text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
1.08k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
The NetBIOS Name Service (NBNS) provides a means for hostname and address mapping on a NetBIOS-aware network. The NetBIOS over TCP/IP protocols (including NBNS) are described in the Internet Engineering Task Force (IETF) Request for Comments RFC1001 and RFC1002. These protocols do not specify a method for authenticating communications, and as such, machines running NetBIOS services are vulnerable to spoofing attacks. NetBIOS is a set of defined software interfaces for vendor-independent PC networking and is primarily used on Microsoft Windows computers. NetBIOS is enabled by default on Windows95 and Windows98 machines. An attacker sending spoofed "Name Release" or "Name Conflict" messages to a victim machine could force the victim to remove its own (legitimate) name from its name table and not respond to (or initiate) other NetBIOS requests. This renders the victim unable to communicate with other NetBIOS hosts, thus resulting in a denial-of-service attack. An attacker can cause a victim's machine to refuse all NetBIOS network traffic, resulting in a denial of service. Block NetBIOS services at the the network perimeter. NetBIOS services include Note that this prevents external hosts from sending NetBIOS Name Service traffic to internal machines, but it does not prevent local users from exploiting this vulnerability. Furthermore, the CERT/CC recommends that sites, even those which do not use NetBIOS services, block all ports unless they are explicitly needed. Note that no patch is being furnished for Win9x systems; Microsoft has publicly stated that patching these systems to disable name conflict resolution would cause more problems than it would help prevent, especially in networks with large numbers of Win9x systems. RFC 1001, "Protocol Standard for a NetBIOS Service on a TCP/UDP Transport: Concepts and Methods": RFC1002, "Protocol Standard for a NetBIOS Service on a TCP/UDP Transport: Detailed Specifications": This document was written by Jeffrey P. Lanza and Chad Dougherty. |Date First Published:||2000-09-26| |Date Last Updated:||2000-11-29 16:44 UTC|
<urn:uuid:2c07a325-37ec-431f-b9eb-2513cde9cde0>
CC-MAIN-2020-50
https://kb.cert.org/vuls/id/32650
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141183514.25/warc/CC-MAIN-20201125154647-20201125184647-00473.warc.gz
en
0.725437
465
2.96875
3
Even more, play encourages creativity – and is tied more to success later in life than IQ. There is a strong connection between the practice of play and the emotional and cognitive development of the brain. When we play – whether it's a physical activity or playing sports, painting or drawing, building blocks or simply laughing with others – it reinforces patterns in your brain, optimizing the learning process, and improves your emotional well-being. Give the Gift of Play A Lifelong Gift Donate to the Toy Lending Library today. Help create more opportunities for children to play and learn for free. Sponsor a box today for just $50 for a year! Benefits of Play Unstructured, open-ended play provides benefits for children that worksheets or screen time can't achieve. Play helps coordination, balance and motor skills. Play helps children develop new ideas and creativity, which lead to enhanced confidence and the resiliency to face future challenges. Play relieves stress, and lets children work through anxiety and fears. Play lets children make their own decisions, and make connections between choices and natural consequences.
<urn:uuid:309f1449-be0b-46b4-a2ed-d28fcc4b2e32>
CC-MAIN-2020-45
https://www.toylendinglibrary.com/why-play
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878921.41/warc/CC-MAIN-20201022053410-20201022083410-00214.warc.gz
en
0.927042
233
3.40625
3
CBSE Class 8 Matematics Sample Paper SA 2 2013. Revision worksheets, Sample papers, Question banks and easy to learn study notes for all classes and subjects based on CBSE and CCE guidelines. Students and parents can download free a collection of all study material issued by various best schools in India. The study material has been carefully compiled by the best teachers in India. The students should practice the questions database to get better marks in examination. Please refer to other links for free download of high quality study material. Based on CBSE and CCE guidelines. Based on the same pattern as released by CBSE every year. Study material for final/ term/ SA1/ SA2 Examinations conducted by various schools affiliated to Central Board of Secondary Education (CBSE) in India and abroad. CBSE Study material has been compiled to help students preparation which will helps the students to concentrate more in areas which carry more marks. Please refer to attached file for CBSE Class 8 Matematics Sample Paper SA 2 2013
<urn:uuid:c47ca037-42f2-4b12-aed1-c00119bec687>
CC-MAIN-2015-06
http://www.studiestoday.com/sample-papers-mathematics-cbse-class-8-matematics-sample-paper-sa-2-2013-173756.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115869320.77/warc/CC-MAIN-20150124161109-00227-ip-10-180-212-252.ec2.internal.warc.gz
en
0.957924
207
2.96875
3
There are certain cruel realities that are seen in schools everyday. Teachers see the multitude of barriers students face from bullying, to poverty, to learning difficulties. Schools offer various methods to help students cope with these issues, many of which are a part of policies like DASA (the Dignity for All Students Act) that offer safe environments, lunch programs to make sure students are fed, and finally, IEPs and special education services to help students with learning disabilities. But what we’re doing isn’t nearly enough. One of the areas where we are having too little success is with students with learning disabilities. As a middle school teacher, too frequently I have students with reading skills far below grade level. Many of these students receive special education services, but some have slid through the cracks despite scores of 1 on state exams indicating that they are “far below grade level.” These students — with IEP’s or not — sit beside peers who were taught in the same way, yet their peers progressed while they didn’t.
<urn:uuid:04ba6426-1b47-4df9-ad89-416441a37f01>
CC-MAIN-2017-30
http://www.schoolinfosystem.org/2017/05/14/nycs-plan-isnt-going-to-cut-it-striving-toward-universal-literacy/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423320.19/warc/CC-MAIN-20170720181829-20170720201829-00103.warc.gz
en
0.979663
217
3.140625
3
Creatine. It's a popular supplement used by athletes to enhance performance and build muscle. And it soon may be the one thing that will slow the progression of Parkinson's disease. "Some of the brain cells die in Parkinson's disease. And one of our hopes is that creatine or the other agents that will be studied over time will protect the brain cells somehow by perhaps protecting their energy," says Sparrow Hospital neurologist Dr. Glen Ackerman. "Early on in the stages of Parkinson's disease we have pretty good drugs to manage the symptoms. But the problem is as the disease gets worse the symptoms become more and more unmanageable," says Dr. John Goudreau of the MSU Department of Neurology and Ophthalmology. A nationwide study, which began this week, will test the effectiveness of c reatine to slow the advancement of the disease. Michigan State is one of more than 50 sites to be part of the clinical trial. Peter Hasbrook is living with Parkinson's. He says, "We all know that the disease continues to progress. And now that there's something that could perhaps slow the progression of that disease, it's exciting for those of us who had to look forward perhaps to being in a wheelchair or not being able to function." During the study each participant will consume large amounts of creatine everyday for five years. "I want to caution people that they shouldn't rush out to the health food store and buy small amounts of creatine and think it's going to directly do something for their Parkinson's disease," says Dr. Goudreau. Instead doctors encourage those suffering from the illness to volunteer for the study. "If we could slow a disorder early on, then it would keep people working longer, vacationing longer, and having a better quality of life," says Dr. Ackerman. If you'd like more information or to see if you qualify for the study call 1-800-352-9424 or 517-353-8122 ext. 126.
<urn:uuid:a9256e21-fbb4-4714-a57b-2aa15fee2df3>
CC-MAIN-2016-26
http://www.wilx.com/home/headlines/6673947.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00199-ip-10-164-35-72.ec2.internal.warc.gz
en
0.975729
411
2.53125
3
Hundreds of Western ranchers and farmers have their backs against the wall after a ruling by a federal judge diverts their irrigation water to protect "endangered" fish species. An epic water war has precipitated in an arid region straddling the Oregon-California border. For the Klamath River Basin the question is a contemporary one: water for agriculture or fish? The fight for the Klamath water has been simmering for years between the agriculture community and those who want the fish protected. This spring the U.S. Bureau of Reclamation (BOR) implemented an interim water management plan that allocated nearly all water in the Klamath Irrigation Project to supporting two species of endangered sucker fish in Upper Klamath Lake, the project's primary reservoir. The decision also will maintain streamflows for threatened coho and chinook salmon in the lower stretches of the Klamath River. Local salmon fishermen, Indian tribes, the Wilderness Society, the Earthjustice Legal Defense Fund and other groups have worked to see the irrigation water shut off to more than 1,500 basin ranching and farming families. After providing for the needs of the fish, the BOR had no water left for 90% of the 250,000 acres of land irrigated by the Klamath Project. The fight came to a head in late April. U.S. District Judge Ann Aiken denied a last minute plea to restore irrigation water in the Klamath Basin, citing treaty obligations with two tribes and the Endangered Species Act's (ESA) protection of endangered fish. She advised ranchers to give up their several lawsuits and seek a long-term solution through negotiations. Judge Aiken wrote that while it is clear that the farmers face severe economic hardship, the threat to the survival of the fish is greater. And under treaty obligations to the Klamath and Yurok tribes, which have cultural and economic ties to the fish, and the Endangered Species Act, the bureau had no choice, she said. Troy Fletcher, executive director of the Yurok Tribe sympathizes with the ranchers and farmers. "But their use of the limited water available in the Klamath Basin needs to be reduced," he says. "It’s no secret that this calamity is due to a shortage of water and an abundance of government regulation," says Lynn Cornwell, Glasgow, MT, president of the National Cattlemen’s Beef Association. "The culprit in this case – as it has been in many others – is the Endangered Species Act – simply put, the most sweeping and destructive set of government regulations affecting wise land use management in this country." The NCBA has sent a letter to the President asking his help in the Klamath. But local producers show little enthusiasm in government assistance. Without income from production, there’s not much interest in things like low-interest federal loans. "Let me make something very clear – it’s not in our nature to ask the government for help in running our cattle operations," explains rancher Mike Byrne, Tulelake, CA. "We’d just as soon be free to manage as environmental and economic conditions permit," says Byrne. "But, the government got us into this mess – and now they can help us get through it." According to the court ruling, the BOR violated the Endangered Species Act by continuing to supply farming irrigation without first studying the needs of the fish, and they cannot deliver water to the irrigation system until they come up with a plan to protect the fish. "Farmers can get by in a hard year with drought assistance from the federal government," explains Glen Spain of the Pacific Coast Federation of Fishermen's Associations. "However, fish have only one river, and if they go extinct they are gone forever, and so are the communities which depend upon them for food and for their livelihoods. There are a lot more jobs at risk here than just farm jobs." Excerpts from Judge Aiken’s Ruling "While the court sympathizes with the plaintiffs and their plight, I am bound by oath to uphold the law. The law requires the protection of suckers and salmon as endangered and threatened species and as tribal resources." "Under the ESA, BOR must not engage in any action that is likely to jeopardize the continued existence of a threatened or endangered species or result in the destruction or adverse modification of the critical habitat of such a species." "Finally, BOR must also consider the rights of Indian tribes who hold fishing and water treaty rights in the Klamath River Basin." "The court recognizes the harm that could be suffered by the plaintiffs and surrounding communities. However, the court must balance that harm against the harm to the suckers and salmon, those who rely on the fish, as well as the public interest." "The NMFS and FWS have determined that continued Project operations will cause jeopardy to the continuing existence of the suckers and coho salmon." "Given the high priority the law places on species threatened with extinction, I cannot find that the balance of hardships tip sharply in plaintiffs’ favor." "Plaintiffs’ contract rights to irrigation water are subservient to ESA and tribal trust requirements." Judge Aiken’s complete ruling can be found at: www.pcffa.org/klamath.htm. Scroll down to: Order Denying Plaintiff Irrigation Districts' Request for Injunction (#112 - 30 April 30, 2001).
<urn:uuid:46da750b-46b0-463a-88bc-6f074aef537c>
CC-MAIN-2015-22
http://beefmagazine.com/news/beef_fish_first
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930895.88/warc/CC-MAIN-20150521113210-00006-ip-10-180-206-219.ec2.internal.warc.gz
en
0.950107
1,145
2.65625
3
Saturday, June 30, 2007 Rubber Ducky Invasion THE JOURNEY SO FAR: 16 NOVEMBER 1992: Caught in the Subpolar Gyre (counter-clockwise ocean current in the Bering Sea, between Alaska and Siberia), the ducks take 10 months to begin landing on the shores of Alaska. EARLY 1995: The ducks take three years to circle around. East from the drop site to Alaska, then west and south to Japan before turning back north and east passing the original drop site and again landing in North America. Some ducks are even found In Hawaii. The National Oceanic and Atmospheric Administration (NOAA) worked out that the ducks travel approximately 50 per pent faster than the water in the current. 1995 - 2000: Some intrepid ducks escape the Subpolar Gyre and head North, through the Bering Straight and into the frozen waters of the Arctic. Frozen into the ice the ducks travel slowly across the pole, moving ever eastward. 2000: Ducks begin reaching the North Atlantic where they begin to thaw and move Southward. Soon ducks are sighted bobbing in the waves from Maine to Massachusetts. 2001: Ducks are tracked in the area where the Titanic sank. JULY TO DECEMBER 2003: The First Years company offers a $100 savings bond reward for the recovery of wayward ducks from the 1992 spill. To be valid ducks must be sent to the company and must be found in New England, Canada or Iceland. Britain is told to prepare for an invasion of the wayward ducks as well. 2003: A lawyer called Sonali Naik was on holiday in the Hebrides in north-west Scotland when she found a faded green frog on the beach marked with the magic words 'The First Years'. Unaware of the significance of her find she left it on the beach. It was only when she was chatting to other guests at her hotel that she realised what she had seen. Labels: Rubber Ducky
<urn:uuid:34e6a423-c126-4e37-aec1-5a043102e3df>
CC-MAIN-2017-30
http://growingyourbaby.blogspot.com/2007/06/rubber-ducky-invasion.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423809.62/warc/CC-MAIN-20170721202430-20170721222430-00314.warc.gz
en
0.939162
408
2.640625
3
Circular RNA, which has only recently been discovered thanks to the development of advanced RNA sequencing technology, is abundant in all organisms, including humans, but its role in the modulation of physiological processes is still unclear. Researchers at the lab directed by Irene Bozzoni from the Sapienza "Charles Darwin" Biology and Biotechnology Department, in collaboration with the Max Delbruck Center in Berlin and the Italian Institute of Technology (IIT) in Milan, have identified circular RNA in muscle cells and have developed a strategy to analyze its function. They found that one of these molecules - circ-ZNF609 - is involved in controlling cell proliferation and could play an important role in the development of tumors. Moreover, the circular circ-ZNF609 RNA has a very particular characteristic: it can be translated into a protein, a characteristic that was formerly believed to be the exclusive prerogative of linear RNA (the RNA messengers). The different translational regulation of circular RNA compared to that of RNA messengers reveals a further level of complexity in cellular response to changes in the external environment. "This discovery,” explains Irene Bozzoni, “adds new insight to the mechanisms underlying the operation of informational macromolecules and allows us to start a new phase of studies based both on the study of cell proliferation and new protein production control mechanisms." References: "Circ-ZNF609 is a circular RNA That can be translated and functions in myogenesis". Authors: Ivano Legnini, Gaia Di Timoteo, Francesca Rossi, Mariangela Morlando, Francesca Briganti, Olga Sthandier, Alessandro Fatica, Tiziana Santini, Adrian Andronache, Mark Wade, Pietro La Neve, Nikolaus Rajewsky, Irene Bozzoni. Molecular Cell, in press
<urn:uuid:ea582d85-9b5e-4ce0-8ada-9e3b59584f12>
CC-MAIN-2017-17
http://en.uniroma1.it/notizie/key-role-circular-rna-muscular-cells
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122621.35/warc/CC-MAIN-20170423031202-00391-ip-10-145-167-34.ec2.internal.warc.gz
en
0.914591
381
2.90625
3
From Wikipedia, the free encyclopedia - View original article A common logo from the bitcoin reference client |Date of introduction||3 January 2009| |Production||25 bitcoins per block (approximately every ten minutes) until mid 2016, and then afterwards 12.5 bitcoins per block for 4 years until next halving. This halving continues until 2110-2140.| |Source||Number of bitcoins in circulation| |Method||Increase in the supply| |10−6||bit or μBTC| A common logo from the bitcoin reference client |Date of introduction||3 January 2009| |Production||25 bitcoins per block (approximately every ten minutes) until mid 2016, and then afterwards 12.5 bitcoins per block for 4 years until next halving. This halving continues until 2110-2140.| |Source||Number of bitcoins in circulation| |Method||Increase in the supply| |10−6||bit or μBTC| Bitcoin is a software-based online payment system described by Satoshi Nakamoto[note 1] in 2008 and introduced as open-source software in 2009. Payments are recorded in a public ledger using its own unit of account, which is also called bitcoin.[note 2] Payments work peer-to-peer without a central repository or single administrator, which has led the US Treasury to call bitcoin a decentralized virtual currency. Although its status as a currency is disputed, media reports often refer to bitcoin as a cryptocurrency or digital currency. Bitcoins are created as a virtual product in reward for payment processing work, in which users offer their computing power to verify and record payments into a public ledger. Called mining, individuals or companies engage in this activity in exchange for transaction fees and newly created bitcoins. Besides mining, bitcoins can be obtained in exchange for fiat money, products, and services. Users can send and receive bitcoins electronically for an optional transaction fee using wallet software on a personal computer, mobile device, or a web application. Bitcoin as a form of payment for products and services has seen growth, and merchants have an incentive to accept the digital currency because fees are lower than the 2–3% typically imposed by credit card processors. The European Banking Authority has warned that bitcoin lacks consumer protections. Unlike credit cards, any fees are paid by the purchaser not the vendor. Bitcoins can be stolen and chargebacks are impossible. Commercial use of bitcoin is currently small compared to its use by speculators, which has fueled price volatility. Bitcoin has been a subject of scrutiny amid concerns that it can be used for illegal activities. In October 2013 the US FBI shut down the Silk Road online black market and seized 144,000 bitcoins worth US$28.5 million at the time. The US is considered bitcoin-friendly compared to other governments. In China, buying bitcoins with yuan is subject to restrictions, and bitcoin exchanges are not allowed to hold bank accounts. The most important part of the bitcoin system is a public ledger that records financial transactions in bitcoins. This is accomplished without the intermediation of any single, central authority, as long as mining is decentralized. Instead, multiple intermediaries exist in the form of computer servers running bitcoin software. By connecting over the Internet, these servers form a network that anyone can join. Transactions of the form payer X wants to send Y bitcoins to payee Z are broadcast to this network using readily available software applications. Bitcoin servers can validate these transactions, add them to their copy of the ledger, and then broadcast these ledger additions to other servers. All bitcoin transfers are recorded in a computer file that acts as a public ledger called the block chain, which everyone can examine. Where a conventional ledger records the transfer of actual bills or promissory notes that exist apart from it, bitcoins are simply entries in the block chain and do not exist outside of it. Maintaining the block chain is called mining, and those who do are rewarded with newly created bitcoins and transaction fees. Miners may be located anywhere in the world; they process payments by verifying each transaction as valid and adding it to the block chain. As of 2014[update], payment processing is rewarded with 25 newly created bitcoins per block added to the block chain. To claim the reward, a special transaction called a coinbase is included with the processed payments. All bitcoins in circulation can be traced back to such coinbase transactions. The bitcoin protocol specifies that the reward for adding a block will be halved approximately every four years. Eventually, the reward will be removed entirely when an arbitrary limit of 21 million bitcoins is reached c. 2140, and transaction processing will then be rewarded by transaction fees solely. Paying a transaction fee is optional, but may speed up confirmation of the transaction. Payers have an incentive to include such fees because doing so means their transaction will likely be added to the block chain sooner; miners can choose which transactions to process and prefer to include those that pay fees. As of 2013[update] mining had become quite competitive, has been compared to an arms race and ever more specialized technology is utilized. The most efficient mining hardware makes use of custom designed application-specific integrated circuits, which outperform general purpose CPUs and use less power as well. Without access to these purpose built machines, a bitcoin miner is unlikely to earn enough to even cover the cost of the electricity used in his or her efforts. The individual odds of winning the reward for adding a block to the block chain decrease with an increasing number of miners. Since the reward for each block can only go to a single bitcoin address, As of 2014[update], it has become common for miners to join organized mining pools, which split work and reward among all participants and make mining a less risky endeavor. Even for those who join pools, the cost of the electricity necessary to mine may outweigh the bitcoin rewards from doing so. The public nature of bitcoin means that, while those who use it are not identified by name, transactions can be linked to individuals and companies. All transactions are recorded into a public ledger, the block chain, and are viewable by everyone. Additionally, many jurisdictions require exchanges, where people can buy and sell bitcoins for cash, to collect personal information. The privacy concerns of some who use bitcoins are sufficient to cause them to take additional steps to cover their tracks. In order to obfuscate the link between individual and transaction, a different bitcoin address for each transaction can be used, and others rely on so-called mixing services that allow users to trade bitcoins whose transaction history implicates them for coins with different transaction histories. It has been suggested that bitcoin payments should not be considered more anonymous than credit card payments. Bitcoins can be bought and sold with many different currencies from individuals and companies. Bitcoins may be purchased in person or at a bitcoin ATM in exchange for cash currency. Participants in online exchanges offer bitcoin buy and sell bids. Using an online exchange to obtain bitcoins entails some risk, and according to one study, 45% of exchanges fail and take client bitcoins with them. Since bitcoin transactions are irreversible, sellers of bitcoins must take extra measures to ensure they have received traditional funds from the buyer. While wallets are often described as being a place to hold or store bitcoins, due to the nature of the system, bitcoins are inseparable from the block chain transaction ledger. Perhaps a better way to define a wallet is something "that stores the digital credentials for your bitcoin holdings" and allows you to access (and spend) them. Bitcoin uses public-key cryptography, in which two cryptographic keys, one public and one private, are generated. The public key can be thought of as an account number or name and the private key, ownership credentials. At its most basic, a wallet is a collection of these keys. Most bitcoin software also includes the ability to make transactions, however. Perhaps better termed physical wallets, physical bitcoins are ubiquitous in media coverage and combine a novelty coin with a private key printed on paper, metal, wood, or plastic. Physical bitcoins aren't widely seen outside of pictures in news article, but for those serious about security, storing private keys on paper printouts or in offline data storage devices is the best option. Bitcoin client software called a bitcoin wallet allows a user to transact bitcoins. A wallet program generates and stores private keys, and communicates with peers on the bitcoin network. The first wallet program called Bitcoin-Qt was released in 2009 by Satoshi Nakamoto as open source code. It can be used as a desktop wallet for payments or as a server utility for merchants and other payment services. Bitcoin-Qt, also called Satoshi client, is sometimes referred to as the reference client because it serves to define the bitcoin protocol and acts as a standard for other implementations. As of version 0.9, Bitcoin-Qt has been renamed Bitcoin Core to more accurately describe its role in the network. When making a purchase with a mobile device, QR codes are used ubiquitously to simplify transactions. Several server software implementations of the bitcoin protocol exist. So-called full nodes on the network validate transactions and blocks they receive, and relay them to connected peers. The ownership of bitcoins associated with a certain bitcoin address can be demonstrated with knowledge of the private key belonging to the address. For the owner, it is important to protect the private key from loss or theft. If a private key is lost, the user cannot prove ownership by other means. The coins are then lost and cannot be recovered. Because anyone with knowledge of the private key can take ownership of any associated bitcoins, theft can occur when a private key is revealed or stolen. Integral to bitcoin security is the prevention of unauthorized transactions from an individual's wallet. A bitcoin transaction permanently transfers ownership to a new address, a string having the form of random letters and numbers derived from public keys by application of a hash function and encoding scheme. The corresponding private keys act as a safeguard for the owner; a valid payment message from an address must contain the associated public key and a digital signature proving possession of the associated private key. Because anyone with a private key can spend all of the bitcoins associated with the corresponding address, protection of private keys is quite important. Loss of a private key may result in theft, which has occurred on numerous occasions. The practical day-to-day security of bitcoin wallets is an ongoing concern. Risk of theft can be reduced by generating keys offline on an uncompromised computer and saving them on external storage or paper printouts. Bitcoins can be lost. In 2013 one user said he lost 7,500 bitcoins, worth $7.5m at the time, when he discarded a hard drive containing his private key. Bitcoins can also be found. In March 2014, former bitcoin exchange Mt. Gox reported it found an "old wallet, which was used before June 2011 [that] held about 200,000 bitcoins". Bitcoin was first mentioned in a 2008 research paper published under the name Satoshi Nakamoto. It is unknown who Satoshi Nakamoto is. In 2009, an exploit in an early bitcoin client was found that allowed large numbers of bitcoins to be created. In March 2013, a technical glitch caused a fork in the block chain, with one half of the network adding blocks to one version of the chain and the other half adding to another. For six hours two bitcoin networks operated at the same time, each with its own version of the transaction history. The core developers called for a temporary halt to transactions, sparking a sharp sell-off. Normal operation was restored when the majority of the network downgraded to version 0.7 of the bitcoin software. Some mainstream websites began accepting bitcoins c. 2013. WordPress started in November 2012 followed by OKCupid in April 2013, Atomic Mall in November 2013, TigerDirect and Overstock.com in January 2014, Expedia in June 2014, and Newegg in July 2014. Certain non-profit or advocacy groups such as the Electronic Frontier Foundation allow bitcoin donations. (Although this organization stopped accepting bitcoins in 2011 and began again in 2013.) The first law enforcement events occurred in May 2013. Assets belonging to the Mt. Gox exchange were seized by Department of Homeland Security, and the Silk Road drug market website was shut down by the FBI. In October 2013, Chinese internet giant Baidu had allowed clients of website security services to pay with bitcoins. During November 2013, the China-based bitcoin exchange BTC China overtook the Japan-based Mt. Gox and the Europe-based Bitstamp to become the largest bitcoin trading exchange by trade volume. On 19 November 2013, the value of a bitcoin on the Mt. Gox exchange soared to a peak of US$900 after a United States Senate committee hearing was told that virtual currencies were a legitimate financial service. On the same day, one bitcoin traded for over RMB¥6780 (US$1100) in China. On 5 December 2013, the People's Bank of China prohibited Chinese financial institutions from using bitcoins. After the announcement, the value of bitcoins dropped and Baidu no longer accepted bitcoins for certain services. Buying real-world goods with any virtual currency had been illegal in China since at least 2009. With roughly 12 million existing bitcoins As of November 2013[update], the new price increased the market cap for bitcoin to at least US$7.2 billion. By 23 November 2013, the total market capitalization of bitcoin exceeded US$10 billion for the first time. In the US two men were arrested in January 2014 on charges of money-laundering using bitcoins including Charlie Shrem, the head of defunct bitcoin exchange BitInstant and a vice chairman of the Bitcoin Foundation. Shrem allegedly allowed the other arrested party to purchase large quantities of bitcoins for use on black-market websites. In early February 2014, one of the largest bitcoin exchanges, Mt. Gox, suspended withdrawals citing technical issues. By the end of the month, Mt. Gox had filed for bankruptcy protection in Japan amid reports that 744,000 bitcoins had been stolen. Originally a site for trading Magic: The Gathering cards, Mt. Gox once was the dominant bitcoin exchange although prior to the collapse its popularity had waned. Bitcoin is commonly referred to as digital currency, digital cash, virtual currency, electronic currency, or cryptocurrency. Some media outlets do make a distinction between "real" money and bitcoins, however. According to the director of the Institute for Money, Technology and Financial Inclusion at the University of California-Irvine there is "an unsettled debate about whether bitcoin is a currency or payment protocol". Economists defining money as a store of value, a medium of exchange, and a unit of account agree that bitcoin has some way to go to meet all these criteria. It does best as a medium of exchange. (About 1,000 bricks and mortar businesses were willing to accept payment in bitcoins as of November 2013 in addition to more than 35,000 online merchants.) The bitcoin market currently suffers from volatility, limiting the ability of bitcoins to act as a stable store of value, and, although bitcoin is the unit of account for the block chain, bitcoin does not see use as a unit of account outside of it. Where people are allowed to buy with bitcoins, prices are not denominated in bitcoins. To improve access to price information and increase transparency, on 30 April 2014 Bloomberg LP announced plans to list prices from bitcoin companies Kraken and Coinbase on its 320.000 subscription financial data terminals. According to Mark T. Williams of Boston University, the volatility of bitcoin is over seven times that of gold and over eight times that of the S&P 500. The Bitcoin Foundation contends that high volatility is due to insufficient liquidity while a Forbes journalist claims that it is related to the uncertainty of its long-term value. As of 2014, pro-bitcoin venture capitalists argue the greatly increased trading volume that planned high-frequency trading exchanges are hoped to bring will decrease price volatility. Volatility has little effect on the utility of bitcoin as a payment processing system. The price of bitcoins has gone through various cycles of appreciation and depreciation referred to by some as bubbles and busts. In 2011, the value of one bitcoin rapidly rose from about US$0.30 to US$32 before returning to US$2. In the latter half of 2012 and during the 2012-2013 Cypriot Financial Crisis, the bitcoin price began to rise, reaching a peak of US$266 on 10 April 2013, before crashing to around US$50. At the end of 2013, the cost of one bitcoin rose to the all-round peak of US$1135, but fell to the price of US$693 three days later.[better source needed] In 2014 the price fell sharply, and in April remained depressed at little more than half that of 2013. Bitcoins are used by some Argentinians as an alternative to the official currency, which is stymied by inflation and strict capital controls, to protect their savings against inflation or the possibility that governments could confiscate savings accounts. It's been suggested that during the 2012–2013 Cypriot financial crisis bitcoin purchases rose due to fears that savings accounts would be confiscated or taxed. Bitcoin has been labelled a speculative bubble by many including Former Federal Reserve Chairman Alan Greenspan and economist John Quiggin. Two lead software developers of bitcoin, Gavin Andresen and Mike Hearn, have warned that bubbles may occur. Nobel Laureate Robert Shiller said that bitcoin "exhibited many of the characteristics of a speculative bubble." Others reject the label and see bitcoin's quick rise in price as nothing more than normal economic forces at work. One way of investing in bitcoins is to buy and hold them as a long-term, high-risk investment. FINRA, a United States self-regulatory organization, warns that investing in bitcoins carries significant risks. The European Banking Authority warns that the risks of investment go beyond a potential fall in the value of bitcoins. Bitcoins may be of limited value to unsophisticated investors. Risk hasn't deterred some such as the Winklevoss twins, who made a US$1.5 million personal investment and attempted to launch a bitcoin ETF. The first regulated bitcoin fund was established in Jersey in July 2014, with the approval of the Jersey Financial Services Commission. Other investors, like Peter Thiel's Founders Fund, which invested US$3 million, don't purchase bitcoins themselves instead funding bitcoin infrastructure like companies that provide payment systems to merchants, exchanges, and wallet services, etc. Investors also invest in bitcoin mining. Growth of the bitcoin supply is predefined by the bitcoin protocol. Currently there are over twelve million bitcoins in circulation with an approximate creation rate of 25 every ten minutes. The total supply is capped at an arbitrary limit of 21 million, and every four years the creation rate is halved. This means new bitcoins will continue to be released for more than a hundred years. Financial journalists and analysts, economists, and investors have attempted to predict the possible future value of bitcoin. Economist John Quiggin stated, "bitcoins will attain their true value of zero sooner or later, but it is impossible to say when." In 2013, Bank of America FX and Rate Strategist David Woo forecast a maximum fair value per bitcoin of $1,300. Bitcoin investor Cameron Winklevoss stated in 2013 that the "[s]mall bull case scenario for bitcoin is... 40,000 USD a coin". In late 2013, finance professor Mark Williams forecast a bitcoin would be worth less than ten US dollars by July 2014. Since then bitcoin have exchanged as low as $344 (April 2014) and during July 2014 the bitcoin low has been $609. The Nation suggested in May 2014, that it was "difficult to see what problem Bitcoin solves for people with left-wing politics.". Vasilis Kostakis and Michel Bauwens claim that bitcoin is a currency that reflects a new type of capitalism, named “distributed” capitalism. and that this new capitalism conforms to characteristics of the network era and utilizes the peer-to-peer infrastructures to achieve capital accumulation. According to Vasilis Kostakis it might appear as though it exists outside the financial system, but by promoting scarcity and competition this project aggravates the over-accumulation of capital and exacerbates the social inequalities that it is supposed to combat[dubious ] According to Vasilis Kostakis bitcoin should be viewed like a new technology, not just a currency: It has paved the way for new types of currencies that utilize new technological infrastructures and whose dynamics should not be ignored. Some economists have responded positively to bitcoin, including François R. Velde, Senior Economist at the Chicago Fed, who described it as "an elegant solution to the problem of creating a digital currency." Paul Krugman and Brad DeLong have found fault with bitcoin questioning why it should act as a reasonably stable store of value or whether there is a floor on their value. Economist John Quiggin has criticized bitcoin as "the final refutation of the efficient-market hypothesis". David Andolfatto, a Vice President at the Federal Reserve Bank of St. Louis, stated that bitcoin is a threat to the establishment, which he argues is a good thing for the Federal Reserve System and other central banks because it prompts these institutions to operate sound policies. Free software movement activist Richard Stallman has criticized the lack of anonymity and called for reformed development. PayPal President David A. Marcus calls bitcoin a "great place to put assets" but claims it will not be a currency until price volatility is reduced. As bitcoins proved popular, they have been increasingly covered by comics around the world. Established firms that accept bitcoins include Atomic Mall, Clearly Canadian, Dish Network, Overstock.com, the Sacramento Kings, TigerDirect, Virgin Galactic, Zynga,Newegg. and Dell. As of 2014, bitcoin companies have had difficulty opening traditional bank accounts because lenders have been leery of bitcoin's links to illicit activity. According to a co-founder of one such company, BitPay, "banks are scared to deal with bitcoin companies, even if they really want to". Yet, some financial institutions have been bullish on bitcoin. In a 2013 report, Bank of America Merrill Lynch stated that "we believe bitcoin can become a major means of payment for e-commerce and may emerge as a serious competitor to traditional money-transfer providers. As a medium of exchange, bitcoin has clear potential for growth and that in a long-term fair-value analysis maximum market capitalization for bitcoins could be $15 billion." In June 2014, the first bank that converts deposits in currencies instantly to bitcoin without any fees, for further transactions, was opened in Boston. Concurrent with Bloomberg LP, 33% owned by Merrill Lynch launching pricing information is the development of high-frequency trading firms by Atlas ATS in New York and Hong Kong and one from London-based Coinfloor, claiming to be the first auditable bitcoin exchange, and a SecondMarket project of an exchange for institutional investors. A US government auction of almost 30,000 bitcoins seized in October 2013 from the Silk Road on 30 June 2014 by the US Marshals Service was said to increase legitimacy of the currency. The 45 registered bidders, each of whom put down a deposit of $200,000 made 63 bids. Bitcoins have been evaluated and treated in various ways around the world. Magistrate Judge Amos Maazant of a Texas court classified bitcoins as currency. A German court found bitcoin to be a unit of account. The Finnish Government judged it to be a commodity. The People's Bank of China has stated that bitcoin "is fundamentally not a currency". A WSJ journalist declared bitcoins a commodity in December 2013. A Forbes journalist referred to bitcoins as digital collectible. Two University of Amsterdam computer scientists proposed the term 'money-like informational commodity' in order "to allow for a systematic discussion of its development through all stages including an initial stage and a possible demise without being constrained by the implications of it being a money or a near-money". Wired magazine summarized the reception of bitcoin, saying "many leading economists [believe] bitcoin is a fatally flawed idea shaped by people who don’t really understand how money works". Few governments have moved to regulate bitcoin and similar private currencies. According to the European Central Bank, traditional financial sector regulation is not applicable because bitcoin does not involve traditional financial actors. On the other hand, the Bitcoin Foundation Canada´s report: Bitcoin and the law: An analytical report on Bitcoin’s legal and regulatory framework in Canada “dispels the myth that Bitcoin is not regulated” in Canada. Under other regimes, existing rules have been extended to include bitcoin and bitcoin companies. Steven Strauss, a Harvard public policy professor, suggested in April 2013 governments could outlaw bitcoin, a possibility that was mentioned in a 2013 SEC filing made by a bitcoin investment vehicle. A detailed survey of forty foreign jurisdictions and the European Union is maintained by the US Library of Congress. Bitcoin is banned by the Bolivian central bank. The Canadian government announced in February 2014 that it was going to regulate bitcoin under existing anti-money laundering and counter-terrorist financing legislation. In Quebec, The Financial Markets Authority stated in regards to bitcoin ATMs, that it would prosecute any violation of the Securities Act, the Derivatives Act, or the Money Services Business Act. China restricted bitcoin exchange for local currency in December 2013. On 10 April 2014 the People’s Bank of China ordered banks and all third-party payment services to stop dealing with anyone in the bitcoin business. The ruling de-funds all Chinese bitcoin trading websites, as they will no longer have bank accounts in China. The use of bitcoins is not regulated in Cyprus. On 11 December 2013, the Central Bank of Cyprus issued a statement on bitcoins, stating that "it considers the use of any kind of virtual money as particularly dangerous, given that it is not under any regulatory system and its operation is unchecked." On the 24th of July 2014, Ecuador effectively banned bitcoin, along with all other decentralized digital currencies, approving a monetary reform allowing the government to create its own centralized digital currency. This new reform comes as a severe blow to the bitcoin industry in Ecuador, since it demands that they shut down their operations immediately. Those who defy the ban will face prosecution, and all bitcoins circulated and assets in bitcoin trades face confiscation. Pre-existing Hong Kong law covers acts of fraud and money laundering involving virtual commodities. Digital or virtual currencies such as bitcoin have gained widespread acceptance in India despite a natural skepticism to assets not backed by tangible entities such as land. After the RBI warning in December 2013, a number of bitcoin operators shut shop. The actions of the ED (enforcement directorate) and the I-T (income-tax) department have sent tremors throughout the mainstream bitcoin community in India, if only for the reason that there is still no official regulation on how companies involved in dealing with digital currencies should comply with anti-money laundering and financial transaction laws. A spokesman for Bank Indonesia reportedly issued a statement on bitcoin in December 2013, saying that "bitcoin is a potential payment method, but it’s different than ordinary currency... It is not regulated by the central bank so there are risks... At the moment, we’re studying bitcoin and we have no plan to issue a regulation on it." No laws in Japan regulate the use of bitcoins. Haruhiko Kuroda, governor of the Bank of Japan (BOJ), stated in December, 2013, that BOJ was "researching issues of bitcoins, but I have nothing to say regarding bitcoins at the moment." As of July 2014, Japan’s new Bitcoin business advocacy group, The Japan Authority of Digital Asset, has launched with the government’s explicit support, aiming to help establish standards and codes of conduct for its member organizations. The first regulated bitcoin fund was established in Jersey in July 2014, with the approval of the Jersey Financial Services Commission, after island leaders expressed a desire for Jersey to become a global center for digital currencies. At the time of the establishment of the fund, bitcoin was already being accepted by some local businesses. On 27 January 2014, the Central Bank of the Russian Federation issued a statement entitled "On Using Virtual Currencies, Specifically Bitcoin, in Transactions." According to the statement, the Central Bank views the services of Russian legal entities aimed at assisting in the exchange of bitcoins for goods, services, or currencies as a "dubious activity" associated with money laundering and terrorism financing, and recommends that Russian individuals and legal entities refrain from transactions involving bitcoins. The Monetary Authority of Singapore may require bitcoin intermediaries to collect personal details of their customers and report suspicious activity similar to what it requires from money changers. In the US the first step of regulation occurred in July 2011, when the US Department of Treasury's Financial Crimes Enforcement Network added "other value that substitutes for currency" to its definition of Money services businesses. In 2013 the Treasury issued new rules regarding virtual currencies, whereby exchanges (but not users) are considered money transmitters and must comply with rules to prevent money laundering and terrorist financing. Besides obtaining personal details of clients, bitcoin exchanges must verify that their customers are not on the Office of Foreign Asset Control’s Specially Designated Nationals list. In April 2014, the Treasury confirmed that bitcoin cloud mining and escrow services are not classified as money transmitters. The US Government Accountability Office reviewed virtual currencies upon the request of the Senate Finance Committee and in May 2013 recommended that the IRS formulate tax guidance for bitcoin businesses. On 25 March 2014, in time for 2013 tax filing, the IRS issued a guidance that virtual currency is treated as property for US federal tax purposes and that "an individual who 'mines' virtual currency as a trade or business [is] subject to self-employment tax." In January 2014, the US Securities and Exchange Commission (SEC) was “very focused” on whether bitcoin-denominated stock exchanges were illegal, per its enforcement administrator, and inquired into the gambling site SatoshiDice listing shares on bitcoin exchange MPEx. In May it warned investors that "both fraudsters and promoters of high-risk investment schemes may target Bitcoin users." The SEC charged and settled with the former owner of SatoshiDice in June 2014 for selling securities without registering with the SEC. On 8 May 2014, the US Federal Election Commission issued draft guidance to US politicians who want to receive bitcoin donations. The Commission declined to declare bitcoins currency, opting to deem them items "of value." In May 2014, Brett Stapper, co-founder of Falcon Global Capital, registered to lobby members of Congress and federal agencies on issues related to bitcoin. As of July 2014[update], there are no rules at the US state level yet; In March, the New York State Department of Financial Services had officially invited bitcoin exchanges to apply with them. On 17 July it published draft regulations for businesses that receive, exchange, transmit or store virtual currency. Businesses would have to provide transaction receipts, disclosures about risks, policies to handle customer complaints, maintain a cybersecurity program, hire a compliance officer and verify details about their customers to follow anti-money-laundering rules, per FinCEN. California Assemblyman Roger Dickinson (D-Sacramento) drafted legislation (Assembly Bill 129)drafted legislation (Assembly Bill 129) to legalize bitcoin and all other alternative and digital currency, such as Litecoin, Dogecoin, Starbucks Stars, and Amazon Coins. However, Dickinson "thinks the federal government should regulate the cryptocurrency" and said "I saw this legislation as a ways of cleaning up the code in California to conform to reality". The 2013 G7's Financial Action Task Force published guidance for Internet-based payment services that defines "exchangers buying or selling digital currency for cash (or other digital currencies) [...] as a virtual bureau de change" and warns that "Internet-based payment services that allow third party funding from anonymous sources may face an increased risk of [money laundering/terrorist financing]" concluding that this may "pose challenges to countries in [anti-money laundering/counter terrorist financing] regulation and supervision." Bitcoins have been associated with online criminal behavior and so-called cybercriminals. Used to obfuscate online transactions, bitcoins are seized when deep web black markets are shut by authorities. Criminal activities have stigmatized the currency and attracted the attention of financial regulators, legislative bodies, and law enforcement. CNN has referred to bitcoin as a "shady online currency [that is] starting to gain legitimacy in certain parts of the world," and The Washington Post calls it "the currency of choice for seedy online activities." The FBI stated in a 2012 report that "bitcoin will likely continue to attract cyber-criminals who view it as a means to move or steal funds." Criminal activity involving bitcoin has largely centered around theft, money laundering, the use of botnets for mining, and the use of bitcoins in exchange for illegal items or services. "Like cash, it can be used for ill as well as for good." Certain nation states may feel that its use in circumventing capital controls is also undesirable. Despite claims made by non-profit Bitcoin Foundation that "cryptography is the reason no one can steal bitcoins," theft is widespread. In 2012, it was estimated that 4.5% to 9% of all transactions of all bitcoin exchanges in the world were for drug trades on a single deep web drugs market, Silk Road. The bulk of bitcoin purchases during the time were speculative in nature, so drugs must have constituted a greater percentage of the actual goods purchased with bitcoins c. 2012. Silk Road was shut by US law enforcement in October 2013 leading to a short-term fall in the value of bitcoin. Alternative sites were soon available, and in early 2014 the Australian Broadcasting Corporation reported that the closure of the Silk Road had little impact on the number of Australians selling drugs online, which had actually increased. Several news outlets have asserted that the popularity of bitcoins hinges on the ability to use them to purchase illegal goods. Non-drug transactions were thought to be far less than the number involved in the purchase of drugs, and roughly one half of all transactions made using bitcoin c. 2013 were bets placed at a single online gambling website, Satoshi Dice. One source stated online gun dealers use bitcoin to sell arms without background checks. The bitcoin community branded one site, Sheep Marketplace, as a scam when it prevented withdrawals and shut down after an alleged bitcoins theft. In a separate case, escrow accounts with bitcoins belonging to patrons of a different black market were hacked in early 2014. Bitcoins may not be ideal for money laundering because all transactions are public. Authorities have expressed concerns, however. The European Banking Authority and the FBI have both stated that bitcoin may be used for money laundering. In early 2014, an operator of a US bitcoin exchange was arrested for money laundering. Various journalists, US economist Nouriel Roubini, and the head of the Estonian central bank have voiced concerns that bitcoin may be a Ponzi scheme. Bitcoin supporters disagree. A 2012 report by the European Central Bank states, "it [is not] easy to assess whether or not the bitcoin system actually works like a pyramid or Ponzi scheme." In an alleged Ponzi scheme that utilized bitcoins, The Bitcoin Savings and Trust promised investors up to 7 percent weekly interest, and raised at least 700,000 bitcoins from 2011 to 2012. The SEC charged the company and its founder in 2013 "with defrauding investors in a Ponzi scheme involving bitcoin...". A theft is an unauthorized transfer from a bitcoin address using the private key to unlock the address. Because transactions are irreversible and the identity of users difficult to unmask, it is rare that stolen bitcoins are recovered and returned. Theft occurs on a regular basis despite claims made by the Bitcoin Foundation that theft is impossible. Generating and storing keys offline mitigates the risk of theft. Most large-scale thefts occur at exchanges or online wallet services that store the private keys of many users. The thief hacks an online wallet service by finding a bug in its website or spreading malware to computers holding the private keys. Many high-profile thefts have been reported. In late November 2013, an estimated $100 million in bitcoins were stolen from the online illicit goods marketplace Sheep Marketplace, which immediately closed. Users tracked the coins as they were processed and converted to cash, but no funds were recovered and no culprits identified. A different black market, Silk Road 2, stated that during a February 2014 hack bitcoins valued at $2.7 million were taken from escrow accounts. In late February 2014 Mt. Gox, one of the largest virtual currency exchanges, filed for bankruptcy in Tokyo after its computer system was hacked and approximately $477 million in bitcoins were stolen. Flexcoin, a bitcoin storage specialist based in Alberta, Canada, shut down on March 2014 after saying it discovered a theft of about $650,000 in bitcoins. Poloniex, a digital currency exchange, reported on March 2014 that it lost bitcoins valued at around $50,000. Bitcoin-related malware includes software that steals bitcoins from users using a variety of techniques, software that uses infected computers to mine bitcoins, and different types of ransomware, which disable computers or prevent files from being accessed until some payment is made. Security company Dell SecureWorks said in February 2014 that it had identified 146 types of bitcoin malware; about half of it undetectable with standard antivirus scanners. In June 2011, Symantec warned about the possibility that botnets could mine covertly for bitcoins. Malware used the parallel processing capabilities of GPUs built into many modern video cards. Although the average PC with an integrated graphics processor is virtually useless for bitcoin mining, tens of thousands of PCs laden with mining malware could produce some results. German police arrested two people in December 2013 who customized existing botnet software to perform bitcoin mining, which police said had been used to mine at least $950,000 worth of bitcoins. For four days in December 2013 and January 2014, Yahoo Europe hosted an ad containing bitcoin mining malware that infected an estimated two million computers. The software, called Sefnit, was first detected in mid-2013 and has been bundled with many software packages. Microsoft has been removing the malware through its Microsoft Security Essentials and other security software since January 2014. Some malware can steal private keys for bitcoin wallets allowing the bitcoins themselves to be stolen. The most common type searches computers for cryptocurrency wallets to upload to a remote server where they can be cracked and their coins stolen. Many of these also log keystrokes to record passwords, often avoiding the need to crack the keys. A different approach detects when a bitcoin address is copied to a clipboard and quickly replaces it with a different address, tricking people into sending bitcoins to the wrong address. This method is effective because bitcoin transactions are irreversible. One virus, spread through the Pony botnet, was reported in February 2014 to have stolen up to $220,000 in cryptocurrencies including 335 bitcoins from 85 wallets. Security company Trustwave, which tracked the malware, reports that its latest version was able to steal 30 types of digital currency. A type Mac malware active in August 2013, Bitvanity posed as a vanity wallet address generator and stole addresses and private keys from other bitcoin client software. A different trojan for Mac OS X, called CoinThief was reported in February 2014 to be responsible for multiple bitcoin thefts, including one user who lost 20 bitcoins. The software was hidden in versions of some cryptocurrency apps on Download.com and MacUpdate. Another type of bitcoin-related malware is ransomware. One program called Cryptolocker, typically spread through legitimate-looking email attachments, encrypts the hard drive of an infected computer, then displays a countdown timer and demands a ransom, usually two bitcoins, to decrypt it. Police in Massachusetts said they paid a 2 bitcoin ransom in November 2013, worth more than $1,300 at the time, to decrypt one of their hard drives. Linkup, a combination ransomware and bitcoin mining program that surfaced in February 2014, disables internet access and demands credit card information to restore it, while secretly mining bitcoins. There are two main ways the blockchain ledger can be corrupted to steal bitcoins: by fraudulently adding to or modifying it. The bitcoin system protects the blockchain against both using a combination of digital signatures and cryptographic hashes. Payers and payees are identified in the blockchain by their public cryptographic keys: most bitcoin transfers are from one public key to a different public key. (Actually, hashes of these keys are used in the blockchain, and are called "bitcoin addresses".) In principle, an attacker Eve could steal money from Alice and Bob by simply adding transactions to the blockchain ledger like Alice pays Eve 100 bitcoins, Bob pays Eve 100 bitcoins, and so on, using of course these people's bitcoin addresses instead of their names. The bitcoin protocol prevents this kind of theft by requiring every transfer to be digitally signed with the payer's private key; only signed transfers can be added to the blockchain ledger. Since Eve cannot forge Alice's signature, Eve cannot defraud Alice by adding an entry to the blockchain equivalent to Alice pays Eve 100 bitcoins. At the same time, anyone can verify Alice's signature using her public key, and therefore that she has authorized any transaction in the blockchain where she is the payer. The other principal way to steal bitcoins would be to modify blockchain ledger entries. Eve could buy something from Alice, like a sofa, by adding a signed entry to the blockchain ledger equivalent to Eve pays Alice 100 bitcoins. Later, after receiving the sofa, Eve could modify that blockchain ledger entry to read instead: Eve pays Alice 1 bitcoin, or even delete the entry. Digital signatures cannot prevent this attack: Eve can simply sign her entry again after modifying it. To prevent modification attacks, the bitcoin system first requires entries be added to the blockchain not one at a time, but in groups or blocks. More importantly, each block must be accompanied by a cryptographic hash of three things: the hash of the previous block, the block itself, and a number called a nonce. A hash of only the first two items will, like any cryptographic hash, always have a fixed number of bits (e.g. 256 for SHA-256). The nonce is a number which, when included, yields a hash with a specified number of leading zero bits. Because cryptographic hashes are essentially random, in the sense that their output cannot be predicted from their inputs, there is only one known way to find the nonce: to try out integers one after the other, e.g. 1, then 2, then 3, and so on. This process is called mining. The larger the number of leading zeros, the longer on average it will take to find a requisite nonce. The bitcoin system constantly adjusts the number of leading zeros so that the average time to find a nonce is about ten minutes. That way, as computer hardware gets faster over the years, the bitcoin protocol will simply require more leading zero bits to make mining always last about ten minutes. This system prevents modification attacks in part because an attacker has to recalculate all the hashes of the blocks after the modified one. In the example above, if Eve wants to change 100 bitcoins to 1 bitcoin, she will not only have to recompute the hash of the block that transaction is in, but of all the blocks that come after it; she will have to recreate the chain of blocks. Although she could do this in principle, it would take her about ten minutes on average per block. Concurrently, the network will continue to add blocks at a much faster rate than Eve alone can mine. Eve would have to recalculate all the blocks before the network could add a new one, or at least catch up with or overtake the network's miners. To achieve this would require roughly as much computing power as all existing bitcoin miners combined which would be prohibitively expensive and, if the bitcoin network is large enough, essentially unfeasible. Moreover, due to the financial incentives of mining new bitcoins, it would make more economic sense for Eve to devote her resources to normal bitcoin mining instead. Thus the system protects against fraudulent blockchain modifications by making them expensive and, if the attacker is rational, unappealing because they make less financial sense than becoming a miner. The more miners there are, the more expensive and less feasible such attacks become, making the whole system even more secure. Bitcoin system is based on an innovative solution of a problem common to all digital currency and payment schemes: that of so-called double-spending. With paper money or physical coins, when the payer transfers money to the payee, the payer cannot keep a copy of that dollar bill or coin. With digital money, which is just a computer file, this is not the case, and the payer could in principle spend the same money again and again, copying the file over and over. With bitcoin, when Eve offers to pay Alice some bitcoins, Alice can always first check the blockchain ledger to verify that Eve actually owns that many bitcoins. Of course, Eve could try to pay many people simultaneously; but bitcoin can defend against that. If Eve offers to pay Alice some bitcoins in exchange for goods, Alice can stipulate that she will not deliver the goods until Eve's payment to Alice appears in the blockchain, which typically involves waiting about ten minutes. If the transaction has no confirmations, shops and services which accept payment can be exposed to a so-called race attack. For example, two transactions are created for the same funds to be sent to different shops/services. System rules ensure that only one of those transactions can be added to the block chain. Shops can take numerous precautions to reduce this type of attack. It is always good to consider whether you should accept transactions without any confirmation. Shops or services which accept transactions without any confirmation are affected. A Finney attack is an attack which requires the participation of a miner to premine a block sending the money to be defrauded back to the fraudster. The risk of such an attack cannot be reduced to nothing regardless of the preventative measures taken by shops or services, but it does require the participation of a miner and an ideal combination of contributing factors. It is no mean feat, the miner risks a potential loss of the block reward. Just as with the other type of attack, the shop or service must seriously consider its policies concerning transactions without any confirmation. Also called an attack with confirmation, this is a combination of the 2 aforementioned attacks which gives the perpetrator the ability to spend funds twice simply with a confirmation. This attack is possible even if the shop or service is expecting several transaction confirmations. It requires the attacker to be in possession of relatively high-performance hardware (hash frequency). The perpetrator sends a transaction to the shop paying for a product/service and at the same time continues looking for a connection in the block chain (block chain fork) which recognizes this transaction. After a certain number of confirmations, the shop sends the product. If the perpetrator has found more than n blocks at this point, he breaks his block chain fork and regains his money, but if the perpetrator has not succeeded in doing this, the attack can be deemed a failure and the funds are sent to the shop, as should be the case. The success of this attack depends on the speed (hash frequency) of the attacker and the number of confirmations for the shop/service. For example, if the attacker possesses 10% of the calculation power of the bitcoin network and the shop expects 6 confirmations for a successful transaction, the probability of success of such an attack will be 0.1%. If the perpetrator controls more than 50% of the bitcoin network power, the probability of success of the aforementioned attack will be 100%. By virtue of the fact that the perpetrator can generate blocks more often than the other part of the network, he can create his own block chain until it becomes longer than the "integral" part of the network. A bitcoin documentary film called The Rise and Rise of Bitcoin made its debut at the Tribeca Film Festival in New York on 23 April 2014, chronicling bitcoin's origins to its explosive growth in 2013. In Fall 2014, undergraduate students at the Massachusetts Institute of Technology will receive $100 in bitcoins "to better understand this emerging technology". A student had the idea of a Bitcoin Club and raised more than half a million dollars from a high frequency trader. |This section is empty. You can help by adding to it. (July 2014)| |Wikimedia Commons has media related to Bitcoin.| |Look up bitcoin in Wiktionary, the free dictionary.| |The Wikibook Professionalism has a page on the topic of: BitTorrent and BitCoin| |The Wikibook Strategy for Information Markets has a page on the topic of: Micropayments|
<urn:uuid:5e4fdbc5-dc47-4cb0-b128-2a50d70e7480>
CC-MAIN-2014-35
http://blekko.com/wiki/Bitcoin?source=672620ff
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500832538.99/warc/CC-MAIN-20140820021352-00440-ip-10-180-136-8.ec2.internal.warc.gz
en
0.942447
9,994
2.796875
3
Elizabeth Tudor faced dangers all her life. She was frequently ill, had rival claimants to the throne, was afraid of assassination by English Catholics or foreign powers and suffered rumours of sexual intrigues, even of producing illegitimate children. Her ladies, the ‘bedfellows’ of the title, were constant companions, serving her but also protecting the queen’s reputation and being the last line of defence against a physical attack. They slept in her bedroom, even, at times, in her bed. As well as describing these ladies and their duties, Whitelock gives a detailed survey of Elizabeth’s reign. The book is copiously researched, with the notes and bibliography occupying 82 pages. I would have liked more details of the ‘bedfellows’, but it was nevertheless an easy, fluent read. It does not, however, resolve the question of Elizabeth’s virginity. Unwise in paying attention to her favourites, she was adept at deflecting suggestions of dynastic marriages. A very useful book. The Queen's Bed 462 (UK), 480 (US)
<urn:uuid:5757b223-9a45-42c5-8a9a-73af2da5eac6>
CC-MAIN-2016-18
https://historicalnovelsociety.org/reviews/elizabeths-bedfellows/
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111612.51/warc/CC-MAIN-20160428161511-00113-ip-10-239-7-51.ec2.internal.warc.gz
en
0.965215
226
2.71875
3
Publication Date 3 Oct 2018 OverviewThe question of how Donald Trump won the 2016 election looms over all of the many controversies that continue to swirl around him to this day. In particular, was his victory the result of Russian meddling in our political system? Up until now, the answer to that has been equivocal at best given how difficult it is to prove. Trump has vociferously denied it, as has Vladimir Putin himself. Even the famous intelligence reports establishing that the Russians interfered hold back from saying whether the interference tipped the scales in the outcome. In Cyberwar, however, the eminent scholar Kathleen Hall Jamieson, who sifted through a vast amount of polling and voting data, is able to conclude with a reasonable degree of certainty that Russian help was crucial in elevating Trump to the Oval Office. Put simply, by changing the behaviour of key players and altering the focus and content of mainstream news, Russian hackers reshaped the 2016 electoral dynamic. At the same time, Russian trolls used social media to target voting groups indispensable to a Trump victory or Clinton defeat. There are of course many arguments on offer that push against the idea that the Russians handed Trump his victory. Russia's goal was fomenting division, not electing Trump. Most of the Russian ads reportedly did not reference either the election or a candidate. Nor did they differ much from U.S.-based messaging that was already in play. Russian intervention did not surgically target Trump in key states. Finally, if WikiLeaks' releases of stolen email had truly affected the vote, Clinton's perceived honesty would have dropped in October. Jamieson, drawing from her four decades of research on the role of media in American elections, dispenses with these arguments through a forensic tracing of both Russian hackers' impact on media coverage as well as the ebbs and flows of Trump's polling support over the course of the campaign. To be sure, it is impossible to prove with absolute certainty that the Russians handed the election to Trump because there is too much that we don't know. That said, the lessons of a half century of research on the role of media framing in elections strongly suggests that many voters' opinions were altered by Russia's wide-ranging and coordinated campaign-including at least seventy eight thousand votes in three key states. Combining scholarly rigour with a bracing argument, Cyberwar shows that we can now be reasonably confident that Russian efforts helped put Trump in the White House.
