of Yamen. By the end of the Yuan dynasty, seven large families had settled in the region and owned most of the land. Settlers from nearby provinces migrated to Kowloon throughout the Ming dynasty. After the Qing conquest, maritime trade was banned under the Haijin policies. The Kangxi Emperor lifted the prohibition, allowing foreigners to enter Chinese ports in 1684. Qing authorities established the Canton System in 1757 to regulate trade more strictly, restricting non-Russian ships to the port of Canton. Although European demand for Chinese commodities like tea, silk, and porcelain was high, Chinese interest in European manufactured goods was insignificant, so that Chinese goods could only be bought with precious metals. To reduce the trade imbalance, the British sold large amounts of Indian opium to China. Faced with a drug crisis, Qing officials pursued ever more aggressive actions to halt the opium trade. In 1839, the Daoguang Emperor rejected proposals to legalise and tax opium and ordered imperial commissioner Lin Zexu to eradicate the opium trade. The commissioner destroyed opium stockpiles and halted all foreign trade, triggering a British military response and the First Opium War. The Qing surrendered early in the war and ceded Hong Kong Island which then became a colony of the British Empire The colony expanded to the Kowloon Peninsula in 1860 after the Second Opium War and was further extended when Britain obtained a 99-year lease of the New Territories in 1898. At the start of the Second Sino-Japanese War in 1937, Governor Geoffry Northcote declared Hong Kong a neutral zone to safeguard its status as a free port. The colonial government prepared for a possible attack, evacuating all British women and children in 1940. The Imperial Japanese Army attacked Hong Kong on 8 December 1941, the same morning as its attack on Pearl Harbor. Hong Kong was occupied by Japan for almost four years before Britain resumed control on 30 August 1945. By the early 1990s, Hong Kong had established itself as a global financial centre and shipping hub. Diplomatic negotiations with China resulted in the 1984 Sino-British Joint Declaration, in which the United Kingdom agreed to transfer the colony in 1997 and China would guarantee Hong Kong’s economic and political systems for 50 years after the transfer. Over half a million people left the territory during the peak migration period, from 1987 to 1996. The Legislative Council became a fully elected legislature for the first time in 1995 and extensively expanded its functions and organisations throughout the last years of the colonial rule. Hong Kong was transferred to China on 1 July 1997, after 156 years of British rule. Political debates after the transfer of sovereignty have centred around the region’s democratic development and the central government’s adherence to the “one country, two systems” principle. After reversal of the last colonial era Legislative Council democratic reforms following the handover. What I experienced Hong Kong is a very unusual place to visit officially being part of China but also separate with it’s own currency, laws, and visa and immigration requirements. A Chinese citizen faces restrictions on visiting Hong Kong highlighting the ‘two systems’ approach. For my longest visit in 2006 Hong Kong still had a strong United Kingdom influence but this has been reducing as the central government exerts more control. Every time I’ve visited Hong Kong I felt an energy highlighting the financial and transportation hub importance of this destination. The markets can be chaotic and overwhelming but there isn’t much you can’t find to buy. Despite the large population for a small area there are some quiet and green areas in Hong Kong in particular Victoria Peak which is an important destination as it gives you a good view of Hong Kong. I also got a chance to visit Hong Kong Disneyland and really appreciate the strong emphasis on live shows which made for an enjoyable visit. Hong Kong is a unique combination of Chinese and English heritage in one place. It was created by a colonial power (The United Kingdom) imposing it’s will over a sovereign country (China) which was trying to stop a dangerous drug epidemic the colonial power was causing. Still the United Kingdom did end up creating a dynamic colony which grow to be very powerful in this region of the world. Whether this remains in the long term is unknown but assuming it is safe Hong Kong is worth visiting and exploring even if only for a few days on a stopover to other countries including mainland China.
<urn:uuid:95596443-73ee-47c1-8f46-ac89e8ba8674>
CC-MAIN-2021-04
https://nathanburgessinsights.com/2020/12/29/destination-hong-kong/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703544403.51/warc/CC-MAIN-20210124013637-20210124043637-00297.warc.gz
en
0.943578
1,259
3.296875
3
A Brief History of Denali Highest Mountain in North America. Denali has always been revered by native Athabascans who inhabit this northern region. The first climbing attempt was made by the Sourdough Expedition (William Taylor and Pete Anderson) utilizing the Muldrow Glacier. They summitted the north peak (19,740’) in 1910. About three years later, in 1913, the true summit was reached. A team comprised of Archdeacon Hudson Stuck, Robert Tatum, Walter Harper and Harry Karstens successfully climbed the south peak. It was Harper, a native Athabascan, who first stood atop North America. Between 1913 and 1950, there were very few ascents of Denali. The landmark achievement, which opened Denali to a larger group of climbers, was Bradford Washburn’s 1951 expedition, which reached the summit of Denali via the West Buttress. Washburn’s team, using a plane fitted with skis to access the Kahiltna Glacier, pioneered the most popular route on the mountain. As Everest is to the Tibetans, Denali is inseparable from indigenous Alaskan lore. Every native Athabascan who saw Denali towering over their horizon named it accordingly, "The Great One" or "The High One." Denali (The High One) is the native Athabascan word for North America’s highest peak. It was renamed Mt. McKinley for William McKinley, a one-time presidential nominee, by gold prospector, William Dickey. Common usage has reclaimed the native name, Denali. First Climbed: 1913, W. Harper, H. Stuck, R. Tatum & H. Karstens First Climb of West Buttress: 1951, Bradford & Barbara Washburn Alpine Ascents is an authorized concessioner of Denali National Park and Preserve. Capital City: Juneau Admission to Statehood: January 3, 1959 Area: 656,425 sq. mi, Constitution: 49th State Bird: Willow Ptarmigan/Mosquito Flower: Forget Me Not Motto: North To The Future Origin of state's name: Based on an Aleut word "alaxsxaq" literally meaning "object toward which the action of the sea is directed" or more simply "the mainland". Location: 58.388N, 134.133W Fireweed Station Historic Alaskan Inn Talkeetna Roadhouse Lodging, Meals, Bakery Millennium Alaskan Hotel Anchorage HotelReturn to Top of Page
<urn:uuid:39eda740-faf2-4984-933e-bf61893e657c>
CC-MAIN-2015-22
http://www.alpineascents.com/denali-map.asp
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930995.36/warc/CC-MAIN-20150521113210-00131-ip-10-180-206-219.ec2.internal.warc.gz
en
0.928833
546
3.140625
3
Asked by | 2nd Mar, 2009, 07:52: PM Each service such as radio, television, cellular radio etc has been assigned a different set of frequencies. Radio has been assigned the lowest frequency band for transmission of its signals. The higher the frequency the more will be the range upto which the signal will reach. Answered by | 3rd Mar, 2009, 09:48: AM Kindly Sign up for a personalised experience - Ask Study Doubts - Sample Papers - Past Year Papers - Textbook Solutions Verify mobile number Enter the OTP sent to your number
<urn:uuid:d9f0e731-5fe1-4192-a2a1-14fb8fda7ed0>
CC-MAIN-2021-25
https://www.topperlearning.com/answer/radio-broadcast/w514rzww
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621273.31/warc/CC-MAIN-20210615114909-20210615144909-00523.warc.gz
en
0.912333
131
3.046875
3
Some seizure sufferers who haven’t found relief from their anti-seizure medications or other therapies may benefit from innovative devices that electrically stimulate the brain. NeuroPace’s RNS System, approved by the Food and Drug Administration (FDA) in 2013 for ages 18 and older, works for the brain like a pacemaker works for the heart. An implanted stimulator connects directly with the brain to monitor and respond to abnormal brain activity, delivering pulses of electrical stimulation to help brainwaves return to normal. Neurologist Marvin A. Rossi, MD, PhD, of Rush University Medical Center, says more than half of his patients with the RNS System have seen a reduction in seizure frequency by at least 50 percent. What’s exciting about this technology isn’t just what it can do for patients and their quality of life, but what it means for the future, Rossi says. “It offers a platform to build future technologies and advancements in direct brain modulation therapy.” One such technology, Medtronic’s Deep Brain Stimulation (DBS) therapy, gained FDA approval in April 2018 for reducing the frequency of partial-onset seizures in those who haven’t responded to epilepsy medications. In DBS therapy, a neurostimulator device is programmed to deliver electrical pulses to the brain to stop or lessen seizures. Direct neuromodulation of brain circuits has been found to aid other conditions as well, such as movement disorders like Parkinson’s disease. DBS research is ongoing for medically resistant major depression and other neurological conditions, including some forms of post-traumatic stress disorder.
<urn:uuid:d434df5f-5f7a-4ef1-a896-55e759a3874c>
CC-MAIN-2021-17
https://chicagohealthonline.com/electrical-stimulation-for-epilepsy/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038492417.61/warc/CC-MAIN-20210418133614-20210418163614-00134.warc.gz
en
0.911538
340
3.09375
3
What drove Ravana, a good king, and Duryodhana, who could match Bhima on strength and valour to ruin? Arrogance, points out Arundhuti Dasgupta. Illustration: Uttam Ghosh/Rediff.com Speaking truth to power has always been perilous. Never more so now than before it would seem, given the death of a journalist who took political leaders to task, the ordeal of two women to put a rapist spiritual leader behind bars and the daily ignominies being heaped upon people who dare to choose a narrative that deviates from those who wield power. That power breeds arrogance is a universal given. Ravana, a good king and a devout Shiva bhakt, was undone by his arrogance. As was Duryodhana who could match his cousin Bhima on strength and valour and almost every other human trait. But arrogance got the better of him, driving him to ruin. Power also breeds intolerance; it fosters disdain for all who have an opposing view or interfere with the ways of the powerful. Numerous examples are found in ancient texts about angry sages and wilful gods who burnt rivals to cinders for minor transgressions. But as is the case with all such narratives, the stories convey the point of view of one set of narrators. However, folk traditions in all ancient cultures offered an alternative telling of the stories where the good deeds of Ravana or the compassion of Duryodhana were often subjects of admiration. This was an indicator of the popularity of the stories and the characters; and the resilience of the prevalent cultural framework that did not fear the other side enough to stamp out all dissenting voices. Storytellers, writers and poets have taken great liberties with the popular narratives of the epics in the past. While Ram the hero turns into an avatar of Vishnu and a god in the larger national narrative; there are plenty of stories and songs (usually sung by women) about Ram as a cruel husband, a boastful king and an uncaring brother. The existence of many versions or tellings of these stories served as useful counter-points to more popular narration of events and they also managed to create a way of life that was comfortable with diverse opinions. The coexistence may not always have been harmonious, but it was not a case of 'My way or the guillotine'. Interestingly, even the mainstream narratives were not blind to the inherent flaws in powerful heroic characters. Some narratives gave heroes a back story and thereby justified their actions while others served up their life stories as warnings to future heroes. Unfortunately, neither has knowing the past, nor having lived with many versions of the past, worked as an antidote against future tyrants. Especially powerful males, be they kings, priests or leaders in any field. For example, there is a part historical, part mythical narrative popular in parts of Bengal about an astrologer of some renown called Varahamihira. He was regarded as the final word on astrological predictions and counted many kings from many distant regions among his patrons. As he grew powerful, he grew arrogant and intolerant, but it so happened that he met his comeuppance in his daughter-in-law. Her name was Khana and she turned out to be an even greater astrologer than him and soon people began seeking her out, instead of him. Unable to bear this, he went up to his son and asked him to rein in his wife. The punishment to be meted out for her arrogance at assuming a greater role than her father-in-law was that her tongue be cut. And so Khana spent her life with a half stutter that was understood only by her husband. He went on to propagate her teachings that are popular among people in the region even today as Khanar vachan. In ancient Greece, the poet Sappho was known for her erotic poetry. She wrote odes to many pagan goddesses, but the Church saw this as homo eroticism and burned her books many years after her death. Sappho is perhaps one of the early victims of religious hegemony. Power or the version that we live with today seems to hate dissent. The powerful see any questioning or their authority as a sign of revolt. Irony is that those in positions of power who unfailingly invoke the country's great past on every occasion tend to ignore the other great traditions of the region. To quote the prime minister who recently held forth on the Indian tradition of samvad: 'Dialogue is the only way to cut through deep rooted religious stereotypes and prejudices,' he said in a video message in August 2017. Unfortunately, the truth lies in the practice, not the preaching.
<urn:uuid:aeea295b-e7e1-42bb-a1b2-a0cc3a70d649>
CC-MAIN-2018-51
https://www.rediff.com/news/column/what-ravana-duryodhana-can-teach-indias-leaders/20170923.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826856.55/warc/CC-MAIN-20181215105142-20181215131142-00575.warc.gz
en
0.977006
993
2.53125
3
Chemotherapy delivered through the nipple Tests in both rats and patients have shown that chemotherapy delivered through the milk ducts of the nipple is more effective and leads to fewer side-effects than intravenous drug delivery. The technique can now be tested further in humans by increasing the dosage. Traditionally chemotherapy is delivered intravenously into the bloodstream. This means that the medicine circulates around the whole body; requiring high doses and causing side-effects. Breast cancers often originate in the lining of the milk ducts. In theory, chemotherapy applied locally to the nipple in the early stages of the disease would require lower doses and should affect the rest of the body less. To test this theory four standard anticancer drugs, 5-fluorouracil (5FU), carboplatin, methotrexate and paclitaxel were injected directly into the ducts of rats bred to develop breast cancer. Of these drugs, 5FU prevented the most cancers compared to no drug or to intravenous delivery. It also shrank established breast tumours with striking effectiveness, completely eliminating them in 10 of 14 treated rats. The technique was also trialled in 12 patients to confirm safety. Very low doses were delivered into milk ducts using a small catheter. This resulted in much higher concentrations of the medicine in the breast tissue compared to patients receiving the treatment by intravenous injection. The technique only caused mild nipple pain and breast fullness, which are both experienced as a result of normal chemotherapy for breast cancer as well. With positive results in both animal and human trials doctors will now increase the dosage and begin to test the effectiveness of the new method in more breast cancer patients.
