text
stringlengths 222
548k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 14
1.08k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 53
113k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
|---|---|---|---|---|---|---|---|---|---|
By Jesse J. Prinz
Forthcoming in W. Sinnott-Armstrong (ed.), Moral Psychology. Oxford University Press
Here is an excerpt:
The link between morality and human nature has been a common theme since ancient times, and, with the rise of modern empirical moral psychology, it remains equally popular today. Evolutionary ethicists, ethologists, developmental psychologists, social neuroscientists, and even some cultural
anthropologists tend to agree that morality is part of the bioprogram (e.g., Cosmides & Tooby, 1992; de Waal, 1996; Haidt & Joseph, 2004; Hauser, 2006; Ruse, 1991; Sober & Wilson, 1998; Turiel, 2002). Recently, researchers have begun to look for moral modules in the brain, and they have been increasingly tempted to speculate about the moral acquisition device, and innate faculty for norm acquisition akin to celebrated language acquisition device, promulgated by Chomsky (Dwyer, 1999; Mikhail, 2000; Hauser, this volume). All this talk of modules and mechanism may make some shudder, especially if they recall that eugenics emerged out of an effort to find the biological sources of evil. Yet the tendency to postulate an innate moral faculty is almost irresistible. For one thing, it makes us appear nobler as a species, and for another, it offers an explanation of the fact that people in every corner of the globe seem to have moral rules. Moral nativism is, in this respect, an optimistic doctrine—one that makes our great big world seem comfortingly smaller.
The chapter is here.
|
<urn:uuid:da9e41fd-1775-4e50-bf79-6e2e1b3c2ac6>
|
CC-MAIN-2018-47
|
https://www.ethicalpsychology.com/2015/06/is-morality-innate.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745800.94/warc/CC-MAIN-20181119150816-20181119172816-00465.warc.gz
|
en
| 0.928406
| 331
| 2.65625
| 3
|
Piri Reis (full name Hadji Muhiddin Piri Ibn Hadji Mehmed) (about 1465 – 1554 or 1555) was an Ottoman-Turkish admiral and cartographer born between 1465 and 1470 in Gallipoli on the Aegean coast of Turkey. Today, people remember him because of the maps he made. He made the first Ottoman map to show parts of the Americas, the Piri Reis map, in 1513. He drew a second map in 1528. Only a fragment of that map survives today. That fragment however, shows parts of North America, including Greenland. It goes from the coast of Labrador and Newfoundland in the north, to Florida,Cuba and parts of Central America in the south. Therefore, some people believe he drew a map of the Arctic about 200 years before it was discovered.
|
<urn:uuid:39f7bd45-d030-4d06-827c-7fc9c041e2e7>
|
CC-MAIN-2017-43
|
https://simple.wikipedia.org/wiki/Piri_Reis
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824471.6/warc/CC-MAIN-20171020230225-20171021010225-00063.warc.gz
|
en
| 0.943425
| 176
| 3
| 3
|
ASTRONOMERS around the world are banding together to save the nighttime sky. Besides their old enemies of light pollution and radio interference that drowns out cosmic radio waves, they now have to cope with a growing haze of orbiting space junk and even with urban heat. US Naval Observatory officials, for example, are concerned that heat from proposed high-rise buildings near their Washington, D.C., site would cause enough air turbulence to disrupt their traditional precision measurements of star positions.
So the International Astronomical Union has called a special meeting to consider ways to preserve our view of the cosmos. It will convene in Washington Aug. 13 to 16.
We all have a stake in this discussion because the sky belongs to everyone. As the IAU notes: ``The view of the night sky that our grandparents had is rapidly disappearing. ... Only in a few areas can the real night sky still be seen and all of these are far from cities. A whole generation is growing up that has never seen the Milky Way.''
As world population grows and cities spread, a certain amount of sky lighting is inevitable. But much of the brightening is excessive. It's a thoughtless use of lighting due to general unawareness of its sky-obscuring effect. For example, lighting billboards from below throws the light up into the sky. Lighting the billboards from the top down greatly reduces the glare.
Some observatories, such as the Kitt Peak National Observatory near Tucson, Ariz., have been able to control light pollution by working closely with local communities. Through careful display lighting, better streetlight shielding, and other measures, interference from urban lighting can be minimized. It amounts to only about 8 percent of the night sky brightness at Kitt Peak now.
Radio astronomy sites can also work to curb local sources of radio noise. But radio astronomers face a greater challenge in trying to keep key frequency bands clear for their use. These are the frequencies of natural cosmic radio emissions. There is strong pressure from a variety of radio users to gain access to as much of the radio spectrum as possible for earthly communications.
The space junk haze is part of the larger problem of orbital debris that threatens satellites and manned spacecraft. Here astronomers share a common cause with all space users in trying to find ways to reduce orbital trash. The debris could, of course, ruin orbiting observatories such as the Hubble Space Telescope, now due to be launched next year. But it also hurts ground-based equipment when reflected light ruins observations or even damages sensitive detectors.
Astronomers meeting next August are unlikely to come up with a comprehensive plan to solve all these problems, although they may have some specific practical suggestions. It will be accomplishment enough if they can begin to build an international awareness of the need for sky protection. Gaining that protection requires widespread cooperation locally, nationally, and internationally. And that means general agreement that it is an important common goal.
Loss of our view into space would be a tragedy for everyone. Who wants to live in a cocoon?
A Tuesday column. Robert C. Cowen is the Monitor's natural science editor.
|
<urn:uuid:cf39a9a9-498a-41c3-9e07-f97ff8833def>
|
CC-MAIN-2016-40
|
http://www.csmonitor.com/1988/0628/dbob28.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662541.24/warc/CC-MAIN-20160924173742-00268-ip-10-143-35-109.ec2.internal.warc.gz
|
en
| 0.945387
| 630
| 3.546875
| 4
|
14 November 2004
Obesity and diabetes currently threaten the health, well–being and economic welfare of virtually every country in the world. According to recent estimates of the International Obesity TaskForce, up to 1.7 billion people of the world’s population are at a heightened risk of weight–related, non–communicable diseases such as type 2 diabetes. IDF predicts that the number of people with diabetes will rise from 194 million today to more than 333 million by 2025 . Type 2 diabetes accounts for over 90% of diabetes cases, and the rise in type 2 diabetes appears to be mainly related to the increasing prevalence of overweight and obesity worldwide. Furthermore, the rising level of childhood obesity worldwide and the subsequent onset of type 2 diabetes have profound implications for the future. Since obesity and diabetes represent one of the biggest public health challenges of the 21st century, IDF has adopted the following position, in line with the recommendations of the World Health Assembly of May 2004:
- All–embracing strategies focusing on prevention and education at every level must be designed.
- Healthy dietary patterns need to be encouraged at an early age.
- Physical activity should form a central part of both childhood and adult lifestyles.
- Clear food labelling and a reduction in portion size are crucial factors in encouraging a healthy diet.
- Children should be protected from advertising, which promotes inappropriate (and unnecessary) consumption of energy dense (high calorie) food and drink.
- Creation of suitable footpaths, designed tracks and road schemes that allow safe walking, cycling and the use of play areas around the home and school.
- Change in school curriculum to encourage children to participate in sports and physical activity.
- Implement policies to control access to energy dense food and drinks, whether at home, on the way to school or at school itself.
- A ban on all forms of marketing of foods and drinks directed at children at school and on radio, TV and other avenues.
- Simple and understandable displays of the composition and energy density in all eating establishments.
- Monitoring food consumption patterns and the prevalence of diabetes in the population.
|
<urn:uuid:4a2fe665-1a58-41bb-8625-6541e6648ec8>
|
CC-MAIN-2019-09
|
http://www.aarogya.com/support-groups/diabetes/diabetes-and-obesity-a-global-problem.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249495888.71/warc/CC-MAIN-20190223082039-20190223104039-00217.warc.gz
|
en
| 0.923528
| 428
| 3.453125
| 3
|
Climate Change Could Make Common Clouds Extinct, Which Would Scorch the Planet
If humanity pumps enough carbon dioxide into the atmosphere, one of Earth’s most important types of cloud could go extinct. And if the stratocumulus clouds — those puffy, low rolls of vapor that blanket much of the planet at any given moment — disappear, Earth’s temperature could climb sharply and radically, to heights not predicted in current climate models. That’s the conclusion of a paper published today (Feb. 25) in the journal Nature Geoscience.
Clouds have long been one of the great uncertainties of climate models. Clouds are complicated, small and fast-changing. Computer models that easily capture the complexity and detail of most climate systems just aren’t powerful enough to predict worldwide shifts in cloud behavior.
But clouds are important. They dye a wide swath of the atmosphere white, as seen from space, reflecting sunlight away from Earth’s surface. And stratocumulus clouds are an important part of that picture; they’re those white blankets you might have seen as you looked out the window of an airplane, rolling out below you and hiding the ground. Researchers suspect that certain sudden, past jumps in temperature may have been caused by changes to clouds like these.
And once the stratocumulus clouds are gone, Wolchover reported, they likely wouldn’t reappear until atmospheric carbon dioxide levels dropped below where they are currently.
Evidence for Man-Made Global Warming Hits ‘Gold Standard’
Evidence for man-made global warming has reached a “gold standard” level of certainty, adding pressure for cuts in greenhouse gases to limit rising temperatures, scientists said Monday.
“Humanity cannot afford to ignore such clear signals,” the U.S.-led team wrote in the journal Nature Climate Change of satellite measurements of rising temperatures over the past 40 years.
They said confidence that human activities were raising the heat at the Earth’s surface had reached a “five-sigma” level, a statistical gauge meaning there is only a one-in-a-million chance that the signal would appear if there was no warming.
|
<urn:uuid:96f5a98b-cee7-40e6-8466-a64dcb01c83b>
|
CC-MAIN-2019-22
|
http://www.reportfrompeter.com/index.php/global-warming-546/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232261326.78/warc/CC-MAIN-20190527045622-20190527071622-00409.warc.gz
|
en
| 0.927002
| 453
| 4.125
| 4
|
If you have forgotten the local administrator password, the orthodox methods approved by Microsoft requires the password reset disk, or a complete reinstallation of the OS. Sometimes the hardware manufacturer have built the factory recovery to be loaded at bios and you can use the function keys to activate. Other times if it is integrated into the Windows Repair, then you could be out of luck because access Windows Repair will require the administrator password as well.
This method uses a vulnerability in Windows 7 using the sticky key function. The idea is that the sticky key program active before user log in and thus we can use it to run the command prompt in administrator mode to reset the password. One requirement though: we will need the Windows OS installation or boot disk for this trick. Steps as follows:
Restart the computer to boot using the CD. Once the GUI loads, press SHIFT+F10 to bring up the command prompt. Using the command prompt, we will make a backup of the sticky key sethc.exe program first, and then override it with cmd.exe using the following commands.
// d: drive is actually the system drive, normally c: drive in Windows. // But booting using the CD, it becomes some other drive letter, like d: drive. // Hence you need to try several drive letters first. if you cannot find it at once. // make a backup of sethc.exe copy d:\windows\system32\sethc.exe d:\ // override with cmd.exe copy d:\windows\system32\cmd.exe d:\windows\system32\sethc.exe
Once this is done, restart the computer and let it boot up to the windows logon screen normally. At the Windows logon screen, press the SHIFT key 5 times repeatedly and the cmd.exe will run. If it does not work, use the mouse to find the accessibility icon on the bottom left and turn on the sticky key feature.
In the command prompt, we will reset the password using the following commands”
// list users net user // reset password with net user <username> <new-password> net user admin Xna24iK
Now you can log in with the new password.
Remember to restore the sethc.exe from the backup to prevent others from easily changing your password!
|
<urn:uuid:86ac1921-40d4-4983-ba07-1994d2278c64>
|
CC-MAIN-2017-09
|
http://www.jakesee.com/2014/09/reset-forgotten-administrator-password-on-windows-7/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00485-ip-10-171-10-108.ec2.internal.warc.gz
|
en
| 0.824191
| 478
| 2.59375
| 3
|
Takagi (高木) curves are fractals that are somehow less known than Cantor sets and Sierpinski carpets, yet they can also be useful as (counter-)examples. The general 高木 curve is the graph of a function that is built from triangular waves. The th generation wave has equation where means the distance to the nearest integer. Six of these waves are pictured below.
Summation over creates the standard 高木 curve , also known as the blancmange curve:
Note the prominent cusps at dyadic rationals: more on this later.
General 高木 curves are obtained by attaching coefficients to the terms of the above series. The simplest of these, and the one of most interest to me, is the alternating 高木 curve :
The alternation of signs destroys the cusps that are so prominent in . Quantitatively speaking, the diameter of any subarc of is bounded by the distance between its endpoints times a fixed constant. The curves with this property are called quasiarcs, and they are precisely the quasiconformal images of line segments.
Both and have infinite length. More precisely, the length of the th generation of either curve is between and . Indeed, the derivative of is just the Rademacher function . Therefore, the total variation of the sum is the norm of . With the sharp form of the Хинчин inequality from the previous post yields
For the upper bound I added 1 to account for the horizontal direction. Of course, the bound of real interest is the lower one, which proves unrectifiability. So far, a construction involving these curves shed a tiny bit of light on the following questions:
Which sets have the property that any quasiconformal image of contains a rectifiable curve?
I won’t go (yet) into the reasons why this question arose. Any set with nonempty interior has the above property, since quasiconformal maps are homeomorphisms. A countable union of lines in the plane does not; this is what 高木 curves helped to show. The wide gap between these results remains to be filled.
|
<urn:uuid:e9b24894-af7c-41cb-ac8a-b2cd8a43f223>
|
CC-MAIN-2019-13
|
https://calculus7.org/2012/02/04/sweetened-and-flavored-dessert-made-from-gelatinous-or-starchy-ingredients-and-milk/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202711.3/warc/CC-MAIN-20190323020538-20190323042538-00511.warc.gz
|
en
| 0.950962
| 458
| 2.515625
| 3
|
Hair loss in medical terms called as alopecia which means loss of hair from an area of the head or sometimes full head is involved. It can be caused either because of hormonal changes or medical conditions and medications but in some cases it is familial, and the cause is primarily hereditary running in families. Anyone male, female or kids can get affected. Baldness typically means excessive hair loss from the scalp and is more common in men than women that can be treated with simple hair loss remedies.
Causes Of Hair Loss
Normally 50-100 hairs on average shed from your scalp daily but this number of shedding does not cause significant hair thinning as new hair keeps on growing as the older ones shed. But when this cycle of hair shedding and healthy hair growth is disrupted due to any reason causing more to shed than growing you’ll experience hair thinning and latterly feeling of hair loss. Common causes of hair loss are:
Many physiological and pathological condition which causes hormonal imbalances provoke hair loss like in pregnancy, menopause, discontinuing your birth control pills, thyroid diseases and many others causing up and down of normal hormonal levels can cause hair loss.
This class includes certain common nutrient deficiency which besides other symptoms causes hair loss. Vitamin D, vitamin B, copper, zinc proteins are common among them. Proteins are most important for hair health. Deficiency in any of these will result in hair loss.
Certain medicines are linked to the side effects of hair loss including drugs used for arthritis, cancers, cardiac problems, blood pressure, birth control. Taking too much vitamin A is also linked with hair loss.
These include many conditions. Extreme stress and depression being the commonest cause of hair loss among youngsters nowadays. Anemia, hypothyroidism, SLE, cancer and many other diseases can cause hair loss. Certain scalp infection also causes hair loss.
How to Stop Hair Loss
Hair loss being a very serious issue for many people but the good news is almost every type of hair loss is treatable now. You can either opt for medications or surgeries such as the popular neograft operation. But before you consider medical intervention, we recommend you try some of our highly effective hair loss remedies. It is highly recommended to make medical management your last resort as medications have side effects and operations may not always be suitable for your situation.
We are not writing these home remedies for hair loss by copy and pasting from other sites, in fact, we have personally tried these on many people by recommending them, and they have a positive response. These people also like our article on Home remedies for Baldness.
Home Remedies For Hair Loss
It takes a big heart to cope up with hair loss or to spend a life with thin hair. But why you are coping when we have the best natural remedies for hair loss. Just give them a try, and you don’t have to wear caps and hats to hide your hair loss.
Massaging has a very positive effect on natural hair growth as it increases blood circulation and certain oil promote natural hair growth. Advisable to use coconut oil, olive oil, almond oil, castor oil, amla oil, argan oil. If you want to get faster results we recommend you to add few drops of rosemary essential oil in any one of the above-mentioned oils. Warm the oil and then massage into the scalp properly, leaving for almost an hour before washing. Do this twice weekly for good results. Oil massage is one of the best home remedies for hair loss.
Onions are rich in sulfur which is an important nutrient to promote healthy hair growth by promoting collagen production, regeneration of hair follicles. Squeeze juice of onion and apply it to your scalp. Leave for approximately 15 minutes before washing. Do this twice weekly to stop hair loss.
Amla Or Indian Gooseberry
Commonly known as amla richest source of vitamin C. powerful antioxidant, anti-inflammatory, anti-bacterial helps to maintain a healthy scalp and promotes natural hair growth. Make a mixture on one tablespoon of amla or Indian gooseberry pulp with one tablespoon of lemon juice. Massage your scalp thoroughly with the mixture. For better result leave it overnight and then wash in the morning.
The egg is rich in protein, sulfur, zinc, phosphorus, iodine. Using egg as home remedies for hair loss is one of the effective mixtures as all ingredients present in it are essential for natural hair growth.
Take egg white and make its paste with olive oil massage it in the scalp and after leaving for 20-30 minutes wash it off. Do this twice weekly to get the best results.
Hibiscus flowers have many natural properties making it best and effective home remedies for hair loss. Besides hair fall treatment it also cures dandruff and thickens hair.
To make its paste for application on scalp make a mixture of 10 hibiscus flowers in coconut oil by heating the solution. After cooling down apply this oily mixture on your scalp. Best to leave overnight and rinse in the morning. Recommended using twice weekly for faster hair growth.
Commonly known as “methi” is again effective natural remedies for hair loss. It enhances healthy hair growth by regenerating hair follicles and also stimulate hair growth because of richness in proteins. You can use it by soaking fenugreek seed in water overnight. Make its paste in the morning and apply it on the scalp. Rinse after an hour. Using this regularly can minimize your hair fall and makes your hair grow faster.
Good Hair Care
Hair loss prevention is not as difficult as its treatment (so long as the hereditary factor is not involved), in fact there are many ways you can change your haircare habits to prevent hair loss and damage. Here are a few:
- Use hair dryers, hair straighteners and curlers as minimum as possible. Make sure to use natural ways to protect against heat damage before using hair stylers too.
- Don’t use hair dyes and other solutions to beautify your hair as they all contain toxic chemicals which damages your hair and promotes hair fall.
- Try avoid hair styles that are very tight on the scalp, these pull the hair roots from the scalp and can weaken the root.
- Use a mild good shampoo for hair washing and do not use shampoo too frequently as it can take away natural oils for hair maintenance from your scalp.