<urn:uuid:6ad72588-9b2f-4b98-844a-eb45065b9a9f>
CC-MAIN-2019-09
https://www.zookal.com/cyberwar-how-russian-hackers-and-trolls-helped-elect-a-president-9780190915810/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247487624.32/warc/CC-MAIN-20190218175932-20190218201932-00182.warc.gz
en
0.973344
492
2.546875
3
Third molars are commonly referred to as wisdom teeth. They are usually the last teeth to develop and are located in the back of your mouth, behind your second molars. Their development is usually completed between the middle teenage years and early twenties, a time traditionally associated with the onset of maturity and the attainment of wisdom. Although most people develop and grow 32 permanent adult teeth, many times their jaws are too small to accommodate the four wisdom teeth. When inadequate space prevents the teeth from erupting they are called impacted wisdom teeth. This indicates their inability to erupt into the proper position for chewing and cleaning. If you do not have enough room in your mouth for your third molars to fully erupt, a number of problems can happen. Impacted wisdom teeth should be removed before their root structure is fully developed. In some patients it is as early as 12 or 13, and in others it may not be until the early twenties. Problems tend to occur with increasing frequency after the age of 30. Some of the possible problems related to not removing your wisdom teeth include: In most cases, the removal of wisdom teeth is performed under local anesthesia, laughing gas (nitrous oxide/oxygen analgesia), or general anesthesia. These options, as well as the surgical risks (i.e., sensory nerve damage, sinus complications), will be discussed with you before the procedure is performed. Once the teeth are removed, the gum is sutured. To help control bleeding bite down on the gauze placed in your mouth. You will rest under our supervision in the office until you are ready to be taken home. Upon discharge your postoperative kit will include postoperative instructions and extra gauze, should bleeding continue. Bleeding and/or oozing the day and night of surgery is completely normal. Have cold, soft foods on hand for the first day and progress your diet as it is comfortable to do so.
<urn:uuid:b6027e79-5752-4fb0-bf62-6fe3ec20ad1f>
CC-MAIN-2021-49
https://zionoralsurgicalarts.com/wisdom-teeth/
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358847.80/warc/CC-MAIN-20211129225145-20211130015145-00495.warc.gz
en
0.959793
386
3.078125
3
Truth be told, conventional medicine has made some strides (let’s call them baby steps) over the last 40 years when it comes to disease prevention. Mainstream medicine does continue to tout the “slash-and-burn” method as the be-all and end-all for treating cancer after the fact. Yet the concept of taking proactive steps to reduce the risk of cancer (like exercising and eating “healthier”) is now fairly commonplace. What your conventional doctor is probably forgetting to mention, however, is that for years there has been a simple, natural, and yes, scientifically proven way to keep cancer at bay. It’s called sulforaphane. It can be found in cruciferous vegetables and especially in broccoli sprouts. Dr. Talalay’s Game-Changing Sulforaphane Study “Three-day-old broccoli sprouts consistently contain 20 to 50 times the amount of chemoprotective compounds found in mature broccoli heads and may offer a simple dietary means of chemically reducing cancer risk,” Dr. Paul Talalay reported in a 1997 Johns Hopkins press release. Dr. Talalay is the Founding Director of the Lewis B. and Dorothy Cullman Chemoprotection Center at the Johns Hopkins University School of Medicine. He is one of the top biomedical researchers in the world and a pioneer in the field of phytochemicals. Talalay’s ground-breaking study, completed in 1991, was one of the first to focus on cancer prevention through diet. It was the very first to isolate sulforaphane in cruciferous vegetables as a cancer preventer. Sulforaphane works its magic by boosting Phase 2 enzymes in the body, whose job it is to neutralize the processes of disease. Talalay and his team fed broccoli sprout extracts to female rats for five days. They then exposed them and a control group to a carcinogen. The rats that had received the extract developed fewer tumors. Those that did have tumors developed smaller ones that took longer to grow than the control group’s did. Not surprisingly, the first publishing venue Talalay and his colleagues approached about their findings (Science magazine) rejected it. The study was eventually published a year later in the Proceedings of the National Academy of Sciences. Since then, there have been hundreds of published reports proving the healing effects of phytochemicals such as sulforaphane. There is No Time to Waste When It Comes to Cancer Prevention Still, conventional medicine continues to drag its feet when it comes to pursuing and funding cancer prevention research. “There’s no romance in it,” says Michael Sporn, professor and cancer prevention researcher at Dartmouth Medical School. “There’s no one on death’s door whose life is saved through prevention. The American public is way ahead of medicine on this.” As 10 million new cancer cases are discovered each year, including 230,000 cases of invasive breast cancer, it is long past the time when doctors and researchers have the luxury of tip-toeing around the issue of cancer prevention. Remember, it is up to YOU to be proactive with prevention for your body’s overall health and vitality. A good place to start is by adding more sulforaphane-rich foods in your diet.
<urn:uuid:725161f7-0153-44b1-80f6-1cbd4a972a40>
CC-MAIN-2017-39
https://thetruthaboutcancer.com/johns-hopkins-sulforaphane-cancer-study/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685850.32/warc/CC-MAIN-20170919145852-20170919165852-00659.warc.gz
en
0.952844
695
3.015625
3
Found these very interesting to look at – didn’t have time to write it up so I’m C&P-ing from WikiPedia for now: The cave is situated above the previous course of the Ardèche River before the Pont d’Arc opened up. The gorges of the Ardèche region are the site of numerous caves, many of them having some geological or archaeological importance. The Chauvet Cave is uncharacteristically large and the quality, quantity, and condition of the artwork found on its walls have been called spectacular. Based on radiocarbon dating, the cave appears to have been used by humans during two distinct periods: the Aurignacian and the Gravettian. Most of the artwork dates to the earlier, Aurignacian, era (30,000 to 32,000 years ago). The later Gravettian occupation, which occurred 25,000 to 27,000 years ago, left little but a child’s footprints, the charred remains of ancient hearths and carbon smoke stains from torches that lit the caves. After the child’s visit to the cave, evidence suggests that the cave had been untouched, due to a landslide which covered its historical entrance, until discovered in 1994. The footprints may be the oldest human footprints that can be dated accurately. The soft, clay-like floor of the cave retains the paw prints of cave bears along with large, rounded, depressions that are believed to be the “nests” where the bears slept. Fossilized bones are abundant and include the skulls of cave bears and the horned skull of an ibex. Hundreds of animal paintings have been catalogued, depicting at least 13 different species, including some rarely or never found in other ice age paintings. Rather than depicting only the familiar animals of the hunt that predominate in Paleolithic cave art, i.e. horses, cattle, reindeer, etc., the walls of the Chauvet Cave include many predatory animals: Cave lions, panthers, bears, owls, and Cave Hyenas. Also pictured are rhinos. Typical of most cave art, there are no paintings of complete human figures, although there is one possible partial “Venus” figure that may represent the legs and genitals of a woman. Also a chimerical figure may be present; it appears to have the lower body of a woman with the upper body of a bison. There are a few panels of red ochre hand prints and hand stencils made by spitting pigment over hands pressed against the cave surface. Abstract markings—lines and dots—are found throughout the cave. There are also two unidentifiable images that have a vaguely butterfly shape to them. This combination of subjects has led experts in prehistoric art and cultures to believe that there was likely a ritual, shamanic, or magical aspect to these paintings. The artists who produced these unique paintings used techniques not often seen in other cave art. Many of the paintings appear to have been made only after the walls were scraped clear of debris and concretions. This left a smoother and noticeably lighter area upon which the artists worked. Similarly, a three dimensional quality is achieved by incising or etching about the outlines of certain figures. This visually emphasizes some of the animals and allows torch light to cast shadows about the edges.
<urn:uuid:4ed1c253-882f-465c-b869-e7c2fa4a1488>
CC-MAIN-2018-26
https://joberry4.wordpress.com/2012/03/25/clan-of-the-french-cave-bear/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861899.65/warc/CC-MAIN-20180619041206-20180619061206-00481.warc.gz
en
0.960158
690
2.890625
3
- Gas Leak - Power Outage - On Campus Incident - Off Campus Incident - Policies and Procedures - Radiation Fact Sheet - General Terrorism Info Threat of Violence - Active Shooter - Bomb Threat - Violent or Criminal Behavior - Aircraft Accident - Train/Railroad Accident - Severe Weather Policy - Extreme Heat - Severe Thunderstorm - Severe Weather Shelter Maps - Tornado/High Wind - Winter Storm Building Safety & Security - Building Emergency Action Plan (BEAP) for Labs - Building Emergency Action Plan (BEAP) for Admin & Classrooms General Terrorism Information Terrorism has emerged as a very real threat across our nation and internationally. Any organization, group or individual can be a target or innocent victim of terrorism. In the past 20 years, terrorist attacks upon Americans have included the bombing of the Oklahoma City Federal Building, the 1996 bombing of the Olympics in Atlanta, and the 2001 attacks on the World Trade Center and Pentagon. Terrorism can take many forms, from an individual with a gun or bomb to groups using chemical, biological or nuclear weapons. Depending on the nature of the attack and type of weapon used, the campus community may be affected by either an on or off campus attack. In many instances the incident may not be immediately identifiable as a terrorist attack. Your response to an incident should follow the guidelines for the type of event that occurs (a detonated bomb should be treated as an explosion). The following general information on terrorism is taken from the Federal Emergency Management Agency (FEMA) website. Refer to the FEMA website for additional information on terrorism. Terrorism is the use of force or violence against persons or property in violation of criminal laws for purposes of intimidation, coercion or ransom. Terrorists often use threats to: - Create fear among the public. - Try to convince citizens that their government is powerless to prevent terrorism. - Get immediate publicity for their cause. Acts of terrorism include bomb scares and bombings, cyber (computer-based) attacks, and the use of chemical, biological, nuclear and radiological weapons. Within the immediate area of a terrorist event, you need to rely on police, fire and other officials for instructions. However, you can prepare in much the same way you would prepare for other crisis events. General Safety Guidelines - Be aware of your surroundings. - Move or leave if you feel uncomfortable or if something does not seem right. - Take precautions when traveling. Be aware of conspicuous or unusual behavior. Do not accept packages from strangers. Do not leave luggage unattended. - Promptly report unusual behavior, suspicious or unattended packages, and strange devices to the University Police or call 9-1-1. - Learn where emergency exits are located in buildings you frequent. Plan how to get out in the event of an emergency. - Be prepared to do without services you normally depend on - electricity, telephone, natural gas, gasoline pumps, cash registers, ATMs and internet transactions.
<urn:uuid:aca943c5-3b49-41a9-a899-500b03365a1f>
CC-MAIN-2013-20
http://und.edu/emergency-management/terrorism-general.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700842908/warc/CC-MAIN-20130516104042-00091-ip-10-60-113-184.ec2.internal.warc.gz
en
0.88819
626
3.25
3
Track the 230 VAC power line with your favorite HW using a small, efficient, and inexpensive circuit. In my wireless doorbell tutorial I gave the advice about how to get a digital signal from a 12 Vac source so it could be read with any desired HW. That solution is not valid for high voltage, since the dissipated power is not acceptable. Hereby I describe another circuit that solves the issue. If you want to track when a blackout occurs, there might be several solutions: - Use a transformer to reduce the voltage, rectify it and adapt the signal to your system. - Get whatever phone charger you have in your drawer, disassemble it, remove the output capacitor or change it for a lower value to get a quicker response, and there you have your 5 Vdc signal. - Build the following explained circuit. - P.S.: in the comments, there is JT proposing another very interesting solution with a 230 V neon tube and a LDR. All these three solutions are perfectly valid, and it is easy to understand the pros and cons of each one. But in my opinion, the proposed solution is the cheapest, most efficient and smallest. For those not into electronics, here is the explanation of why does this work: In the DC world, a capacitor is just a reservoir and ideally, in the stationary term, we can consider it as an open circuit (infinite impedance). But in the AC world, a capacitor represents an impedance, which is calculated as Z = 1/(2*pi*freq*C). In this case, with a 100 nF capacitor it would be equivalent to almost 32 kOhm. Applying the most popular formula in electronics (V = I*R), that gives around 7 mA current. But wait, I learned in the school that if the voltage is to much, I could reduce it with a voltage divider using just two resistors of the appropriate value; so, why not to do the same directly with a 32 kOhm resistor?? The answer is that the resistor would heat quite a lot (1.65 W), but the capacitor will not, because it doesn't consume real power, just reactive, that doesn't produce work (work = heat). That's quite a complex topic in electronics, that I'm not gonna explain here, but as a quick hint about how to think about it, imagine the capacitor as a flexible membrane; electrons do not pass through, as it would be the case with a resistor, but they push the membrane and their effect is transmitted to the electrons in the other side of the membrane. This way we take advantage of the costless high voltage drop in the capacitor and rectify the remaining low AC voltage as we would do with a regular transformer. To sum up, we did kind of the same as with a voluminous transformer (to reduce the voltage), but with just a simple inexpensive capacitor and consuming less power. Isn't it beautiful? There is another difference in comparison with using a transformer: the current is limited. With a transformer, your low voltage capacitor (the 47 uF one) will absorb all necessary current until it reaches the rectified voltage, but that doesn't happen in the proposed solution, where the current is limited by the capacitor's impedance and the rectified voltage depends on the load. That makes the values of the capacitor and resistor in the low voltage side critical. Although slight different values could also work (electronics is rarely an accurate science in terms of component values), there is not much margin; but if using a transformer, one magnitude order variation in the resistor and capacitor wouldn't be a big deal. Note for 110 Vac 60 Hz powernets The represented circuit is meant for 230 Vac 50 Hz. To have the equivalent for 110 Vac 60Hz, just use a 150 nF or 220 nF capacitor instead of the 100 nF. In fact, a 150 nF capacitor suits even for both systems, but the proposed 100 nF has a quicker response. I use this circuit in my home automation system, attached directly to a Raspberry Pi, that is powered by a standard 5 V adaptor, but also in parallel with a power bank. Whenever a blackout occurs, the power bank keeps feeding the Raspberry, but the power outage is detected, sending me a notification thanks to Domoticz, my home automation system. Obviously, to send the notification, either you have your router with an UPS, as I do (15 € second hand), or you are connected to the mobile network. This way I can know exactly when and for how long the blackout happened and do some automatic tasks when the power returns, like switching off my Hue lights that inevitably turn on on power up. I believe you are not dumb, but I shall warn anyway that you are dealing with high voltage that can cause you injuries and even death. Take care if you put this project in practice. I would recommend you, that once you have finished the circuit, you seal it somehow (hot glue perhaps? I love it), so you don't touch live parts accidentally when having your fingers around distracted with another thing that might be in the same box. I edit the article to add this section, in order to make more emphasis in the safety measures to be taken into account, as highlighted by some pals in the comments. First, since we are dealing with high voltage (high voltage can be a relative concept, not only the definition of whatever technical field as noted in one comment below), I would recommend refraining of playing around with this if you are not familiar with electricity. Second, as said originally, but it's good to repeat, you should seal the circuit, not only to avoid yourself to touch live parts, but also any other wire around, or whatever. By the way, I tried to burn hot glue and it seems to be safe enough. Third, the above described circuit does not contain safety measures. A recommendation to protect the circuit against possible failures and surges would be as follows: The MOV (V1) protects the circuit against surges, that could affect C1, and the fuse avoids the risk in case of a short in the circuit. Keep in mind the ratings are for 230 Vac, use appropriate values for other voltages. Still I would like to note, that this circuit is not a bomb! If C1 is OK, it doesn't matter much whatever happens to the rest of the components, because the current would be limited to 7 mA. That's why I don't specify the ratings for BR1, C2 and R1. In the worst case, if the R1-U1 branch opens, the voltage at C2 will SLOWLY tend to increase until 325 V and eventually, if its rating is under that value, obviously it will fail in a no very espectacular way. In my opinion, it is better to use a low voltage rating capacitor to make it fail the soonest -> less energy (remember, current is limited, so a short circuit in C2 is OK). Using a 400 V electrolytic capacitor would be very voluminous and in the explained case, it would remain loaded with a dangerous voltage and energy. A zener in parallel to C2 would be even better, this way that capacitor will survive. The other important fact, is that the typical failure of film capacitors, as C1, is open circuit. In fact, against voltage spikes they react losing capacitance, but still working, due to its “self-healing” propriety. Source: Power Outage Sensor
<urn:uuid:2fbbfb23-1b34-4d42-9673-d6af2362f86a>
CC-MAIN-2023-50
https://projects-raspberry.com/power-outage-sensor/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00790.warc.gz
en
0.951045
1,554
3.078125
3
To live vigorously and luxuriantly, to flourish Spirulina is single celled, cyanobacteria, or better known as blue-green algae. Spirulina contains nearly 60% protein making it a great candidate as a meat-alternative complete protein source. It is also said to be one of the only plant sources to contain B-12, a vital vitamin that most vegetarians lack in their diets. It is rich in healthy lipids such as ALA (omega 3), LA (omega 6), GLA (helps with inflammation) and DHA (primary component of the brain.). Spirulina also contains vitamins B1 (thiamine), B2 (riboflavin), B3 (nicotinamide), B6 (pyridoxine), B9 (folic acid), vitamin C, vitamin D, and vitamin E. It is a source of potassium, calcium, chromium, copper, iodine, magnesium, manganese, phosphorus, selenium, sodium and zinc. • Alleviates allergy symptoms • Strengthens the immune system • Controls high blood pressure • Controls cholesterol • Protects against cancer • Supports the growth of healthy bacterial flora in the gut • Reduces the risk of cataracts and age related macular degeneration • Acts as an anti-inflammatory and antimicrobial • Works antiviral activity against HIV, herpes, and hepatitis • Improves insulin resistance • Protects against chemotherapy induced liver damage
<urn:uuid:aaf6456b-51c6-41c8-a6dc-0375a0f3012b>
CC-MAIN-2021-17
https://thrivecoach12.com/2016/05/31/spirulina/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038073437.35/warc/CC-MAIN-20210413152520-20210413182520-00504.warc.gz
en
0.890595
313
2.65625
3
site is no longer active. Mother Jones (Mary May 1, 1830 or 1837 LINKS TO LEARN SO MUCH MORE After her four children and her husband died in the yellow fever epidemic, Mary Harris Jones --previously a dressmaker-- got involved in the American labor movement during the 1870s. She was labeled "the most dangerous woman in America" by the politicians of her time. She spoke, wrote and organized constantly against labor conditions which included having seven-year-old children working 14-hour days in the factories for just enough money to feed themselves. Mary Harris Jones was a blunt speaker and one of the most effective organizers of her time. She organized or attended every major U.S. labor strike from the 1870s until 1924. She was once ordered to leave the state of Colorado for stirring up workers. She died at the age of 100. of the Illinois Labor History Society "Pray for the dead, but fight like Hell for the living." - Mother Jones magazine is named after Mary Harris Jones Mother Jones: The Miners' Angel, Dale Fetherling Ronnie Gilbert on Mother Jones: Face to Face with the Most Dangerous Woman in America, Ronnie Gilbert Autobiography of Mother Jones, Mary Harris Jones Mother Jones Speaks: Collected Speeches and Writings, Mary Harris The Correspondence of Mother Jones, Mary Harris Jones Labor's Defiant Lady, Irving Werstein Search our past database for famous women astronauts, politicians, athletes, mathematicians, authors, and educators: More Women of Achievement.
<urn:uuid:7febc4cc-ec1c-44bc-bd29-6179bb257ec1>
CC-MAIN-2015-14
http://www2.edc.org/WomensEquity/women/jones.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131295084.53/warc/CC-MAIN-20150323172135-00259-ip-10-168-14-71.ec2.internal.warc.gz
en
0.903207
343
2.90625
3
STAND-TO! Edition: Thursday August 8, 2013 Military Immunization Program What is it? Army Medicine in collaboration with Military Vaccination Agency (MILVAX) ensures that every Soldier, family member, Department of the Army Civilian and health beneficiary receive all required immunizations and obtain their influenza vaccinations to ensure the Army is a healthy and mission-ready force. Annually, in the U.S., influenza causes more than 150,000 hospitalizations due to serious complications, and more than 30,000 deaths among an estimated 25 million reported cases. Vaccination is the best method for preventing influenza and its complications. The month of August has been designated as National Immunization & Influenza Vaccination Awareness Month. What has the Army done? Working closely with MILVAX, the Army has helped to prevent deaths and disease in its troops over the past decade. Morbidity from most vaccine-preventable diseases has fallen 90 percent or more since the 20th century. Immunizations are the best protection against disease and have saved more lives than any other medical measure in history. - • Vaccines shield Soldiers from dangerous germs which can kill or cause lasting harm - • Vaccines prevent infections, such as tetanus, typhoid fever, measles, yellow fever, smallpox, and anthrax - • Vaccines keep units fit to fight - • Vaccines benefit both individuals and units - • Vaccines keep people healthy so they can live better lives - • Vaccines keep people healthy so they can do their mission - • Vaccines help Soldiers return home healthy What does the Army have planned for the future? The Army will continue to aggressively educate all Soldiers, family members and other beneficiaries on the importance of keeping their immunizations up to date. For the 2013-2014 influenza season, the Army has contracted for 1.8 million doses of influenza vaccine. This amount will ensure the entire Army family is protected against influenza. It is projected that manufacturers will begin delivering influenza vaccine to the Defense Logistics Agency (DLA) Troop Support in August 2013. Why is this important to the Army? Army Medicine is committed to ensuring that every Soldier, family member, DA Civilian, healthcare provider and retiree receives the vaccines they need to stay healthy. Flu seasons are unpredictable and have the potential to impact force readiness and the Army's mission. Army Chief of Staff Gen. Raymond T. Odierno visited with leaders and Soldiers deployed... Read More about CSA visits Soldiers in southern Afghanistan Focus Quote for the Day Immunizations protects both the people who receive them and those with whom they come in contact. Too many adults become ill or die each year from diseases that could be prevented. Everyone, young and old, benefits from immunizations ... As the Army's first line of defense in the health of those entrusted to our care, we need you to be wise and immunized. Serving to heal, honor to serve!
<urn:uuid:7fcbae47-476e-4b31-9a64-b1b8e2f789cd>
CC-MAIN-2016-07
http://www.army.mil/standto/archive_2013-08-08/
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701158481.37/warc/CC-MAIN-20160205193918-00031-ip-10-236-182-209.ec2.internal.warc.gz
en
0.944334
611
2.65625
3
Destruction In Liuchow Samuel D. Smith Although by 1944 the war was not going well for the Japanese, in a desperate attempt to salvage something from the years of fighting in China they opened an offensive in April to consolidate their gains. One of the aims of ICHIGO, the Japanese code name for what would prove to be the final offensive, was to capture the chain of American air bases in eastern China, one of which was in Liuchow. On 10 November the Japanese captured and occupied the city. Their occupation was short-lived, however. By 26 December the Chinese were actively planning to retake the city, and on 22 June 1945, the Japanese abandoned Liuchow in the face of the advancing Chinese Army.
<urn:uuid:5bc86b38-af66-473d-b07d-7d7d952222a7>
CC-MAIN-2013-48
http://www.history.army.mil/html/artphoto/pripos/tideturns/destruction.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163037952/warc/CC-MAIN-20131204131717-00034-ip-10-33-133-15.ec2.internal.warc.gz
en
0.985051
151
2.765625
3
Islamic view of angels This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message) |Part of a series on| Angels (Arabic: ملائكة malāʾikah; singular: ملاك or مَلَكْ malāk) are heavenly beings mentioned many times in the Quran and hadith literature. Unlike humans or jinn, they have no biological needs and therefore no lower desires predicated by animal nature; consequently, they may be described as creatures of pure reason, who though endowed with free will are not subject to temptation. While it has been said that angels lack free will since they are known from the Quran to strictly obey what God commands, this assertion would contradict the implications of a well-known hadith concerning an argument that took place between the angels of Mercy and the angels of Punishment about what to do with a notorious murderer who repented of his crimes but died before reaching a destination that would have ensured his forgiveness. Belief in angels is one of the six Articles of Faith in Islam. Just as Allah made Adam, the first human, from clay, and jinn from smokeless fire, He made the angels from light. The astrophysicist Nidhal Guessoum in his book "Islam's Quantum Question" has pointed to modern Islamic scholars such as Muhammad Asad and Ghulam Ahmed Parwez who have suggested a metaphorical reinterpretation of the concept of angels. There is no standard hierarchical organization in Islam that parallels the division into different "choirs" or spheres, as hypothesized and drafted by early medieval Christian theologians. Most[who?] Islamic scholars agree that this is an unimportant topic in Islam, simply because angels have a simple existence in obeying God already, especially since such a topic has never been directly addressed in the Quran. However, it is clear that there is a set order or hierarchy that exists between angels, defined by the assigned jobs and various tasks to which angels are commanded by God. Some scholars suggest that Islamic angels can be grouped into fourteen categories as follows, of which numbers two-five are considered archangels. Due to varied methods of translation from Arabic and the fact that these angels also exist in Christian contexts and the Bible, several of their Christian and phonetic transliteral names are listed: - Jibrail/Jibril (Judeo-Christian, Gabriel), the angel of revelation. Jibril is the archangel responsible for revealing the Quran to Muhammad, verse by verse. Jibrail is widely known as the angel who communicates with (all of) the prophets and also for coming down with God's blessings during the night of Laylat al-Qadr ("The Night of Divine Destiny (Fate)"). Jibril is mentioned by name in the Quran. - Mikail (Judeo-Christian, Michael), who provides nourishments for bodies and souls. Mikail is often depicted as the archangel of mercy who is responsible for bringing rain and thunder to Earth. He is also responsible for the rewards doled out to good people in this life. - Israfil or Israafiyl (Judeo-Christian, Raphael_(archangel)), is an archangel in Islam who will blow the trumpet twice [or thrice] at the end of time. According to the hadith, Israfil is the angel responsible for signaling the coming of Qiyamah (Judgment Day) by blowing a horn. The blowing of the trumpet is described in many places in the Quran, but the name Israfil is not mentioned in the holy text, rather the tradition may adopted the name from Judeo-Christian tradition. It is said that the first blow will bring all to attention, will end all life, while the second blow will bring all human beings back to life again to meet their Lord for their final judgement. Those who say it is three blows, say the first one will cause everyone to be startled. The second: everyone will die; and the third will be that of resurrection. - 'Azrael/'Azraaiyl also known as Malak al-maut (Judeo-Christian, Azrael), the angel of death. He is responsible for parting the soul from the body. He is not mentioned by name, only referred as malak al-maut, meaning angel of death, in the Quran. While angels are known to perform various functions, one of the most prominent of these is to be messengers. The angel Jibreel (Gabriel) is the most important (prominent) messenger angel, as he delivers the message of God (Allah) to the Islamic prophets. Angels cannot ordinarily be seen as they are heavenly beings but they can take on different forms, including that of human beings. One well-known example is when God sent the angel Jibreel (Gabriel) to Maryam (Mary) in the form of a man, as God says in the Quran: ...then We sent her our angel, and he appeared before her as a man in all respects. Similarly, angels also came to ʾIbrāhīm (Abraham) in human form, and he was not aware that they were angels until they told him so. Lūṭ (Lot) also had angels come to him to warn him of the impending doom of his people. All angels praise and glorify God and they never become tired of doing this. They celebrate His praises night and day, nor do they ever flag or intermit. ...for in the presence of thy Lord are those who celebrate His praises by night and by day. And they never flag (nor feel themselves above it). There are angels who stand in rows (in the worship of Allah), never tiring or sitting, and others who bow or prostrate to Allah continuously for their entire lifetimes, without ever raising their heads. Abu Dharr al-Ghifari is quoted as saying: "The Messenger of Allah (Peace & Blessings of Allah be upon him) said: 'I see what you do not see and hear what you do not hear. The heaven makes a noise like groaning, and it has the right to (or it is no surprise), for there is no space in it the width of four fingers, but there is an angel there, placing his forehead in sujood (prostration) to Allah. By Allah, if you knew what I know, you would laugh little and weep much, you would not enjoy your relationships with women and you would go out in the street praying to Allah.'" No angel would want to disobey God, for not only would it make no sense, but it would contradict their nature. It follows that the accursed Iblīs or Shaytan (the Devil or Satan) was never an angel; rather, he was one of the jinn. O ye who believe! Save yourselves and your families from a Fire whose fuel is men and stones, over which are (appointed) angels stern (and) severe, who flinch not (from executing) the Commands they receive from Allah, but do (precisely) what they are commanded. The Quran also mentions that among the physical qualities of the angels are what may be classified as "wings": Praise be to Allah, Who created (out of nothing) the heavens and the earth; Who made the angels, messengers with wings - two, or three, or four (pairs):... The preceding sentence does not imply that all angels have two to four wings. Most notably, archangels (namely Gabriel and Michael) are described as having thousands of wings. However, according to another narration collected by Muhammad al-Bukhari, the Prophet Muhammad said that Gabriel possessed 600 wings; Narrated Abu Ishaq-Ash-Shaibani: I asked Zir bin Hubaish regarding the Statement of Allah: "And was at a distance of but two bow-lengths or (even) nearer; so did (Allah) convey the Inspiration to His slave (Gabriel) and then he (Gabriel) conveyed (that to Muhammad). (53.9-10) On that, Zir said, "Ibn Mas'ud informed us that the Prophet had seen Gabriel having 600 wings." Angels are not equal in status and consequently, they are delegated different tasks to perform. The names and roles of some angels have been mentioned to us: - The angels of the Seven Heavens. - Hafaza, (The Guardian Angel): - Kiraman Katibin (Honourable Recorders), two of whom are charged to every human being; one writes down good deeds and another one writes down evil deeds. They are both described as 'Raqeebun 'Ateed' in the Qur'an. - Mu'aqqibat (The Protectors) who keep people from death until its decreed time and who bring down blessings. - Jundullah, those who helped Muhammad in the battlefield - The angels who violently pull out the souls of the wicked, - Those who gently draw out the souls of the blessed, - Those angels who distribute (provisions, rain, and other blessings) by (God's) Command. - Those angels who drive the clouds. - Hamalat al-'Arsh, those who carry the 'Arsh (Throne of God), comparable to the Christian Seraph - Those that give the spirit to the foetus in the womb and are charged with four commands: to write down his provision, his life-span, his actions, and whether he will be wretched or happy. - The Angel of the Mountains - Munkar and Nakir, who question the dead in their graves. - Darda'il (The Journeyers), who travel in the earth searching out assemblies where people remember God's name. - The angels charged with each existent thing, maintaining order and warding off corruption. Their number is known only to God. - There is the angel who is responsible for Jannah (Paradise). A weak hadith gives his name as Ridwan. - Maalik is the chief of the angels who govern Jahannam (Hell) - Zabaniah are 19 angels who torment sinful persons in hell These angels take no pity in punishing, as they do what the Lord has commanded them precisely and perfectly. A verse stipulates this: O ye who believe! Save yourselves and your families from a Fire whose fuel is men and stones, over which are (appointed) angels stern (and) severe, who flinch not (from executing) the Commands they receive from Allah, but do (precisely) what they are commanded.— Quran, sura 66 (At-Tahrim), ayah 6 Behold! the angels said: "O Mary! Allah giveth thee glad tidings of a Word from Him: his name will be Christ Jesus, the son of Mary, held in honour in this world and the Hereafter and of (the company of) those nearest to Allah; Muhammad, speaking of the physical magnitude of angel Gabriel, has said that his wings spanned from the eastern to the western horizon. Whoever claimed that (the Prophet) Muhammad saw his Lord is committing a great fault, for he only saw Gabriel in his genuine shape in which he was created covering the whole horizon.— Muhammad al-Bukhari, Sahih al-Bukhari, Volume 4, Book 54, Number 457 Verses in the Quran that directly name angels Gabriel (Jibreel) and Michael (Meekaal) are mentioned early on the Quran in sura Al-Baqarah: Say: Whoever is an enemy to Gabriel-for he brings down the (revelation) to thy heart by Allah's will, a confirmation of what went before, and guidance and glad tidings for those who believe,- Whoever is an enemy to Allah and His angels and messengers, to Gabriel and Michael,- Lo! Allah is an enemy to those who reject Faith. Another angel, Maalik is defined in the Quran as a being who is the warden of Hell. However Maalik is not an evil angel, nor a fallen one, a notion Islam rejects, rather Maalik is merely doing what he is commanded to do by God. In Islam, Iblīs or Shayṭan (the Devil or Satan) is considered to be a jinn rather than a fallen angel, since he questioned God when He ordered the angels to prostrate themselves before Adam, an act that suggested he possesses free will. An alternative view holds that rather than "defying" God, Iblis was acting in a manner predetermined by God. They will cry: "O Malik! would that thy Lord put an end to us!" He will say, "Nay, but ye shall abide!" Two other angels are also mentioned directly in the Quran: Haaroot and Maaroot (Harut and Marut): ...and such things as came down at Babylon to the angels Harut and Marut.— Quran, sura 2 (Al-Baqara) ayah 102 Several angels such as Azrael, Israfil, Munkar and Nakir are not mentioned directly in the Quran but are explained further in the hadiths of Muhammad. |Wikimedia Commons has media related to Angels in Islam.| - Angels Archived April 10, 2012, at the Wayback Machine. - Guessoum. Islam's Quantum Question: Reconciling Muslim Tradition and Modern Science. - Quran 2:97-98 - Quran 2:98 - Quran 69:13 - Quran 32:11 - Al-Malaa’ikah (Angels) - Quran 19:17 - Quran 21:20 - Quran 41:38 - Quran 66:6 - Quran 35:1 - Quran 53:9–10 - Sahih al-Bukhari, 4:54:455 - Quran 82:11 - Quran 13:10–11 - Quran 79:1 - Quran 79:2 - Quran 51:4 - Quran 37:2 - Quran 40:7 - Sahih al-Bukhari, 1:6:315 - Sahih al-Bukhari, 4:54:454 - Darda'il on Dinul-islam.org[dead link] - The Vision of Islam by Sachiko Murata & William Chittick pg 86-87 - Quran 3:45 - Sahih al-Bukhari, 4:54:457 - Quran 2:97–98 - Quran 43:77 - Quran 2:102
<urn:uuid:46ae1d54-0cd9-4378-b206-ef012e991f66>
CC-MAIN-2016-44
https://en.wikipedia.org/wiki/Islamic_view_of_angels
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721555.54/warc/CC-MAIN-20161020183841-00037-ip-10-171-6-4.ec2.internal.warc.gz
en
0.948875
3,107
3.0625
3
670 Brother Dicul The South Saxons were one of the last Saxon kingdoms to be converted to Christianity. The first evidence of Christian preaching was the in 670 by an Irish monk named Dicul who set up a small monastery in Bosham with 5 or 6 brothers. At that time the local Saxon population paid little attention to his teachings and the church did not become well established in Sussex until two years later with the arrival of Bishop Wilfred. Dicul is thought to be burried in Delgany, County Wicklow, Ireland. 672 Bishop Wilfred Bishop Wilfred had been banished from York by King Egfrid. During his banishment he set about converting the South Saxons. In 672 there had been a three year famine in Sussex. Bede reports the population was in despair with occurrences of mass suicides amongst the South Saxons. After their conversion to Christianity the drought was broken and crops flourished. Bishop Wilfred was able to offer practical, in addition to spiritual guidance, and showed the Saxons that the nets they used to catch eels could also be used to catch fish in rivers, lakes and the sea. This helped limit the effects of the famine. About this time the South Saxon king Æthelwalh was baptized. King Æthelwalh of Sussex granted 87 hides of land at Selsey near Bosham and King Cædwalla of Wessex, granted another fifty-five hides around Selsey to Bishop Wilfrid. In accordance with his teachings the bishop released all 250 slaves on the land. 681 Selsey Abbey In 681 Wilfred built an abbey at Selsey and filled it with brothers from his native Northumbria. In 692 Noðhelm, also known as Nothhelm or Nunna, King of South Saxons granted 33 hides to his sister Noðgyð (Nothgyth) to construct a monastery. Noðgyð later became a nun. Wilfred was succeeded as abbot of Selsey in 705 by Bishop Eadbert. In 714 south saxon king Noðhelm granted more land to the monks of Selsey, but after 731 the abbey fell into abeyance. The location of Selsey abbey is now lost to the sea, but parts of the abbey were still visible at low tide as late as the end of the 16th century. A Miracle at Selsey Not long after its founding, a plague struck the monastery and many brothers died. There is a story that the plague was ended after a young Saxon boy had a vision of St Peter and St Paul. In the vision, the boy was told that he would be the last to die. St Oswald, the Northumbrian saint, had prayed on the anniversary of his death that the brothers might be saved. The young Saxon boy was the last to die the remaining brothers spared. St Cuthman's origins are not known for certain, but he was likely born in Chidham, near Bosham in Sussex and that his parents may have been converted to christianity by St Wilfrid. After his father died, Cuthman supported his invalided mother. He built shelter for her and used a wheelbarrow to transport her around the Adur valley. He used leather strap attached to the wheelbarrow to help take the weight. The strap broke in Steyning and Cuthman took this as a sign from God and built a church at that spot. There is still a church at the site, although the current church is mainly Norman in construction. The Norman church of St Andrews, Steyning is shown right.
<urn:uuid:4f520de5-fd2a-457c-a49b-00c33657fd98>
CC-MAIN-2017-17
http://castles.rbjenet.com/sussex-timeline/670-christianity-in-sussex.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120461.7/warc/CC-MAIN-20170423031200-00347-ip-10-145-167-34.ec2.internal.warc.gz
en
0.985932
753
3.625
4
If you are not familiar with working around radiation or radioactive material, the terms and concepts may confuse you at first. Let's look at some of the properties of radiation and radioactive material. - Radiation - Radiation is energy in the form of waves or particles given off during radioactive decay, or as a consequence of certain physical processes that we can control. Examples of these are x-ray machines and particle accelerators. - Radioactive material - Any material that contains radioactive (unstable) atoms. Radioactive materials are everywhere. Usually, we only encounter them in very small amounts. Since radioactive material contains unstable atoms, it emits radiat - Radioactive contamination - Not all radioactive material is considered "contamination". contamination is radioactive material that is in a form or location which may allow it to be spread to unwanted locations. Many radioactive sources are s ealed or are in a form that isolates the material from potential spread. Contamination may be Fixed, Transferable (loose), or Airborne. It is important to note that exposure to radiation does not result in contamination of the worker. You may become contaminated only through direct contact with material that has removable radioactive material, or by working in areas where this contaminated material is handled. - Radioactivity - Radioactivity is the process od unstable (or radioactive) atoms becoming stable by emitting radiation. The radioactive decay process involves fundamental physical constants which enable us to characterize and measure radioacti ve materials very accurately. - Radioactive half-life - Radioactive half-life is the time is takes for one half of the radioactive atoms present in a given sample to decay. The half-life of a particular isotope is a constant, and depending on the isotope it may range from a fraction of a second to millions of years. After seven half-lives the activity will be less than 1% of the original activity. Ionization - The process of ionization is important in understanding radiation, because it is this process that differentiates ionizing radiation from other types. Ionization is the process of removing electrons from atoms. If enough energy is supplied to remove electrons from the atom the remaining atom has a + charge. The positive charges atom and the negatively charges electron are called an ion pair. Ionization should not be confused with radiation. Ions (or ion pairs) can be the result of radiation exposure and allow the detection of radiation. Typically, we classify types of radiation as ionizing or non -ionizing radiations depending on whether or not the radiation can form ion pairs in common material such as air ot tissue. - Ionizing radiation - Radiation which has enough energy to ionize an atom is called ionizing radiation. The four basic types of ionizing radiation that are of primary concern to us are alpha particles, beta particles, gamma rays (includes x -rays) and neutron particles. - Non-ionizing radiation - Radiation that doesn't have the amount of energy needed to ionize an atom. Examples of non-ionizing radiation are ultraviolet rays, microwaves and visible light.
<urn:uuid:54e0a7ff-920e-4db8-a8ab-2187d4d8defe>
CC-MAIN-2015-22
https://www.jlab.org/div_dept/train/rad_guide/rad.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929023.5/warc/CC-MAIN-20150521113209-00012-ip-10-180-206-219.ec2.internal.warc.gz
en
0.912106
632
4.125
4
It’s been blissfully pest-free so far at the allotment this year, so I admit to getting a bit complacent, or at least not vey attentive, because I didn’t notice that rust had got a grip on my precious garlic and was spreading through the plants. Garlic rust is a fungal disease (Puccini allii) transported around by the wind, so it can easily effect nearby onions (alliums) in your plot and those of your neighbours. It isn’t as devastating as it looks, especially at this stage in the year when most of the growing has been done, apparently the flavour isn’t affected either. My plot is organic so I wouldn’t use any chemicals, as it happens there aren’t any to deal with garlic rust. I’ve snipped all the affected leaves off, and the few that are left should be enough to continue photosynthesising and providing nutrients for the plant. The important thing is not to put the leaves on the compost bin, mine have gone in the recycling bin at home and the scissors or secateurs need to be cleaned really well. I gave my scissors a scrub with hot, soapy water. I dug a couple of cloves up to see how big they are, they look fine, not huge but perfectly adequate, and they smell gorgeous. I’ll leave them in the ground a bit longer to give them the chance to grow bigger. Prevention is better than cure, so here’s some tips to avoid garlic rust: - it’s more likely to be around in mid-summer so keep a look-out for it then and snip off any leaves before it gets hold of the plant - it’s more likely to appear on plants grown in nitrogen-rich soils so don’t use too much fertiliser - the virus loves warm, humid conditions, allow plenty of air to circulate through the plants by planting the cloves a reasonable distance apart (20cm/8in). Mine were too close at 15cm apart. - avoid watering in the evening when damp can linger - rotate crops around the plot each year. I also planted some cloves in a plant-pot as bit of an experiment, they haven’t got rust so it’ll be interesting to compare them. Happy gardening, Jill
<urn:uuid:25de14a2-1555-4d1c-962b-a00660a7c1e7>
CC-MAIN-2021-10
http://growingnicely.co.uk/what-to-do-about-garlic-rust/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369512.68/warc/CC-MAIN-20210304174506-20210304204506-00104.warc.gz
en
0.95197
498
2.515625
3
"Because Mercury moves in an orbit around the Sun that lies within Earth's orbit (as does Venus), it can appear in Earth's sky in the morning or the evening, but not in the middle of the night. Also, like Venus and the Moon, it displays a complete range of phases as it moves around its orbit relative to Earth. Although Mercury can appear as a bright object when viewed from Earth, its proximity to the Sun makes it more difficult to see than Venus." "Mercury is gravitationally locked and rotates in a way that is unique in the Solar System. As seen relative to the fixed stars, it rotates exactly three times for every two revolutions it makes around its orbit. As seen from the Sun, in a frame of reference that rotates with the orbital motion, it appears to rotate only once every two Mercurian years. An observer on Mercury would therefore see only one day every two years." Collecting server-data, helping us improve. Connecting our servers in the best way. Testing the new techniques. Transfer data around the world. Deliver the essential data for our servers. Storing data in new and proven secure databases.