<urn:uuid:5fa4100f-0ba2-43a0-aa4d-590f7d754b49>
CC-MAIN-2020-24
https://www.understandinganimalresearch.org.uk/news/research-medical-benefits/chemotherapy-delivered-through-the-nipple/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347404857.23/warc/CC-MAIN-20200529121120-20200529151120-00452.warc.gz
en
0.953366
339
3.15625
3
According to the Worldbank, Kuwait’s GDP was $176.5 billion in 2011. In 2011, Kuwait’s economy ranked 51st in the world in nominal GDP. Kuwait remains dependent on petroleum revenues: oil accounts for almost half of its GDP and 95 percent of government income. Because of the almost complete dependence of Kuwait’s economy on petroleum products, it fluctuates strongly with the highs and lows of the volatile global oil market. According to the World Bank data, the Kuwaiti gross domestic product (GDP) had reached in the year 2015 to 114.04 billion US dollars, in comparison with 162.6 billion dollars in the years 2014 and 2013 respectively. The International Monetary Fund points that the GDP per capita in the year 2015 had reached 27756 US dollars. It is predicted that the Kuwaiti GDP will witnesses a growth by a rate of 2.6% during the year 2017, in comparison with 2.5% and 1.1% in the years 2016 and 2017 respectively. The inflation rate in 2017 had reached 3.8%, in comparison with 3.4% and 3.2% in the years 2016 and 2017. The World Bank sees that it is a must to support the Kuwaiti economic activity through increasing oil production, and providing an investment plan between the years 2015 and 2019 and main partnership projects between the public and private sectors, which due to it will lead to support growth in the non-oil sector(s). Kuwait had occupied the 38th rank on the Global Competitiveness Report for the period stretching between 2016-2017. The present ruler Sheikh Sabah al-Ahmad al-Sabah and his nephew, former Prime Minister Nasser al-Mohammed al-Ahmed al-Sabeh, have been introducing economic-reform bills since coming to power in 2006, but most initiatives of the executive branch have been thwarted by the legislature, leading to repeated dissolution of Parliament by the Emir. The parliamentarians’ refusal to approve most of the economic-reform bills is, in part, politically motivated. The opposition wants political reform to precede economic liberalization. Most importantly, opposition members demand the right to influence the formation of a new government, which is now handpicked by the Emir. The opposition portrays the present government as corrupt and incompetent, but the opposition’s position is also influenced by its conviction that the government’s reform package will only benefit the current business and political elite, not the population as a whole. The government, for its part, accuses the opposition of populism and irresponsibility, and many suspect that the Emir is seriously considering suspending Parliament once more, this time indefinitely. The economic history of Kuwait can be divided into four eras with distinct economic features. The first is the pre-modern period (until about 1850), when there were no nation states in the Gulf, and the commerce of the British Empire did not yet dominate the region. Because there was no modern bureaucratic state in Kuwait or in any of the other Gulf sheikhdoms, Arab traders in the Gulf moved relatively freely around the region. Together, the great Arab and Persian trading families of the Gulf dominated a regional economy based on pearling, fishing, and transit trade between south-western and South Asia, and to a lesser extent with eastern Africa. In the second era, lasting roughly until the 1950s, the regional economy was dominated by the British Empire. Local merchants could thrive only by participating in the British imperial – more specifically, the British-Indian – economic and political sphere. Some local traders therefore acted as official or unofficial representatives of the British(-Indian) Crown in the Gulf sheikhdoms, as did the Persian merchant Hajji Alireza in Kuwait town, from 1899 until 1904. The third era, which may now be nearing its end, is characterized by the steadily shrinking influence of Great Britain and the rise of American influence; the rise and subsequent hegemony of highly centralized, bureaucratic nation-states; the rise of monolithic, statist economies based on petroleum revenues; and growing economic ties with post-colonial states in South and East Asia. Kuwait has been a regional forerunner in most of these respects. In 1961 it was the first of the Arab sheikhdoms to gain independence. Kuwait and Bahrain were the first of the present Gulf Cooperation Council (GCC) states to construct a modern, centralized welfare state, with state-of-the-art infrastructure, education, and health-care systems, all financed with oil revenues. It was also the first in the region to base its economy almost exclusively on oil, or oil-related income, a development that is seen increasingly as a curse rather than a blessing: the law of the handicap of a head start – which holds that forerunners often have the most trouble adapting to new circumstances – certainly applies to Kuwait. Entering the fourth economic era, characterized by economic liberalization and diversification, Kuwait is lagging behind its neighbours. As this fourth era has not yet been fully entered by any of the Arab Gulf states, it is better to speak of an intended rather than an actual policy. Most Gulf States have, however, made significant strides in the last decade in at least attempting to open their economies to private investors and entrepreneurs. A report by the World Bank, Doing Business in the Arab World, published in November 2009, emphasizes this trend, but the report also makes clear that Kuwait’s economy is one of the most statist, and therefore most static and impenetrable, in the region. In the World Bank ranking of the most business-friendly countries in the world, Kuwait is listed 67th, behind Dominica and Azerbaijan; all GCC countries, except for Oman, rank higher, with Saudi Arabia (12th) and the UAE (33th) leading the group. In the ease of starting a business, Kuwait ranks a dismal 137th. On average, it takes 35 days to finish all the procedures needed to establish a business in Kuwait (compared with 19 days in none too business-friendly Mauritania and only five days in Saudi Arabia). The former trading centre Kuwait, with its rich merchant tradition, now ranks 109th in the world in ease of cross-border trade. The total length of Kuwait’s road network has been estimated at almost 6,000 kilometres in 2006. That year, 975,000 private automobiles were registered, an increase of almost 30 percent in just four years. The 3,000 buses of the state-owned Kuwait Public Transport Company (KPTC) provide domestic services as well as regular services to Mecca, in Saudi Arabia. In addition, 18,000 private buses, 184,000 trucks, and 9,200 taxis facilitate the mobility of the nation’s inhabitants. In 2007, almost 7 million passengers used Kuwait International Airport, up from 4.3 million in 2003. The national airport is currently being expanded and modernized. It is designed to accommodate 20 million passengers per year in the near future and 50 million passengers at a later stage. Kuwait’s largest commercial seaport is Port al-Shuwaikh, west of Kuwait City. The second largest commercial port is located near the Shuaiba Industrial Area, 56 kilometres south of Kuwait City. Here, the Gulf is much deeper, allowing larger vessels to moor. It is for just this reason that the oil terminals of Mina al-Ahmadi and Mina Abdullah are also located along this short stretch of coast. The Kuwait Ports Authority is directed by a member of the ruling Al Sabah, a sure indication of the prime importance of these ports in the country’s economy. Nevertheless, plans for their privatization are being discussed. For an in-depth overview of Kuwait’s energy sector click on the button below. Banking and finance The finance, real estate, and business services sector is the second contributor to the nations’ GDP, after oil (17 percent in 2007). The global financial crisis hit Kuwait late but hard. Local money supply and credit conditions deteriorated rapidly in the final months of 2008, and the money market remained tight through 2009. The Kuwait Stock Exchange (KSE) plummeted 45 percent in autumn 2008. Local investment companies recorded a combined loss of more than USD 32 billion, and two of them collapsed. The Kuwaiti government reacted with an emergency financial-stability law, which provided a safety net for struggling banks, in return for stricter risk-management regulation. All local bank deposits were guaranteed by the state, and a USD 5.4 billion emergency investment fund was established to shore up the ailing stock market. Some local investment firms have been partly bailed out by the government. The KSE rebounded partially in the second quarter of 2008, with a 182 percent increase in traded shares. The local real-estate market, which was especially hard-hit by the sudden financial contraction, also appeared to recover. Consumer debt stood at an estimated USD 25 billion in late 2009. Kuwaiti citizens expect the government to bail them out of financial difficulties, as it has often done in the past. The state appears to be able to afford this in the short term. Due to lower spending and recovering oil prices, the state continued to run a billion-dollar budget surplus in 2012, but the nation’s long-term investment portfolios have suffered. This is partly because the state drew from these funds to finance its economic stimulus and safety packages, such as the stock-market investment fund, and partly because of losses in overseas investments, particularly in American banks. The Kuwait Investment Authority, which manages the emirate’s sovereign-wealth funds, is said to have lost USD 31 billion in the second half of 2008. This amounts to roughly 15 percent of its estimated total investments portfolio. The state has also dug deep into its foreign-exchange reserves, which were estimated at USD 17 billion in 2008. Almost continually rising oil prices from 2004 until 2012 (with a dip in 2008) led to consecutive record surpluses in Kuwait’s foreign trade balance. Kuwait’s export earnings totalled USD 89 billion in 2008, of which USD 85.5 billion (96 percent) came from hydrocarbon products. The effects of this huge influx of oil money have not been entirely beneficial to the country. Local wholesale and consumer prices have skyrocketed, with inflation peaking at 11.6 percent in August 2008. Japan was Kuwait’s main export destination in 2007, providing 14 percent of total export revenues. South Korea, Singapore, and the United States had shares of 12.2, 7.3, and 6.2 percent, respectively. After hydrocarbons, hydrocarbon-related products, such as chemicals and plastics, were the second source of foreign revenue (2.5 percent). These commodities are sold primarily to Saudi Arabia, the UAE, Indonesia, and Pakistan. Import expenditures reached USD 25 billion in 2008, up from USD 20.6 billion in 2007 and USD 14.3 billion in 2006. The most important imports are transport equipment, machinery, and unprocessed metals, which collectively typically make up about 60 percent of total import value. Food and live animals accounted for roughly 10 percent of import value in the period until 2006, followed by chemicals at roughly 8 percent. In 2007, the US was Kuwait’s main source of imports (14.1 percent), followed by Japan (9.2 percent), Germany (8.1 percent), and China, Kuwait’s fastest growing trade partner (7.7 percent). In the coming years, Iran is expected to become a main import partner of Kuwait, as a source for LNG and fresh water, both of which are strategically very important. This will certainly trouble both the United States and the political leadership of Saudi Arabia. The latter is presently Kuwait’s main trading partner in the Gulf (6.3 percent of total import expenses in 2007). Agriculture and Fishing In 2007, agriculture and fishing contributed just 0.2 percent to Kuwait’s GDP. Most of the country’s food, even most of its fish, has to be imported (at a cost of about USD 1.8 billion in 2005). The country has a total area of irrigated agricultural land of 7,000 hectares (0.4 percent of the total land area). The primary crops are tomatoes, potatoes, cucumbers, gherkins, and aubergines. Kuwait’s principal livestock is not camels (just 5,000) but chickens (more than 32 million). Sheep (about 900,000) form the second type of livestock. Annually, this results in some 46,000 metric tons of locally produced chicken meat, 22,000 tons of eggs, and 30,000 tons of mutton and lamb. Kuwait’s 28,000 cows produce 40,000 metric tonnes of milk per year. The agriculture and fishing sectors employed 34,800 workers in 2006 (1.7 percent of the total labour force). Only 200 of them were citizens. In 2007, in addition to importing more than USD 200 million worth of chicken meat and more than USD 100 million worth of prepared foodstuffs, Kuwait had to import large quantities of food staples, such as rice (USD 168 million) and barley and wheat (each costing more than USD 48 million). The country’s continually increasing dependence on food imports has led the government to acquire large tracts of farmland in Cambodia and Sudan. Given Kuwait’s own long historical struggle to nationalize its natural resources, the fact that it is now engaging in the controversial practice of buying or leasing farmland in underdeveloped countries (the so-called ‘farms race’) is striking. Like all smaller Gulf Cooperation Council states, Kuwait considers the development of a local tourist industry an important part of its economic diversification package. Most investment money has gone into increasing hotel capacity. The number of guests visiting Kuwait has increased spectacularly, from 90,000 (280,000 nights) in 2004 to 292,000 (408,000 nights) in 2007. In 2004, most foreign visitors came from Saudi Arabia (896,000, or 30 percent). Since their number greatly outweighed the number of hotel guests, these were almost exclusively day-trippers. They certainly did not come to admire the country’s museums; the number of museum visitors in Kuwait decreased from 64,000 in 2004 to 33,000 in 2006. The hotel and restaurant sector contributed only 0.6 percent to GDP in 2007. Because of Kuwait’s ban on alcohol consumption, the country is less competitive than the UAE in the market for European tourists. According to the CIA World Factbook, Kuwait’s labour force totalled 2.24 million in 2011. The Public Authority for Civil Information (PACI) estimated that Kuwait’s labour force totalled 2.09 million in December 2007 (61 percent of the total population). Only 15 percent of the labour force consisted of nationals (324,300), down from 17.4 percent (341,200) in 2006. 75.4 percent of the foreign population were registered as economically active, compared with just 30.8 percent of the national population. The latter low figure is not the result of the absence of local women in the labour market – the share of females in the local labour force grew from 41.7 percent in December 2006 to 43.7 percent at the end of 2007. The foreign labour force is overwhelmingly male (about 80 percent). The large majority of nationals work in public administration (78.8 percent). At the end of 2007 just 2 percent were employed in the private sector, which was still a marked increase of 15.7 percent over December 2006. As of December 2008, 16,641 citizens (4.9 percent of the national workforce) were registered as unemployed. In principle, both citizen and non-citizen workers can establish and join labour unions in Kuwait, although the latter can do so only after five years of residence and only as non-voting members. There are many restrictions: strikes are allowed only after government approval and compulsory external arbitration of the dispute; union financing depends on state subsidies, and no more than one union may be established in any occupational trade. Only 3 percent of the Kuwaiti workforce is unionized. Kuwait pioneered foreign aid in the Arab world with its establishment of the Kuwait Fund for Arab Economic Development (KFAED) in 1962. This initiative was motivated partly by Iraqi threats to invade the newly independent country. Kuwait’s foreign aid reached its highest level during the second half of the 1970s, then ranging between 8 percent and 15 percent of its gross national income. Since 1981 the fund has been self-financing; repayments are used to provide new loans and grants to developing countries in both Asia and Africa. Up to 2003, it had made loans to 99 countries, for a total of KD 3345 billion (about USD 11 billion at current exchange rates) and supplied KD 335 million (USD 1.2 billion) in grants and technical assistance to 163 countries.
<urn:uuid:909b1245-f7f6-4841-8b79-60ee02982065>
CC-MAIN-2018-09
https://fanack.com/kuwait/economy/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816351.97/warc/CC-MAIN-20180225090753-20180225110753-00011.warc.gz
en
0.955699
3,489
2.515625
3
Botanical Name : Raphanus sativus Family: Brassicaceae– Mustard family Genus: Raphanus L.– radish Species: Raphanus sativus L.– cultivated radish Subkingdom: Tracheobionta– Vascular plants Superdivision: Spermatophyta– Seed plants Division: Magnoliophyta– Flowering plants Class: Magnoliopsida– Dicotyledons Synonyms: Raphanus raphanistrum sativus – (L.) G. Beck. Common Name :Radish Habitat :The origin of Raphanus sativus is not found, it is a plant of cultivation. It probably arose through cultivation. Raphanus sativus is an annual herb growing to 0.45m by 0.2m at a fast rate. It is hardy to zone 0 and is not frost tender. It is in flower from June to August, and the seeds ripen from July to September. The flowers are hermaphrodite (have both male and female organs) and are pollinated by Bees, flies. The plant prefers light (sandy), medium (loamy) and heavy (clay) soils. The plant prefers neutral and basic (alkaline) soils. It can grow in semi-shade (light woodland) or no shade. It requires moist soil. Very easily cultivated fast-growing plants which prefer a rich light soil with ample moisture. They dislike very heavy or acid soils. Plants are susceptible to drought and require irrigation during dry spells in the summer or the root quality will rapidly deteriorate and the plant will go to seed. Radishes are widely cultivated for their edible roots. There are many named variet that are able to supply edible roots all year round. Over the centuries a number of distinct groups have evolved through cultivation, these have been classified by the botanists as follows. A separate entry has been made for each group:- R. sativus. The common radish. Fast maturing plants with small roots that can be round or cylindrical and usually have red skins. They are grown primarily for their roots which in some varieties can be ready within three weeks from sowing the seed and are used mainly in salads. These are mainly grown for spring, summer and autumn use and can produce a crop within a few weeks of sowing. R. sativus caudatus. The rat-tailed radishes. This group does not produce roots of good quality, it is cultivated mainly for the edible young seedpods which are harvested in the summer. R. sativus niger. The Oriental and Spanish radishes. These are grown for their larger edible root which can be round or cylindrical and can be available throughout the winter. R. sativus oleiformis. The fodder radishes. These are grown mainly for their leaves and oil-rich seeds, they are used as a green manure or stock feed though they can also be eaten by people. The roots of these plants soon become fibrous, though they make acceptable eating when young. Radishes are a good companion plant for lettuces, nasturtiums, peas and chervil, tomatoes and cucumbers. They are said to repel cucumber beetles if planted near cucumber plants and they also repel the vine borers which attack squashes, marrows and courgettes. They grow badly with hyssop and with grape vines. Seed – sow outdoors in situ in succession from late winter to the middle of summer. Germination takes place within a few days of sowing the seed. If you want a constant supply of the roots then you need to sow seed every 2 – 3 weeks Edible Parts: Flowers; Leaves; Root; Seed; Seedpod. Edible Uses: Oil. Young leaves – raw or cooked. A somewhat hot taste, and the texture is somewhat coarse. As long as they are young, they make an acceptable addition in small quantities to chopped salads and are a reasonable cooked green[K]. A nutritional analysis is available. Young flower clusters – raw or cooked. A spicy flavour with a crisp pleasant texture, they make a nice addition to salads or can be used as a broccoli substitute. Seeds – raw. The seed can be soaked for 12 hours in warm water and then allowed to sprout for about 6 days. They have a hot spicy flavour and go well in salads. Young seedpods – raw. Crisp and juicy with a mildly hot flavour. They must be eaten when young because they quickly become tough and fibrous. Root – raw or cooked. Crisp and juicy, they have a hot and spicy flavour and are a very popular addition to salads. The summer crops do not store well and should be used as soon as possible after harvesting. The winter varieties (including the Japanese forms) have much larger roots and often a milder flavour. These store well and can be either harvested in early winter for storage or be harvested as required through the winter. An edible oil is obtained from the seed. Figures in grams (g) or miligrams (mg) per 100g of food. Leaves (Dry weight) : 287 Calories per 100g *Protein: 28.7g; Fat: 5.2g; Carbohydrate: 49.6g; Fibre: 9.6g; Ash: 16.5g; *Minerals – Calcium: 1913mg; Phosphorus: 261mg; Iron: 35.7mg; Magnesium: 0mg; Sodium: 956mg; Potassium: 4348mg; Zinc: 0mg; *Vitamins – A: 21mg; Thiamine (B1): 0.7mg; Riboflavin (B2): 2.43mg; Niacin: 34.8mg; B6: 0mg; C: 704mg; Notes: Vitamin A is mg not IU Anthelmintic; Antibacterial; Antifungal; Antiscorbutic; Antispasmodic; Astringent; Cancer; Carminative; Cholagogue; Digestive; Diuretic; Expectorant; Laxative; Poultice; Stomachic. Radishes have long been grown as a food crop, but they also have various medicinal actions. The roots stimulate the appetite and digestion, having a tonic and laxative effect upon the intestines and indirectly stimulating the flow of bile. Consuming radish generally results in improved digestion, but some people are sensitive to its acridity and robust action. The plant is used in the treatment of intestinal parasites, though the part of the plant used is not specified. The leaves, seeds and old roots are used in the treatment of asthma and other chest complaints. The juice of the fresh leaves is diuretic and laxative. The seed is carminative, diuretic, expectorant, laxative and stomachic. It is taken internally in the treatment of indigestion, abdominal bloating, wind, acid regurgitation, diarrhoea and bronchitis. The root is antiscorbutic, antispasmodic, astringent, cholagogue, digestive and diuretic. It is crushed and used as a poultice for burns, bruises and smelly feet. Radishes are also an excellent food remedy for stone, gravel and scorbutic conditions. The root is best harvested before the plant flowers. Its use is not recommended if the stomach or intestines are inflamed. The plant contains raphanin, which is antibacterial and antifungal. It inhibits the growth of Staphylococcus aureus, E. coli, streptococci, Pneumococci etc. The plant also shows anti-tumour activity. Radish root stimulates the appetite and digestion. The common red radish is eaten as a salad vegetable and an appetizer. The juice of the black radish is drunk to counter gassy indigestion and constipation. Radish juice has a tonic and laxative action on the intestines and indirectly stimulates the flow of bile. Consuming radish generally results in improved digestion, but some people are sensitive to its acridity and robust action. It is crushed and used as a poultice for burns, bruises and smelly feet. The leaves, seeds and old roots are used in the treatment of asthma and other chest complaints. The juice of the fresh leaves is diuretic and laxative. In China, radish is eaten to relive abdominal distension. The root is also prepared “dry-fried” to treat chest problems. The seed is used to treat abdominal fullness, sour eructations, diarrhea caused by food congestion, phlegm with productive cough and wheezing. Because of its neutral energy, it is very effective in breaking up congestion in patients with extreme heat. Radishes are also an excellent food remedy for stone, gravel and scorbutic conditions. The plant contains raphanin, which is antibacterial and antifungal. It inhibits the growth of Staphylococcuc aureus, E. coli, streptococci, pneumococci etc. The plant also shows anti-tumor activity. Green manure; Oil; Repellent. The growing plant repels beetles from tomatoes and cucumbers. It is also useful for repelling various other insect pests such as carrot root fly. There is a fodder variety that grows more vigorously and is used as a green manure. Known Hazards: The Japanese radishes have higher concentrations of glucosinolate, a substance that acts against the thyroid gland. It is probably best to remove the skin. Disclaimer : The information presented herein is intended for educational purposes only. Individual results may vary, and before using any supplement, it is always advisable to consult with your own health care provider