- Do an oil scalp massage with once weekly for your hair health.
|
<urn:uuid:51e9a014-773a-49ac-ad06-b4a078607b69>
|
CC-MAIN-2022-49
|
https://www.100homeremedies.com/home-remedies-hair-loss/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711552.8/warc/CC-MAIN-20221209213503-20221210003503-00823.warc.gz
|
en
| 0.953277
| 1,368
| 2.53125
| 3
|
British Empire, in history, the United Kingdom of Great Britain and Northern Ireland and the lands and peoples under its control. Although the Empire's foundation dates back to the 16th century, the term “empire" was not used officially until Queen Victoria became empress of India in 1876. During the period of its greatest extent, in the late 19th and early 20th centuries, the British Empire encompassed the largest area ever governed by one country. It was said that the sun never set on the Empire, so vast was its area.
By the mid-20th century, the British Empire had ceased to exist. It had been replaced by the Commonwealth of Nations, a voluntary association of Britain and many of its former possessions for mutual economic and political benefit. The transition from empire to Commonwealth was the eventual result of Britain's policy, begun in the mid-19th century, of granting self-government (and ultimately independence) to its possessions. (
In the late 15th century, England began seeking new sources of trade and treasure. These explorations led to the addition of new territory and to the establishment of an empire. The development of the empire was made possible, in large measure, by the English navy's control of the seas.
In 1583 England claimed sovereignty over Newfoundland, thus acquiring its first overseas possession. Soon after 1600, the English founded a line of settlement colonies along the Atlantic coast of North America. The East India Company, chartered as a trading company in 1600, began English expansion in Asia. Between the mid-18th and mid-19th centuries, the company overcame French, Portuguese, and Dutch attempts to oust it from India. It established itself as the ruler of much of India. In 1858 the British government took over the company's rights and responsibilities.
To protect the sea routes to its dependencies, Britain took possession of other territories in widely scattered regions. It acquired some territories by establishing settlement colonies. Australia is an example. Other possessions, such as Singapore, began as trading colonies. Still others, such as the Falkland Islands, came into the empire through discovery and occupation. In many parts of Africa, new regions were first entered by explorers, traders, or missionaries; soldiers then followed to establish protectorates and colonies.
The British gained much territory as a result of wars. They drove the French out of North America after decades of conflict, ending with the Seven Years' War (1756–63). Through the Napoleonic Wars (1800–15), the British won many colonies from the French and the Dutch. During World War I (1914–18), Britain captured German and Turkish possessions, which it then administered as mandates under the League of Nations. Most of these territories became trust territories under the United Nations in 1946, after the League was dissolved.
As various British colonies developed economically and politically, tensions grew within the Empire. The first crack in the imperial structure came as a result of the American Revolution (1775–83). The resulting loss of 13 of Britain's colonies led to a reexamination of colonial policy. Enlightened British statesmen came to accept the doctrine of Adam Smith that both the mother country and the colonies would benefit if the colonies were given greater freedom.
Lord Durham's report of 1839, describing discontent in the Canadian colonies, caused many British officials to urge the granting of self-government to the more politically advanced colonies. Accordingly, Canada was given self-government in 1867, Australia in 1901, New Zealand in 1907, and South Africa in 1910.
When Canada and the other territories were first granted self-government, they were called dominions. They controlled their internal affairs but were dependent upon Great Britain in foreign affairs. Eventually, the dominions were given complete independence. At the Imperial Conference of 1926, the freedom and equality of the dominions were established and the idea of a Commonwealth of Nations was proclaimed. These resolutions were given legal standing by the Statute of Westminster in 1931.
From that time, the dissolution of the Empire and the development of the Commonwealth proceeded simultaneously. The word “empire" was officially dropped in 1947, when King George VI relinquished the title emperor of India upon granting independence to India and Pakistan.
|
<urn:uuid:7515d426-54fb-446b-836f-17d16b4e679e>
|
CC-MAIN-2015-27
|
http://history.howstuffworks.com/european-history/british-empire.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098196.31/warc/CC-MAIN-20150627031818-00053-ip-10-179-60-89.ec2.internal.warc.gz
|
en
| 0.974001
| 858
| 3.6875
| 4
|
Below are some terms that are often not understood, misunderstood, and misused. In trying to explain technology terms, one immediately confronts the “chicken and egg” dilemma: to understand one term, you have to understand another. I have tried my best, but some things are just a problem in this regard. Therefore, you may find find that you must bounce up and down the pages.
Network: This is the commonly used term for the 4 pairs of twisted wires making up the cable that connects computers and other devices within a specific area, which is called a local area network or LAN. The standard for this wiring has been cat5, but now cat6 is also being used since it is of a quality that gigabit signals can be transmitted. The technologies that use these wires is called ethernet. Network also refers to the group or “network” that communicate with each other in predefined area (also called a “Local Area Network” or LAN). A network outside of a LAN is a “Wide Area Network” or WAN. These two can be joined using a firewall.
DNS: This stands for “Domain Name System”. Your email address for instance, is a domain name. This system converts human names for addresses into a digital format: ###.##.###.##. Servers are used to assign the IP addresses and mapping them so that the addresses can be found on the internet.
IP: This stands for “Internet Protocol”. There are standards for transmitting data and voice over the internet which includes size of the data packets and encoding – this has now been generically referred to as “IP”. An IP address identifies the end devices, or nodes, participating in a computer network. Every computer, for instance, has a unique number associated with it – the IP address may be public or private. (Very few computers have public.)
MAC Address: This is the “Media Access Control” address for devices used on a computer network. You can think of this address as a serial number for the device.
Firewall: This is a device that controls access into and out of a network. Sets of rules are used to govern access and traffic. Software for spam filtering, virus protection and content filtering are installed on firewalls. A firewall can also perform router functions.
Router: This device can forward traffic from one type of network to another. Your internet cable, for instance, goes through a router that connects the internet signal to the network in your office or home. You can think of a router as the traffic manager of the network.
Switch: A switch connects network segments and may contain a router.
Server: This has become a near meaningless term, although everyone continues to use it for lack of a a better one. A “server” was once a computer dedicated to providing (serving) other computers (clients) with a specific application, like email or shared files. Now one machine can be used to perform multiple server functions including servicing other servers. (See Virtual Server below.)
Virtual Server: We use VMWare which is licensed software that allows one computer, configured with an adequate amount of memory, speed and storage, to provide multiple functions for the users on a network. Most businesses require multiple “serving” functions: DNS, file storage, email, etc. With virtual servers it is possible to use one piece of hardware instead of a server for each function as is typically done. It is also easier to backup – one machine instead of many. This is definitely a “Green” way to go.
Remote Desktop: This is a term to describe software that allows the user to work on a computer that is physically remote from the computer they are in front of. They can do so, so transparently, that the user finds it hard to know that the computer is not sitting next to them.
Client: This is usually the term for a computer work station that depends upon a “server” for application software and data, or just data.
Thin Client: This is a computer workstation that does not have any computing power and depends upon a server to provide the applications and data to allow a user to proceed to use the work station in a “session”. When the work is done, the user exits and another user can sign into the work station to use it. (It is “thin” because of the lack of a hard drive and they need little processing power.)
VPN: This stands for “Virtual Private Network”. It is a way to have a secure link between two locations.
FTP: This stands for “File Transfer Protocol”. An FTP is a protocol for transferring data between independent systems.
VoIP: This is an acronym for “Voice over IP”. This is a technology for transmitting Voice using an Internet Protocol. Instead of using the two wire protocol used by the legacy analog telephone systems we are all familiar with, this technology uses local networks and the internet for transmitting phone calls. The telephones contain a computer chip which allows the phone to connect to the network and the internet. Great technology for small and large businesses.
SSD: This is an abbreviation for “Solid State Drive”. Hard drives have spinning disks, also called platters where data is written, stored and retrieved. These spin at very high speeds with arms that move in and out writing and reading encoded data. Hard drives are fragile because of the moving parts. A solid state drive has no moving parts so they are less prone to damage and they run cooler. SSDs are completely made up of transistors. The advantage of SSDs is that they have no moving parts and are very fast. Currently SSDs are slightly more expensive, but because of the advantages we routinely recommend SSD to all of our customers when they purchase new computers. We do so because SSDs provide the highest performance increase for the money.
The Cloud: The “cloud” has become a catchall term. It is basically a term for a variety of services obtained from a provider that is at another location. Services such as file storage, backups, applications, etc. can be obtained for a monthly fee instead of purchasing a current version. By using cloud services the services are not location dependent and thus can be accessed from anywhere.
Operating System (OS): The operating system of a computer is the software that processes and coordinates hardware and software of the computer. There are a three major OS: Windows, Apple OS, and Linux. While there are many similarities in the different OS, there are definitely differences. Linux is one that developed out of the “open source” community. Thousands of developers from all over the world created it as a free alternative to Windows. It is an OS preferred by many for personal computers and is used in smart phones, some pads, etc. The Apple OS can only be used with Apple hardware.
Flash Storage: Flash storage is a type of “read only” data storage that has no moving parts and does not need power to keep the data stored. As storage capacity on chips has increased, it is now possible to store very large amounts of data on portable storage devices known as thumb drives, flash drives, or jump drives. They are great for taking files with you on a small device or for making backups that can be stored in a safe place.
Malware: This is a blended word made up of “Malicious” and “Software”. It is software that is designed to get into computers to do damage, to commit a crime, to find and use information (your contacts information for instance), to take over your computer, to hold your data ransom, etc. There are a many types of malware called viruses, worms, spyware, adware, etc. They all are designed to get into your computer and then do a specific job.
As you encounter words and phrases you do not know, just go to “Wikipedia”. You will usually find definitions that are easy to understand. But they also take the definitions deep into technical areas for those who want it.
The information shared here should not be used as a substitute for what can be found in books, articles, etc. written by experts. This was written to help you see through the fog of information technology jargon so that you can ask better questions and improve your understanding.
|
<urn:uuid:77eba927-8cf6-45cf-a456-622a59d065b7>
|
CC-MAIN-2018-51
|
https://www.keystoneit.com/techie-talk/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823785.24/warc/CC-MAIN-20181212065445-20181212090945-00524.warc.gz
|
en
| 0.95192
| 1,736
| 3.984375
| 4
|
Mechanism The arrangement or association of the elements or parts of anything in relation to the effect they generate; the combination of mental processes by which an effect is generated.
1. In dysmorphology (the study of birth defects), the nonrandom occurrence in two or more individuals of a pattern of multiple anomalies (birth defects) not known to be a malformation syndrome (such as Down syndrome), a malformation sequence (of events) or what is called a polytopic field defect (in which all of the defects are concentrated in one particular area of the body). An example of an association in dysmorphology is the VACTERL association of birth defects. 2. In genetics, the occurrence together of two or more characteristics more often than would be expected by chance alone. An example of association involves a feature on the surface of white blood cells called HLA (HLA stands for human leukocyte antigen). A particular HLA type, HLA type B-27, is associated with an increased risk for a number of diseases including ankylosing spondylitis. The extent of the association is enormous. Ankylosing spondylitis is 87 times more likely to occur in people with HLA B-27 than in the general population.
Substances that comprise all matter. Each element is made up of atoms that are identical in number of electrons and protons and in nuclear charge, but may differ in mass or number of neutrons.
In people who require heart valve replacement surgery, it is sometimes desirable to implant a mechanical valve. A mechanical valve is made of artificial parts and functions similarly to a normal heart valve. People who have a mechanical valve implanted must take blood thinners lifelong to prevent blood clots from forming on the mechanical valve.
PREVIOUS AND NEXT TERMS--------------------------------------
Sadomasochistic vernacular term for the sadistic partner whose role is one of total domination and disciplinarian.
Sexuoerotic genital self-stimulation by pressure or touch, self-stimulation, usually though not necessarily climaxing in orgasm [from Latin, manus, hand + st[u]parare, to deflower, ravish, fornicate, or to engage in adultery, incest, or rape]. From its Latin derivation, the literal meaning of masturbation is to use the genitalia to ravish or rape the hand. etymologically, hand-rape, the manual practice of erotic self-stimulation, formerly stigmatized as a crime against nature. Today it is considered normal and healthy and is not limited to either the hands or the self. It includes digital stimulation of the genitalia of a partner as well as of oneself.
Cognitional rehearsal of erotically stimulating activity that accompanies, and may precede, an episode of masturbation. To the extent that the content of its imagery and ideation, like that of a sleeping dream, has a high degree of autonomy and individual specificity in its power to stimulate genital arousal, it is not voluntarily chosen or preferred. 2. Imagery of erotically stimulating content that accompanies, and may precede, an episode of masturbation. Like the imagery of a sleeping dream, its content has a high degree of autonomy and is not voluntarily chosen.
A sexual birth defect characterized by impaired differentiation of the Müllerian ducts so that the uterus is rudimentary and cordlike. The deep part of the vagina is absent and the outer part is shallow or in the form of a dimple. The fallopian tubes may be defective, and there may be other sporadic congenital anomalies. The ovaries are normal and induce normal femininizing puberty, except for lack of menstruation secondary to the defective uterus. Psychosexual differentiation is as a female.
An opening or passageway in the body, such as the urinary meatus.
Medroxyprogesterone acetate (MPA)
The generic name of Depo-Provera. It has many of the physiological properties of progesterone, and so is known as a synthetic progestin, although in chemical structure it is actually an androgen, like testosterone, which is closely related to progesterone. Therapeutically, MPA has varied uses: to suppress ovulation (in the birth control pill); to prevent spermatogenesis (as a male contraceptive); and as an antiandrogen to suppress androgen release and sexuoeroticism, reversibly, in male sex offenders. 2. A pharmaceutical hormonal product marketed under the name of Provera or Depo-Provera.® It has many of the physiological properties of progesterone, and so is known as a synthetic progestin, though in chemical structure it is actually an androgen, like testosterone, which is closely related to progesterone. Therapeutically, medroxyprogesterone acetate has varied uses: to suppress ovulation (in the birth-control injection or pill); to prevent spermatogenesis (as a male contraceptive); and as an antiandrogen to suppress androgen release and libido, reversibly, in male sex offenders (chemical castration).
Menage a trois
See troilism [French, household of three].
An endocrine cycle of 28 days in women which includes fluctuations in estrogen and progesterone, the events of enodmetrial development, follicular maturation, ovulation, changes in cervical mucus secretion, breast vascularization changes, and if pregnancy does not occur, menstruation.
In women, the periodic (monthly) bloody discharge from the uterus and vagina approximately two weeks after ovulation.
One of a group of paraphilias characterized by triumph wrested developmentally from sexuoerotic tragedy by means of a strategy that incorporates sinful lust into the lovemap on the condition that it be traded, bartered, or purchased and paid for, not freely exchanged, since it irrevocably defiles saintly love.
We thank you for using the Health Dictionary to search for Mechanism. If you have a better definition for Mechanism than the one presented here, please let us know by making use of the suggest a term option. This definition of Mechanism may be disputed by other professionals. Our attempt is to provide easy definitions on Mechanism and any other medical topic for the public at large.This dictionary contains 59020 terms. |
|
<urn:uuid:f869312b-6c91-48bd-90ab-f9abde2fcf8d>
|
CC-MAIN-2015-27
|
http://www.healthdictionary.info/Mechanism.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096579.89/warc/CC-MAIN-20150627031816-00207-ip-10-179-60-89.ec2.internal.warc.gz
|
en
| 0.919888
| 1,307
| 2.765625
| 3
|
Source: Classical literature
The dpa'dam (དཔའ་དམ་) is the long sword of the Tibetan cultural sphere.1 Alternatively, it can be spelled pa tam (པ་ཏམ་) under which it is found in a Qing multi-language dictionary of 1766.2 The Chinese equivalent given here is yāodāo (腰刀) or "waist sword", and loho in Manchu.
It is of somewhat archaic form; straight single-edged with back and edge running parallel until the oblique tip. The scabbard is often made with an iron U shaped frame that holds two wooden plates.
A dpa'dam of archetypical form but of superior workmanship.
Sold by Mandarin Mansion in 2018.
The blades often exhibit a number of dark lines of so-called "female iron" or mo lcags forged into layers of lighter "male iron" or pho lcags. The light steel has a higher carbon content, making the hard parts of the sword -including the edge- while the softer steel adds toughness and resilience to the construction. Many cultures have devised similar ways to make swords out of different types of steel. What sets the Tibetans apart is that their smiths worked in high altitudes with low oxygen levels and limited fuel, making it more difficult to heat large forges to high temperatures. As a consequence, they devised ways to weld the layers together using a minimum of heat, stacking the layers instead of folding them. This results in the typical "hairpin pattern", named so after the hairpin-like shape of its various layers.
Joseph Rock (right) with the Prince of Choni (left) wearing his dpa'dam.
National Geographic Society, 1925.
1. Donald J. Larocca; Warriors of the Himalayas; Rediscovering the Arms and Armor of Tibet, The Metropolitan Museum of Art, New York. Yale University Press, New Haven and London. Page 274.
2. Wuti Qingwen Jian (五體清文鑑) or "Five languages compendium", a Qing imperial dictionary in Manchu, Mongolian, Uighur, Tibetan and Chinese of 1766. Published under the Qianlong emperor.
|
<urn:uuid:085130c9-c239-4a43-857d-2b78529261cb>
|
CC-MAIN-2023-23
|
https://www.mandarinmansion.com/glossary/dpadam
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00248.warc.gz
|
en
| 0.89118
| 504
| 3.25
| 3
|
Fukushima no Chernobyl but will reignite nuclear fear - physicist
The earthquake and the explosions that followed it at the nuclear reactors of the Fukushima plant are likely to have damaged the sensors (temperature, pressure, water level etc.) and distorted the contact between the control room and the reactors. Now there is no reliable information about what is really going on inside the reactors, Patterson explains.The author of the book on energy, Keeping the Lights On, fears that the real problem is that once the fuel rods melted and uranium fuel got into the water, the chain reaction started again.Japan is now in an unprecedented situation believes the physicist.“It would be bad enough if it were normal times, but this is after an earthquake and an enormous tsunami, when the communication channels and the normal organization even of a society as organized as Japan has taken a terrible hit. So, the fact that they now are faced with a problem like a nuclear problem – they already have more on their hands than anybody could possibly imagine… it is brutally difficult for both the government and the people of Japan,” commented Patterson.He revealed that the water-cooled reactors used at Fukushima-1 power plant were originally designed in the US to be used in submarines and are very specific as they are compact but very productive. This only added sophistication to the already very much complicated technology and the track record of this type of reactor, criticized a lot in the US, is not good. “I found last night an article that I wrote nearly 40 years ago, describing an intense controversy in the US about the performance precisely of the so-called “emergency cooling systems on water–cooled reactors,” Patterson remembers. "Their performance was criticized by independent experts in the US but then the establishment of the US Atomic Energy Commission waved the concerns aside. This was at the time when Fukushima-1 was built.”But Patterson hopes the Fukushima emergency will be “a long way shorter” than that of Chernobyl because in the case of Fukushima there is no mechanism that could distribute radioactivity like there was in Chernobyl, where a hot air spew carried radioactivity right into the stratosphere and then carried it all over the planet by stratospheric winds. Still, the fires at the station are lifting some radioactive particles into the air which could be carried some distance by wind.According to Patterson, construction of nuclear power plants is not a good idea because “they are very expensive and tend to be unreliable” and the now emerging safety issue will only complicate things further.“Until quite recently nobody has built any nuclear power plants, not in the West, there have been no nuclear plants ordered in the US since 1978 and every applied order since 1974 has been canceled up until the last couple of years,” he said.“The reason that people have not been objecting to nuclear power for the past 20 years is that nobody has been building them [nuclear power stations]. So now you’re going to get a situation which might turn into a re-run of the kind of controversies of the fourth-generation of nuclear plants in the late 1960s and 1970s, when the public was deeply unhappy about a lot of these plants – and we may well find that happens again,” Patterson concluded.
|
<urn:uuid:5240a380-50bb-4579-ba63-643ac0ab1293>
|
CC-MAIN-2021-10
|
https://www.rt.com/news/fukushima-nuclear-fear-patterson/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369553.75/warc/CC-MAIN-20210304235759-20210305025759-00458.warc.gz
|
en
| 0.973494
| 670
| 2.640625
| 3
|
Not practised enough, a bad throw-in can cost you during a game. For example, a defensive throw-in badly taken can become a foul throw that gives an attack opportunity to your opponents. This post goes over a few tips to improve your throw-ins.