<urn:uuid:95592fa3-ebe4-450c-8c1f-79874a0b2d97>
CC-MAIN-2022-27
https://zabbix.wkberg.nl/mercury.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103331729.20/warc/CC-MAIN-20220627103810-20220627133810-00038.warc.gz
en
0.941046
244
4.03125
4
Micro project provides quality education to 5 poor girl children age group 12 to 16yrs studying VI to X Std, as Education is a basic human right, vital to personal & societal development and well-being. This project protects Girls from Child Marriages, Trafficking, Domestic Servants, Eradication of illiteracy & Provides Good Quality Education. From this unique project deprived girl children get timely education material support, uniforms, shoes, footwear, test papers, dictionary, schoolbags. Girl Children belongs to poor family background. Their parents are working as daily wage labourers in hazardous jobs Scavenging, Tobacco making, Market yards, construction sites. Due to poverty parents are forcefully sending girls to landlords to work as domestic servant maids. Sometimes these girl children are trapping into other illegal activities. With this unique micro project Poor Girls protects from hazardous situations and provides better quality education. They will have bright future. This project solves the problem by giving counseling, providing timely education material support, shoes, school bags, uniforms, lunch box, test papers, required material to study well and regular attendance in the school instead of going to work as domestic servant maids in the landlord houses. Girl children are working as bonded labourers in many places. It helps girl children to create a hope on them like & can achieve their career dreams. It protects from child marriages, human trafficking. The project will provide an excellent education and opportunities to these 250 underprivileged children for holistic growth and development, which will put them on the path toward breaking the pervasive cycles of poverty in their slum communities and also have bright future in their career. Especially Destitute Girl Children will be protected from Child marriages, trafficking, domestic servant maids. This project creates a chance to lead good career in their professional lives.
<urn:uuid:b1117663-0b6a-46d1-a0cb-03172992498a>
CC-MAIN-2023-40
https://cl.globalgiving.org/microprojects/poor-girl-children-in-need-for-quality-education-india/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506320.28/warc/CC-MAIN-20230922002008-20230922032008-00134.warc.gz
en
0.932608
399
2.515625
3
Discussion—The Literature Review Process As the community assessment is completed and the statement of the health problem is clearly stated and appropriately quantified using the available epidemiologic tools, one must now start looking at an adequate and suited intervention or policy to address the particular public health problem. The availability of scientific literature is an invaluable source of information to begin searching for the most ideal and best-suited intervention, program, or policy to specifically address the targeted objectives emanating from the community assessment. Because of the considerable amount of scientific literature, a systematic approach to literature searching is imperative to locate credible, high-quality evidence as efficiently and exhaustively as possible. To be systematic, a guide must be applied to aid in what literature is important, where to search for related literature, how to find evidence-based literature, and how to organize the results of a search. In your analysis and evaluation of the three related peer-reviewed scientific articles for Week 3 Project, please share with your peers any difficulties, strategies, or techniques that you developed, discovered, or utilized to simplify or enhance the literature review process. The steps for reviewing the Scientific Literature and Organizing Information are listed below. Please note that you do not need to follow the same order. - Review the issue statement and purpose of the search - Select a bibliographic database - Identify key words - Conduct the search - Refine the search - Select and organize documents for review - Abstract pertinent information from each document - Summarize and apply the literature review If you found that some sections of the literature review process were more difficult compared to some other steps, please talk about this difficulty in this discussion thread. Provide reasons or evidence in support of your responses. Write your initial response in approximately 300 words. By the due date assigned, post your response to the appropriate Discussion Area. Through the end of the week, review and comment on at least two peers’ responses. Consider commenting on their difficulties and your thoughts for suggestions or resolutions. Support your answers with examples and research. Your responses should clarify your understanding of the topic. They should be your own, original, and free from plagiarism. Follow the APA format for writing style, spelling and grammar, and citation of sources. - Reviewed the issue statement and purpose of the search. - Selected a bibliographic database. - Identified key words. - Conducted the search. - Refined the search. - Selected and organized documents for review. - Abstracted pertinent information from each document. - Summarized and applied the literature review. - Shared with peers any difficulties, strategies, or techniques that you developed, discovered, or utilized to simplify or enhance the literature review process. - Responses demonstrated in-depth research and analysis. - Justified your answers with appropriate research and reasoning. - Commented on the postings of at least two peers. Start a New Thread Filter by:All ThreadsSort by:Most Recent Activity Least Recent Activity Newest Thread Oldest Thread Author First Name A-Z Author First Name Z-A Author Last Name A-Z Author Last Name Z-A Subject A-Z Subject Z-A - Week 4 DiscussionTunde Akinmoladun posted Oct 17, 2018 3:22 PMSubscribeClass, This week, you will discuss literature review and the importance of it in research,and the the dos and don’ts of it. Enjoy the week discussing this. Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount! Use Discount Code “Newclient” for a 15% Discount! NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you. The post Discussion—The Literature Review Process appeared first on Quality Nursing Writers.
<urn:uuid:96f8d88c-a6a7-4112-8f8b-2e98cd049f50>
CC-MAIN-2021-43
https://customwritings.pro/discussion-the-literature-review-process-2/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583087.95/warc/CC-MAIN-20211015222918-20211016012918-00493.warc.gz
en
0.899402
819
2.8125
3
Infuse Color With Color-Changing Butterfly Pea Flower Tea Butterfly pea tea is a rare tea that changes color when ingredients are added to change its pH level. The tea alone features a brilliant blue color that can change to vibrant red or deep purple with a simple slice of lemon or a few hibiscus petals. Discover striking beauty with butterfly pea flower tea and learn how to brew it right here. Want to brew color-changing tea today? Check out our Butterfly Pea Flower Tea for a strikingly beautiful tea right here. What Is Butterfly Pea Tea? Butterfly pea tea is an herbal tea made using the rich blue flowers of the butterfly pea plant. The plant goes by the botanical name Clitoria ternatea and is also known as fairy tea, blue tea, and Asian pigeonwings. The plant is native to Southeast Asia and is commonly used in Ayurveda and as a natural food coloring. The tea infusion is naturally caffeine-free and features healthy compounds such as anthocyanins The most unique attribute of this plant is that it is a color-changing tea. The blue color of the tea changes to deep violet or purple when the pH level is altered. The addition of lemon juice or another acid causes these color changes. The tea can also change color to a fire red or fuchsia hue when combined with hibiscus petals. How Is Butterfly Pea Tea Brewed? The traditional brewing methods of this tea hail from Thailand and Malaysia. In Thai culture, the tea is called nam dok anchan and is mixed with honey, lemon, and mint. Other additions include ginger, lemongrass, and even green tea. As the tea becomes more popular in the United States, new and unique infusions are emerging. The tea is a staple ingredient in mood ring cocktails and is often paired with blue foods to play up the vibrant color characteristics of the tea. To brew this tea, simply add one tablespoon of dried butterfly pea flower petals to 10 ounces of hot water. Steep the bright blue petals for five to 10 minutes. Use a strainer to remove the leaves and pour the tea mixture into a clear glass mug. Add a splash of lemon juice so the tea changes color to deep purple. If you want the deep pink hue instead, add a teaspoon of hibiscus petals to the hot water along with the butterfly pea tea. Be Colorful With Butterfly Pea Tea Blue pea tea is an Asian tea that makes tea brewing a blast. The color-changing properties and mild flavor make it a great tea for beginner drinkers as well as connoisseurs. The unique color properties offer a visually pleasing dimension to the brewing process that make this tisane perfect for tea parties and friendly gatherings. Enjoy the pretty hue of blue butterfly pea tea as-is or add an acidic element like lemon juice or lemon slices to turn the color a rich purple. For a fiery atmosphere, add hibiscus petals and watch the blue color change into a brilliant fuchsia. However you decide to enjoy this tea, you're sure to love the vibrant vibes these petals add to your tea repertoire.
<urn:uuid:666d38e9-b26f-4e3f-a096-173fc026e0a7>
CC-MAIN-2021-43
https://senchateabar.com/blogs/blog/butterfly-pea
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584886.5/warc/CC-MAIN-20211016135542-20211016165542-00684.warc.gz
en
0.886295
667
2.53125
3
The overall prevalence of overweight and obesity is expected to increase considerably in India by 2040, with substantial increases particularly among rural residents and older Indians. Most of us associate malnutrition with under-nutrition, without realising that there is another form of it which leads to obesity, caused by the rapidly changing food systems. This is particularly prevalent in in low- and middle-income countries like India. “Undernutrition and obesity can lead to effects across generations as both maternal undernutrition and obesity are associated with poor health in offspring. However, because of the speed of change in food systems, more people are being exposed to both forms of malnutrition at different points in their lifetimes, which further increases harmful health effects,” says the WHO quoting an article in The Lancet. Arguing that “We are facing a new nutrition reality,” Dr Francesco Branca, Director of the Department of Nutrition for Health and Development, World Health Organization, asserts that “we can no longer characterize countries as low-income and undernourished, or high-income and only concerned with obesity. All forms of malnutrition have a common denominator – food systems that fail to provide all people with healthy, safe, affordable, and sustainable diets.” Obesity is often defined in terms of Body Mass Index or BMI (a person’s weight in kilograms divided by the square of height in meters) A high BMI is usually an indicator of high body fat. If your BMI is 30 or higher, it falls within the obese range. If it is 40 or higher, it is categorized as “extreme” or “severe” obesity. Apart from the physical discomfort caused by the excess weight, obesity is a dangerous medical condition that is associated with various orthopaedic problems, diabetes, high blood pressure, heart and other cardiovascular diseases, gallstones, and a risk factor for a number of cancers. It is also difficult to treat, and most people who lose weight regain it within a few years. The main reason for obesity is when people eat more calories than they burn through activity. However, various other genetic, hormonal and environmental factors, as well as certain medications can also lead to obesity. It would thus be wrong to dismiss obesity as a “rich man’s disease.” According to a recent study, “The prevalence of overweight will more than double among Indian adults aged 20–69 years between 2010 and 2040, while the prevalence of obesity will triple. Specifically, the prevalence of overweight and obesity will reach 30.5% (27.4%-34.4%) and 9.5% (5.4%-13.3%) among men, and 27.4% (24.5%-30.6%) and 13.9% (10.1%-16.9%) among women, respectively, by 2040. The largest increases in the prevalence of overweight and obesity between 2010 and 2040 is expected to be in older ages, and we found a larger relative increase in overweight and obesity in rural areas compared to urban areas. The largest relative increase in overweight and obesity prevalence was forecast to occur at older age groups.. The overall prevalence of overweight and obesity is expected to increase considerably in India by 2040, with substantial increases particularly among rural residents and older Indians. The WHO report says undernutrition and obesity can lead to effects across generations as both maternal undernutrition and obesity are associated with poor health in offspring. And because of the speed of change in food systems, the number of people are being exposed to both forms of malnutrition at different points in their lifetimes is increasing. It estimates that globally, almost 2.3 billion children and adults are overweight, and more than 150 million children are stunted. However, in low- and middle-income countries these emerging issues overlap in individuals, families, communities and countries. After recommending maternal nutrition, walking, yoga, meditation and traditional folk dancing as ways to prevent obesity, a reportin the Indian Journal of Endocrinology and Metabolism says: “As a disease, obesity is complex and its solutions too are difficult. The epidemic of obesity needs to be tackled at several levels: the individual level, the community level, and the government level. It needs to be addressed at the socioeconomic level as well as in the biological and the behavioural arenas. Technology, political will and legislative action are some of the other innovative solutions that can usher in sweeping changes to tackle the obesity epidemic.”
<urn:uuid:a99f9ef9-0293-4b7d-aaa9-48fe09395849>
CC-MAIN-2023-06
https://planet.outlookindia.com/opinions/the-other-side-of-malnutrition-news-413508
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500041.18/warc/CC-MAIN-20230202200542-20230202230542-00511.warc.gz
en
0.962647
918
3.71875
4
(Acts 27:27; R.V., "the sea of Adria"), the Adriatic Sea, including in Paul's time the whole of the Mediterranean lying between Crete and Sicily. It is the modern Gulf of Venice, the _Mare Superum_ of the Romans, as distinguished from the _Mare Inferum_ or Tyrrhenian Sea. But what devotion he showed towards his children Austria and adria? Groto, known as the Cieco d' adria, combined the mythological motive with much of the vulgar obscenity of the Latin comedy. My sister Laura, who was married and lived at adria, passed away while yet in the prime of womanhood. They then passed on to Ancona and adria, and as they returned captured a whole Venetian squadron. The wind was chasing in from the bosom of adria, and driving the fleeting mists up the little valley. adria, that ancient and famous city, which gave its name to the Gulph is now but a pitiful half drowned village. Dalmatia and a narrow strip of the adria complete the circuit, so Austria practically surrounds Montenegro on three sides. To the right, the Lovćen and the Rumija rear their lofty heads, and divide the lake from the adria beyond.
<urn:uuid:948287d6-f1ae-40f7-bfad-58b88cca7de9>
CC-MAIN-2017-04
http://www.dictionary.com/browse/adria
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00144-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962638
283
2.59375
3
Andrea Cefalo is a Medieval fiction author and Medieval history blogger. Her debut novel, The Fairytale Keeper, was a quarter-finalist in Amazon’s 2013 Breakthrough Novel Contest. The next three books in The Fairytale Keeper series –The Countess’s Captive, The Baseborn Lady, and The Traitor’s Target—will debut later this year. She regularly posts about Medieval history on Facebook and Twitter. Otto I was the son of Henry the Fowler and his second wife Matilda. On August 7, 936, a month after the death of his father, Otto was elected king and later crowned by the archbishops of Cologne and Mainz. Otto I successfully consolidated power by confronting—and defeating—his disobedient vassals and siblings in war. Otto’s half-brother Thankmar joined the dukes of Bavaria and Franconia in rebellion in 938. Otto was victorious, and in the end, the duke of Franconia surrendered, the duke of Bavaria was banished, and Thankmar was defeated and killed. A year later, Otto’s younger brother Henry revolted, supported by the King Louis IV of France, Giselbert of Lotharingia, and the duke of Franconia—who had only just been forgiven for his previous rebellion against the king. Both Gilselbert and the duke of Franconia were killed in battle. Though Henry begged his brother’s forgiveness—which was and granted—he took part in a conspiracy to kill the king in 941. Otto forgave him again, and Henry remained faithful thenceforth. Despite internal conflicts, Otto was able to spread and strengthen his the kingdom. He kept out Slavic and Magyar invaders, resisted France’s claim to Lotharingia, founded three bishoprics in Denmark, and secured his interests in Italy and Burgundy via his marriage to Adelaide of Italy. In 962, he was crowned Holy Roman Emperor by Pope John XII, whom he would depose two years later, placing Leo VIII in his place. Antipopes rarely kept their seat, but Leo VIII, with the help of Otto, remained pope until his death. By suppressing revolts, ousting invaders, and using the Church to spread his kingdom, Otto was arguably one of the most successful German kings of the Middle Ages. He died on May 7, 973 in Memleben, Thuringia and was buried next to his first wife, Edith, daughter of the English king Edward the Elder.Sources: http://www.britannica.com/EBchecked/topic/434895/Otto-I#toc5413 http://en.wikipedia.org/wiki/Otto_I,_Holy_Roman_Emperor#Rebellion_of_the_dukes
<urn:uuid:b03e593d-f2e3-4bb0-b7e4-caf130d54c71>
CC-MAIN-2022-27
https://andreacefalo.com/2014/08/07/behind-the-name-why-otto-the-great-was-so-great/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103516990.28/warc/CC-MAIN-20220628111602-20220628141602-00056.warc.gz
en
0.979109
594
3.296875
3
NASA has measured the salinity – dissolved salt content in seawater – at the ocean surface since 2011. Salinity patterns reveal important information about changes in Earth's water cycle, ocean circulation, and climate. The broad spectrum of science and engineering topics associated with this seemingly "simple" spaceborne measurement has resulted in hundreds of peer-reviewed publications. The pioneering Aquarius instrument on the SAC-D satellite was specifically designed to detect global ocean salinity, which is extremely challenging to measure accurately from space. NASA's salinity measurements have continued, thanks to NASA's Soil Moisture Active Passive (SMAP) mission. SMAP collects data at the same frequency (L-band) used by Aquarius but employs different technology. This webinar will provide an overview of the similarities and differences between salinity data collected by Aquarius and SMAP. It will also include demonstrations of NASA's Physical Oceanography Distributed Active Archive Center (PO.DAAC) tools that can be used to visualize various salinity datasets. To discover and access NASA physical oceanography data, information services and tools: https://podaac.jpl.nasa.gov
<urn:uuid:b9912a82-e018-4d1f-b818-9a46bf4f74f3>
CC-MAIN-2024-10
https://www.earthdata.nasa.gov/learn/webinars-and-tutorials/webinar-dont-pass-salt-nasas-salinity-mission-continues-smap
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473598.4/warc/CC-MAIN-20240221234056-20240222024056-00734.warc.gz
en
0.895071
235
3.703125
4
|Jmol-3D images||Image 1| |Molar mass||319.27 g mol−1| |Except where noted otherwise, data are given for materials in their standard state (at 25 °C (77 °F), 100 kPa)| |(what is: / ?)| Tetrodotoxin, frequently abbreviated as TTX, is a potent neurotoxin. Its name derives from Tetraodontiformes, an order that includes pufferfish, porcupinefish, ocean sunfish or mola, and triggerfish, several species that carry the toxin. Although tetrodotoxin was discovered in these fish and found in several other animals (e.g., blue-ringed octopus, rough-skinned newt, and Naticidae) it is actually produced by certain symbiotic bacteria, such as Pseudoalteromonas tetraodonis, certain species of Pseudomonas and Vibrio, as well as some others that reside within these animals. Tetrodotoxin inhibits the firing of action potentials in nerves by binding to the voltage-gated sodium channels in nerve cell membranes and blocking the passage of sodium ions (responsible for the rising phase of an action potential) into the nerve cell. Its mechanism of action, selective blocking of the sodium channel, was shown definitively in 1964 by Toshio Narahashi and professor John W. Moore at Duke University, using Moore's sucrose gap voltage clamp technique. Sources in nature Tetrodotoxin has been isolated from widely differing animal species, including western newts of the genus Taricha (where it was formerly termed "tarichatoxin"), pufferfish, toads of the genus Atelopus, several species of blue-ringed octopuses of the genus Hapalochlaena (where it was called "maculotoxin"), several sea stars, certain angelfish, a polyclad flatworm, several species of Chaetognatha (arrow worms), several nemerteans (ribbonworms) and several species of xanthid crabs. The toxin is variously used as a defensive biotoxin to ward off predation, or as both a defensive and predatory venom (the octopuses, chaetognaths and ribbonworms). Even though the toxin acts as a defense mechanism, some predators such as Thamnophis sertalis have developed a resistance to TTX which allows for them to prey upon these toxic newts. Tarichatoxin and maculotoxin were shown to be identical to tetrodotoxin in 1964 (Mosher et al.) and 1978, respectively. The toxin is produced by bacteria within blue-ringed octopuses. The most common bacteria associated with TTX production are Vibrio bacteria, with Vibrio alginolyticus being the most common species. Pufferfish, chaetognaths, and nemerteans have been shown to contain Vibrio alginolyticus and TTX. The link between these facts and production of TTX in animals has not been firmly established, and there remains much debate in the literature as to whether the bacteria are truly the source of TTX in animals. Tetrodotoxin binds to what is known as site 1 of the fast voltage-gated sodium channel. Site 1 is located at the extracellular pore opening of the ion channel. The binding of any molecules to this site will temporarily disable the function of the ion channel. Saxitoxin, neosaxitoxin and several of the conotoxins also bind the same site. The use of this toxin as a biochemical probe has elucidated two distinct types of voltage-gated sodium channels present in humans: the tetrodotoxin-sensitive voltage-gated sodium channel (TTX-s Na+ channel) and the tetrodotoxin-resistant voltage-gated sodium channel (TTX-r Na+ channel). Tetrodotoxin binds to TTX-s Na+ channels with a binding affinity of 5-15 nanomolar, while the TTX-r Na+ channels bind TTX with low micromolar affinity. Nerve cells containing TTX-r Na+ channels are located primarily in cardiac tissue, while nerve cells containing TTX-s Na+ channels dominate the rest of the body. The prevalence of TTX-s Na+ channels in the central nervous system makes tetrodotoxin a valuable agent for the silencing of neural activity within a cell culture. The toxin blocks the fast Na+ current in human myocytes (the contractile cells of the muscles), thereby inhibiting their contraction. By contrast, the sodium channels in pacemaker cells of the heart are of the slow variety, so action potentials in the cardiac nodes are not inhibited by the compound. Note, the SA and AV nodes do not contain Na+ channels only Ca2+ channels, only the Purkinje fibers contain Na+ channels. The myocytes in the atrium, which surround the main cardiac pacemaker, do express this fast Na+ current and therefore the electrical activity is blocked and the heart fails to beat. Blocking of fast Na+ channels has potential medical use in treating some cardiac arrhythmias. Tetrodotoxin has proved useful in the treatment of pain (originally used in Japan in the 1930s) from such diverse problems as terminal cancer, migraines, and heroin withdrawal. In 1964 Robert B. Woodward elucidated the structure of tetrodotoxin. Yoshito Kishi et al. Nagoya University, Nagoya, Japan, (now at Harvard University) reported the first total synthesis of D,L-tetrodotoxin in 1972. M. Isobe et al. at Nagoya University, Japan and J. Du Bois et al. at Stanford University, U.S., reported the asymmetric total synthesis of tetrodotoxin in 2003. The two 2003 syntheses used very different strategies, with Isobe's route based on a Diels-Alder approach and Du Bois's work using C-H bond activation. TTX is extremely toxic. The toxin can enter the body by ingestion, injection, inhalation and through abraded skin. The mechanism of toxicity is through the blockage of fast voltage-gated sodium channels. These are required for the normal transmission of signals between the body and brain. As a result, TTX causes paralysis of voluntary muscles (including the diaphragm and intercostal muscles, stopping breathing), the loss of vagal regulation of heart rate (causing it to increase to around 100bpm), and loss of sensation. TTX is roughly 100 times more poisonous than potassium cyanide. Fish poisoning by consumption of members of the order Tetraodontiformes is extremely serious. The organs (e.g. liver) of the pufferfish can contain levels of tetrodotoxin sufficient to produce paralysis of the diaphragm and, through this mechanism, death due to respiratory failure. Toxicity varies between species and at different seasons and geographic localities, and the flesh of many pufferfish may not be dangerously toxic. It is not always fatal; but at near-lethal doses, it can leave a person in a state of near-death for several days, while the person remains conscious. For this reason, TTX has been alleged an ingredient in Haitian Vodou and the closest approximation of zombieism, an idea popularized by Harvard-trained ethnobotanist Wade Davis in a 1983 paper, and in his 1985 book, The Serpent and the Rainbow. This idea was dismissed by the scientific community in the 1980s, as the descriptions of voodoo zombies do not match the symptoms displayed by victims of tetrodotoxin poisoning, and the alleged incidents of zombies created in this manner could not be substantiated. The Material Safety Data Sheet for TTX lists the oral median lethal dose (LD50) for mice as 334 μg per kg. Assuming the lethal dose for humans is similar, 25 milligrams (0.000881 oz) of tetrodotoxin would be expected to kill half of the group of 75 kg (165 lb) people that ingested it. The amount needed to reach a lethal dose by injection is much smaller, 8 μg per kg, or a little over one-half milligram (0.00002 oz) to kill a 75 kg (165 lb) person. The first recorded cases of TTX poisoning were from the logs of Captain James Cook from 7 September 1774, on which date Cook recorded his crew eating some local tropic fish (pufferfish), then feeding the remains to the pigs kept on board. The crew experienced numbness and shortness of breath, while the pigs were all found dead the next morning. In hindsight, it is clear that the crew received a mild dose of tetrodotoxin, while the pigs ate the pufferfish body parts that contain most of the toxin, thus being fatally poisoned. Zora Neale Hurston, the author of the 1938 non-fiction book Tell My Horse reported multiple accounts of poisoning with tetrodotoxin that had taken place in Haiti. The poisoning of people was executed by a voodoo sorcerer called the Bokor. Symptoms and treatment The diagnosis of pufferfish poisoning is based on the observed symptomology and recent dietary history. Symptoms typically develop within 30 minutes of ingestion, but may be delayed by up to four hours; however, death once occurred within 17 minutes of ingestion. Paresthesia of the lips and tongue is followed by hypersalivation, sweating, headache, weakness, lethargy, incoordination, tremor, paralysis, cyanosis, aphonia, dysphagia, seizures, dyspnea, bronchorrhea, bronchospasm, respiratory failure, coma, and hypotension. Gastroenteric symptoms are often severe and include nausea, vomiting, diarrhea, and abdominal pain. Cardiac arrhythmias may precede complete respiratory failure and cardiovascular collapse. The first symptom of intoxication is a slight numbness of the lips and tongue, appearing between 20 minutes and three hours after eating poisonous pufferfish. The next symptom is increasing paresthesia in the face and extremities, which may be followed by sensations of lightness or floating. Headache, epigastric pain, nausea, diarrhea, and/or vomiting may occur. Occasionally, some reeling or difficulty in walking may occur. The second stage of the intoxication is increasing paralysis. Many victims are unable to move; even sitting may be difficult. There is increasing respiratory distress. Speech is affected, and the victim usually exhibits dyspnea, cyanosis, and hypotension. Paralysis increases, and convulsions, mental impairment, and cardiac arrhythmia may occur. The victim, although completely paralyzed, may be conscious and in some cases completely lucid until shortly before death. Death usually occurs within 4 to 6 hours, with a known range of about 20 minutes to 8 hours. If the patient survives 24 hours, recovery without any residual effects will usually occur over several days. Therapy is supportive and based on symptoms, with aggressive early airway management. If ingested, treatment can consist of emptying the stomach, feeding the victim activated charcoal to bind the toxin, and taking standard life-support measures to keep the victim alive until the effect of the poison has worn off. Alpha adrenergic agonists are recommended in addition to intravenous fluids to combat hypotension. Anticholinesterase agents have been used with mixed success. No antidote has been developed and approved for human use; but a monoclonal antibody specific to tetrodotoxin has been developed by USAMRIID and was shown to be effective for reducing lethality in tests on mice. Geographic frequency of toxicity Poisonings from tetrodotoxin have been almost exclusively associated with the consumption of pufferfish from waters of the Indo-Pacific ocean regions, but pufferfishes from other regions are much less commonly eaten. Several reported cases of poisonings, including fatalities, involved pufferfish from the Atlantic Ocean, Gulf of Mexico, and Gulf of California. There have been no confirmed cases of tetrodotoxicity from the Atlantic pufferfish, Sphoeroides maculatus; but in three studies, extracts from fish of this species were highly toxic in mice. Several recent intoxications from these fishes in Florida were due to saxitoxin, which causes paralytic shellfish poisoning with very similar symptoms and signs. The trumpet shell Charonia sauliae has been implicated in food poisonings, and evidence suggests it contains a tetrodotoxin derivative. There have been several reported poisonings from mislabelled pufferfish, and at least one report of a fatal episode in Oregon when an individual swallowed a rough-skinned newt Taricha granulosa. In 2009, a major scare in the Auckland Region of New Zealand was sparked after several dogs died eating Pleurobranchaea maculata (grey side-gilled seaslug) on beaches. Children and pet owners were asked to avoid beaches, and recreational fishing was also interrupted for a time. After exhaustive analysis, it was found that the sea slugs must have ingested tetrodotoxin. - Statistical factors From 1974 through 1983, there were 646 reported cases of pufferfish poisoning in Japan, with 179 fatalities. Statistics from the Tokyo Bureau of Social Welfare and Public Health indicate 20–44 incidents of fugu poisoning per year between 1996 and 2006 in the entire country, leading to 34–64 hospitalizations and 0–6 deaths per year, for an average fatality rate of 6.8%. Of the 23 incidents recorded within Tokyo between 1993 and 2006, only one took place in a restaurant, while the others all involved fishermen eating their catch. From 2006 through 2009 in Japan there were 119 incidents involving 183 people but only 7 people died. Only a few cases have been reported in the United States, and outbreaks in countries outside the Indo-Pacific area are rare, except in Haiti, where tetrodotoxin is thought by some believers in voodoo mythology to assist the creation of so-called zombie poisons. Genetic background is not a factor in susceptibility to tetrodotoxin poisoning. This toxicosis may be avoided by not consuming animal species known to contain tetrodotoxin, principally pufferfish; other tetrodotoxic species are not usually consumed by humans. Poisoning from tetrodotoxin is of particular public health concern in Japan, where pufferfish "fugu" is a traditional delicacy. It is prepared and sold in special restaurants where trained and licensed chefs carefully remove the viscera to reduce the danger of poisoning. There is potential for misidentification and mislabelling, particularly of prepared, frozen fish products. The mouse bioassay developed for paralytic shellfish poisoning (PSP) can be used to monitor tetrodotoxin in pufferfish and is the current method of choice. An HPLC method with post-column reaction with alkali and fluorescence has been developed to determine tetrodotoxin and its associated toxins. The alkali degradation products can be confirmed as their trimethylsilyl derivatives by gas chromatography/mass spectrometry. Detection in body fluids Tetrodotoxin may be quantified in serum, whole blood or urine to confirm a diagnosis of poisoning in hospitalized patients or to assist in the forensic investigation of a case of fatal overdosage. Most analytical techniques involve mass spectrometric detection following gas or liquid chromatographic separation. Tetrodotoxin is being investigated as a possible treatment for cancer-associated pain. Early clinical trials demonstrate significant pain relief in some patients. In the U.S., tetrodotoxin appears on the select agents list of the Department of Health and Human Services, and scientists must register with HHS to use tetrodotoxin in their research. However, investigators possessing less than 100 mg are exempt from regulation. - Clairvius Narcisse, a Haitian alleged to have been buried alive under the effect of the drug - Hogan CM (2008-12-02). "Rough-Skinned Newt Taricha granulosa". GlobalTwitcher.com. Retrieved 2009-04-06. - Hwang DF, Tai KP, Chueh CH, Lin LC, Jeng SS (1991). "Tetrodotoxin and derivatives in several species of the gastropod Naticidae". Toxicon 29 (8): 1019–24. doi:10.1016/0041-0101(91)90084-5. PMID 1949060. - Lee CH, Ruben PC (2008). "Interaction between voltage-gated sodium channels and the neurotoxin, tetrodotoxin". Channels (Austin) 2 (6): 407–12. doi:10.4161/chan.2.6.7429. PMID 19098433. - Voltage clamp at Scholarpedia - Skye King, Azadeh Fotouhie, http://biology.unm.edu/toolson/biotox/Tetrodotoxin%2520and%2520Maculotoxin.ppt Tetrodotoxin and Maculotoxin, University of New Mexico, 2007 p.9.[dead link] - Brodie, Edmund D., III, Edmund D. Brodie, Jr. "Tetrodotoxin Resistance in Garter Snakes: An Evolutionary Response of Predators to Dangerous Prey." Society for the Study of Evolution, 26 Sept. 2008. Web. 15 Sept. 2014. - Paul J. Scheuer, 'Toxins from Fish and other marine organisms,' in George F. Stewart, E M Mrak, George F. Stewart, C O Chichester, (eds.) Advances in Food Research, vol.18, Academic Press/Elsevier, 1970 p.151. - Trewethie, E.R. "Tetrodotoxia in the blue-ringed octopus", in Medical Journal of Australia, 1978, 1, p.506. - Hwang DF, Arakawa O, Saito T, Noguchi T, Simidu U, Tsukamoto K, Shida Y, Hashimoto K (1988). "Tetrodotoxin-producing bacteria from the blue-ringed octopus Octopus maculosus". Marine Biology 100 (3): 327–332. doi:10.1007/BF00391147. - Noguchi, T.; Hwang, D.F.; Arakawa, O.; Sugita, H.; Deguchi, Y.; Shida, Y.; Hashimoto, K. (1987). "Vibrio alginolyticus, a tetrodotoxin-producing bacterium, in the intestines of the fish Fugu vermicularis vermicularis". Marine Biology 94 (4): 625–630. doi:10.1007/BF00431409. Retrieved 2009-04-06. - Thuesen EV Kogure K (1989). "Bacterial production of tetrodotoxin in four species of Chaetognatha". Biological Bulletin 176 (2): 191–194. doi:10.2307/1541587. - Carroll, S.; McEvoy, E.G.; Gibson, R. (2003). "The production of tetrodotoxin-like substances by nemertean worms in conjunction with bacteria". Journal of experimental marine biology and ecology 288 (1): 51–63. doi:10.1016/S0022-0981(02)00595-6. - Chau R, Kalaitzis JA, Neilan BA (2011). "On the origins and biosynthesis of tetrodotoxin". Aquatic Toxicology 104 (1–2): 61–72. doi:10.1016/j.aquatox.2011.04.001. PMID 21543051. Retrieved 2011-07-27. - Hagen NA, du Souich P, Lapointe B, Ong-Lam M, Dubuc B, Walde D, Love R, Ngoc AH; on behalf of the Canadian Tetrodotoxin Study Group (2008). "Tetrodotoxin for Moderate to Severe Cancer Pain: A Randomized, Double Blind, Parallel Design Multicenter Study". J Pain Symptom Manage 35 (4): 420–9. doi:10.1016/j.jpainsymman.2007.05.011. PMID 18243639. - Stimmel, Barry (2002). "12: Heroin Addiction". Alcoholism, drug addiction, and the road to recovery: life on the edge. New York: Haworth Medical Press. ISBN 0-7890-0553-0. "Tetrodotoxin blocks the sodium currents and is believed to have potential as a potent analgesic and as an effective agent in detoxoification from heroin addiction without withdrawal symptoms and without producing physical dependence" - Woodward RB (1964). "The Structure of Tetrodotoxin". Pure Appl. Chem. 9 (1): 49–75. doi:10.1351/pac196409010049. - Kishi Y, Aratani M, Fukuyama T, Nakatsubo F, Goto T, Inoue S, Tanino H, Sugiura S, Kakoi H (December 1972). "Synthetic studies on tetrodotoxin and related compounds. 3. A stereospecific synthesis of an equivalent of acetylated tetrodamine". J. Am. Chem. Soc 94 (26): 9217–9. doi:10.1021/ja00781a038. PMID 4642370. - Kishi Y, Fukuyama T, Aratani M, Nakatsubo F, Goto T, Inoue S, Tanino H, Sugiura S, Kakoi H (1972). "Synthetic studies on tetrodotoxin and related compounds. IV. Stereospecific total syntheses of DL-tetrodotoxin". J. Am. Chem. Soc 94 (26): 9219–9221. doi:10.1021/ja00781a039. PMID 4642371. - Ohyabu N, Nishikawa T, Isobe M (2003). "First Asymmetric Total Synthesis of Tetrodotoxin". J. Am. Chem. Soc 125 (29): 8798–8805. doi:10.1021/ja0342998. PMID 12862474. - Nishikawa T, Urabe D, Isobe M (2004). "An Efficient Total Synthesis of Optically Active Tetrodotoxin". Angewandte Chemie International Edition 43 (36): 4782–4785. doi:10.1002/anie.200460293. PMID 15366086. - Douglass Taber (2005-05-02). "Synthesis of (-)-Tetrodotoxin". Organic Chemistry Portal. organic-chemistry.org. Retrieved 2008-05-29. - Hinman A, Du Bois J (2003). "A Stereoselective Synthesis of (-)-Tetrodotoxin". J. Am. Chem. Soc 125 (38): 11510–11511. doi:10.1021/ja0368305. PMID 13129349. - Patocka J; Stredav L (April 23, 2002). Price, Richard, ed. "BRIEF REVIEW OF NATURAL NONPROTEIN NEUROTOXINS". ASA Newsletter (Applied Science and Analysis inc.) 02–2 (89): 16–23. ISSN 1057-9419. Retrieved 26 May 2012. - "Blowfish testicles poison seven in Japanese restaurant". The Guardian. Associated Press. 27 January 2009. - Clark RF, Williams SR, Nordt SP, Manoguerra AS (1999). "A review of selected seafood poisonings". Undersea Hyperb Med 26 (3): 175–84. PMID 10485519. Retrieved 2008-08-12. - Hines, Terence; "Zombies and Tetrodotoxin"; Skeptical Inquirer; May/June 2008; Volume 32, Issue 3; pp. 60–62. - Material Safety Data Sheet Tetrodotoxin ACC# 01139 https://fscimage.fishersci.com/msds/01139.htm - Material Safety Data Sheet Tetrodotoxin. Sigma-Aldrich Version 1.6 updated 10 March 2007. - Hurston, Zora N. Tell My Horse. Harper Perennial Modern Classics, 2008 - Toxicity, Tetrodotoxin -Theodore I Benzer, MD, PhD - Rivera, Victor R.; Poli, Mark A.; Bignami, Gary S. (September 1995). "Prophylaxis and treatment with a monoclonal antibody of tetrodotoxin poisoning in mice". Toxicon 33 (9): 1231–1237. doi:10.1016/0041-0101(95)00060-Y. PMID 8585093. - Bradley, Susan G.; Klika, Larry J. (July 1981). "A fatal poisoning from the Oregon rough-skinned newt (Taricha granulosa)". JAMA : the Journal of the American Medical Association 246 (3): 247. doi:10.1001/jama.1981.03320030039026. PMID 7241765. - McNabb, P.; Mackenzie, L.; Selwood, A.; Rhodes, L.; Taylor, D.; Cornelison, C. (2009). Review of tetrodotoxins in the sea slug Pleurobranchaea maculata and coincidence of dog deaths along Auckland beaches. Prepared by Cawthron Institute for the Auckland Regional Council. Auckland Regional Council Technical Report 2009/ 108. - Gibson, Eloise (15 August 2009). "Puffer fish toxin blamed for deaths of two dogs". The New Zealand Herald. Retrieved 19 November 2011. - 危険がいっぱい ふぐの素人料理 東京都福祉保健局[dead link] - "自然毒のリスクプロファイル:魚類:フグ毒 (Fish: fugu poison risk profile of natural poison)" (in Japanese). 厚生労働省 (Ministry of Health Labour and Welfare (Japan)). Archived from the original on 27 September 2011. - Anderson WH (1988). "Tetrodotoxin and the zombie phenomenon". Journal of Ethnopharmacology 23 (1): 121–6. doi:10.1016/0378-8741(88)90122-5. PMID 3419200. - R. Baselt, Disposition of Toxic Drugs and Chemicals in Man, 8th edition, Biomedical Publications, Foster City, CA, 2008, pp. 1521–1522. - Hagen, NA; Lapointe, B; Ong–Lam, M; Dubuc, B; Walde, D; Gagnon, B; Love, R; Goel, R; Hawley, P; Ngoc, AH; Du Souich, P (2011). "A multicentre open-label safety and efficacy study of tetrodotoxin for cancer pain". Current Oncology 18 (3): e109–e116. doi:10.3747/co.v18i3.732. PMC 3108870. PMID 21655148. - HHS and USDA Select Agents and Toxins 7 CFR Part 331, 9 CFR Part 121, and 42 CFR Part 73. http://www.cdc.gov/od/sap/docs/salist.pdf - "Permissible Toxin Amounts". National Select Agent Registy. Retrieved 17 March 2013. |Wikinews has related news: Counter-terrorism agents search home in suburban Chicago, Illinois| - Tetrodotoxin at the US National Library of Medicine Medical Subject Headings (MeSH) - Tetrodotoxin: essential data (1999) - Tetrodotoxin from the Bad Bug Book at the U.S. Food and Drug Administration website - New York Times, "Whatever Doesn't Kill Some Animals Can Make Them Deadly" - U.S. National Library of Medicine: Hazardous Substances Databank – Tetrodotoxin
<urn:uuid:2517a199-20d6-436f-953c-328b3bf511aa>
CC-MAIN-2014-49
http://en.wikipedia.org/wiki/Tetrodotoxin
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931012025.85/warc/CC-MAIN-20141125155652-00076-ip-10-235-23-156.ec2.internal.warc.gz
en
0.861646
6,023
2.984375
3
The cerebellum is responsible for more than just coordination of movement- it also plays a huge role in our cognition, emotions and behavioral control. For a long time, neuroscientists believed that the cerebellum was only responsible for the coordination and control of movements, but recent years has shown that it does so much more than that. One particular study found a link between the cerebellum and the ventral tegmentum area, a region of the brain responsible for pleasure and reward circuitry. This finding could mean big things when it comes to the treatment of emotional and cognitive disorders such as Autism or addiction. Our ability to manipulate this circuit between the cerebellum and VTA could help physicians treat various cognitive and behavioral disorders. Carta, I., Chen, C., Schott, A., Dorizan, S., & Khodakhah, K. (2019). 0 0 Research Article Cerebellar modulation of the reward circuitry and social behavior. Science, 363(6424). doi:10.1126/science.aav0581
<urn:uuid:084a5330-4752-4496-a464-3428d070f03a>
CC-MAIN-2022-27
https://carrickinstitute.com/the-cerebellum-and-cognition/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103620968.33/warc/CC-MAIN-20220629024217-20220629054217-00050.warc.gz
en
0.906754
217
3.03125
3
Students enter the lower school excited and eager to do their best. Our goal at this level is to create classroom communities that foster a love of learning. Social and emotional needs are nurtured and cognitive abilities are developed on an individual basis. After identifying learning styles, teachers differentiate instruction to maximize each student’s potential. We believe young children learn best by participating in hands-on experiences that promote exploration and critical thinking. Our students are encouraged to share ideas and to learn from and with their peers as they solve problems. In offering a child-centered, experiential approach, we hope to inspire our students to become successful, lifelong learners. Learning at Hampstead Academy is guided by student interest and development, and national and international standards. We do not use Common Core standards, instead relying on the expertise of our highly qualified teachers and standards delineated by professional organizations such as the National Council of Teachers of Mathematics, the National Science Teachers Association, the National Council for the Social Studies, and the National Council of Teachers of English.
<urn:uuid:bf555f82-4c08-4510-9a38-6a5b583119d9>
CC-MAIN-2020-05
https://www.hampsteadacademy.org/Page/49
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694908.82/warc/CC-MAIN-20200127051112-20200127081112-00068.warc.gz
en
0.952481
207
2.796875
3
sciences are built into the overall drug system (Califf et al., 2002). Integrating the sciences of quality with the biomedical and health sciences will ultimately facilitate the translation of safety and quality in medication use from theory to clinical practice. As a first order of business, the points at which safety and quality can be compromised must be identified. Currently, the potential for harm is present throughout the system. Harm can be due to any number of factors, many of which are now in the national spotlight, including undisclosed harmful side effects of a drug for specific patient populations; lax follow-through on regulatory responsibility after product approval; human error in prescribing, dispensing, administering, and monitoring effects in patients; and inadequate patient activation and education. This chapter identifies the key issues of the overall drug system that affect safety and quality in medication use. Subsequent chapters in this report provide recommendations for improvement, many of which incorporate the “sciences of quality” mentioned above. Currently more than 10,000 prescription drugs and biologics (FDA, 1999) and more than 300,000 over-the-counter (OTC) products are on the market in the United States (RSW, 2001). In 2004, 215 prescription and 71 OTC drugs were recalled because of manufacturing and distribution problems or serious adverse reactions (FDA, 2004a). The regulatory element of the drug system evolved over the past century from being focused on regulating interstate transport and misbranded products to being built on an infrastructure with the goal of reliable standards, processes, and laws to ensure some degree of safety and efficacy in medicinal agents. The result is a sophisticated, comprehensive drug system encompassing four stages that interact with, support, and reinforce each other to varying degrees (see Figure 2-1): (1) research and development (R&D), where ideas for new drugs are conceived and candidates are clinically tested; (2) regulatory review by the Food and Drug Administration (FDA) to validate or counter the research findings and ensure proper labeling; (3) manufacture, distribution, and marketing of products that have received regulatory approval; and (4) use of medications available either through a prescription or OTC. Prescription drugs, biologics, and some OTCs follow this model. The product development and regulatory review stages are abbreviated for other OTCs and for generics. Each element of the drug system is governed by its own set of standards and methods for scientific analysis to advance the safety, quality, and efficacy of products and their use. As the chief protector of the public health, the FDA has responsibility for developing and enforcing the standards in all
<urn:uuid:70d1536f-d622-4be2-8d02-da4bc324e194>
CC-MAIN-2014-23
http://books.nap.edu/openbook.php?record_id=11623&page=51
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997857714.64/warc/CC-MAIN-20140722025737-00176-ip-10-33-131-23.ec2.internal.warc.gz
en
0.941482
536
2.96875
3
Head Shrinking and the Shuar of the Amazon Rainforest While head hunting is a practice documented in many areas of the world including ancient China, Mesoamerica, India, Japan, and Africa, the only known head shrinkers are a group of people from the northwestern region of the Amazon rainforest collectively known as the Jivaroan. - The spirit of an enemy - The Shuar - Seeking the muisak - Edmundo Bielawski and the head-shrinking process - Western influence The spirit of an enemy Thought to harness the spirit of an enemy and compel him to serve the desires of the “shrinker,” the practice of shrinking heads is known to have originally held a spiritual significance. From the 19th Century until very recent times, however, the practice of shrinking heads was extended to trophy hunting, exotic trade, as well as simple curiosity seekers willing to pay exorbitant prices to possess the head of another human being. While head hunting is a practice documented in many areas of the world including ancient China, Mesoamerica, India, Japan, the Amazon, and various parts of Africa, the only known head shrinkers are a group of indigenous people from the northwestern region of the Amazon rainforest (Ecuador and Peru) collectively known as the Jivaroan peoples. Their most notorious tribe, the Shuar, live at the headwaters of the Marañón River. Known as creating a tsantsa (or tzantza) to the people of this region, head shrinking began as a solution to preventing an enemy’s spirit from using its retaliatory powers against its executioner. Decapitating and then shrinking their enemies' heads also served as a highly dramatic way to warn enemies of the fate awaiting them should they venture into Jivaroan territory uninvited. And while the ultimate fate of shrunken heads is uncertain, it appears that most were later used in religious ceremonies and feasts that celebrated the victories of the tribe. Seeking the muisak The Shuar and their elaborate head shrinking process was first brought to public light in the late 19th century. Although those who made early contact--and survived--with the headshrinkers characterized shrunken heads as "trophies of warfare," the Shuar insisted that they were not interested in the heads themselves and did not prize them as trophies, but rather sought the muisak, or soul of the victim, which was contained inside. Shuar men believe that control of the muisak (one of three types of spirits that exist in their animistic belief system) would enable them to control their wives' and daughters' manual labor efforts. Since the bulk of calories and carbohydrates in the Shuar diet derives from manioc and the beer (chicha) made from it--which is grown and processed by the women--women's work is crucial to Shuar survival, as well as social life. Edmundo Bielawski and the head-shrinking process In the late 19th and early 20th Centuries, Europeans and Americans began trading manufactured goods including shotguns and rifles to the Shuar in exchange for shrunken heads, primarily for their novelty, re-sale value. The result of this sociocultural interference led to an increase in local warfare (including head hunting), as well as a trade-motivated shift in tribal mores. In 1961, during an especially violent period, a man named Edmundo Bielawski filmed the only known footage showing what appears to be the head shrinking process. This is how the head shrinking process is described by one who witnessed it: After converging on the enemy camp, the victim (or victims) are killed and immediately decapitated; sometimes decapitated while the victim is still alive. The head is cut off below the neck with a section of the skin from the chest and back taken with it. The executioner then removes the victim’s headband and passes it through the mouth and neck of the head and ties it over his shoulder to facilitate a fast retreat. (Should the victim have worn no headband, the Shuar warrior will substitute a length of vine.) Once back at the village, a slit is made in the neck and up the back of the head, allowing the skin and hair to be carefully peeled away from the skull. The skull is then discarded in the river, left as a gift to the pani, the anaconda. Then the eyes are carefully sewn shut with native fiber and the lips are closed, skewered with little pegs made of palm. (These will be removed later and replaced with dangling strings.) Now the tsantsa is immersed in a special sacred boiling pot or cooking jar, simmered for approximately 1 ½ to 2 to hours (Any longer and the hair will fall out.) Upon removal from the pot, the skin is dark and rubbery, and the head has already began to shrink--now about 1/3 its original size. This head is then turned inside out and all the remaining flesh and fat is scraped off. Once clean, the head is then turned right side out and the slit in the rear sewn shut. (It is said to now resemble an empty rubber glove.) The final shrinking process is accomplished with hot stones and sand, used to sear the interior, which shrinks the head further. These stones are dropped in one at a time through the neck opening while constantly rotating the cavity to prevent scorching, while providing it a general “head” shape. (The warrior tries to maintain the original likeness of the victim's face as much as possible.) When the skin sack becomes too tight for stones, sand is heated and added; sand entering the crevices of the nose and ears where the stones cannot reach. This process is repeated numerous times. Hot stones are later applied to the exterior of the face as well to seal and shape the facial features. In the final stages, any remaining hair is singed off and the finished product is hung over a fire to harden and blacken. Finally, a heated machete is applied to the lips to dry them. Following the head shrinking process, three chonta pegs (made from heart of palm) are put through the lips and then lashed together with cord. This entire process requires approximately one week to complete. The last day of work on the head is spent in the forest, a few hours away from the village, where the tsantsa ritual will take place. At that time, the warrior will make a hole in the top of the shrunken head and a double kumai (cord made from palm wood) is inserted and tied to a short stick of chonta palm on the inside so that the head can be worn around the warrior's neck. While it appears that in centuries past, cultural restrictions meant that deaths from conflict were relatively rare events among the Jivaroan peoples--with few shrunken heads actually prepared--Western influence created an economic demand that took decades to normalize. While there is evidence to believe the process still continues today, it appears to be of a much smaller scale than half a century ago and only involving genuine threats to Jivaroan societies. This link provides a video of the process: Image credits via: Wikipedia.org Visit JAMES R. COFFEY WRITING SERVICES & RESOURCE CENTER for more information.