<urn:uuid:cbd29866-7378-4be9-b0d1-32e8d92615bc>
CC-MAIN-2015-32
http://findmeacure.com/2012/11/02/raphanus-sativus/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988922.24/warc/CC-MAIN-20150728002308-00341-ip-10-236-191-2.ec2.internal.warc.gz
en
0.923289
2,071
3.1875
3
College students rank sleep problems second only to stress in factors that negatively impact academic performance.* Because sleep is so important to college students' physical and emotional well-being, the Wellness Center has launched a "Sleep Well Campaign" to introduce and reinforce positive sleep habit. The campaign includes: - Sleep "Fun Facts" posted on electronic boards, such as "Sleeping directly after learning something new will improve your ability to remember it effectively.*"(American College Health Association) - Sleep consultations, one or two sessions with a counselor to assess what may be getting in the way of good sleep and creating a doable improvement plan. - Talks by local sleep researchers on sleep and academic performance, effects of alcohol on sleep, pros and cons of naps, and sleep and mood and physical health issues. - Availability of sleep logs at the Wellness Center and information on sleep log apps. - Tip sheets on researched sleep well practices also known as "sleep hygiene." - A DVD/MP3link of relaxation activities including a sleep induction exercise. Listen to one of our counselors talking you through a relaxation activity: 1. Intro (mp3 7mb) Introduction to Stress management: breath, meditation and relaxation highlighted in this series of tools for healing and better health--led by a Counselor of the H-SC Wellness Center with the intention of having these readily available for home practice when and as needed. 2. 54321 mindfulness meditation (mp3 14mb) : a 15 minute sequence for beginners and beyond to practice coming into the present for balance, focus and peace of mind. 3. Muscle relaxation (mp3 14mb): Progressive Muscle relaxation is a 15 minute core reprogramming plan that is expecially helpful to reduce anxiety, tension, and insomnia. 4. Quick style relaxation (mp3 4mb): a 5 minute shorthand version of the longer progressive muscle relaxation to fit easily into busy days. 5. Breathing basics (mp3 12mb): teaches essential skills of consciously breathing including diaphragmatic, full 3 part, LSD breathing-all at the foundation of a lifelong strategy for wellness. For More Information: Tips for sleeping well at H-SC* - Stick to the same bedtime and wake up time, even on weekends. This helps to regulate your body's clock. It can be tempting in college to sleep way in on weekends to make up for lack of sleep during the week but this actually disrupts your sleep in the long run. Try to maintain your wake and bed times within 2 hours all week. - Develop a relaxing bedtime routine. Engaging in calm activities like reading a book or magazine, listening to music or sipping hot chocolate can help you wind down and creates a buffer zone from the more active parts of your day. Doing the same things regularly before bed cues your brain that sleep is near. - Avoid napping, especially in the afternoon. A power nap of 15-20 minutes may help you get through the day, but keep naps short and before 2 pm. Sleeping in late afternoon or evening is very likely to keep you up later. - Exercise daily. Exercise is a great way to help your sleep and overall mood. Avoid exercising two hours before bedtime. - Create a sleep-friendly environment. Keep your sleep area cool, dark and quiet. If you and a roommate have different sleep schedules, consider eye shades, ear plugs and white noise machines. - Use bright light by day to help manage your circadian rhythms. Expose yourself to sunlight in the morning and avoid bright light at night. Avoid using computers and other electronics in the hour or two prior to sleep as the light emitted inhibits the production of melatonin, a brain chemical important for sleep. - Avoid eating big meals several hours before bedtime. Eating big or spicy meals can cause discomfort from indigestion that can make it hard to sleep. Avoid big meals at least 2-3 hours before bedtime. A light snack like cereal with milk before bed is ok. - Avoid alcohol, caffeine and nicotine close to bedtime. Although alcohol is sometimes thought of as a sleep aid, it actually decreases sleep quality by increasing night time awakenings, which leads to lighter and less restful sleep. Caffeine and nicotine are stimulants, Try not to use caffeine after mid afternoon and nicotine within two hours of bedtime. - If you can't sleep, get out of bed and do something relaxing until you feel tired. If you lie in bed when you're not sleepy, you may associate your bed with feeling frustrated about not being able to fall asleep. If you are still awake after 15 minutes, get up and go into another room or, if in a dorm, go to a chair and do something that is relaxing in low light. Return to bed only after you feel sleepy. - Reserve your bed for sleep. This can be tricky for college students with minimal furniture. Do your best to move your school work, computer and phone off your bed, out of the sleeping environment. Use your bed only for sleep to strengthen the association between bed and sleep. *From the National Sleep Foundation adapted for college students. Sleep Fun Facts: - "Healthy sleep" means getting enough sleep so you wake up naturally. - People exposed to light at night had shallower sleep and were more likely to experience mini-arousals during the night. If you read a tablet....switch to a black background with white font. Dim...to half brightness or less and hold it 14 inches away from your eyes. - New study links higher levels of melatonin with decreased risk of prostate cancer. - Man is the only mammal that willingly delays sleep. - Sleep is when your body hair grows most rapidly. - Seventeen hours of sustained wakefulness leads to a decrease in performance equivalent to a blood alcohol level of 0.05%. - Anything less than five minutes to fall asleep at night means you're sleep deprived. The ideal is between 10-15 minutes, meaning you're still tired enough to sleep deeply, but not so exhausted you feel sleepy by day. - Sleep, in a single behavior, is the most important thing that we do. - 50% of our dreams are in color, 50% are black and white. - Sleeping directly after learning something new will improve your ability to remember effectively. **Contact the Wellness Center if you would like references for these facts
<urn:uuid:a360a840-55b8-4d4c-b900-eb2c0018165e>
CC-MAIN-2015-11
http://www.hsc.edu/Student-Life/Wellness-Center/Student-Health-Services/Sleeping-Well.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463420.52/warc/CC-MAIN-20150226074103-00077-ip-10-28-5-156.ec2.internal.warc.gz
en
0.928183
1,332
2.515625
3
The world is on edge: On the edge of another financial crisis, another global recession, another bout of extreme weather, another humanitarian disaster, another food crisis, and another round of violence and civil unrest. The world's problems, it seems, are not being solved; they are being recycled with rising -- and disturbing -- rapidity. If this were a movie, we might borrow a title from yesteryear and call it "The Year of Living Dangerously." But, unfortunately, this is not a movie; and the challenges that we face will not be resolved anytime soon. Our troubles are not cyclical, they are structural. We live in a world that is fundamentally out of balance, and rectifying those imbalances will take years, if not decades, to correct. Welcome to "The Era of Living Dangerously." This new era, and it is a perilous one, is not the result of excessive debt accumulation. Unsustainable debt loads have contributed to our current economic woes, but the economic malaise that now grips the world is indicative of a larger, more systemic problem: an over-heated, over-crowded, over-leveraged planet. The last half of the 20th century produced an unprecedented rise in global standards of living. While increased efficiencies contributed to this burst of prosperity, much of it was fueled by increased consumption of fossil fuels, water, timber, metals, and minerals. And it came with escalating environment costs: the degradation of oceans, forests, rivers, and soil, and the warming of the planet. For decades now, scientists have been warning that we live on a finite planet with finite resources, but until very recently those concerns have been widely dismissed -- even derided -- as theoretical, not practical. But for those who are concerned about biophysical limits to economic growth, there are plenty of warning signs today. In the last half of the 20th century, the real inflation-adjusted prices of commodities trended downward as we got more efficient at growing food and extracting minerals and fossil fuels. But in the 21st century, the demand for commodities has far outstripped supply. And it's not just oil. Almost without exception, the prices of major commodities, including grains and basic food stuffs, have doubled or tripled in the past seven or eight years. Some of that increase reflects the growing demand for commodities, much of it emanating from China and the other emerging economies, but production costs are also rising. In an increasingly resource-starved world, companies and countries will go anywhere to extract oil and minerals. In the immortal words of Marvin Gaye, "There ain't no mountain high enough; ain't no valley low enough; ain't no river wide enough to keep me from getting to you, baby." That's why countries and companies are scrambling to establish oil and mineral rights on the Arctic seabed and in other extreme environments. Far more worrisome for the world's poor is the escalating cost of food. Climate change, rising energy and fertilizer prices, erosion of topsoil, depletion of underground aquifers, and loss of arable land to urbanization and desertification, are making it ever more expensive to satisfy the world's growing appetite for food. With the demand for grains and basic food stuffs expected to increase by 70 percent over the next 40 years, the outlook for food prices is not good. Two months ago, Oxfam International released a research report, Growing a Better Future, predicting that the price of key food staples could increase 120 to 180 percent by 2030. For commodity speculators that's an investment opportunity, but for the world's urban poor living in shantytowns on less than $1.25 a day it's a potential death sentence. With world population reaching 7 billion later this year and projected to reach 9.5 billion by mid-century, the challenges we are now confronting will not go away anytime soon. And make no mistake about it, if demographic push comes to economic shove, it's the poorest of the poor who will pay the ultimate price. To get a glimpse of what the future may hold for the world's poorest citizens, look at the human tragedy that is unfolding on the Horn of Africa, where over 13 million people are in a struggle for survival. A record or near-record drought -- that may or may not be related to climate change -- is already killing tens of thousands, most of them young children. In Ethiopia, one of the poorest countries in the world, food prices have increased by 50 percent in the past year. Even the urban middle class in Ethiopia, far removed from the drought-stricken regions, is struggling to put food on the table. Meanwhile, as the world suffers through another year of severe droughts and floods, the evidence is growing that the planet is over-heating, and that climate change is here to stay, but in the U.S. and elsewhere policy is being dictated by the climate deniers. It would be comforting to think that the growing unrest that is sweeping the world, including the rioting that has broken out in England, is the product of a temporary spike in food prices or the lingering aftereffects of the Great Recession, but it may just be a sign of things to come. If there are practical -- not just theoretical -- limits to economic growth, the competition for resources will get more intense, not less; the gap between rich and poor will widen, not close; and the ranks of the disenfranchised and the disenchanted will expand, not shrink. When the world economy was growing at 3-4 percent a year it was difficult enough in many countries to find jobs for young people; it will be a far more daunting task if biophysical limitations drag the growth rate down to 1 or 2 percent. With the world's large generation of young people about to join the labor force, the challenge is enormous and unprecedented. In the Era of Living Dangerously, there are no easy answers, but the search for solutions has to begin with a recognition of the biophysical limits that are straining -- and stressing -- our world. We saw what happens when over-leveraged economies like the U.S. and Europe failed to anticipate the threats posed by unsustainable debt loads; we don't want to see what happens if we ignore signs that we are over-leveraging the planet's resources.
<urn:uuid:51408e19-0057-407d-b926-d35da3e52913>
CC-MAIN-2015-32
http://www.huffingtonpost.com/robert-walker/the-era-of-living-dangero_1_b_923423.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981856.5/warc/CC-MAIN-20150728002301-00289-ip-10-236-191-2.ec2.internal.warc.gz
en
0.952601
1,306
2.59375
3
Deuteronomy 4:42 ” that the manslayer might flee thither, that slayeth his neighbour unawares, and hated him not in time past; and that fleeing unto one of these cities he might live:” Sotah 49a: Unawares. Rabbi Ilai the son of Berachya says: “Two scholars, who do not respect each other in halacha, one will die and one will be exiled (to a city of refuge) as the verse says ‘might flee thither, that slayeth his neighbour unawares’. Knowledge is a reference to Torah as the verse states: ‘My people are destroyed for lack of knowledge'” Torah Temimah Colloquial Translation on Note #70 The end of the verse in Hosea is “seeing thou hast forgotten the law of thy God”. This homily explains the juxtaposition of this verse to “And this is the law which Moses set before the children of Israel.” Perhaps they are exacting because the verse does not use the same language as the verse: “that killeth any person through error may flee thither” Rashi on the gemara explains that one dies at the hand of his friend who accidentally kills him. The other is exiled to a city of refuge. If there is no actual death, the is a hint of death and exile for one is fitting to die and the other is fitting to be exiled. This homily still requires a broader explanation. Were it not for his words, one could explain this as is stated in the tractate Makkoth 10a, which states that Torah learning protects from death and exile, see there. Behold this clearly refers to learning Torah for its own sake. For, in this manner, the two scholars respect each other since neither has another motive than discovering the truth. As the verse says “And Vhab and Sufah“. This is not the case when learning Torah not for its own sake. In this case, they vex one another. Learning such as this, in any case, will not protect from death and exile. The intent of this homily is to show that learning Torah, not for its own sake, does not protect from death and exile. To emphasize the point, the homily states that one dies and the other is exiled. Take note. Editor’s note: This note shows the importance of learning Torah for its own sake. Scholars who do not learn Torah for its own sake are destined to attack one another, sometimes with drastic consequences. Additionally note the Torah Temimiah’s humility, deferring to Rashi’s opinion before proposing his own. without knowledge Hosea 4:6 Deuteronomy 4:42 Deuteronomy 4:44 Numbers 35:11 Numbers 21:14
<urn:uuid:b6242a22-d65f-42da-999a-71e593d2ea11>
CC-MAIN-2018-09
http://temimahblog.com/category/%D7%A4%D7%A8%D7%A9%D7%99%D7%95%D7%AA/parshat-%D7%95%D7%90%D7%AA%D7%97%D7%A0%D7%9F/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812959.48/warc/CC-MAIN-20180220125836-20180220145836-00314.warc.gz
en
0.954211
598
2.53125
3
Geothermal energy is heat derived below the earth’s surface which can be harnessed to generate clean, renewable energy. This vital, clean energy resource supplies renewable power around the clock and emits little or no greenhouse gases -- all while requiring a small environmental footprint to develop. The Energy Department is committed to responsibly developing, demonstrating, and deploying innovative technologies to support the continued expansion of the geothermal industry across the United States. The U.S. generates more electricity through geothermal energy than any other country in the world. Learn about the breakthrough technology that...Learn More The Department of Energy and the University of North Dakota have been recognized by the Geothermal Energy Association for launching the first...Learn More
<urn:uuid:544ad327-ed84-4436-b9ac-53b1e9154204>
CC-MAIN-2019-09
https://www.energy.gov/science-innovation/energy-sources/renewable-energy/geothermal
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247500089.84/warc/CC-MAIN-20190221051342-20190221073342-00364.warc.gz
en
0.89653
143
2.96875
3
The newest iteration of the Global Burden of Disease study, which tracks the prevalence of deaths and diseases worldwide, contains some good news: On average people are living about a decade longer than they were in 1980. But there's a catch: Health hasn't improved as fast as life expectancy overall, which means that for many, those long, final years are spent hobbled by illness and disability. The nature of our old-age ailments has changed in recent years. The study, published this week in The Lancet and conducted by the Institute for Health Metrics and Evaluation at the University of Washington, uses a metric called "Disability Adjusted Life Years." DALYs, as they're abbreviated, combine the number of years of life a person loses if they die prematurely with the amount of time they spend living with a disability. Think of it as time you didn't spend living your #bestlife—because you were sick or dead. In rich countries, the number one cause of these DALYs is not surprising: ischemic heart disease, which is associated with well-known Western issues like high cholesterol and obesity. But the number two condition is a little strange: plain, old-fashioned, ever-present, low back and neck pain. Even when you include poor and middle-income countries, low back and neck pain went from ranking 12th as a cause of DALYs globally in 1990 to ranking fourth in 2015, the most recent year. In most countries, it was the leading cause of disability. DALYs from low back and neck pain increased by more than 17 percent from 2005. The things that make us low-level miserable are now more likely to be simple aches and pains, rather than frightening, communicable diseases like diarrhea. That's encouraging, but it's still a little sad. People all over the world increasingly live long, great lives, only to spend their golden years slathered in IcyHot.
<urn:uuid:f92e26e6-0a21-45e3-ae3b-60320fc70db4>
CC-MAIN-2017-26
http://psychologyofpain.blogspot.com/2016/10/lancet-global-burden-of-disease.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321426.45/warc/CC-MAIN-20170627134151-20170627154151-00127.warc.gz
en
0.967858
400
2.640625
3
Human displacement is one of the tragic – but often less visible- consequences of pervasive armed conflict. The Internal Displacement Monitoring Centre (IDMC) released its latest report, titled: Internal Displacement: Global Overview of Trends and Developments in 2010. At the UN’s request, the Norwegian Refugee Council established the IDMC in 1998. Since then, it has become the leading monitor of internal displacement around the world. Here are just a few highlight from the 2010 Report: - The number of IDPs globally rose from the end of 2009 to reach 27.5 million. - Perhaps not surprisingly, Africa – as a region – has the highest number of internally displaced persons (IDPs) in the world. There are more than 11 million IDPs on the continent and highly concentrated in Sudan, accounting for about 40% of the world total. - New displacements in Yemen boosted the figures for the Middle East region, which reached 3.9 million at the end of 2010. - By individual country, Colombia, Sudan, Iraq, Democratic Republic of the Congo (DRC), and Somalia each reported more than a million IDPs. Although humanitarian and development agencies tend to focus on rural IDPs in rural areas, in most countries, significant numbers are also living in urban areas - People from a minority group were at greater risk displacement and had less access to formal and informal support and security/protection. - Attacks or threats against humanitarian workers continued in many situations including Darfur in Sudan, Afghanistan, Yemen, Somalia and Colombia. You can read the full report HERE.
<urn:uuid:c7774361-6e48-41a1-b748-80a8957afc30>
CC-MAIN-2018-09
http://globalcrim.blogspot.com/2011/03/internally-displaced-persons-in-2010.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816094.78/warc/CC-MAIN-20180225031153-20180225051153-00316.warc.gz
en
0.941501
323
3.15625
3
By AMERICAN HEART ASSOCIATION NEWS People who have high cholesterol due to an inherited genetic disorder are much more likely than those with average cholesterol levels to have diseases caused by hardening of the arteries, according to new research in the American Heart Association journal Circulation. Heterozygous familial hypercholesterolemia is due to a genetic mutation that prevents the liver from removing excess low-density lipoprotein, known as “bad” LDL cholesterol, from the blood. The disorder is suspected when a person has an LDL level greater or equal to 190 mg/dL and is in a family with a history of premature cardiovascular events. Researchers estimate that the disorder affects about 1.5 million Americans. Using pooled data from six groups of people in epidemiological studies, researchers found that patients with the familial hypercholesterolemia phenotype: - Had five times higher risk for coronary heart disease over a period up to 30 years, compared to those with average levels (less than 130 mg/dL) of LDL cholesterol, and - Were more likely to have diseases caused by hardening of the arteries (atherosclerotic cardiovascular disease), including an accelerated onset of coronary heart disease by up to 20 years earlier in men and 30 years earlier in women. These increased risks were independent of other risk factors. Researchers say that their findings may help clinicians communicate more clearly to patients the risks of familial hypercholesterolemia, which can be treated with cholesterol-lowering drugs to decrease the risks for heart disease and stroke.