The basic rules
Often bad throw-ins are the result of not knowing the rules well. The specific rules on throw-ins are known as Law15 and specify the following procedure:
Stand facing the field of play.
Have part of each foot on the touchline or the ground outside the touchline.
Throw the ball with both hands from behind and over the head from the point where it left the field of play.
So, the referee may call a “foul throw” when:
The ball is delivered from a point other than where the ball left the field of play. Referees will allow you to take the throw a couple of steps away from where the ball went out, but only a few steps. It is about common sense: half a metre out is ok but if your throw-in is taken 2 metres out you will be called out.
Lifting one of your feet off the ground when taking the throw-in.
Stepping over the touchline.
Not taking the ball behind your head. You cannot take a throw-in like in basketball. But, you will be also called out if you do not start your arms movement from behind your head. Simply throwing the ball from the top of your head, almost dropping the ball, is likely to be called out.
Using one hand more than the other. This is not such an obvious infringement, but referees will call it. For example, you cannot use one hand to apply spin (as players do in a rugby line-out).
Other rules involving throw-ins.
Foul throws are not the only infringements related to throw-ins. Other situations may compromise your team, or you can take advantage of:
A goal cannot be scored directly from a throw-in. If the ball enters the opponents’ goal, a goal kick is awarded. If the ball enters the thrower’s goal, a corner kick is awarded.
A goalkeeper cannot handle a ball thrown directly to him or her by a teammate. This cannot be circumvented by the keeper using the feet first before handling the ball.
The thrower must not touch the ball again until it has touched another player.
If an opposing player fails to respect the required distance (2 m) or unfairly distracts or impedes the thrower, they may receive a yellow card for unsporting behaviour. So, make sure that the opposition gives you space, if they don’t, let the referee know.
Delaying the restart of play can result in a yellow card. For example, you will receive a yellow card if you take a few seconds to throw in, but then leave the ball for a teammate to take it.
Now that you know the rules, lets’ have a look at the two types of throw-ins and the recommended techniques to execute them.
Use short throws when teammates are close to you without obstructions. You will often use this technique when you want to quickly restart play. However, be careful of your technique as foul throws are more often committed in short throws.
A couple of tips for short throw-ins:
You do not need momentum. So, the only thing you need to do is to make sure that your feet are in the ground and you throw the ball with both hands from behind and over your head. No need to run towards the line, arching your back, etc.
Throw the ball to your teammate’s feet. You want to make sure you keep possession of the ball. So, keep it easier for your teammates to control the ball.
Quickly get back into the field after taking the throw-in. It is likely that your teammates are closely marked from behind and not able to turn. Because opposition players are not able to be closer than 2 meters, if you quickly get back in play, you will be unmarked to provide a passing option.
Do not throw the ball to a teammate too close to you. If a teammate is closer than 1 meter, it is very hard to release the ball to their feet following the right procedure. You will be tempted to follow with your hand beyond the top of your head, which is a foul throw. Try this, in front of a mirror execute a throw-in 30 to 50 cm away from your feet and look at your hand movements.
The video shows a good drill to practice short throw-ins. However, I’d practice this exercise with the cones closer to the player.
Many professional teams take throw-ins seriously. A long throw-in has become an effective dead ball situation. A throw-in close to the box can be as dangerous as a cross or a corner kick.
Long throw-ins are not about size or musculature. It is all about momentum. So, you want to run up to the line when you are taking the throw. This will give you great momentum. Give yourself room, take about three to five steps back.
Once you’ve taken a few steps back from the touchline, start by holding the ball in front of you. After around two or three steps, lift the ball behind your head as far as you can and start arching your back. When you are coming up towards the touchline, finish arching your back and release the ball with a flick forward.
So, the run-up starts some momentum and the flick starts the power generation from the feet into the legs, through the back into the shoulders, and finally into that slingshot motion through the arms.
Again, make sure that your feet are in the ground when you release the ball and that you release it from the top of your head.
The video below goes over the steps described above and how to receive a throw-in.
|
<urn:uuid:d31c6ba5-37c3-4ed1-a86e-5e00faaf5ea1>
|
CC-MAIN-2021-43
|
https://footballtechniques.co/how-to-execute-a-throw-in/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585246.50/warc/CC-MAIN-20211019074128-20211019104128-00447.warc.gz
|
en
| 0.966683
| 1,240
| 2.71875
| 3
|
War and Peace (Chap. 2.2) Lyrics
"He's coming!" shouted the signaler at that moment."Att-ention!" shouted the regimental commander in a soul-shaking voice which expressed joy for himself, severity for the regiment, and welcome for the approaching chief.
The regimental commander, flushing, ran to his horse, seized the stirrup with trembling hands, threw his body across the saddle, righted himself, drew his saber, and with a happy and resolute countenance, opening his mouth awry, prepared to shout. The regiment fluttered like a bird preening its plumage and became motionless.
Along the broad country road, edged on both sides by trees, came a high, light blue Viennese caleche, slightly creaking on its springs and drawn by six horses at a smart trot. Behind the caleche galloped the suite and a convoy of Croats. Beside Kutuzov sat an Austrian general, in a white uniform that looked strange among the Russian black ones. The caleche stopped in front of the regiment. Kutuzov and the Austrian general were talking in low voices and Kutuzov smiled slightly as treading heavily he stepped down from the carriage just as if those two thousand men breathlessly gazing at him and the regimental commander did not exist.
The word of command rang out, and again the regiment quivered, as with a jingling sound it presented arms. Then amidst a dead silence the feeble voice of the commander-in-chief was heard. The regiment roared, "Health to your ex... len... len... lency!" and again all became silent. At first Kutuzov stood still while the regiment moved; then he and the general in white, accompanied by the suite, walked between the ranks.
From the way the regimental commander saluted the commander-in-chief and devoured him with his eyes, drawing himself up obsequiously, and from the way he walked through the ranks behind the generals, bending forward and hardly able to restrain his jerky movements, and from the way he darted forward at every word or gesture of the commander-in-chief, it was evident that he performed his duty as a subordinate with even greater zeal than his duty as a commander. Thanks to the strictness and assiduity of its commander the regiment, in comparison with others that had reached Braunau at the same time, was in splendid condition. There were only 217 sick and stragglers. Everything was in good order except the boots.
Kutuzov walked through the ranks, sometimes stopping to say a few friendly words to officers he had known in the Turkish war, sometimes also to the soldiers. Looking at their boots he several times shook his head sadly, pointing them out to the Austrian general with an expression which seemed to say that he was not blaming anyone, but could not help noticing what a bad state of things it was. The regimental commander ran forward on each such occasion, fearing to miss a single word of the commander-in-chief's regarding the regiment. Behind Kutuzov, at a distance that allowed every softly spoken word to be heard, followed some twenty men of his suite. These gentlemen talked among themselves and sometimes laughed. Nearest of all to the commander-in-chief walked a handsome adjutant. This was Prince Bolkonski. Beside him was his comrade Nesvitski, a tall staff officer, extremely stout, with a kindly, smiling, handsome face and moist eyes. Nesvitski could hardly keep from laughter provoked by a swarthy hussar officer who walked beside him. This hussar, with a grave face and without a smile or a change in the expression of his fixed eyes, watched the regimental commander's back and mimicked his every movement. Each time the commander started and bent forward, the hussar started and bent forward in exactly the same manner. Nesvitski laughed and nudged the others to make them look at the wag.
Kutuzov walked slowly and languidly past thousands of eyes which were starting from their sockets to watch their chief. On reaching the third company he suddenly stopped. His suite, not having expected this, involuntarily came closer to him.
"Ah, Timokhin!" said he, recognizing the red-nosed captain who had been reprimanded on account of the blue greatcoat.
One would have thought it impossible for a man to stretch himself more than Timokhin had done when he was reprimanded by the regimental commander, but now that the commander-in-chief addressed him he drew himself up to such an extent that it seemed he could not have sustained it had the commander-in-chief continued to look at him, and so Kutuzov, who evidently understood his case and wished him nothing but good, quickly turned away, a scarcely perceptible smile flitting over his scarred and puffy face.
"Another Ismail comrade," said he. "A brave officer! Are you satisfied with him?" he asked the regimental commander.
And the latter—unconscious that he was being reflected in the hussar officer as in a looking glass—started, moved forward, and answered: "Highly satisfied, your excellency!"
"We all have our weaknesses," said Kutuzov smiling and walking away from him. "He used to have a predilection for Bacchus."
The regimental commander was afraid he might be blamed for this and did not answer. The hussar at that moment noticed the face of the red-nosed captain and his drawn-in stomach, and mimicked his expression and pose with such exactitude that Nesvitski could not help laughing. Kutuzov turned round. The officer evidently had complete control of his face, and while Kutuzov was turning managed to make a grimace and then assume a most serious, deferential, and innocent expression.
The third company was the last, and Kutuzov pondered, apparently trying to recollect something. Prince Andrew stepped forward from among the suite and said in French:
"You told me to remind you of the officer Dolokhov, reduced to the ranks in this regiment."
"Where is Dolokhov?" asked Kutuzov.
Dolokhov, who had already changed into a soldier's gray greatcoat, did not wait to be called. The shapely figure of the fair-haired soldier, with his clear blue eyes, stepped forward from the ranks, went up to the commander in chief, and presented arms.
"Have you a complaint to make?" Kutuzov asked with a slight frown.
"This is Dolokhov," said Prince Andrew.
"Ah!" said Kutuzov. "I hope this will be a lesson to you. Do your duty. The Emperor is gracious, and I shan't forget you if you deserve well."
The clear blue eyes looked at the commander-in-chief just as boldly as they had looked at the regimental commander, seeming by their expression to tear open the veil of convention that separates a commander-in-chief so widely from a private.
"One thing I ask of your excellency," Dolokhov said in his firm, ringing, deliberate voice. "I ask an opportunity to atone for my fault and prove my devotion to His Majesty the Emperor and to Russia!"
Kutuzov turned away. The same smile of the eyes with which he had turned from Captain Timokhin again flitted over his face. He turned away with a grimace as if to say that everything Dolokhov had said to him and everything he could say had long been known to him, that he was weary of it and it was not at all what he wanted. He turned away and went to the carriage.
The regiment broke up into companies, which went to their appointed quarters near Braunau, where they hoped to receive boots and clothes and to rest after their hard marches.
"You won't bear me a grudge, Prokhor Ignatych?" said the regimental commander, overtaking the third company on its way to its quarters and riding up to Captain Timokhin who was walking in front. (The regimental commander's face now that the inspection was happily over beamed with irrepressible delight.) "It's in the Emperor's service... it can't be helped... one is sometimes a bit hasty on parade... I am the first to apologize, you know me!... He was very pleased!" And he held out his hand to the captain.
"Don't mention it, General, as if I'd be so bold!" replied the captain, his nose growing redder as he gave a smile which showed where two front teeth were missing that had been knocked out by the butt end of a gun at Ismail.
"And tell Mr. Dolokhov that I won't forget him—he may be quite easy. And tell me, please—I've been meaning to ask—how is he behaving himself, and in general..."
"As far as the service goes he is quite punctilious, your excellency; but his character..." said Timokhin.
"And what about his character?" asked the regimental commander.
"It's different on different days," answered the captain. "One day he is sensible, well educated, and good-natured, and the next he's a wild beast.... In Poland, if you please, he nearly killed a Jew."
"Oh, well, well!" remarked the regimental commander. "Still, one must have pity on a young man in misfortune. You know he has important connections... Well, then, you just..."
"I will, your excellency," said Timokhin, showing by his smile that he understood his commander's wish.
"Well, of course, of course!"
The regimental commander sought out Dolokhov in the ranks and, reining in his horse, said to him:
"After the next affair... epaulettes."
Dolokhov looked round but did not say anything, nor did the mocking smile on his lips change.
"Well, that's all right," continued the regimental commander. "A cup of vodka for the men from me," he added so that the soldiers could hear. "I thank you all! God be praised!" and he rode past that company and overtook the next one.
"Well, he's really a good fellow, one can serve under him," said Timokhin to the subaltern beside him.
"In a word, a hearty one..." said the subaltern, laughing (the regimental commander was nicknamed King of Hearts).
The cheerful mood of their officers after the inspection infected the soldiers. The company marched on gaily. The soldiers' voices could be heard on every side.
"And they said Kutuzov was blind of one eye?"
"And so he is! Quite blind!"
"No, friend, he is sharper-eyed than you are. Boots and leg bands... he noticed everything..."
"When he looked at my feet, friend... well, thinks I..."
"And that other one with him, the Austrian, looked as if he were smeared with chalk—as white as flour! I suppose they polish him up as they do the guns."
"I say, Fedeshon!... Did he say when the battles are to begin? You were near him. Everybody said that Buonaparte himself was at Braunau."
"Buonaparte himself!... Just listen to the fool, what he doesn't know! The Prussians are up in arms now. The Austrians, you see, are putting them down. When they've been put down, the war with Buonaparte will begin. And he says Buonaparte is in Braunau! Shows you're a fool. You'd better listen more carefully!"
"What devils these quartermasters are! See, the fifth company is turning into the village already... they will have their buckwheat cooked before we reach our quarters."
"Give me a biscuit, you devil!"
"And did you give me tobacco yesterday? That's just it, friend! Ah, well, never mind, here you are."
"They might call a halt here or we'll have to do another four miles without eating."
"Wasn't it fine when those Germans gave us lifts! You just sit still and are drawn along."
"And here, friend, the people are quite beggarly. There they all seemed to be Poles—all under the Russian crown—but here they're all regular Germans."
"Singers to the front" came the captain's order.
And from the different ranks some twenty men ran to the front. A drummer, their leader, turned round facing the singers, and flourishing his arm, began a long-drawn-out soldiers' song, commencing with the words: "Morning dawned, the sun was rising," and concluding: "On then, brothers, on to glory, led by Father Kamenski." This song had been composed in the Turkish campaign and now being sung in Austria, the only change being that the words "Father Kamenski" were replaced by "Father Kutuzov."
Having jerked out these last words as soldiers do and waved his arms as if flinging something to the ground, the drummer—a lean, handsome soldier of forty—looked sternly at the singers and screwed up his eyes. Then having satisfied himself that all eyes were fixed on him, he raised both arms as if carefully lifting some invisible but precious object above his head and, holding it there for some seconds, suddenly flung it down and began:
"Oh, my bower, oh, my bower...!"
"Oh, my bower new...!" chimed in twenty voices, and the castanet player, in spite of the burden of his equipment, rushed out to the front and, walking backwards before the company, jerked his shoulders and flourished his castanets as if threatening someone. The soldiers, swinging their arms and keeping time spontaneously, marched with long steps. Behind the company the sound of wheels, the creaking of springs, and the tramp of horses' hoofs were heard. Kutuzov and his suite were returning to the town. The commander-in-chief made a sign that the men should continue to march at ease, and he and all his suite showed pleasure at the sound of the singing and the sight of the dancing soldier and the gay and smartly marching men. In the second file from the right flank, beside which the carriage passed the company, a blue-eyed soldier involuntarily attracted notice. It was Dolokhov marching with particular grace and boldness in time to the song and looking at those driving past as if he pitied all who were not at that moment marching with the company. The hussar cornet of Kutuzov's suite who had mimicked the regimental commander, fell back from the carriage and rode up to Dolokhov.
Hussar cornet Zherkov had at one time, in Petersburg, belonged to the wild set led by Dolokhov. Zherkov had met Dolokhov abroad as a private and had not seen fit to recognize him. But now that Kutuzov had spoken to the gentleman ranker, he addressed him with the cordiality of an old friend.
"My dear fellow, how are you?" said he through the singing, making his horse keep pace with the company.
"How am I?" Dolokhov answered coldly. "I am as you see."
The lively song gave a special flavor to the tone of free and easy gaiety with which Zherkov spoke, and to the intentional coldness of Dolokhov's reply.
"And how do you get on with the officers?" inquired Zherkov.
"All right. They are good fellows. And how have you wriggled onto the staff?"
"I was attached; I'm on duty."
Both were silent.
"She let the hawk fly upward from her wide right sleeve," went the song, arousing an involuntary sensation of courage and cheerfulness. Their conversation would probably have been different but for the effect of that song.
"Is it true that Austrians have been beaten?" asked Dolokhov.
"The devil only knows! They say so."
"I'm glad," answered Dolokhov briefly and clearly, as the song demanded.
"I say, come round some evening and we'll have a game of faro!" said Zherkov.
"Why, have you too much money?"
"I can't. I've sworn not to. I won't drink and won't play till I get reinstated."
"Well, that's only till the first engagement."
"We shall see."
They were again silent.
"Come if you need anything. One can at least be of use on the staff..."
Dolokhov smiled. "Don't trouble. If I want anything, I won't beg—I'll take it!"
"Well, never mind; I only..."
"And I only..."
"It's a long, long way.
To my native land..."
Zherkov touched his horse with the spurs; it pranced excitedly from foot to foot uncertain with which to start, then settled down, galloped past the company, and overtook the carriage, still keeping time to the song.
|
<urn:uuid:956abf29-d6a8-496c-8ba2-0bbb6d8fab67>
|
CC-MAIN-2016-36
|
http://genius.com/Leo-tolstoy-war-and-peace-chap-22-annotated?referent_id=1713405
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982296571.15/warc/CC-MAIN-20160823195816-00282-ip-10-153-172-175.ec2.internal.warc.gz
|
en
| 0.985175
| 3,660
| 2.5625
| 3
|
Teach the 7 Steps of Crime Scene Investigation to your Forensics students with this ultra-engaging lesson & jigsaw activity! This lesson & activity bundle places the responsibility of learning on the students, making you available for more of a facilitator role.