<urn:uuid:ab26c475-f00f-424f-8821-ff325ceb4d25>
CC-MAIN-2014-52
http://guides.wikinut.com/Head-Shrinking-and-the-Shuar-of-the-Amazon-Rainforest/2a3jw39o/
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802769305.158/warc/CC-MAIN-20141217075249-00074-ip-10-231-17-201.ec2.internal.warc.gz
en
0.957533
1,538
3.359375
3
The Essence of Pomegranate in Scripture: Ruby Red Seeds of Love God is love, and God loves ruby red pomegranates! If I were the designer, I would incorporate what I love. First mentioned in Exodus, pomegranates were included in God’s design for the priest’s robe. Embroidered around the hem in blue, purple, and scarlet, pomegranates were displayed among the gold, jewels, and engraved pieces vital and significant to the priestly garment. “Make pomegranates of blue, purple, and scarlet yarn on its lower hem and all around it. Put gold bells between them all the way around, so that gold bells and pomegranates alternate around the lower hem of the robe. The robe must be worn by Aaron whenever he ministers, and its sound will be heard when he enters the sanctuary before the Lord and when he exits, so that he does not die.” Listen closely…do you hear the gentle tinkling of the gold bells between the pomegranates? Incredible love and utmost respect accompanied him as the priest entered the Holy of Holies. The presence of the God who loved all mankind resided in that exact place. The sight and sound pleased and glorified the Father. The history of pomegranates dates back to 3500 BCE, making them one of the first cultivated fruits. Attached to that history is a treasury of fact and lore. Pomegranates appeared on Jewish coins, Solomon fashioned his crown like one, and 200 of them were carved on each colonnade of his temple. In mythology they represented permanency of love. Each fruit contains many seeds – some legends say 613 – significant of the number of commandments of the Torah; and others believed 840, symbolic of fertility. Another analogy promoted their im- portance as fertility of the mind with thoughts on what is pure, love- ly, and of good report. The last analogy resonates very much with these words from the Apostle Paul: Finally, brothers and sisters, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable—if anything is excellent or praiseworthy—think about such things. Whatever you have learned or received or heard from me, or seen in me—put it into practice. And the God of peace will be with you. (Philippians 4:8-9, NIV) In Christian art, the pomegranate symbolizes the greatest gift of love: Christ’s resurrection and its promise of eternal life and love – for- ever in heaven. Spanish missionaries brought pomegranate trees to the new world centuries ago. The real value of the fruit, however, was lost until very recently, when their sweet-tart taste and powerhouse of vitamins and antioxidants were rediscovered. “Poms” may help to support a healthy heart. The ruby red color is attributed to love, and usually the first one we choose to symbolize the heart. Bathsheba proclaimed the noble woman’s value far above rubies. All connected to love and God’s love, Solomon elevated the ruby red pomegranate to top position. Not just heading the columns of the temple or his own head, it claimed the top spot of Solomon’s Locked Garden. The very first fruit of the Spirit is Love. Solomon declared that all the other fruits are the outgrowth of her branches – her Godly love courageously and lavishly shared with him and with others. The Apostle John confirms just how much God loves us and His desire for us to love one another. Beloved, let us love one another, for love is from God; and everyone who loves is born of God and knows God. The one who does not love does not know God, for God is love. By this the love of God was manifested in us, that God has sent His only begotten Son into the world so that we might live through Him. In this is love, not that we loved God, but that He loved us and sent His Son to be the propitiation for our sins. Beloved, if God so loved us, we also ought to love one another. No one has seen God at any time; if we love one another, God abides in us, and His love is perfected in us. By this we know that we abide in Him and He in us, because He has given us of His Spirit. We have seen and testify that the Father has sent the Son to be the Savior of the world. (1 John 5:6-14, NASB) The Apostle Paul wrote a whole chapter to the Corinthian church explaining what love is and is not. He ended the focus like this: “Now these three remain: faith, hope, and love. But the greatest of these is love.” (1 Corinthians 13:13) Solomon bookended his list with the two essences representing the Holy Spirit’s fruit of love and of self-control. Self-control enables and encourages us in all the fruit in between – the ones that demonstrate our love for God and others. Reaching out in love to another requires courage to be vulnerable. Will we be loved in return? Will we be rejected? Will others scoff at our well-intentioned acts of love? Solomon’s bride held no exemption card. Kudos to Solomon, he looked for and exclaimed the very best in her, citing her, not just as an example of love, but of every single fruit growing in the Holy Spirit Garden. Cutting open the pomegranate exposes its hundreds of seeds like ruby jewels of love. We can choose to keep them for ourselves, or share. Sharing produces returns on our investment, while hoarding leaves us wide open to egotistical and overindulgent behavior. Fear and vulnerability threaten to paralyze our attempts to share our love. Sometimes we wonder what love might look like in a given situation. Like the pomegranate filled with seeds, the Holy Spirit fills our hearts with love – seeds of joy, peace, patience, kindness, goodness, gentleness, and faithfulness. His work in us, supplies us with courage to face life’s realities head on. Possessing the fruit of self-control – sitting at the far end of the list, coupled with the fruit of love, ensures we are enabled to express and share the other fruit as the moment requires. For Your Valentine — This post is excerpted from The Essence of Courage: Cultivating the Fruit of the Spirit in Solomon’s Locked Garden and in Your Heart — Volume 1 of the three-Volume, Cinnamah-Brosia’s Inspirational Collection for Women. They are available in both print and most all ebook formats. The Essence of Courage by Lynn U. Watson, Copyright 2016.
<urn:uuid:ba9aeac6-94da-4a44-8af1-d324376ec31e>
CC-MAIN-2020-45
https://lynnuwatson.com/love-and-pomegranates-for-your-valentine/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107885059.50/warc/CC-MAIN-20201024223210-20201025013210-00711.warc.gz
en
0.946544
1,439
2.578125
3
«Far East Illustrated 300 Chinese Character Dictionary» to learn 300 basic Chinese characters The selection of these characters has been made by analyzing the statistics of the use of frequency in a primary school in Taiwan and continental China. According to the authors, the fact that the reader masters these 300 characters, allows him to recognize 65% of the characters in a newspaper's page or any other reading. The dictionary is focused in the meaning of the simplified characters, but it also gives the traditional forms of them. For each character, the following information can be also found: Radicals, its frequency of use, number of strokes, pinyin, bopomofo, a definition written in English, strokes order, examples in sentences and the way the more frequent position of the characters in sentences. The examples of sentences and vocabulary have been selected very carefully. The origin of this selection is again, the frequency of use of the discourse that is given in primary schools. Another criteria was the simplicity and definitions. The dictionary includes pictures which are very easy to understand which they also complement the definitions of the texts. In some characters, the reader will also find clearer explanations in a special square. At the end of the book the reader will find annexes: Radical index, character index by the number of strokes, characters by its frequency of use etc. The books has been printed in full color and different inks have been also used to improve the quality of the contents. This books can be also very useful for teachers.
<urn:uuid:19e7cc4b-0be3-431f-9072-492002260398>
CC-MAIN-2020-40
https://www.aprendechinohoy.com/de/erlernen-der-schriftzeichen/1921-far-east-illustrated-300-chinese-character-dictionary-9789576129278.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400228707.44/warc/CC-MAIN-20200925182046-20200925212046-00593.warc.gz
en
0.959006
310
3.046875
3
Acid Alkaline Food Chart Our eating habits have dramatically changed from nutritious raw foods to highly processed foods very low in nutritional value - in fact our optimum cell function is at risk! Without the proper Acid Alkaline Balance of our body fluids we increase the risk of getting life-threatening or chronic diseases. The key to regain the body's ideal blood and body pH is to create a Balance of Alkaline and Acid Forming Foods. However, because of unhealthy eating habits, most North-Americans have lower than neutral pH levels - but as our "normal" pH level is slightly alkaline, e.g. slightly above neutral (7.2 - 7.3), our intake of foods should also reflect this! Have a Quick but Significant look at the most important Alkaline Foods out there! In this regard we suggest consuming at least 75-80% of Alkalizing Foods, like green vegetables, sprouts and soy products, and never more than 20-25% of Neutral and Acidifying Foods, such as meat, rolls, fast food etc. The reason for that? By eating alkaline foods our body's balance will be transformed from dangerously acidic to slightly alkaline! Here are some simple strategies that may help to gradually balance your pH level: - Soy milk or almond milk instead of dairy products - Elimination of red meat and reduction of any chicken or turkey - Elimination of soft drinks, soda, coffee - alkaline water and alkaline green drinks instead - Wholewheat products instead of anything containing white flour - Big salads as a whole meal as often as possible, including tomatoes, zucchini, squash, cucumbers, almonds, avocados with pumpkin, sunflower, or sesame seeds - No processed, ready made or fast food at all The table below helps to identify various foods' pH-level. We have divided our food chart for Alkaline and Acidic Food products into three categories: Foods you should eat in abundance; Foods you should eat moderately; and foods you should try to avoid. |Healthy Alkaline Foods - Eat lots of them!||Foods you should only consume moderately||Unhealthy Acidic Foods - Try to avoid them!| Non-Stored Organic Grains & Legumes Fats (Cold-Pressed Oils) Meat, Poultry & Fish Milk And Milk Products Table: pH scale of alkaline and acid forming foods THE COMPREHENSIVE ALKALINE ACID FOOD CHART To Print Out & Stick to Your Fridge! The best and most comprehensive Alkaline Acid Food List for direct download to your computer. Buy now and Live Alkaline! Only $ 3,75! The more alkaline-forming foods you add to your nutrition, the stronger will be the results. Should you not be able to completely avoid acidic foods, you should at least try to consume as less as possible of them, and instead put more green food and veggies on your plate. Remember that every little step to a more alkaline diet is an improvement to a healthier way of life. Moreover, you can add green plants nutritional supplements to your diet, which can support you in attaining pH balance in a natural way. Such supplements were developed by Dr. Young, a microbiologist and nutritionist. Over many years he has researched the interrelations between acid wastes inside the body and the development of unhealthy conditions and disease. His assignment is not only to promote a stronger awareness among people for a proper acid alkaline balance within the body, he has also developed superior products to support the body to naturally decrease its acid levels by alkalizing the cell system. Get Information about Symptoms of Acidosis Get Information about The New Biology and pH Miracle by Dr. Young Get Information about Alkaline Nutritional Supplements Alkalosis refers to a condition reducing hydrogen ion concentration of arterial blood plasma (alkalemia). Generally alkalosis is said to occur when arterial pH exceeds 7.45. The opposite condition is acidosis. (Source: Wikipedia) Acidosis is an increased acidity (i.e. an increased hydrogen ion concentration). If not further qualified, it refers to acidity of the blood plasma. Generally, acidosis is said to occur when arterial pH falls below 7.35, while its counterpart (alkalosis) occurs at a pH over 7.45. Arterial blood gas analysis and other tests are required to separate the main causes. (Source: Wikipedia)
<urn:uuid:4175869e-2be0-47b3-af4d-d72257d2127a>
CC-MAIN-2015-32
http://www.balance-ph-diet.com/acid_alkaline_food_chart.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989018.40/warc/CC-MAIN-20150728002309-00002-ip-10-236-191-2.ec2.internal.warc.gz
en
0.907821
943
2.859375
3
What is not very well known is that watermelon is rich in lycopene and it helps lower ldl cholesterol. Lycopene, a carotenoid, has been a household word since its association with reduced cancer incidence. Since then, more research has associated it with lowered cholesterol levels and even helping clear arteries of plaque deposits, though more research is needed to understand the correlation. Mostly you hear about tomatoes being rich in lycopene, which has many manufacturers putting this on the label of their products containing tomotoes. Other foods containing lycopene include guavas, pink and red grapefruit. Both guavas and watermelon have more lycopene gram for gram than tomatoes. All lycopene containing foods also contain other nutrients and carotenoids. Simply taking a lycopene supplement doesn’t do as much good because of those other synergistic ingredients. It isn’t yet clear from research which nutrient alone or in conjuction are needed to produce the improvement in health. Amongst the research articles on lycopene, some show very strong correlations with improved cardiovascular health and lycopene such as that from the American Journal of Clinical Nutrition in 2003 Higher plasma lycopene concentrations are associated with a lower risk of CVD in women. For CVD, exclusive of angina, women in the upper 3 quartiles had a significant multivariate 50% risk reduction compared with those in the lowest quartile. And some others do not show the trend quite so clearly, citing that further work is needed, such as that in 2006 in the same journal: Although it is clear that a higher intake of fuirt and vegetables can preent the morbidity and mortality associated with heart diseases, more information is needed to ascertain he association between the intake of single nutrients such as carotenoids, and the risk of CVD. Currently the consumption of carotenoids in parmaceutical forms for the treatment or prevention of heart diseases cannot be recommended. There is a very strong correlation of overall health to consumption of fruits and vegetables because produce is very complex chemically and offers the highest concentration of nutrients per calorie than any other food. For example, broccoli and red bell peppers pack the highest nutrient punch on a calorie basis, including vitamins, minerals, and phytonutrients such as carotenoids. A great proportion of us barely get in 3 servings of produce a day while 6 or more servings promote optimal health. It’s best eaten, not taken as juice, as the flesh does us a lot of good and slows the ingestion of sugars to help keep our blood sugar regulated, which is extremely important for both cholesterol and triglyceride control. The disadvantage to watermelon and guava compared to tomatoes is that they are seasonal. BUT fortunately, Summer is around the corner and watermelon season is nearly upon us. We can enjoy the great taste and know how great it is for us, since watermelon is rich in lycopene, which helps lower LDL cholesterol levels.
<urn:uuid:04cf8695-69f0-4d1b-a653-1f938e6c076d>
CC-MAIN-2018-39
http://scientifichealer.com/watermelon-rich-in-lycopene-helps-lower-ldl-cholesterol/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160454.88/warc/CC-MAIN-20180924125835-20180924150235-00238.warc.gz
en
0.958872
616
2.953125
3
Getting children interested in gardening and having them participate in the process is the goal of many parents. A teepee garden is an entertaining way to get kids involved in growing and eating vegetables. They can help plant the garden and build the supports, play in the teepee all summer, and eat the treats they helped to grow. As parents have come to learn, children will eat almost any vegetable if they have grown it themselves. Dig your garden plot after all danger of frost has passed and the soil has warmed. Dig a circle 8 feet across, digging down about one foot. Remove all the rocks and roots you can find. Mix in a layer of compost with the top four inches of soil. Arrange the bamboo poles in the circle, creating a teepee shape. Connect the poles at the top by tying them with twine or string. Spread the legs of the teepee out so they are equally distant from each other, but leave a larger space on one side. This will become the entrance to the teepee. Weave string or twine around each pole near the top, connecting it to the next pole. Do this again about one foot lower on the legs, avoiding the entrance. This will create a series of crosswise strings to help vines grow up the teepee. Plant two green bean seeds and two wax bean seeds around each pole base. Plant the beans about one inch deep. Plant carrot and radish seeds three-fourths of the way around the teepee, avoiding the area closest to the entrance. Plant seeds by broadcasting them lightly over the area, then running the rake through the soil. Plant marigold seeds around the side of the teepee nearest the entrance. Sprinkle seeds on the soil and rake in lightly. Water the entire planting area. Thin the bean plants when they have two sets of true leaves on each plant. Choose the two strongest plants around each pole and clip off the rest. Water the entire garden twice weekly. Pick radishes before carrots begin to fill out. Pick beans continuously to keep them producing.
<urn:uuid:6b3e9b52-1c66-4226-9172-fbfe60d744fa>
CC-MAIN-2017-43
http://www.gardenguides.com/79441-make-teepee-garden.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824068.35/warc/CC-MAIN-20171020101632-20171020121632-00552.warc.gz
en
0.942694
425
3.171875
3
Click the picture above to see two larger pictures Show birthplace location |Previous||(Alphabetically)||Next||Biographies index | |Version for printing| Moshé Flato's parents were Shlomo Flato and Anna Lunski. Anna left Russia and arrived in Palestine in 1922 with her parents. She was a student of psychology when she met Shlomo Flato in a Tel Aviv cafe. Shlomo was an engineer who had trained in Dantzig before the Nazis came to power in Germany. He had been born into a leading Polish Jewish family and after graduation he had gone to Palestine to escape the anti-Semitic policies of the Nazi regime having foreseen the tragedy which was about the befall Poland. Shlomo Flato brought various members of his family to Palestine before the outbreak of World War II but almost all who remained in Poland were exterminated by the Nazis. Shlomo was appointed as chief engineer for public works and moved to Jerusalem during World War II but returned to Tel Aviv when the war ended. Moshé's mother wanted to continue her career after her child was born and so a governess was employed to look after Moshé. However, Moshé did not appreciate the arrangement so eventually his mother had to give up her ambitions regarding a career, and bring up her child. Moshé's parents spoke to him in Hebrew but he was surrounded by family members who spoke Polish and Russian. Other family friends spoke German so Moshé grew up speaking many languages. At first his performance at school was good but not outstanding. Only in mathematics did he shine. However when he was given an IQ test he achieved the highest grade since the test had been introduced and his teachers realised that they had an outstanding pupil who was not being motivated by the slow pace of the standard classroom teaching. However Moshé was not the 'ideal pupil' and continued to play pranks which led to frequent punishments. He received piano lessons from Daniel Barenboim's mother and showed real musical talent. He considered making a career as a pianist for a while but his love for mathematics and physics eventually won the day. He passed his final high school examination in 1955 with a mark of 'excellent' but after that was required to undertake military service. A special scheme for gifted students allowed him to study at university and undertake basic military training in the vacations. It still meant that he was required to serve as an officer for three years after graduating. He led a small group of soldiers into Jordan in 1955 but they were ambushed and seven of the ten were killed. Flato survived but insisted on telling the truth about the operation rather than giving an 'official version'. He was punished, eventually serving a month in prison. As well as the military service, he studied at the Hebrew University of Jerusalem, being awarded a Master's degree in 1960 with physics as his main subject and mathematics as his secondary subject. In fact deciding between physics and mathematics had been a difficult task and at one point he thought he might study algebra with Amitsur but had settled for theoretical physics with Giulio Racah. After the award of his Master's degree, Flato served as a lieutenant in the Israeli Air Force. He was asked to set up a programme to teach mathematics and aerodynamics to Israeli pilots. Athough still in the Air Force, he taught a group theory course at the Hebrew University. In 1961 he was made head of the theory group working for the military on an experimental nuclear reactor. In this role he :- ... sometimes refused politically motivated but scientifically hazardous instructions. He also taught a solid state physics course as Bar-Ilan University. He was given permission to attend a theoretical physics summer school in Italy in 1962. However he was involved in a car accident which meant that for the next six months he was receiving treatment, partly in Geneva partly in Tel Aviv. He was allowed to end his military service because of his injuries and began undertaking research towards his doctorate. He was awarded a grant by the French government to undertake research at the Institut Henri Poincaré in Paris :- The arrival in Paris of the 'sabra' bull-in-a-china-shop that Moshé was then, and remained to the very end, created quite a stir. He was recognised immediately by Louis de Broglie and André Lichnerowicz ... After his scholarship ended he remained in France, accepting a position in physics at the University of Lyon in 1964. He remained in Lyon until 1967, defending his Doctorat-ès-Science Physiques in Paris in 1965 before a committee chaired by Lichnerowicz. Some of the papers he wrote around this time are Sur les formules de masses fortes et électromagnétiques des particules élémentaires (1964), Le groupe conforme comme possibilité de symétrie unifée en physique des interactions fortes (1965), Algèbres unifiantes; application à l'algèbre de Lie du groupe de Poincaré (1965), On the "space-time character" of internal symmetries of elementary particles (1965), Remarks on the connection between external and internal symmetries (1965), On the connection between external and internal symmetries of strongly interacting particles (1966). These were co-authored with several mathematical physicists including his friend Daniel Sternheimer (the author of and ). The theme of these papers is to connect the external symmetry properties of a physical system as represented by its invariance under the inhomogeneous Lorentz group (called by Flato the Poincaré group) or its Lie algebra, and the internal symmetry properties as represented by various unitary groups. Flato became a French citizen on 10 March 1967 and in 1968 he was appointed as Professor of Mathematics at the University of Dijon. In Sternheimer writes:- The notion of symmetry guided Moshé throughout his scientific career, both as a mathematician and as a theoretical physicist, and led him to make a number of significant contributions. Even on the mathematical side, the motivation for the study of symmetry comes from physics and the mathematical theory has physical applications. In this connection I can mention two directions which his work ... took. The first is the theory of analytic vectors in Lie group representations, suggested by the problems that arise in passing from Lie algebras to Lie groups. The second is the cohomological study of nonlinear representations of covariance groups of nonlinear partial differential equations which leads to important mathematical developments with nontrivial physical consequences ... In 1977 Flato was appointed to the Gevrey's chair of mathematics at Dijon. Fedosov writes :- I vividly remember the day when I came to Dijon to talk at a seminar. It began at the restaurant at the Dijon station where I was invited to lunch by a telephone call from Paris. Moshé's energy and outstanding personality produced an unforgettable impression upon me from the moment I saw him. During the lunch he acquainted me with French cuisine and discussed many things: mathematics, politics, art and music. Sternheimer writes :- He was extraordinarily quick minded, had a unique intuition and a fantastic ability to interact strongly at the appropriate level with everyone, friend and foe alike. He received many honours for his contributions. In 1980 he was awarded the interdisciplinary Saintour Prize by the Collège de France. He was a consultant for the Nobel Prize for physics from 1971 until his death. He served as president of the Scientific Council of the Union des Assurances de Paris from 1984 to 1992. Article by: J J O'Connor and E F Robertson List of References (13 books/articles)| |Mathematicians born in the same country| Other Web sites |Previous||(Alphabetically)||Next||Biographies index | |History Topics || Societies, honours, etc.||Famous curves | |Time lines||Birthplace maps||Chronology||Search Form | |Glossary index||Quotations index||Poster index | |Mathematicians of the day||Anniversaries for the year| JOC/EFR © November 2006| School of Mathematics and Statistics| University of St Andrews, Scotland The URL of this page is:|
<urn:uuid:ef942bc3-4f64-4e13-851a-93798ced34c3>
CC-MAIN-2014-49
http://www-history.mcs.st-and.ac.uk/Biographies/Flato.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931006855.76/warc/CC-MAIN-20141125155646-00019-ip-10-235-23-156.ec2.internal.warc.gz
en
0.978239
1,726
2.5625
3
The tourism and hospitality industry is directly impacted by the social and economic condition of the region. Domestic or international tourist generally would not like to be in a place for vacation or work where there is tension in the political scenario or is hit by any kind of natural disaster (Ulak 2015). The disaster event that is going to be discussed in the report is based on the Earthquake that had shaken the entire country as well as some of the countries which encompass the border of Nepal. On April 25th 2015, an earthquake of magnitude 7.8, struck the country, the epicenter was in the capital Kathmandu (Britannica.com 2018). Not only the disaster wreck havoc on the infrastructure and livelihood of people, but also took several lives and has severely injured many more. There were two massive aftershocks recorded at magnitudes 6.6 and 6.7, this took place within one hour of the main shake (Britannica.com 2018). However, there was another massive aftershock on May 12 with a magnitude of 7.3. This resulted in the death of a number of people and injuring more than 1900. Geologists say that thrust faulting (i.e., compression-driven fracturing) in the Indus-Yarlung suture zone is the result of the earthquake (Britannica.com 2018). Tourism accounts to be one of the major industries to contribute towards the economy of the country. It is also one of the major sources of foreign exchange and revenue. All adventure seekers and mountain lovers hope to visit Nepal as there are a number of base points to the Himalayan range in the country (Wttc.org 2018). The disaster that is being discussed is natural and thus it cannot be averted by any means however, what companies involved in this industry should take care of are the precaution and the rescue or mitigation action. There are four kinds of impact that natural disaster leave behind: direct, indirect, quantitative damage with tangible effects and qualitative damage with intangible effects. The governments of all the country are responsible for developing disaster management and mitigation rules. However the contribution of the companies in the tourism industry can be by participating in these management activities along with local, regional or national authoritative bodies. In 2017, 4.0 percent of the revenue of the country is based on travel and tourism industry, it is also anticipated that the country revenue from the industry is going to increase in 2018 (Wttc.org 2018). The industry also caters to the employment percentage to a significant therefore it can be said that the economy as well as the industry was severely impacted by the disaster. The companies that operate in the industry are not responsible to look after the rules and regulations regarding any disaster management, this is the role of the government or authoritative bodies in the country. Therefore the focus of the activities that the tourism and hospitality industry undertakes should be to avoid crisis that is caused by the disaster ((Kunwar and Chand 2016). According to the yearly document released by the WTTC (World Travel and Tourism Council) in 2017 the industry directly supported 497,500 jobs which is around 3.2% of total employment of Nepal. On the other hand, there has been a significant amount of investment in the industry as well amounting to NPR17.3bn. Following are some of the details of the industry in Nepal. The activities of tourism and hospitality organisations are associated with accommodation of the tourists, food, transportation, management of the trip, guiding in managing the trip etc are some of the primary activities (Kunwar and Chand 2016). The service segments in this industry are divided in four categories: food and beverage, lodging, recreation, and travel and tourism. For a hotel, the activities that they serve in the industry cater to the food and beverage as well as accommodation. In order to play their part in disaster management the companies in the region have a significant role to play (Kunwar and Chand 2016). The Nepal's National DRR Policy & Strategic Action Plan: 2017-2030, state the guidelines for organisations to act during the event of any disaster. The principles of this action plan are to reducing the risks, understanding the impact of various disasters and risks associated, and developing partnership with authoritative bodies and making the process of development of risk mitigation mainstream (Kunwar and Limbu 2015). According to the disaster risk reduction and management Act 2014, focuses on protecting the lives of the people as well as property and heritage it also provides guidelines for minimizing the disaster risk. The construction of an establishment plays an important role while evaluating the risks that are associated with disasters like earthquake (Tsai and Chen 2011). The National Building Code NBC 203-204: 2015, in the country specifies guidelines for the public buildings to be constructed in an earthquake-resilient building to increase their resistance (Joshi and Joshi 2018). Not only that the collapse of the building can also be anticipated with the help of architectural knowledge and technology, thus while construction of the public places these aspects should be kept in mind. However it has been found that almost 93 percent of the buildings are constructed not following these guidelines. This also provides for the number of emergency exists and installation of the alarm (Picard 2011). The stakeholders who are involved in the policy are: Owners: these are the people who are responsible for construction of the building and thus must be aware of the codes and guideline of the country before initiating the construction. Managers: the management is responsible for drawing up a risk management plan and developing a partnership with government and authoritative bodies. Employees: responsible for following the protocols Government: to provide help and support and to be a part of the protocol in necessary times. There must be a time in which the government support must arrive at the place of emergency. Customers: be aware of the risk management plans that are usually used in the organisation of the industry. The customers should also follow the directions of the employees in emergency case and should try not to panic. From the above analysis it can be said that the key stakeholders in this case are the government and the business. The government of a country is responsible for taking special measures in case there is an emergency case and by aligning the policies of disaster management, the business can ensure that they get the support as fast as possible. The priority of the business as well as the government is to take care of the people weather they are domestic tourists or international tourists. The government also has a number of codes and guidelines that has to be adhered by the business organizations in this industry in order to reduce the impact of such unexpected disasters. It can be conclude from the above discussion that the tourism and hospitality industry is impacted by any kind of natural disaster. The policy focuses on the safety of the people and on rescue and evacuation from the premises as it has been stated a number of times that people should be out on the streets during the time of earthquake in order to be safe form the rubbles and collapse of the building. The policy that has been drafted also focuses on construction of the buildings as natural disasters cannot be averted but with the help of technology and science constructions can be made in a way that the structure can withstand the shock of the event in this case the earthquake. The companies that operate in this industry can collaborate with government and authoritative bodies in the development of plans and organize a methodology that should be followed in case there is an emergency situation, in case of a natural disaster like earthquake the company should have strategies (Dixit et al. 2013). In order to deal with the issues the government and these organizations must come up with a coordinated disaster management plans so that the guests are safe and secure during such crisis situations (Dixit et al. 2013). A recommendation for the policy is to ensure that the buildings or any kind of construction that is made is adhered by the codes and guidelines laid down by the government. Britannica.com 2018. Nepal earthquake of 2015. [online] britannica.com. Available at: https://www.britannica.com/topic/Nepal-earthquake-of-2015 [Accessed 23 Sep. 2018]. Dixit, A.M., Yatabe, R., Dahal, R.K. and Bhandary, N.P., 2013. Initiatives for earthquake disaster risk management in the Kathmandu Valley. Natural hazards, 69(1), pp.631-654. Joshi, G.R. and Joshi, N.B., 2018. Economic loss from earthquake in Nepal and strategies for recovery and resilience building. In Living Under the Threat of Earthquakes (pp. 195-209). Springer, Cham. Kunwar, R.R. and Chand, U., 2016. Natural Disaster and Heritage Tourism: A Study on the Impacts of Earthquake in Bhaktapur, Nepal. Journal of Tourism and Hospitality Education, 6, pp.1-39. Kunwar, R.R. and Limbu, B., 2015. Tourism and Earthquake: A Case Study of Nepal and Turkey. In Building Better Tourism with Renewed Strength, XXth NATTA Convention (pp. 16-31). Picard, M., 2011. Analysis of Legislation related to Disaster Risk Reduction in Nepal. Ritchie, B.W., Crotts, J.C., Zehrer, A. and Volsky, G.T., 2014. Understanding the effects of a tourism crisis: The impact of the BP oil spill on regional lodging demand. Journal of Travel Research, 53(1), pp.12-25. Sanderson, D. and Ramalingam, B., 2015. NEPAL EARTHQUAKE RESPONSE: Lessons for operational agencies. The active learning network for accountability and performance in Humanitarian action ALNAP. 56(3), pp.184-193 Tsai, C.H. and Chen, C.W., 2011. The establishment of a rapid natural disaster risk assessment model for the tourism industry. Tourism Management, 32(1), pp.158-171. Ulak, N., 2015. Nepal's Earthquake-2015: Its Impact on Various Sectors. The Gaze: Journal of Tourism and Hospitality, 7, pp.58-86. Wendelbo, M., La China, F., Dekeyser, H., Taccetti, L., Mori, S., Aggarwal, V., Alam, O., Savoldi, A. and Zielonka, R., 2016. The crisis response to the Nepal earthquake: Lessons learned. European Institute for Asian Studies. Brussels, Belgium: Author, pp. 85-120. Wttc.org 2018. TRAVEL & TOURISM ECONOMIC IMPACT 2017 NEPAL. [online] Wttc.org. Available at: https://www.wttc.org/-/media/files/reports/economic-impact-research/countries-2017/nepal2017.pdf [Accessed 23 Sep. 2018]. To export a reference to this article please select a referencing stye below. Assignment Hippo (2022) . Retrive from https://assignmenthippo.com/sample-assignment/hat304-tourism-and-hospitality-operations-assessment-answer "." Assignment Hippo ,2022, https://assignmenthippo.com/sample-assignment/hat304-tourism-and-hospitality-operations-assessment-answer Assignment Hippo (2022) . Available from: https://assignmenthippo.com/sample-assignment/hat304-tourism-and-hospitality-operations-assessment-answer Assignment Hippo . ''(Assignment Hippo,2022) https://assignmenthippo.com/sample-assignment/hat304-tourism-and-hospitality-operations-assessment-answer accessed 03/10/2022. Talk to our expert to get the help with Hat304 Tourism And Hospitality Operations Assessment Answers from Assignment Hippo Experts to complete your assessment on time and boost your grades now The main aim/motive of the finance assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignment help Australia. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at www.assignmenthippo.com are so much skilled, capable, talented, and experienced in their field and use our best and free Citation Generator and cite your writing assignments, so, for this, they can effectively write the best economics assignment help services. Want to order fresh copy of the Sample Hat304 Tourism And Hospitality Operations Assessment Answers? online or do you need the old solutions for Sample Hat304 Tourism And Hospitality Operations Assessment Answer, contact our customer support or talk to us to get the answers of it.Assignment Help Australia Want to order fresh copy of the Hat304 Tourism And Hospitality Operations Assessment Answers? online or do you need the old solutions for Sample Hat304 Tourism And Hospitality Operations Assessment Answer, contact our customer support or talk to us to get the answers of it. Our motto is deliver assignment on Time. Our Expert writers deliver quality assignments to the students. Get reliable and unique assignments by using our 100% plagiarism-free. Get connected 24*7 with our Live Chat support executives to receive instant solutions for your assignment. Get Help with all the subjects like: Programming, Accounting, Finance, Engineering, Law and Marketing. Get premium service at a pocket-friendly rate at AssignmentHippo I was struggling so hard to complete my marketing assignment on brand development when I decided to finally reach to the experts of this portal. They certainly deliver perfect consistency and the desired format. The content prepared by the experts of this platform was simply amazing. I definitely owe my grades to them.
<urn:uuid:151e21a4-f91e-4c09-a68f-bd7c3c4a7026>
CC-MAIN-2022-40
https://assignmenthippo.com/sample-assignment/hat304-tourism-and-hospitality-operations-assessment-answer
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337428.0/warc/CC-MAIN-20221003164901-20221003194901-00160.warc.gz
en
0.94065
2,979
2.796875
3
Volleyball requires many overhead movements as well as sudden twists and turns. Because of this volleyball players are likely to experience shoulder pain, finger/hand pain, ankle pain, low back pain, and knee pain. Some of the common injuries that volleyball players get are: Physical therapy can help volleyball players who are preparing for or recovering from surgery, have recently suffered from an injury, or are wanting to prevent future injuries! Preventative physical is focused on preventing injury or pain from occurring through various strengthening and stretching exercises. If you are playing volleyball every day, repetitive motions in the shoulders may lead to pain or injury. Doing preventive physical therapy pre-season, mid-season, or post-season can reduce your risk of developing an injury. It can be difficult to prevent injury as a volleyball player; however, there are some steps you can take to reduce your risk: It is important to warm-up and cool-down before practices and games. Always make sure to do some light movement and stretching. As an athlete you are often told to “be tough and play through the pain”, however, this can worsen your condition. If you are experiencing pain, it is important to rest. Focus on building muscle in your legs, core, and shoulders to prevent injury. Proper nutrition and hydration can not only help to build muscle and prevent injury, but also aid in a quicker recovery! If you are experiencing pain from a volleyball injury that does not get better or worsens, do not hesitate to seek help from an orthopedic specialist or physical therapist. Waiting to treat an injury can worsen the condition and make recovery longer and more difficult. When you come to see us at MPOWER Physical Therapy, your physical therapist will come up with a range of strengthening and stretching exercises for you to try. Here are some simple exercises to try at home: Start by sitting in a chair with your arms out to the side. Cross your right elbow over your left and bring your touch your left finger to your right palm. Hold this pose for 15 seconds and repeat on the other side. Start by standing straight with your legs parallel to your shoulders. Slowly raise the heels of your feet and gradually lower them without touching them all the way to the ground. Do 3 reps of 15, use weights if you would like. Lie flat on your back and bend your knees. Dig you heels into the floor and lift your hips. Hold this pose for 10 seconds. Repeat 3 times. To learn more about physical therapy exercises for volleyball players, check out our other blogs: Physical Therapy After ACL Surgery Physical Therapy for Back Pain Physical Therapy for Ankle Pain Physical Therapy for Knee Pain Physical Therapy for a Rotator Cuff Tear If you are a volleyball player who has recently suffered from an injury, or you are looking to prevent future injury, seek help from one of our physical therapists located in Nashville, Franklin, or Brentwood, TN! Many of our physical therapists have experience working with volleyball players and high-level athletes. To schedule an appointment, call us or request an appointment online.
<urn:uuid:6db23766-bb78-41b8-ba3b-0dba2b80b16c>
CC-MAIN-2023-14
https://www.mpowermd.com/blog/physical-therapy-tips-for-volleyball-players
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00119.warc.gz
en
0.960239
642
2.984375
3
How does a caterpillar turn into a beautiful butterfly? What makes a butterfly different from a moth? Find the answer plus more incredible things about butterflies in this issue. Butterfly Science Activities In Search of Caterpillars For this project, you will need to find a caterpillar. Butterflies lay their eggs on the plants that their caterpillars like to eat, which are called host plants. Some common host plants for butterfly and moth caterpillars are alfalfa, aster, broccoli, cabbage, clover, dill, milkweed, parsley, snapdragon, and sunflower. Trees that are hosts to caterpillars include birch, chokecherry and cherry, cottonwood, elm, oak, and willow. (Here is a list of some common butterflies and their host plants.) Ask an adult to help you figure out which of those plants you have in your yard or someplace near your home where you could go to look for caterpillars. Put a few small twigs and blades of grass in the container to give your caterpillar more interesting places to explore. The caterpillar will not need any water, but it will be very hungry, so make sure you remember what plant it was eating when you found it so that you can get fresh leaves from the same kind of plant. Feed your caterpillar once a day, or more often if it eats all the fresh leaves sooner. Take the old leaves out before putting new ones in. Let the caterpillar go after a couple days. Note: Instead of finding your own caterpillars, you can order some. You will not need to feed these caterpillars anything because the containers that they come in have all the food they will need, but you can watch them eat and turn into butterflies! Make a Butterfly Feeder Butterflies love to drink nectar. The sweet juice from fruit is like nectar. Butterflies don't have noses, but they can sense smells through their antennae and their feet! When a butterfly lands on liquid, it knows it is something it could eat and its proboscisuncurls to drink up the liquid! A proboscis works sort of like a drinking straw and the liquids that it sucks up through its proboscis go directly into the butterfly's body. Colors also help butterflies find food. Their favorite colors are purple, red, orange, yellow, and pink, because those are the colors of most flowers that have sweet nectar that butterflies can easily drink. What is symmetry? When something is exactly the same on both sides, it is symmetrical. True symmetry means that one side is a mirror image of the other side, so if you could draw a line down the middle of an object and fold it in half along the line and the two halves matched up to each other perfectly, the object would be symmetrical. Symmetry can be seen in lots of things around you. Here are some examples: snowflakes, butterfly wings, insects and spiders, seashells, flowers, letters, shapes, buildings, your body, and many more. Some things may seem symmetrical, but really aren't exactly the same on both sides. One example is your face. Even though it looks mostly the same on each side (you have two eyes and ears and your forehead, mouth, nose and chin are all shapes that can be split in half), there are small differences that are hard to notice unless you look very closely. Can you find any examples of symmetry? Look around your house or take a quick walk outside to find some things that are symmetrical. How many of your objects are things found in nature, or not created by humans? Print out this worksheet and decide which of the pictures are of something symmetrical and which ones are not. A butterfly's wings can have as many as 125,000 scales in one square inch! Most butterflies will only live for about 7-14 days, but some kinds don't even live that long, and others can live much longer. The female Queen Victoria's Birdwing is the largest butterfly in the world. It can get up to 10 inches from the the tip of one wing to the tip of its other wing. What would happen if you ate caterpillars? (Answer: You would get butterflies in your stomach!) What do moths learn at school? (Answer Moth-matics.) Way Cool Websites Read more about a butterfly's life cycle (includes photos) and body parts. Learn about the amazing migration of Monarch butterflies. Help the monarch butterflies get to the milkweed plants in this maze. The Life Cycle of a Butterfly A butterfly is an insect. It has three main body parts - a head, thorax, and abdomen. It also has six legs, two compound eyes, and two pairs of wings. Before a butterfly becomes a butterfly, it is a caterpillar, which is also an insect, even though it looks very different from a butterfly and does not have any wings. The incredible transformation that a caterpillar goes through to become a butterfly is called metamorphosis. (Do you remember learning about a ladybug's metamorphosis in an older issue of this newsletter?) There are four stages that a butterfly goes through in its life. The stages are called a life cycle and are explained below. When a female butterfly becomes an adult, she will lay an egg - or maybe a cluster of several eggs - on a leaf of her favorite plant. A butterfly egg is very tiny and a little bit sticky so it will stick to the leaf until it hatches. About 4-10 days after the egg is laid, a tiny caterpillar will hatch from it! All the little caterpillar will want to do is eat. It will start eating the leaves of the plant it hatched on almost as soon as it is out of its egg. Lots of caterpillars also eat the shell of the egg they have hatched out of. The tiny caterpillar is called a larvaand will eat a lot to prepare for the amazing transformation it will go through during the next stage of its life. As it eats, it will get too big for its skin and will shed its top layer of skin to reveal a larger brand new layer of skin underneath! This will happen about four or five times during the larva stage. Because a caterpillar is an insect, it has three pairs of true legs on the front part of its body (the thorax), plus lots of other legs called prolegsthat it uses to climb and cling to things. The caterpillar will keep eating and growing for several weeks until it is time to move on to the next stage. After awhile the caterpillar will stop eating. It is now much bigger than it was when it first hatched from its egg and it is ready to develop into the next stage - a pupa. The caterpillar begins searching for the perfect place to turn into a pupaor chrysalis. It looks for a place that feels safe and then attaches itself securely, usually upside down, to the spot (like a plant stem or side of a leaf or solid object) using strands of silk. Then it sheds its skin one last time. This time, the new skin underneath is not soft and flexible; it is hard and smooth and makes a case around the caterpillar's whole body. The chrysalis hangs from the spot for several days, weeks, or even months, depending on what type of butterfly pupa it is. While the butterfly is in the pupa stage, some incredible changes are happening inside the chrysalis and it will look much different when it finally comes out! Soon the pupa will be finished developing and a butterfly will break out of the chrysalis. It has changed from a long caterpillar that crawls along and uses jaws to eat leaves into a dainty butterfly that can fly using its colorful wings and eats by sucking nectar from flowers. When a butterfly first emerges from its chrysalis, its wings are folded up and slightly damp. It will stay there for awhile and pump blood through the veins in its wings and allow the air to dry them. Then it will fly away and look for its first sip of nectar and begin its search for a mate. A female butterfly will lay eggs and the life cycle will start all over again. Butterfly wings are usually very colorful with pretty patterns on the top side of their wings while the underside of their wings are usually darker, more drab colors. Butterflies usually rest with their wings closed and the dark colors help them blend in with their surroundings, making it harder for birds and other predators to see them. The colors on the surface of a butterfly's wings are made up of lots of little tiny scales. If you were to touch a butterfly's wings, you would notice some colored powder-like substance on your fingers. Those are the tiny scales! A butterfly eats through its proboscis (say: PRO-BO-SIS), which is very similar to a straw that you would use to drink a beverage, except that it is connected to the butterfly in place of a mouth. Female butterflies are usually larger than males and they usually live a little longer than males. Butterflies do not see, hear, smell, taste, and feel the way we do. Even though they can do all of these things, their senses are very different from human senses and might not be quite what you would expect! Seeing - Butterflies have large compound eyes, just like most other insects do. Compound eyes have many lenses instead of just one like our eyes and they allow insects to see in many different directions at once, which helps them know when there are predators or other dangers around. Their compound eyes are part of the reason that butterflies often fly away so quickly when you start to get close to them. Hearing - Butterflies do not have ears, so they can't hear sounds like we can. However, their wings are very sensitive and they can feel the vibrations (very fast back and forth movements) that different sounds make. Since they feel sound instead of hearing it, they can really only "hear" loud sounds or big changes in the amount of sound around them. Smelling - Butterflies can smell quite well, but they don't have noses! They can smell through their feet and their antennae. Tasting - They can also taste through their feet! They have special parts on their feet that help them sense what something tastes like to help them decide if it is something that is good to eat or not. They can also taste through their antennae. Feeling - Since they have six feet, they have lots of things to feel with. Butterflies, like all insects, have two antennae, which help them feel too. They also have lots of tiny hairs on their bodies that help them feel movements. Butterflies vs. Moths Butterflies and moths look and act pretty similar, but here are some important differences that will help you tell them apart: (Note: plural means more than one.) Proboscis- the straw-like tube that butterflies use to drink nectar and other liquids. Symmetrical- having two sides that look exactly the same. Metamorphosis- a transformation that many insects and animals go through before getting to the adult stage. The changes that take place are very dramatic. Larva(plural = larvae) - a middle stage of an insect's life cycle. In a butterfly, the larva is a caterpillar. Prolegs- legs on the end section (the abdomen) of larvae (caterpillars). Pupa(plural = pupae) - a later stage of an insect's life cycle. The complex changes that happen before the insect becomes an adult happen in this stage. In a butterfly, the pupa is a chrysalis. Chrysalis(plural = chrysalides) - the protective outer covering of a butterfly pupa. Nocturnal- active at night and asleep during the day. Printable Worksheet & PDF Use this worksheet to help kids review symmetry. Discuss how butterflies and moths exhibit symmetry or use with the Observe Symmetry activity. To view a printable PDF version of this newsletter and the worksheet together, click here.
<urn:uuid:e927e398-f494-4982-9c00-4a6ce4c657db>
CC-MAIN-2015-35
http://www.hometrainingtools.com/a/butterflies-young-science-explorers/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645390745.87/warc/CC-MAIN-20150827031630-00131-ip-10-171-96-226.ec2.internal.warc.gz
en
0.96206
2,546
3.75
4
Every Quadratic equation has two roots. And this program is implemented to find the roots of the entered quadratic equation. Logic : The roots of any quadratic equation of the the form, are, The same equation is computerized here. The program asks user to enter the three coefficients a, b and c. Then it finds out numerator- which is the discriminate, and the denominator of the equation of the roots. Then it checks if the numerator is greater, equals or less than zero. Prints out the results according to the situation. This can be elaborated to find the roots of equation with higher powers. You are pleased to contact us with your doubts through the discussion forum. int A, B, C; float disc, deno, x1, x2; printf(“\n\n\t ENTER THE VALUES OF A,B,C…”); scanf(“%d,%d,%d”, &A, &B, &C); disc = (B * B) – (4 * A * C); deno = 2 * A; if(disc > 0) printf(“\n\t THE ROOTS ARE REAL ROOTS”); x1 = (-B/deno) + (sqrt(disc) / deno); x2 = (-B/deno) – (sqrt(disc) / deno); printf(“\n\n\t THE ROOTS ARE…: %f and %f\n”, x1, x2); else if(disc == 0) printf(“\n\t THE ROOTS ARE REPEATED ROOTS”); x1 = -B/deno; printf(“\n\n\t THE ROOT IS…: %f\n”, x1); printf(“\n\t THE ROOTS ARE IMAGINARY ROOTS\n”); Leave a Reply
<urn:uuid:c0d10ad2-36c1-4582-bd84-ddbbdd24d7ab>
CC-MAIN-2018-22
http://electrofriends.com/source-codes/software-programs/c/simple-programs/to-find-the-roots-of-a-quadratic-equation/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864872.17/warc/CC-MAIN-20180522190147-20180522210045-00010.warc.gz
en
0.792047
438
4.03125
4
Running and dehydration often go hand in hand as people are only designed to deal with heat or limited water for a certain period of time. While we can survive for as long as a month in a moderate climate without food, we would struggle to stay alive for longer than two days in desert conditions without water. After oxygen, water is a close second on the list of essentials for life. Water makes up 60 per cent of your total body weight and performs many crucial functions, including nourishing cells; carrying food through the body; eliminating waste; regulating body temperature; cushioning and lubricating joints; and maintaining blood volume and pressure. Every day we lose fluid by sweating, breathing and urinating. It's the sweating in particular that runners need to pay attention to because as soon as you start to run, you start to dehydrate. About 75 per cent of the energy you put into exercise is converted into heat and is then lost. This is why exercise makes you feel warmer. Extra heat has to be dissipated to keep your core body temperature within safe limits – around 37-38°C. Your body keeps cool by sweating, which makes the replacement of fluids crucial. Fail to consume enough fluid and your blood will thicken, reducing your heart's efficiency, increasing your heart rate and raising your body temperature. Dehydration is normal Modest dehydration is a normal and temporary condition for many runners and doesn't lead to any serious medical conditions. Elite athletes, for example, don't have time to drink very much at sub-five-minute mile pace, and are probably the most dehydrated runners on the course – a state that is easily and quickly reversed within minutes of finishing, by ingesting fluid. Replacing fluid after a run is just as important. For every kilogram of bodyweight you lose, you need to drink one-and-a-half litres of fluid. Try to drink around 500ml in the first 30 minutes after your run and keep gulping every five to 10 minutes until you have reached your target. If you pass only a small volume of dark yellow urine, or if you have a headache or feel nauseous you need to keep drinking – a sports drinks or diluted juice (with a pinch of added salt) are your best options. Ultra-distance runner, Professor Tim Noakes, author of The Lore of Running and leading researcher at the University of Cape Town, is worried that runners are following out-dated hydration plans: "The reason why athletes drink too much is almost certainly due to hysteria attached to the supposed dangers that dehydration poses to athletes and to the belief that fatigue is caused by dehydration so that replacing more fluid than is lost will ensure optimum performance. I find no scientific support for either belief," he says. Since running requires you to support your body's weight while trying to complete a race in the shortest possible time, Noakes believes it could be more useful to measure whether keeping levels of dehydration at less than five per cent of body weight would lead to a better performance. Not everyone would agree with Noakes but all researchers do agree on one thing: you need to start a run or race hydrated. By drinking 500ml of fluid two hours before a run – try water, a sports drink or diluted fruit juice – and another 150ml of fluid just before you run, you'll have enough time for your body to clear what you don't need before you set off. Related: sports drinks vs energy gels Your body has a finely tuned thirst mechanism that lets you know when you need to drink, but how do you know if you're drinking too much? Excessive consumption is also a potential danger and has started to become an issue as marathon running has broadened its appeal to attract more recreational runners. Hyponatraemia means "low blood sodium" and is caused by excessive water consumption, which lowers the concentration of sodium in the blood. In its mild form, hyponatraemia will cause bloating and nausea; in extreme cases it can lead to brain seizure and death. The group most at risk are women. Why? They're smaller and less muscular than men, on average, so they sweat less and need to drink less. "Women may be more fastidious in following rules," says Noakes. "So if they're told to drink as much as they can, they may be more likely to do that than men." An average woman needs to drink up to 30 per cent less than an average man – this will ensure blood doesn't become diluted, lowering sodium to a dangerous level. Anyone running for more than four hours should be guided by thirst, avoid drinking huge amounts of water, and use sports drinks that contain sodium. You can also increase your risk of hyponatraemia by using drugs such as aspirin and ibuprofen. Researchers at Baylor College of Medicine in Houston studying marathon runners concluded that these drugs impair the body's ability to excrete water. How To Replace Fluids You will undoubtedly need to replace sweat with fluids during some training runs and races so what should you drink and when? Water, diluted juice and sports drinks are all good fluid replacers. If you've been running for less than an hour, plain water is a good choice, but, if you have been running hard for longer than an hour, drinks containing sugar or maltodextrin (a slow-release carbohydrate) and sodium may speed your recovery. Researchers at Loughborough University found that when runners drank a sports drink (5.5g carbohydrate/100ml), they improved their running time by 3.9 minutes over 42km compared with drinking water. Sports drinks containing carbohydrate also increase water absorption into your bloodstream, according to research at the University of Iowa, and that counts when you're sweating heavily. Researchers found that drinks containing approximately 6g carbohydrate/100ml are absorbed the most rapidly. The taste of a flavoured sports drink will also encourage you to drink more of it – compared to plain water – according to a study at the McMaster University in Ontario, Canada. Researchers at the University of Iowa originally thought that sodium speeds water absorption in the intestines, but they discovered that after you consume any kind of drink, sodium passes from the blood plasma into the intestine where it stimulates water absorption. In other words, the body sorts out the sodium concentration of the liquid in your intestines all by itself, so the addition of sodium to sports drinks is unnecessary. While sodium in sports drinks does not have a direct effect on performance, it does have one key benefit: it increases the urge to drink and improves palatability. That's because the increase in sodium concentration and decrease in blood volume that occurs when you exercise increases your thirst sensation, with the result that you want to drink. If you drink plain water it dilutes the sodium, thus reducing your urge to drink before you're fully hydrated. Despite growing concerns about hyponatraemia, it's important to remember that for most runners, there is a bigger risk of dehydration than overhydration. Each of us sweats at a different rate, produces varying amounts of sodium in our sweat, and reacts differently to heat. Exactly how much you need to drink depends on how heavily you are sweating. The harder and longer you are working out, the more you sweat. Training in hot humid conditions also makes you sweat more, and some people simply sweat more than others. Current guidelines recommend drinking anything from 300ml to 800ml of fluids per hour when you're exercising. As we've already stated, the upper end of that scale is almost certainly more than you need. However, you need to try different approaches to hydration in your training to establish a strategy that works for you and remember: you're an experiment of one. Exactly how much is enough? So how do you know if you're hydrated before you start a run? The easiest, most practical test is to check the colour of your urine. University of Connecticut researchers found that urine colour correlated very accurately with hydration status. Pale yellow urine indicates you're within one per cent of optimal hydration. Try to drink one litre of water for every 1,000kcal you burn daily. (An average male burns around 2,500kcal a day, a runner covering five miles a day more like 3,000kcal.) In general we need two to three litres of liquid a day – half from food and half from fluids. This is a minimum: if you live somewhere hot or you know you sweat a lot, you'll obviously need more. You can work out how much fluid you lose in a typical run by weighing yourself before and after. Remember to go to the toilet and remove your clothes before you weigh yourself, then remove your clothes and weigh yourself as soon as possible after you return. You can assume that all of your weight loss is fluid. The recommendation to drink one-and-a-half times the fluid loss accounts for the fact that you continue sweating after exercise (and losing fluid) and that urination is usually increased during this time. This method of calculating dehydration does not take into account water that is metabolised from glycogen stores when you exercise. "This does not need to be replaced," says Professor Noakes. "According to one study, drinking to prevent any weight loss during a marathon would have caused the athletes to be overhydrated by 2.2kg." Some researchers have, however, concluded that you should aim to match your fluid loss with intake during exercise. A study at the University of Aberdeen, for example, revealed that by replacing at least 80 per cent of the fluid lost, or keeping within one per cent of your body weight, performance is not affected. In the past, many of the studies that set out to measure dehydration and performance were poorly designed and impossible to reproduce. Some studies do show that perceived exertion is lower when fluid is ingested, but in these tests athletes are asked to exercise at a fixed intensity for as long as they can; their performance may change from day to day, and may be influenced by external factors such as boredom. "Drinking fluid might enhance performance simply because it alleviates boredom," Noakes concludes. Studies where athletes are asked to complete a fixed amount of exercise in the shortest time possible – simulating a race situation, for example – do not show any beneficial effects of drinking at different rates. One study, led by Glenn McConell, senior lecturer at the School of Physiology at the University of Melbourne, found that replacing 100 per cent of the sweat lost during exercise did not improve exercise performance more than replacing only 50 per cent of fluid lost – which, again, suggests that if you follow accepted hydration wisdom you could be drinking too much. So, while drinking might not lead to any physiological benefits that help you to produce a better performance, the majority of studies do agree that there may be psychological benefits. "The most consistent finding is that fluid ingestion markedly reduces the perception of effort during exercise at both low and high intensities," says Professor Noakes, adding that, "all the evidence indicates that ad libitum fluid ingestion during exercise appears to be as beneficial as higher rates of forced ingestion." In other words, you should drink when you're thirsty. By experimenting in training and races, ingesting varying amounts of fluid, you will establish how your body responds to dehydration and find out what works best for you. Just be sure, as you crest a sand dune in the Marathon des Sables and spy a watery oasis in the distance, that you outpace any camels in the vicinity. After they've had their 200 litres, there won't be much left for you to slake your thirst, let alone refill your back-borne water bladder. What's In A Name? What's the difference between hypotonic, isotonic and hypertonic drinks? A hypotonic drink is more dilute than your body fluids (ie there are fewer particles – sugars/electrolytes per 100ml), which means that it can be absorbed faster than plain water. For example, squash diluted at least 1:8 with water, or one part fruit juice diluted with three parts water. Isotonic means it is the same concentration (ie the same number of particles per 100ml) as your body fluids – it is therefore absorbed as fast as or faster than water. They provide an ideal compromise between rehydration and refuelling. For example, Isostar, Lucozade Sport or fruit juice diluted half and half with water or squash diluted 1:4 with water. Hypertonic drinks, such as cola, lemonade or neat fruit juice, are more concentrated than body fluids, and will be absorbed more slowly than plain water. Hypertonic drinks slow down the rate at which the stomach empties and therefore reduce the speed of fluid replacement. These are better post-run drinks that offer a higher dose of energy with the fluid.