<urn:uuid:16febd79-62d6-4a1c-8ee1-cca1fa2bcafb>
CC-MAIN-2019-18
https://newsarchive.heart.org/inherited-high-cholesterol-increases-long-term-risks-of-heart-disease/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578636101.74/warc/CC-MAIN-20190424074540-20190424100540-00054.warc.gz
en
0.939627
314
3.265625
3
National Cancer Institute Posted Date: Feb 20, 2007 Doctors cannot always explain why one person gets cancer and another does not. However, scientists have studied general patterns of cancer in the population to learn what things around us and what things we do in our lives may increase our chance of developing cancer. Anything that increases a person's chance of developing a disease is called a risk factor; anything that decreases a person's chance of developing a disease is called a protective factor. Some of the risk factors for cancer can be avoided, but many cannot. For example, although you can choose to quit smoking, you cannot choose which genes you have inherited from your parents. Both smoking and inheriting specific genes could be considered risk factors for certain kinds of cancer, but only smoking can be avoided. Prevention means avoiding the risk factors and increasing the protective factors that can be controlled so that the chance of developing cancer decreases. Although many risk factors can be avoided, it is important to keep in mind that avoiding risk factors does not guarantee that you will not get cancer. Also, most people with a particular risk factor for cancer do not actually get the disease. Some people are more sensitive than others are to factors that can cause cancer. Talk to your doctor about methods of preventing cancer that might be effective for you. The purposes of this summary on colorectal cancer prevention are to: - Give information on colorectal cancer and how often it occurs. - Describe colorectal cancer prevention methods. - Give current facts about which people or groups of people would most likely be helped by following colorectal cancer prevention methods. You can talk to your doctor or health care professional about cancer prevention methods and whether they would be likely to help you. Colorectal cancer is the second leading cause of cancer deaths in the United States. The number of new cases of colorectal cancer in the United States has been decreasing slightly, and the number of deaths due to colorectal cancer has been decreasing. The risk of colorectal cancer tends to increase after the age of 40. Colorectal cancer can sometimes be associated with known risk factors for the disease. Many risk factors can be changed, but not all can be avoided. Diet and Lifestyle: Diet and lifestyle may affect colorectal cancer risk. Many factors are under study. - Vitamin D: Studies show that taking 1,000 IU of vitamin D daily may cut the risk of colorectal cancer in half. - Folic acid: High doses of folic acid may help decrease colorectal cancer risk. - Physical activity: A lack of physical activity, especially combined with a diet high in fat, may increase colorectal cancer risk. - Obesity: In premenopausal women, obesity has been linked to an increased colorectal cancer risk. - Smoking: Cigarette smoking has been linked to increased colorectal cancer risk. - Alcohol: Drinking alcohol may increase colorectal cancer risk. It is not known if a diet low in fat and high in fiber, fruits, and vegetables decreases the risk of colorectal cancer. Nonsteroidal Anti-Inflammatory Drugs: It is not known if the use of nonsteroidal anti-inflammatory drugs (NSAIDs) decreases the risk of colorectal cancer. Studies have shown that NSAIDs lower the risk of adenomas (noncancerous tumors), but it is not clear if this results in a lower risk of cancerous tumors. Use of NSAIDs, however, increases the risk of heart attack, heart failure, stroke, and bleeding in the stomach and intestines. Polyp Removal: Studies have shown that removing polyps, which may develop into cancer, decreases the risk of colorectal cancer. Bleeding and infection sometimes occur after polyps are removed during colonoscopy or sigmoidoscopy. Rarely, the procedure tears the colon. Female Hormone Use: Studies show that postmenopausal use of combined estrogen and progesterone lowers the risk of colorectal cancer, but use of estrogen alone does not. Combined estrogen and progesterone use, however, increases the risk of breast cancer, blood clots, and heart disease. Statin Use: There is no evidence that statin use affects the risk of colorectal cancer. Changes were made to this summary to match those made to the health professional version. If you have questions or comments about this summary, please send them to Cancer.gov through the Web site's Contact Form. We can respond only to email messages written in English. For more information, U.S. residents may call the National Cancer Institute's (NCI's) Cancer Information Service toll-free at 1-800-4-CANCER (1-800-422-6237) Monday through Friday from 9:00 a.m. to 4:30 p.m. Deaf and hard-of-hearing callers with TTY equipment may call 1-800-332-8615. The call is free and a trained Cancer Information Specialist is available to answer your questions. Web sites and Organizations The NCI Web site provides online access to information on cancer, clinical trials, and other Web sites and organizations that offer support and resources for cancer patients and their families. There are also many other places where people can get materials and information about cancer treatment and services. Local hospitals may have information on local and regional agencies that offer information about finances, getting to and from treatment, receiving care at home, and dealing with problems associated with cancer treatment. The NCI has booklets and other materials for patients, health professionals, and the public. These publications discuss types of cancer, methods of cancer treatment, coping with cancer, and clinical trials. Some publications provide information on tests for cancer, cancer causes and prevention, cancer statistics, and NCI research activities. NCI materials on these and other topics may be ordered online or printed directly from the NCI Publications Locator. These materials can also be ordered by telephone from the Cancer Information Service toll-free at 1-800-4-CANCER (1-800-422-6237), TTY at 1-800-332-8615. The NCI's LiveHelp service, a program available on several of the Institute's Web sites, provides Internet users with the ability to chat online with an Information Specialist. The service is available from 9:00 a.m. to 11:00 p.m. Eastern time, Monday through Friday. Information Specialists can help Internet users find information on NCI Web sites and answer questions about cancer. - NCI Public Inquiries Office - Suite 3036A - 6116 Executive Boulevard, MSC8322 - Bethesda, MD 20892-8322 PDQ® is a comprehensive cancer database available on NCI's Web site. PDQ® is the National Cancer Institute's (NCI's) comprehensive cancer information database. Most of the information contained in PDQ® is available online at NCI's Web site. PDQ® is provided as a service of the NCI. The NCI is part of the National Institutes of Health, the federal government's focal point for biomedical research. PDQ® contains cancer information summaries. The PDQ® database contains summaries of the latest published information on cancer prevention, detection, genetics, treatment, supportive care, and complementary and alternative medicine. Most summaries are available in two versions. The health professional versions provide detailed information written in technical language. The patient versions are written in easy-to-understand, nontechnical language. Both versions provide current and accurate cancer information. The PDQ® cancer information summaries are developed by cancer experts and reviewed regularly. Editorial Boards made up of experts in oncology and related specialties are responsible for writing and maintaining the cancer information summaries. The summaries are reviewed regularly and changes are made as new information becomes available. The date on each summary ("Date Last Modified") indicates the time of the most recent change. PDQ® also contains information on clinical trials. People who are at high risk for a certain type of cancer may want to take part in a clinical trial. A clinical trial is a study to answer a scientific question, such as whether a certain drug or nutrient can prevent cancer. Trials are based on past studies and what has been learned in the laboratory. Each trial answers certain scientific questions in order to find new and better ways to help cancer patients and those who are at risk for cancer. During prevention clinical trials, information is collected about prevention methods, the risks involved, and how well they do or do not work. If a clinical trial shows that a new method is better than one currently being used, the new method may become "standard." Listings of clinical trials are included in PDQ® and are available online at NCI's Web site. Descriptions of the trials are available in health professional and patient versions. Many cancer doctors who take part in clinical trials are also listed in PDQ®. For more information, call the Cancer Information Service 1-800-4-CANCER (1-800-422-6237); TTY at 1-800-332-8615. October 03, 2014 November 25, 2015
<urn:uuid:458c70fc-ade6-4e5a-a572-e0d6ff08e3a8>
CC-MAIN-2015-48
https://www.oncolink.org/resources/nci.cfm?id=CDR0000062813
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446248.56/warc/CC-MAIN-20151124205406-00221-ip-10-71-132-137.ec2.internal.warc.gz
en
0.929121
1,934
3.703125
4
When workers feel their workplace cares about their growth and development, they’re more likely to commit to their goals and the organization, as well as feel greater job satisfaction. Growth is a significant part of human nature, and we have an intrinsic desire to continue to grow and develop throughout various aspects of our lives. In young children and adolescents, this growth is regular and consistent, therefore easily noticeable. As we age, we still have a desire for growth and development – but it may look a bit different. As adults, we spend a significant amount of time at work, and as such growth and development in our professional lives is important. If there aren’t opportunities for growth and development at work, many will choose to take another job if the opportunity arises. How do we recognize growth and development in the workplace? Growth and development is present in a work environment where workers receive encouragement and support in the development of their interpersonal, emotional, and job skills. Such workplaces provide a range of internal and external opportunities for workers to build their repertoire of competencies. This will not only help with their current jobs, but will also prepare them for possible future positions. Why is Growth and Development Important? When workers feel their workplace cares about their growth and development, they’re more likely to commit to their goals and the organization, as well as feel greater job satisfaction. This also directly enhances staff well-being. Providing access to opportunities to develop personal and interpersonal skills, aside from learning specific skills for their role, is an important component in promoting caring for oneself, strengthening relationships, and relating to others. What happens when employees don’t have opportunities for growth and development? Employees who are not challenged by their work will grow bored, their well-being will suffer, and their performance will drop. When staff don’t have opportunities to learn and improve their interpersonal and psychological skills, the result can be conflict, disengagement and distress. An organization with good growth and development would be able to state that: - workers receive feedback at work that helps them grow and develop; - supervisors are open to worker ideas for taking on new opportunities and challenges; - workers have opportunities to advance within their organization; - the organization values workers’ ongoing growth and development; and, - workers have the opportunity to develop their “people skills” at work. Supporting Growth and Development in the Workplace Growth and development, even within the workplace, is a personal journey. There are a number of ways an organization can incorporate personal growth and development opportunities: 1 Start with a plan. Take the time to develop personal growth plans with each worker in the organization – both at the time of hire, as well as at a regular intervals (e.g., annually). This should be a collaborative process where workers are able to identify particular areas of passion within their work, set personal goals, and identify areas whether they would like to improve or expand their knowledge. 2 Ask workers what they want or need. Personal growth and development is dependent on workers’ personal goals and needs. Take the time to ask what type of opportunities are most important and meaningful. 3 Provide mentorship opportunities. Those who are looking to move up within the organization will learn best from those already in those positions. Mentorship not only provides opportunity to determine whether or not they’re the right fit for that position (see Psychological Demands) but allows the opportunity to build the necessary skills. 4 Training on ‘soft skills’. Sometimes individuals may be lacking skills, simply because they aren’t aware of those skills as being directly related to their work. ‘Soft skills’ often relate to non-technical skills – such as emotional self-awareness, emotional control, awareness of others’ emotions, and effective communication. Some other soft skills may include things such as effective time management, task prioritization, and delegation. 5 Provide feedback. Those who are recognized and rewarded for their work are more likely to be motivated to continue to grow within the organization. Reward and recognition is not about monetary acknowledgement (assuming individuals are fairly remunerated for the work they do), but rather about acknowledgement and appreciation for one’s efforts. This tends to be more effective when individuals are recognized in a timely fashion, rather than at scheduled reviews. Some examples of opportunities for employee growth and development include: - Continuing education courses; - Tuition reimbursement; - Career development or counselling services; - Skills training provided in-house or through outside training centers; - Opportunities for promotion and internal career advancement; - Coaching, mentoring, and leadership development programs; and - Personal development; including skills such as emotional intelligence, communication, or physical health. Final Thoughts on Growth and Development – Ongoing Improvement Growth and development opportunities within the workplace are going to keep workers happier, healthier, and more committed to their work. So, think outside of the box when it comes to providing opportunities for growth and development within your organization. But don’t forget to ask for input from workers, and provide opportunities to create personalized plans for growth. Growth and Development is psychosocial factor 6 from the National Standard of Canada for Psychological Health and Safety (PH&S) in the Workplace (CAN/CSA-Z1003-13/BNQ 9700-803/2013 – Psychological Health and Safety in the Workplace). For more information, see also Guarding Minds at Work (Samra et al.).
<urn:uuid:79c13cdd-339a-4044-9436-f9a76e102903>
CC-MAIN-2023-14
https://myworkplacehealth.com/ways-to-support-growth-and-development-in-the-workplace/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00348.warc.gz
en
0.958532
1,147
3.0625
3
Joomla Templates: Creating a Pure CSS Template : Page 2 Joomla Templates: Creating a Pure CSS Template W3C and Tableless Design Usability, accessibility, and search engine optimization (SEO) are all phrases used to describe high-quality web pages on the Internet today. In reality, there is a significant amount of overlap between usability, accessibility and SEO and a web page that demonstrates the characteristics of one does so for all three; this is shown in Figure 9.2. The easiest way to achieve these three goals is to do so using the framework laid out in the World Wide Web Consortium (W3C) web standards. For example, a site that is structured semantically with (X)HTML (the (X)HTML explains the document, not how it looks) will be easily read through a screen reader by someone who has poor vision. It will also be easily read by a search engine spider. Google is effectively blind in how it reads your website, it's as though it is using a screen reader. FIGURE 9.2 The overlap between usability , accessibility, and SEO Web standards put into place a common set of "rules" for all web browsers to use to display a web page. The main organization pushing these standards is the World Wide Web Consortium (W3C), whose Director, Tim Berners-Lee , has the distinction of actually inventing the Web in 1989. To help you understand where web standards came from, some history is helpful. Many web pages are actually designed for older browsers. Why? Browsers have continually evolved since the World Wide Web started. New ones have appeared, and some old ones have disappeared (remember Netscape?). Current W3C standards serve to (hopefully) push manufacturers to release more compliant browsers so that designers can design to one common platform. Another complicating factor is that different browser makers (like Microsoft) tend to have their browsers interpret html/xhtml in slightly different ways. This has lead to web designers having to design their websites to support older browsers rather than new ones. It's often decided that it's important that a web page appear properly to these "legacy" browsers. The W3C standards outlined for web page code have been developed to achieve consistency. A site that incorporates the W3C's web standards has a much better foundation for making itself accessible, usable, and search engine-optimized. Think of these as building codes for your house. A website built with them is stronger and safer and coincides with users' expectations. You can check your pages with the W3C's HTML validation service (validator.w3.org/). It's easy and free (make sure you use the correct DOCTYPE when you try and validate your code1). At its simplest, a site that meets W3C validation uses semantic (X)HTML and separates content from presentation using CSS. Ask five designers what web standards are, and you will get five different answers. But most agree that they are based on using valid code, whether HTML or (X)HTML (or others). Semantically Correct Code As mentioned earlier, being semantic means that the (X)HTML in the web page describes only content, not presentation. In particular, this means structured organization of H1,H2 tags etc and only using tables for tabular data, not layout. Cascading Style Sheets (CSS) Closely related to having semantic code, is using Cascading Style Sheets (CSS) to control the look and layout of a web page. CSS is a simple mechanism for adding style (that is, fonts, colors, spacing, and so on) to Web documents (source: www.w3.org/Style/CSS/). They exist parallel to the (X)HTML code and so let you completely separate content (semantic code) from presentation (CSS). The best example of this is CSS Zen Garden, a site where the same semantic (X)HTML is shaped in different and unique ways with different CSS. The result is pages that look very different but have the same core content. Designing Joomla-powered sites currently presents considerable challenges to meet validation standards. In the first series of releases, 1.0.X, the code used a significant amount of tables to output its pages. This isn't really using CSS for presentation, nor does it produce semantically correct code. This problem is compounded by the fact that very few third-party developers are using CSS; most use tables to generate their code too. Fortunately, the Joomla Core Development team recognized this issue with Joomla. In the 1.5 version, it's possible for template designers to completely override the output of the core (called a view) and strip out the tables or customize the layoutÂwhatever they want. Regardless, care can still be taken when creating a template to make sure it is accessible (for example, scalable font sizes), usable (clear navigation) and optimized for search engines (source-ordered). The Least You Need to Know Creating valid templates should be a path, not a goal. The idea is to make your template as accessible as possible for humans and spiders, not to achieve a badge of valid markup. Creating a Simple Template To understand the contents of a template, we will start by looking at a blank Joomla template. The Template File Components The template contains the various files and folders that make up a Joomla template. These files must be placed in the /templates/ directory of a Joomla installation in their own folder. So if we had two templates installed, our directory would look something like the following: Note that the directory names for the templates must be the same as the name of the template, in this case element and voodoo. Obviously they are case sensitive and shouldn't contain spaces. Within the directory of a template, there are a number of key files: These two filenames and locations must match exactly because this is what they are called by the Joomla core script. The first of these is the template XML file. This is an XML format metadata file that tells Joomla what other files are needed when loading a web page that uses this template. Note the uppercase "D." It also details the author, copyright, and what files make up the template (including any images used). The last use of this file is for installing a template when using the admin backend. Second, we have the engine of the template, the This file is the most important. It lays out the site and tells the Joomla CMS where to put the different components and modules. It is a combination of PHP and (X)HTML. In almost all templates, additional files are used. It is conventional ( although not required by the core) to name and locate them as shown here: /element/template_thumbnail.png /element/css/template.css /element/images/logo.png These are just examples. Table 9.1 examines each line. Printed with permission from Prentice Hall from the book Joomla! A User's Guide: Building a Successful Joomla! Powered Website written by Barrie North.
<urn:uuid:b1381eff-176b-48f6-b28e-2a830329fddd>
CC-MAIN-2016-07
http://www.webreference.com/authoring/style/sheets/joomla_templates/2.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701158481.37/warc/CC-MAIN-20160205193918-00170-ip-10-236-182-209.ec2.internal.warc.gz
en
0.899574
1,503
2.90625
3
An interpersonal relationship is an association between two or more people that may range in duration from brief to enduring. This association may be based on inference, love, solidarity, regular business interactions, or some other type of social commitment. Interpersonal relationships are formed in the context of social, cultural and other influences. An intimate relationship is an interpersonal relationship that involves physical or emotional intimacy. Physical intimacy is characterized by romantic or passionate sex and attachment, or sexual activity. The term is also sometimes used euphemistically for a sexual relationship. Intimate relationships play a central role in the overall human experience. Humans have a general desire to belong and to love which is usually satisfied within an intimate relationship. Electronic mail, most commonly referred to as email or e-mail since approximately 1993, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today’s email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Interaction is a kind of action that occurs as two or more objects have an effect upon one another. The idea of a two-way effect is essential in the concept of interaction, as opposed to a one-way causal effect. A closely related term is interconnectivity, which deals with the interactions of interactions within systems: combinations of many simple interactions can lead to surprising emergent phenomena. Interaction has different tailored meanings in various sciences. A crisis is any event that is, or expected to lead to, an unstable and dangerous situation affecting an individual, group, community, or whole society. Crises are deemed to be negative changes in the security, economic, political, societal, or environmental affairs, especially when they occur abruptly, with little or no warning. More loosely, it is a term meaning ‘a testing time’ or an ’emergency event’. Strategy (Greek “στρατηγία” – stratēgia, “art of troop leader; office of general, command, generalship”) is a high level plan to achieve one or more goals under conditions of uncertainty. Strategy becomes ever necessary when it is known or suspected there are insufficient resources to achieve these goals. A methodology is usually a guideline system for solving a problem, with specific components such as phases, tasks, methods, techniques and tools. It can be defined also as follows: “the analysis of the principles of methods, rules, and postulates employed by a discipline”; “the systematic study of methods that are, can be, or have been applied within a discipline”; “the study or description of methods”. An expert (also called cognoscente) is someone widely recognized as a reliable source of technique or skill whose faculty for judging or deciding rightly, justly, or wisely is accorded authority and status by their peers or the public in a specific well-distinguished domain. An expert, more generally, is a person with extensive knowledge or ability based on research, experience, or occupation and in a particular area of study. A spouse is a partner in a marriage, civil union, domestic partnership or common-law marriage. The term is gender neutral, whereas a male spouse is a husband and a female spouse is a wife. Therefore the term may be used in both polygamous and monogamous opposite-sex relationships and same-sex relationships. A parent is a caretaker of the offspring in their own species. In humans, a parent is of a child (where “child” refers to offspring, not necessarily age). Children can have one or more parents, but they must have two biological parents. Biological parents consist of the male who sired the child and the female who gave birth to the child. In all human societies, the biological mother and father are both responsible for raising their young.