Need a digital option? No problem! Each resource in this bundle includes both a PRINTABLE & DIGITAL version, making it perfect for flipped classrooms, distance learning, online courses, and traditional classrooms.
*Note: the digital documents are Google Slides documents and require a Google account to access.
There are 3 components to this lesson-
⭐ Students are first placed in EXPERT groups where they will use the included Student Research Guide to learn about their assigned “step.” Once students complete the research phase, they will be placed in jigsaw groups where they will share their knowledge with their classmates. At the end of the activity, each student will have a completed note taking guide and knowledge about the 7 steps of CSI.
⭐ Reinforce content learned in the Jigsaw activity using the included Investigative Processes Google Slides/PowerPoint lesson. This lesson is editable and includes an embedded video to further reinforce the content.
⭐ There are two assessment pieces in this resource: 1) An investigative processes CLOSE reading assignment and a Steps of Crime Scene Investigation Quiz
★Teacher Instructions and Pictures
★7 Steps of CSI Printable Posters
★Student Note-Taking Document
★Post-Activity Assessment (w/ answer key)
★Investigative Processes (editable PowerPoint/Google Slides lesson)
★Investigative Processes CLOSE Reading assignment (with answer key)
★Each activity listed above is available as a Google Slides document
1-Secure the Scene
2-Separate the Witnesses
3-Scan the Scene
4-Photograph the Evidence
5-Sketch the Scene
6-Search the Scene
7-Secure and Collect Evidence
|
<urn:uuid:78b2bdd2-eb00-4265-9117-5e694661a0bd>
|
CC-MAIN-2022-27
|
https://thetrendyscienceteacher.com/product/steps-of-crime-scene-investigation-lesson-activity-print-digital/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104628307.87/warc/CC-MAIN-20220705205356-20220705235356-00790.warc.gz
|
en
| 0.879985
| 411
| 3.328125
| 3
|
Marginalized and Ignored: The Corrosion of Bangladeshi Minority-Government Relations
Bangladesh was founded in 1971 as a multiethnic and multicultural nation, with a constitution that grants freedom of peaceful religious practice. Unfortunately, Islamic fundamentalism remains a recurrent and deadly problem. Religious minorities, including Buddhists, report experiences of oppression, marginalization, and violence by segments of the majority Muslim population. This seems to have heightened in the past few decades, with new spats of viciousness characterized by the Bangladeshi press as religious conflict or ethnic violence.
Although most people believe that fundamentalist Muslims are responsible for such activities, the sad and complex reality is that Islamist-aligned political parties have exploited fear-mongering against minorities for their own benefit. Here I attempt to explore where Bangladesh’s Buddhist minorities fit into the broader political context.
Buddhists make up 0.61 per cent of the population, while Christians account for 0.3 per cent and Hindus for 8.15 per cent. The Hindu population used to be much higher—at 30 per cent in 1947, until a spate of anti-Hindu persecutions, forced possessions, and violence led to a dramatic drop in numbers. (Riaz 2010, 52)
Secularism was established as one of the four fundamental principles of the Bangladeshi constitution in 1972, a year after the war of independence against Pakistan. However, Ziaur Raham, the 7th president, removed secularism from the constitution in 1977, replacing it with a clause of “absolute trust and faith in Almighty Allah.” In 1988, H.M. Ershad, the 10th president, through the Eight Amendment Act of the Constitution, declared Islam to be the state religion. The Supreme Court of Bangladesh restored secularism in 2010, but Islam remained the state religion. In response to H.M. Ersad, Bangladeshi minorities formed an organization called the Bangladesh Hindu-Buddhist-Christian Unity Council (BHBCUC) to protect the human rights of religious and ethnic minorities.
It is commonly thought that the ruling political party in the country, the Awami League, benefits from minority votes. As a result, opposition parties (mostly comprising those of Islamist ideology) have been accused of instigating looting and physical attacks to intimidate people against voting for the ruling party, which happened after the national election in January 2014. One of these Islamist parties is called Jamaat-e-Islami Bangladesh. It advocates incorporating fundamentalist ideology into the state, which would render Bangladesh an Islamic theocracy.
Although secular parties vowed to stop the communal attacks and punish perpetrators, in most cases the attackers were never arrested. Secular parties themselves have been accused of being involved in violence while blaming political rivals to obtain international support. Law enforcement agencies, instead of protecting the minorities, have also been accused of defending the instigators of violence. While a large portion of minorities voted for the current government, it is questionable whether it has kept its promise to protect their interests and safety.
Buddhists have also reported experiencing discrimination, torture, murder, and destruction of property. For example, in September 2012, Buddhist temples and houses were destroyed in Ramu in southeastern Bangladesh. Considered the worst attack on the Buddhist community since Bangladeshi independence in 1971, it is believed that the attackers in Ramu wanted to seize Buddhist property to resettle thousands of Rohingya Muslims who had moved across the border between Bangladesh and Myanmar. Furthermore, violence has always been inflicted against indigenous people living in the Chittagong Hill Tracts (CHT), who are mostly Buddhists. In these incidents, the government took land from indigenous people in order to provide land for the resettlement of deprived Muslims from other parts of the country.
Having been on the receiving end of such horrific communal disharmony, Bangladeshi Buddhists have designed a number of policies aimed at building bridges with Muslims; there is little choice and co-existence cannot be grudging but must be proactive and sincere. For example, last December, Buddhist leaders met the leaders of Hefajat-e Islam, a pressure group comprised of teachers and students from several Islamic institutions, to hold interfaith forums. Ameer Shah Ahmad Shafi, the top leader of Hefajat-e Islam, has asked the Muslim community to support the rights and security of non-Muslims, including Buddhists.
The Buddhist community has also organized protests against attacks and discrimination against Rohingya Muslims in Myanmar. Buddhists encourage all people to practice tolerance and promote cultural diversity. If only this perspective can shift relations between Muslims and non-Muslims in the direction of a mutually beneficial manner. From 7–8 April, the BHBCUC organized its 9th Triennial National Conference at Dhaka University. At the conference, minority leaders demanded the reservation of 60 seats in Parliament and the setting up of a new Ministry of Minority Affaires and National Minority Commission to represent minority interests.
The government of India is considering changing the Citizenship Act of 1955 to give shelter to oppressed Afghani, Bangladeshi, and Pakistani minorities in India. In this respect India would be able to assist Buddhists, Christians, Hindus, Jains, and Sikhs by issuing long-term visas and allowing them to have bank accounts, businesses, land purchasing rights, and so on.
However, this should not be India’s burden to bear. It is a matter of its Muslim majority neighbors’ (Bangladesh, Pakistan) treatment of non-Muslim minorities. Rather than India changing the Citizenship Act, it would be far more beneficial over the long term if minorities in countries such as Bangladesh were simply better treated, in an impartial and unbiased way, so that they feel safer and more welcome, and therefore more willing to be patriotic.
Riaz, Ali. “The Politics of Islamization in Bangladesh” in Religion and Politics in South Asia. Edited by Ali Riaz, 45–70. London and New York: Routledge. 2010.
Resolution demands Bangladesh set up ministry, commission for minorities (The Indian Express)
Hindu Bouddha Christian Oikya Parishad demands 60 seats in Bangladesh Parliament (Struggle for Hindu Existence)
Buddhist leaders meet Hefajat ameer (The Daily Star)
|
<urn:uuid:fdf5c867-d302-4264-a32d-8cebc4f1f8ee>
|
CC-MAIN-2019-30
|
https://www.buddhistdoor.net/features/marginalized-and-ignored-the-corrosion-of-bangladeshi-minority-government-relations
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526401.41/warc/CC-MAIN-20190720004131-20190720030131-00444.warc.gz
|
en
| 0.94644
| 1,289
| 2.78125
| 3
|
Summary and Analysis
The police investigation into the attack on Mrs. Joe is a comedy of errors and false accusations. The investigators leave without solving the crime. The only things known for sure are that the candle in the room was blown out and she was hit on the back of the head with a rusted convict's leg iron while she faced the fireplace. Joe and Pip have alibis, and Orlick seems to. She has survived but now requires constant care. Biddy, whose grandmother has died, comes to take care of her and it is Biddy who learns to understand the woman's signals, particularly the letter "T" she keeps writing. Biddy determines it is really a hammer and Mrs. Joe is asking for Orlick, who Mrs. Joe now seems very anxious to please.
Pip has become vain as his self-education progresses. He observes that Biddy is common and not very beautiful, though she is pleasant, wholesome, and sweet-tempered. In his arrogance about his own progress he manages to insult hers; even his attempts to compliment her are patronizing and condescending. He tells her he wants to become a gentleman to win Estella. Biddy tries to point out that given Estella's treatment of him, she may not be worth having. He agrees, but further insults Biddy by telling her that he wonders why he cannot love her instead. She quickly understands where things stand and responds that a relationship between she and Pip would not work. Orlick, who has been following them as they talk, has been making advances to Biddy that she fears and does not want. Pip is jealous and judgmental, and does his best to frustrate Orlick's overtures.
Ambition, snobbery, obsession, secrecy, guilt, and shame are undercurrents here. Like Dickens, who taught himself with books from the library, Pip tries desperately to become educated and less coarse by teaching himself. Yet there is no escape from his prison, the forge, and Pip feels guilty that he hates the forge so much. Ambition can be a good force unless the motive is only to please another — Pip knows in his heart that pursuing Estella is wrong but he cannot let go. Biddy tries to get Pip to understand that striving to please a woman who despises you is a mistake, but she astutely sees it is a lesson that the "student" cannot learn.
Pip has become a snob, so wrapped up in himself and Estella that he fails to see the wonderful person Biddy is. For all his book-learning, he is ignorant in human relationships. He repeatedly puts Biddy down such as when he is surprised at her level of knowledge. Biddy gracefully stands up for herself, yet she is hurt and quickly knows the score. She remains kind but tells Pip they will never be together, something that annoys him. Pip wants everything. He wants Estella, but wishes he could love Biddy. He does not care about Biddy, but does not want her to reject him. He is jealous of the attention Orlick pays her, so he tells her he would not think much of her if she encouraged him. And he is not smart enough to realize he has no right to judge or dictate anything to her. Pip is a mess. He does, however, have moments of insight, such as when he comments that he "felt vaguely convinced that I was very much ill used by somebody, or by everybody." He is being used, even if at a distance, by Miss Havisham, Estella, Mrs. Joe, and Pumblechook. His true self realizes that something is wrong, but he just cannot see it yet.
When he discovers that the weapon his sister was attacked with is probably the same leg iron his convict filed off years ago, he feels much guilt. Old secrets and sins seem to multiply the evil they do and those sins, along with the taint of criminal associations, continue to haunt him. Joe continues to show his fineness when he looks on his wounded wife with moist eyes and comments that she was a "fine figure of a woman." Orlick's guilt is implied by the hammer Mrs. Joe draws and by her desire to please him; however no one makes the connection.
the Bow-street men from London; extinct red waistcoated police there were two groups—the Bow Street Runners and the Bow Street Patrol. The latter wore red uniforms, worked as patrols in London, and were often confused with the former. The Runners were plainclothes detectives in London who often went out into the provinces to investigate serious crimes.
stile a step or set of steps used in climbing over a fence or wall. Another definition is a turnstile or post with revolving horizontal bars, placed in an entrance to allow the passage of persons but not of horses, cattle, and so on. Pip and Biddy are walking on the marshes near the sluice-gate, which is a gate that controls the flow of water onto the marshes. Either definition—a turnstile or a wall with steps climbing over the wall—works here because either one may be used to prevent animals and unaware persons from getting hurt near the sluice-gate.
supposititious case hypothetical case.
|
<urn:uuid:b545cdf7-f5f7-49d6-a33d-93e6a34f9458>
|
CC-MAIN-2015-35
|
http://www.cliffsnotes.com/literature/g/great-expectations/summary-and-analysis/chapters-1617
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065954.23/warc/CC-MAIN-20150827025425-00190-ip-10-171-96-226.ec2.internal.warc.gz
|
en
| 0.987804
| 1,091
| 2.59375
| 3
|
(1899–1978). Mexican composer and conductor Carlos Chávez was the first composer in his country to attain worldwide recognition. His music skillfully combines the elements of traditional Mexican folk songs with modern musical techniques.
Carlos Antonio de Padua Chávez was born on June 13, 1899, in Mexico City. In 1918 he completed his first symphony, and in 1921 he wrote his first significant work in the Mexican style, the ballet El fuego nuevo (The New Fire). After traveling in Europe and in the United States, he founded and became conductor of the Symphony Orchestra of Mexico in 1928. He also served as director of the national conservatory in Mexico from 1928 to 1934. Chávez published numerous essays on Mexican music as well as a book, Toward a New Music (1937). His lectures, given at Harvard University from 1958 to 59, were collected in Musical Thought (1960).
The music of Chávez is unmistakably Mexican in its melodic patterns and rhythmic variation. From native music he took ideas of percussion, primitive rhythms, and old forms of harmony and melody. He was also influenced by modern European and American music, especially that of Igor Stravinsky and Arnold Schoenberg.
Among his best-known compositions are two early symphonies, Sinfonía de Antígona (1933) and Sinfonía India (1935), both one-movement works using native Mexican themes. The Concerto No. 1 for Piano and Orchestra (1940) is highly percussive. The Toccata for Percussion Instruments (1942) is composed for 11 types of percussion instruments, some of them native, played by six performers. Other works include the ballet Los cuatro soles (1925; The Four Suns), Xochipilli Macuilxochitl (1940) for orchestra with native Mexican instruments, the Concerto for Violin (1950), and Discovery for orchestra (1969). Chávez died in Mexico City on Aug. 2, 1978.
|
<urn:uuid:42147e08-03c6-424a-9b47-373ffe2b91fc>
|
CC-MAIN-2021-39
|
https://kids.britannica.com/students/article/Carlos-Ch%EF%BF%BD%EF%BF%BDvez/319399
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057861.0/warc/CC-MAIN-20210926114012-20210926144012-00396.warc.gz
|
en
| 0.963499
| 422
| 3.453125
| 3
|
Just how bad is the drought in California? Unless measures are taken to drastically reduce water consumption, there is actually a danger the some towns and cities could run out of drinkable water within 100 days.
To underscore the seriousness of the crisis, Governor Jerry Brown announced that the state agency responsible for allocating water — the California Department of Water Resources — will take the unprecedented step of not giving out water this summer from the State Water Project, a system that serves two thirds of the state’s population.
Department Director Mark Cowin said at a news conference that if the dry spell continues, only carryover water from last year will be channeled to the farmers and several towns that get their water from the State Water Project. Those users will have to rely on groundwater, local reservoirs and other supplies.
“Everyone – farmers, fish, people in our cities and towns – will get less water as a result, but these actions will protect us all better in the long run,” Cowin said. “Simply put, there is not enough water to go around, so we need to conserve.”
Threat of running out
The announcement comes after state health officials said 17 communities and water districts are in danger of running out of water within 100 days, including Cloverdale and Healdsburg.
The list is expected to grow.
The snowpack in the Sierra is 12 percent of normal for this time of year, the lowest since the state began keeping snowpack records in 1960. California wildlife officials banned fishing in several rivers to protect salmon and steelhead trout.
California’s other large water management system, the federally run Central Valley Project, is expected to announce allocations in mid-February. The Central Valley Project irrigates more than 3 million acres of farmland, provides drinking water to nearly 2 million people and serves as a critical water source for fish and wildlife.
With its reservoirs also running low, contractors of the federal water system are bracing for low to no allocations. Those federally managed reservoirs included Shasta Reservoir north of Redding, which is at 36 percent of capacity, and Folsom Lake, which is at 17 percent, enabling visitors to see a previously submerged abandoned town from the 19th century.
The State Water Project’s largest reservoir, Lake Oroville in Butte County, is at 36 percent of capacity.
With two-thirds of the wet season having passed, there is little hope that enough rain and snow will fall to lift California out of the crisis.
“The state would have to experience heavy rainfall and snowfall every other day through May to get back to average precipitation levels,” Cowin said.
Bay Area water agency officials said they planned for the worst, but this is “worse than the worst,” said Robert Shaver, assistant general manager for the Alameda County Water District, one of four Bay Area agencies that gets its water supply from the State Water Project.
Some practical water saving tips from the state include flushing your toilet less and avoiding “long solo showers.”
I predict a mini-baby boom about a year from now. Conjugal showers are a fun way to save water.
What isn’t fun is that the most productive farm land in the world is in danger of not getting enough water to grow its crops. Irrigating a desert has been one of the truly miraculous achievements of California farmers (with a lot of help from the Feds). But, as Californians are discovering, a desert is a very dry place and while the drought may be unprecedented, the state’s history only goes back 160 years. How many droughts like this — and worse — have been visited on the land now known as California in the distant past? Too many to count, I’m sure.
That doesn’t help matters today. One hopes that nature gives Californians a break and the rain begins to fall. But that doesn’t seem likely, so the reservoirs will continue to fall and ever more stringent restrictions on water usage will probably become necessary.
|
<urn:uuid:eb40e038-a029-49a5-86f7-dc4a88fce4be>
|
CC-MAIN-2014-35
|
http://pjmedia.com/tatler/2014/02/01/california-drought-is-real-and-its-getting-worse/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921872.11/warc/CC-MAIN-20140909040043-00301-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.956852
| 840
| 3.125
| 3
|
Have you heard of grounding, or earthing? Perhaps you already do it – maybe without even realising? It might sound a bit new age and made up, but the more I've read about it – and tried it – the more sense it makes.
Earthing is where you allow you your body to be in direct contact with the Earth. You can do this by walking around barefoot, sitting outside outside on the lawn or the sand, or sleeping under the stars (in direct contact with the Earth). Advocates of grounding recommended you do it for at least 30 minutes a day for optimal benefits.
So many people wake up in a high rise house, put their shoes on, drive to work, sit at a desk all day in an insulated office block, drive home – and repeat. Even exercise is often exclusively done indoors in a gym. How many people go weeks without any direct contact to the Earth? Our ancestors walked barefoot and slept on the ground – very different.
The idea behind grounding, is that the Earth has a negative charge. When a person, with an excessive negative charge, walks around in contact with the Earth, the excess of electrons will supposedly be absorbed by the Earth’s surface. By balancing out your body chemistry using the earth, the idea is that you will feel more relaxed and at ease – and with improved sleep.
There are (of course!) lots of companies who have jumped on the grounding/ earthing bandwagon to produce artificial products to mimic the effects of earthing. You can get a grounding mat to put under your desk at work, or earthing sheets, to have the same effect as sleeping on the ground. However, with it being so easy to connect to the Earth naturally, why fake it? The only exception to man made products, that I would put in this category is barefoot shoes. Barefoot shoes like Vibram Five Fingers (VFF’s) are a great way to safely walk around, without worrying about stepping in something you shouldn't.