<urn:uuid:2e46383d-0b16-4050-843a-94153f951a5b>
CC-MAIN-2020-24
https://www.runnersworld.com/uk/nutrition/a761780/rws-complete-guide-to-hydration/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419639.53/warc/CC-MAIN-20200601211310-20200602001310-00568.warc.gz
en
0.964969
2,641
3.3125
3
Perception is reality. That is a phrase we all have all heard, and are familiar with. What is less emphasized in the implications of this phrase is the assumption that someone else’s perception (of you likely) is different than your own self-perception. Why is that important? Imagine that you list out what you determine to be your top leadership competencies (strengths) that you bring to your organization, as well as your biggest weaknesses. Then your peers, superiors, and subordinates all list out what they imagine your strengths and weaknesses to be as well (such as in 360-degree feedback). What if your list does not at all match with, or is even similar to, anyone else’s assessments of you? Can you imagine how this may be limiting your leadership impact on your organization? Maybe you’re not as strong of a leader as you thought you were. The congruence of your self-rating and others’ rating of you is what is known as self-awareness. The more self-aware you are, the higher your performance is as a leader. Numerous organizational psychology research studies have proven this fact. Essentially, self-awareness is accurately knowing your own inner state (identity and personality) and accurately recognizing your impact on others. So, if self-awareness is critical for leaders and their performance, how do you become more self-aware? It is a learned skill, not a natural ability. It requires a number of factors to develop your own capacity to see yourself with objectivity and to take perspective on yourself “from a distance.” The factors that develop the skill of self-awareness are: - Experience. Professional experience includes critical events like promotion or major projects, role and job changes, and experiencing failure or professional setbacks. All forms of experience provide lessons. Receiving counseling throughout your experiences enhances your development of self-awareness via feedback (others’ perceptions of you). - Socialization. Your background has considerable effect on your inner state and forms your norms, beliefs, values, orientations, and much of your behavior. - Education. I differentiate education from socialization because I consider education more as self-development. Education can be achieved through a self-study of leadership theories, committing to self-assessments, and comparing them to others’ feedback on you. Critical to education are reflection techniques (journaling, AARs, etc.) and enlisting in coaching if possible. This four-part series focuses on the education factor of developing self-awareness as a leader. The most commonly known method of self-development is professional reading, which does help improve your self-awareness. What is less common is conducting self-assessments. There are a number of resources available to better understand your intrinsic leadership styles through self-assessments. By completing several of these, you can follow up with deliberate reflection, coaching from a respected professional peer or superior, and help from others through 360-degree feedback to determine a level of congruence between your own assessments and others’ assessments of you. Ultimately, by becoming more self-aware, you become a more effective leader. The next parts of this series, Part II & III, introduce eight leader assessment instruments from some of the major leadership theories that have resulted from the century-long study of leadership. Part IV expands on additional tools by addressing more options to better understand yourself as a leader. Though these assessments in Part IV are not necessarily intended for the purpose of leadership, they will make you more self-aware, and thus a better leader. Critical to remember in reading this series is that these assessments are mere tools available to better learn tenets and principles of leadership, and how you inherently enact some of them. The goal is NOT to change your leadership approach solely based on others’ perception of you or results from an assessment. I do not expect readers to change their personalities; you have to be who you are at heart. Leadership is a concept as individual as we all are. There is no one right holistic approach to leadership. My intention for this series is to introduce readers to more efficient and effective approaches to leadership by presenting studied leadership theories (and associated assessments) in order to better understand who you are as a leader. Find the following parts of this series here: - Part II: Leader Assessment Instruments - Part III: Leader Assessment Instruments Continued - Part IV: Other Helpful Assessments If you find this post helpful, subscribe to receive weekly email notifications of new content!
<urn:uuid:0d5ef1df-a585-4144-8a14-eda0710c22bb>
CC-MAIN-2021-10
https://3x5leadership.com/2017/08/11/leader-awareness-series-part-i-an-introduction-to-self-awareness/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178366477.52/warc/CC-MAIN-20210303073439-20210303103439-00548.warc.gz
en
0.966997
929
2.640625
3
Writing technical documentation for software engineers is more than authoring code comments. In order to use an application programming interface (API) or existing source code effectively, software engineers require different types of information. For this reason, technical writers who author API documentation need to analyze the requirements of their target group. About the Target Group There are different types of readers – this also holds true for software engineers. To find out more about the way your target group works and uses documentation, you can develop personas. Personas are commonly used in user-centric software design and in user interface design. Based on experiences from several API documentation projects, we developed three basic personas to represent software engineers. You may use these as templates. However, specific personas should be developed for your application and development scenario. |Persona||Behaviour||Required Information Type| |Samantha||Starts programming immediately and learns by trial and error. She uses the code comments of the imported classes as documentation. Likes copying code from examples.||– Code comments – Programming examples – Sample programs| |George||Likes reading conceptual information about the architecture and business/technical processes before he starts programming. Consults the documentation to find a solution for a specific task or problem.||– Background information on API and framework – Conceptual information – Description of programming tasks| |Nic||Reads on demand, that is, whenever he needs specific information regarding a task or a problem.||– Code comments – Conceptual information – Description of programming tasks Needs index and search function!| API documentation needs to comprise more than code comments. In order to support the different needs of the target group members, the following document and information types should be provided: - Programmer's Guide or Programmer's Cookbook, containing conceptual information about the product and the API architecture, descriptions of programming tasks (recipes), and programming examples. Especially important for George and Nic. - Reference information, such as extracted code comments, describing the individual API objects (classes, interfaces, methods, operations, etc.). Especially important for Samantha. - Sample programs, which may be provided with the product deliverable. Especially important for Samantha and Nic. - Product documentation, describing the business processes provided by the API. The Programmer's Guide or Programmer's Cookbook covers the following main topics: - Programming environment - Architecture of the API - General programming tasks. Examples: - Event handling - Transaction handling - Resource handling (for example, memory) - Error messages - Recipes for specific tasks that describe how to achieve goals in API programming. The recipes may be based on user stories/use cases from product development or based on typical customization tasks. Examples of recipes are "How to authenticate a user" or "How to add a document to the repository". Recipes must provide links to the reference documentation, extensive (and working!) sample code, and links to sample programs. The technical writer functions as author and coordinator of the Programmer's Cookbook. Code samples may be written by technical writers with programming skills or by software engineers of the development team. The technical writer can effectively use his/her knowledge from the product documentation regarding user stories and may collect additional user stories from the company's software engineers. Based on their structural and language know-how, technical writers are best suited for creating the structure for cookbooks and monitoring the use of terminology. Reference information for APIs contain details about the functions and parameters of the individual API elements, such as interfaces, methods, constants, or operations. Reference information is often authored as code comments and published as HTML by means of tools like Javadoc or Doxygen. Integrated development environments (IDEs), such as Eclipse, make code comments for imported classes easily available. However, for some API types, such as Web Services, other formats may be necessary, because the services provided via the API are described in an XML file. For such application scenarios, a wiki can be used to author and publish reference information. Reference information may contain short code samples. Adding large code samples to code comments is often not feasible, because layout instructions mostly need to be given in HTML notation. The role that technical writers play in authoring code comments largely depends on their technical level – whether they have programming skills or whether they focus on authoring skills. Technical writers having little to no programming skills may, however, review code comments with regard to terminology, language use, and structure. The product documentation is usually the place for information regarding the business processes and architecture of the product. Also, general technical concepts, such as user management or server/client communication, are explained here. This general conceptual information is, of course, also useful for software engineers who develop based on the product's API. When a software product provides an API, the product documentation must contain a short description of the API and references to the Programmer's Guide. Collaboration and Feedback Functions In addition to these document types, software engineers require collaboration functions, such as developer networks or social networking functions, which enable them to share information and to exchange experience with other developers who are using the same API. Also, providing feedback functions allows developers to report errors, gaps in the documentation, and so on, to the API manufacturer. Role of the Technical Writer The tasks of the technical writer in API documentation projects depend on the writer's programming skills. There are technical writers who are able to write code samples and sample programs themselves. Programming knowledge is very useful, especially for complex software products. However, it is not mandatory to be a software engineer yourself if you want to write documentation for software engineers. It is mandatory, however, that you have a solid understanding of software programming, of object-oriented programming languages, and of modern development methods, such as agile. The strengths of technical writers, and thus the real benefit for API documentation projects, lies elsewhere: technical writers are able to structure information, to write from user- and task-oriented perspectives, and to guarantee the use of a consistent terminology throughout the complete product documentation. These assets make technical writers indispensable for API documentation. Session slides: Writers UA Conference, Seattle, 2010: Documentation for software engineers
<urn:uuid:2022cbb4-ea92-4d34-ac8a-4f58c2cda1a7>
CC-MAIN-2019-51
https://www.parson-europe.com/de/wissensartikel/11-documentation-for-software-engineers.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541317967.94/warc/CC-MAIN-20191216041840-20191216065840-00361.warc.gz
en
0.896633
1,269
2.71875
3
Jet fuel is seldom if ever pure hydrocarbon molecules. It's got a lot of other stuff mixed into it to improve the properties. I'm going to quote Shell for the sake of examples: Antioxidants (gum inhibitors) must be used in Avgas to prevent the formation of gum and other antioxidation products. Jet fuels, which are inherently more stable than gasolines, may contain them, depending on the treatment process used during manufacture. A metal deactivator - now rarely used - may be added to nullify the effects of dissolved trace metals, especially copper, which can impair the thermal stability of jet fuels. Corrosion inhibitors can be used to reduce corrosion in fuel system and improve the lubricity - lubricating properties - of jet fuels. Fuel system icing inhibitors reduce the freezing point of any water that may be in the fuel system and prevent the formation of ice crystals that could restrict fuel flow. They are mandatory in military Jet but are not used in civil aircraft that have fuel heaters. They may be added to either Jet or Avgas during the fuelling of small Static dissipater additives minimise the hazardous effects of static charges that build up during movement of jet fuels. They are sometimes used in Avgas as well. Source No practical application: Aluminium based aerosols, Mono-atomic gold, Nano aluminum-coated fiberglass, Radioactive thorium, Cadmium, Chromium, Nickel, Desiccated blood, Mold spores, Yellow fungal mycotoxins, Polymer fibers, Barium. Useful additives from your list: - Ethylene dibromide- Anti-Knock agent in aviation fuel. - Alumium: Derivatives containing it have been used. Many of the materials you list might have the very real potential to (seriously) damage jet turbines and piston engines if mixed in during extended use.
<urn:uuid:1881a6f5-5dea-49e7-8f91-9d3df571f58a>
CC-MAIN-2016-07
http://aviation.stackexchange.com/questions/3421/if-jet-engines-did-leave-chemtrails-wouldnt-the-chemicals-cause-adverse-reacti
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701167599.48/warc/CC-MAIN-20160205193927-00044-ip-10-236-182-209.ec2.internal.warc.gz
en
0.900692
405
2.984375
3
Life science or bio-science augments to any and all branches of science that deal with living organism and their organizations, their life processes and the role they play in the environment. In all equality, life sciences deals with branches of science such as microbiology, zoology, botany to biotechnology, healthcare, pharmaceuticals and medical devices. The pursuit of any scientific endeavor is noble, but life sciences are particularly special. The most practical reasons that made life sciences more obvious are the insight they provide on diseases processes, while allowing the advancements of novel therapeutics and medical devices thereby leading to betterment of the human health. The life sciences also allows us to enable an understanding of the environment and other living species with whom we share out planet thereby carving a guide to conservation of efforts which leads to literally sharing our shared planet. Yet the more reasons which we study life sciences are the answers which it provides to the questions such as where do we come from and what are we made up of? Life science simply encompasses a wide breath and diversity of exciting areas of study, all of which are at the forefront of the scientific development. Biology, a core branch of life science deals with various factors such as physical structures, chemical processes, electrical pathways, molecular interactions and much more. While medicine, another segment of life science deals with factors such as anatomy, pathology and physiology of a certain organism. Lastly, life science can be combined with fields of engineering such as bioengineering, biomaterials, biomedical engineering to other sciences like computer, mathematics, anthropology, astronomy, physics, linguistics which includes astrobiology, bio computers, bioinformatics, biophysics, clinical epidemiology and much more. All these factors considered make life sciences a compelling, complex, combinable, practical and philosophical field of study that constantly pushes the frontiers our past, present and future to the boundaries. We at MIR, pride ourselves on following in those footsteps while presenting our reports on Life sciences which will help give you extreme knowledge and a clear understanding of the market putting you ahead of the competition by leaps and bounds.
<urn:uuid:5fb03775-c62a-45ed-a3dc-a93afc27969f>
CC-MAIN-2019-35
https://www.marketindustryreports.com/category/healthcare/life-sciences
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315936.22/warc/CC-MAIN-20190821110541-20190821132541-00097.warc.gz
en
0.938042
423
2.796875
3
The International Space Station (ISS) is about to take delivery of a new robotic arm, though it’s been a long time coming. The European Robotic Arm (ERA) was designed more than three decades ago and has missed three planned missions to the ISS in the last 20 years because of technical issues. But now the ERA is ready to launch to the space station from the Baikonur Cosmodrome in Kazakhstan later this month. At just over 11 meters long and with seven joints that include “an elbow, shoulders, and even wrists,” the ERA will become the first such arm to work around the outside of the Russian segment of the space station, allowing spacewalkers to work more efficiently around that part of the ISS. “Light yet powerful, the orbital arm has the ability to anchor itself to the station and move back and forward by itself, hand-over-hand between fixed base-points,” the European Space Agency (ESA) said in an article about the new piece of machinery. The ERA’s seven joints are capable of dealing with multi-ton payloads and are agile enough to perform a variety of assembly tasks. According to ESA, the arm’s main tasks will include installing, removing, and replacing experiment payloads and large station elements; transferring small payloads in and out of the station through the Russian airlock; transporting spacewalkers from one part of the ISS to another “like a cherry-picker crane”; and using its four cameras to inspect the outside of the ISS. The incoming kit also brings with it new operational methods as the ERA can carry out many tasks autonomously or semiautonomously. It can also be controlled in real time by crew members located either inside or outside the station, or operated via instructions delivered beforehand. “ERA’s first tasks in orbit, after deployment and checkouts, are to set up the airlock and install a radiator for the latest module of the space station,” ESA said. The ISS is already home to two robotic arms, Canada’s Canadarm2 and the Japanese Experiment Module Remote Manipulator System. Both of these external arms help to guide visiting spacecraft and also handle external payloads on the U.S. and Japanese sections of the ISS, but their position and reach prevent them from working outside the Russian part of the space station. Now all eyes are on the rocket launch that will take the ERA to the space station, with the mission currently slated for July 15 with docking at the ISS expected to take place on July 23. - NASA may use a ‘space tug’ to decommission the space station - NASA and SpaceX target new Crew-6 launch date after scrubbed effort - Watch highlights of NASA’s second spacewalk of 2023 - Astronaut’s stunning image of Key West looks like a painting - Amazing Atlas robot shows it’s almost ready for work
<urn:uuid:cf4dd849-63e1-476c-a08c-7d3791f1d430>
CC-MAIN-2023-14
https://www.digitaltrends.com/space/a-new-robot-is-heading-to-the-international-space-station/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00571.warc.gz
en
0.948151
624
2.96875
3
A didactic approach to presenting verbal and visual information to children participating in research protocols: The comic book informed assent. Massetti, T., Crocetta, T. B., Guarnieri, R., Silva, T. D. D., Leal, A. F., Voos, M. C., & Monteiro, C. B. D. M. (2018). A didactic approach to presenting verbal and visual information to children participating in research protocols: The comic book informed assent. Clinics, 73: e207. OBJECTIVE: When children participate in research protocols, consent (by a parent or legal guardian) and assent (by the children) must be given. Understanding research protocols can be challenging for an adult and even more difficult for a child. The aim of this study was to describe the development of a comic book created to facilitate children’s understanding of informed assent with clear and simple language. METHODS: Five researchers with scores above seven according to the Fehring criteria developed the comic book, avoiding the use of technical terminology. Twenty children between 7 and 12 years old, and enrolled in a larger study, responded using a Likert scale and questions about the clarity of texts and illustrations. The final version met National Health System Resolutions (Resoluc ̧o ̃ es do Conselho Nacional da Sau ́ de – CNS no 196/1996 and 466/2012). RESULTS: The comic book assent presents a short story containing information about a real study: the invitation to participate, objectives, methods, instruments, procedures, risks, benefits, and the researchers’ contact information. Most of the participants answered that they perceived the content of the text to be ‘‘Excellent’’ (40%) and ‘‘Very good’’ (40%), and the illustrations were perceived as ‘‘Excellent’’ (45%) and ‘‘Very good’’ (55%). CONCLUSION: The construction of a simple and clear model of informed assent is possible, and this model should be used in experiments with children. The full version of this article is available via the link below.Publisher’s Link
<urn:uuid:3a4ab4e3-f4d0-4ee0-ab60-7787cdd5b505>
CC-MAIN-2022-05
https://childethics.com/library/a-didactic-approach-to-presenting-verbal-and-visual-information-to-children-participating-in-research-protocols-the-comic-book-informed-assent/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304345.92/warc/CC-MAIN-20220123232910-20220124022910-00430.warc.gz
en
0.878361
472
3.453125
3
How many atoms per unit cell(z) are present in bcc unit cell? Number of atoms in a unit cell of a body centred cubic structure : Contribution by 8 atoms on the corners =8 = 1 Contribution by the atom presents within the body =1 Total number of atoms present in the unit cell = 1+1 = 2 atoms
<urn:uuid:128c12a3-ff84-4fd9-a790-fa6c6a205253>
CC-MAIN-2019-39
https://www.neetprep.com/question/52856-atoms-per-unit-cellz-present-bcc-unit-cell/54-Chemistry--Solid-State/659-Solid-State
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575596.77/warc/CC-MAIN-20190922160018-20190922182018-00442.warc.gz
en
0.871127
76
2.578125
3
Every spring, garden clubs and municipal organizations around the country put on flower shows. The oldest, largest, and best (in my opinion) is the Philadelphia Flower Show, which dates back to the 1820s and is held the first full-week of March. However, this show has always focused on highly cultivated, decorative plants and flowers. With no emphasis on medicinal plants (most of which are flowering herbs), or edible plants known for their beneficial nutrient content. But modern science shows there are more than a dozen types of flowers that are both ornamental and edible. Let’s take a look at six of my favorites… Enhance your well-being with these six flowers 1.) Chamomile is a floral herb that’s been used for centuries in cooking and as a medicine. The flowers look like small daisies, and impart a slightly sweet and musky taste to foods. Medicinal uses: Chamomile is an anti-inflammatory, antioxidant, and mild astringent. There is scientific—and traditional—evidence that it can help reduce inflammation and infections of the skin, mucus membranes, mouth, and respiratory tract. It’s also used for gastrointestinal (GI) issues like diarrhea, gas, indigestion, and nausea.1 Chamomile tea has been shown in studies to reduce anxiety and induce sleep. Indeed, my mother often made it for me before bedtime. How to consume: You can use fresh chamomile blossoms in smoothies or fruit salads. Or you can dry the flowers and use them in infusions, syrups, baked goods, and teas. 2.) Chrysanthemum typically blooms in the late summer and fall, with big, multi-petaled flowers in a variety of colors. These are also known as mums and can vary in flavor from plant to plant—everything from sweet to peppery to tangy. Which is why I recommend tasting the individual flowers before cooking with them or making them into a tea, to ensure you prefer the flavor. Medicinal uses: Chrysanthemum is a potent medicine. It’s been used for centuries in traditional Chinese and Japanese healing traditions to treat respiratory problems, high blood pressure, hyperthyroidism, and anxiety. Modern studies show the flowers have strong antioxidant and anti-inflammatory properties2, and may even help fight osteoporosis.3 How to consume: Lighter-colored blossoms, like white and yellow, are used to make tea. To make chrysanthemum tea, remove the bitter base of the flower and use only the petals (fresh or dried). In addition, young leaves and stems from the Garland variety of chrysanthemums, also known as “chop suey greens” or shingiku in Japan, are widely used in stir-fries and as salad seasoning. 3.) Dandelion (from the French dent de lion, or “lion’s tooth,” from the serrated edge of the leaf) is indeed a flower, too—not a weed. The bright and beautiful blossoms are better left alone to thrive in your lawn—and to attract pollinators. You can actually consume every part of a dandelion. The flowers are sweet and crunchy, and the greens are slightly bitter, like arugula. Medicinal uses: Dandelions are loaded with vitamins A, B, and C—along with the hard-to-find, natural form of vitamin K. They’re also high in calcium, copper, iron, manganese, magnesium, phosphorus, and potassium. Dandelions have been used since ancient times for GI, liver, and kidney health. Recent research has also revealed that dandelions may fight angiogenesis, the process in the body that allows cancerous tumors to survive and grow.4 Plus, dandelions can improve heart health by reducing the risk of atherosclerosis, lowering cholesterol, and combatting obesity.5 How to consume: You can eat the flowers and greens raw in salads. Or you may choose to sauté the greens in a little olive oil and add them to casseroles, stews, or any dish calling for “hearty greens.” You can also make a tasty dandelion tea, wine, or jelly from the flowers. 4.) Hibiscus is a member of the rose family, and it’s traditionally known as Chinese rose. There are hundreds of varieties of hibiscus in tropical and subtropical regions worldwide. And there are even hearty hibiscus species that grow in colder, northern regions. These large, showy blossoms come in a variety of colors. The petals are somewhat firm, with a smooth, fleshy texture and a subtle, savory taste. In fact, I often munch on some fresh petals from our very own Florida garden. Medicinal uses: Hibiscus has a wide and almost astonishing array of health benefits. Research shows hibiscus is a potent antioxidant that can lower blood pressure6, fight breast cancer7, reduce obesity8, prevent kidney stones9, alleviate urinary tract infections10, and even prolong lifespan.11 How to consume: The flower can be eaten fresh from the plant, and is often used in hot or cold teas, salads, relishes, or jellies. The tea is a brilliant red color, and has a tart, tangy, slightly sour flavor. 5.) Rose is a classic ornamental plant, and the petals of all 150 varieties are edible. But not all roses taste the same. A good guide for choosing a flavorful rose is this: If it smells pleasant and sweet, it probably tastes good as well. Medicinal uses: As I explained in last month’s issue, plenty of studies show that roses have antioxidant, anti-inflammatory, and antibacterial properties. So it’s no surprise that researchers have found that roses can help prevent type II diabetes, regulate blood pressure, support brain cell growth, and even act as a powerful cough suppressant. Plus, some studies have found that roses promote relaxation and reduce stress. How to consume: Fresh rose petals can be eaten raw, added into fresh fruit and green salads, or dried and added to granola or mixed herbs. They can also be “muddled” and added to any liquid to make rose-infused drinks and teas, or jams and jellies. Chopped rose petals can be added to butter or olive oil to make them zestier. 6.) Squash blossoms are the flowering parts of one of the Native American staples known as the “three sisters” (corn, beans, and squash). Squash gourds are quite tasty—and so are the blossoms. One of the most popular squash blossoms are zucchini’s bright yellow, long, bell-shaped flowers. These blossoms have a delicate, squash-like taste and a soft, velvety texture. Medicinal uses: The yellow and orange colors of squash (and its blossoms) are due to the high content of carotenoids, which act as antioxidants and vitamin A precursors. While there are few studies on squash blossoms themselves, other research shows zucchini is rich in vitamin A, vitamin C, manganese, potassium, and magnesium. There’s some evidence that zucchini has anti-cancer benefits as well.2 It’s also loaded with soluble and insoluble fiber, which aids in digestion, supports gut health, and helps with blood-sugar management. How to consume: Squash blossoms can be eaten raw or sliced in fresh green salads. They can also be sautéed in herbed batter, or stuffed with herbed cheeses and baked until crispy. And there you have it. Six edible, flavorful, healthful flowers to add to your garden—and to your plates! Indeed, my grandmother in France always kept little candied flowers in a bowl on the dining room table for ornamentation and consumption. I like to follow her lead and make flowering plants the centerpiece of my table—and my diet. 1”Chamomile: A herbal medicine of the past with bright future.” Mol Med Report. 2010 Nov 1; 3(6): 895–901. 2“Chemical compositions of chrysanthemum teas and their anti-inflammatory and antioxidant properties.” Food Chem. 2019 Jul 15;286:8-16. 3“Dual Effect of Chrysanthemum indicum Extract to Stimulate Osteoblast Differentiation and Inhibit Osteoclast Formation and Resorption In Vitro.” Evid Based Complement Alternat Med. 2014;2014:176049. 4“Anti-inflammatory activity of Taraxacum officinale,” J Ethnopharmacol. 2008;115(1):82-88 5“Hypolipidemic and antioxidant effects of dandelion (Taraxacum officinale) root and leaf on cholesterol-fed rabbits,” Int J Mol Sci. 2010;11(1):67-78. 6“Effect of sour tea (Hibiscus sabdariffa L.) on arterial hypertension: a systematic review and meta-analysis of randomized controlled trials.” J Hypertens. 2015 Jun;33(6):1119-27. 7“Hibiscus flower extract selectively induces apoptosis in breast cancer cells and positively interacts with common chemotherapeutics.” BMC Complement Altern Med. 2019 May 6;19(1):98. 8“Plants with potential use on obesity and its complications”. EXCLI J. 2015 Jul 9;14:809-31. 9“Dietary Plants for the Prevention and Management of Kidney Stones: Preclinical and Clinical Evidence and Molecular Mechanisms”. Intl J Mol Sci. 2018 Mar 7;19(3). 10“Exploring the effect and mechanism of Hibiscus sabdariffa on urinary tract infection and experimental renal inflammation.” J Ethnopharmacol. 2016 Dec 24;194:617-625. 11“Hibiscus sabdariffa L. extract prolongs lifespan and protects against amyloid-β toxicity in Caenorhabditis elegans: involvement of the FoxO and Nrf2 orthologues DAF-16 and SKN-1.” Eur J Nutr. 2019 Feb 1. 12“Role of Zucchini and Its Distinctive Components in the Modulation of Degenerative Processes: Genotoxicity, Anti-Genotoxicity, Cytotoxicity and Apoptotic Effects.” Nutrients. 2017 Jul 14;9(7).
<urn:uuid:9b9f6adc-5b65-4ee7-a413-ad23dc5af348>
CC-MAIN-2021-49
https://drmicozzi.com/six-flowers-that-can-combat-everything-from-obesity-to-anxiety
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358688.35/warc/CC-MAIN-20211129044311-20211129074311-00402.warc.gz
en
0.90146
2,290
2.609375
3
History & Description: While green beans are typically referred to as string beans, many varieties no longer actually feature the fibrous ‘string’ that runs down the length of the earlier varieties. Green beans are also commonly known as snap beans. Haricots vert are French green beans that are very thin and very tender. Green beans are in the same family as shell beans, such as pinto beans, black beans and kidney beans. Yet unlike their cousins, green beans’ entire bean, pod and seed, can be eaten. These emerald green veggies range in size, but they usually average four inches in length. They contain tiny seeds within their thin pods. Eat as many green beans as you desire because they are helping you to bone up! These easy to prepare veggies provide vitamin K which is necessary to maintain strong bones. Vitamin K activates osteocalcin, the major non-collagen protein in bone. Osteocalcin helps to anchor calcium molecules inside of the bone. Therefore, without enough vitamin K1, osteocalcin levels are inadequate, and bone mineralization is impaired. Green beans can also help prevent colon cancer. The vitamin C and beta-carotene in green beans help to protect the colon cells from the damaging effects of free radicals. Green beans have folate and this mineral helps to prevent DNA damage and mutations in colon cells, even when they are exposed to cancer-causing chemicals. Studies show that people who eat foods high in vitamin C, beta-carotene, and/or folate are at a much lower risk of getting colon cancer than those who don’t. Choosing & Storing: If possible, purchase green beans at the produce store sells them loose so that you can sort through them to choose the beans of best quality. Purchase beans that have smooth feel and a vibrant green colour, and that are free from brown spots or bruises. They should have a firm texture and ‘snap’ when broken. Store unwashed fresh beans pods in a perforated plastic bag kept in the refrigerator crisper. Whole beans stored this way should keep for about three days Tips for Preparing Green Beans: Green beans are versatile and easy to prepare. Steam them and serve them up with a vinaigrette dressing, stir them into soups, stews and casseroles. Green beans can be used as a side vegetable with any meal or they can be served as a salad. Rinse them well under water and discard the end that has been picked off of the stem. They make a great accompaniment to fish and are a colourful addition to any plate.
<urn:uuid:7708a985-b829-4647-8a81-451e459e276f>
CC-MAIN-2019-26
http://producedepot.ca/produce/green-beans/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999130.98/warc/CC-MAIN-20190620024754-20190620050754-00013.warc.gz
en
0.947583
536
3.109375
3
Health, Physical Education And Recreation | Tourism Systems Planning (3cr) R450 | 6477 | R Brayley Tourism Systems Planning 8:00a-9:15a TR WH005 Description: Components of the tourism-park recreation development system and the concepts of planning resource use at the larger-than-site scale. Physical and program factors important to development for visitor use. 1. To understand tourism as a tool for development 2. To understand the elements that contribute to tourism development 3. To apply tourism elements in cases by analysis and examining specific cases and formulating a case 4. To gain a international perspective through case analysis of a region 5. To gain exposure to tourism planning models 6. To investigate different facets of tourism development applied to a variety of settings 7. To effectively use tourism terminology 8. To obtain a wider more critical and analytical view of tourism development and learn how to use creativity in the process Required Book List: A set of readings is available at TIS Bookstores. Summary of Assignments: Adventure in tourism planning project, participation and attendance, case studies and quizzes and analysis.
<urn:uuid:76083523-2a3f-4641-8b09-2d29172e46e8>
CC-MAIN-2015-32
http://www.indiana.edu/~deanfac/blspr00/hper/hper_r450_6477.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990123.20/warc/CC-MAIN-20150728002310-00273-ip-10-236-191-2.ec2.internal.warc.gz
en
0.815812
247
2.640625
3
Worry Continues to Mount Over Japan’s Tsunami Debris The tsunami that devastated Japan nearly a year ago may embark a new phase of destruction. Japanese officials say that 1.5 million tons of debris is floating in the ocean from the incident and has scientists concerned after a 66-foot concrete dock washed up on a Newport Oregon beach this week. The dock weighs in at 165 tons and traveled 5,000 miles from Japan to the U.S. “Obviously, we knew things would be coming our way, but I didn’t expect anything this size,” Tom Cleveland, a housekeeping supervisor at nearby beachfront condominiums, told the Associated Press. Some experts think the feasibility of the millions of tons of trash reaching the coasts on the west is slim to none while others worry that it could be an environmental catastrophe. In terms of size and weight, this is something that U.S. officials haven’t really seen and apparently there is no cohesive plan or funding in the event that it happens. Some West Coast leaders have even went as far as to say that this scenario would pose a national emergency. Items that have recently washed ashore that were traced back to Japan include a crate with a Harley-Davidson motorcycle inside it found in Canada and a basketball from an elementary school discovered in Alaska. Tsunami debris is unpredictable because of the constantly changing currents and crashing waves. These conditions make it difficult to monitor the situation. A seattle based oceanographer predicts that the rest of the debris will wash up on the west coast come October during the beginning of the usual fall storms. Although there is another risk that could wash up ashores aside from just the junk. Invasive species of seaweed, crabs, and other marine organisms could be latched on to all sorts of items. According to the assistant professor of Fisheries and Invasive Species John Chapman, this could present a different issue. “We know extinctions occur with invasions. This is like arrows shot in the dark. Some of them could hit the mark.” One example of this is Mitten crabs from China eat baby Dungeness crabs of North America. This poses problems for the fisheries that depend highly on these crabs for their business as well as pose risks to the species itself. A 2004 study showed that the U.S. faces 400 extinctions from invasive species. The NOAA has set aside $600,000 for potential clean ups but U.S. senator Mark Begich thinks a sum of $45 million should be provided to local communities for clean-up efforts. Trash in the ocean is nothing new. In fact, thousands of people dedicate their lives to keeping the beaches rid of it. This trash however is a little different in that it may contain trace amounts of radiation and could be dragging unwanted life into foreign territories. As the months go on, the full extent of the problem will be more realized. All we have to do it just wait it out and hope for the best. Reasons to JOIN US include: - It's absolutely FREE! - Get Green Tips You MUST know about. - How to's on going green, saving money, and having fun. - Keep up-to-date on our posts in cased you missed them.
<urn:uuid:f51e108e-1702-4abb-a9b7-41d48e097ad0>
CC-MAIN-2014-15
http://www.theenvironmentalblog.org/2012/06/japans-tsunami-debris/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609530131.27/warc/CC-MAIN-20140416005210-00103-ip-10-147-4-33.ec2.internal.warc.gz
en
0.963736
679
2.875
3
Coolock's first church is said to have been founded by St.Brendan, or more probably, his followers. There is no primary documentary evidence of this foundation but because it is traditionally dedicated to St.Brendan, it is fairly safe to assume that there was an early Celtic church on the site. St.Brendan was born about the year 484.He was a native of Kerry. He entered the monastic life. Much discussion has occured about his narrative of his voyage to America, and all the wonderful events which took place on this journey. A man named Tim Severin crossed the Atlantic in a curragh similar to Brendan's, to prove that the journey was possible.Yet nobody has come up with a definite answer as to whether St. Brendan reached America. St. Brendan founded the famous monastery at Clonfert, which at one time had 1000 people attached to it. At quite an old age, he visited St.Columcille at Iona. He returned to Ireland and died in 577 aged 93. He died at a sister monastery in Annadown but was buried at his own monastery of Clonfert. His festival is celebrated on May 16 each year. In all the details of the life of this great saint, there is no reference to his having ever visited Coolock. Across the road from Coolock Church a lone tree marks the site of St.Brendans Well. A small trickle of water coming out of the hole in the cement wall of the stream is all that is left to remind us of this well. "A small well, about four feet in diameter, covered in a small clump of whitethorn, with a large poplar tree. No evidence of devotion. The water is piped away for domestic use "A description of St. Brendans Well by Kevin Danaher. There was an outbreak of fever in the area around the year 1914. It was thought that the well was not helping matters, so it was duly filled in. But water came up in the kitchen of a nearby house. The well was opened again and its water was piped to the house, which gave the house a constant supply of water. In 1934, the well had a low stone arch to protect it. The wells name "Brendan Parkees" and the original dedication of the Church are the only known links St.Brendan has with Coolock.
<urn:uuid:637734f4-8481-4751-9560-93997afa44b8>
CC-MAIN-2015-35
http://ireland.iol.ie/~mcoolock/mercyhp/brendan.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065464.19/warc/CC-MAIN-20150827025425-00085-ip-10-171-96-226.ec2.internal.warc.gz
en
0.988969
493
2.5625
3
Water shortages are predicted to be the catalyst for 21st Century conflicts as E&T explains. The history of the late 20th century was pockmarked with various conflicts whose roots could be traced back to oil and securing its safe supply. According to the United Nations, however, that is changing, and water could be the next resource that triggers wars around the globe as countries become increasingly aware of the need to secure a long-term supply. The waters of a number of major rivers - such as the Mekong, Indus, Nile and Amazon - are shared between two or more countries. International river basins cover 45 per cent of the Earth's land surface. They provide water for about 40 per cent of the world's population, and account for approximately 60 per cent of global river flow. If India wants to dam a Himalayan river that ultimately delivers water to Pakistan, tensions will arise. Likewise, Egypt has an awkward relationship with Ethiopia, in whose highlands the Nile begins its journey to the Mediterranean. The damaging effects of climate change could well restrict the natural supply of water just as demand is peaking. 'Those who have studied water conflicts find almost none where water triggered the conflict,' Daniel Zimmer, executive director of the World Water Council, says. 'Water is ultimately a source of collaboration rather than war. It is so vital, you cannot afford to have a war over it.' But at the local level relations are often more fraught. Tension over the allocation of water resources is far more prevalent within countries' own borders. Increasing agricultural production by increasing irrigation, for example, may leave less water for downstream users. In Darfur, access to water and land has been a major factor in a conflict between black farmers and Arab nomads. Drought and desertification in North Darfur led the Arab nomads to move into South Darfur, where they came into conflict with black African farmers. In China, the government was criticised by local officials in north-western provinces for diverting water from these regions to Beijing to flush out the city's polluted rivers and lakes in time for the Olympics. The third UN World Water Development Report, published last year, stated that water is linked to the crises of climate change, energy and food supplies and prices, and troubled financial markets. 'Unless their links with water are addressed and water crises around the world are resolved, these other crises may intensify and local water crises may worsen, converging into a global water crisis and leading to political insecurity and conflict at various levels,' the report says. It goes on to explain that action is required now, and it is hard to argue against that. Lives and livelihoods depend on water for development. After decades of inaction, the problems are enormous. And they will worsen if left unattended. But while the challenges are substantial, they are not insurmountable. Alongside the natural forces affecting water resources are new human activities that have become the primary 'drivers' of the pressures affecting our planet's water systems. These pressures are most often related to human activities and economic growth. Our requirements for water to meet our fundamental needs and our collective pursuit of higher living standards, coupled with the need for water to sustain our planet's fragile ecosystems, make water unique among natural resources. But this shortage of water poses a question. It's a simple question but one that could be at the root of future disputes. Who actually owns the water? Does water flowing through one country or region belong to that country? Or does every region it passes through have equal rights to its use? Can one country or state dam a river to preserve it for its own use to the deteriment of others further downstream? California water wars There is no better example of the conflicts water can cause than in California. At the turn of the 19th century, newly-elected mayor of Los Angeles, Frederick Eaton, dreamed of a city that rivalled New York to the east, but his grand plans were being thwarted by a lack of water. He appointed his friend William Mullholland to director of the Los Angeles Department of Water and Power (LADWP) and between them began to redress this inbalance. There was water aplenty 200 miles to the north in the Owens Valley. Eaton set about buying the water rights while Mullholland began constructing a giant aqueduct. The Los Angeles aqueduct ran for 233 miles and was completed in 1913, transporting water through 164 tunnels from the Owens River to a reservoir in the San Fernando Valley. This began a new era for the city, and Mullholland famously said at the opening of the reservoir: 'There it is, take it.' But what was good for Los Angeles was disastrous for the Owen Valley. What had once been a green and fertile land quickly turned into an arid waste. The once bountiful supply of water diminished to a trickle to such an extent that in 1924, Owens Lake completely dried up prompting an uprising from local farmers. They armed themselves and took over part of the aqueduct, dynamiting Alabama Gate. It was, however, all in vain. Another project in the Western United States that illustrates the complexities of water ownership is the construction of the Hoover Dam. The dam was originally proposed with the dual aims of controlling the problem of flooding on the Colorado River as well as electric power generation. There was minimal guidance on water allocation from the Supreme Court and supporters of the dam feared an endless round of legal challenges and delays so they adopted a novel solution. It was proposed that the seven states (California, Nevada, Arizona, Utah, New Mexico, Colorado and Wyoming) that lay in the path of the Colorado River form an interstate compact, with the approval of Congress. Initially, talks between the gang of seven foundered until the Supreme Court handed down a decision which undermined the claims of the upstream states. The resulting Colorado River Compact was signed on November 24, 1922 and six years later the dam was authorised. The changes in water use caused by Hoover Dam's construction had a devastating impact on the Colorado River Delta. The construction of the dam has been credited as causing the decline of this estuarine ecosystem. For six years after the construction of the dam, and while Lake Mead filled, virtually no water reached the mouth of the river. The delta's estuary, which once had a freshwater-saltwater mixing zone stretching 40 miles (64 km) south of the river's mouth, was turned into an inverse estuary where the level of salinity was actually higher closer to the river's mouth. 'Recent world events and natural forces, such as increased incidences of intense drought across the US, compel policy makers to address water security issues,' says Jesse J Richardson Jr, associate professor of urban affairs and planning at Virginia Tech and author of the report 'Who Owns Water'. 'Policy responses must consider existing legal framework or risk reversal in the courts. Legal principles often shape final policy by prohibiting some responses while allowing or even facilitating others.' Water supply and water rights concerns often present uniquely novel and complex issues. However, courts often rely on well settled, but ancient, legal doctrines in deciding water rights issues. Many courts and legislators also lack a basic understanding of the complex science of hydrology. 'Water law and security in the United States draw from several areas of the law, including private property rights, local, state and federal environmental laws, federal and state freedom and information rules and state laws regulating public service authorities. The fragmented nature of the regulation of water and water security prevents a thorough review of all areas of the law impacting water. 'Often, water rights conflict with water security policy by, for example, preventing control of water resources by government agencies. The takings clause prevents local, state and federal governments from seizing groundwater or surface water for public purposes without just compensations. The public trust doctrine, contrary to popular belief, fails to excuse governmental agencies from this obligation. 'However, state and local governments may regulate water to advance the public good so long as this regulation stops short of a taking. Drawing this line presents difficulties for policy makers. 'On the other hand, a system of dispersed private water wells presents a difficult target for terrorists, as opposed to a single public water supply source. Use of private water wells for the primary water supply, or even back-up system, should be encouraged. 'Most importantly, policy makers must seek to understand the basic legal framework of common law water rights and allowable legislative alternatives to those rights. This understanding allows policy makers, federal and state agency experts and other to pursue research on water security alternatives that will result in legally defensible policy decisions.'
<urn:uuid:6259259b-2e46-4cc4-8d05-51869a9e605e>
CC-MAIN-2018-09
https://eandt.theiet.org/content/articles/2010/07/who-owns-water/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812871.2/warc/CC-MAIN-20180220010854-20180220030854-00621.warc.gz
en
0.960678
1,766
3.4375
3
- Why is the danger zone for food temperature so important? - What is the maximum temperature allowed in a refrigerator? - What is the temperature danger zone food handlers? - What is the danger zone for food in Celsius? - What is the most dangerous food to reheat? - What is the temp range for the temp danger zone? - What is the temperature danger zone for food quizlet? - What are the 4 C’s of food safety? - What is considered room temperature for food? - What is the temperature danger zone 360 training? - What is the 4 hour 2 hour rule? - What is the 2/4 rule for cooling food? - Is it safe to eat cooked chicken left out for 4 hours? - Can you eat food you left out overnight? - What temperature is cottage cheese in the danger zone? - What is the temperature danger zone for 4 hours? - What is the temperature danger zone for 2 hours? - What is temperature danger zone? Why is the danger zone for food temperature so important? Food in the danger zone is at risk of causing illness to anyone who handles or consumes it. Keeping food out of the danger zone will ensure it’s safe to eat by limiting the growth of bacteria. Temperatures below 8 °C significantly slow bacteria growth – the colder it is, the harder for bacteria to multiply.. What is the maximum temperature allowed in a refrigerator? 41 degrees FahrenheitRule #1: Temperature Matters The maximum internal temperature for food stored in the fridge is 41 degrees Fahrenheit. What is the temperature danger zone food handlers? Danger Zone – The Danger Zone is when the temperature of food is between 41 degrees F(5 degrees C) and 135 degrees F. This is called the danger zone because bacteria will grow quickly between these temperatures. What is the danger zone for food in Celsius? Bacteria usually grow in the ‘Danger Zone’ between 8°C and 60°C. Below 8°C, growth is stopped or significantly slowed down. Above 60°C the bacteria start to die. What is the most dangerous food to reheat? Here are a few foods you should never reheat for safety reasons.You should think twice before warming up leftover potatoes. … Reheating mushrooms can give you an upset stomach. … You probably shouldn’t reheat your chicken. … Eggs can quickly become unsafe to reheat. … Reheating cooked rice can lead to bacterial poisoning.More items…•Sep 21, 2018 What is the temp range for the temp danger zone? As the name suggests, the danger zone refers to a temperature range that’s dangerous for foods to be held at. And that range is between 40°F and 140°F. What is the temperature danger zone for food quizlet? What is the temperature danger zone? Between 41-140 degrees Fahrenheit. What are the 4 C’s of food safety? In the health and social care sector, the four C’s are especially important for food hygiene safety. Cleaning, Cooking, Cross-contamination and Chilling all come into play during the food handling process and must be implemented properly at all times. What is considered room temperature for food? 68 to 86°FThe authors note that, according to earlier studies, salty, bitter, sweet, and sour stimuli were easiest to detect in foods within a relatively balmy range from 68 to 86°F—colloquially known as room temperature. What is the temperature danger zone 360 training? What is the Temperature Danger Zone? The “temperature danger zone” (Temperature Danger Zone) in food prep ranges from 41° to 135°F. Within that range, pathogens double every 20 minutes and reach numbers high enough to cause illness within 4 hours. What is the 4 hour 2 hour rule? What is the 4-hour/2-hour rule? Studies show that food can be safely held out of temperature control for short periods of time without significantly increasing the risk of food poisoning. The time that food can be safely held between 5°C and 60°C is referred to as the ‘4-hour/2-hour rule’ (see diagram): What is the 2/4 rule for cooling food? To cool foods quickly, separate food into smaller batches and store in shallow containers in the cool room. The 2-hour/4-hour rule provides guidance on how long potentially hazardous food can be held safely at temperatures between 5°C and 60°C (temperature danger zone). Is it safe to eat cooked chicken left out for 4 hours? Answer: You can safely leave cooked chicken out at room temperature for two hours — or one hour if the temperature is above 90 degrees Fahrenheit — says the United States Department of Agriculture. Cooked chicken that has been sitting out for longer than 2 hours (or 1 hour above 90° F) should be discarded. Can you eat food you left out overnight? The USDA says food that has been left out of the fridge for more than two hours should be thrown away. At room temperature, bacteria grows incredibly fast and can make you sick. Reheating something that has been sitting at room temperature for longer than two hours won’t be safe from bacteria. What temperature is cottage cheese in the danger zone? 135 degrees FCottage cheese at danger; If you obtain food regulated by hot weather, make sure it is at least 135 degrees F or 57 degrees C. The food dangerous temperature range occurs from 40 F, and 140 F. Cottage cheese is also safe from the alternative above since it is manufactured using the fermentation technique. What is the temperature danger zone for 4 hours? Food must be cooled to 70°F (21°C) within 2 hours and then has 4 more hours to get down to 40°F (4.5°C). When warming foods from cold, the same rules apply in reverse, 4 hours to get to 70°F (21°C), then 2 hours to get up to hot holding. What is the temperature danger zone for 2 hours? Bacteria grow most rapidly in the range of temperatures between 40 °F and 140 °F, doubling in number in as little as 20 minutes. This range of temperatures is often called the “Danger Zone.” Never leave food out of refrigeration over 2 hours. What is temperature danger zone? The danger zone is the temperature range in which food-borne bacteria can grow. Food safety agencies, such as the United States’ Food Safety and Inspection Service (FSiIS), define the danger zone as roughly 40 to 140 °F (4 to 60 °C).