<urn:uuid:9be52e85-9901-4424-bc9b-f0d67ab5bcfa>
CC-MAIN-2019-13
http://aaronwolasky.com/vocabulary/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202688.89/warc/CC-MAIN-20190322180106-20190322202106-00193.warc.gz
en
0.953031
834
3.203125
3
SANTIAGO – Simón Bolívar, the South American independence hero who hoped to weave the continent into a single nation, would shudder at the disintegration that prevails today in the continent’s energy sector. Surely he would understand that no community can be built on so fragmented a foundation. Peru has gas, which it sells to Mexico. Bolivia also has gas, but it has been under-exploiting it ever since it nationalized the industry in 2006. Argentina used to have a gas industry, but it was decimated by years of misguided government policies. Brazil discovered hydrocarbons deep in the Atlantic Ocean a few years ago and has begun auctioning off rights, but actual production is still years away. Chile has no oil or gas, and no one in the neighborhood will sell it any, so it has to buy its supplies from as far away as Indonesia. Moreover, South America’s electricity grids are seldom interconnected, and rates for power vary widely. Brazil and Chile have the region’s highest electricity prices (which are also among the highest in the world). The competitiveness of their industries, and consumers’ household budgets, suffer accordingly. Optimists imagine a scenario in which production is rationalized, pipelines are built, grids are interconnected, and gas from Bolivia, Argentina, or elsewhere fuels growth throughout the continent, benefiting everyone in the process.
<urn:uuid:e47e46d8-b593-46f1-98c3-7f308296b9da>
CC-MAIN-2017-13
https://www.project-syndicate.org/commentary/andres-velasco-on-how-shale-gas-could-transform-south-america-s-economy-and-politics?barrier=accessreg
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187744.59/warc/CC-MAIN-20170322212947-00070-ip-10-233-31-227.ec2.internal.warc.gz
en
0.969618
284
2.5625
3
Defined by its high tides, turbulent waters, and bold coastline, Cobscook Bay is a remarkably rich ecosystem, teeming with wildlife above and below the water. Tucked against the Canadian border in Downeast Maine, its cold, nutrient-laden waters, strong tidal currents, and extensive intertidal habitats create critical breeding and feeding grounds for marine and shoreline species. Cobscook Bay is home to a wide variety of marine species, as well as bald eagles, migratory shorebirds and waterfowl. A shallow 40-square-mile estuary with 200 miles of rugged, rocky, convoluted shoreline, Cobscook Bay has avoided the heavy development experienced by most estuaries on the eastern seaboard, and remains a relatively intact marine system. The Bay serves as the center of Maine's multi-million dollar finfish aquaculture industry and provides prime habitat for sea scallops, sea urchins, and soft-shelled clams. Community Values Guide Conservancy’s Role Cobscook Bay is remarkable for its uncommon natural beauty, outstanding ecological values and rich history of human endeavor. It is a marine ecosystem of exceptional qualities, an area of cold waters and massive tides. These tides lay bare extensive mudflats where waterfowl and shorebirds feed. Inner coves remain relatively free of in winter, attracting the largest congregation of bald eagles in the northeast and a quarter of Maine's wintering black ducks. While many know of the high number of bald eagles that soar above Cobscook Bay, and of the fish that swim within its deep green waters, it has been equally famous among marine scientists for the diversity of benthic invertebrates, the creatures that live on or in the ocean bottom. This special place has so far been spared the degradation caused by heavy development that has afflicted most eastern seaboard estuaries. It also lies at the heart of Maine's aquaculture and sea urchin industries (perhaps the fastest growing in Maine over the last decade). Meanwhile, traditional marine livelihoods (clamming, for example) have suffered dramatic declines. The challenge at Cobscook is to find ways to maintain the health of this exceptional ecosystem, while also preserving the values of the communities surrounding the Bay and enhancing their economic vitality. Here, economic opportunity and the environment have always been interdependent, even as the potential conflicts between them have been debated. Local citizens are exploring new ways for both nature and people to flourish. Fortunately, many people have stepped forward to help put the many pieces of this puzzle. In assessing how the Conservancy can help, we have tried to identify ways to employ our resources and areas of expertise in support of locally-identified initiatives. It is a process dependent on mutual trust and respect, and one in which we find listening and sharing to be among our most important contributions. What The Nature Conservancy is Doing Our main focus at Cobscook Bay is the gathering and dissemination of information about the marine system. We are helping to secure funding for projects that meet the ecological and economic needs of the community. We often serve as a link for like-minded individuals and organizations. Some of our recent activities in Cobscook Bay include: Research: In the summer of 2005, the Conservancy helped organize an effort to monitor invasive species in Cobscook Bay through a rapid assessment of marine invasives.The assessment found the Bay to be relatively unharmed by invasives compared to other bays in Northern New England. However, one very worrisome invasive species - a sea squirt - was found in the bay. In 2004, the Conservancy coordinated the publication of a special issue of Northeastern Naturalist devoted to research conducted in Cobscook Bay (Ecosystem Modeling in Cobscook Bay, Maine: A Boreal, Macrotidal Estuary. Northeastern Naturalist. Volume 11, Special Issue 2. 2004.). The volume provides extensive information about the oceanography and ecology of the bay. Education and Outreach: The Conservancy supports the efforts of the Cobscook Bay Resource Center. The Resource Center helps local resource users, scientific researchers, government agencies, educators, and others to monitor and understand the Cobscook Bay ecosystem, and to use that understanding to develop and implement strategies for economic development based on the Bay's renewable resources. The Resource Center grew out of the Sustainable Cobscook Project started in 1993 by the Conservancy and Maine Community Foundation. Conservation Lands: While the heart of the Cobscook Bay ecosystem is the marine environment, the shoreland provides critical habitat for bald eagles and a variety of waterfowl species. Access to and protection of inner coves is important to clammers and others as well. Many of these areas now have some form of protection through the work of a group of local, state and national organizations. This partnership (which includes the Quoddy Regional Land Trust, the Maine Department of Inland Fisheries and Wildlife, Moosehorn National Wildlife Refuge, the Conservancy and others) exploring how these lands can enhance the social and economic life of local communities, while continuing to protect their conservation values.
<urn:uuid:145f1e9d-3324-4675-87d9-6cc4460693c1>
CC-MAIN-2016-40
http://www.nature.org/ourinitiatives/regions/northamerica/unitedstates/maine/placesweprotect/cobscook-bay.xml
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660350.13/warc/CC-MAIN-20160924173740-00303-ip-10-143-35-109.ec2.internal.warc.gz
en
0.926169
1,056
3.328125
3
Science is a core subject of the National Curriculum. We have a responsibility to report attainment at the end of each key stage. - An understanding of Science is important for our children so that they can begin to explain the world around them. - Science provides an opportunity for children to satisfy their natural curiosity. - Science promotes opportunities for group work, problem solving and independent thinking. - Many opportunities for delivering cross curricular Maths (statistics) and English are embedded within a scientific context. Science comprises four elements: Working Scientifically, Biology, Chemistry and Physics. We deliver our science teaching as a discrete subject in KS1 and KS2. In the Early Years, any opportunities to explore scientific ideas through play are exploited and observations are made under the Understanding the World strand. For KS1, 2 lessons a week are allocated. For KS2, 3 lessons a week are allocated. Planning and Content The ‘Year Group Overview’ sheet identifies which scientific theme and area (Biology, Chemistry, Physics) is to be covered by each year group in each half term. It lists the subject knowledge objectives to be covered and includes the additional, non-statutory, guidance from the National Curriculum. All Working Scientifically (WS) objectives are stated for each unit but, they do not all need to be taught in each unit as long as they are all covered in a balanced manner over the course of the year. When planning, class teachers should identify the most relevant WS objectives for the unit content and meet any gaps the class may have. It is sometimes appropriate to teach Working Scientifically skills discretely before being explored in a themed context. The balance between subject specific and Working Scientifically objectives should be around 2:1 although this is not an exact science and teachers must use their own judgement when planning a unit. When planning, it is important that teachers consider the assessment requirements to ensure accurate assessments will be possible. Each term, we will look at the work of a famous scientist (historical or modern) in a week long whole school research project. The Science Subject Leader will decide on this person and inform staff. Work on the scientist should be both age appropriate and provide opportunities for practical exploration. Occasionally a common theme (e.g. ducklings, recycling) will be selected instead. The final half term of the year for children in Y2 and above is a ‘Child Led Investigation’ where children are given the opportunity to steer their own Science learning and exploration. Staff are able to use this as an opportunity to fill gaps in learning and to finalise assessment judgements. Medium term planning is monitored each half term for content, coverage, pitch and quality. Principles for Teaching At Grendon Primary school we follow five key principles for teaching Science. Teachers should use the outdoor area as much as possible. When appropriate technology can be used as a teaching or learning tool. 1. Provide practical opportunities Hands on experiences whenever possible. It is usually better to DO than to LISTEN. 2. Deliver focussed teaching and learning Careful planning ensures factual content is included and space is given to understanding and mastering science skills. Teachers are aware of assessment requirements as they teach. 3. Ensure accurate content Correct subject knowledge that is age appropriate. 4. Establish a real life link Introducing science through problem solving or familiar scenarios. 5. Exploit opportunities for cross-curricular links. Identifying where speaking and listening, maths, English and computing can be developed. Recording for science may take place in; - Children’s individual Science Books - Class Science scrapbook - Class working wall Teachers should be creative in deciding how children will be asked to record their science work. Writing a range of genres, Q&A, cloze tasks, tables, graphing, mind maps, drawing and photographs are all appropriate methods for recording in science. For younger children or the less able, an adult scribe can be effective to record children’s scientific ideas. Each class has a hardback Science Scrapbook. This can be used for recording practical tasks but also has a role in teaching new content, revisiting prior learning and in presenting and evaluating findings. Children should be involved in the scrapbook and most recent work should be displayed, open, in the classroom. Scrapbooks are passed up to the next teacher as classes move up the school. The Grendon Garden As part of our Science curriculum, Years 2 and 4 do some work in the Grendon Garden. For more details on this exciting area please look under the 'Pupils' tab or click HERE.
<urn:uuid:128031d1-4dab-4804-9caf-552e362dc817>
CC-MAIN-2019-26
https://www.grendon.bham.sch.uk/page/?title=Science&pid=232
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000266.39/warc/CC-MAIN-20190626094111-20190626120111-00460.warc.gz
en
0.92144
970
4.34375
4
The U.S. Department of Labor is the sole federal agency that monitors child labor and enforces child labor laws. The most sweeping federal law that restricts the employment and abuse of child workers is the Fair Labor Standards Act (FLSA). Child labor provisions under FLSA are designed to protect the educational opportunities of youth and prohibit their employment in jobs that are detrimental to their health and safety. FLSA restricts the hours that youth under 16 years of age can work and lists hazardous occupations too dangerous for young workers to perform. Enforcement of the FLSA's child labor provisions is handled by the Department's Wage and Hour Division. The Department's YouthRules! initiative seeks to promote positive and safe work experiences for young workers. The Office of Disability Employment Policy (ODEP) offers numerous resources for youth. ODEP's focus on youth policy is aimed at improving transition outcomes of youth and young adults with disabilities toward successful employment and adulthood. The Employment and Training Administration sponsors many programs designed to provide training opportunities and and job placement assistance programs for America's youth. The efforts and activities of the Department's Bureau of International Labor Affairs’ (ILAB) Office of Child Labor, Forced Labor, and Human Trafficking include research and publication of major reports on international child labor, forced labor, and human trafficking; funding and oversight of projects to eliminate exploitive child labor and forced labor around the world; and assistance in the development and implementation of U.S. government policy on international child labor, forced labor, and human trafficking issues. The Bureau of Labor Statistics, which serves as a statistical resource to the Department of Labor, gathers statistics on a variety of subjects including those related to child labor.
<urn:uuid:d761e233-e330-4e51-b95e-9131e1efdded>
CC-MAIN-2022-05
https://www.dol.gov/general/topic/youthlabor
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304810.95/warc/CC-MAIN-20220125100035-20220125130035-00041.warc.gz
en
0.939825
341
3.265625
3
Hand eczema, also known as contact dermatitis, is mainly caused by frequent hand washing and exposure to common irritants, for instance hand soap, detergent, hair colouring etc. Hence why housewives, nurses and hairdressers are prone to this skin problem. Some common symptoms include inflammation, blister or ulcer triggered by bacteria infection. Soap-based or alcohol-based detergents strip away skin’s natural sebum, damage the skin barrier, leaving skin vulnerable to irritants. The skin become easily irritated and itchy. The more you wash, the more you itch. Break the itch-scratch cycle.
<urn:uuid:ee0bcdfc-d1bd-4095-b6a0-53607eca4378>
CC-MAIN-2020-50
https://www.stopitch.com.my/soothingfamily/hand-eczema-2/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141733120.84/warc/CC-MAIN-20201204010410-20201204040410-00510.warc.gz
en
0.939373
132
2.515625
3
By Christopher Le Coq BRUSSELS (Reuters) - The European Union will virtually ban phosphates in dishwasher and laundry soap to curb the pollution of rivers, lakes and seas by algae from 2013, EU lawmakers decided on Wednesday. Phosphates help soften calcium-rich hard water but they can lead to blooms of algae, which starve fish of oxygen. The compound has had a particularly serious effect on parts of the Danube river and Baltic Sea, environmentalists say. The legislation, expected to be rubber-stamped by EU member states in the coming months, will reduce phosphates in dishwasher soap to half a gram per dose from 2013 and even less in washing powder from 2017. Environmental campaigners said the rules would come too late to save some EU waters. "(The legislation) is paving the way for the most cost-effective solution to reduce the algal blooms in our rivers, lakes and seas," said Sergey Moroz from environmental group WWF. "Unfortunately, by setting excessive deadlines, the regulation lacks the sense of urgency needed to finally bring life back to the Danube and the dead areas of the Baltic or the Black Sea." EU states including Germany, France, Britain and Italy have already banned or limited phosphate use in laundry soap, which along with dishwasher detergent is the third biggest source of phosphate discharge after farming and sewage. France will impose a ban for dishwasher detergent by 2012, while Sweden and Finland are considering similar action. Lawmakers also agreed to set a 2015 deadline to consider further cuts in consumer chemicals but removed a proposal to act on phosphate in industrial detergents. (Editing by Ben Harding)
<urn:uuid:ef706338-3821-4a0b-b5a8-af8776432669>
CC-MAIN-2018-17
https://townhall.com/news/us/2011/12/14/eu-to-cut-phosphates-to-curb-algae-in-waters-n858853
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947654.26/warc/CC-MAIN-20180425001823-20180425021823-00059.warc.gz
en
0.949361
340
2.59375
3
In the mid-1960s, the fight against cancer was vastly different from what we know today. Scientists had yet to hamper the growth of cancer cells, clinical investigation of combination therapies for cancer had just begun, and clinical studies of anticancer vaccines had not yet started. By the late ‘70s, cancer was the leading cause of death for adults 25 to 44 years of age. Scientists had yet to discover a way to stop cancer from growing. Neither the stabilization of microtubule assembly nor the inhibition of topoisomerase I were known to be effective ways to circumvent the uncontrolled growth of cancer cells. Early Discovery of Potent Cytotoxic Compounds Led by Monroe Wall, PhD, and Mansukh Wani, PhD, a team of pioneering RTI scientists reported the discovery of a compound they termed camptothecin from the Chinese tree Camptotheca acuminata. The unique mode of action for this potent cytotoxic compound was found to be the inhibition of an enzyme known as DNA topoisomerase I. Camptothecin traps this enzyme, inhibiting DNA replication and killing cancer cells. A few years later, our team reported the structure of Taxol found in the Pacific yew tree, Taxus brevifolia. The unique mode of action for this compound was found to be the stabilization of microtubule assembly, an important step in cell division. Thus, Taxol terminates cancer cell growth. Both compounds were discovered using the principles of bioactivity-directed fractionation, especially in vitro cytotoxicity as a predictor of in vivo efficacy. As a result, simple bioassays can be used to predict whether plant extracts or natural product compounds will have activity in human beings, helping to focus and accelerate research toward new treatments. Revolutionizing the Battle against Cancer Cell Growth and Enabling the Pursuit of Other Bioactive Compounds Presently, first-generation analogs of camptothecin, such as Hycamtin (topotecan) and Camptosar (irinotecan or CPT-11), marketed by GlaxoSmithKline and Pfizer, respectively, are used for the treatment of ovarian and colon cancer. In 1992, Bristol-Myers Squibb received approval to market Taxol for the treatment of refractory ovarian cancer, and subsequently it was approved for the treatment of metastatic breast and lung cancers and Kaposi's sarcoma. Taxol and compounds derived from camptothecin have been responsible for saving the lives of hundreds of thousands of people afflicted with cancer. In the ovarian cancer therapeutic area alone, the survival rate has more than doubled since the inclusion of Taxol in the treatment regimen. By isolating and identifying the structure of these novel, bioactive natural products, our scientists have dramatically improved, and in some cases, lengthened or saved, the lives of cancer patients. Our team has also used this knowledge to unearth new mechanisms of action for inhibiting cancer cell growth and to establish new principles for discovering other bioactive compounds from natural sources. These techniques are now routinely used in natural product laboratories around the world, to discover bioactive compounds from plant, marine, and fungal origins. Taxol (a word coined by RTI's Monroe E. Wall) is a trademark of Bristol-Myers Squibb Co. Camptothecin is a trademark of RTI International.