It doesn't have to be a huge thing to schedule in your day. Find ways to incorporate earthing with what you already do in your daily life. If you enjoy walking, then walk along the beach barefoot. If you write on a daily basis or read, then just change your environment and enjoy doing those activities while sitting on grass. If you just want some time to relax in your day go outside and enjoy nature for a while.
Whether or not you agree with the science behind earthing – you have to agree walking around barefooted in cool grass feels great?
There are several benefits of earthing/grounding that you won’t discover until you get outdoors and take your shoes off!
Do you regularly connect with the Earth? Does it make you feel better? Please share your experiences in the comments below!
|
<urn:uuid:e1781515-ca50-4a0d-a1e2-089080a85f30>
|
CC-MAIN-2018-05
|
http://paleo.com.au/tag/barefoot/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890795.64/warc/CC-MAIN-20180121155718-20180121175718-00390.warc.gz
|
en
| 0.964625
| 583
| 2.546875
| 3
|
The study, “Atypical Hemolytic Uremic Syndrome following Acute Type A Aortic Dissection,” was published in the journal Case Reports in Hematology.
Atypical hemolytic-uremic syndrome (aHUS), a type of thrombotic microangiopathy, is a disease that mainly affects the kidneys. This condition, which can occur at any age, causes abnormal blood clots to form in the small blood vessels of the kidneys, progressively damaging and impairing their function.
Aortic dissection occurs when there is an injury to the innermost layer of the aorta, the largest artery that supplies oxygenated blood to the rest of the body. The injury allows blood to flow between the layers of tissue forming its wall, gradually forcing them apart. There are two types of aortic dissection, type A and B, depending on which region of the aorta is damaged.
Acute type A aortic dissection (ATAAD) is the most common and dangerous subtype of aortic dissection in which the tear is located in the upper portion of the aorta where it leaves the heart. ATAAD is life-threatening and requires emergency surgical repair. Despite emergency surgery, statistics indicate that the early mortality rate is approximately 20%.
As both ATAAD and surgical treatment are highly invasive, bleeding can provoke anemia and thrombocytopenia (low platelet levels), while malperfusion (abnormal blood flow) or surgical stress can lead to acute kidney disease, which is associated with aHUS.
In the study, a group of physicians in Japan reported, for the first time, the case of a 61-year-old woman with ATAAD who developed aHUS.
The woman, who had a history of untreated hypertension (high blood pressure), was seen by a local physician for her sudden back pain.
She was diagnosed with ATAAD after undergoing an enhanced computed tomography scan. Echocardiography, another imaging technique that allows physicians to visualize the heart, revealed she had moderate aortic valve regurgitation, a condition in which the heart’s aortic valve doesn’t close tightly.
She was transferred to the hospital, where she underwent surgery to repair the aortic valve regurgitation.
On postoperative day one, the patient’s platelet count decreased from 116×103/µl to 28×103/µl, causing physicians to transfuse 20 units of platelet concentrate.
Her platelet count still had not risen the following day, and dropped even further to 8×103/µl three days after the surgery. Her renal (kidney) function also worsened. Researchers confirmed the presence of schistocytes (red blood cell fragments that can take on different shapes) in her blood smear.
“Immediate consultations with the hematology team yielded a diagnosis of thrombotic microangiopathy (TMA), and we initiated plasma exchange and hemodialysis,” the scientists wrote.
Despite the fact that the treatment increased her platelet counts, the woman’s renal function failed to improve, and schistocyte levels continued to rise.
Next, the researchers investigated the type of TMA the patient had, as treatments can vary. She was eventually diagnosed with aHUS on postoperative day 14 and immediately started on Soliris (eculizumab).
After treatment, her anemia and thrombocytopenia improved without the need for further Soliris or transfusion support. However, her renal function did not recover. Subsequently, the patient was transferred to another hospital for rehabilitation.
One year after surgery, she died of multi-organ failure. For this patient, multiple factors, including the disease itself and surgical stress, could have triggered the development of aHUS, the authors noted.
While some cases of aHUS have been reported following transplantation surgery, including heart transplantation, only two cases of aHUS to date have been reported after non-transplant cardiac surgery.
“It is important to consider aHUS when a patient clinically develops [signs that are indicative of TMA] following cardiovascular surgery,” the researchers said.
We are sorry that this post was not useful for you!
Let us improve this post!
Tell us how we can improve this post?
|
<urn:uuid:bf8e0037-eda9-4e02-bd99-e452247bad11>
|
CC-MAIN-2020-45
|
https://ahusnews.com/2020/03/23/ahus-can-arise-following-aortic-dissection-cardiovascular-surgery-case-study/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107909746.93/warc/CC-MAIN-20201030063319-20201030093319-00541.warc.gz
|
en
| 0.955106
| 925
| 2.96875
| 3
|
Ancient History of Almatret
According to the history that we have been able to recover, it seems that in the bottoms next to the river -not in the Plad’ Almatret-, there were once Iberian villages; near the so-called “Partida de Escampillà” where numerous historical remains have been found: The so-called “Castle of the Moors” seems to have been built by the Romans when the peninsula was divided between the Ispania Citerior and the Ispania Ulterior, this castle is located at the top of a mountain range that divides the Escampillà from the ravine of l’Aiguamoll.
The so-called “Pedra Escampillà” is located near the castle of the Moors, is of Celtic origin that tells us that during the Gallic War a Celtic group settled near the area, to protect the Romans from military warlords Indibil and Mandoni, the stone of religious meaning has engraved an inscription that says “CONIAGELLIETAR” which may mean “colony founded by Gellitar”. Then there are the Visigoths (from Europe), who populated and dominated the peninsula until the arrival of the Arabs. In 1149 Ramon Berenguer IV, founder of the Crown of Aragon, “recognizes” Lleida, Fraga and Mequinenza.
Given the proximity of Almatret to these population centres, we must think that the village was abandoned by the Arabs at this time. Berenguer IV distributed the territory among the nobles who had helped him, this is how Ramon de Moncada was entitled to Aitona and Seròs, and was appointed Count of Aitona (the coat of arms of the Moncada can be seen above the door of the old prison of the village) Later, at the end of the thirteenth century, these lands became part of the Entença. This brings us to the date of 1301, when the “Town Charter” of Almatret is signed.
Population Charter 1301
The Population Charter dated 1301, is written in a medieval context and is written in Latin ecclesiastical of the time. It means the laying of the first stone of the village as we know it today. This Charter is nothing more than a feudal contract.
A contract of services given by the lords (protection, land, services …) in exchange for fidelity, obedience, and the payment of several tithes. It begins like this: “Let everyone know that we, I, in Guillem de Entenza and she, Berengera, my wife, by means of this writing, we and for all our successors, give to populate and build a village, to you, Ramon Carví, Arnald Darques, Jaume Granell, Pere Raedor, Maimó Bertran, Pere Granell, son of Salvador Granell, Pere Carví, son of Raimond Carví, Guillem Carin, Agremon de Fluvià and Borrás Gassol and your successors and forever, we give you, we repeat, all the plain called Almatret, settled outside the terms of the town of Seròs, with all its belongings by which the waters go to the Ebro and even the terms of Ribarroja, Berrús and Faió “. Thus we can know to whom the plain of Almatret belonged from the year 1301.
The village of Almatret, which had been donated by the senyors of Moncada to the senyors of Entença, reverted again to the senyors of Moncada in 1558. Francesc de Moncada, as the new lord of Almatret, established a municipal order. The town was governed by a council, three jurats and a batlle, which controlled the fleca, the tavern, the botigues, the bèsties and the ramats that entered into the rostolls and guarets, the public sale markets, the entrances and the eixides of the walls?
In the 88 ordinances, or laws, he has named measures for regulating water, conreus, beast, net of basses and pous, roads… and the exploitation of coal has already appeared. This document is an administrative, judicial and criminal document. Through these orders we can observe what were the basic concerns of the population and of the Lord and also what were the shortcomings in which people usually find themselves. It should be noted that these ordinances are written entirely in pre-regulated Catalan; their presence in a public document is indicative of the legal use of language.
In Almatret we have two outstanding local festivals.
Commerce, industry and services
The agriculture is exclusively based on dry farming. The almond occupies 41% of the cultivated land (43% of the municipal total) and it is currently increasing, while olives, combined with the almond and barley represent the main crops. The land is fairly distributed and mostly exploited by the same owners. There are 1974 ha. of forest land, private and communal property, with permanent pastures, fully exploited by the local livestock (cattle, sheep, pigs and poultry). The industrial activity focuses mainly on the production and processing of olive oil.
Two projects, Almia and Hybuild, to put on the table, intrinsically linked to the territory, holography and climate of our municipality. A new way of understanding the relationship of small municipalities with their energy needs and how they can contribute to changing the rhythm of our planet.
Almia is a bet for the future, a way of interpreting Almatret’s relationship with the world.
Hybuild aims to develop solutions that are both environmentally friendly and respectful, guaranteeing comfort conditions in residential buildings.
|
<urn:uuid:47f19536-a87c-45be-9994-d796a5ff7ce5>
|
CC-MAIN-2022-21
|
https://almatret.cat/en/town/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662546071.13/warc/CC-MAIN-20220522190453-20220522220453-00770.warc.gz
|
en
| 0.951948
| 1,264
| 3.046875
| 3
|
Historical, Cultural and Traditional Resource Use
Much has been written about specific resources and features along the KZN coast. Many materials exist that provide evidence of the use of these coastal resources and the creation of certain features; the relics of hunters and gatherers, the activities of farmers, conservationists, soldiers and traders, missionaries and the many ordinary men and women of KZN, both historically and in the present.
Access to the Coast
The coast has cultural, historical and spiritual significance to the people of KZN, thus it is important that access to the coast be maintained. However, access to the coast was restricted for many in the past, making it imperative that equitable access be maintained in the future. In addition, coastal access provides opportunities for recreation, education and overall improvement of both mental and physical health.
Artisanal and Subsistence Fishing
A generally accepted definition of artisanal fisheries is that they usually have a long history and tradition or culture; mostly make use of low technology fishing gear (often made by hand); and catch fairly low value resources.
The waters of the KZN coast are mostly sub-tropical and usually remain between 22-270 C, encouraging a number of recreational activities such as swimming, surfing, sailing and diving. In addition, the KZN coast represents a subtropical transition between tropical Indo-Pacific biota in the north-east and warm-temperate biota in the south, making it a premier destination for recreational activities such as fishing, surfing, scuba diving and swimming.
ORI • University of KwaZulu Natal • Ezemvelo KZN Wildlife • KZN Sharks Board
ORI • EDTEA
Di Scott • Bruce Mann • Denis Rouillard • Gillian Rhodes • Scotty Kyle • Stuart Dunlop • Geremy Cliff • Sheldon Dudley
|
<urn:uuid:be65a1ae-7685-4188-a11e-7a361d341d88>
|
CC-MAIN-2019-30
|
http://www.coastkzn.co.za/themes/the-profile-of-the-kzn-coast/socio-economic-uses-of-the-coast/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526948.55/warc/CC-MAIN-20190721102738-20190721124738-00267.warc.gz
|
en
| 0.935152
| 383
| 3.296875
| 3
|
What is the definition of Homeless?
According to the U.S. Department of Housing & Urban Development (HUD), a person is considered homeless if they are:
- Fleeing Domestic Violence
- Sleeping in an area or structure not meant for human habitation (e.g. outside, vehicle, or abandoned building)
- Staying in an emergency shelter or in a transitional housing program
The number one reason for becoming homeless cited by individuals in the PIT Count is job loss/unemployment, followed by eviction/loss of housing and physical health/disability.
Top Barriers to Housing
-Lack of affordable housing stock
-Lack of voucher supported housing
-Ability to earn a livable wage
-Lack of job training / unable to work
-Poor rental history
-Increasing rent / rent over 30% of household income
More detailed information about kids in Mason County who experience homelessness can be found on the
Schoolhouse Washington Dashboard
In January 2018, the Department of Commerce released the State of Washington Homeless Housing Strategic Plan with the vision of “no person left living outside”. The goal in Mason County is to reduce the number of people classified as unsheltered homelessness to align with Washington State’s plan and serve those in our community with the most need.
The full Mason County 2036 Comprehensive Plan is available on the Mason County website: http://www.co.mason.wa.us/community-services/planning/2036-comp-plan-update/index.php
The full Profile on Homelessness in Mason County is available on the Mason County website:
Washington State Homeless System Performance Reports
|
<urn:uuid:1e8d076d-323b-4682-b5b5-774cfc1618c6>
|
CC-MAIN-2023-23
|
https://healthymasoncounty.com/community_health/housing_and_homelessness/homelessness.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649348.41/warc/CC-MAIN-20230603233121-20230604023121-00243.warc.gz
|
en
| 0.887199
| 398
| 3.09375
| 3
|
Math? To plan dinner? Isn’t there a better way? Yes there is. Just take a look at your hand. Use your fist, palm, cupped hand, and thumb to practice calorie control.
Ryan Andrews & Brian St. Pierre
If you’ve heard it once, you’ve heard it a thousand times: The best — maybe even the only — way to lose weight is to count calories.
After all, it’s a pretty simple equation: Calories in vs. calories out. Eat more calories than you burn, and you gain weight. Eat fewer calories than you burn and you lose weight.
Except counting calories isn’t that simple.
The problems with calorie counting
First of all — on the “calories in” side — you do need to figure out how many calories are in the foods you want to eat. And that takes handbooks, websites, databases and math. Just to plan your lunch. Groan.
Next, you have to assume that the handbooks, websites, and databases’ calorie estimates are correct. They’re often not. In fact, research has shown they can be off by about 25% because of incorrect labeling, laboratory measurement error, and food quality.
Then, of course, there’s the “calories out” side. Estimating your calorie expenditure each day comes with another 25% measurement error because of the equipment you’re using, laboratory measurement errors, and individual differences.
A possible 25% error on the “calories in” side, and another 25% error on the “calories out” side.
Is it even worth:
– pulling out measuring cups to a chorus of boos from family members;
– dusting off the food scale while trying to ignore the taunts of friends;
– wheeling in the abacus from the den to keep up the calorie tally;
– subscribing to apps and web services to track these less-than-accurate numbers?
Sure, we should have an idea of how much food we’re eating each day, so we can adjust based on our goals.
But counting calories itself is a drag! No wonder so many people give up and go back to eating the way they were before.
The calorie counting antidote
Here’s the good news: counting calories is rarely necessary. All you need is the ability to count to two. And your own hand. Here how it works:
– Your palm determines your protein portions
– Your fist determines your veggie portions
– Your cupped hand determines your carb portions
– Your thumb determines your fat portions.
To determine your protein intake
For protein-dense foods like meat, fish, eggs, dairy, or beans, use a palm sized serving.
For men we recommend two palm-sized portions with each meal.
And for women we recommend one palm-sized portion with each meal.
Note: a palm-sized portion is the same thickness and diameter as your palm.
To determine your vegetable intake
For veggies like broccoli, spinach, salad, carrots, etc. use a fist-sized serving.
For men we recommend 2 fist-sized portions of vegetables with each meal.
And for women we recommend 1 fist-sized portion of vegetables with each meal.
Again, a fist-sized portion is the same thickness and diameter as your fist.
To determine your carbohydrate intake
If you’re including extra carbohydrates in a meal – like grains, starches, or fruits – use a cupped hand to determine your serving size.
For men we recommend 2 cupped-hand sized portions of other carbohydrates if you’re including them.
And for women we recommend 1 cupped-hand sized portion of other carbohydrates if you’re including them.
To determine your fat intake
If you’re including extra fats in a meal – like oils, butters, nut butters, nuts/seeds – use your entire thumb to determine your serving size.
For men we recommend 2 thumb-sized portions of extra fats if you’re including them.
And for women we recommend 1 thumb-sized portion of extra fats if you’re including them.
A note on body size
Of course, if you’re a bigger person, you probably have a bigger hand. And if you’re a smaller person… well, you get the idea. Your own hand is a personalized (and portable) measuring device for your food intake.
True, some people do have larger or smaller hands for their body size. Still, our hand size correlates pretty closely with general body size, including muscle, bone – the whole package.
Planning your meals flexibly
Based on the guidelines above, which assume you’ll be eating about 3 or 4 times a day, you now have a simple and flexible guide for meal planning.
– 2 palms of protein dense foods with each meal;
– 2 fists of vegetables with each meal;
– 2 cupped hands of carb dense foods if including extra carbs;
– 2 entire thumbs of fat dense foods if including extra fats.
– 1 palm of protein dense foods with each meal;
– 1 fist of vegetables with each meal;
– 1 cupped hand of carb dense foods if including extra carbs;
– 1 entire thumb of fat dense foods if including extra fats.
Of course, just like any other form of nutrition planning — including calorie counting – this serves as a starting point.
You can’t know exactly how your body will respond in advance. So stay flexible and adjust your portions based on your hunger, fullness, and other important goals.
For example: if you’re trying to gain weight, and you’re having trouble gaining, you might add another cupped palm of carbohydrates or another thumb of fats. Likewise, if you’re trying to lose weight but seem to have stalled out, you might eliminate a cupped palm of carbohydrates or a thumb of fats at particular meals.
Remember: This is a starting point. Adjust your portions at any time using outcome-based decision making, aka “How’s that working for you?”
For fitness and nutrition professionals
As a fitness or nutrition coach, you might have certain food/nutrient goals in mind for your clients. No problem.
But should you tell them to eat 1 g of protein per pound of body weight? Or 25-50 grams of protein with lunch? (Hint: No.)
Many clients don’t even know which foods have protein in them, let alone knowing how many grams each food has and what a portion size of that food looks like. That makes gram-based recommendation pretty tricky.
Fussing with numbers creates a lot of anxiety and confusion for clients. Eating healthy will seem “just too complicated” for them, and they’ll eventually give up or wander off in the wrong direction.
Plus, here’s the most important piece: Most clients don’t need this level of detail. The simpler and clearer you can make your recommendations, the more likely clients are to follow them.
So, instead, why not share these guidelines? How much easier can healthy, individualized eating be?
|
<urn:uuid:a2dfe9f7-3b63-42e5-96f8-dcfdb9ee50b2>
|
CC-MAIN-2017-43
|
http://www.coretransition.com/calorie-control-guide-for-men-and-women/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820927.48/warc/CC-MAIN-20171017052945-20171017072945-00051.warc.gz
|
en
| 0.91292
| 1,519
| 2.71875
| 3
|
Diet with exercise is a tried and true prescription for weight loss, but it’s often difficult to pinpoint exactly how much weight people lose using this approach. Weight loss can be highly specific to each individual and vary depending on diet modifications and amount of physical activity. The best average weight loss numbers are often self-reported.
Video of the Day
According to the National Weight Control Registry, which tracks data on people that have lost weight through diet and exercise, weight loss ranges from 30 to 300 lbs. The average time it takes to lose weight varies from several weeks up to as many as 14 years. Almost all participants report using diet and exercise as their approach to weight loss.