<urn:uuid:fe87ca1e-2f3b-4953-ad1d-f465f6c94ff4>
CC-MAIN-2021-31
https://the50sdinerpeoria.com/qa/quick-answer-what-is-the-temperature-danger-zone-for-food.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154126.73/warc/CC-MAIN-20210731203400-20210731233400-00644.warc.gz
en
0.927089
1,399
3.09375
3
Click on this image to see Georgia Governor Nathal Deals 2014 Subluxation Proclamation Click on this image to download a pdf of the Subluxation Awareness Foundation proclamation Subluxations represent the largest mostly unknown threat to the health and well-being of the public. It is the responsibility of the chiropractic profession to education the public about the consequences subluxations represent to their quality of life. The Subluxation Awareness program is an ongoing effort designed to bring enlightenment about this issue to a public that desperately needs this message. September is chosen as Subluxation Awareness Month to commemorate the first chiropractic adjustment given to specifically correct a subluxation on September 18, 1895. Subluxation Awareness is a nonprofit foundation that organizes events designed to educate the public about subluxations. Doctors, organizations, corporations and private individuals can participate in these programs which will consist of public education about the health consequences of vertebral subluxation. September of each year will be the main culmination of the Subluxation Awareness events. Chiropractic organizations can become sponsors and supporters of the program by a vote of their leadership. Participating organizations can contribute in the form of an official endorsement as well as press releases to their memberships recommending participation in the event. Organizations can also help coordinate local events in their regions. Corporations can become sponsors and supporters of the program in several ways and at several levels. Funding can be at various levels such as supporter, silver, gold, platinum. Corporate sponsors can also participate by creation of approved materials for inclusion into the kits that doctors are to purchase. Corporate sponsors are recognized on a website and allowed to use logos.
<urn:uuid:6b4a1e02-dde8-4ed5-aa17-b77532eb8e9d>
CC-MAIN-2021-17
https://www.subluxationawareness.org/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039476006.77/warc/CC-MAIN-20210420152755-20210420182755-00259.warc.gz
en
0.944707
342
2.53125
3
Money Lending and Settling Debts in and around Meran (South Tirol) in the 14th Century Recent studies of credit practices in (northwestern) Europe have shown that credit markets already existed in the medieval period in the towns and countryside. Little is known, however, about how these credit markets in large parts of medieval Europe allowed a reallocation of capital and how they actually worked. Market structures that helped to limit transaction costs were usually an exponent of the social structure, for example by regulating access to the market or protecting property rights. Thus, market structures – and the development of credit markets – differed from region to region. Exploring the practices of money lending in the Alpine region of South Tirol may offer new insights into the functioning of medieval capital markets. The registers (imbreviatura) of several Tirolian notaries (particularly 1390-1392), and records of provincial courts (eleich taidings; 1388-1391) are used in this paper to describe the credit market in Meran (South Tirol) and its hinterland in the 14th century. As will be shown, several social groups ranging from nobles to urban citizens and peasants from the countryside were engaged in the credit market. The analysis of the transactions documented by the notaries and the provincial courts provides a picture of a dynamic credit market that permeated not only Meran but also small towns in the countryside like Naturns, Partschins, Lana, Algund, Forst and Riffian. To further profile the 14th century credit market in South Tirol, a comparison is made between the debts recorded by notaries and the (defaulted) debts litigated before the provincial courts. To what extent did the clientele differ (social group, place of residence)? Was there a difference in their borrowing behaviour? Moreover, what economic mechanisms were used to guarantee repayment? Besides, it will be tested whether urban centres were a prerequisite for functioning credit markets. The general picture that emerges from the study is that different credit practices and institutions (written evidence provided by notaries, pawn broking, legal courts, practice of pledging) helped different social groups to gain access to the capital market.
<urn:uuid:66d48f37-e8c2-4ff7-a0fa-cb7fe8fa6ba0>
CC-MAIN-2023-23
https://majournals.bib.uni-mannheim.de/index.php/mwppeh/article/view/139
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00738.warc.gz
en
0.945557
469
2.609375
3
A new study by the Arizona State University suggests that this endangered animal is adapting remarkably well to climate change. Also known as “rock rabbit,” this cute little animal has long been considered one of the most endangered mammals in America, but a new study by the Arizona State University suggests that the American pika may be much tougher in the face of global warming. Treehugger reports that the author of the study, Emeritus Professor Andrew Smith, has studied pikas for more than 50 years and said that pikas are adapting remarkably well to climate change. “In an extensive review published in the Journal of Mammalogy, Smith offers evidence that populations of the American pika are healthy across their extensive range, which extends from British Columbia and Alberta, Canada to northern New Mexico. He found that populations in potential pika habitat in western North American mountains was high. He found no noticeable climate factor that played a part in the areas with and without pikas.” Although they prefer high-altitude alpine habitats, Professor Smith also discovered that pikas are able to survive even in hot, low-elevation sites, such as Bodie California State Historic Park, the Mono Craters, Craters of the Moon National Monument and Preserve, and Lava Beds National Monument — all of which have thriving pika populations. By studying pikas that successfully adapt to shifting global climate, let’s hope that researchers are able to find a way to help other species that still need a little push.
<urn:uuid:11495804-90df-4298-a02e-a78ec9747e30>
CC-MAIN-2024-10
https://greencitizen.com/news/american-pika-defies-climate-change/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473401.5/warc/CC-MAIN-20240221070402-20240221100402-00882.warc.gz
en
0.959818
318
3.78125
4
Mark Drakeford, Minister for Health and Social Services The Welsh Government is clear that child sexual exploitation is a crime, which requires co-ordinated action by all safeguarding partners. Tackling this form of child abuse is a priority for this government. In 2011, the Welsh Government published statutory guidance underpinned by a dedicated child sexual exploitation protocol within the All-Wales Child Protection Procedures. This approach ensures a standardised, multi-agency response whenever child sexual exploitation is identified, based around the application of the Sexual Exploitation Risk Assessment Framework (SERAF) tool developed by Barnardo’s Cymru. The Welsh Government has ensured that practitioners are equipped to apply this coherent framework through dedicated training to help identify children at risk, take steps to protect them and allow action to be taken against perpetrators. In December 2015, the Welsh Government published an education resource pack to help safeguard children and young people from sexual exploitation. It includes tools to help education practitioners to talk openly to children and young people about the dangers of sexual exploitation and risky behaviours that might put young people in harm’s way. A national training programme to support implementation is currently underway. All these actions ensure Wales has a coherent and consistent national approach to the delivery of safe outcomes for children. However, as our experiences and understanding of child sexual exploitation is further informed by evidence, we must ensure our leadership evolves and reflects the tools we have at hand to prevent and protect those at risk. The Welsh Government has led the production of the All-Wales National Action Plan to Tackle Child Sexual Exploitation. It has been produced in partnership with Wales’ police and crime commissioners, the Children’s Commissioner, police forces, the National Offender Management Service in Wales, the Youth Justice Board Cymru, Wales Community Rehabilitation Company, health boards, the Care and Social Services Inspectorate Wales, the third sector and local government. This is the first national action plan for Wales and provides a comprehensive framework through which the wide range of safeguarding partners can demonstrate co-ordinated cross-agency action to prevent and protect children from abuse and sexual exploitation. I have issued the national action plan today, recognising that safeguarding children boards have a critical role in providing oversight in tackling child sexual exploitation. The boards will report annually to the Welsh Government about their work across Wales in this important area. This work has highlighted the importance and availability of accurate and comparable data about the prevalence of child sexual exploitation in Wales. The Welsh Government has drawn on work undertaken by the Western Bay Safeguarding Children Board to develop and issue a common dataset and approach to collecting and reporting, which will provide an accurate and consistent reporting of child sexual exploitation across Wales. The robustness of the guidance and dataset will be tested this year as we review and analyse the outcomes of the work to inform the delivery of effective protection and prevention arrangements. The development of the national action plan does not mean work stops in this area. We will continue to work hard to protect our children and young people. Earlier this month, I announced appointments to the National Independent Safeguarding Board – the board will play an important role in ensuring we have the right policies and initiatives in place to safeguard children and adults across Wales. To tackle the crime of child sexual exploitation we must work together. The national action plan is available in the related links.
<urn:uuid:61e4679c-1945-4764-bbeb-4bd47ee7ee1e>
CC-MAIN-2022-33
https://gov.wales/written-statement-tackling-child-sexual-exploitation
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00013.warc.gz
en
0.929158
689
2.53125
3
A fairy (fey or fae; collectively wee folk, good folk, people of peace, among others) is a spirit or supernatural being, based on the fae of medieval Western European (Old French) folklore and romance. Even in folklore that uses the term "fairy," there are many definitions of what constitutes a fairy. Sometimes the term is used to describe any mystical creature of humanoid appearance, including goblins or gnomes, and at other times only to describe a specific type of more ethereal creature. Many folktales are told of fairies, and they appear as characters in stories from medieval tales of chivalry, to Victorian fairy tales, and up to the present day in modern literature. While many of these depictions are considered purely fictional, creatures such as fairies, somewhat like human beings but with abilities that transcend the physical realm, find correlates in the angels or other spiritual beings of many religions. When a belief in the afterlife and the realm of spirit are accepted, the existence of beings that have such "supernatural" abilities becomes possible. Thus, it may be that the origin of such creatures lies not so much in the desire of human beings to experience all that the physical world has to offer (as with many chimeras), but rather in fleeting experiences of creatures from the spiritual realm. Fairies are generally portrayed as humanoid in appearance and as having supernatural abilities such as the ability to fly, cast spells, and to influence or foresee the future. Although in modern culture they are often depicted as young, sometimes winged, females of small stature, they originally were depicted much differently: Tall, radiant, angelic beings or short, wizened trolls being some of the commonly mentioned. Even with these small fairies, however, their small size may be magically assumed rather than constant. Wings, while common in Victorian artwork of fairies, are very rare in the folklore; even very small fairies flew with magic, sometimes flying on ragwort stems or the backs of birds. The English word "fairy" is derived from the Old French faerie, which was derivative of the root fae (The English root form is fay). Originally, fae was the creature and faerie was the land of the fays. In modern times, both spellings, faerie and fairy, are commonly interchanged in English. Origin of fairies Because of the widespread account of fairies, and the differing versions of their nature, the exact origin of belief in fairies is unclear. There are numerous suggestions for both the cause of the tradition and the cultural stories of fairy origins. One theory for the source of fairy beliefs was that a race of diminutive people had once lived in the Celtic nations and British Isles, but had been driven into hiding by invading humans. They came to be seen as another race, or possibly spirits, and were believed to live in an Otherworld that was variously described as existing underground, in hidden hills (many of which were ancient burial mounds), or across the Western Sea. Some archaeologists attributed Elfland to small dwellings or underground chambers where diminutive people might have once lived. In popular folklore, flint arrowheads from the Stone Age were attributed to the fairies as "elf-shot." The fairies' fear of iron was attributed to the invaders having iron weapons, whereas the inhabitants had only flint and were therefore easily defeated in physical battle. Their green clothing and underground homes were credited to their need to hide and camouflage themselves from hostile humans, and their use of magic a necessary skill for combating those with superior weaponry. In Victorian beliefs of evolution, cannibalism among "ogres" was attributed to memories of more savage races, still practicing it alongside "superior" races that had abandoned it. Selkies, described in fairy tales as shape-shifting seal people, were attributed to memories of skin-clad "primitive" people traveling in kayaks. African pygmies were put forth as an example of a race that had previously existed over larger stretches of territory, but come to be scarce and semi-mythical with the passage of time and prominence of other tribes and races. From a cultural standpoint, there are many origins for fairies. One theory is that the fairies were originally worshiped as gods, but with the coming of Christianity, they lived on, in a dwindled state of power, in folk belief. Many beings who are described as deities in older tales are described as "fairies" in more recent writings. Victorian explanations of mythology, which accounted for all gods as metaphors for natural events that had come to be taken literally, explained them as metaphors for the night sky and stars. After the introduction of Christianity into Europe, there were those that believed fairies were at one time angels, who had either fallen from grace or were good, but not good enough to be allowed in Heaven. This belief became much more popular with the growth of Puritanism. The hobgoblin, once a friendly household spirit, became a wicked goblin. Dealing with fairies was in some cases considered a form of witchcraft and was punished as such. Some contributed fairies to a folkloric belief concerning the dead. This noted many common points of belief, such as the same legends being told of ghosts and fairies, the Sidhe mounds in actuality being burial mounds, it being dangerous to eat food in both Fairyland and Hades, and both the dead and fairies living underground. The banshee, with an Irish or Gaelic name that means simply, "fairy woman," is sometimes described as a ghost or as a harbinger of death. The Cauld Lad of Hylton, though described as a murdered boy, is also described as a household sprite, like a brownie. Another view held that they were an intelligent species, distinct from both humans and angels. The question as to the essential nature of fairies has been the topic of myths, stories, and scholarly papers for a very long time. Just as there are numerous variations in the origin of the creature, so to are there many variations on what fairies are. Below is a list of the most basic and popular variations of fairies. Fairies have often been noted for their mischief and malice. Some pranks ascribed to them, such as tangling the hair of sleepers into "Elf-locks," stealing small items, or leading a traveler astray, are generally harmless. But far more dangerous behaviors were also attributed to fairies. Any form of sudden death might stem from a fairy kidnapping, with the apparent corpse being a wooden stand-in with the appearance of the kidnapped person. Consumption (tuberculosis) was sometimes blamed on the fairies forcing young men and women to dance at revels every night, causing them to waste away from lack of rest. Fairies riding domestic animals, such as cows, could cause paralysis or mysterious illnesses. Due to belief in fairies as tricksters, a considerable lore developed regarding ways to protect oneself from their mischief: While many fairies will confuse travelers on the path, the will o' the wisp can be avoided by not following it. Certain locations, known to be haunts of fairies, are to be avoided. In particular, digging in fairy hills was unwise. Paths that the fairies travel are also wise to avoid. Home-owners have knocked corners from houses because the corner blocked the fairy path, and cottages have been built with the front and back doors in line, so that the owners could, in need, leave them both open and let the fairies troop through all night. It is often believed that pixies and brownies fall into this category. A common thread in folklore is that eating the fairy food would trap the captive, as Prosperina in Hades. This warning is often given to captives by other people in the fairies' power, who are often described as captives who had eaten and so could not be freed. Folklore differed about the state of the captives: Some held that they lived a merry life, others that they always pined for their old friends. Changelings are often associated with goblins, and some believe that goblins are in fact scared, disfigured fairies that have fallen from grace. The ethereal spirit is the most common depiction of fairies in contemporary times. Small, angelic beings that live in forests, posses magical abilities and wings, these types of fairies are often associated with nymphs. Such creatures are usually benign, if not playful and flirtatious. Often they are protectors of nature, are wise and helpful to humans, and sometimes are even sexually attracted to male humans. Not as popular as the other types, but still significant, is the belief that fairies represent elemental forces. The alchemist Paracelsus is credited with assigning certain creatures of folklore and legend as representations of elementals. Fairies were one such designation, representative of the ethereal and changeable. Corresponding to this, but in different ways, were such beings as gnomes and sylphs. A considerable amount of lore about fairies revolves about changelings, the theft of a human baby and the substitution of a fairy one or an enchanted piece of wood, and preventing a baby from being abducted. Older people could also be abducted; a woman who had just given birth and had yet to be churched was regarded as being in particular danger. Fairies appeared in medieval romances as one of the beings that a knight errant might encounter. A fairy lady appeared to Sir Launfal and demanded his love; like the fairy bride of ordinary folklore, she imposed a prohibition on him that in time he violated. Sir Orfeo's wife was carried off by the King of Faeries. Huon of Bordeaux is aided by King Oberon. These fairy characters dwindled in number as the medieval era progressed; the figures became wizards and enchantresses. Morgan Le Fey in Le Morte d'Arthur, whose connection to the realm of faerie is implied in her name, is a woman whose magic powers stem from study. While somewhat diminished with time, fairies never completely vanished from the tradition. Sir Gawain and the Green Knight is a late tale, but the Green Knight himself is an otherworldly being. Edmund Spenser featured fairies in The Faerie Queen. In many works of fiction, fairies are freely mixed with the nymphs and satyrs of classical tradition; while in others (such as Lamia), they were seen as displacing the Classical beings. The smaller but harmless sorts of fairies were used by William Shakespeare in A Midsummer's Night Dream, and Michael Drayton in his Nimphidia; from these stem Alexander Pope's sylphs of The Rape of the Lock, and eventually the Victorian flower fairies, with the fairies becoming prettier and smaller as time progressed. The précieuses took up the oral tradition of such tales to write fairy tales; Madame d'Aulnoy invented the term contes de fée ("fairy tale"). While the tales told by the précieuses included many fairies, they were less common in other countries' tales; indeed, the Brothers Grimm included fairies in their first edition, but decided this was not authentically German and altered the language in later editions, changing each "Fee" (fairy) to an enchantress or wise woman. Also, not all folktales that feature fairies are categorized as fairy tales. Fairies in literature took on new life with Romanticism. Writers such as Sir Walter Scott and James Hogg were inspired by folklore which featured fairies, such as the Border ballads. This era saw an increase in the popularity of collecting of fairy folklore, and an increase in the creation of original works with fairy characters. In Rudyard Kipling's Puck of Pook's Hill, Puck holds to scorn the moralizing fairies of other Victorian works.The period also saw a revival of older themes in fantasy literature, such as C.S. Lewis's Narnia books which, while featuring many such classical beings as fauns and dryads, mingles them freely with hags, giants, and other creatures of the folkloric fairy tradition. Fairies in art Fairies have been numerously illustrated in books of fairy tales and sometimes as standalone works of art and sculpture. Some artists known for their depictions of fairies include Alan Lee, Amy Brown, Arthur Rackham, Brian Froud, Cicely Mary Barker, Warwick Goble, Ida Rentoul Outhwaite, Myrea Pettit, Kylie InGold, Jessica Galbreth, David Delamare, Richard de Chazal in his Four Seasons series of photographs, and Josephine Wall. The Victorian era was particularly noted for fairy paintings. The Victorian painter Richard Dadd created paintings of fairy-folk with a sinister and malicious tone. Other Victorian artists who depicted fairies include John Atkinson Grimshaw, Joseph Noel Paton, John Anster Fitzgerald, and Daniel Maclise. Interest in fairy themed art enjoyed a brief renaissance following the publication of the Cottingley fairies photographs in 1917, a number of artists turned to painting fairy themes. The Cottingley fairies series of photographs were taken by two girls who originally claimed that they showed actual fairies but later admitted they were fakes, except possibly the fifth photo. Following in the footsteps of the Cottingley fairies and utilizing modern digital technology, fantasy photographers like artist J. Corsentino created a new sub-genre of "fairy photography." Fairies in modern culture and film Fairies are often depicted in books, stories, and movies. A number of these fairies are from adaptations of traditional tales. Perhaps some of the most well-known fairies were popularized by Walt Disney, including Tinkerbell, from the Peter Pan stories by J.M. Barrie. In Carlo Collodi's tale Pinocchio, a wooden boy receives the gift of real life from a "lovely maiden with azure hair," who was dubbed the "Blue Fairy" for Disney's adaptation. As would be expected, fairies appear in other media as well, including novels, video games, and music. A notable example is Susanna Clark's novel Jonathan Strange & Mr. Norrell, which revolved about two magicians with close connections to the fairy world; it won the Hugo Award for Best Novel. Clark drew heavily on British folklore for this work and her collection of short stories The Ladies of Grace Adieu, including retelling the story of Tom Tit Tot in her "On Lickerish Hill." - Dictionary.com, www.dictionary.com Fairy. Retrieved July 26, 2007. - Oxford English Dictionary (Oxford Press 1979). ISBN 019861117X - Carole B. Silver, Strange and Secret Peoples: Fairies and Victorian Consciousness (Oxford University Press 1999). ISBN 0195121006 - Jane Yolen, Touch Magic, p.49. ISBN 0-87483-591-7 - Brian Froud and Alan Lee, Faeries (New York, Peacock Press, 1978). ISBN 0-553-01159-6 - Katharine Mary Briggs, An Encyclopedia of Fairies (New York: Pantheon Books, 1976). ISBN 039473467X - Cottinglyconnect.org, Cottingley Fairies. Retrieved September 19, 2007. - Margaret Dean, The Faerie Chronicles. Retrieved February 19, 2007. - Susanna Clarke, The Ladies of Grace Adieu and Other Stories, p 62. ISBN 1-59691-251-0 - Briggs, Katharine Mary. 1976. An Encyclopedia of Fairies. New York: Pantheon Books. ISBN 039473467X - D.L. Ashliman. 2006. Fairy Lore: A Handbook. Greenwood. ISBN 0313333491 - Dubois, Pierre. 2000. The Great Encyclopedia Of Faeries. Simon and Schuster. ISBN 0684869578 - Eason, Cassandra. 2002. A Complete Guide to Faeries & Magical Beings: Explore the Mystical Realm of the Little People. Red Wheel/Weiser. ISBN 1578632676 - Evans-Wentz, W.Y. 2004. The Fairy-Faith in Celtic Countries. New Page Books. ISBN 978-1564147080 - Froud, Brian and Alan Lee. 1978. Faeries. New York: Peacock Press. ISBN 1862055580 - Henderson, L. and E.J. Cowan. 2001. Scottish Fairy Belief. Edinburgh. ISBN 1862321906 - Keightley, Thomas. 2000. The World Guide to Gnomes, Fairies, Elves & Other Little People. Gramercy. ISBN 0517263130 - Lewis, C. S. 1964. The Discarded Image: An Introduction to Medieval and Renaissance Literature. - Lysaght, Patricia. 1986. The Banshee: the Irish Supernatural Death Messenger. Glendale Press, Dublin. ISBN 0907606296 - Narvaez, Peter. 1991. The Good People, New Fairylore Essays. New York: Garland. ISBN 0813109396 - Pocs, Eva. 1989. Fairies and Witches at the Boundary of South-Eastern and Central Europe. FFC no 243. Helsinki. - Purkiss, Diane. 2000. Troublesome Things: A History of Fairies and Fairy Stories. Allen Lane. - Silver, Carole B. 1999. Strange and Secret Peoples: Fairies and Victorian Consciousness. Oxford University Press. ISBN 0195121006 - Tomkinson, John L. 2004. Haunted Greece: Nymphs, Vampires, and other Exotika. Anagnosis. ISBN 960-88087-0-7 Retrieved September 30, 2007. All links retrieved March 25, 2017. - Audio recording of a traditional fairy story from Newfoundland, Canada (streaming and downloadable formats) - The Faerie Chronicles New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here: The history of this article since it was imported to New World Encyclopedia: Note: Some restrictions may apply to use of individual images which are separately licensed.
<urn:uuid:17d00d7d-d763-4f05-ad1b-31c5da83bb9d>
CC-MAIN-2021-39
https://www.newworldencyclopedia.org/entry/Fairy
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057417.92/warc/CC-MAIN-20210923074537-20210923104537-00648.warc.gz
en
0.957242
3,890
2.84375
3
I and N are both unlikely in the general population. (1/4 for each.) Both are strongly selected for in computer programming. Programming also selects for T over F, but T is not rare in the general population. Therefore INT? is over-represented in programming. As an extrovert I'm painfully aware of how my personality and profession don't always get along... Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data! Read Where should I post X? if you're not absolutely sure you're posting in the right place. Please read these before you post! — Posts may use any of the Perl Monks Approved HTML tags: Outside of code tags, you may need to use entities for some characters: - a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr Link using PerlMonks shortcuts! What shortcuts can I use for linking? See Writeup Formatting Tips and other pages linked from there for more info. | & || & | | < || < | | > || > | | [ || [ | | ] || ] ||
<urn:uuid:b36c8f87-c957-4910-9cd5-8fe1e0127ade>
CC-MAIN-2014-52
http://www.perlmonks.org/index.pl/jacques?parent=833435;node_id=3333
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770718.139/warc/CC-MAIN-20141217075250-00155-ip-10-231-17-201.ec2.internal.warc.gz
en
0.843791
350
2.546875
3
Recreation can be defined as the refreshment of one’s head or human body by way of action that amuses or stimulates. Researches and findings have proven that recreational functions have wellbeing or mental positive aspects and support in the growth of psychological and social tendencies of folks. It could be passive or lively or a mix of the two. In passive functions, the person has fewer of a purpose to engage in in the system of recreation but instead engages in it partly without having any tension. Below the person is a beneficially of an action that is carried out by other individuals. Illustrations of passive recreation include things like taking pleasure in a track, seeing aerobics, seeing a football match in a stadium or looking through. This type of recreation rejuvenates and relieves pressure. On the other hand, if the person plays a big purpose in the action. Illustrations of lively recreation include things like playing ping pong, bicycling, working, brisk walking and playing basketball with buddies and kin. Benefits OF RECREATION one.Energetic which will involve physical functions will make an person fewer prone to obesity. two.Energetic functions are fantastic for elevating the heart price. three. It also allows to improve the immune technique. Researches present that positive improvements in the immune technique take place during reasonable workout. 4.It improves positive moods. 5.Recreation and leisure functions can support relieve despair. 6.Rest, peace and revitalization by way of recreation are vital in controlling tension in modern occupied and demanding entire world. seven.This kind of action is a medium in which members can attain particular everyday living pleasure. Acquire the work load off this holiday break time and get involved in these functions, the wellbeing positive aspects are gratifying.
<urn:uuid:a37c153c-6adc-4b96-9879-1fe61d3e02b7>
CC-MAIN-2022-49
https://www.treatyland.com/energetic-recreation-and-its-great-importance.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710898.93/warc/CC-MAIN-20221202050510-20221202080510-00845.warc.gz
en
0.93117
373
3.015625
3
Periodontal (gum) disease is an infection of the tissue that surrounds and supports the teeth. A leading cause of tooth loss, it is most often caused by a buildup of plaque on the teeth. Plaque is a sticky film of bacteria that can be brushed and flossed away with proper oral care. However, when left on the teeth, plaque produces toxins that attack below the gum line and in the crevices between the teeth and gums, causing the bond between teeth and gums to break down. In the early stage of gum disease, a condition known as gingivitis, in which gums may become red, swollen and bleed easily, can occur. In the more advanced stages of periodontal disease, teeth can loosen and even fall out. Good oral hygiene and regular dental examinations are essential in the prevention and early detection of gum disease.
<urn:uuid:e98d7229-3fa9-42c8-97ea-703a59abe001>
CC-MAIN-2020-40
https://www.priestdental.com/dental-procedures/periodontal-disease/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400219691.59/warc/CC-MAIN-20200924163714-20200924193714-00537.warc.gz
en
0.960138
179
3.734375
4
Rievaulx Abbey & Terraces We had just visited Helmsley Castle in North Yorkshire and decided to take a little drive and saw a sign for Rievaulx Abbey (pronounced ree-vo). So we took the turn and drove through this incredible wooded dale. Coming out of the woods, we felt like we had stumbled into ancient Briton. The views from the top of the hill were striking and rising up behind the thatched cottages was the immense ruin of Rievaulx Abbey. Rievaulx Abbey loomed over this tiny village, whose population stands at around 100. The Abbey itself was closed and destroyed when Henry the VIII dissolved the monasteries. The Earl of Rutland who carried on with the iron-smelting works that the monks had started purchased the grounds. The History of Rievaulx Abbey After WWII, the smelting works closed and the village became more agricultural. Many of the buildings, which had used the stones from Rievaulx Abbey to build, remain such as the old Watermill. The Miller’s Cottage is still standing and almost all the buildings in the village were built with materials scavenged from the ruin of the Abbey. Rievaulx was a Cistercian abbey and one of the greatest Abbeys in England until Henry VIII seized it. English Heritage manages the current ruin. It is often used as a filming location and was used in the film Transformers: The Last Knight (2017). The Abbey lies in the open area from the dale by the River Rye. Apparently, the monks diverted part of the river in order to have enough flat land to build on. Over the years, they diverted the river again in order to build up their profitable lead and iron mining concerns. The monks also reared sheep here and sold their wool to buyers all over Europe. This allowed Rievaulx Abbey to become one of the wealthiest in England, housing over 140 monks and many more lay brothers. The power of this wealth gave them over 6,000 acres of land and they established daughter houses in Scotland and England. However, by the end of the 13th century, Rievaulx Abbey had incurred massive debts for the building of the Abbey and had lost a lot of their wealth due to animal epidemics that affected their sheep. Scottish Revers also raided the Abbey in the early 14th century and then the Black Death decimated the ranks of the monks and lay brothers. By the 15th century, the Cistercian practices of strict observance according to the Rule of Saint Benedict had been abandoned in favour of a more lavish lifestyle. The monks were allowed to eat meat and better accommodations were built for them to live in. The Abbot himself took on a more luxurious household and made sure he was treated extremely well. The dissolution came in 1538, the confiscated buildings were sacked and ruined, and the proceeds put into Henry VIII’s coffers. The ruined buildings and land were given to the Earl of Rutland who was one of Henry’s advisors and then in later years passed to the Duncombe family. Rievaulx Abbey is in ruins but this is an idyllic part of the North Yorkshire countryside. The ruins are incredibly atmospheric and even though it was raining, it was more of a mist making the walk through this immense sight a step back in time. Visiting Rievaulx Abbey There is a lovely walk from Helmsley Castle to Rievaulx Abbey that follows in the footsteps of Saint Aelred who was one of the county’s most famous abbots. Inside the visitors’ centre is a great little gift shop and you can buy a pass to all the English Heritage sites. The indoor museum features artefacts, which tell the story of the Monks at Rievaulx Abbey along with the drama of the dissolution and how they managed to become the richest Abbey in England through their mining and smelting operations. The site does have some really good audio tours and the site is accessible for the most part. The paths are loose gravel and there are some steps into and around various enclosures. There is also a small rise or hill throughout the site, but there is no doubt that those with mobility issues can enjoy Rievaulx from a wheelchair. There is a little cafe in the Visitors centre that serves light meals and soup or enjoys a coffee and a scone while taking in the view through the picture window. The cost of touring the Abbey is Adult £8.90. Child £5.30. Family £25.50, and if you visit English Heritage’s Facebook page you can save 20% off the membership fee. You can also take time to visit Rievaulx Terrace which was part of the Duncombe Lands. The Earl had created beautiful garden terraces on the land with sweeping views. When the Earl died his estate was inherited eventually by his nephew Thomas. When Thomas returned to Rievaulx in 1747 he decided to develop the Terrace even further and of course to outdo his father’s more formal terrace and temples at Duncombe Park a few miles away. At Rievaulx Terrace the two main features are Palladian follies that stand at either end. At the north end, you will see a rectangular Ionic Temple which was inspired by the Fortuna Virilis that Thomas had seen in Rome. This would have been a place where Thomas entertained his guests and dined al fresco and the central table is still set for a meal. The basement of the Temple housed a kitchen and living quarters but today it hosts an exhibition of English landscape design. At the South end of the Terrace is a Doric or Tuscan Temple complete with medieval tiled floors and painted ceilings. This temple is thought to be a small scale version of the mausoleum at Castle Howard which stands a few miles away. The pavement on the floor of this temple came from the choir of Rievaulx Abbey. Standard entry fee to the terraces is £6.25 and please note that this fee is separate from the fee to visit Rievaulx Abbey although if you purchase an English Heritage card it will cover the cost of these entry fees and a lot more. Visiting Yorkshire and the many historic places should be on everyone’s bucket list. The oldest medieval street in the world the Shambles is in York and makes a fascinating walk through time. If you go further to West Yorkshire you can tour the home of the Brontes who lived and wrote in Haworth or see Anne Brontes grave in Scarborough. Visiting York itself and enjoying the range of historic sites from Castles to the Shambles, take a Hop on Hop off bus and from there you can suss out all the sites you want to head back to. One thing we loved about Yorkshire was the market towns and villages. Usually set up in the centre of the village market days meant that we could pick up some superb Yorkshire baking from pies to cheese straws. At these market villages not only can you get your fresh veg but new underwear if need be. North Yorkshire has an array of sacred sites and Rievaulx Abbey is only one of them. Have you visited any other ruined abbeys or churches in Yorkshire?
<urn:uuid:2ff2153e-a3bc-4807-9d98-db17bd9f8de7>
CC-MAIN-2020-40
https://xyuandbeyond.com/rievaulx-abbey/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400221382.33/warc/CC-MAIN-20200924230319-20200925020319-00197.warc.gz
en
0.979199
1,523
2.625
3
Facing the New Challenges – The New Lingo TRANSCEND MEMBERS, 6 Jul 2020 1 Jul 2020 – The world has been colonised and ruled by several powers — Portugal, Spain, England, France, etc. over the last several centuries. Others who have ruled over smaller regions of the world are people from Netherlands, Iran, Arabia and the kingdoms from Turkey and Mid East regions. India has been ruled earlier by the Mughal kingdoms, then by Portugal, France (in small regions) and finally by England virtually over the entire Indian peninsula comprising today’s India, Pakistan, Bangladesh, Burma. The major colonial powers deeply influenced the peoples of the countries they overcame in terms of not only culture and language, but religion, education and introduction of industry and technology (trains, weaving machines) so as to have a firmer grip over the peoples. This is as truer for Australia, New Zealand as for South America and several parts of Africa and Asia. In my essay, I wish to focus on the linguistic aspect of colonialism. This is abundantly manifest in Australia and New Zealand where the traditional languages of the local people have been completely destroyed except for one tribal language Maori that has survived the linguistic onslaught, in New Zealand. South Africa has also seen this transformation where the local languages and cultures have all but disappeared. In North West Africa, one can see the French domination over the Arabic and a few local languages. South Africa is all Spanish speaking except for Brazil (Portuguese language) and a few smaller countries that have English or French speakers — at the expense of different local languages. The Indian subcontinent had scores of traditional languages. Fortunately, despite the dominant English and earlier Persian, several languages have not only survived but are doing well in terms of speakers and their literature. These include, apart from the classical Sanskrit and Tamil languages, Hindi, Bengali, Marathi, Assamese, Telegu, Malayam and several smaller languages. Of course many tribal and smaller languages have become extinct. The number of Hindi speakers is estimated to be fifth largest worldwide after Mandarin Chinese, English, Spanish and French. Similarly, traditional languages in Sri Lanka, Thailand, Malaysia, Cambodia, Vietnam, Indonesia etc are doing well. Of course, China is strong politically, economically and linguistically. The dominance of English in the world is now accentuated not only by USA but also due to the emergence of computers and internet, whether it is software, digital applications in banking, trade and in other spheres — even military. The new basis of operations is related to this medium of internet and no one is free from the various applications in newspapers, TV, social media, Instagram, mobile phones and the dominance of various apps in our lives. In fact the mobile phones that house these apps have become so powerful, that they are usually referred to as Smartphones. Many people use these hand held smartphones for different purposes — reading newspapers, sending messages and pictures, transmitting and receiving money and for varied other reasons. During the current COVID 19 pandemic, with educational institutions shut for several months, the application of these phones and laptops has dramatically increased for conducting online classes for School and College students. Even online examinations have been conducted reasonably successfully. Certain institutions that had regular Conferences or meetings or training workshops, where participants would come physically, have switched to Online Seminars popularly called Webinars where all operations are now conducted over internet and laptops and smartphones. Inevitably a new lingo (if I may use this expression), has emerged in the English speaking world to describe the large scale changes taking place in our lives. For example, smartphones are sometimes called smarties. A journalist becomes journo. Hospitals, restaurants, celebrities have been shortened to hospice, resto celebs, etc. A President becomes Prez, Vice President is known as veep, a defence minister becomes defmin and so on. What is preggie — pregnant woman. Interesting! Related to Hollywood, the Bombay Hindi film industry has become Bollywood and so on. Gennext, Fab are easy to understand for people who know English. But it creates confusion and diffidence in people who don’t know English language well. As a matter of fact, some egos egotistical people, deliberately use this new lingo to show how smart they are and to show the ordinary person his place in the pecking order. Is this a desirable trend? Recently an article appeared in the English newspapers informing how certain billionaires in the world — FB inventor Mark Zuckerberg, Tesla’s Elon Musk, Asia’s richest man Mukesh Ambani of India and a few others have all increased their wealth even during the current pandemic. This trend of inequality in society is visible not only in business, but also socially, politically and as seen above linguistically. These elites care little for other people or the environment and society at large. They exploit the planet’s resources mercilessly, inflicting a terrible cost on our planet that is leading to climate change and global warming. Only a sustained effort at reducing this adverse impact on the planet can now save gennext peoples of the world. As Mahatma Gandhi had written a century back, there is enough for peoples’ needs but not enough for their greed. Om Shanti, Hare Krishna Dr Ravi P Bhatia is a member of the TRANSCEND Network for Peace Development Environment, an educationist, Gandhian scholar and peace researcher. Retired professor, Delhi University. His new book, A Garland of Ideas—Gandhian, Religious, Educational, Environmental was published recently in Delhi. email@example.com This article originally appeared on Transcend Media Service (TMS) on 6 Jul 2020. Anticopyright: Editorials and articles originated on TMS may be freely reprinted, disseminated, translated and used as background material, provided an acknowledgement and link to the source, TMS: Facing the New Challenges – The New Lingo, is included. Thank you. This work is licensed under a CC BY-NC 4.0 License. Click here to go to the current weekly digest or pick another article:
<urn:uuid:16b5646c-8780-4425-b6ab-28d4fb50991e>
CC-MAIN-2024-10
https://www.transcend.org/tms/2020/07/facing-the-new-challenges-the-new-lingo/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00094.warc.gz
en
0.953857
1,280
2.734375
3
Egyptian statue spins all by itself at Manchester Museum - From: news.com.au - June 24, 2013 MUSEUM bosses are spooked after time lapse video showed an ancient Egyptian statue turning in circles in a display case. The 25cm relic of a man named Neb-Senu, dating back to 1800BC has been in the Manchester Museum for 80 years. It was found in a mummy's tomb and contains an inscription that asks for "bread, beer and beef." Over the past few months curators noticed the statue was often facing the wrong way. But they say no-one has access to the display case. So they set up a time lapse video. What they discovered is truly freaky. The statue is turning 180 degrees without anyone going near it. "I noticed one day that it had turned around. I thought it was strange because it is in a case and I am the only one who has a key, Manchester Museum curator Campbell Price told the Manchester Evening News. "I put it back but then the next day it had moved again. We set up a time-lapse video and, although the naked eye can't see it, you can clearly see it rotate on the film. The statuette is something that used to go in the tomb along with the mummy. "In Ancient Egypt they believed that if the mummy is destroyed then the statuette can act as an alternative vessel for the spirit. Maybe that is what is causing the movement." Other experts suggest the statue may be turning due to visitors footsteps. But the question then is - why this statue turns and the other statues stand still? What do you think? Curse, footsteps or museum trickery? Tell us below.
<urn:uuid:0b4d406b-6034-48bb-988c-a8013b20962f>
CC-MAIN-2014-10
http://www.news.com.au/travel/world-travel/egyptian-statue-spins-all-by-itself-at-manchester-museum/story-e6frfqai-1226668543848
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999650477/warc/CC-MAIN-20140305060730-00033-ip-10-183-142-35.ec2.internal.warc.gz
en
0.9685
357
2.609375
3
A Duck Story A boy and a duck grow up together.By Sandra Miller After Morgan Hobson's Forbush Elementary kindergarten class in 2002 hatched some duck eggs in an incubator, his parents, Mark and Melissa Hobson, let him choose two ducks to take care of until they were large enough to release on their Yadkin County pond. At that point, 5-year-old Mo didn't know what kind of ducks they were or their gender. But he chose two and named them Donald and Daisy. He could tell them apart by their toenails: Donald's were orange and Daisy's were black. Mark used chicken wire to construct a 10-by-10-foot lot and attached it to their barn. He added a small pool for the ducks to swim in. After he tended the ducks for a couple of weeks in a box in the basement, Mo moved Donald and Daisy to their new home that now included an old window air conditioner case as a shelter. Every day Mo fed them duck food, grass and small bugs and let them out to play. The three of them bonded and became great subjects for Melissa's photography hobby. Mo taught the ducks to play soccer — his favorite sport — by rolling the ball between them while the ducks lunged for it and pushed the ball around the yard. Mo knew it would be hard to let them go, but that was the plan from the start: nurture them until they were big enough to release. Eventually, Mo's choice for names fit. Donald became a beautiful male mallard and Daisy a female mallard, but with some peculiarities. "Daisy can't fly high like Donald," Mo told his parents one day. Some of her wing feathers were growing straight up. But the two ducks were definitely mates because, as Mo recalls, "Daisy would get very loud and upset until I left Donald alone, and she didn't like for Donald to be very far from her sight." Daisy laid a few eggs but only one hatched, and the duckling died. When the time came for their release, the ducks followed Mo to the pond. He gathered Donald into his arms one last time while Daisy watched, quacking hard. Mo tossed him out over the water, then tossed Daisy out there, too. But Donald flew back and Daisy paddled right back to the bank. Mo tried to ignore them and walked up the hill toward home, thinking they'd eventually realize they were free. But Donald and Daisy would not be separated from their friend who had taken such good care of them. They returned to the only home they'd known. Mo tried several times to convince them they'd be happier on their own, but to his delight, they would have none of it. One morning, Mo discovered Daisy missing. Something had dug under the wire, and there was no trace of her. But Donald is still strong and playful 11 years later, and he loves to have fresh water in his pool each day. Mo is now a junior at Forbush High School, playing on the varsity soccer team, running track, and thinking about college. But he still cares for Donald, faithfully cleaning his lot with a hose, feeding him, letting him out to play in the yard. His advice for anyone wanting ducks for pets: "Keep them in a good, safe environment, and if they want to be free, let them, but also let them get used to the environment first, to see if they can handle it." Ask Mo if he thinks Donald misses Daisy: "He misses her. But he's happy to be free of the nagging."
<urn:uuid:d407e337-5b11-4a37-98ac-9dd0c2935fa1>
CC-MAIN-2018-39
https://www.carolinacountry.com/issues/2013/departments/feature-story/a-duck-story
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160842.79/warc/CC-MAIN-20180924224739-20180925005139-00526.warc.gz
en
0.991018
736
2.765625
3
Fire suppression is something we're very good at because we've been doing it for a long time and spent a lot of money on it. In fact, we've become too good at it. In the last several years, as we go into the woods, we've seen the results of putting out as many fires as we could. The fuel buildup out there is huge, and it makes our jobs a lot harder. There's a lot more that can burn, so fires can get a lot hotter. Plus it's that much harder for us to get around. When you look at old pictures and maps, you see how the ponderosa stands used to be a lot more open and park-like. In that kind of an area, you don't often even need to dig a fire line. It's easy to walk through and put out burning snags. But in the heavy understory that's grown up in a lot of places due to fire suppression you have to clear a big opening to try to stop the fire. In general it's a lot easier and cheaper to stop a fire when it's small. If it takes off, the suppression effort can cost millions of dollars, and can be pretty ecologically damaging. In areas where people have built houses in the woods, we don't have much choice -- we have to try to put the fires out even if it might be better for the habitat to let it burn. Of course we have to stay safe. We can't always save private property, especially if the weather turns against us. The smokejumpers tend to be dropped into the higher elevations or wilderness areas where there aren't any roads. One thing we see sometimes are habitats that used to be ponderosa pine that have been converted into lodgepole pine habitat because now there are no low-intensity fires to maintain the ponderosa parks. Lodgepole pine, on the other hand, needs a hot fire to clean things out and start over. So if there is a big fire, they're what come back in. We use a ground crew working with hand tools, chain saws, and water pumps for most small fires. If the flame lengths exceed a certain height, then we'll call in air support to drop water or retardant on the fire. That helps knock it down enough that we can work on it from the ground. When a fire gets really big, then we may have to bring in bulldozers to help dig a line in a spot we can defend. We like to work at night when possible because the fire is generally calmer. But at times it can also be more dangerous than daytime because you can't see snags and rolling rocks as well. We're getting a lot more involved in the prescribed burning programs, too. It's good training for us to get to work with fire in a more controlled situation. Here are some of the types of crews and equipment we can use in fire suppression: Dozer Crew - Any tracked vehicle with a blade for exposing mineral soil, with transportation and personnel for its operation. Engine - Any ground vehicle providing specified levels of pumping, water, hose capacity, but with less than the specified level of personnel. Hand Crew - A number of individuals that have been organized and trained and are supervised principally for operational assignments on an incident. Hotshot Crew - A highly trained firefighting crew used primarily in hand line construction. Smokejumper - A firefighter who travels to fires by aircraft and parachute. Helirappeller - A firefighter equipped and trained to rappel from a helicopter to fight fire in areas where helicopters cannot land. Helitack - Fire suppression using helicopters and trained airborne teams to achieve control of wildfires. Air Tanker - Any fixed wing Aircraft certified by FAA as being capable of transporting and delivering fire retardant solutions. Fire Retardant - Any substance except plain water that by chemical or physical action reduces flammability of fuels or slows their rate of combustion.
<urn:uuid:08b87c53-11ba-4db1-b764-49e9748e8905>
CC-MAIN-2014-35
http://www.fs.fed.us/rm/fire_game/game/topics/suppression.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919886.18/warc/CC-MAIN-20140909051435-00283-ip-10-180-136-8.ec2.internal.warc.gz
en
0.952414
810
2.9375
3
What Is Ulcerative Colitis? Ulcerative colitis is an inflammatory bowel disorder that affects the large intestine and rectum, causing bleeding. This chronic condition impacts more than 900,000 Americans. It can begin at any age, but it often starts in young adulthood. Older men are more likely to be diagnosed than older women. There is no cure for ulcerative colitis, but with treatment, the majority of patients can be symptom-free for long periods of time.
<urn:uuid:4c84f434-32a4-4c40-92af-bbfb23216d5d>
CC-MAIN-2022-27
https://www.nm.org/conditions-and-care-areas/gastroenterology/ulcerative-colitis
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104215790.65/warc/CC-MAIN-20220703043548-20220703073548-00786.warc.gz
en
0.924878
102
3.09375
3
The agriculture sector in Iran has been viewed as a fundamental contributor to the economy of the country. Currently, agriculture furnishes 25 percent of Iran?s GNP, 27 percent of employment and 85 percent of food demand satisfaction, as well as a large capacity for export of several agricultural and horticultural commodities. Iran enjoys specific geographical conditions such as benefiting from approximately 250 sunny days per year, the possibility of orchard establishment at an altitude of even 2600 m above sea level, the capacity for cultivation of more than 400 agricultural and horticultural crops throughout the country, and dramatic climate diversity. As a whole, these features make it possible to produce high quality of various agricultural and horticultural commodities. In order to strengthen and improve agriculture industry and universities involved with teaching and research in agriculture, College of Agriculture was established at Tarbiat Modares University (T.M.U.) in 1983. The primary objective was to train and educate graduate students at M.Sc. and Ph.D. level for work as professionals in the universities and research institutes as well as in the private sectors. A wide range of scientific courses are offered for postgraduate students. Specialized seminars guided by faculty members help students focus their research in areas related to their interest as well as solving agricultural challenges at the national and global scale. They will become highly qualified specialists in practical application of agriculture and be able to conduct research and teaching at different universities in Iran after graduation.