<urn:uuid:0e120985-3a1f-425f-802b-536acc9dea73>
CC-MAIN-2019-47
https://www.rti.org/impact/taxol-and-camptothecin
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664437.49/warc/CC-MAIN-20191111191704-20191111215704-00558.warc.gz
en
0.941755
703
3.078125
3
- slide 1 of 3 Unfortunately, on top of the water requirements to sustain life, we use our water for waste disposal, recreation, transportation, farming, and industrial purposes. In fact, between the years 1997-2003, the world’s per capita water usage worked out to about 1200 cubic meters per person! Rivers and streams certainly play an important role in our water usage for those communities that happen to be close to them; in the case of St. Louis, Missouri, we are heavily dependent on the Missouri River for our water supply. Recharge of aboveground water supplies is an even more difficult issue, since flood mitigation approaches such as channelization of waterways can actually increase the incidence of flash flooding and decrease the steady-state water level, since it decreases water infiltration and, consequently, the water table. In many cases and in increasingly dry environments, that water usage is at the cost of harming the ecosystems that rely on that water. Balancing all our water usage requirements while not adversely impacting biodiversity is a significant challenge in the modern world. - slide 2 of 3 With water serving so many different purposes, it seems obvious that pollution of that same water would be a major concern, but why (and how) exactly is that the case? One significant issue, connected with food chains or “trophic levels”, is that of concentration of toxins; even though the concentration levels of a given pollutant may be low enough to avoid harming producers or low-level consumers, those compounds are concentrated by the action of the food chain itself. Even though the levels of a particular toxin (say, mercury) might be 1000 times below a lethal dose in a given plankton, if a fish eats a thousand of the plankton (and the chemicals remain in its system), then the concentration becomes high enough to harm humans. Since every living thing needs water, pollution of water can have far greater effects than pollution of an equivalent amount of land. Water also gives pollution “legs” and allows it to spread more rapidly, and a toxin that might not harm one organism could cripple or kill others in the exact same concentrations. This is especially true in the case of compounds like mercury that aren’t flushed out of an organism’s system. - slide 3 of 3 Natural water filtration Another is the amount of time necessary to clean polluted waters via natural means. Vegetation, soil, and porous rock formations serve as a filter, removing debris and chemicals from the water. As we increase the amount of impervious surfaces (asphalt, concrete, etc.) in our cities and elsewhere, pollutants run off before they can be filtered out of the water naturally. Such actions increase the water treatment cost to society while simultaneously decreasing the environment's ability to cope with extreme weather conditions and adding biological stressors to the system. Even when filtration is possible, it may take many human lifetimes for groundwater to return to normal after contamination. Water- Usage & Pollution Water is absolutely critical to the existence of life on Earth, and, for the needs of a significant fraction of flora and fauna, that water must be in the form of freshwater. Where does it come from, what affects it, what issues surround it, and how does it affect organisms? Find out here!
<urn:uuid:056e4ae7-c7bd-4992-865b-0814886cefbb>
CC-MAIN-2018-13
https://www.brighthub.com/environment/science-environmental/articles/12309.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257651465.90/warc/CC-MAIN-20180324225928-20180325005928-00641.warc.gz
en
0.93418
675
3.5625
4
The shoulder is a complex joint. There are three bones and two joints that contribute to shoulder function– the humerus, clavicle, and scapula are the bones. The ball and socket joint of the shoulder is between the humerus and the scapula. The acromial clavicular joint between the scapula and clavicle moves with forward elevation of the arm and helps stabilize the shoulder on the chest wall. The shoulder is the most mobile joint in the body and because of this it is easily injured. Common problems in the shoulder joint include rotator cuff tendinitis and tears, impingement, labral tears, tears of the biceps tendon, and instability. Fortunately, almost all of these problems can be treated with advanced arthroscopic techniques if nonoperative treatment is unsuccessful. Arthritis can also occur in the shoulder. With modern techniques, shoulder replacement surgery is a reliable method to improve pain and function, in an arthritic shoulder.
<urn:uuid:a0e17892-7cf4-4a8c-9638-c84db77f96e5>
CC-MAIN-2017-43
http://www.stickneymd.com/shoulder-surgery-2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823067.51/warc/CC-MAIN-20171018180631-20171018200631-00787.warc.gz
en
0.922842
203
3.34375
3
In Last month’s issue, we looked at collecting all the information required to produce a scaled drawing of your garden. In this issue I will share with you some basic methods that will help you to turn the information you collected into a scaled plan of your garden. Before we put pen to paper, here is a list of some of the things you will need: - A3 plain paper or graph paper - Pencil , sharpener and eraser - Compass and set square – these can be found in a school maths/geometry set for sale at stationary stores from 99p - Scale ruler – if you don’t have a scale ruler an ordinary one will be fine. If you have a maths set there will be one included - Fine tip pen, not a biro - Information and measurements about your garden gathered from your survey - A3 drawing board if you have one - Low tack tape Once you have these items you are ready to start. First we need to choose a scale that we are going to use; this depends on the size of your garden. Use a scale of 1 : 100 (1 cm on your plan equals 100cms in the garden) if you have a medium to large sized garden, 1 : 50 (1 cm on your plan equals 50 cm in your garden) for small plots; and 1 : 20 ( 1 cm on your plan equals 20 cm in your garden) for courtyard sized plots. Choose a scale that will allow you to fit the whole garden on one piece of paper. Start by taping down your paper to either your drawing board if you have one or to a table. From the measurements on your survey, and starting at the bottom of your page, draw in the lines of the house making a note on the plan where the windows and doors are. The next measurements we are going to add are the boundary measurements. Start by adding in your left hand boundary. Put the point of the compass on the point you measured from the house on the drawing (point A) and strike an arc at the measurement you have recorded. Now do the same from the other point on the house (point B) to the same boundary. The position where the two arcs intersect is the exact point of your left corner boundary. See diagram. Repeat this for all measurements and draw in your boundary lines from one arc to the other. Once you have positioned your boundaries, plot any existing features you are retaining, for example any trees can be plotted in the same way as your boundaries. Don’t forget to add in sheds, paths or patios that are also staying. Once you’ve transfered all your measurements this is the base plan of your garden. Finally inking in over the pencil lines will finish off the plan. At this point I would advise on making several photocopies. Next month we will look at turning this basic plan into a final design.
<urn:uuid:26c626aa-6a0b-4ce7-a605-5d56f3399134>
CC-MAIN-2023-40
https://thefocus.wales/2012/04/designing-your-garden-part-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00355.warc.gz
en
0.926062
602
3.234375
3
The Maurya Empire at its largest extent under Ashoka the Great. The Lion Capital of Ashoka |Preceding State(s)||Nanda Dynasty of Magadha |Head of State||Samraat (Emperor)| |First Emperor||Chandragupta Maurya| |Government||Centralized Absolute Monarchy with Divine Right of Kings as described in the Arthashastra| |Administration||Inner Council of Ministers (Mantriparishad) under a Mahamantri with a larger assembly of ministers (Mantrinomantriparisadamca). Extensive network of officials from treasurers (Sannidhatas) to collectors (Samahartas) and clerks (Karmikas). Provincial administration under regional viceroys (Kumara or Aryaputra) with their own Mantriparishads and supervisory officials (Mahamattas). Provinces divided into districts run by lower officials and similar stratification down to individual villages run by headmen and supervised by Imperial officials (Gopas). |Area||5 million km² (Southern Asia and parts of Central Asia)| |Population||50 million (one third of the world population )| |Currency||Silver Ingots (Panas)| |Dissolution||Military coup by Pusyamitra Sunga| |Succeeding state||Sunga Empire| The Maurya Empire (322 – 185 B.C.E.), ruled by the Mauryan dynasty, was a geographically extensive and powerful political and military empire in ancient India. Originating from the kingdom of Magadha in the Indo-Gangetic plains of modern Bihar, Eastern Uttar Pradesh and Bengal, the empire's capital city was at Pataliputra near modern Patna. Chandragupta Maurya founded the Empire in 322 B.C.E. after overthrowing the Nanda Dynasty. He began rapidly expanding his power westward across central and western India. Local powers had been disrupted by the westward withdrawal of Alexander the Great's and his Macedonian and Persian armies. By 316 B.C.E. the empire had fully occupied Northwestern India, defeating and conquering the satraps left by Alexander. At its zenith, the Empire stretched to the northern natural boundaries of the Himalaya Mountains, and to the east into Assam. To the west, it reached beyond modern Pakistan and significant portions of Afghanistan, including the modern Herat and Kandahar provinces and Balochistan. Emperor Bindusara expanded the Empire into India's central and southern regions, but it excluded a small portion of unexplored tribal and forested regions near Kalinga, India. The Mauryan Empire was arguably the largest empire to rule the Indian subcontinent. Its decline began fifty years after Ashoka's rule ended, and it dissolved in 185 B.C.E. with the rise of the Sunga Dynasty in Magadha. Under Chandragupta, the Mauryan Empire conquered the trans-Indus region, defeating its Macedonian rulers. Chandragupta then defeated the invasion led by Seleucus I, a Greek general from Alexander's army. Under Chandragupta and his successors internal and external trade, and agriculture and economic activities, all thrived and expanded across India. Chadragupta created a single and efficient system of finance, administration, and security. The Mauryan empire stands as one of the most significant periods in Indian history. After the Kalinga War, the Empire experienced a half century of peace and security under Ashoka. India was a prosperous and stable empire of great economic and military power. Its political and trade influence extended across Western and Central Asia into Europe. During that time Mauryan India also enjoyed an era of social harmony, religious transformation, and expansion of learning and the sciences. Chandragupta Maurya's embrace of Jainism increased social and religious renewal and reform across his society. Ashoka's embrace of Buddhism was the foundation of social and political peace and non-violence across all of India. The era fostered the spread of Buddhist ideals into Sri Lanka, Southeast Asia, West Asia, and Mediterranean Europe. Chandragupta's minister Kautilya Chanakya wrote the Arthashastra, considered one of the greatest treatises on economics, politics, foreign affairs, administration, military arts, war, and religion ever produced. Archaeologically, the period of Mauryan rule in Southern Asia falls into the era of Northern Black Polished Ware (NBPW). The Arthashastra and the Edicts of Ashoka serve as primary sources of written records of the Mauryan times. The Lion Capital of Asoka at Sarnath, remains the emblem of India. Alexander set up a Macedonian garrison and satrapies (vassal states) in the trans-Indus region of modern day Pakistan, ruled previously by kings Ambhi of Taxila and Porus of Pauravas (modern day Jhelum). Chanakya and Chandragupta Maurya Following Alexander's advance into the Punjab, a brahmin named Chanakya (real name Vishnugupt, also known as Kautilya) traveled to Magadha, a kingdom large and militarily-powerful and feared by its neighbors, but its king Dhana, of the Nanda Dynasty, dismissed him. The prospect of battling Magadha deterred Alexander's troops from going further east: He returned to Babylon, and re-deployed most of his troops west of the Indus river. When Alexander died in Babylon, soon after in 323 B.C.E., his empire fragmented, and local kings declared their independence, leaving several smaller satraps in a disunited state. Chandragupta Maurya deposed Dhana. The Greek generals Eudemus, and Peithon, ruled until around 316 B.C.E., when Chandragupta Maurya (with the help of Chanakya, now his adviser) surprised and defeated the Macedonians and consolidated the region under the control of his new seat of power in Magadha. Mystery and controversy shrouds Chandragupta Maurya's rise to power. On the one hand, a number of ancient Indian accounts, such as the drama Mudrarakshasa (Poem of Rakshasa-Rakshasa was the prime minister of Magadha) by Visakhadatta, describe his royal ancestry and even link him with the Nanda family. the earliest Buddhist texts, Mahaparinibbana Sutta refer to a kshatriya tribe known as the Maurya. Any conclusions require further historical evidence. Chandragupta first emerges in Greek accounts as "Sandrokottos." As a young man he may have met Alexander. Accounts say that he also met the Nanda king, angered him, and made a narrow escape. Chanakya originally intended to train a guerrilla army under Chandragupta's command. The Mudrarakshasa of Visakhadutta, as well as the Jaina work Parisishtaparvan, discuss Chandragupta's alliance with the Himalayan king Parvatka, sometimes identified with Porus. That Himalayan alliance gave Chandragupta a composite and powerful army made up of Yavanas (Greeks), Kambojas, Shakas (Scythians), Kiratas (Nepalese), Parasikas (Persians), and Bahlikas (Bactrians). With the help of those frontier martial tribes from Central Asia, Chandragupta defeated the Nanda/Nandin rulers of Magadha and founded the powerful Maurya empire in northern India. Conquest of Magadha Chanakya encouraged Chandragupta and his army to take over the throne of Magadha. Using his intelligence network, Chandragupta gathered many young men from across Magadha and other provinces, men upset over the corrupt and oppressive rule of king Dhana, plus resources necessary for his army to fight a long series of battles. Those men included the former general of Taxila, other accomplished students of Chanakya, the representative of King Porus of Kakayee, his son Malayketu, and the rulers of small states. Preparing to invade Pataliputra, Maurya hatched a plan. He had a battle announced and the Magadhan army mustered from the city to a distant battlefield to engage Maurya's forces. Maurya's general and spies meanwhile bribed the corrupt general of Nanda. He also managed to create an atmosphere of civil war in the kingdom, which culminated in the death of the heir to the throne. Chanakya managed to win over popular sentiment. Ultimately Nanda resigned, handing power to Chandragupta, went into exile and disappeared from history. Chanakya contacted the prime minister, Rakshasa, and made him understand that he owed loyalty to Magadha rather than to the Magadha dynasty, insisting that he continue in office. Chanakya also reiterated that choosing to resist would start a war that would severely affect Magadha and destroy the city. Rakshasa accepted Chanakya's reasoning, and Chandragupta Maurya was legitimately installed as the new King of Magadha. Rakshasa became Chandragupta's chief adviser, and Chanakya assumed the position of an elder statesman. The approximate extent of the Magadha state in the fifth century B.C.E. The Maurya Empire when first founded by Chandragupta Maurya c. 320 B.C.E., after conquering the Nanda Empire when only about twenty years old. Chandragupta extended the borders of the empire southward into the Deccan Plateau circa 300 B.C.E. Ashoka the Great extended into Kalinga during the Kalinga War c. 265 B.C.E., and established superiority over the southern kingdoms. Building India's First Empire Having become the king of one of India's most powerful states, Chandragupta invaded the Punjab. One of Alexander's richest satraps, Peithon, satrap of Media, had tried to raise a coalition against him. Chandragupta managed to conquer the Punjab capital of Taxila, an important center of trade and Hellenistic culture, increasing his power and consolidating his control. |Approximate Dates of Mauryan Dynasty| |Emperor||Reign start||Reign end| |Chandragupta Maurya||322 B.C.E.||298 B.C.E.| |Bindusara||297 B.C.E.||272 B.C.E.| |Asoka The Great||273 B.C.E.||232 B.C.E.| |Dasaratha||232 B.C.E.||224 B.C.E.| |Samprati||224 B.C.E.||215 B.C.E.| |Salisuka||215 B.C.E.||202 B.C.E.| |Devavarman||202 B.C.E.||195 B.C.E.| |Satadhanvan||195 B.C.E.||187 B.C.E.| |Brihadratha||187 B.C.E.||185 B.C.E.| Chandragupta again fought with the Greeks when Seleucus I, ruler of the Seleucid Empire, tried to reconquer the northwestern parts of India, during a campaign in 305 B.C.E., but failed. The two rulers finally concluded a peace treaty: A marital treaty (Epigamia), implying either a marital alliance between the two dynastic lines or a recognition of marriage between Greeks and Indians. Chandragupta received the satrapies of Paropamisadae (Kamboja and Gandhara), Arachosia (Kandhahar), and Gedrosia (Balochistan), and Seleucus I received 500 war elephants that would play a decisive role in his victory against western Hellenistic kings at the Battle of Ipsus in 301 B.C.E. Diplomatic relations established, several Greeks, such as the historian Megasthenes, Deimakos, and Dionysius, resided at the Mauryan court. Chandragupta established a strong centralized state with a complex administration at Pataliputra, which, according to Megasthenes, was "surrounded by a wooden wall pierced by 64 gates and 570 towers—(and) rivaled the splendors of contemporaneous Persian sites such as Susa and Ecbatana." Chandragupta's son Bindusara extended the rule of the Mauryan empire towards southern India. He also had a Greek ambassador, Deimachus (Strabo 1–70), at his court. Megasthenes described a disciplined multitude under Chandragupta, who live simply, honestly, and do not know writing. Chandragupta died after reigning for twenty four years. His son, Bindusara, also known as Amitrochates (destroyer of foes) in Greek accounts, succeeded him in 298 B.C.E. Little information regarding Bindusara exists. Still, some credit him with the incorporation of the southern peninsular India. According to Jain tradition, his mother was a woman by the name of Durdhara. The Puranas assign him a reign of twenty five years. He has been identified with the Indian title Amitraghata (slayer of Enemies), found in Greek texts as Amitrochates. Ashoka the Great Contemporary historians consider Chandragupta's grandson Ashokavardhan Maurya, better known as Ashoka (ruled 273-232 B.C.E.), as perhaps the greatest of Indian monarchs, and perhaps the world. H.G. Wells calls him the "greatest of kings." As a young prince, Ashoka served as a brilliant commander who crushed revolts in Ujjain and Taxila. As an ambitious and aggressive monarch, he re-asserted the Empire's superiority in southern and western India. But his conquest of Kalinga proved the pivotal event of his life. Although Ashoka's army succeeded in overwhelming Kalinga forces of royal soldiers and civilian units, an estimated 100,000 soldiers and civilians died in the furious warfare, including over 10,000 of Ashoka's own men. Hundreds of thousands of people became refugees. When he personally witnessed the devastation, Ashoka began feeling remorse, and he cried, "what have I done?" Although the annexation of Kalinga was completed, Ashoka embraced the teachings of Gautama Buddha, and renounced war and violence. For a monarch in ancient times, this was an historic feat. After Ashoka's renunciation of war to acquire territory, he established friendly relations with the three Tamil dynasties of Chola, Chera and Pandya (known as Tamilakam or "Land of Tamils") at the southern tip of India, the only territory in India not directly under his control. Ashoka implemented principles of ahimsa by banning hunting and violent sports activity and ending indentured and forced labor (many thousands of people in war-ravaged Kalinga had been forced into hard labor and servitude). While he maintained a large and powerful army, to keep the peace and maintain authority, Ashoka expanded friendly relations with states across Asia and Europe, and he sponsored Buddhist missions. He undertook a massive public works building campaign across the country. Over fourty years of peace, harmony and prosperity made Ashoka one of the most successful and famous monarchs in Indian history. He remains an idealized figure of inspiration in modern India. The Edicts of Ashoka, set in stone, have been found throughout the Subcontinent. Ranging from as far west as Afghanistan and as far south as Andhra (Nellore District), Ashoka's edicts state his policies and accomplishments. Although written for the most part in Prakrit, two of them had been written in Greek, and one in both Greek and Aramaic. Ashoka's edicts refer to the Greeks, Kambojas, and Gandharas as peoples forming a frontier region of his empire. They also attest to Ashoka's having sent envoys to the Greek rulers in the West as far as the Mediterranean. The edicts precisely name each of the rulers of the Hellenic world at the time such as Amtiyoko (Antiochus), Tulamaya (Ptolemy), Amtikini (Antigonos), Maka (Magas) and Alikasudaro (Alexander) as recipients of Ashoka's proselytism. The Edicts also accurately locate their territory "600 yojanas away" (a yojanas being about seven miles), corresponding to the distance between the center of India and Greece (roughly 4,000 miles). The Empire divided into four provinces, with the imperial capital at Pataliputra. From Ashokan edicts, the names of the four provincial capitals follow: Tosali (in the east), Ujjain in the west, Suvarnagiri (in the south), and Taxila (in the north). The head of the provincial administration had been the Kumara (royal prince), who governed the provinces as king's representative. Mahamatyas and council of ministers assisted the kumara. That organizational structure mirrored the imperial level with the Emperor and his Mantriparishad (Council of Ministers). Historians theorize that the organization of the Empire was in line with the extensive bureaucracy described by Kautilya in the Arthashastra: A sophisticated civil service governed