Although it is difficult to pinpoint the average weight loss through diet and exercise, there are recommendations agreed upon by most health professionals. The National Heart, Blood and Lung Institute, which prescribes diet modification and daily physical activity, recommends losing weight at a rate of 1 to 2 lbs. per week. Other health professionals recommend a slower rate of 1/2 to 1 lb. per week. For someone that commits to a 20-week program, this means an average weight loss of 10 to 40 lbs.
A healthy diet and weight loss approach that creates a 250 daily calorie deficit can yield a weekly 1/2 lb. loss. A person that incorporates more exercise to burn an additional 250 calories per day, thus creating a 500 calorie daily deficit, can expect to see a 1 lb. per week loss. Weight loss can be more rapid in the beginning of a program and then taper off as the body adjusts to diet and exercise. New modifications in diet and exercise will affect the rate of weight loss.
Average weight loss does not apply to all individuals because many factors can affect the rate at which the body consumes energy. Each individual has a different metabolism that depends on body size, sex and age. This accounts for how many calories a person burns at rest. Two people that start a similar diet and exercise at the same time will experience different rates of weight loss if one person is significantly older or has less muscle mass.
|
<urn:uuid:eaa69a31-bd0e-462b-9b6f-58d215c7a65e>
|
CC-MAIN-2018-13
|
https://www.livestrong.com/article/421531-the-average-weight-loss-with-exercise-diet/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257650993.91/warc/CC-MAIN-20180324190917-20180324210917-00042.warc.gz
|
en
| 0.949482
| 424
| 3.234375
| 3
|
One of the world’s largest inland water systems, the Cubango-Okavango River Basin, is a vast natural resource for Angola, Botswana, and Namibia. It is an environmental treasure trove that not only provides water for more than 1 million people, but also covers more than 6 million biologically abundant hectares.
Threatened by climate change and overharvesting of its natural resources, the Cubango-Okavango River Basin is one of the key areas that the USAID-funded Southern Africa Regional Environmental Program (SAREP), implemented by Chemonics, aims to protect. The program focuses on conserving biodiversity, improving access to water supply and sanitation services, and developing sustainable livelihoods for vulnerable communities in the region. But the program has also achieved something more surprising: Experts recently discovered a new species of damselfly in the basin’s Cubango and Cuito river systems in eastern Angola.
The journey behind this finding involved expeditions to the river basin, intensive environmental assessments, and years of research to confirm the discovery. Originally found in 2012, the species was only confirmed in early 2016. First, in collaboration with the Angolan Ministry of Environment and an expert team of species specialists, the program’s biodiversity experts led a trip to the Angolan headwaters of the river basin.
There, they conducted a variety of activities, including species collections and habitat profiles. These pieces then came together to inform an aquatic biodiversity survey. With the results of the survey, the team was able to develop a wetland species inventory and conduct assessments of how human development affects biodiversity and water quality. It was in the river’s upper catchment, where rainwater collects, that the species specialists came across the Pseudagrion sarepi damselfly, which was given a name inspired by the SAREP expedition — the Sarep Sprite.
With as many as 85 to 90 percent of the world’s species undescribed and nameless, this discovery is no small feat. And it wasn’t the only discovery during this trek through the Angolan headwaters. The team of experts also unearthed a breadth of biological insights, including five previously unidentified species of fish and five other unidentified species of dragonfly and damselfly.
Dragonflies and damselflies breed in freshwater ecosystems, making the species one of the best biodiversity indicators for water quality. Just as local communities thrive with improved access to clean potable water from the Cubango-Okavango River Basin, species such as the Sarep Sprite depend on clean water for their survival. Accordingly, as more debilitating droughts begin to afflict the region and freshwater resources disappear for local communities, the damselfly species becomes more threatened. Through its efforts to enhance monitoring and protection of the Cubango-Okavango River Basin, SAREP also ensures an intact aquatic habitat for the damselfly.
But it’s not only up to these kinds of programs to protect the region’s biodiversity. River basin communities also have an enormous stake in preservation of their ecosystems, including the most microscopic inhabitants. But many of them lack the information they need to make a difference. Even researchers have limited knowledge of the nature and extent of biodiversity in the Angolan portion of the Cubango-Okavango River Basin.
Aquatic biodiversity, in particular, requires joint monitoring by multiple groups to ensure that every species, from the damselfly to the crocodile, survives environmental shifts that put potable water and freshwater habitats at risk. And improving the ways that local communities manage their water resources, a key activity of the SAREP program, will go a long way.
The Sarep Sprite damselfly is an exciting addition to the Cubango-Okavango River Basin’s kaleidoscopic biodiversity. Discovering a new species in the more than 1,000 kilometers of freshwater that straddle Angola, Botswana, and Namibia is a testimony to the region’s rich ecosystems. Local communities, infrastructural partners, and natural historians alike treasure what is biologically known of the Cubango-Okavango River Basin, but it is what remains unknown that thrills the SAREP program’s team and reaffirms their commitment to environmental sustainability and discovery.
|
<urn:uuid:3f932d15-c101-4a0f-ba47-dff737139cfb>
|
CC-MAIN-2019-26
|
https://chemonics.com/impact-story/damselfly-discovery-angola/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000575.75/warc/CC-MAIN-20190626214837-20190627000837-00162.warc.gz
|
en
| 0.930872
| 879
| 3.8125
| 4
|
An in-depth look at the sprawling trees and dense undergrowth of the ecosystem of the rain forest, this guide welcomes young readers into the world of tigers, snakes, and chimpanzees, as well as marmosets, katydids, and sloths.Book Details:Format: HardcoverPublication Date: 5/20/2013Pages: 56Reading Level: Age 6 and Up
The Amazon Rain Forest. This is the oldest and largest forest in the world. It covers a huge area of South America and has the most varied plant and animal habitat on the planet. When you read this book you will be part of an expedition and adventure into the heart of the rain forest. Read about the Tree Frog's nest, about the Chameleon who can change it's colour and the very hungry Piranha fish. Even the Possum can teach a lesson about speaking out for Jesus Christ and the Parasol Ant can show us how not to give up. There's the brightly coloured Toucan whose call reminds us that with God we can do anything! Discover what its like to actually live in the rain forest. Join in the adventures and experience the exciting and dangerous life of a pioneer missionary in South America.Book Details:Format: PaperbackPublication Date: 8/13/2002Pages: 96Reading Level: Age 9 and Up
The Cat in the Hat takes Sally and Dick for an “umbrella-vator” ride through the understory, canopy, and emergent layers of a tropical rain forest, encountering a host of plants, animals, and native peoples along the way.Book Details:Format: HardcoverPublication Date: 4/22/2003Pages: 48Reading Level: Age 4 and Up
Look closely. Look very closely. Is it -chestnuts? Sea coral? Just turn the page and, lo and behold, it's a zebra tarantula. Colorful wonders await in the rain forest, including a red-eyed tree frog, a moth orchid and many more. Children will learn about a variety of animals and plants in this interactive book that encourages imagination and instills a respect for the natural environment.Book Details:Format: HardcoverPublication Date: 8/1/2010Pages: 40Reading Level: Age 4 and Up
Bats and big cats. Armies of ants. Squawking parrots. Strangling figs. From the ground up to the tree tops, the tropical rainforest teems with life. Stunning drawings, step-by-step experiments, fun-to-do activities, and fascinating facts abound in this magical exploration of an essential ecosystem, in danger of disappearing forever. Tropical Rain Forest is a new edition to the One Samll Square Series not previously published in hardcover.Book Details:Format: PaperbackPublication Date: 10/31/1998Pages: 48Reading Level: Age 6 and Up
An engaging look at some of the world's most unusual schools. At a school that sits on the edge of the Sahara, students are learning to speak English from a teacher who stands in front of a Webcam in North America. These students are learning in a virtual classroom. In another part of the world, kids aren't waiting to ride the bus to school - they are waiting to hop in a boat that will take them to a school that floats on a river. And some kids don't mind heights, especially those who attend a school on the slope of a mountain in the Himalayas, in one of the most remote corners of the earth. Margriet Ruurs contacted teachers and volunteers, many of whom took cameras in hand to photograph their schools and students. In this lively photo-essay, readers get to know students - from the arid plains of southern Afghanistan to the rain forests of Guatemala - who are pursuing their dreams of a brighter future.Book Details:Format: HardcoverPublication Date: 9/1/2009Pages: 32Reading Level: Age 7 and Up
Visit a world filled with strange animals and exotic plants while working your way through mazes, crosswords, and other skill-developing activities. Illustrations introduce children to the Komodo dragon, the world's smallest people, a monster plant, and much more. Instructions and solutions are included for each of the 30 puzzles. Free Teacher's Manual available. Grades: 1-2.Book Details:Format: Activity BookPublication Date: 8/21/2013Pages: 48Reading Level: Age 6 and Up
Rain forests are literally bursting with life! Covering just 6% of the earth’s surface, rain forests are home to over 60% of all known animal species! From the riverbed to the treetops, kids can explore the many fascinating layers of the rain forest in 3-D Explorer: Rain Forest. This amazing book gives kids a close-up view of the plants and animals that inhabit dense jungles. Filled with engaging facts and spectacular photography, this book also features five dramatic 3-D pop-up scenes with transparent layers that reveal the secrets of each rain forest zone.Book Details:Format: HardcoverPublication Date: 4/1/2009Pages: 32Reading Level: Age 7 and Up
One Day in the Tropical Rain Forest Today is doomsday for a young Venezuelan Indian boy's beloved rain forest and its animal lifeunless he and a visiting naturalist can save it. "George makes drama large and small out of the minute-by-minute events in an ecosystem . . . gripping ecological theater." C. "An example of nonfiction writing at its best." SLJ. Notable 1990 Children's Trade Books in Social Studies (NCSS/CBC)Outstanding Science Trade Books for Children 1990 (NSTA/CBC)
Describes the physical characteristics, behavior, reproduction, and habitat of frogs that live in the rain forest.Book Details:Format: PaperbackPublication Date: 3/1/1999Pages: 32Reading Level: Age 5 and Up
Melissa & Doug Stamp A Scene - Rain Forest Monkeys, snakes, birds and bugs galore combine to create a jungle straight out of your imagination! This extra-large stamp set makes it easy to create an exciting storyline or a color-in scene: It includes 20 rubber-faced, wooden-handled outline stamps and a two-color stamp pad filled with blue and green washable ink. Five colored pencils coordinate with the jungle theme to add details and color in the scene. It's a complete arts & crafts activity and storytelling kit in one!Product Measures: 11.1" x 10.5" x 1.4"Recommended Ages: 4 years & up
Melissa & Doug Magical Masterpieces - Rain ForestA few drops of paint are all you need to make a masterpiece! With easy-to-mix, easy-to-apply liquid watercolors, this kids' painting set is simple enough for beginners, but engaging enough to fascinate older kids too. The process is creative yet simple: Kids choose and mix the paints in the paint palette, then brush them onto the page. The "magic" is the watercolor-resist outlines: Almost invisible before painting begins, a framework of waxy lines, dots, and shapes appears as the paint soaks into the spaces between them--but not the outlines themselves! The result is a finished painting with crisp outlines, striking highlights, and amazing precision. A magical masterpiece! The set includes four jungle-themed artworks, four watercolor paints, brush, mixing tray, and instructions.
Melissa & Doug Petite Peel & Press Sticker by Number - Rain Forest Glistening sparkle-gem stickers make this jungle scene come to life! Just place each shaped "gem" on the wooden background according to the number key. The result is a glowing artwork that will make young artists proud! Its compact size makes this mini peel-and-press activity easy to complete in one sitting for fast, beautiful results.Product Measures: 8" x 8" x 0.4"Recommended Ages: 5 years & up
There was once a wide, windswept place, near nowhere and close to forgotten.... In the middle of a dark, lonely wasteland filled with old scrap metal lives an old man. Every night he dreams of a lively forest, full of sunshine, plants, birds, and animals. Every morning he wakes to gloom and bad weather. Then one day, he comes up with an idea to change things. But can an idea turn rain into sunshine? Can a dream make plants grow? The rich, detailed illustrations and lyrical text of The Tin Forest carry an important message of imagination and hope.Book Details:Format: PaperbackPublication Date: 10/13/2003Pages: 32Reading Level: Age 3 and Up
Each group pack features 5 each of 5 different shapes ready to customize. Shapes are cut from sturdy 10 pt. ScratchArt? multicolor board and measure 3.5" x 3.5". Use a wood stylus. Clean and safe. 25 shapes per pack.Features include: -Each group pack features 5 each of 5 different shapes ready to customize -Shapes are cut from sturdy 10 pt-Scratchart multicolor board and measure 3-Use a wood stylus-Clean and safeRecommended Ages:7 and up
Magic Tree House Research Guides are now Magic Tree House Fact Trackers! Track the facts with Jack and Annie! When Jack and Annie got back from their adventure in Magic Tree House #5: Afternoon on the Amazon, they had lots of questions. How much rain falls in a rain forest? What is the world's heaviest insect? What the heck is a sausage tree? Why is it important to preserve the world's rain forests? Find out the answers to these questions and more as Jack and Annie track the facts. Filled with up-to-date information, photos, illustrations, and fun tidbits from Jack and Annie, the Magic Tree House Fact Trackers are the perfect way for kids to find out more about the topics they discovered in their favorite Magic Tree House adventures.Book Details:Format: PaperbackPublication Date: 9/25/2001Pages: 128Reading Level: Age 6 and Up
When rain comes to the parched African savanna, the animals use all their senses to track the storm. The porcupine smells rain in the air. The zebras see lightning. The baboons hear thunder. The rhino feels the first drops. And the lion tastes the cool water. For a time, the grasslands abound with new green leaves, juicy fruits, and fresh pools of water. But soon the hot sun dries out the land, and the animals must again wait for the next big rain.Manya Stojic's picture book debut is as satisfying and refreshing as the rain she describes. With paintings that are exuberant and saturated with color and a simple text that rolls off the tongue with pleasure and ease, here is a book parents and teachers will enjoy sharing again and again.Book Details:Format: PaperbackPublication Date: 3/24/2009Pages: 32Reading Level: Age 3 and Up
When rain comes to the parched African savanna, the animals use all their senses to track the storm. The porcupine smells rain in the air. The zebras see lightning. The baboons hear thunder. The rhino feels the first drops. And the lion tastes the cool water. For a time, the grasslands abound with new green leaves, juicy fruits, and fresh pools of water. But soon the hot sun dries out the land, and the animals must again wait for the next big rain.Manya Stojic's picture book debut is as satisfying and refreshing as the rain she describes. With paintings that are exuberant and saturated with color and a simple text that rolls off the tongue with pleasure and ease, here is a book parents and teachers will enjoy sharing again and again.Book Details:Format: HardcoverPublication Date: 5/9/2000Pages: 32Reading Level: Age 3 and Up
One rainy day in the city, an eager little boy exclaims, Rain! Across town a grumpy man grumbles, Rain. In this endearing picture book, a rainy-day cityscape comes to life in vibrant, cut-paper-style artwork. The boy in his green frog hat splashes in puddlesHoppy, hoppy, hoppy!while the old man curses the dang puddles. Can the boy's natural exuberance (and perhaps a cookie) cheer up the grouchy gentleman and turn the day around?Book Details: Format: Hardcover Publication Date: 3/5/2013 Pages: 32 Reading Level: Age 4 and Up
Games & Puzzles > Puzzles > "rain forest jigsaw puzzle"
From your Melissa & Doug and Hasbro Games, to the Mattel Games products that keep you feeling your best - we've got you covered. You will consistently find that our prices are among the lowest in the industry. We ship FAST - overnight to more than 75% of the country, and in 2 days to everyone else. Free on all orders over $49. Our great customer service takes pride in delighting our customers.
|
<urn:uuid:bbc0febc-e57f-40f0-b5c0-4bfff55f1b32>
|
CC-MAIN-2014-41
|
http://www.yoyo.com/html/sg/rain-forest-jigsaw-puzzle.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657130272.73/warc/CC-MAIN-20140914011210-00277-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.897628
| 2,710
| 3.3125
| 3
|
The familiarity backfire effect is a cognitive bias that causes people to remember misinformation better, and to remember it as being true, after they are shown corrective information which is supposed to debunk it, as a result of the increased exposure to that misinformation.
For example, if someone is shown evidence which proves that a certain health-related myth is wrong, the familiarity backire effect could mean that after a week passes, that person will believe more strongly that the myth is true, because they forgot about the evidence which disproves it, but remember the myth itself better now due to their increased exposure to it.
Since the familiarity backfire effect plays a crucial role in how people respond to refutations of pseudoscientific theories and conspiracies, it’s important to understand it. In the following article, you will learn more about this cognitive bias, understand why people experience it, and see what you can do in order to debunk myths in a way that accounts for it.
Understanding the familiarity backfire effect
Essentially, the familiarity backfire effect means that, in some cases, if someone is shown information that proves that a certain myth is false, then after some time passes they are, they more likely to remember the myth itself, rather than the information which disproves it. Furthermore, they can also be more likely to believe that the myth is true, despite being shown information which actively disproves it.
The familiarity backfire effect plays a role in people’s thought process whenever they are exposed to information which is meant to correct some prior belief of theirs. As such, it can affect people not only when it comes to myths, but also when it comes to other types of misinformation, such as pseudoscientific theories or political conspiracy-theories.
For example, showing people data which proves that a certain alternative-medicine treatment doesn’t work, can often cause people to remember that treatment as being effective, after some time passes from the debunking attempt.
The familiarity backfire effect is therefore one of the main contributing factors to the continued influence effect of misinformation, which occurs when people continue to believe in inaccurate information even after being presented with a credible refutation of it.
Note: since the familiarity backfire effect represents a phenomenon where an attempt to change someone’s opinion by providing them with corrective information ends up backfiring, it’s considered to be a type of a backfire effect, as is evident in its name.
Examples of the familiarity backfire effect
There are many examples of how the familiarity backfire effect influences people’s thought process. Many of the research studies which examined this phenomenon focused on the topic of personal health, as in the following two examples:
- One study found that presenting people with false health-related claims while stating that those claims are false does help people understand that those claims are false in the short term, but increases the likelihood that they will remember those false claims as true after a few days have passed.
- Another study found that when people are given health-related warnings about what not to do, after some time has passed they often end up remembering those warnings as instructions on what they should do.
The familiarity backfire effect can, of course, play a role in other domains beyond personal health, and it can essentially influence people’s thinking in any situation which involves a debunking attempt.
For example, consider the following political situation, where one candidate attacks another one by claiming that they spend too much money on personal expenses:
Candidate A: just last year, you spent over $100,000 on personal travel expenses, which is an outrageous amount.
Candidate B: the idea that I spent $100,000 on travel expenses is ridiculous. You must be making stuff up, because I don’t know where you got the $100,000 figure from.