<urn:uuid:5301971e-df7e-4372-8a16-d9c12fefc0cf>
CC-MAIN-2018-51
http://mrc.modares.ac.ir/en-agr
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825123.5/warc/CC-MAIN-20181214001053-20181214022553-00368.warc.gz
en
0.968795
293
2.515625
3
Professor Joanna Haigh CBE FRS Joanna Haigh studies the influence of the Sun on the Earth’s climate. Energy emitted by the Sun — in the form of heat, light and ultraviolet radiation — warms the Earth and drives its climate. Using data from satellites and modelling the processes, Joanna is helping to untangle the warming effects of greenhouse gases from those of natural variations in solar energy. She has transformed our ability to predict the behaviour of the atmosphere and climate by integrating ideas from physics to produce computationally fast yet accurate models. Methods developed by Joanna are now used by researchers worldwide and incorporate the finest details of climate processes and solar influence. Joanna has received major prizes for her work on solar influences on climate, including the Chree Medal and Prize of the Institute of Physics in 2004 and the Adrian Gill Prize of the Royal Meteorological Society in 2010. She was the President of the Royal Meteorological Society from 2012–2014. In 2013, she was awarded a CBE for services to physics. Co-Director, Grantham Research Institute for Climate Change, Imperial College London Professor of Atmospheric Physics, Blackett Laboratory, Imperial College London UK Rep, International Association of Meteorology and Atmospheric Sciences (IAMAS) Interest and expertise - Earth and environmental sciences - Atmospheric physics and meteorology, Climate sciences Greenhouse effect, Radiative forcing of climate change, Solar variability and climate, Radiative-dynamical coupling in the atmosphere
<urn:uuid:1939742c-8903-426f-8cf7-18e2c7a68a79>
CC-MAIN-2020-16
https://royalsociety.org/people/joanna-haigh-11560/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371807538.83/warc/CC-MAIN-20200408010207-20200408040707-00540.warc.gz
en
0.890596
306
2.53125
3
The COVID-19 pandemic presently sweeping the world exposes the continuation of centuries-old, deeply entrenched racial inequities that are embedded in the very fabric of the United States and the world. NCBL’s mission is the dismantling of this structural racism by serving as the Legal Arm of the Black Liberation Movement. This pandemic has underscored the need for the United States’ federal, state and local governments to divest resources from institutions and programs that do harm to the well-being of those in Black and Brown communities and invest in institutions and programs that enhance the well-being of Black and Brown communities. For 51 years, NCBL has been an active participant in ending the targeting of Black people by the criminal punishment system, and providing legal support to efforts seeking fair and equal opportunities in education and employment, as well as other aspects of social, political and economic justice. NCBL has also been on the frontline to defend and support African and African-descendant people in the Caribbean, Latin America and Africa in their efforts to end repressive regimes. NCBL has also been a leader in supporting those governments that have as their focus protecting the human rights of those they govern, including Grenada, where NCBL actively supported of the New Jewel Movement led by Maurice Bishop, and South Africa, where our second national Director served as an attorney for President Mandela and the African National Congress. NCBL, therefore, allies itself with those groups and individuals that recognize structural racism as the reason for the racially disparate effects of the COVID-19 pandemic in the United States, as well as the government’s disdain for international efforts to address the pandemic. There is some data on the racial impact of the virus, revealing a significant disparate effect on Black and Brown communities. This data supports the conclusion of a nation-wide racially disparate impact. According to an April 10, 2020 Buzzfeed article 1 the racial disparities in deaths from COVID-19 are startling. A few examples make the point. Blacks comprise 14% of the Michigan population, yet represent 52% of its COVID-19 deaths. Blacks are 14% of the Illinois population, yet represent 46% of its COVID-19 deaths. Blacks comprise 32% of the Louisiana population, yet represent 70% of its COVID-19 deaths. Blacks comprise 27% of the South Carolina population, yet represent 53% of its COVID-19 deaths. Some noted city disparities include Chicago where Blacks are 30% of the population and 70% of the COVID-19 deaths; Milwaukee County where Blacks comprise 26% of the population and 66% of the deaths; and, Philadelphia where Blacks comprise 42% of the population and 61% of the deaths. These disparities result from deeply embedded racial inequities in the essential components of human well- being including adequate health care, availability of healthy food, code-compliant housing, and equal access to meaningful, skilled employment. Indeed, many Black and Brown people do not have easy access to soap and running water and thus are unable to follow the top recommendation from health experts to decrease the possibility of infection – to wash their hands frequently with soap. A few significant examples include the unhoused, those in code noncompliant housing and those living in thousands of homes in Detroit who have been subject to water shutoffs due to inability to pay water bills. Black and Brown people disproportionately work in jobs that cannot be done remotely, are disproportionately represented in essential worker jobs that expose them to others, often without the necessary personal protective equipment, and are disproportionately confined to overcrowded prisons and jails that serve as a virtual petri dish for the spread of viruses 2. The United States’ international response to the pandemic also implicates racial inequities. In April, the President of the United States announced the United States would be suspending financial support for the World Health Organization (WHO) pending a review of the organization’s activities related to the COVID-19 pandemic. The United States is WHO’s largest financial contributor. ICE has deported large numbers of Haitian immigrants as this pandemic rages worldwide with no concern for whether they are infected with the virus. And, United States corporations have interrupted the flow of Personal Protective Equipment (PPE) to Africa and Latin America. These are only a few examples of U.S. international and immigration policies that undermine efforts to end this world-wide pandemic. We join with others, including Congressional members and health advocacy organizations, in calling for the collection, analysis and reporting of data by race on COVID-19 by state and federal health agencies. This data is essential to unmasking the places where structural racism exists, increasing the vulnerability of Black and Brown people. The call should extend to employers, state and federal punishment systems and the Department of Immigration and Customs Enforcement (ICE), documenting those who have tested positive for COVID-19, those who are symptomatic and those who have died. The state and federal governments should commit to weekly reporting of this data until the leading health organizations and institutions, including the American Public Health Association, the American Medical Association, the Centers for Disease Control, the National Medical Association and Meharry Medical College, that has one of the leading immunologists on its faculty, indicate the pandemic is over. NCBL supports the efforts of organizers, activists and litigators to protect those most vulnerable to contracting COVID-19, who are disproportionately Black and Brown: those supporting essential workers who must go to work and are often not provided the personal protective equipment needed; those imprisoned in the jails, penitentiaries, and immigration and juvenile detention facilities throughout the country; those in nursing homes; and, the unhoused, who are living on the streets. The coronavirus pandemic has stripped the illusion under which some have labored that there is no longer a need for the Movement for Black Liberation. This pandemic has shown that the racist systems that were developed to enslave African people and to colonize Africa, and that continued and were legally supported through Jim Crow, have been entrenched in the United States and perhaps worldwide, as structural racism – no longer needing or relying upon “bad actors,” although there are some that can be identified. NCBL calls on government actors to immediately direct resources to the most vulnerable Black and Brown communities in the United States to aid the health centers and hospitals in testing and treating those diagnosed with COVID-19. We call upon government actors to recommit to funding WHO and to stop corporate actors from intervening in the provision of personal protective equipment to Africa and Latin America. Finally, given the United States historic and present-day role in the creation and maintenance of structural racism, we call on the government to dedicate significant resources to dismantling it. The dismantling would include divesting from punishment systems that have targeted Black and Brown people virtually from these systems’ inception resulting in the prison industrial complex or what some now call mass incarceration. Government must instead invest in the institutions and programs developed and led by Black and Brown communities to heal the systemic injuries that flow from structural racism in all areas of life, enabling these communities to thrive. - Why The Coronavirus Is Killing Black Americans At Outsize Rates Across The US – BuzzFeed News - For example, on April 2020 it was reported that in one prison in Arkansas 650 prisoners and staff tested positive for COVID-19.
<urn:uuid:a84df15a-62c1-4ea8-8de9-7825a1290168>
CC-MAIN-2021-39
https://ibw21.org/initiative-posts/bfs-posts/coronavirus-covid-19-and-the-movement-for-black-liberation/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056711.62/warc/CC-MAIN-20210919035453-20210919065453-00340.warc.gz
en
0.961113
1,495
3.078125
3
Journey Through Time/Grand Canyon Geology The South Rim of Grand Canyon marks the northern edge of a high plateau whose gray-green forests stand out in vivid contrast to the arid lands below the rim. From here the cliffs of Grand Canyon drop 5,000 feet/1,500 meters to the Colorado River, crossing several biotic zones.Nowhere on this planet are the scope of geologic time and the power of geologic processes as superbly and beautifully exposed as in these canyon walls. Civilian Conservation Corps Walking Tour Severe economic depression challenged the confidence of the people of the United States. One in four people were unemployed. Many were homeless. The Civilian Conservation Corps was created in 1933 to put young men to work on worthwhile conservation projects. At Grand Canyon the CCC built roads, trails, walls, shelters and much of the infrastructure that still is in use today.The walking tour travels a circular route in the Historic District of Grand Canyon Village of approximately 1.5 miles (2.4 km), although you can begin at any point and walk as much of the loop as you wish. From ancient nomadic hunters to today’s visitors, human experience has shaped Desert View’s cultural landscape.A short ¼-mile (½-km) walk leads from the parking area, past historic buildings, to the rim. From Desert View Point you can see the Colorado River make a big bend to the west. Climb the stairs to the top of the watchtower for outstanding views of the canyon. Welcome to Tusayan Pueblo Ruin at Desert View. (South Rim) People have lived on the Colorado Plateau for thousands of years. The Paleo-Indians, nomadic hunter/gatherers who lived here 5,000-10,000 years ago, left the earliest evidence. With the introduction of agriculture about 2000 years ago, villages (pueblos) like this one developed.
<urn:uuid:06c539c4-6832-4e5b-977a-d89b6a83c5d8>
CC-MAIN-2017-22
http://www.grandcanyoncvb.org/about-grand-canyon/brochures
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608648.25/warc/CC-MAIN-20170526071051-20170526091051-00287.warc.gz
en
0.932181
396
3.65625
4
Introduction to sociology/race and ethnicity on the rise in the united states this chapter on race and ethnicity the census definition of race and to. Nationality, race, and ethnicity in nationality, race, and ethnicity in the united states (3): constructed and persuasive historical interpretation in an essay. 2010 census shows america's diversity and proportionally the largest major race and ethnic group in the united states, data on race and ethnicity. Race and ethnicity in the united states still in the 2000 census 24% of the population classified with two or more essay about race and ethnicity in. Compare and contrast essay essays race and ethnicity in the united states census list list qualities of each and then highlight shared qualities cats 2. Aging & culture, race & ethnicity research paper starter aging & culture, race & ethnicity (research starters according to the united states census bureau,. This course is a general introduction to the sociology of race and ethnicity among “mixed-race/ethnic” persons in the united states essay exam #2 due. Why are these concepts important to united states society race is usually census plays a big role our ethnicity/race is what race and ethnicity essay. Race and ethnicity in the us the united states census bureau also which the census considers separately from race while many see race and ethnicity as. Ethnicity vs race very few of us accurately describe the difference between ethnicity and race, simply because we tend to lump them into the same definition while. In the essay “the cult of ethnicity” the tone is the united states of america sought that the resolution to its both ethnicity and race are social. The mass media in the united states is a powerful socialization the census confuses race more about reflection on ethnicity essay race and. This essay defining race and ethnicity and other in the united states, define the relationship between ethnicity, census and identity formation race. Introductory essay issues of race and ethnicity dominate the racial and ethnic diversity in the united states and is how ethnicity, race,. The truth about race and ethnicity 2 race and ethnicity in the united states census so they haven’t found a real definition for race ethnicity is. Reconsidering race and ethnicity: united states—in context 1790 census—free white males & females, other persons ( inc free blacks. Free essay: race, ethnicity, and prejudice-online project at one point in time the us census defined someone as a negro if they were. Free essay: ethnicity is educational institution effects on race and cultural framework of the united states is well maintained 2000 census data. Ian f haney-lópez,race, ethnicity, erasure: the salience of race to census: the total as members of the spanish race see luco v united states, 64 us. Topics: us census, race and ethnicity 11 states that have the death penalty haven’t used it in more than a decade middle children have become rarer,. The united states of america has a racially and ethnically diverse population the united states census officially recognizes six racial categories: white american. Race and ethnicity: history and the 2000 of race as an official united states census and 2000 census relating to race and ethnicity. Postcolonial theory and the united states: race, ethnicity, and literature postcolonial theory and the united states. Chapter nine race and ethnicity the world’s leading economies, the united states is the census bureau,. I was born in the united states and have always government shouldn’t ask about our race or ethnicity i would not feel hurt by the census asking about race. Race and ethnicity in the united states learning about native americans and the history between them and european settlers has allowed me to better. The academy recommends that research studies include race/ethnicity, in the united states, but does recommend that the 2000 census allow respondents to. How census race, ethnicity and origin categories have changed from 1790 to 2010 how census race, “multiracial voices” explore visual essay. Immigration, race, and ethnicity in the united states: in his essay that the census never officially racialized immigrants from europe but. Aas33b_essaytwo - download as word sjsu aas 33b second essay sjsu aas 33b second essay race and ethnicity in the united states census immigration.
<urn:uuid:48a170d1-f8ef-4c54-8d8c-2f57a8657969>
CC-MAIN-2018-43
http://nxpaperfvxv.archiandstyle.info/race-and-ethnicity-in-the-united-states-census-2-essay.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515088.88/warc/CC-MAIN-20181022134402-20181022155902-00057.warc.gz
en
0.933657
879
3.4375
3
Robo-bees to help grow more strawberries - 25 January, 2019 A large amount of our food, including almonds and tomatoes, must be pollinated by bees in order to grow. As bees in the wild struggle with a steep decline in numbers, Russian scientists offer robotic pollinators as a viable substitute. Bees in the wild are facing grave threats to their existence, and while some of the reasons include pesticides and poor nutrition, the mystery has not been completely solved. Today, most farmers have to buy or rent bee colonies, which contributes to a rise in food prices, according to the U.S. Bee Informed Partnership. American beekeepers have lost an estimated 40 percent of their managed honeybee colonies. Russian scientists at the Tomsk Polytechnic University (TPU) now offer an alternative: robo-bees. Researchers plan to launch the project in 2019, and the size of the prototypes will be at least seven times bigger than real bees, which means that they’ll be the size of a human palm. For greenhouses only According to Alexey Yakovlev, the head of TPU’s School of Engineering, artificial bees will be especially beneficial for strawberry and other plants that grow in greenhouses all year round. "We plan to develop the robo-bees, algorithms and software, as well as optical systems and image recognition methods for accurate positioning,” Yakovlev said. Creating the first batch of 100 flying robots will cost around $1.4 million. "For year-round pollination in large greenhouses farmers use bumblebees,” Yakovlev said “One bumblebee family costs about $500. In winter, they fly in infrared light, which simulates solar heat, but in spring the whole bumblebee family can escape. This, of course, is an economic loss.” The robots, of course, will work non-stop and will never leave. Artificial bees, however, will not solve the problem of the species facing possible extinction, said Yakovlev. “We will use robo-bees only in greenhouses, outside their natural habitat.” Apple, cherry and other produce growers, however, also use bees in open spaces. Almond growers in the U.S., for example, are paying around $200 for a hive of bees, while blueberry growers pay $110 per hive, and apple growers pay around $70. Some famers and agricultural companies are considering pollination with alternative species. According to experts, there are other important pollinating creatures, such as bats, flies and mosquitos. When will robo-bees fly?Efforts to create an artificial alternative to bees hasn’t yet been successful. In 2017, Eijiro Miyako, a researcher at Japan’s National Institute of Advanced Industrial Science and Technology, developed a drone to deliver pollen between flowers. The bottom is covered in horsehair and coated in a special sticky gel. When the drone flies onto a flower, pollen grains stick lightly to the gel, and then rub off on the next flower visited. In experiments, the drone was able to cross-pollinate Japanese lilies. The soft, flexible animal hairs did not damage the stamens or pistils when the drone landed on the flowers. Miyako’s team, however, is still working on developing autonomous drones that could help farmers. GPS, high-resolution cameras and artificial intelligence will be required for the drones to independently track their way between flowers, and land on them correctly. There are other inspiring developments. Researchers at Harvard University developed a RoboBee that weighs less than one-tenth of a gram. It’s equipped with smart sensors that respond to their environment, mimicking the eye function of real bees. The Charles Stark Draper Laboratory in Cambridge, Massachusetts is working on DragonflEYE, which could be used for guided pollination. Finally, in March, Walmart filed a patent for drone pollinators. These prototypes, however, are not yet advanced enough for mass pollination, and much more time and research is needed before the first high-tech colony of robo-bees will hit the fields. Click here to read the original article at Russia Beyond. Photo credit: Pixabay, CC0 Public Domain. Source: This article was published by hortibiz.com on 5-10-2018
<urn:uuid:e1968858-d7d0-4666-81c4-64710858e5a8>
CC-MAIN-2019-43
https://www.greentech.nl/news/robo-bees-to-help-grow-more-strawberries/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986693979.65/warc/CC-MAIN-20191019114429-20191019141929-00202.warc.gz
en
0.939046
919
3.21875
3
This web page contains problems to supplement the introductory textbook Matter and Interactions, by Ruth Chabay and Bruce Sherwood. These problems are designed for use with Volume 1, Chapter 9 on collisions. Topics include elastic, inelastic, and head-on collisions. Each problem can be viewed separately, with solutions, or downloaded as a pdf file. The site includes videos showing solutions to many of the problems. These can be followed with RSS or as podcasts from iTunes. Instructors are encouraged to submit their own problems and solutions. Problems should be submitted in LaTeX; ample support is provided for this process on the web site. EDITOR'S NOTE: Although this material is organized to support Matter and Interactions by Chabay and Sherwood, most of the problems can be used with other introductory physics texts. Additional information about the pedagogy behind Matter and Interactions, which emphasizes student modeling and a modern perspective, can be found at Matter and Interactions Home Page For a cost-free article by the authors on implementation of Matter and Interactions in the introductory physics classroom, SEE RELATED ITEMS on this page. This material is released under a GNU General Public License Version 3 license. Problems are free for educational use and redistribution. Commercial use is not allowed without the permission of the author. collisions, elastic, inelastic Metadata instance created December 10, 2009 by Alea Smith %0 Electronic Source %A Titus, Aaron %D May 31, 2008 %T Matter & Interactions Practice Problems: Collisions %V 2017 %N 21 August 2017 %8 May 31, 2008 %9 text/html %U http://linus.highpoint.edu/~atitus/mandi/index.php?dcsid=1900 Disclaimer: ComPADRE offers citation styles as a guide only. We cannot offer interpretations about citations as this is an automated procedure. Please refer to the style manuals in the Citation Source Information area for clarifications.
<urn:uuid:f275fc5f-f16c-44b1-b88a-370640f7f204>
CC-MAIN-2017-34
http://www.compadre.org/IntroPhys/items/detail.cfm?ID=9704
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107490.42/warc/CC-MAIN-20170821041654-20170821061654-00318.warc.gz
en
0.883716
411
3.109375
3
Though refugee youth living in America come from different countries and speak different tongues, there is a language they can all have in common: soccer. As YALLA education director Lars Almquist explained, soccer is “a universal language among a diasporic community.” YALLA founder, Mark Kabban experienced this phenomenon himself when one day he was juggling a soccer ball outside and a group of refugee kids joined him in a pickup game. Having lived in Lebanon for most of his youth, Kabban knows how hard it is to move into a new society. Inspired by his impromptu soccer match, he founded YALLA, a Peace Builders Soccer League and tutoring program for refugee kids. Youth in his program come from Iraq, Africa, and Latin America, and often immigrated to the United States to escape civil war, genocide, and forced labor. Many have never been to school a day in their lives, but in their new homes, they have a chance to acquire knowledge, make new friends, and prepare for bright futures in college or trade careers. By word of mouth and outreach efforts, young refugees come to the YALLA office, hoping to join the soccer team they heard about in school. But the soccer league is really just a hook to get kids involved in YALLA’s true mission—to help youth acclimate into and succeed in their new lives in America, both socially and academically. In exchange for the chance to play, scholar-athletes must spend the same amount of time in after-school tutoring sessions as they do in soccer practice, so that they hone their math and language skills along with their bicycle kick. Within this strong community of peers, young refugees can build a home and work toward success that was long denied to them. While tutoring youth in YALLA, Almquist found that it only takes a small push to help them progress from hopelessness to success. Everyday they work, they build a foundation of knowledge in a new language. Eventually, something clicks and they can finish problems on their own or begin tutoring other children. Then they can focus on a larger goal, such as going to college, getting a job, or finding a scholarship to play soccer after graduation. See how Groupon helps you discover local causes and lend a helping hand at the Groupon Grassroots blog. California Wolf Center was founded in 1977 to educate the public about wildlife and ecology, specifically the history and behavior of the gray wolf. Located 50 miles east of San Diego, it houses 19 wolves—five Alaskan gray wolves and 14 of the approximately 358 Mexican gray wolves that exist worldwide. The wolves act as ambassadors for the wild, taking part in educational programs for the public. The center also participates in the Mexican Wolf Species Survival Plan, which aims to help the endangered species recover in the wild. At the facility, wolves live in off-exhibit enclosures that can help retain their natural behavior since some of them will eventually be released back into the wild. At each of several one-day festivals held throughout the country, thousands of revelers unite in an epic clash of pulp, beer, and live music. Armed with a cache of 300,000 tomatoes, participants don protective bathing suits and goggles and hurl the fruit at one another during a two-hour battle. Throughout the afternoon, live music and costume contests offer an entertaining respite from the front lines, as bartenders dispense drafts of beer to attendees older than 21, refueling soldiers' morale before they resign to writing goodbye letters to their produce vendors back home. All tomatoes used during the event are past ripe and already fated for disposal, making the battle an efficient means of tossing them before their cursed transformation into singing Muppets. The patter of gloves against heavy bags and the paced breathing of circling sparring partners fills The Boxing Club with energy. That's amplified by trainers, who lead classes in everything from cycling to kickboxing. There's muay thai, for example, an MMA fighting style that torches calories with flurries of flying elbows, knees, and fists, or jiu jitsu, which focuses more on grappling. Martial arts are, in a way, just one more way of working towards physical fitness for many at the studio. Fitness goals are helped along by a full weight room, cardio area, and pilates studio. There's also a full locker room for cleaning up afterwards. The AjA Project’s semester-long Social Justice program guides student explorations of culture and identity, and promotes discussions of racial tension with the goal of preempting bullying and physical violence. Provided with photography training and the use of cameras, 100 young participants then create visual narratives that illustrate their own stories and reflect upon the problems facing their communities. Since 2000, the AjA Project's programs have helped more than 1,200 students to express themselves through photography, and displayed their narratives to more than one million viewers online and in galleries. The organization currently needs new digital cameras with basic accessories for students participating in the Social Justice program. Colossal cuisine portions tip the scales of both locations' menus. The fresh spring rolls ($5.50) burst at their rice-paper seams with vegetables, tofu, and shrimp and come served with a peanut sauce, perfect for dipping and liquid-diet elephants. Poultry patrons can cast a vote for the panang curry chicken ($7.50), which mixes coconut milk with sweet, spicy, and thick curry, adorned with plump bell peppers, sweet pineapple, and affable basil. In the realm of classic tastes, the pad see iew ($7.50) allows noncommittal noodlers the choice of thin rice noodles or flat noodles with a savory synthesis of chicken, broccoli, carrots, egg, and sweet black sauce. The kitchen team can spicy up your dish as sweltering as your devil-may-care tongue can handle, and in emergencies, smoldering stamp-lickers can be extinguished with a tasty Thai iced tea ($1.95).
<urn:uuid:92fe27fe-0e0b-4b42-baae-4989afda877d>
CC-MAIN-2015-06
http://www.groupon.com/local/alpine-ca/charity
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115856041.43/warc/CC-MAIN-20150124161056-00061-ip-10-180-212-252.ec2.internal.warc.gz
en
0.955731
1,235
2.515625
3
Drinking lots of soda may increase the risk of violent behavior in teens, a new study suggests. Teens in the study who drank more than five cans of non-diet soda per day were significantly more likely report behaving violently towards others, and more likely to report having carried a gun or knife in the past year, the researchers said. The results held even after the researchers took into account other factors that have been linked to violent behavior , including age, alcohol and tobacco use, and the frequency of family dinners. A link between junk-food and aggression has been proposed before. In 1979, U.S. lawyers successfully argued that a defendant accused of murder had a diminished capacity to understand his actions as a result of switching to a junk food diet , a legal precedent that became known as the “Twinkie Defense.” It's possible that the caffeine and sugar in the soda may directly affect teens' behavior, the researchers said. However, it's also possible that people who violent have a penchant for soda. Additional research is needed to find the exact reason for the link. Soda and violence Researchers from the University of Vermont analyzed survey responses from 1,878 teens from 22 public schools in Boston. Teens were asked how many sodas they had consumed over the past week, and whether they had been violent towards their peers, their siblings or people they had dated, or if they had carried a gun or a knife in the past year. The responses were divided into two groups: those who said they drank up to four cans over the preceding week (low consumption); and those how said they drank five or more (high consumption). Just under one in three (30 percent) respondents fell into the high consumption category. The more soft drinks the teens consumed, the more likely they were to have reported violent behavior. For those teens who were heavy consumers of non-diet sodas , the probability of aggressive behavior was 9 to 15 percentage points higher than that of low consumers. Just over 23 percent of those who said they drank one or no cans of soft drink a week carried a gun/knife, but just under 43 percent among those drinking 14 or more cans said that. The percentage of teens who reported perpetrating violence towards a partner rose from 15 percent, in those drinking one or no cans a week, to just short of 27 percent, among those drinking 14 or more. It's possible that an underlying condition, such as low blood sugar, may result in both high soda consumption and aggressive behavior, the researchers said. But even if soda consumption doesn't cause violent behavior, it may be a useful marker for aggressive, the researchers say. The study is published in online today (Oct. 24) in the journal Injury Prevention. Pass it on: High soda consumption is linked with aggression in teens. - 7 Foods You Can Overdose On - 10 Medical Myths That Just Wonât Go Away - 10 Ways to Promote Kids' Healthy Eating Habits Follow MyHealthNewsDaily on Twitter @MyHealth_MHND. Find us on Facebook.
<urn:uuid:8ee495e4-2c03-4571-a70f-3f14a652bc3b>
CC-MAIN-2021-21
https://cakehealth.com/1825-soda-consumption-violent-behavior-teens.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990449.41/warc/CC-MAIN-20210514091252-20210514121252-00334.warc.gz
en
0.972142
637
2.828125
3
As we have observed in instructional content, technical literature, and official Python documentation, a return statement, when executed, terminates execution of the function that contains it, and delivers a value to the statement that called the function. Literature on Python also offers much information on handling exceptions. Python: Simple statements – Within the above, note: 7.6. The return statement Python: Errors and Exceptions – Within the above, note: 8.3. Handling Exceptions For practice, but at the risk of sowing confusion, let’s take a look at the following code: # A return statement terminates execution of a function, # and delivers a value to the calling statement. # Which return statements will execute here, # and what will be the output? def fun(num, den): # How many of the return statements in this function will execute? print("fun!") try: return divide(num, den) except: return eggs() finally: return spam() def divide(num, den): print("divide!") return num / den def eggs(): print("eggs!") return "eggs function return value" def spam(): print("spam!") return "spam function return value" print(fun(42, 0)) fun! divide! eggs! spam! spam function return value For practice, copy it, execute it, modify it, and experiment with it, using Python 3. Can you explain what happens? In particular, which return statements executed, and why? Feel free to post explanations, questions, and your modifications of the code.
<urn:uuid:c8d867b6-5266-43e1-89d5-f76e540d3d1c>
CC-MAIN-2021-17
https://discuss.codecademy.com/t/python-function-with-try-except-finally-and-return/525653
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066981.0/warc/CC-MAIN-20210416130611-20210416160611-00507.warc.gz
en
0.759164
334
3.9375
4
From Apollo to Zeus, from Amun to Vishnu, this invaluable guide to mythology by Scottish archaeologist Alexander Murray is an indispensable companion for students of the great myths and legends of the world. Among the finest, most authoritative single-volume resource on Greek, Roman, Hindu, and Norse/Germanic myth, the text covers deities, heroes, creation myths, Vedic and Brahmanic gods, as well as the religious and mythological figures of ancient Egypt. First published in 1897, the handbook was later completely revised and expanded and made more readily comprehensible by the addition of handsome new illustrations. Murray's incomparable scholarship and his animated, personable style make this an entertaining handbook for all those wishing to familiarize themselves with the grand and interesting legends of the ancient past. Republication of the New York, 1935 edition.
<urn:uuid:4a502756-d7ac-44e2-b1bb-8f8074b88186>
CC-MAIN-2019-30
https://store.doverpublications.com/0486443744.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528869.90/warc/CC-MAIN-20190723043719-20190723065719-00553.warc.gz
en
0.934333
171
2.90625
3
Technology is moving at an alarming pace. Under the bonnet, new cars contain technology that was only trialled in Formula 1 cars a decade ago. On the dashboard, cars are looking more futuristic than even the most outlandish science fiction cartoons of the 80s. Features such as head-up-displays – once the preserve of fighter jets – make the interior of our family saloons seem veritably space-age. So what can we expect in the coming years? Speculation is easy, and of course there’s an element of conjecture in any prediction. But judging by the kind of technology that’s available at the very highest echelons of motoring privilege, and the technology that is being rapidly developed in laboratories, it isn’t too difficult to work out what to expect. Here’s are five technologies likely to appear in the next generation of cars. Cars That Communicate With Each Other At the moment, driving on the public road requires a rather fragmented form of communication. A driver brakes, causing his car’s brake lights to illuminate and the car to slow down. The driver behind must react to the brake lights and apply his own brakes. This is a slightly convoluted process which can cause long tailbacks on the motorway, but that can be streamlined using car-to-car communication. It doesn’t stop at braking though. Junctions with reduced visibility are fraught with dangers to all road users. If a car is able to register another car’s presence, bearing and speed before it comes into view, motorists will be safer. An Electronic Valet Every year, motoring journalists and writers will declare that driver-less cars are imminent. And it’s true that teams from Google and Oxford University have created passable driverless cars with good safety records in testing. However, what we’re more likely to see in the next generation of vehicles is automated parking – a much more limited (but still very useful) version of the near-total autonomy being researched at the moment. Cars are already able to park themselves. Several Lexus models have been able to do this for a while, and the German manufacturers (among others) have released models with advanced ‘parking assist’. What we’re looking forward to is cars that can slowly navigate around a car park until they find a space, before neatly parking themselves in it with ample space for all passengers to get out. This won’t be popular with drivers, but we’re bound to encounter more monitoring systems in our cars in future. We’re already finding that drivers willingly have ‘black boxes’ fitted in their cars to reduce their insurance premiums based on their driving style (the AA offer one such policy). The risk of a driver falling asleep at the wheel could be allayed with sensors that are triggered by symptoms of drowsiness, and a car could decide not to start at all if the driver is drunk. Media on Demand We’ve been rather limited in terms of in-car entertainment. With the exception of CD changers – which enable the user to store just half a dozen albums and change between them using buttons – and the very recent inclusion of mp3 player connectivity, drivers have been stuck with the radio since the 1920s. It won’t be long before cars present a genuinely advanced selection of media. Instead of having to plug an MP3 player in or use old-fashioned analogue signals, the cars of the future will present thousands of online radio stations and selective music streaming services like Spotify. Apple’s Siri is a popular gimmick on the iconic iPhone, but it has paved the way for a much wider uptake of voice recognition software. Using voice activated commands instead of buttons and switches will improve safety and enhance the driving experience. Expect to be adjusting the climate control, turning the radio on, putting the car into ‘sport’ mode or even turning the ignition with your voice. Of course, we’re also reaching a stage where the car can make decisions for us. Sensors detect rain, darkness and fog, enabling the car to automatically switch on headlights, windscreen wipers and fog lights respectively. Real advances in automotive automation mean that we won’t need to tell our cars to do these things – vocally or otherwise. Image Credit: commons.wikimedia.org
<urn:uuid:4c3afb00-b9a6-4966-8b76-9c891406d931>
CC-MAIN-2021-21
https://www.carsflow.com/the-next-generation-of-cars.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989614.9/warc/CC-MAIN-20210511122905-20210511152905-00291.warc.gz
en
0.949229
907
2.5625
3
If you’re over 30, you have a problem. Starting at that age, most people lose muscle each year — sometimes as much as five percent if you’re not physically active — as the body starts tearing down old muscle at a faster rate than it can build new. A host of reasons can be blamed for sarcopenia (science-speak for the age-related loss of muscle mass), including a reduced ability to use protein to support and produce muscle, fluctuating hormones, the loss of nerve cells responsible for sending signals to the muscles, and, for many, reduced physical activity. This can be devastating. Losing muscle mass means losing strength. Sure, playing a round of golf may be harder. But even simple things like taking your groceries out of the cart or opening a jar of pickles will be more difficult as well. The loss of muscle mass can also lead to some dangerous consequences, including decreased bone mass, increased risk of fractures, insulin resistance, and disability. But aging doesn’t have to equal sarcopenia. In addition to resistance exercise at least twice a week, you should also be adding plenty of protein into your diet. The amino acids in protein are the building blocks of muscle. And while the RDA for protein for adults is about 10 grams of protein for every 25 pounds of body weight per day, that may not be enough, especially as you get older. One study found that people who ate twice the current RDA for protein had the most success at building muscle.1 And it didn’t take long to see protein’s muscle-boosting effect. In the study, participants had higher rates of protein synthesis within just four days. Low-fat dairy, fish, lean meats, and dried beans and legumes are all good, healthy sources of protein for meals. Protein-rich snacks include hard-boiled eggs, low-fat cottage cheese, Greek yogurt and hummus. Whether as a main meal or a snack, dried beans are an especially great protein to add. Whatever your favorite — black, kidney, navy, lima, garbanzo, pinto, or white — they all deliver an impressive 7 grams of protein per one-half cup, cooked. That’s as much as an ounce of meat. To help you add some beans into your life, here’s a recipe for Three Bean Thing on page 147 of Good Food, Great Medicine. You can use any beans you like but these are sturdy and still look fresh a week later. If the onion is mild, use 2 cups. Diced bell pepper of any color is a good addition (and traditional, too) if you have some. Makes about 5 cups - 1–2 cups sweet onion, sliced in strips no more than ¼-inch x 1-inch - 2 tablespoons extra-virgin olive oil - 2 tablespoons apple cider vinegar - 1 teaspoon freshly crushed garlic - 1 teaspoon salt - ½ teaspoon freshly ground pepper1 can (15 ounces) red kidney beans - 1 can (15 ounces) garbanzo beans (chickpeas) - 1 can (15 ounces) cut green beans 1. Combine onion with oil, vinegar, garlic, salt, and pepper, and set aside. (This marinates the onions slightly, and makes them taste milder if they are hot. If onions are mild, I always use at least 2 cups to balance the beans.) 2. Drain and rinse kidney beans and chickpeas and set aside in colander to drain thoroughly. (Tossing beans in the colander with a dry paper towel helps.) 3. Drain green beans. (S&W cut green and yellow wax beans are a pretty combination.) Combine all drained beans with onions in dressing and mix well. Reprinted with permission from Good Food, Great Medicine (3rd edition), by Miles Hassell, MD and Mea Hassell © 2014. goodfoodgreatmedicine.com. About Endurance Products Company Endurance Products Company has been a trusted source of quality dietary supplements since 1978. Our sustained-release and extended-release tablets feature a unique vegetable wax matrix that releases nutrients in a slow, steady manner over a period of hours for optimal nutrient absorption and retention. 1. Kim IY, Schutzler S, Schrader A, et al. Quantity of dietary protein intake, but not pattern of intake, affects net protein balance primarily through differences in protein synthesis in older adults. Am J Physiol Endocrinol Metab. 2015;308(1):E21-E28. PMID: 25352437.
<urn:uuid:6ed1ec02-3c1a-42ff-9ca5-f01ceeacf36b>
CC-MAIN-2019-47
https://www.endur.com/blogs/blog/pack-in-the-protein
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668544.32/warc/CC-MAIN-20191114232502-20191115020502-00303.warc.gz
en
0.925128
962
2.71875
3
Seagrass Restoration Project, South Coast, PR Seagrasses have been historically impacted on the South Coast of Puerto Rico by acombination of impacts including human recreation and boating, shipping,construction of coastal piers and development, trash and debris and sewage and septic systems. The project proposes to address several factors impacting sea grasses including boating and recreational impacts, marine debris and specific areas of known sewage and septic impacts. The impacts will be addressed by performing education and outreach particularly at public access locations, by pin pointing underwater locations of marine debris and performing clean up, and reducing the impacts from illicit sewage connections and poorly sited septic systems. In water Clean Up Events Underwater and land clean-ups have been conducted in La Guancha, Ponce and Las Pardas, Guanica to address the marine debris issue which can highly impact the condition of Seagrass beds and animals that depend on these. More events like are being planned into the future. We have had the general community, students groups, local businesses and Boys Scouts as volunteers at these events. Tow Boarding Seagrass Surveys As part of this project Snorkeling and tow boarding surveys have been conducted to determine the extent of seagrass restoration potential and removal of debris at multiple locations – in addition water quality is being evaluated at sites identified in previous studies as potentially impaired by nutrients.
<urn:uuid:029557e7-22cd-442a-b8b3-9c0d21ba6b47>
CC-MAIN-2018-13
http://www.ridgetoreefs.org/seagrass-restoration-south-coast-puerto-rico.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257649683.30/warc/CC-MAIN-20180324034649-20180324054649-00394.warc.gz
en
0.959491
293
2.921875
3
Thinking about evaluation before your project gets rolling Most instructional technology initiatives in school are undertaken with a goal or set of goals in mind. Someone has received a grant to integrate a specific new device into their teaching, fundraising initiatives have resulted in new tools being made available to teachers in a grade or building, or the district has allocated funds for expanding its technology program through the creation of a new digital learning plan. Somewhere in each of these scenarios is an assumption—articulated explicitly or not-- that by purchasing/implementing the new device(s) something desirable will result. Students will learn to collaborate through the use of online discussion and editing tools. Teachers will be able to share/store/upload lessons that will allow for the creation of more flexible, student-centered learning environments. Students will perform better on assessments after practicing their skills and receiving individualized feedback. By the time a grant is approved, devices are installed and implementation has begun, however, goals are often the last thing on the minds of those responsible for getting the project off the ground. Thinking about outcomes frequently takes a backseat to a sense of urgency, excitement or the desire to “just get started and see how things go”. At Sun Associates we work with clients to uncover, clarify, and in some cases create those important goals that underlie their projects before implementation begins. We encourage project teams to anticipate and plan for how they will explain the outcomes of their project work, and to reflect on the connections between the work that they do and the outcomes that they expect. Typically, we find that regardless of the scope of the initiative or project, pausing to think about evaluation up front will: - Clarify the connection between your project’s actions and its educational goals. A project that has clarified its goals and actions will be able to say “We will provide/offer/do a, b, c, so that students/teachers are able to learn/develop/experience/achieve x, y, z.” Having such clarity up front will allow you to keep your project’s efforts focused and logically sequenced. - Create opportunities for team members to discuss and develop a shared vision for what a successful project implementation should look like. A project that has taken time for this discussion will be able to say “We will know that our project is successful when we see or understand that students are doing x, y, z.” This sort of statement is the basis for creating indicators of project success. Indicators provide your project with the basis for assessing its progress during implementation as well as ultimate outcomes. - Consider how and what outcome data will be collected The ability to identify outcome data such as “Students/teachers/ parents will report that the project has had impacts x, y, z ” or “Classroom observations will show students doing x, y, z” or “Student achievement data shows improvements in x.” will position you to respond to the inevitable requests for “data” that “show project impact”. Having this data will demonstrate your project’s commitment to providing concrete evidence of its success. In short, spending some time framing goals, discussing indicators for success, and starting to consider what data you will collect from project activities allows your team to be well-positioned to evaluate your work. Planning ahead for evaluation in this way will also help you to describe your successes and identify areas for improvement as the initiative is scaled up or otherwise continued within your school or district. Even if you do not anticipate being challenged to ultimately report on project outcomes, spending time discussing and clarifying goals and outcomes at the outset of your project will help ensure that your efforts and project activities remain focused on supporting those outcomes.
<urn:uuid:00c66d8c-422f-4788-aac3-203e0113b964>
CC-MAIN-2018-17
https://www.sun-associates.com/blog/2016/4/7/defining-expectations-up-front
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946165.56/warc/CC-MAIN-20180423184427-20180423204427-00105.warc.gz
en
0.954239
777
2.703125
3
Schläferin mit Blumen Sleeping Woman with Flowers, 1972 Albertina – Sammlung Batliner The architectural history of the Palais (Pictures you can see by clicking on the link at the end of page!) Image: The oldest photographic view of the newly designed Palais Archduke Albrecht, 1869 "It is my will that the expansion of the inner city of Vienna with regard to a suitable connection of the same with the suburbs as soon as possible is tackled and at this on Regulirung (regulation) and beautifying of my Residence and Imperial Capital is taken into account. To this end I grant the withdrawal of the ramparts and fortifications of the inner city and the trenches around the same". This decree of Emperor Franz Joseph I, published on 25 December 1857 in the Wiener Zeitung, formed the basis for the largest the surface concerning and architecturally most significant transformation of the Viennese cityscape. Involving several renowned domestic and foreign architects a "master plan" took form, which included the construction of a boulevard instead of the ramparts between the inner city and its radially upstream suburbs. In the 50-years during implementation phase, an impressive architectural ensemble developed, consisting of imperial and private representational buildings, public administration and cultural buildings, churches and barracks, marking the era under the term "ring-street style". Already in the first year tithe decided a senior member of the Austrian imperial family to decorate the facades of his palace according to the new design principles, and thus certified the aristocratic claim that this also "historicism" said style on the part of the imperial house was attributed. Image: The Old Albertina after 1920 It was the palace of Archduke Albrecht (1817-1895), the Senior of the Habsburg Family Council, who as Field Marshal held the overall command over the Austro-Hungarian army. The building was incorporated into the imperial residence of the Hofburg complex, forming the south-west corner and extending eleven meters above street level on the so-called Augustinerbastei. The close proximity of the palace to the imperial residence corresponded not only with Emperor Franz Joseph I and Archduke Albert with a close familial relationship between the owner of the palace and the monarch. Even the former inhabitants were always in close relationship to the imperial family, whether by birth or marriage. An exception here again proves the rule: Don Emanuel Teles da Silva Conde Tarouca (1696-1771), for which Maria Theresa in 1744 the palace had built, was just a close friend and advisor of the monarch. Silva Tarouca underpins the rule with a second exception, because he belonged to the administrative services as Generalhofbaudirektor (general court architect) and President of the Austrian-Dutch administration, while all other him subsequent owners were highest ranking military. In the annals of Austrian history, especially those of military history, they either went into as commander of the Imperial Army, or the Austrian, later kk Army. In chronological order, this applies to Duke Carl Alexander of Lorraine, the brother-of-law of Maria Theresa, as Imperial Marshal, her son-in-law Duke Albert of Saxe-Teschen, also field marshal, whos adopted son, Archduke Charles of Austria, the last imperial field marshal and only Generalissimo of Austria, his son Archduke Albrecht of Austria as Feldmarschalil and army Supreme commander, and most recently his nephew Archduke Friedrich of Austria, who held as field marshal from 1914 to 1916 the command of the Austro-Hungarian troops. Despite their military profession, all five generals conceived themselves as patrons of the arts and promoted large sums of money to build large collections, the construction of magnificent buildings and cultural life. Charles Alexander of Lorraine promoted as governor of the Austrian Netherlands from 1741 to 1780 the Academy of Fine Arts, the Théâtre de Ja Monnaie and the companies Bourgeois Concert and Concert Noble, he founded the Academie royale et imperial des Sciences et des Lettres, opened the Bibliotheque Royal for the population and supported artistic talents with high scholarships. World fame got his porcelain collection, which however had to be sold by Emperor Joseph II to pay off his debts. Duke Albert began in 1776 according to the concept of conte Durazzo to set up an encyclopedic collection of prints, which forms the core of the world-famous "Albertina" today. Image : Duke Albert and Archduchess Marie Christine show in family cercle the from Italy brought along art, 1776. Frederick Henry Füger. 1816 declared to Fideikommiss and thus in future indivisible, inalienable and inseparable, the collection 1822 passed into the possession of Archduke Carl, who, like his descendants, it broadened. Under him, the collection was introduced together with the sumptuously equipped palace on the Augustinerbastei in the so-called "Carl Ludwig’schen fideicommissum in 1826, by which the building and the in it kept collection fused into an indissoluble unity. At this time had from the Palais Tarouca by structural expansion or acquisition a veritable Residenz palace evolved. Duke Albert of Saxe-Teschen was first in 1800 the third floor of the adjacent Augustinian convent wing adapted to house his collection and he had after 1802 by his Belgian architect Louis de Montoyer at the suburban side built a magnificent extension, called the wing of staterooms, it was equipped in the style of Louis XVI. Only two decades later, Archduke Carl the entire palace newly set up. According to scetches of the architect Joseph Kornhäusel the 1822-1825 retreaded premises presented themselves in the Empire style. The interior of the palace testified from now in an impressive way the high rank and the prominent position of its owner. Under Archduke Albrecht the outer appearance also should meet the requirements. He had the facade of the palace in the style of historicism orchestrated and added to the Palais front against the suburbs an offshore covered access. Inside, he limited himself, apart from the redesign of the Rococo room in the manner of the second Blondel style, to the retention of the paternal stock. Archduke Friedrich’s plans for an expansion of the palace were omitted, however, because of the outbreak of the First World War so that his contribution to the state rooms, especially, consists in the layout of the Spanish apartment, which he in 1895 for his sister, the Queen of Spain Maria Christina, had set up as a permanent residence. Picture: The "audience room" after the restoration: Picture: The "balcony room" around 1990 The era of stately representation with handing down their cultural values found its most obvious visualization inside the palace through the design and features of the staterooms. On one hand, by the use of the finest materials and the purchase of masterfully manufactured pieces of equipment, such as on the other hand by the permanent reuse of older equipment parts. This period lasted until 1919, when Archduke Friedrich was expropriated by the newly founded Republic of Austria. With the republicanization of the collection and the building first of all finished the tradition that the owner’s name was synonymous with the building name: After Palais Tarouca or tarokkisches house it was called Lorraine House, afterwards Duke Albert Palais and Palais Archduke Carl. Due to the new construction of an adjacently located administration building it received in 1865 the prefix "Upper" and was referred to as Upper Palais Archduke Albrecht and Upper Palais Archduke Frederick. For the state a special reference to the Habsburg past was certainly politically no longer opportune, which is why was decided to name the building according to the in it kept collection "Albertina". Picture: The "Wedgwood Cabinet" after the restoration: Picture: the "Wedgwood Cabinet" in the Palais Archduke Friedrich, 1905 This name derives from the term "La Collection Albertina" which had been used by the gallery Inspector Maurice von Thausing in 1870 in the Gazette des Beaux-Arts for the former graphics collection of Duke Albert. For this reason, it was the first time since the foundation of the palace that the name of the collection had become synonymous with the room shell. Room shell, hence, because the Republic of Austria Archduke Friedrich had allowed to take along all the movable goods from the palace in his Hungarian exile: crystal chandeliers, curtains and carpets as well as sculptures, vases and clocks. Particularly stressed should be the exquisite furniture, which stems of three facilities phases: the Louis XVI furnitures of Duke Albert, which had been manufactured on the basis of fraternal relations between his wife Archduchess Marie Christine and the French Queen Marie Antoinette after 1780 in the French Hofmanufakturen, also the on behalf of Archduke Charles 1822-1825 in the Vienna Porcelain Manufactory by Joseph Danhauser produced Empire furnitures and thirdly additions of the same style of Archduke Friedrich, which this about 1900 at Portois & Ffix as well as at Friedrich Otto Schmidt had commissioned. The "swept clean" building got due to the strained financial situation after the First World War initially only a makeshift facility. However, since until 1999 no revision of the emergency equipment took place, but differently designed, primarily the utilitarianism committed office furnitures complementarily had been added, the equipment of the former state rooms presented itself at the end of the 20th century as an inhomogeneous administrative mingle-mangle of insignificant parts, where, however, dwelt a certain quaint charm. From the magnificent state rooms had evolved depots, storage rooms, a library, a study hall and several officed. Image: The Albertina Graphic Arts Collection and the Philipphof after the American bombing of 12 März 1945. Image: The palace after the demolition of the entrance facade, 1948-52 Worse it hit the outer appearance of the palace, because in times of continued anti-Habsburg sentiment after the Second World War and inspired by an intolerant destruction will, it came by pickaxe to a ministerial erasure of history. In contrast to the graphic collection possessed the richly decorated facades with the conspicuous insignia of the former owner an object-immanent reference to the Habsburg past and thus exhibited the monarchial traditions and values of the era of Francis Joseph significantly. As part of the remedial measures after a bomb damage, in 1948 the aristocratic, by Archduke Albert initiated, historicist facade structuring along with all decorations was cut off, many facade figures demolished and the Hapsburg crest emblems plunged to the ground. Since in addition the old ramp also had been cancelled and the main entrance of the bastion level had been moved down to the second basement storey at street level, ended the presence of the old Archduke’s palace after more than 200 years. At the reopening of the "Albertina Graphic Collection" in 1952, the former Hapsburg Palais of splendour presented itself as one of his identity robbed, formally trivial, soulless room shell, whose successful republicanization an oversized and also unproportional eagle above the new main entrance to the Augustinian road symbolized. The emocratic throw of monuments had wiped out the Hapsburg palace from the urban appeareance, whereby in the perception only existed a nondescript, nameless and ahistorical building that henceforth served the lodging and presentation of world-famous graphic collection of the Albertina. The condition was not changed by the decision to the refurbishment because there were only planned collection specific extensions, but no restoration of the palace. Image: The palace after the Second World War with simplified facades, the rudiment of the Danubiusbrunnens (well) and the new staircase up to the Augustinerbastei This paradigm shift corresponded to a blatant reversal of the historical circumstances, as the travel guides and travel books for kk Residence and imperial capital of Vienna dedicated itself primarily with the magnificent, aristocratic palace on the Augustinerbastei with the sumptuously fitted out reception rooms and mentioned the collection kept there – if at all – only in passing. Only with the repositioning of the Albertina in 2000 under the direction of Klaus Albrecht Schröder, the palace was within the meaning and in fulfillment of the Fideikommiss of Archduke Charles in 1826 again met with the high regard, from which could result a further inseparable bond between the magnificent mansions and the world-famous collection. In view of the knowing about politically motivated errors and omissions of the past, the facades should get back their noble, historicist designing, the staterooms regain their glamorous, prestigious appearance and culturally unique equippment be repurchased. From this presumption, eventually grew the full commitment to revise the history of redemption and the return of the stately palace in the public consciousness. Image: The restored suburb facade of the Palais Albertina suburb The smoothed palace facades were returned to their original condition and present themselves today – with the exception of the not anymore reconstructed Attica figures – again with the historicist decoration and layout elements that Archduke Albrecht had given after the razing of the Augustinerbastei in 1865 in order. The neoclassical interiors, today called after the former inhabitants "Habsburg Staterooms", receiving a meticulous and detailed restoration taking place at the premises of originality and authenticity, got back their venerable and sumptuous appearance. From the world wide scattered historical pieces of equipment have been bought back 70 properties or could be returned through permanent loan to its original location, by which to the visitors is made experiencable again that atmosphere in 1919 the state rooms of the last Habsburg owner Archduke Frederick had owned. The for the first time in 80 years public accessible "Habsburg State Rooms" at the Palais Albertina enable now again as eloquent testimony to our Habsburg past and as a unique cultural heritage fundamental and essential insights into the Austrian cultural history. With the relocation of the main entrance to the level of the Augustinerbastei the recollection to this so valuable Austrian Cultural Heritage formally and functionally came to completion. The vision of the restoration and recovery of the grand palace was a pillar on which the new Albertina should arise again, the other embody the four large newly built exhibition halls, which allow for the first time in the history of the Albertina, to exhibit the collection throughout its encyclopedic breadh under optimal conservation conditions. Image: The new entrance area of the Albertina 64 meter long shed roof. Hans Hollein. The palace presents itself now in its appearance in the historicist style of the Ringstrassenära, almost as if nothing had happened in the meantime. But will the wheel of time should not, cannot and must not be turned back, so that the double standards of the "Albertina Palace" said museum – on the one hand Habsburg grandeur palaces and other modern museum for the arts of graphics – should be symbolized by a modern character: The in 2003 by Hans Hollein designed far into the Albertina square cantilevering, elegant floating flying roof. 64 meters long, it symbolizes in the form of a dynamic wedge the accelerated urban spatial connectivity and public access to the palace. It advertises the major changes in the interior as well as the huge underground extensions of the repositioned "Albertina". Art historian with research interests History of Architecture, building industry of the Hapsburgs, Hofburg and Zeremonialwissenschaft (ceremonial sciences). Since 1990 he works in the architecture collection of the Albertina. Since 2000 he supervises as director of the newly founded department "Staterooms" the restoration and furnishing of the state rooms and the restoration of the facades and explores the history of the palace and its inhabitants. Posted by >El Don Quijote de Viena on 2018-08-01 08:56:11
<urn:uuid:8ea88e14-8b58-4e7d-961d-fabaafc0ef9e>
CC-MAIN-2020-16
http://online-art-museum.com/wien-1-bezirk-the-art-of-very-renowned-palace-and-museum-buildings-at-the-center-of-vienna-palais-erzherzog-albrecht-albertina-albertinaplatz-hanuschgasse/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371833063.93/warc/CC-MAIN-20200409091317-20200409121817-00032.warc.gz
en
0.954903
3,413
2.578125
3
Tell us how a UB community member you know is reaching others. Engaging students in physics through art To learn more about UB and out reach as a comprehensive research-intensive university visit www.buffalo.edu/aboutub. For some Western New York teenagers, the journey to a career in physics is passing through the University at Buffalo’s Physics & Arts Summer Institute where they explore the possibilities of science merging with art and cultivate a passion for science. “For me the most important part is to get [students] interested in science and not just interested but to be passionate about it. These are the kinds of experiences I just love.” Doreen Wackeroth, associate professor of physics, used funding from the education and outreach portion of a prestigious National Science Foundation CAREER award to launch the summer program in 2006. She partnered with colleagues in the departments of Visual Arts and Media Study and invited area high school science teachers and local artists to participate in this project. Participants develop artistic and interactive displays designed to demonstrate and communicate to the public the principles of physics. In doing so, they also develop a deeper understanding of the most basic questions in science. Questions like “What are the smallest building blocks of matter?” and “Where did we come from?” Projects have included an interactive magnetic heat engine and an exhibit featuring a spark chamber, an instrument that makes cosmic rays visible to the naked eye. The most recent institute’s students also took a one-day field trip to Fermilab's Particle Accelerator near Chicago. The 2009 installment of the institute will begin in late July 2009. 2009 Physics & Arts Summer Institute Apply for this year’s institute; see the work of previous institutes. “At UB, Teens Create Art to Explain Particle Physics” High school students create interactive displays, Web page to explain particle physics.