everything from municipal hygiene to international trade. The expansion and defense of the empire was made possible by what appears to have been the largest standing army of its time. According to Megasthenes, the empire wielded a military of 600,000 infantry, 30,000 cavalry, and 9,000 war elephants. A vast espionage system collected intelligence for both internal and external security purposes. Having renounced offensive warfare and expansionism, Ashoka nevertheless continued to maintain that large army, to protect the Empire and instill stability and peace across West and South Asia. For the first time in South Asia, political unity and military security allowed for a common economic system and enhanced trade and commerce, with increased agricultural productivity. The previous situation involving hundreds of kingdoms, many small armies, powerful regional chieftains, and internecine warfare, gave way to a disciplined central authority. Farmers were freed of tax and crop collection burdens from regional kings, paying instead to a nationally-administered and strict-but-fair system of taxation as advised by the principles in the Arthashastra. Chandragupta Maurya established a single currency across India, and a network of regional governors and administrators and a civil service provided justice and security for merchants, farmers and traders. The Mauryan army wiped out many gangs of bandits, regional private armies, and powerful chieftains who sought to impose their own supremacy in small areas. Although regimental in revenue collection, Maurya also sponsored many public works and waterways to enhance productivity, while internal trade in India expanded greatly due to newfound political unity and internal peace. Under the Indo-Greek friendship treaty, and during Ashoka's reign, an international network of trade expanded. The Khyber Pass, on the modern boundary of Pakistan and Afghanistan, became a strategically-important port of trade and intercourse with the outside world. Greek states and Hellenic kingdoms in West Asia became important trade partners of India. Trade also extended through the Malay peninsula into Southeast Asia. India's exports included silk goods and textiles, spices, and exotic foods. An exchange of scientific knowledge and technology with Europe and West Asia enriched the Empire further. Ashoka also sponsored the construction of thousands of roads, waterways, canals, hospitals, rest-houses, and other public works. The easing of many overly-rigorous administrative practices, including those regarding taxation and crop collection, helped increase productivity and economic activity across the Empire. In many ways, the economic situation in the Maurya Empire compares to the Roman Empire several centuries later, both having extensive trade connections and organizations similar to corporations. While Rome had organizational entities largely used for public state-driven projects, Mauryan India had numerous private commercial entities which existed purely for private commerce. The Mauryas had to contend with pre-existing private commercial entities, hence their concern about keeping the support of those pre-existing organizations. The Romans lacked such pre-existing entities. Emperor Chandragupta Maurya became the first major Indian monarch to initiate a religious transformation at the highest level when he embraced Jainism, a religious movement resented by orthodox Hindu priests who usually attended the imperial court. At an older age, Chandragupta renounced his throne and material possessions to join a wandering group of Jain monks. Chandragupta became a disciple of Acharya Bhadrabahu. In his last days, he observed the rigorous but self purifying Jain ritual of santhara i.e. fast unto death, at Shravan Belagola in Karnatka. His successor, Emperor Bindusara, preserved Hindu traditions and distanced himself from Jain and Buddhist movements.Samprati, the grandson of Ashoka also embraced Jainism. Samrat Samprati had been influenced by the teachings of Jain monk Arya Suhasti Suri, building many Jain Temples across India. Some of them still stand in towns of Ahmedabad, Viramgam, Ujjain & Palitana. Just like Ashoka, Samprati sent messengers & preachers to Greece, Persia & Middle-East for the spread of Jainism. But till date no research has been done in this area. Thus, Jainism became a vital force under the Mauryan Rule. Chandragupta & Samprati, are credited for spread of Jainism in Southern India. Lakhs of Jain Temples & Jain Stupas were erected during their reign. But due to lack of royal patronage & its strict principles, along with rise of Shankaracharya & Ramanujacharya, Jainism, once the major religion of southern India, declined. But when Ashoka embraced Buddhism, following the Kalinga War, he renounced expansionism and aggression, and the harsher injunctions of the Arthashastra on the use of force, intensive policing, and ruthless measures for tax collection and against rebels. Ashoka sent a mission led by his son and daughter to Sri Lanka, whose king Tissa adopted Buddhist ideals, making Buddhism the state religion. Ashoka sent many Buddhist missions to West Asia, Greece and South East Asia, and commissioned the construction of monasteries, schools and publication of Buddhist literature across the empire. He built as many as 84,000 stupas across India, and increased the popularity of Buddhism in Afghanistan. Ashoka helped convene the Third Buddhist Council of India and South Asia's Buddhist orders, near his capital, a council that undertook much work of reform and expansion of the Buddhist religion. Buddhism continued to thrive after Ashoka for nearly 600 years until a combination of events eclipsed the faith into near annihilation in India. First, Buddhism declined in the wake of the invasion of the White Huns during the fifth century C.E. The decline accelerated in the twelfth century C.E. with the fall of the Pala dynasty and Muslim destruction of temples and monasteries. Second, a golden age of Sanskrit during the Gupta dynasty (fourth to sixth centuries C.E.), that restructured and revitalized Gupta civilization in accord with Hinduism, forced Buddhism into recession. While himself a Buddhist, Ashoka retained the membership of Hindu priests and ministers in his court, and he maintained religious freedom and tolerance although the Buddhist faith grew in popularity with his patronage. Indian society began embracing the philosophy of ahimsa, and given the increased prosperity and improved law enforcement, crime and internal conflicts reduced dramatically. Due to Buddhism's and Jainism's inherent anti-caste teaching and philosophy, the caste system and traditional practice of discrimination among the social groups fell into disfavor as Hinduism began absorbing the ideals and values of Jain and Buddhist teachings. Social freedom began expanding in an age of peace and prosperity. Few architectural remains of the Maurya period have been found. Remains of a hypostyle building with about eighty columns of a height of about ten meters have been found in Kumhrar, five kilometers from Patna Railway station, one of the few sites Mauryas located. The style resembles Persian Achaemenid architecture. The grottoes of Barabar Caves provide another example of Mauryan architecture, especially the decorated front of the Lomas Rishi grotto. The Mauryas offered those to the Buddhist sect of the Ajivikas. The Pillars of Ashoka, often exquisitely decorated, constitute outstanding examples of Maurya architecture with more than forty spread throughout the sub-continent. Ashoka was followed for fifty years by a succession of weaker kings. Brhadrata, the last ruler of the Mauryan dynasty, held territories that had shrunk considerably from the time of emperor Ashoka, although he still upheld the Buddhist faith. Sunga coup (185 B.C.E.) Brhadrata was assassinated in 185 B.C.E. during a military parade by the commander-in-chief of his guard, the Brahmin general Pusyamitra Sunga, who then took over the throne and established the Sunga dynasty. Buddhist records such as the Asokavadana reveal that the assassination of Brhadrata and the rise of the Sunga empire led to a wave of persecution for Buddhists, and a resurgence of Hinduism. Pusyamitra may have been the main instigator of the persecutions, although later Sunga kings seem to have been more supportive of Buddhism. Other historians point to a lack of archaeological evidence supporting the claim of persecution of Buddhists. Establishment of the Indo-Greek Kingdom (180 B.C.E.) The fall of the Mauryas left the Khyber Pass unguarded, and a wave of invasions followed. The Greco-Bactrian king, Demetrius, capitalizing on the break-up, he conquered southern Afghanistan and Pakistan around 180 B.C.E., forming the Indo-Greek Kingdom. The Indo-Greeks maintained control the trans-Indus region, conducting campaigns into central India, for about a century. Buddhism flourished under them, one of their kings Menander becoming a key promoter of Buddhism. He established the new capital of Sagala, the modern city of Sialkot. The extent of their domains, and the length of their rule, remain unclear. Numismatic evidence indicates that they controlled territory in the subcontinent until the beginning of the Common Era. The Scythian tribes, renamed Indo-Scythians, brought about the demise of the Indo-Greeks in 70 B.C.E., seizing the region of Mathura, and Gujarat. Ancient Near East Pre-Columbian Americas (prehistory) |see also: World history · Ancient maritime history · Axial Age · Iron Age · Historiography · Ancient literature · Ancient warfare · Cradle of civilization| - Mauryan art - ↑ Peter Turchin, Jonathan M. Adams, and Thomas D. Hall. East-West Orientation of Historical Empires. University of Connecticut, November 2004. - ↑ Roger Boesche (2003). "Kautilya’s Arthashastra on War and Diplomacy in Ancient India", The Journal of Military History 67 (p. 12). - ↑ Colin McEvedy and Richard Jones (1978), "Atlas of World Population History", Facts on File (p. 342-351). New York. - ↑ Radhakumud Mookerji, Chandragupta Maurya and His Times (Motilal Banarsidass Publ., 1998, ISBN 8120804058). - ↑ MSSU, Source:Megasthenes fragment XXVII. Retrieved September 8, 2008. - ↑ Nilakantha Shastri, Age of the Nandas and Mauryas (Delhi, Motilal Banarsidass, 1967). - ↑ Burjor Avari, India: The Ancient Past (Routledge, ISBN 0415356156). - ↑ S. Dhammika, Edicts of Ashoka, 13th Rock Edict. - ↑ Sarat Chandra Roy, Man in India (Calcutta: A.K. Bose, 1921). - ↑ Romesh Chunder Dutt, Vincent Arthur Smith, Stanley Lane-Poole, Stanley Lane-Poole, H. M. Elliot, William Wilson Hunter, William Wilson Hunter, Alfred Comyn Lyall, and A. V. Williams Jackson, History of India (London: Grolier Society, 1906), 204. - ↑ Vikramaditya S. Khanna, The Economic History of the Corporate Form in Ancient India. Retrieved September 8, 2008. - ↑ "Butkara I," Facenna. - ↑ "L'age d'or de l'Inde Classique," p.23. - ↑ "L'age d'or de l'Inde Classique," p.22. - ↑ Sir John Marshall, A Guide to Sanchi (Eastern Book House, 1990, ISBN-10 8185204322), 38. - ↑ E. Lamotte, History of Indian Buddhism, (Institut Orientaliste: Louvain-la-Neuve 1988). - ↑ Romila Thapar, Asoka and the Decline of the Mauryas (Oxford University Press, 1960), 200. - Avari, Burjor. 2007. India, the Ancient Past: A History of the Indian Sub-Continent from c. 7000 B.C.E. to AD 1200. London: Routledge. ISBN 9780415356152. - Fuller, J. F. C. 2004. The Generalship of Alexander the Great. New York, N.Y.: Da Capo Press. ISBN 9780306813306. - Jackson, A. V. Williams, Romesh Chunder Dutt, Vincent Arthur Smith, Stanley Lane-Poole, H. M. Elliot, William Wilson Hunter, and Alfred Comyn Lyall. 1987. History of India. New Delhi: Asian Educational Services. OCLC 50629155. - Kauṭalya, and L. N. Rangarajan. 1992. The Arthashastra. New Delhi: Penguin Books India. ISBN 9780140446036. - Lamotte, Étienne. 1988. History of Indian Buddhism from the Origins to the Śaka era. Louvain-la-Neuve: Inst. Orientaliste. ISBN 9789068311006. - Marshall, John Hubert. 1918. A Guide to Sanchi. Calcutta: Superintendent Government Printing, India. OCLC 4837154. - Mookerji, Radhakumud. 1966. Chandragupta Maurya and his Times. Delhi: Motilal Banarsidass. ISBN 9788120804050. - Morkot, Robert. 1996. The Penguin Historical Atlas of Ancient Greece. London, England: Penguin Books. ISBN 9780140513356. - Roy, Sarat Chandra. Man in India. Calcutta: A.K. Bose, 1921. OCLC 32931485. - Thapar, Romila. 1961. Aśoka and the Decline of the Mauryas. London: Oxford University Press. OCLC 736554. All links retrieved September 26, 2014. - The Mauryan Empire at All Empires. - Livius.org: Maurya dynasty. - Mauryan Empire of India. - Extent of the Empire. - The Mauryan Empire from Britannica. - The Edicts of King Ashoka. New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here: Note: Some restrictions may apply to use of individual images which are separately licensed.
<urn:uuid:88644208-ec8f-41b0-95f6-a75c08207962>
CC-MAIN-2014-49
http://www.newworldencyclopedia.org/entry/Maurya_Empire
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931014369.10/warc/CC-MAIN-20141125155654-00062-ip-10-235-23-156.ec2.internal.warc.gz
en
0.917797
6,969
4.03125
4
In late April 2015, Calbuco volcano in southern Chile spewed at least 210 million cubic meters (7,420 million cubic feet) of ash and rock during two explosive eruptions. A third eruption, reported to have occurred on April 30, added to the volume of material that already blanketed the landscape. A significant amount of Calbuco’s ejecta came to rest in neighboring Argentina. But some of that material didn’t stay put for long. On May 3, 2015, the Moderate Resolution Imaging Spectroradiometer (MODIS) on NASA’s Aqua satellite acquired the above image of ash resuspended in the atmosphere—that is, it was picked up by low-level winds like debris in a dust storm. Calbuco (not pictured) is located about 100 kilometers (60 miles) southwest from the lower-left corner of this image. The resuspension of volcanic ash is not a new phenomenon. For example, satellites have observed wind-blown ash during the 2010 eruption of Eyjafjallajökull volcano in Iceland, and also from old, loose volcanic deposits from past eruptions in Alaska. Resuspended airborne ash, while not fresh from its volcanic source, can still pose a hazard to aircraft by clogging up engines. Other ejecta from Calbuco moved north toward Villarrica—another volcano in Chile that has seen renewed activity in 2015. On April 27, 2015, the Operational Land Imager (OLI) on Landsat 8 acquired the image below, which shows a small steam or ash plume rising from Villarrica. But the brown, airborne material surrounding the volcano, and presumably some of the brown material on its flanks, is from Calbuco, located about 220 kilometers (140 miles) to the south. NASA image courtesy Jeff Schmaltz, LANCE/EOSDIS MODIS Rapid Response Team at NASA GSFC. Landsat 8 image by Jesse Allen, using Landsat data from the U.S. Geological Survey. Caption by Kathryn Hansen.
<urn:uuid:88fa66c1-3a8d-4200-9bd2-8927f1f3e0c2>
CC-MAIN-2021-43
https://earthobservatory.nasa.gov/images/85834/calbuco-ash-on-the-move
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588398.42/warc/CC-MAIN-20211028162638-20211028192638-00602.warc.gz
en
0.937908
424
3.65625
4
The Red-Sea Trough (RST) is a lower-level trough extending from the tropical low-pressure to the Levant. Its annual occurrence in the Levant is 20%, mostly in the autumn. It produces dry weather, but occasionally causing local showers and floods. During winter, the dominant synoptic system over the eastern Mediterranean is the Cyprus low (CL). Previous studies showed that some CLs form within pre-existing RSTs, through a tropical–extratropical interaction. This study is the first comprehensive climatological framework of such formation events, analyzing their occurrence, seasonality, and the resulting rainfall in Israel. The study identified and analyzed CLs formed within the domain 31°–35°N, 30°–36°E within an RST that was detected during the preceding 24 hr. We used the 6-hourly ERA-Interim database, with 0.75° × 0.75° resolution, during 1979–2017, and identified 104 formation events, which constitute 10% of the CLs. Most formation events occur during fall and early winter, similarly to the RST. Eighty four percent of them formed during the evening or night, and almost two thirds of the CLs disappeared temporarily at noon and regenerated afterwards. This is attributed to the sea/land diurnal oscillation. Most of the formed CLs were shallow, with little rain, but some became major storms, like ‘Alexa’, which caused extreme snowing in Jerusalem, in December 2013. The formation scenarios were divided into four categories, according to the location and propagation of the 500-hPa trough. The first is characterized by a closed cyclone approaching from southwest, often connected to active RSTs. In the second, a trough is deepening from the northern sector, possibly a polar intrusion. In the third, the most populated, a trough is approaching from west. The fourth category contains events with no upper-level support. Composite maps indicate that upper-level positive vorticity advection triggered CL formations, on top of pre-existing above-normal lower-level temperatures, imparted by the RST. All Science Journal Classification (ASJC) codes - Atmospheric Science
<urn:uuid:0c4c292b-e719-4121-8746-1dc7b7689214>
CC-MAIN-2023-40
https://cris.iucc.ac.il/en/publications/formation-of-cyclones-over-the-east-mediterranean-within-red-sea--2
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00858.warc.gz
en
0.951051
453
3.25
3
- Unit of Measure : Facilitated by the panel of qualified and hard-working professionals, we are competent to produce, create and export Step Up Step Down Transformers. These devices are used for pacing up and down voltage as requisite by the electrical device. Due to their elevated power and potency, these goods are utilized in diverse industries and companies. Step Up Step Down Transformers are distributed to the end users in an prearranged time period with the help of our practiced carriage and freight workers. Other Details :-Step Up Transformer A step-up transformer is the individual whose secondary voltage is larger than its principal voltage. This type of transformer "steps up" the voltage practical to it. For example, a step up transformer is required to utilize a 220v product in a country with a 110v supply. Step Down Transformer Step Down Transformer is the conflicting of step-up transformer, and utilized to run for example a 110v product in a country with a 220v mains supply. Servokon provides a complete variety of high quality Step Up/Step Down Transformers. This kind of transformer is fabricated of 2 or more coils of shielded wire wound in the region of a core made of iron. When voltage is supplied to principal coil it magnetizes the iron core, which encourages a voltage in the resultant coil. The turn ratio of the 2 sets of windings ascertains the quantity of voltage transformation. With a step up transformer or step down transformer the voltage ratio between principal and resultant will mirror the "turns ratio". A sensible application of this 2 to 1 turns ratio would be a 480 to 240 voltage step down. If the contribution be 440 volts then the outcome would be 220 volts. The ratio within input and output voltage will reside stable. Transformers should not be activated at voltages elevated than the prescribed rating, but may be activated at lesser voltages than rated. Because of this it become likely to do some non-standard functions using benchmark transformers. Single phase transformers 1 kva and generously proportioned may also be overturn linked to step-down or step-up voltages. The main parts for voltage transformation are the transformer's core and coil. The wadding is positioned between the twists of wire to avoid shocking to one another or to earth. This is usually encompassed of mylar, kraft paper, varnish or other materials. As a transformer has no working pieces, it will characteristically have a life expectation between 20 and 25 years. Applications of Step Up/Step Down Transformers :- - Imported machinery working on 110v - Imported electrical devices - Printing Machine - Extended service life of 20 to 25 years - No running/moving parts - Exceptional turns ratio - Less power consumption - Wadding in between the twists of wire to avoid shorting AN-6 , INDUSTRIAL AREA , MG ROAD, Ghaziabad, Uttar Pradesh, 201003, India
<urn:uuid:8cc61ee0-f647-45d6-929a-06531f1cda96>
CC-MAIN-2019-04
http://m.servokonstabilizer.com/step-up-step-down-transformer-1370343.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657557.2/warc/CC-MAIN-20190116175238-20190116201238-00423.warc.gz
en
0.89093
605
2.828125
3
April is Parkinson’s Awareness Month, a time to spread the word about this degenerative disorder that attacks the central nervous system. According to the National Parkinson Foundation, each year in the United States, 50,000 to 60,000 new cases of Parkinson’s Disease (PD) are diagnosed. More than one million people in the U.S., and between four and six million worldwide, live with the disease. PD is caused by a decreased production of the chemical dopamine in the part of the brain called the basal ganglia, but there is no clear reason for the change. It is typically diagnosed between the ages of 50 and 60, and is slightly more common in males. However, Michael J. Fox has a type of Parkinson’s that has an early age of onset. The early signs of Parkinson’s disease are subtle and it may take a few years before diagnosis is reached. Warning signs of PD include: - Small handwriting - Loss of smell - Difficulty swallowing and chewing - Speaking with a soft voice - Minimal facial expressions (masked face) - Trouble moving, swinging arms and walking Later stage symptoms associated with Parkinson’s are: - Tremor in hands, arms, legs or face - Stiffness in the arms, legs or trunk - Slowness in movement - Impaired balance and coordination Eventually, PD symptoms may progress, causing a stooped posture and short, fast steps, which contributes to fall risk. While Parkinson’s is considered a progressive disease, many of the symptoms may be improved or delayed with the use of medications, deep brain stimulators and exercise. Through exercise, the brain establishes new neural pathways for movement, or neuroplasticity. The most important kinds of exercise to nourish neuroplasticity, maintain strength and mobility and reduce the risk of falls are: - Exercises involving large movements, like walking. - Activities that involve doing something new, such as problem solving through an obstacle course. - Combining all exercises with other tasks, like counting, talking or looking for objects. - Strengthening and stretching the legs to maintain mobility and the back muscles to improve posture. Exercises can be individualized through work with a physical therapist or performed in group classes within the community. Some beneficial classes include Delay the Disease, Tai Chi and Silver Sneakers. Find a class in your area or visit a physical therapist to maintain function and quality of life.