Here, the second candidate attempts to refute the accusation against him, but the way he does it can actually end up reinforcing the accusation. Specifically, the fact that he repeats the $100,000 figure increases people’s familiarity with it, which increases the likelihood that they will remember it, and believe that it’s true.
Why people experience the familiarity backfire effect
There are several cognitive mechanisms which explain why people experience the familiarity backfire effect.
First, increased familiarity with a statement makes it easier for people to process that statement. Essentially, each time people hear or read the statement which is being debunked they become more familiar with it, which makes it easier for them to process (by increasing its processing fluency).
Since people prefer to accept explanations which are easy for them to process from a cognitive perspective, this increased familiarity increases the chance that they will view that statement as being true.
Secondly, increased familiarity with a statement causes people to feel that they have heard this statement before. Since people tend to believe that true statements have a higher probability of being repeated compared to false statements, repeatedly hearing about the debunked theory makes people more likely to believe that it’s true.
Essentially, since people are more frequently exposed to widely-accepted beliefs than to fringe ones, familiarity with a certain belief or statement signals social consensus towards it, and provides it with familiarity-based credibility.
Finally, people’s imperfect memory sometimes causes them to remember only the information being debunked, rather than the debunking attempt itself. This means that the corrective information ends up being forgotten, and so the debunking attempt ends up only reminding people of the information that it was meant to debunk in the first place.
This often occurs because people find it easier to remember simple information, and so the easy-to-understand myths tend to stick in people’s memory over time, while the complex scientific explanations which are necessary in order to debunk them tend to be forgotten.
Note: in general, people tend to develop a positive attitude towards things that they become familiar with through repeated exposure even outside the context of debunking, as a result of a cognitive bias which is known as the mere-exposure effect. In addition, a related cognitive bias is the illusory truth effect, as it causes people to perceive statements that they are familiar with as being true. The familiarity backfire effect can be seen as a subset of these biases, which occurs when people become more familiar with a statement, and therefore more approving of it, as a result of a debunking attempt.
How to avoid the familiarity backfire effect
So far, we saw what the familiarity backfire effect is, why it’s a problem, and why people experience it.
There are several things that you can do in order to reduce the impact that this cognitive bias has on people, which will increase the effectiveness of your debunking attempts. First, there are two main guidelines that you should keep in mind with regards to how you should conduct the debunking process:
- You should focus on the facts. Throughout the debunking attempt, you should remember to focus on the new facts that you’re presenting as much as possible, rather than on the misinformation that you’re trying to debunk, in order to ensure that this is the information that people will remember.
- You should not repeat the misinformation any more than necessary. Though it is often necessary to address the misinformation itself during the debunking attempt, you should not reference it any more than is necessary, since doing so could increase people’s familiarity with it.
In addition, there are several guidelines that you should keep in mind with regards to how you should structure the debunking process:
- Start with the facts. When you start the debunking attempt, you should begin with the facts, and only then introduce the misinformation.
- Before presenting the misinformation, identify it as such. Before you mention the myth itself, you should explicitly state that the information that you are about to show is false, and also explain why it can be misleading, and why misinformers promote it in the first place.
- After presenting the misinformation, follow up immediately with corrective information. The debunking attempt must immediately follow the description of the original misinformation, to ensure that the focus isn’t on the misinformation, and to ensure that information pertaining to the original myth is replaced in the person’s memory by the real facts.
- The corrective information must include an explanation of the phenomenon. When you present the new facts, make sure to include a reasonable explanation for the phenomenon, which can replace the original myth as a valid explanation in people’s mind.
For example, let’s say that you want to explain to someone that Earth is not flat, while avoiding the risk of causing the familiarity backfire effect.
When it comes to your debunking attempt, your focus should generally be on explaining why the Earth is a sphere, rather than on explaining why the belief that the Earth is flat is wrong.
Furthermore, while you do need to reference the original myth in your debunking attempt, you should do so as little as possible, and emphasize that this myth is wrong, while ensuring that people understand the explanation which proves this.
In addition, you can also use general debiasing techniques, such as improving the decision-making environment and increasing people’s involvement in the reasoning process, which could further help reduce the likelihood that people will experience the familiarity backfire effect.
Finally, an important thing to keep in mind is that you should try to make your explanations as easy to understand and as accessible as possible, given your target audience. This makes it likelier that people will respond well to your debunking attempt, since, as we saw earlier, making an explanation easier for people to understand makes it more likely that they will accept it as true.
This is crucial, since simple myths are often more appealing to people from a cognitive perspective than the complex scientific explanations which are needed in order to debunk them. Therefore, by using simpler explanations, you make it more likely that people will listen to you and accept what you have to say.
Reducing your own familiarity backfire effect
It’s important to remember that we’re all vulnerable to the familiarity backfire effect, and that you might also suffer from this cognitive bias.
Though it’s difficult to reduce the likelihood that you will experience this bias by yourself, you can try and identify cases where you are vulnerable to it by looking for situations where you are more focused on the information that someone is attempting to debunk, than on the debunking attempt itself.
If you notice that this is happening, you can try to shift the focus back to the debunking attempt, even if you initially think that it’s incorrect, since doing so will allow you to assess it in a more rational manner in the long run.
You can also use the techniques that we saw above, in order to improve the way that the corrective information is being conveyed to you. However, this is only a realistic option in some cases, and not something that you can do in all situations.
Overall, the best way to reduce the likelihood that you will experience the familiarity backfire effect is to use general debiasing techniques, such as slowing down your reasoning process or improving your decision-making environment. These techniques are often relatively simple to implement, and can allow you to process new information in a way that enables you to make more rational decisions.
The familiarity backfire effect isn’t always there
As in the case of the worldview backfire effect, which only affects people’s thought process some of the time, there are also situations where the familiarity backfire effect doesn’t affect people’s thinking on a significant scale.
One study, for example, found that although refutation attempts that repeated the myth that they were debunking were less effective than those which focused on affirming the corrective facts, these attempts still worked overall, when it came to reducing people’s belief in misinformation.
This suggests that even though you should be wary of the familiarity backfire effect when it comes to devising refutation attempts, you should also be realistic when it comes to estimating its scope, and when trying to assess how much it affects people.
Summary and conclusions
- The familiarity backfire effect is a cognitive bias that causes people to remember misinformation better, and to remember it as being true, after they are shown corrective information which is supposed to debunk it, as a result of the increased exposure to that misinformation.
- This means that if someone is shown information that disproves a certain myth, their exposure to that myth could cause them to remember it better in the long run, and to believe that it is true.
- For example, one study found that showing people false health-related claims and identifying them as such does help them understand that those claims are false in the short term, but ends up increasing the likelihood that they will remember those claims as true after a few days pass.
- People experience the familiarity backfire effect because increased familiarity with a statement increases its perceived credibility and makes it easier for people to process it.
- To reduce the likelihood that people will experience the familiarity backfire effect as a result of a debunking attempt, you should start with the facts and focus on them, offer an alternative explanation to the myth, identify misinformation as such and avoid repeating it unless necessary, and always follow up misinformation with corrective information.
|
<urn:uuid:64bb441c-9b43-4758-8b59-1894563b50f2>
|
CC-MAIN-2019-39
|
https://www.effectiviology.com/familiarity-backfire-effect/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574265.76/warc/CC-MAIN-20190921043014-20190921065014-00398.warc.gz
|
en
| 0.963059
| 2,752
| 3.140625
| 3
|
Elision is the expulsion of a short vowel at the end of a word before a word beginning with a vowel. An apostrophe (') marks the place where the vowel is elided. ἀλλ᾽
) ἄγε, ἔδωκ᾽
) ἐννέα, ἐφ᾽
) ἄν, γένοιτ᾽
Elision is often not expressed to the eye except in poetry. Both inscriptions and the Mss. of prose writers are very inconsistent, but even where the elision is not expressed, it seems to have occurred in speaking; i.e. ὅδε εἶπε
and ὅδ᾽ εἶπε
were spoken alike. The Mss. are of little value in such cases.
Elision affects only unimportant words or syllables, such as particles, adverbs, prepositions, and conjunctions of two syllables (except περί, ἄχρι, μέχρι, ὅτι
72 b, c), and the final syllables of nouns, pronouns, and verbs. a.
The final vowel of an emphatic personal pronoun is rarely elided.
Elision does not occur in a.
Monosyllables, except such as end in ε
(τέ, δέ, γέ
The conjunction ὅτι that
is ὅτε when
The prepositions πρό before
, ἄχρι, μέχρι until
, and περί concerning
(except before ι
The dative singular ending ι
of the third declension, and in σι
, the ending of the dative plural. e.
Words with final υ
[*] 72 D.
Absence of elision in Homer often proves the loss of ϝ
(3), as in κατὰ ἄστυ
X 1. Epic admits elision in σά thy
, in the dat. sing. of the third decl., in -σι
in the personal endings, and in -ναι, -σθαι
of the infinitive, and (rarely) in μοί, σοί, τοί. ἄνα oh king
, and ἄνα ῀ ἀνάστηθι rise up
, elide only once, ἰδέ and
never. Hdt. elides less often than Attic prose; but the Mss. are not a sure guide. περί
sometimes appears as πέρ
in Doric and Aeolic before words beginning with other vowels than ι. ὀξεἶ ὀδύναι Λ
272. Cp. 148 D. 1.
Except ἐστί is
, forms admitting movable ν
(134 a) do not suffer elision in prose. (But some cases of ε
in the perfect occur in Demosthenes.)
[*] 73 D.
In poetry a vowel capable of taking movable ν
is often cut off.
in the personal endings and the infinitive is elided in Aristophanes; scarcely ever, if at all, in tragedy; its elision in prose is doubtful. οι
is elided in tragedy in οἴμοι alas
Interior elision takes place in forming compound words. Here the apostrophe is not used. Thus, οὐδείς no one
from οὐδὲ εἷς, καθοράω look down upon
from κατὰ ὁράω, μεθί_ημι let go
from μετὰ ἵ_ημι
). a. ὁδί_, τουτί_ this
are derived from the demonstrative pronouns ὅδε, τοῦτο
+ the deictic ending ι_
(333 g). b.
Interior elision does not always occur in the formation of compounds. Thus, σκηπτοῦχος sceptre-bearing
from σκηπτο ¨ οχος
). Cp. 878
On the accent in elision, see 174
[*] 75 D.
(ἀποκοπή cutting off
) occurs when a final short vowel is cut off before an initial consonant. In literature apocope is confined to poetry, but in the prose inscriptions of the dialects it is frequent. Thus, in Hom., as separate words and in compounds, ἄν, κάτ, πάρ
rarely) for ἀνά, κατά, παρά
). Final τ
is assimilated to a following consonant (but κατθανεῖν to die
, not καθθανεῖν
, cp. 83
a); so final ν
by 91-95. Thus, ἀλλέξαι to pick up
, ἂμ πόνον into the strife; κάββαλε threw down
, κάλλιπε left behind
lit. lying down
, καυάξαις break in pieces
, for καϝϝάξαις ῀ κατ-ϝάξαις, κὰδ δέ, καδδῦσαι entering into
, κὰπ πεδίον through the plain
, κὰγ γόνυ on the knee
), κὰρ ῥόον in the stream; ὑββάλλειν interrupt
, ἀππέμψει will send away
. When three consonants collide, the final consonant of the apocopate word is usually lost, as κάκτανε slew
, from κάκκτανε
out of κατ
. Apocope occurs rarely in Attic poetry. πότ
in meaning) is frequent in Doric and Boeotian. N.
—The shorter forms may have originated from elision.
|
<urn:uuid:b9f28667-52aa-4d51-b197-2e5416137056>
|
CC-MAIN-2020-45
|
http://www.perseus.tufts.edu/hopper/text?doc=Perseus:text:1999.04.0007:part%3D1:chapter%3D2:section%3D4
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107881551.11/warc/CC-MAIN-20201023234043-20201024024043-00701.warc.gz
|
en
| 0.845916
| 1,564
| 3.671875
| 4
|
EMĀMQOLĪ KHAN, son of the celebrated Georgian ḡolām Allāhverdī Khan (q.v.). Emāmˊqolī Khan is first mentioned as governor of Lār in Fārs in 1018/1610 (Eskandar Beg, II, p. 807; tr. Savory, II, p. 1010). On the death of his father in 1022/1613, Shah ʿAbbās appointed Emāmqolī Khan to succeed him as governor-general (beglarbeg) of Fārs; he retained the post of governor of Lār and held the rank of an amir of the dīvān (Eskandar Beg, II, p. 871; tr., p. 1084). In 1029/1619-20 Emāmqolī Khan was put in charge of the blasting operations necessitated by Shah ʿAbbās’s plan to link the headwaters of the Kārūn and Zāyandarūd rivers and thus augment the water supply of his capital, Isfahan (Eskandar Beg, II, p. 950; tr., p. 1171).
As Safavid viceroy in the south, Emāmqolī Khan played a major role in breaking the power of the Portuguese in the Persian Gulf. The first blow against Portuguese hegemony had been struck by Emāmqolī Khan’s father, Allāhverdī Khan, who had occupied Bahrain in 1011/1602 (Eskandar Beg, I, p. 614-16.; tr., p. 804 ff.; Falsafī, IV, pp. 66-67); Bahrain had been in Portuguese hands since 922/1516-17. Later Allāhverdī Khan and Emāmqolī Khan jointly drove the Portuguese out of Gombroon, modern Bandar-e ʿAbbās (q.v.); (Eskandar Beg, p. 980; tr., p. 1201), but the Portuguese retaliated by building a fort on the island of Qešm, which had been seized by Albuquerque a century earlier. (Qešm was of vital importance to the defense of Hormuz, because it was the source of much of the island’s freshwater supply, which was transported by sea.)
The arrival in the Persian Gulf of ships of the English East India Company (q.v.), founded in 1600, gave Shah ʿAbbās his chance to drive the Portuguese out of Qešm and Hormuz, because, lacking a navy, he needed ships to transport his troops to those islands. Emāmqolī Khan overcame the reluctance of the English sea captains to cooperate by threatening to cancel the trading privileges and permission to open factories at Jāsk, Shiraz, and Isfahan that had been granted to the English East India Company by Shah ʿAbbās in 1615 (Bellan, p. 261; Savory, p. 195). The combined operations were successful; the Portuguese fort on the island of Qešm was captured after the qezelbāš forces had suffered heavy casualties; and in 1031/1622 the Portuguese garrison on the island of Hormuz surrendered after a two-month siege (Eskandar Beg, II, pp. 979-82; tr., II 1202-4; Falsafī, IV, pp. 214-28). The entente cordiale between the English East India Company and the shah was of short duration; in 1623 the factors presented the shah with a letter from King James I complaining that the Persians had not kept their side of the bargain with regard to the division of the spoils (Curzon, II, p. 419 and n. 3).
Shah ʿAbbās placed complete trust in Emāmqolī Khan, as he had done in the case of his father. The amir’s wealth was such that one day the shah said jokingly to him: “I request, Emāmqolī, that you will spend one dirhem less per day, that there may exist some slight difference between the disbursements of a khan and a king!” (Malcolm, I, p. 382), but the shah did not feel threatened by his viceroy’s power. In 1042/1633, however, Emāmqolī Khan fell victim to the psychological insecurity of ʿAbbās’s successor, Shah Ṣafī, who put him and his family to death (Falsafī, II, pp. 390-94; H. R. Roemer, “The Safavid Period,” in Camb. Hist. Iran VI, p. 282). In Shiraz he built a madrasa known as Madrasa-ye Ḵān and provided it with extensive endowments in real estate, which, however, had already been lost to private ownership in 1307/1889. He also had a bridge built over the river Kor in Marvdašt. This bridge, known as Pol-e Ḵān, is still standing (Fasāʾī, pp. 474, 1221-22; Forṣat, pp. 595-96).
Bibliography (for cited works not given in detail, see “Short References”):
F. Bahārī, “Āṯār-e nāšenāḵta-ye Īrān. Pol-e Ḵān,” Honar o mardom, N.S. 146-47, 1353 Š./1975, pp. 60-62.
L.-L. Bellan, Chah ʿAbbas I, Paris, 1932.
N. Falsafī, Tārīḵ rawābeṭ-e Īrān o Orūpā dar dawra-ye Ṣafawīya, Tehran, 1316 Š./1937, pp. 76-86.
Idem, Zendagānī-e Šāh ʿAbbās-e Awwal, 4 vols., Tehran, 1334-46 Š./1955-67, II, pp. 97-101, 358; III, pp. 180, 285-86; IV, pp. 195-96, 208-10.
Fasāʾī, ed. Rastgār, pp. 466, 468-69. R. Mehrāz, Bozorgān-e Šīrāz, Tehran, 1348 Š./1969, pp. 471-72.
Moḥammad-Naṣīr Mīrzā Forṣat Šīrāzī, Āṯār-e ʿAjam, Bombay, 1353/1934.
B. Karīmī, “Madrasa-ye Ḵān dar Šīrāz,” Īrān-e emrūz 3/7-8, 1320 Š./1941, pp. 31-32.
Sir John Malcolm, History of Persia, 2 vols., London, 1815.
K. Raʿnā Ḥosaynī, ed., “Mawqūfāt-e Emāmqolī Ḵān bar mašāhed-e motabarraka,” MDAT 15, 1347 Š./1968, pp. 366-81.
R. Savory, Iran under the Safavids, Cambridge, 1980.
(Roger M. Savory)
Originally Published: December 15, 1998
Last Updated: December 13, 2011
This article is available in print.
Vol. VIII, Fasc. 4, p. 394
|
<urn:uuid:d805b9ff-0665-447e-b81d-9efde3e4ad58>
|
CC-MAIN-2013-48
|
http://www.iranicaonline.org/articles/emamqoli-khan
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164677368/warc/CC-MAIN-20131204134437-00091-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.920753
| 1,757
| 2.90625
| 3
|
Actinopterygii (ray-finned fishes) > Ophidiiformes
(Cusk eels) > Carapidae
(Pearlfishes) > Carapinae
Etymology: Encheliophis: Greek, enchelys, = eel + Greek, ophis = serpent (Ref. 45335).
Environment: milieu / climate zone / depth range / distribution range
Marine; demersal; depth range 1 - 150 m (Ref. 34024). Tropical
Indo-Pacific: Mauritius to the Society Islands, north to Taiwan and the Yaeyama Islands; including Mariana and Caroline islands.
Size / Weight / Age
Maturity: Lm ? range ? - ? cm
Max length : 30.0 cm TL male/unsexed; (Ref. 4104)
soft rays: 45 - 57;
Vertebrae: 119 - 126. Eel-like, moderate to shallow body depth; maxilla free and movable; cardiform teeth present; branchiostegal membranes partly or completely united; swim bladder with thin terminal membrane or bulb; lacking enlarged dentary or premaxillary fangs, dentary diastema, pelvic fins, and swim bladder rocker bone (Ref. 34024). Pectoral fins small, less than 29% head length; body thick, robust and highly pigmented (Ref. 34024).