<urn:uuid:b0010774-884d-49f6-a903-bd90296656c4>
CC-MAIN-2014-42
http://www.buffalo.edu/reachingothers/story_physics.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443598.37/warc/CC-MAIN-20141017005723-00203-ip-10-16-133-185.ec2.internal.warc.gz
en
0.914751
402
2.6875
3
There is a widely held assumption that technological interventions necessarily lead to overall improvements in the human condition. This course will explore the consequences of some of these interventions from a variety of perspectives derived from the context of the developing world. Drawing on historical perspectives of modernization and development, we will examine this assumption and test its validity through the lessons of environment, culture, and human rights. To bring home these points —to make them real— students will assume different perspectives in an interactive role-playing game developed by WPI students, staff, and faculty. Browse the GPS Posters: Livable Cities Collections: GPS Posters: Livable Cities 2014 GPS Posters: Livable Cities 2015
<urn:uuid:f0a24e36-a9f6-4d16-b8ee-68578153f480>
CC-MAIN-2017-43
http://digitalcommons.wpi.edu/gps-posters-cities/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824226.31/warc/CC-MAIN-20171020154441-20171020174441-00260.warc.gz
en
0.919783
141
2.984375
3
|Food Composition Data: A User's Perspective (UNU, 1987, 223 pages)| |Report and recommendations of the conference| Users obviously need more than just data - they need the machinery to interact with these data. This aspect of the subject can be discussed under the rubric "food data systems," used to describe the data and all the programmes or tasks involved in keeping the data relevant and available to the user. The first point to be made is the distinction between those data bases and systems that are tailored for a single specific purpose or task, and those that attempt to be general purpose. This distinction is discussed at length by Hoover (paper 10) in terms of two tiers of users. It is important to note that the specific data bases are constructed from the general, and the validity of special-purpose data bases depends on the validity of both the data in the general data base and of the procedures by which they were selected. The design and building of specific-purpose nutrient data bases and systems are straightforward since such systems can usually be completely defined in advance (although in fact they rarely are). Additionally, the actual data involved are usually fixed for the duration of the task. Much of the design effort here is focused on the user interface - making the system easy to use. A number of commercial firms supply such systems [5, 6]; however, a standard problem is that documentation of the source and quality of the data is frequently missing, leaving the user without guidance in this area. General or broad-purpose nutrient data systems tend to focus on the data rather than on the details of interface with the user, although all systems must address this latter aspect. A number of papers given at the conference address the management issues (papers 7, 10, 12, and 13), others describe the magnitude and complexity of the task (papers 11, 15, and 17), and paper 21 focuses on the tools and concepts available to the system designer. The major points are summarized below, organized into the three categories of (a) the data themselves, (b) documentation of the data, and (c) preparation of subsets of the data. The Data Themselves The ideal general-purpose data base contains all the data that anyone might need, in a form that makes them readily accessible for any purpose. To approach this ideal it is necessary to be concerned with the following areas. The data base must be updated continually and aggressively with new foods and new analyses, including re-analyses with better techniques, analyses of new products on the market, and new formulations of existing products. Thus standardized procedures must be implemented for routine collection of new nutrient information from available sources, including governmental publications, the scientific literature, and manufacturers'data on commercial products. An important aspect of adding data to a data base is that each new piece of data must be carefully evaluated for reliability. Moreover, all nutrient data files should be routinely checked for consistency, to identify possible anomalies and errors in the data. Such procedures could include, for example, comparing nutrient values within food groups or comparing actual data with predicted values. Thus the sum of the weight of the macro-nutrients plus ash and water theoretically should be 100 grams, while the sum of the calorie contributions of each macronutrient (including alcohol) can be compared with the total value for calories. Having confidence in the individual data is one aspect of the question of the reliability of a data base. A cheek on the working of the entire data base, including a cheek on calculation procedures, can be provided by calculation of a selected, carefully constructed set of dietary records . Such a test should be routinely carried out, with disagreement between successive runs carefully investigated and explained. General-purpose data bases need to contain information about the source and quality of each of their data points. At a minimum, the user should be able to trace back each piece of data either to a source document or, in the case of analytic data, a laboratory reference; or, if it is estimated, it should be possible to ascertain just how this was done and from what other data. Moreover, it is important to maintain older data as part of the system. In the case of foods and food preparations which have been modified or are no longer on the market, data should be retained for comparison purposes, and so that dietary information collected in the past can be evaluated. Preparation of Data for the Ultimate User A major responsibility of the general-purpose data system is to prepare subsets of its data for the "front-line" users - these are the special-purpose data bases mentioned above. In order to do this at all well, such a system must support a flexible query language, an information data base that adequately describes the data, and sufficient manipulative machinery. Areas of specific importance are: Access to the Data The system should provide a variety of different ways to access the data. For example, foods should be indexed by food group and type of processing and preparation undergone, as well as by common name and food code number. Moreover, linkages to other data, such as foodspecific quantity units, are also an essential part of retrieving the necessary data. Aggregation of Data Many users require data on quite general foods (for example, "apples" rather than "Red Delicious apples"). A general-purpose data base often contains some of these entries, with nutrient levels estimated by combining the data of several specific foods for which analytic data exist. It is essential that the data base include information on just how these estimations were calculated, and, further, that it provide the information, and perhaps the machinery, necessary for the users to make further combinations of data to suit their specific purposes. Presentation of data, either on a screen or in hard-copy reports, needs to be flexible to permit the design of special-purpose formats to meet specific user needs. For example, options for presentation of data should permit the display of calculated nutrients as a percentage of calories, or other calculated combinations of nutrient values, such as saturated fat as a percentage of total fat or in ratio to polyunsaturated fat. Other options might include comparison of calculated nutrient intakes with recommended standards for specific age-sex groups, or the reporting of nutrients for each individual food item, for single meals, for single days, or for the average of multiple days.
<urn:uuid:261aca56-917a-4509-ae98-cce1bc1f8309>
CC-MAIN-2016-36
http://www.nzdl.org/gsdlmod?e=d-00000-00---off-0ccgi--00-0----0-10-0---0---0direct-10---4-------0-1l--11-en-50---20-about---00-0-1-00-0-0-11-1-0utfZz-8-00-0-0-11-10-0utfZz-8-00&a=d&c=ccgi&cl=CL1.2&d=HASH9cce843a8b9cf8dc61d2ab.5.5
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982932823.46/warc/CC-MAIN-20160823200852-00074-ip-10-153-172-175.ec2.internal.warc.gz
en
0.933752
1,289
2.609375
3
The buffalo is the main dairy animal in Pakistan that accounts for roughly 75% of all milk produced in the country. The milk production in excess during winter and less during summer months causes many problems in its marketing. Pace dodoes (milk suppliers) supply their milk to collection center or milk shops, usually after decreasing. Pier urban milk producers usually sell their product directly to consumers, milk shops and to larger establishments through contracts. If the pace dodoes sell their milk to decreased or hire his services, the milk is separated into cream and skim milk. The skim milk is mixed with other whole milk and sold to urban milk shops. The producer appears not o receive a premium for summer milk or for milk with higher milk fat content except for that paid by the milk collection centers that are operated by processors. The milk products and byproducts produced in the country are pastured milk, ultra high temperature (OUT) milk, powder milk, cream, butter, ghee, yogurt and cheese. The price of OUT milk is nearly double the price of raw milk. Dairy animals with high genetic potential for milk production always remain the corner stone of dairy production strategy. The genetic potential for milk production in indigenous cattle and buffalo could be improved by selective breeding. Legume and grass fodder combination could improve the feeding status of livestock. Better feeding of livestock could be achieved if vertical expansion of livestock production is followed. Haven’t found the relevant content? Hire a subject expert to help you with Dairy Industry in Pakistan essay $35.80 for a 2-page paper Ensiling and hay making systems should be devised and extended to the farmers according to local livestock production system. Coordination of research and extension activities is needed for the progress of dairy sector. The rural small holders should be trained in the skills of efficient dairy production. There is no price motivation for the milk producers so most of the milk is produced on subsistence basis rather than Dairy Industry in Pakistan By zanily durational and reproductive problems is required to avoid monetary losses in dairy sector. Key Words: Dairy; Buffalo; Cow; Milk; Feeding INTRODUCTION Agriculture sector with its integral component of livestock (animal agriculture) is regarded as most vital part of the national economy since the emergence of Pakistan. Agriculture not only contributed importantly to the national GAP of Pakistan during last five decades but also the provision of employment and food to rapidly growing nation remains important obligations of this sector. In the changing scenario of economy of Pakistan and other developing nations, agriculture is still the largest sector. In Pakistan, agriculture contributes slightly above 25% to GAP, employs around 44% of work force, is the main source of foreign exchange earnings and provides linkages through which it can stimulate growth in other sectors (Economic Survey of Pakistan, 1999-2000). Livestock is the most important sub sector of agriculture in Pakistan that accounts for nearly 37% of agriculture value added and about 9% of the GAP. The net foreign exchange earnings were about 35 billion rupees in 1999-2000, which was about 9% of the overall export earnings of the country (Economic Survey of Pakistan, 999-2000). Livestock sector has its due importance in Pakistan due to the fact that 30-35 million rural population is engaged in livestock keeping (Economic Survey, 19992000). Milk plays a tremendous role in building a healthy society and can be used as vehicle for rural development, employment and slowing down the migration of the rural population. Pakistan stands 7th position among the top ten world's milk producing countries. Milk and milk products provide nearly one third of world's intake of animal protein (FAA, 1998). This is not true for Pakistan where milk provides more than half of the 17. Goff animal protein available for each person daily and so traditional diets assign a balancing role to milk (Anonymous, 1996). However, per capita availability of milk is far less than the recommended levels (0. 5 liter per person per day) of World DAIRY INDUSTRY IN PAKISTAN / It-it. J. Agric. BIO. , Volvo. 4, NO. 3, 2002 Health Organization. About 80 thousand tones of dry milk was imported in Pakistan during the last year to meet local demands of milk (Agriculture Statistics, 1999-2000). The total milk yield in Pakistan is 26. 4 million tones and entire dairy processing industry was using only about 15% of it (He-man & Khan, 1997). The importance of milk as a cash crop is always neglected in the past. While comparing the value of milk with other cash crops, it was mentioned that milk had a value about 60% higher as compared to both wheat and cotton together. The land of Pakistan is benefited with both irrigated plains through mighty Indus river with its tributaries and desert areas like Collision and Thereafter. Pakistan is expended from costal range areas in the south to the alpine pastures in the north and has variability in topography, rainfall, humidity, temperature, plant and animal species, social and cultural heritage. So protein but for socioeconomic reasons as dairy animals provide regular cash income, economic utilization of family labor, create social security and supply growing markets. Milk production is an extremely labor intensive occupation, however, in many countries of the world including Pakistan, it is the most productive way of converting crop residues and agro industrial wastes into valuable food. But due to biological and technical constrains like shortage of feed, high mortality rate, poor genetic potential etc; socio economic constraints like high input cost, scarcity of resources, inadequate marketing systems, commercial feed industry and policy constraints render this sector undeveloped and truly in a miserable condition. The main objective of this article is to review the potentials, problems and solutions pertaining to dairying in Pakistan. Main features of dairy sector in Pakistan. Dairy industry in Pakistan has similar characteristics, like other developing Asian nations, which include small herd, poor genetic potential of animals for milk, low quality feeds, high risks of epidemics, improper marketing channels, lack of technical man rower for dairy industry, high environmental stresses, reproductive failure and high udder abnormalities, orthodox management practices, poor extension services and lack of commercial rations. Despite of all above problems, dairy animals, mainly buffalo and cattle are producing 26. 4 million tones of milk in Pakistan (Agriculture Statistics, 1999-2000). Per capita availability of milk in Pakistan is 82. 4 Keg annually. This quantity of milk provides more than half of the 17. 4 g of animal protein available for each Pakistani daily. But Pakistan still has to import dry milk and other milk products e. G. Butter, cheese, yogurt, cream, whey etc. Very year to fulfill the ever increasing demands for milk and milk products. During year 1999-2000 Pakistan expended about 1213. 5 million rupees of valuable foreign exchange to import the milk and milk products (Agricultural Statistics, 1999-2000). The increasing demands for dairy products are attributed to high population growth rate and rapid arbitration. Population of buffalo and cattle. Pakistan owns about 23. 3 million heads of buffalo (Agriculture Statistics 1999-2000). The buffalo population increased about 14. 7% during the last 6 years from 1996 to 2001 in Pakistan. Population trends indicate that heir number is likely to further increase in future (Khan, 1998) Punjab, Kinds, NFW and Balloonists provinces contribute 64, 28, 7 and 1%, respectively, to the total buffalo population of the country (Livestock Senses, 1996). These figures indicate that most of the buffaloes are present in irrigated areas and along riversides of the country. About 60% of the total buffalo stock is, female buffalo stock, of above three years of age. It is estimated that about 8. 7 million heads of buffalo are in milk, remaining either in dry stage or not yet calved. About 0. 42 million buffalo bulls are available either for breeding or for work purposes. According to Economic Survey (1999-2000) of Pakistan about 22. 4 million heads of cattle are available in Fig. 1. Population trend of buffalo and cattle from 1990 to 2001 POPULATION TREND OF BUFFALO AND CATTLE 25 MILLION # 1990 1991 1992 BUFFALO CATTLE 1993 1994 1995 1996 1997 1998 1999 2000 2001 YEARS the country. Data about cattle population in Pakistan from 1996 to 2001 indicated about 9. 36% increase cattle population as shown in Fig. 1. It was estimated that around 10. 4 and 4. 1 million heads of mature cows and bulls are present in Pakistan. However, cattle population data from 1986-1996 suggest a negative growth for bull population. This may be supported by the fact of increased mechanization in agriculture sector or it may be due to the preference for artificial insemination in cattle by the farmers. However, second factor seemed to be ineffective because data in 1996 livestock senses indicated a positive growth trend for cattle breeding bulls and negative for cattle bulls engaged in work. Dairy breeds and breeding. Worldly two well-known breeds of buffalo (Nil Rave & Kind) are major contributors to buffalo stock in the country. Buffaloes are the main dairy animals in Pakistan (Khan, 1998). According to Livestock Senses (1996) about 33 and 20. 8% of the total buffalo population belongs to Nil' Rave and Kind breeds, respectively. Other buffaloes belong to either their crosses or some other breeds of the region. Khan (1998) reported 421 SWARD et al. / Into. J. Agric. BIO. , Volvo. 4, NO. 3, 2002 that milk yield in Nil Rave buffaloes ranged from 1835 to 2543 Keg per lactation. Mad (1999) reported that production recording on civil and military dairy farms in an organized manner was undertaken in 1920. Under field condition, the first milk recording was undertaken in 1979. Progeny testing of buffalo bull was started in 1980. In 1996, Pakistan government approved a technical document entitled production of breeding bulls in Pakistan for implementation. The production of breeding sires is a multiple step process that requires simultaneous action on production recording and identification of "Elite cows", identification of male bull calves and their raising up to performance testing, raising of donor bulls at semen production units, artificial insemination and progeny testing of donor bulls. As follow up, various actions were initiated during 1996-1999 for implementation of the above steps. In spite of prolonged efforts, the proposed and planned actions have failed to achieve required objectives. Khan (1998) reported that breeding values for milk yield averaged 9. 3 and 32. 2 Keg in Nil Rave buffaloes and bulls, respectively. Variation in the breeding values of tested bulls was lower than expected. He reported that genetic trend in buffaloes was negative but sire used in the recent years was better than those in the past. The negative trend in the buffalo population merely depicts lack of effectiveness of the selection procedures employed in the past. Selection based on failed to bring any genetic improvement in the past. He stated that policy of choosing on the basis of genetic worth is likely to be a step in right direction. However extensive studies are required in refining the procedures of data collection and evaluation. He suggested that with millions of small buffalo farmers, sustainable development of buffalo requires national and international programs. Payne and Wilson (1999) described that Swahili, Red Shindig and Thereafter (a dual purpose cattle) breeds of cattle are important cattle mulch breeds of Pakistan. Swahili is a large, heavily built, long deep rather flashy animal. The coat color varies, but reddish dun is common. Red Shindig is medium to small animal having round droopy quarters. Coat color is usually red to dun yellow. The origin herd is found at Mali in Kinds province. They survive under subtropical and semi arid environment. It is considered one of the best breeds of subtropics. It has been exported all over the tropical world and is used for upgrading indigenous cattle, especially for milk. Thereafter (white Shindig) breed is present in Tar Desert in south west of Kinds province. This is an arid area where rainfall averages 200 mm per annum and during drought years cattle have had to be removed to surrounding areas where they have crossbred with Kankakee and Red Shindig. They are strongly built, medium size animals tit comparatively short, straight limbs and good feet. The coat color is white to gray with gray strip along top line. This is one of the best dual purpose, milk and work, breeds found in Indian subcontinent. It has been documented that age of first calving in Swahili and Red Shindig varies between 30 and 43 months. Milk production in Swahili ranges from 1200 to 3100 liters with maximum record of 5500 liters in a lactation (Knackers, 1983). Length of lactation in Swahili and Red Shindig varies between 270 and 490 days (Payne & Hodges, 1997). Swahili is one of the most productive tropical dairy breeds. In Jamaica, they eave been crossed with Jersey to provide the foundation stock for the mulch breed known as Jamaica Hope. In Australia, the Swahili has been used in the development of two new dairy breeds, the Australian Milking Zebu and Australian Freesias Swahili. In both Australia and New Zealand a new export trade has been developed that of crossbred (Swahili x European milking breeds) dairy heifers to Southeast Asia (Knackers, 1983). Payne and Wilson (1999) reported that unless crossbred animals were managed in closely controlled environment, it is very doubtful whether crossbred dairy cattle should be used under tropical conditions. Mad (1990) reported that crossbreeding of local cattle with Boss Taurus was started in 1900 on military dairy farms and by 1937 sufficient information and data had emerged and published. He further reported that for a long time after independence, the introduction of cross breeding in the country remained controversial. However, it has been well documented that indigenous cattle have been adapted to the local conditions through natural selection over generations. In view of the impressive results obtained from selection in many temperate dairy breeds, there should be considerable scope for improving indigenous cattle. The variability, in terms of the coefficient of variation is generally higher in Zebu than in temperate cattle so there is possible scope of improving milk production in Swahili and Red Shindig cattle breeding programs in temperate countries, 60-70% of genetic progress was derived from the selection of bulls on the basis of progeny testing. Dahlia (1998) reported that genetic trend in Swahili cattle for all traits were closed to zero over the period studied, but substantial deterioration in the performance caused by environmental factors was observed. It was concluded that selection against milk production and or reproduction in cows was desirable, but feeding and body condition call for greater attention if reproductive performance is to be improved. He reported that alternative selection strategies showed that the expected annual genetic gain by selection for 305-day milk production might be in the range of 0. To 1 . 1% of the mean. The number of pure Swahili breeding and crossbred cows was ranging from 9000 to 10500 and 100,000, respectively in Pakistan (Payne & Hodges, 1997). Although the Swahili is the premier dairy breed among the zebus, the pure bred population has been decreasing. By virtue of its unique characteristics the Swahili represents a genetic resource, which is of the utmost importance. Dahlia 422 (1998) suggested that in the long run it was likely that best course of action to maintain and to conserve the breed, was to keep it commercially viable. He reported that a much quicker improvement, measured in Keg per animal, could be achieved with Swahili. By using better methods for genetic evaluation and modern reproductive techniques, genetic gain can be increased considerably. Feeds and feeding. Feeding and nutrition have repeatedly been highlighted as the major instant in animal production (LORI, 1995) and also sub regionally in South East Asia (Defender et al. , 1997) and South Asia (Defender et al. , 2000). The significance of improved nutrition in dairy production is therefore a major consideration. The report of working group on milk (1999) indicated that the feed/fodder deficit was variously estimated at 15-30% of the total animal requirement in terms of total digestible nutrient. However, the shortage will be probably larger in terms of digestible protein and energy. Sward et al. (2001) explained that in Pakistan dairy animals are raised ender 3 different managerial feeding circumstances. ; In irrigated rural areas (Punjab & Kinds provinces) in the form of small herds where buffaloes and cattle mainly rely on crop residues and fodder crops. Under pier urban environment where dairy animals are maintained on fodder crops, agro industrial wastes and concentrates (oil cakes). ; Large herds of cattle are raised under range and brain conditions where they are kept on naturally grown grasses, shrubs and tree leaves. The major constraint in the development of dairy sector in Pakistan is poor availability of nutrients in quality and quantity for dairy animals. In Pakistan nutritional requirements of dairy animals mainly met through fodder crops, shrubs, grasses and agro industrial wastes. It has been reported that livestock are getting 51, 38, 3, 6 and 2% of their required nutrients from green fodder/ crop residues, grazing/vacant lands, post harvest grazing, cereal by products and oilcan's/meals, respectively forage still contribute about 75% of the nutrients but when grains are not available like in Pakistan, 95% nutrients are obtained through forages (Bull et al. , 1977). It was reported by the working group on milk (1999) that the shortage of feed and fodder in he country affected the production potential of dairy animals. The situation is further aggravated by the continuous increase in the number of dairy animals. Fodder yields have not significantly increased and low productivity per acre has further worsened its availability. It has been reported that Livestock are getting only 75% of the required amount of total digestible nutrient (TEND) and there is also shortage of digestible crude protein (CAP) up to 60% (Kara, 1990). Improvement in quantity and quality of feeds could bring improvement of livestock production up to 50% from exiting genetic pool of animals Hessian, 1983). The nutrient reservoir like rangelands are subjected to deterioration and still no proper attempt has been made to sustain and improve their productivity. Livestock farmers hesitate to use agro-industrial byproducts or non-conventional feed resources to improve livestock feeding because they are unaware of the usefulness of such materials and so strictly adhered to their traditional feeding Fig. 2. Seasonal availability of fodder Pakistan SEASONAL AVAILABILITY OF GREEN FODDER 25 FODDER (CANDIDACY 20151050 JAN FEB. MAR PAR MAY JUNE JULY GAUGE SEEP COT MONTHS NOVO DECK patterns. Area under fodder production is decreasing @ of 2% after each decade (Gill, 1998). According to Fig. 2, June-July and October-November are fodder scarcity periods in our region. Livestock policies in Pakistan are supportive to the horizontal expansion of livestock rather than vertical expansion of the sector, which cause further problems. Currently, 121. 1 million heads of animals require about 10. 92 and 90. 36 million tones of CAP and TEND, respectively, annually in Pakistan. However, the respective availability of these nutrients is only 6. 7 and 69. 00 million tones, which indicate a deficiency of 38. 10 and 24. % of CAP and TEND, respectively, per year (Sward et al. , 2001). Thus the existing available feed resources can only fulfill the maintenance requirements of animals. There is an immediate need to explore the available feed resources and to suggest remedies to minimize the gap between nutrients availability and nutrients requirements of animals (Sward et al. , 2001). The gap between requirement and availability of nutrients could be minimized through proper fodder research and extension policies in terms of better quality seed, seed rate, improved agronomic practices and improved inputs (fertilizers, water, suicides). Rangelands are 60% of the total area of Pakistan and proper range management and improvement policies like artificial reseeding, introduction of exotic species, water conservation methods and community organization could bring litter as a source of NP could help a lot to minimize the gap between protein availability and protein requirements of ruminants if proper coupling of nutrients at feed, digestive and cellular level is achieved. Agro industrial byproducts and non- conventional feed resources could be used for feeding of livestock if farmers are trained to do so. Situation may be further improved if year round fodder 423 system and fodder conservation techniques are introduced in livestock feeding systems. Establishment of cattle feed industry is required to provide dairy mixes to the farmers at cheaper rates. Usage of treated straws. Methods to improve the quality of straws have not gained popularity among the animal owners because the scientists contributed so little to increasing animal outputs in developing countries. There seems to be a number of reasons but among the strongest influences have been 1) the lack of opportunity for farmers to communicate their priorities for animal improvement to scientists and have the appropriate research undertaken, 2) the preoccupation of scientists with accurately describing the nutritional constraints under controlled conditions rather than to work on problems of farmers as they pertain to the field conditions, 3) the largely unrecognized or ignored differences in nutrient requirements of livestock in the tropics as compared with temperate countries, 4) an inability of many scientists to translate their research results into appropriate developments and apply them to farming systems, 5) logistic problems in aging the technology to the massive number of farmers in the developing countries who in general own only 1-5 animals, 6) gender considerations often information is not given to the real managers of livestock on a farm, 7) an unwillingness of farmers, who are risk averse to take up new technologies unless the rewards are large and/or immediate and 8) lack of market access, often aide programs push technology on to farmers rather than pull them into a production area by creation of markets. There appears to be an increasing ground swell for change and acceptance of innovation y farmers in many developing countries who are presently experiencing a substantial increase in demand for animal products, particularly in Asia, as the population expands and standard of living improves. The increase in demand for animal products is likely to be much higher than for plants in the less-well developed countries over the next 20-50 years (I. E. 3. 6% as compared with 2. % per annum for crops) There are other influences which have seen a change in attitude, particularly the need to consider environmental pollution in development projects and in reticular the value of curbing greenhouse gas emissions into the atmosphere from agriculture. Animal health. The importance of maintaining animal's health does not need to be expressed. This is the basic requirement, but despite the widespread veterinary hospitals and dispensaries, the prophylactic measures are not reaching down to farmers. Regular vaccinations program against foot and mouth disease, which affects the production severely and not only seasonally but has a lasting effect, and the prevailing bacterial/viral diseases, which cause mortality, should be effectively launched. In addition, heavy worm burden and arthropod borne diseases invades dairy population, and nematodes cause severe parasitic Castro-enteritis leading to low production. The parasitic problems further multiply due to poor management and unawareness of the farmers about the common control measures. Dairy production system. Dairy production in Pakistan competes with crop farming and under traditional agriculture farming; preference always goes to crop production because of high grain demand for human population. Existing livestock production systems in Asia have been well documented by various investigators such as that by Defender et al. 1997). Pakistan has similar dairy production systems like other developing nations in the region with little difference. Under Pakistani conditions dairy animals are kept under different production set ups including 1) grazing systems, 2) mixed farming system and 3) pier- urban dairy colonies (Defender et al. , 1997; Defender, 2001). Now this third category of dairy production is becoming important to supply fresh milk for urban population. Grazing system. This system is especially important for small ruminant (goat and sheep) and to lesser extent to the dairy animals (buffalo) in Pakistan. In this system, animals depend on grazing in open grasslands or lands not suitable for cropping. Pakistan has 63% of its area as rangelands that supports most of the cattle population in Balloonists, kinds and to lesser extent in Punjab province. Alpine pastures of northern high lands are vital for yak, which is the only milk source in northern areas. However buffaloes in Punjab and kinds provinces may use the natural vegetation around canal riverbanks, along roadsides and in wastelands. According to livestock senses (1996) only 8. 69% of cattle and 6. 28% of buffaloes in Pakistan totally reside on grazing and about 40. % of grazing cattle and 49. 3% of grazing buffaloes are kept in less than 10 animals/herd. Now it is being realized that grazing systems for animal production will become likely to deteriorate in future due to rising demands for food by high population growth rate in Pakistan. Mixed farming system. The ownership of 2-15 animals, in which milk production is major component of farm income, is the main characteristic of this system. This system is prevalent in Pakistan in which fodders, crop residues, agro industrial by products and weeds in cropland after harvest are used as animal feed. The much advance farm of mixed yester is smallholder dairying, which with additional input like mixed concentrate feeding and slightly better management practices are going to make its place in Pakistan. Defender (2001) reported that among the avenues of food production of animal origin, smallholder dairy production systems are potentially important. They are characterized by their rapid expansion, strong market orientation in rural areas and the many opportunities for increasing the current level of production. Some of the milk produced is used for home consumption, but most of it is sold directly by the farmer or to middleman. It is evident from the figures in livestock senses (1996) that this system is most important contributor to total milk production in Pakistan. According to livestock senses (1996) about 59. 3% 424 of total cattle and 45. 5% of the total buffalo population is dependent on both stall feeding and grazing that is the main characteristic feature of mixed farming system. About 57. 4% of buffalo and cattle population that is raised under this system is kept in small herds below 10 animals. This system is of a subsistence nature and resource-poor situation has not enabled intensification and specialization, mainly cause of access to services and resources. Pier urban dairy colonies. The government of Pakistan had launched a campaign to depopulate the livestock from metropolitan cities to avoid pollution problems. As a result of this campaign, a large number of buffaloes and cattle colonies have erupted in the periphery areas of big cities like Lahore, Karachi and Fusillades to meet the urban demand for fresh milk. The aim of confining milk production to rural areas is to reduce pollution and traffic load, mass migration to urban areas, to curtail genetic degradation of dairy stock and provision of employment opportunities in the rural areas. This system is more advanced and mature when compared to other systems. It is formed from a natural aggregation and concentration of small dairy holder units. The pier urban dairy colonies enable the farmer to improve their competitive edge in open market economies. Defender (2001) reported that Landed cattle colony in Karachi had about 220,000 animals in a 5 km radius. Pregnant animals are purchased from rural areas, and they are completely stall-fed on cereal straws, green fodders and concentrates. After calving, female calves are sold except for a small number, which are kept as placements for breeding while male calves are fattened for four months and slaughtered. At the end of lactation, dry animals are also sold out which are consequently slaughtered. Indiscriminate growth of these colonies in the absence of any regulatory and policy interventions has given birth to a serious situation, which is further complicated by poor hygiene, health hazards such as contaminated ground water, ever increasing unused manure. All this has adverse impact on the environment. Under this system of dairying stall feeding is preferably practiced, odder crops, agro industrial wastes and concentrate dairy mix are importantly contribute to the daily nutrient requirements of dairy animals. According to livestock senses (1996) about 31. 99 and 48. 71% of total cattle and buffalo population, respectively, is being wholly dependent on stall-feeding. In pier urban dairy colonies dairy animals (mainly buffalo) are kept under better feeding, management conditions and a good veterinary cover is now being advocated. However, number of problems likes fodder availability, milk collection and transportation facilities, proper manure disposal and availability of artificial insemination facilities are needed to be solved (personnel communication). As pier urban dairy colonies have large number of animals in specific areas so it is viable and feasible to develop these setups in to a modern dairy enterprise with relatively more ease. Milk production patterns. The dairy buffalo is the major contributor to the milk production by accounting for roughly 75% of all milk produced in Pakistan. Cattle account for the remaining production with small share coming from goat, camel and sheep. The Nil' Rave is most popular breed of buffalo and is Haven’t found the relevant content? Hire a subject expert to help you with Dairy Industry in Pakistan essay $35.80 for a 2-page paper
<urn:uuid:c9e7e508-62f1-4829-adb3-31cb17571822>
CC-MAIN-2021-10
https://phdessay.com/dairy-industry-in-pakistan-essay/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178381230.99/warc/CC-MAIN-20210307231028-20210308021028-00276.warc.gz
en
0.941592
6,133
2.90625
3
Billions of years ago, Mercury was choked in unimaginable amounts of lava. About six percent of the entire planet was covered in the lava of a single volcanic maelstrom. Not bad considering we weren't even sure Mercury had volcanoes. Technically speaking, all that lava didn't come from volcanoes, at least not the kind we're familiar with here on Earth. Instead, lava simply started pouring out of cracks in Mercury's surface somewhere between 3.5 and 4 billion years ago. The lava spread out throughout the north polar region, spewing out enough lava to cover 60% of the United States, or enough to bury Texas four miles deep in lava. (And no, that isn't a proposal.) It isn't just surface area we're talking about - the lava was a mile deep in places. Astronomers have wondered about the presence of volcanic activity on Mercury for decades, but it's only now with the arrival of the MESSENGER spacecraft in orbit around the planet that we can know for sure. The evidence for volcanoes on Mercury is subtle at best - there aren't any big mountain-like volcanoes on the planet, and the lava-covered regions don't look all that different from other areas, unlike the significant darker volcano-shaped highlands on the Moon. Indeed, the massive outpouring of lava created hundreds of square miles of almost completely smooth plains, making it difficult to detect any clear physical features, let alone those that would prove past volcanic activity. To find proof, Brown University researchers had to look 125 miles outside the volcanic zone to find a fissure vent, which is just like the cracks that spewed out lava all those billions of years ago - only this vent isn't buried underneath thousands of feet of preserved lava. Lead researcher James Head says this is the first confirmed evidence of volcanic activity on Mercury, but this single event was so gigantic that it's pretty much impossible that it was an isolated event. Now the hope is that MESSENGER can find even more evidence of Mercury's newfound chaotic past. Via Science. Image courtesy of James Head research group, Brown University.
<urn:uuid:4e565800-4327-4f12-8f91-18b8d9ebdbd3>
CC-MAIN-2017-39
https://io9.gizmodo.com/5845010/ancient-volcanic-eruptions-on-mercury-would-have-covered-most-of-the-united-states?tag=volcano
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686077.22/warc/CC-MAIN-20170919235817-20170920015817-00247.warc.gz
en
0.962693
434
4.125
4
American Jewry has grown in size, is largely connected to Israel, and the young generation can be engaged; is more diverse and divided than in the past Highlights from Prof. Leonard Saxe’s lecture at JPPI (edited by Dan Feferman). Despite (some of) the gloomy headlines from the recent Pew Study of American Jewry, along with reports about anti-Semitism, BDS and American Jews turning on Israel, there is much in the Pew data to be optimistic about. These were the main messages delivered by Professor Len Saxe, who heads the Cohen Center for Modern Jewish Studies at Brandeis University, in a presentation (13.7.21) to the Jewish People Policy Institute (JPPI). The myth of the vanishing American Jew Presenting his analysis of the recently published 2020 Pew Study of American Jewry, Saxe sought to refute the pervasive myth of the vanishing American Jew, a widespread assumption that growing rates of intermarriage were leading not only to assimilation but to Jewish disidentification; intermarried Jews are not shedding their Jewish identities and Judaism at the rates that were prevalent in past generations. The 2020 study places the number of American Jews at 7.5 million (5.8 million adults and 1.8 million children), which reflects a 36% increase since the 1990 National Jewish Population Study. Saxe notes that the 7.5 million estimate is close to a consensus view among researchers today. Its reliability is suggested by the fact that different methods: a national sample developed as Pew did, combinations of local studies, and the synthesis of religion data from hundreds of studies done by Brandeis’ American Jewish Population project, come to similar conclusions. Each documents increasing numbers of identified Jews, using the same criteria for inclusion that have long been used by social scientists studying American Jewry. This growth can be attributed to multiple factors, most notably, immigration and intermarriage. The immigration to the US of Jews from the former Soviet Union, Latin America and Israel has led to a net growth of American Jewry since 1990. At the same time, Saxe notes that the rate of intermarriage has brought new members to the community, particularly children of inter-married couples. Over the span of a single generation, children of intermarriage have doubled the rate at which they identify as Jews. Who is a Jew and who isn’t? Saxe explained that Pew’s estimate of 7.5 million American Jews is based, as with previous surveys, on a self-definition of who consider themselves Jewish, and who have an acceptable basis for claiming Jewish identity. Most of these individuals consider their religion to be Judaism (JBRs – Jews by Religion), but it also includes about a quarter of the Jewish population who think of themselves as Jews, even though they are agnostic or atheist. Pew labels these individuals as “Jews not by religion” (JNR). Saxe likens these Jews to Israeli “hiloni” Jews (secular). He notes that the in past surveys, many of these non-religious Jews would have responded that this is their “religion,” but that it has become more acceptable to be non-religious. The JNR population includes Jewish spouses in intermarried households, along with their children. The JNR group does not, however, include some 2.8 million adults who have Jewish parentage, but do not consider themselves Jewish and or have another religion. These individuals are labeled as having “Jewish Background” and not counted as part of the Jewish population. It also doesn’t include non-Jewish members of Jewish households; for example, a spouse who has not converted. Local Jewish communal leaders often want to include these individuals, but for demographic study purposes, they are not. Intermarriage is changing the landscape of American Jewry According to Saxe, one of the most important reasons that the population has increased is that, among millennials (born after 1981), the majority who are offspring of intermarriages identify as Jews when they turn 18. Thus, more than 60% of millennial Jews born to interfaith parents choose to identify as Jewish, versus fewer than 30% in the previous generation. A number of factors explain this shift, however, the major element seems to be that the collective Jewish world began to recognize the Jewishness of such individuals, and actively sought to engage with, rather than exclude them. The Reform Movement went so far as to recognize that those with patrilineal descent are also considered Jewish. Overall, 70% of non-Orthodox weddings in the past decade have been inter-faith marriages. And yet, if Saxe wished to point out one major cause for concern among Jewish leaders, it is that two in-married Jews are 93% likely to raise their children as Jewish by religion (JBR), while inter-married couples are only 57% likely to raise their children as Jewish (28% as JBR and 29% as JNR). Saxe pointed to a few key denominational trends taking place in American Jewry – some that can be seen in the Pew data, and some that are less visible, but that arise from the community studies he has conducted. The first is the collapse of Conservative Judaism – once the central movement in American Jewry. Part of this had to do with intermarried couples (especially men) in Conservative synagogues, feeling less at home, and moving to Reform congregations. Subsequently, this had the side-effect of bringing more traditional observance and knowledge to the Reform movement, which has remained steady. Secondly, Saxe pointed to the increase in those without a denominational identity. If in the past, this meant they were less likely to care about their Jewish identities, this increasingly means they might not have neat labels to express their Judaism (of course, many are relatively unengaged in Jewish life). Lastly, Saxe referred to what seemed to be a dramatic spike in the number of young Orthodox Americans. However, while there was a slight growth in the Orthodox population, the spike seen in Pew may be a methodological artifact (young Orthodox are more likely to be married and have a permanent address – making them easier to sample). Political Divisions, Anti-Semitism and Discrimination The Pew study pointed out that American Jews are as politically polarized as much of the general population, with 75% identifying as Democrats and 26% as Republicans. Among the various sub-groups, only the Orthodox primarily identify as Republicans. A point of interest – while all Jews perceived levels of anti-Semitism in society as worrying and at roughly equal numbers, Democrat Jews perceived discrimination against Blacks and Muslims at much higher levels than did Republican Jews. This might stem from Democratic Jews seeing anti-Semitism in a wider societal context than do Republican leaning Jews, who view it as specifically aimed at Jews. This difference has policy implications, when it comes to coalition building among civic, racial, and religious groups. Lastly on this matter, despite all Jews noting increased levels of anti-Semitism, it has yet to stop them from participating in Jewish life. Birthright Israel – the Case of Successful Policy Interventions and Covid-19 as a Live Test Case Saxe noted that, even if one is concerned about rates of engagement (religious and otherwise) that the Pew data also make clear that these trends are not fixed. The Pew 2020 data validate research that he has conducted – including a study of 4,000 young Jews who applied to Birthright during its first decade. Just as his research indicated, Pew found that among those who had been age-eligible for Birthright, those who participated were significantly more engaged Jewishly and more highly emotionally attached to Israel. Along with dramatic effects on Jewish identity, they also were much more likely to marry other Jews and near-universally, raise their children as Jews. Birthright’s success is suggested by the Pew data which indicates that among those who were eligible for Birthright, the majority of those who visited Israel went through Birthright. Among US Jews aged 25-34, one-quarter are Birthright alumni. He also pointed out that, while Pew reported that more than 70% of recent marriages of non-Orthodox Jewish marriages were to non-Jews, this doesn’t describe Birthright alumni. Among their respondents who were alumni, 54% were married to another Jew, vs 19% of those who had not been to Israel on Birthright. And while the 2021 Hamas conflict is too recent to examine, data from the 2014 conflict showed a significant difference between how non-participants felt vs participants, (33% of non-participants felt the 2014 conflict was unjustified versus 20% of participants). Similarly, having been to Israel greatly impacted one’s support for Israel during the 2014 conflict. Furthermore, while all those who had been to Israel showed significant increases in their levels of connection to and support for Israel, the greatest increases were among those who had the least connection to their Jewish identities and Israel prior to participating. Birthright alumni also had significantly more confidence in their understanding of the current situation in Israel than non-participants. The past year has served the Jewish community as a living test-case in many regards. Thus, Saxe attributes many of these successes to American Birthright participants forming personal connections to Israeli Jews, especially soldiers of varying political affiliations, during the trip. He assesses that these connections are critical in helping shape the understanding of Birthright participants about Israel and their connection to Israeli Jews, something that was disrupted during the past year. Saxe presented several key takeaways for policy makers that arise from the Pew data, and the past year of living with Covid. First, the growth of American Jewry should be seen by Israel as a very positive development. American Jews are a strategic asset. Second, American Jewry – perhaps no different than Israel – is diverse. American Jews think about their Judaism in different ways and have a different opinions about American and Israeli politics. Third, most American Jews, despite what might be believed in Israel, are connected to and supportive of Israel. And more importantly, this connection can be nurtured and developed through policy interventions, like Birthright. Fourth, establishing a human connection between American and Israeli Jews is crucial to forming relationships between the communities and shaping each group’s views on the other. The Covid experiment shows us what happens in the absence of such contact. Lastly, educational and outreach efforts should focus more on “amcha”, Ordinary Jews, not just those perceived to have leadership potential as has been done in the past. Many young Jews, especially those from interfaith backgrounds, seek a connection to Judaism and the Jewish community, yet feel they do not “know enough” to participate. Communal organizations and initiatives must work to better reach out to these, “meeting them where they are”, without judgement or a sense of elitism. For each sub-category of Jews, there must be different messaging and approaches.
<urn:uuid:c73ddcd2-6a3e-4080-8a19-1248fd965bde>
CC-MAIN-2023-06
https://jppi.org.il/en/despite-the-gloomy-headlines-american-jewry-has-grown-in-size/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500303.56/warc/CC-MAIN-20230206015710-20230206045710-00232.warc.gz
en
0.97441
2,273
2.515625
3
Nuclear energy is the energy that is trapped inside each atom. The ancient Greeks believed that the smallest part of nature is an atom. But they did not know 2000 years ago that atoms are made up of further smaller particlesa nucleus of protons and neutrons, surrounded by electrons, which swirl around the nucleus much like the earth revolves around the sun. One of the laws of the universe is that matter and energy can neither be created nor destroyed. But they can be changed in form. Matter can be changed into energy. Albert Einsteins famous mathematical formula E = mc2 explains this. The equation says: E [energy] equals m [mass] times c2 [c stands for the speed or velocity of light]. This means that it is mass multiplied by the square of the velocity of light. Scientists used Einstein's equation as the key to unlock atomic energy and to create atomic bombs. An atom's nucleus can be split apart. This is known as fission. When this is done, a tremendous amount of energy in the form of both heat and light is released by the initiation of a chain reaction. This energy, when slowly released, can be harnessed to generate electricity. When it is released all at once, it results in a tremendous explosion as in an atomic bomb. Nuclear energy can also be harnessed by fusion. A fusion reaction occurs when two hydrogen atoms combine to produce one helium atom. This reaction takes place at all times in the sun, which provides us with the solar energy. This technology is still at the experimental stage and may become viable in future. Uranium is the main element required to run a nuclear reactor where energy is extracted. Uranium is mined from many places around the world. It is processed (to get enriched uranium, i.e. the radioactive isotope) into tiny pellets. These pellets are loaded into long rods that are put into the power plant's reactor. Inside the reactor of an atomic power plant, uranium atoms are split apart in controlled chain reaction. Other fissile material includes plutonium and thorium. In a chain reaction, particles released by the splitting of the atom strike other uranium atoms and split them. The particles released by this further split other atoms in a chain process. In nuclear power plants, control rods are used to keep the splitting regulated, so that it does not occur too fast. These are called moderators. The chain reaction gives off heat energy. This heat energy is used to boil heavy water in the core of the reactor. So, instead of burning a fuel, nuclear power plants use the energy released by the chain reaction to change the energy of atoms into heat energy. The heavy water from around the nuclear core is sent to another section of the power plant. Here it heats another set of pipes filled with water to make steam. The steam in this second set of pipes rotates a turbine to generate electricity. If the reaction is not controlled, you could have an atomic bomb. But in atomic bombs, almost pure pieces of uranium-235 or plutonium, of a precise mass and shape, must be brought together and held together with great force. These conditions are not present in a nuclear reactor. The reaction also creates radioactive material. This material could hurt people if released, so it is kept in a solid form. A strong concrete dome is built around the reactor to prevent this material from escaping in case of an accident. Experiences with nuclear programmes differ and the future of nuclear power remains uncertain because of public reaction. But in the past few years the capacity of operating nuclear plants has increased more than twentyfold. There are more than 400 nuclear power plants providing about 7% of the world's primary energy and about 25% of the electric power in industrialized nations. The growth of nuclear power combined with the shift from carbon-heavy fuels such as coal and oil to carbon-light gas contribute to the gradual de-carbonization of the world energy system. Chernobyl, Three Mile Island, and other nuclear accidents have increased the fear of harnessing nuclear energy. Another issue with international and local implications is the storage and disposal of radioactive wastes: both from nuclear reactors making electricity and from the production of military weapons. Earlier disposal practices, such as dumping of nuclear waste at sea, have been completely stopped by formal treaty because of environmental concerns (and by cessation of furtive scuttling of nuclear submarines). Regimes for transport and temporary storage of civil and defence nuclear wastes now function, although sites and designs for permanent disposal have yet to be accepted. People are concerned about both low- and high-level radioactive wastes; the latter, though smaller in volume is more technically problematic. With the rise of nuclear electrification, the volume of spent fuel and other wastes has risen substantially; but is still small. In some countries such as the US, the volume of high-level waste from commercial power plants has now reached hundreds of millions of tonnes. For more information on Nuclear energy link to
<urn:uuid:ba0a0f52-d583-45d4-8ef8-c0cb3512fc48>
CC-MAIN-2017-04
http://edugreen.teri.res.in/explore/n_renew/nuclear.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00462-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944158
1,021
4.03125
4
The first printer was invented in 1983 but since then the printing technology has grown in leaps and bounds. Then a fiction, everything is turning into a reality through 3D printing technology. This technology is giving wings to several domains right from art to science. Although this technology is a bit slow compared to the conventional manufacturing, it might print unbelievable things and objects in the year 2014! Have a glimpse at some of them: So you think selfies are limited to Instagram? You might be wrong here as various companies are making use of 3D printing to manufacture figures of normal human beings rather than superheroes and celebrities. Oh yes. So don’t be surprised if you find your printed selfie right from wedding cakes to purses! A 3D Home You might have heard of 3D printed houses before but what you might be surprised with is the way they are created. At places like California, there are printing machines that release layers and layers of concrete to make buildings and beautiful houses that you might love to live in. Body parts for animals So you thought printing in 3D was limited to human body parts? Well, you might have to rethink as the ducks and horses too, are getting 3D printed arms and legs for themselves. There are examples wherein if the ducks have indulged into aggressive fights and have lost their limbs, they have got their 3D printed body replacement. Surprising, isn’t it? 3D printed crime scene Quite obviously, buying printed crime scenes might not be legal for you! But this technology might prove to be a real boon for the legal departments, police and crime busters. Some of the police stations based in Mexico have bought 3D scanners that recreate the crime scenes and their graphical representation so that they can get a better idea about the crime and the criminals. Can it get weirder? Imagine walking through printed soil structures! Oh yes. 3D printed models of soil are being created by the scientists so that they can draw analysis to the way micro-organisms thrive and interact in soil environment. Plastic printed soil can be created and the bacteria and fungi is introduced the soil for knowing how they move through it. Gives you creeps? Inflatable 3d flowers How about gifting inflatable 3D flowers to your beloved on the valentine’s day of 2014? While making these flowers, air is being forced into the cavities of the print so that the most complex flowers can be printed. And it is not just about flowers! Printing the most cumbersome and difficult designs forms too is possible due to 3D printing technology. So in case you have an encounter with any of the above 3D parts this year, don’t be surprised! You too, can get your prototypes printed at ease through any of the 3D printing companies.
<urn:uuid:c3a432d4-f8ed-430e-8842-1a25877fcd11>
CC-MAIN-2018-05
http://www.1click3dprint.com/blog/3d-printing/dont-be-surprised-if-you-get-3d-prints-of-these-things-in-2014/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893629.85/warc/CC-MAIN-20180124090112-20180124110112-00354.warc.gz
en
0.962282
574
2.78125
3