<urn:uuid:df520d04-fe1e-4559-aa72-bb17437c4f50>
CC-MAIN-2015-06
http://www.dmu.edu/dose/2014/04/parkinsons-awareness-month/
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115862432.8/warc/CC-MAIN-20150124161102-00195-ip-10-180-212-252.ec2.internal.warc.gz
en
0.94283
512
3.40625
3
Sussex Counselling & Psychotherapy Report by the Women and Equalities Committee exposes the shocking scale of sexual harassment and sexual violence that is not being tackled effectively in English schools. The report outlines evidence that: - Almost a third (29%) of 16-18 year old girls say they have experienced unwanted sexual touching at school. - Nearly three-quarters (71%) of all 16-18 year old boys and girls say they hear terms such as "slut" or "slag" used towards girls at schools on a regular basis. - 59% of girls and young women aged 13-21 said in 2014 that they had faced some form of sexual harassment at school or college in the past year. Everyday Sexism Project Young people told the Committee that sexual harassment has become a normal part of school life with "calling women bitches and stuff like that… a common thing that you see in school, on a daily basis really." This view was supported by evidence from Laura Bates of the Everyday Sexism Project who described sexual harassment and sexual violence in schools as "a widespread, regular and common problem [and] something that the majority of girls are experiencing." The report finds an alarming inconsistency in how schools deal with sexual harassment and violence, which is mostly targeted at girls, a disregard for existing national and international equality obligations, and a lack of guidance and support for teachers. MPs heard evidence that many schools are under-reporting incidents and often failing to take them seriously. The Committee was told by young people that their reports would be "forgotten about really easily and no action will be taken about what happened." Academics and specialists working in schools warned that sexual harassment and sexual violence was too often accepted as the norm by both staff and students. Despite calls from parents, teachers and young people for action to address sexual harassment and sexual violence in schools, the Committee found that neither OFSTED nor the Department for Education has a coherent plan to tackle this issue and to monitor the scale of the problem.
<urn:uuid:8f68699f-3385-4e14-a36e-3553c7e81c62>
CC-MAIN-2018-22
https://sussex-counselling.co.uk/index.php/articles-of-interest/categories/children-and-young-people
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863684.0/warc/CC-MAIN-20180520190018-20180520210018-00287.warc.gz
en
0.974251
414
2.578125
3
This example is becoming a more complicated again and it will not be discussed at the same level of detail as the previous ones assuming some familiarity with GenerativeComponents at this point. If you are not familiar with GenerativeComponents yet start with the previous examples first. We start with setting up a new empty .gct file roofexample02.gct as usual. For more examples refer to the GenerativeComponents Documentation page. This time we build a landscape surface to support and adjust our bridge design. Create a BSplineSurface.ByPoles using 12 ControlPoints ideally in a grid of 3x4. In one direction at least 4 are advisable to be able to adjust the surface not just to concave and convex settings but also s-curved cross sections for more interesting conditions for the bridge. Once the surface is created, add support Points just like in the previous example but this time they will be placed onto the surface to follow it when the landscape changes. We can do so by creating Point.ByUVParameterOnSurface. or better just using the point shortcut holding down the ctrl key and snapping to the surface. Once the points are placed one recognizes that they are not necessarily coplanar in their pairs. So we need to create an offset point each for the pairs to compensate for this condition. The offset point will have its origin in one of the points of the pair and its X and Y value set to 0 and its Ztranslation value set to the Ztranslation value of the other point in the pair. That way those two points are always level and we can connect them with the support line. Then we can place the familiar CoordinateSystem onto the respective Lines to use their XDirection as the direction for creating the tangent lines for the bridge curve connecting the two supports. For a detailed explanation of this step see the example before. Now to construct a pylon to support this bridge through a cable fan we need to create some sort of placeholder of a structurally determined position. We can work with an approximation of the center of gravity for now using a Series of points along the curve of the bridge and then using the centroid position of all the points in the set. This gives us the upper most point for the pylon direction. To get the point on the landscape we can try to project the mid point of the bridge curve line onto the BSplineSurface. Now we can connect the two points and derive the direction from the line. Using the direction we can create a Line by StartPointDirectionandLength to project upwards beyond the direction line to create the highpoint of the pylon. The length factor depends on many factors of course, but for now let’s choose it to be half the length of the bridge curve. To get the fan of lines we can connect the end point of the pylon with the set of points along the curve. Creating the roadway was accomplished by creating a BSplineSurface using the sweep update method. Next we adjust the pylon settings so it is easy to add more pylons while the distribution adapts. We accomplish this by creating BSplineCurve segments each with its own pylon construct and cable point array. This way when adding more curve segments along the original BSplineCurve the number of pylons also increases. Switching back to a single pylon now with an improved landscape rendition. Here it is nicely viewable how the pylon leans against the curve. A close up view. Setting the number of pylons to 6 in the same context. Super imposing several settings onto the same image. Changing the parameters
<urn:uuid:969717dd-7fc1-4ca6-8cec-137678c39d99>
CC-MAIN-2022-33
https://communities.bentley.com/products/products_generativecomponents/w/generative_components_community_wiki/2017/landscape-bridge-example
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00745.warc.gz
en
0.907836
758
2.515625
3
You must be wondering why lemon water is all the rage these days. Well, it’s because of the numerous health benefits of lemon you probably have been overlooking all your life. This citrus fruit, native to South Asia, is widely used and can be easily consumed in fun and creative ways through desserts, savory dishes, and even beverages. Looking at the nutrition value of lemon, you can identify a few health benefits on your own. You can’t? Well, we’ve got you covered: If life throws you a lemon – make lemonade.Joan Collins Lemon is immunity Booster! Vitamin C, present in lemons, help improve immunity through fighting against free radicals. It encourages the formation of white blood cells- leukocytes which keep your body protected from foreign substances and diseases. Thus, lemon plays a significant role in protecting your cells against damage. By the way, as Oscar Wilde said, grapefruit is just a lemon that saw an opportunity and took advantage of it. Therefore, you can have a look at the grapefruit benefits to further assist your immune system. Eat a Lemon for a Stronger Heart: According to research, consuming fruits and vegetables rich in vitamin C lowers heart disease and stroke risk. Luckily, one lemon carries around 31 mg of vitamin C, which is 51% of the reference daily intake (RDI). Being a super antioxidant, Vitamin C in lemon helps reduce the risk of heart diseases and strokes. Furthermore, folic acid, found in lemons, helps prevent strokes and reduce the risk of cardiovascular diseases by lowering homocysteine levels. Moreover, plant compounds- Hesperidin and Diosmin- have proven to reduce cholesterol levels on consumption. Further organic healthinizers that sensationally improve the health of your heart, are: - Apples – good for your heart - Peaches and Nectarines – positive impact on your heart health - Mango is important for a healthy heart - Grapes improve the health of your heart - Bananas support the health of your heart Helps in Weight Loss: Lemon water is widely associated with weight loss. It helps improve hydration, metabolism and makes you feel full. As a result, all this leads to a reduction in weight gain. In addition, the acid in lemons helps break down your food faster. The presence of Polyphenols also helps in weight management. Prevents Kidney Stones: The citric acid present in lemons helps break down small stones. Moreover, it lowers the acidity of urine and thus, reduces the risk of kidney stones formation. Citrate, which is a component of the acid, is primarily what helps reduce the kidney stones. Improves Digestive Health: Lemons are filled with carbs and fibers. The primary soluble fiber- Pectin, helps improve gut health and shows digestion sugars and starches. It also makes the breakdown of food more efficient. Other organic healthinizers that you can add to your diet to improve your digestive health, are: - Pineapple helps in digestion - Watermelon improves digestion - Peaches and Nectarines contribute to smoothly running digestion - Apples prebiotic effect - Mango supports digestive health - Bananas healthinize your digestive system - Grapefruit assists your digestion Say Hello to Healthier Skin! Lemons help you load up on Vitamin C, which is excellent for the skin. It reduces wrinkles, skin damage, and premature aging. As it is an antioxidant, it helps reduce dark spots and makes the skin brighter and clearer! Moreover, the high levels of pH help fight oily skin. Additional organic healthinizers that improve the health of your skin, are: - Watermelon – good for skin and hair - Honey – supports good and healthy skin - Peaches and nectarines protect your skin - Bananas for instant glowing skin - Cherries – improve the health of your skin - Mango – the natural skin glow maker Equally important, Lemon nutrition facts are amazing as it is an excellent source for Vitamin C & B6, Folate, Iron, Potassium, Sodium and Magnesium; and all that in such low calories. So, how about benefitting from the amazing lemon health benefits? What is the best time to consume lemons to obtain its health advantages? In general lemons, lemon juice, lemon water, etc. can be consumed at any time of the day. However, there are several recommendations that you should be aware of in order to prevent possible lemon side effects. - First Lemon Recommendation: Especially in the morning, do not eat lemon or drink pure lemon juice on an empty stomach. Better ensure that you first drink a cup of tea or a glass of water. Of course, you can pimp your first cup of tea or glass of water with a lemon slice or a splash of lemon juice. - Second Lemon Recommendation: Do not eat pure lemon or drink pure lemon juice before going to sleep, because lemon has an awake effect. Side Effects of Lemon Lemons are causing higher levels of pH. Therefore, eating lemons or drinking raw lemon juice can cause several undesired side effects for your body health: - Side effect 1: Brushing your teeth after eating a lemon or drinking raw lemon juice can demage the tooth enamel. - Solution: After cosuming a lemon, do not brush your teeth for at least 30 minutes. In this timeframe the level of pH in your mouth will get back to normal. - Side effect 2: If you have stomach issues, such as gastrities or ulcer, eating a raw lemon or drinking pure lemon juice can have negative impact. - Solution: Do not consume lemon or lemon juice in its pure form. Better use it as a suplement of vinegar or dissolve it in tea or water. Health Benefits of Lemon – The Final Words We know it is a lot to take in, but after taking your time and reading these lemon benefits, we are sure you are as convinced as we are to add an extra tablespoon of lemon juice in salads next time. Not only that, always try utilizing the whole lemon- the fibers, peel, and everything in between to fully capitalize on the benefits of lemon. Enjoy the health benefits of consuming lemon every day!Organic Healthinizer Team
<urn:uuid:3c7d3daa-f0ff-4774-8495-be22d595bffe>
CC-MAIN-2021-31
https://www.organichealthinizer.com/health-benefits-of-lemon/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152144.81/warc/CC-MAIN-20210726152107-20210726182107-00073.warc.gz
en
0.916785
1,323
2.765625
3
By Matt Walker: It is one of the great questions of the past 150 years. Did God or evolution drive the emergence of life in all its resplendent variety? This blog, the US education system, and even American politics have to a degree all become dominated by the debate at various times, which goes to the heart of our world view and our ideas of where we, and all other forms of life, came from. But I’ve just come across an intriguing piece of research that may, to coin a phrase, put an evolutionary cat among the believing flock of creation scientists, many of whom believe in the literal account of Genesis. One scientist has decided to use creation science to test the validity of evolution. Because, he says, if it turns out that creation science proves evolution, then by its own logic, it will have to reject its own canon of research that previously denied it. It’s a clever idea, because it once again puts evidence, rather than faith, at the centre of the debate. Science cannot prove that God doesn’t exist, or that God may have once put in place all known physical laws and processes that shaped the universe and everything in it. Science cannot challenge faith, which by its very nature, does not require evidence many scientists are religious people who see no contradiction between their faith and work and many people of faith see no contradiction with what science can explain. But science does require evidence, and this evidence allows us to explain, with increasing accuracy, how the world around us works. Read the rest of the article here >> BBC – Wonder Monkey: Can religious teachings prove evolution to be true?.
<urn:uuid:12d6edd6-c3e8-4857-95a3-bbe470830595>
CC-MAIN-2018-22
https://james.pybus.me/2011/07/06/bbc-wonder-monkey-can-religious-teachings-prove-evolution-to-be-true/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867841.63/warc/CC-MAIN-20180526170654-20180526190654-00210.warc.gz
en
0.957553
336
2.78125
3
Cloudseeding is the technique of inducing rain from a cloud, usually by dropping suitable particles into clouds containing supercooled water in an attempt to cause them to dissipate, modify their structure, or alter the intensity of associated phenomena, such as wind speed or hail. Natural rainfall occurs when supercooled cold water contacts particles of dust, salt or sand forming ice crystals. The ice crystals provide a nucleus (tiny solid or liquid particles, suspended in the atmosphere) around which more water droplets can attach, increasing the size of the droplet, or in colder air snow flakes. When the droplet or snow flake, becomes large enough, it falls as snow or rain. Cloudseeding got its start in 1946 when Dr. Vincent J. Schaefer, working at the General Electric Laboratory in New York, was involved with research to create artificial clouds in a chilled chamber. During one experiment, Schaefer thought the chamber was too warm and placed dry ice inside to cool it. Water vapor in the chamber formed a cloud around the dry ice. The ice crystals in the dry ice had provided a nucleus around which droplets of water could form inside the chamber. This is the cold rain process. Cloud seeding is thought to increase the number of these nuclei available to take greater advantage of the moisture in the cloud and form raindrops that otherwise would not have formed. Another process, the warm rain process, usually involves clouds in tropical regions that never reach the freezing point. In these clouds, raindrops form around a hygroscopic nuclei, a particle that attracts water such as salt or dust. Small droplets collide and coalesce unti l they form a drop large and heavy enough to fall. To encourage the warm rain process, calcium chloride is usually used to provide the nucleus for raindrop formation. For the cold rain process, silver-iodide (introduced from the air or ground) can be used as a nuclei because its structure is very similar to ice crystals. Dry ice introduced (at -80°C) from the air into cloud lowers the air temperature so that (particularly at temperatures below -40°C) some of the supercooled water droplets are converted into ice crystals which then grow by collisions with further droplets Seeding of tropical cumuli sought to exploit the latent heat released by freezing as well. This strategy of dynamic seeding assumed that the additional latent heat would add buoyancy, strengthen the updrafts, ensure more low-level convergence, and ultimately cause explosive growth of properly selected cumuli. Other substances, e.g. common salt or fine water droplets, may also be used to encourage coalescence. Natural seeding may be significant in cases where ice crystals from a high 'releaser' cloud (e.g. altostratus or cirrostratus) fall into a supercooled water 'spender' cloud (e.g. nimbostratus) and encourage ice-crystal growth. Most methods of limiting the development of hail rely on cloud seeding using ice nucleants, or with silver oxide. In theory, hail damage can be reduced by 25% through cloud seeding. However, despite many claims no quantifiable results have been produced in attempts to minimize damaging hail.
<urn:uuid:b00376a6-da12-47c8-9a82-a44aee1fa52d>
CC-MAIN-2021-10
https://www.woespana.es/reports/wxfacts/Cloud-seeding.htm
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358956.39/warc/CC-MAIN-20210227114444-20210227144444-00559.warc.gz
en
0.92714
672
3.796875
4
Tongs (?), n. pl. [OE. tonge, tange, AS. tange; akin to D. tang, G. zanga, OHG. zanga, Don. tang, Sw. tng, Icel. tng, Gr. to bite, Skr. da, da. &root;59. Cf. Tang a strong taste, anything projecting.] An instrument, usually of metal, consisting of two parts, or long shafts, jointed together at or near one end, or united by an elastic bow, used for handling things, especially hot coals or metals; -- often called a pair of tongs. © Webster 1913.
<urn:uuid:461dd67a-0fb3-44b9-9dd2-91a59aa583ae>
CC-MAIN-2021-49
https://m.everything2.com/title/Tongs
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964360803.6/warc/CC-MAIN-20211201143545-20211201173545-00506.warc.gz
en
0.76181
141
3.109375
3