Uncommon species (Ref. 34024). Lives within holothurians (e.g. Thelenota ananas and Bohadschia argus) (Ref. 1602).
Life cycle and mating behavior
Maturity | Reproduction | Spawning | Eggs | Fecundity | Larvae
Nielsen, J.G., D.M. Cohen, D.F. Markle and C.R. Robins, 1999. Ophidiiform fishes of the world (Order Ophidiiformes). An annotated and illustrated catalogue of pearlfishes, cusk-eels, brotulas and other ophidiiform fishes known to date. FAO Fish. Synop. 125(18):178p. Rome: FAO. (Ref. 34024)
IUCN Red List Status (Ref. 119314)
CITES (Ref. 115941)
Threat to humans
Fisheries: of no interest
Common namesSynonymsMetabolismPredatorsEcotoxicologyReproductionMaturitySpawningSpawning aggregationFecundityEggsEgg development
ReferencesAquacultureAquaculture profileStrainsGeneticsAllele frequenciesHeritabilityDiseasesProcessingMass conversion
Estimates of some properties based on models
Preferred temperature (Ref. 115969
): 23.6 - 28.9, mean 27.5 (based on 920 cells).
Phylogenetic diversity index (Ref. 82805
= 0.5078 [Uniqueness, from 0.5 = low to 2.0 = high].
Bayesian length-weight: a=0.00095 (0.00039 - 0.00233), b=3.05 (2.83 - 3.27), in cm Total Length, based on LWR estimates for this (Sub)family-body shape (Ref. 93245
Trophic Level (Ref. 69278
): 3.4 ±0.3 se; Based on size and trophs of closest relatives
Resilience (Ref. 69278
Vulnerability (Ref. 59153
): Low vulnerability (16 of 100) .
|
<urn:uuid:c248fa67-f239-4df6-8d00-b71767ad966e>
|
CC-MAIN-2019-13
|
http://www.fishbase.org/summary/16829
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203548.81/warc/CC-MAIN-20190325031213-20190325053213-00089.warc.gz
|
en
| 0.681461
| 755
| 2.953125
| 3
|
Definitions for umar
This page provides all possible meanings and translations of the word umar
'Umar, also spelled Omar, was one of the most powerful and influential Muslim caliphs in history. He was a sahābi of the Islamic prophet Muhammad. He succeeded Caliph Abu Bakr as the second Caliph of Rashidun Caliphate on 23 August 634. He was an expert Islamic jurist and is best known for his pious and just nature, which earned him the title Al-Faruq. He is sometimes referred to as Caliph 'Umar I by historians of Islam, since a later Umayyad caliph, 'Umar II, also bore that name. Under Umar the Islamic empire expanded at an unprecedented rate ruling the whole Sassanid Persian Empire and more than two thirds of the Eastern Roman Empire. His attacks against the Sassanid Persian Empire resulted in the conquest of the Persian empire in less than two years. It was Umar, according to Jewish tradition, who set aside the Christian ban on Jews and allowed Jews into Jerusalem and to worship.
Translations for umar
From our Multilingual Translation Dictionary
Get even more translations for umar »
Find a translation for the umar definition in other languages:
Select another language:
|
<urn:uuid:29b01d32-73b9-4526-b831-645190b7c00e>
|
CC-MAIN-2015-11
|
http://www.definitions.net/definition/umar
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461647.44/warc/CC-MAIN-20150226074101-00161-ip-10-28-5-156.ec2.internal.warc.gz
|
en
| 0.959199
| 265
| 3.53125
| 4
|
Double vision is a symptom associated with damage to the cranial nerves that are responsible for extraocular muscle function. In Chinese medicine, the eyes are the functional sphere of the Liver, and it reflects the state of all the organisms. The treatment for eye disorders includes the stimulation of some acupressure points for double vision that we’ll feature in this article and that anyone can use at home.
The symptom that an object looks like two or double is called “diplopia”. It is a symptom that interferes with one’s personal life. People who suffer from it can fall and have a fracture or sprain because their perspective becomes misaligned and mismeasured in relation to steps due to the double appearance that this symptom implies.
It can also be caused by overwork, stress, chronic fatigue, sleep disorders, etc. Concomitantly, systemic symptoms such as stiff neck and shoulders, headache, nausea, and general malaise may occur, and long-lasting symptoms may lead to depression and insomnia.
Diplopia is not pathological and develops temporarily due to overuse of the eyes. It may heal spontaneously, but if there is a sudden worsening or prolongation of this symptom, then more serious diseases involving the brain and nervous system can be the hidden cause underlying it.
Before undergoing acupuncture and moxibustion, consult a specialized medical institution where you can receive acupuncture and moxibustion treatments without worrying about tumors or aneurysms.
Does Acupuncture Help Double Vision?
Yes. Some acupoints such as Qiuhou and Jingming are very effective in the treatment of double vision. As long as stimulated regularly over a long-term treatment course, they can help to recover the normality of eyesight.
According to Western medicine, health conditions that can cause double vision are:
- Abducens palsy
In TCM, however, this symptom is associated with Blood deficiency.
Acupuncture therapy is expected to open the meridians, relax muscles, and promote blood circulation around the eyes. Usually, local acupoints are selected along the meridians and based on syndrome differentiation.
Oriental medicine thinks that nerve palsy is caused by “poor blood flow around the eyeball”. Poor blood flow causes the nerves that move the eyeballs to become undernourished, damaging and paralyzing the nerves.
As you’ll see, most of the acupoints that we’ll feature here are located around the eyes and surrounding areas. The stimulation of all these points is to be done in a similar way. To stimulate your acupressure points for double vision, first, make sure you have spotted the right place, then apply gentle and firm pressure, moving your index or thumb in circular movements so as to exert a continuous stimulation for about a minute or two. You can repeat it from two to seven times on each side.
Can Acupuncture Heal Eyes?
Yes, acupuncture can heal many different eye conditions as long as it is done properly by a fully qualified practitioner with traditional training.
According to an article published on Healthcare Medicine Institute website, researchers at First People’s Hospital of Lanzhou in China have tested the effects of acupuncture and supplementation in patients diagnosed with ophthalmoplegia. Their findings, according to this article, were that acupuncture was effective in eliminating the symptoms, including double vision, and recovering the proper function of the optic nerve.
Ancient Wisdom Accuracy
Among traditional Chinese medicine practitioners, it’s well known that there are many acupuncture points to improve vision that can definitely solve a wide variety of dysfunctions that affect the eyes, including extraocular muscle palsy, cranial nerve palsy, etc. However, when it comes to clinical acupuncture, it is necessary to have a proper personal diagnosis from a qualified doctor in order to do the treatment.
The amazing thing about acupressure is that it doesn’t take a professional’s diagnosis to carry out the treatment, you can confidently do it by yourself at home, but there are some measures to observe if you want to make the most out of this tool.
One very important factor to consider if you really want your treatment to work for you is how often you stimulate your acupressure points for double vision. It must be done regularly in the beginning, preferably daily, until the symptoms subside. Once there is a considerable reduction in the symptoms, then you can change the frequency of the treatment and do it four or three times a week until there are no more symptoms left.
How Distal Acupressure Works
If you’re new to this practice, you may feel awkward seeing distal points, such as foot acupressure points for better eye vision, but this has a well-established logic in the TCM system. Since the meridians that carry Qi in the body are longitudinal and have a gradual flow intensity, the stimulation on one side affects the other end of the channel.
A study carried out on mice and published in the Hindawi journal of scientific findings showed a significant increase in blood flow in the eyes of the subjects after a foot acupuncture treatment. The increased blood flow was observed in both the blood vessels as well as in the tissues of the eyes.
This study can serve as a scientific explanation for the efficacy of distal stimulation in the elimination of symptoms such as double vision after stroke with acupuncture. In general, it is part of the protocol to use distal acupoints in most treatments, combined with local points.
Acupuncture Points To Treat Double Vision
For Medial rectus muscle paralysis
Acupoint: Bl-1 (Other Names: Urinary Bladder-1/Jing Ming/Bright Eyes)
Bl-1 Jingming is located in the inner corner of both eyes. It’s a local acupoint that benefits the eyes, helps to reduce inflammation, and improves nerve function. It’s included in the treated acupressure points for cataracts.
Have a look at the other uses of Jingming in our article about acupressure points for autoimmune inflammation.
Acupoint: Bl-2 (Other Names: Urinary Bladder-2/Zan Zhu/Gathered Bamboo)
Bl-2 Zanzhu can be found right above and parallel to Jingming, in the middle of the inner corners of both eyebrows. The stimulation of this acupoint benefits the eyes as well as the head in general. Zanzhu is connected to the divergent meridian of the Bladder channel, and the stimulation of this acupoint benefits the Kidneys and sexual organs as well. This is one of the acupoints used in acupressure for better vision treatment.
Bl-2 is also included in the used acupressure points for eye floaters.
For Lateral rectus muscle paralysis
Acupoint: EM-5 (Other Names: Tai Yang)
Taiyang, as this point is also called, is located on the mid-point on the side of your face between the end of your eyebrow and the start of your ear. The stimulation of this acupoint clears Heat, reduces swellings, opens the channel, and alleviates pain. This point is used in acupuncture for eye bags as well.
Find out EM-5 other uses in our article on acupressure points on the face for glowing skin.
Acupoint: GB-1 (Other Names: Gallbladder-1/Tong Zi Liao/Pupil Crevice)
GB-1 Tongziliao is located on the external corner of the eyes, approximately one centimeter from it. The stimulation of this acupoint improves blood circulation and nerve function. See this acupoint in acupuncture for puffy eyes treatment.
Tongziliao is one of the acupressure points for dry skin as well.
For Paralysis of the Superior Rectus Muscle
Acupoint: GB-14 (Other Names: Gallbladder-14/Yang Bai/Yang White)
GB-14 Yangbai can be found at about one centimeter and a half above the eyebrows, parallel to the pupils of the eyes. This acupoint is beneficial to the eyes in general, and it is also helpful to relieve pain in the eyes as well as frontal headaches. This is one of the acupressure points for watery eyes.
Yangbai is also one of the acupressure points for seborrheic dermatitis.
For Inferior rectus muscle palsy
Acupoint: EM-6 (Other Names: Qiu Hou)
EM-6 Qiuhou can be found on the lower border of the orbit, just a finger-width from the edge of the eyes. This acupoint is effective in treating eye diseases in general, such as pigmentary degeneration of the retina, optic neuritis, early-stage cataract, and glaucoma. It’s also one of the normally used acupressure points for an eye infection and is utilized in glaucoma acupuncture treatment.
For more uses of EM-6, see acupressure points for dark circles.
Acupressure can be safely done by anyone who wishes to have a subtler treatment that is efficient. The stimulation of all these acupressure points for double vision provides a synergy that is bigger than the sum of each one. That is why it’s way more interesting to treat all those acupuncture points to improve vision instead of picking one or two only.
Another good alternative if you’re looking to restore your vision with acupuncture is to take a step further and get a full acupuncture treatment from a TCM doctor in a clinic. There are some studies that show its benefits, including this case report from a 58-year-old man with unilateral abducens palsy related to diabetes mellitus and hypertension, that I encourage you to have a look at and take your own conclusions.
|
<urn:uuid:0ce927be-afa1-49d0-8139-f4e9906ece1d>
|
CC-MAIN-2022-49
|
https://tcmtips.com/best-6-acupressure-points-for-double-vision/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711475.44/warc/CC-MAIN-20221209181231-20221209211231-00682.warc.gz
|
en
| 0.935703
| 2,093
| 2.625
| 3
|
It’s one thing to read about segregation and the Civil Rights movement of the 1960s in books. But history comes to life when you hear from the people who were on the front lines.
In the United States, students are taught about the Jim Crow era and the Civil Rights movement in school. But what can get lost in the lesson plans and textbooks is the emotional truth of what it felt like to live at a time when racial segregation was the reality in America. That’s one reason why Dave Isay (TED Talk: Everyone around you has a story the world needs to hear), the founder of StoryCorps and winner of the 2015 TED Prize, launched The Great Thanksgiving Listen, an annual project that encourages people across the US to take advantage of holiday togetherness to interview a grandparent or elder.
Here are excerpts from several interviews recorded in 2015 and 2016 that provide personal insights on the legacy of segregation and the fight for civil rights. Each also offers a sobering reminder of what it takes to stand up to hatred.
Intimidation didn’t keep her from graduating high school
Emma James grew up in Knoxville, Tennessee, at a time when being African-American meant that she had to sit at the back of the bus and in the balcony at the movie theater. In an interview with her granddaughter, Alexis, who lives in Rockville, Maryland — Emma shared what happened when she was part of an effort to integrate a local school as a teenager. “There was a white high school near where I lived, and ministers wanted a group of us in the neighborhood to go and register there,” she said. “The morning we were supposed to go, a cross was burned on the school lawn.” The threat had the intended effect — she and the other black students didn’t enroll. Still, Emma’s family received anonymous, threatening phone calls at night “for a long period of time” afterwards. There were other repercussions. Although Emma had lived in Knoxville with her grandmother for her entire life, Emma’s mother had moved to another state. “I was told that I would have to withdraw from the school system in Knoxville,” she said. “It was an effort to get me out.” The NAACP came to her aid. “They paid out-of-state tuition for me to continue to attend, so I could graduate with my class.” Emma went to college and said that’s when she finally began to see a cultural shift in how black Americans were treated. She fondly remembered having Martin Luther King Jr. as her college graduation speaker.
He saw protest bring out the best and worst in people
A young white lawyer in the 1960s, James Murphy knew exactly what role he wanted to play in the American legal system. He wrote to the US Department of Justice in 1965 and asked for — and got — a job in its new Civil Rights division. Murphy, now 84, was sent to Mississippi to be present “as people exercised the First Amendment right to protest segregation. If they were attacked — and they were — I was a witness,” he explained in an interview with daughter Kate Murphy Zeman, 47, and granddaughter Jane Zeman, 15. Murphy also filed federal lawsuits against authorities who didn’t uphold the Constitution and litigated to desegregate schools and enforce voting rights. He encountered many hostile judges along with brave ones “who defied local opinion.” A case in Grenada, Mississippi, was particularly memorable. On their first day of school, a group of black children was attacked by white factory workers. “One little boy’s leg was broken,” he said. Murphy could still hear the stirring voice of his colleague, who argued the case and declared, “I’ve seen the Negro citizens of Mississippi denied their rights to schooling, denied their right to vote, I’ve seen their land taken away, but never have I seen white citizens of Mississippi beat and hurt little children. It is the shame of Mississippi.’” Murphy somberly recalled, “the jury stayed out for seven or eight hours before acquitting [some of] them.”
He helped integrate a fire department in California
Eugene Milton Williams, now 95, learned to drive a truck and fight forest fires while working for the Civilian Conservation Corps (CCC), which was started during the Great Depression to provide jobs and improve America’s roads and parks. Williams, who is African-American, served in the Navy during World War II, and then he returned home to Oakland, California. In an interview with his grandson, Michael Willis, 44, Williams described how he lived around the corner from a firehouse, Engine 22. “One of the fellows told me about a lieutenant who was giving classes to black men,” he said. Williams passed the exam and was hired, but he was dismayed by the all-black firehouse where he was posted — he described it as a “Mickey Mouse house” with a “little dinky fire truck.” So, he said, “I went into the Fire Chief’s office by myself and complained about the segregation and about how we got the dirty jobs — the cleanup jobs around the city.” The NAACP became involved, and in 1954, Williams became the first African-American man to integrate the Oakland Fire Department after he was assigned to Engine 19, until then an all-white unit. Life was difficult, especially at meal times since he was not allowed to dine with the rest of the crew. “I’d eat my dinner by myself,” he recalled. Every night, one man at the station would sleep downstairs to sound the alarm if a call came in. Williams’ colleagues wanted him to bring his own mattress because they didn’t want to use the same one he did. Eventually, he chose to resign. “I’d had it with the hypocrisy,” he said.
She remembers integration — and the curiosity that came with it
Wilhelmina Rozier now lives in Philadelphia, but she grew up in Georgia. Her neighbor Sherrick McNeal interviewed her to learn about her experiences in the segregated South. “Racism was normal for us,” said Rozier, who was one of six children. “We were taught how to keep ourselves from being victims. We were taught where to go, to travel in a group and that there was a certain way to talk around white folks.” Rozier attended an all-black school through ninth grade, and she appreciated her teachers. “They were tough on us because they knew it was going to be hard for us to succeed,” she said. “They wanted us to use our brains over our brawn.” Rozier was a high school student when her school was integrated. She recalled feeling alarmed to see some of her black classmates tracked into vocational programs — it seemed like a less overt form of segregation to her. But she also remembered the curiosity that she and her new white classmates felt about each other. “Parents were still practicing prejudice, but young people were feeling free and able to mingle,” Rozier said. “We had been taught so much about whites being against blacks and whites being against blacks, so when we integrated, everybody just wanted to know what all the hoopla was about.”
He faced discrimination as a Chinese-American
Stan Lou’s parents emigrated to America from China in the 1930s and bought a small grocery store in Greenville, Mississippi. “We weren’t allowed in the white schools, but we weren’t permitted in black schools either,” said Lou, in an interview with Aryani Ong, 47. “The city built a one-room schoolhouse for the Chinese students.” He was crowded together with 40 students of all ages, and they had a single teacher. Later, community elders petitioned the school board to allow Chinese students into white schools. “They said okay on a trial basis,” explained Lou. “We knew we were under a lot of pressure. It was, ‘Don’t get in trouble. Don’t make waves. Be quiet.’ We lived under the shadow of being the aliens — the yellow devils.” Lou excelled in school, so he was disheartened when the school changed its valedictorian policy. Instead of the title going to the student with the best grades, it went to a student who was selected by the administration. “This was done blatantly,” declared Lou, now 77. “It was a reminder that I might be the smartest student in the class, but I was still just the Chinaman.” He called discrimination “the backdrop of my whole childhood.” He attended the University of Michigan, where he found greater acceptance, but his early experience stayed with him. “It taught me to dislike being Chinese and to reject my community,” he said. “It took me a lifetime to get over that.”
He was in Washington for the “I Have a Dream” speech
“It was one of the most significant things I can remember in my entire life,” said Arthur Miller, of the March on Washington for Jobs and Freedom that took place on August 28, 1963. As he spoke about the experience in an interview with his granddaughter, Julia Miller, he remembered walking through the streets of Washington with thousands of people, their hands interlocked and voices singing. Then they all stopped at the Lincoln Memorial, where Martin Luther King Jr. spoke. “It was very stirring, very emotional,” he said. It had been a risk for Arthur, who is white, to attend. “There were some family members and people I did business with who did not agree at all,” he explained. Arthur felt an outpouring of emotions as King spoke and shared his vision with the cadence and poetry that has captured multiple generations, but it wasn’t immediately evident to him or other onlookers just how powerful the words were. “People didn’t know it at the time,” Arthur said. “As convinced as I was at the time that being there was the right thing to do, I’ve been convinced more over time.”
Take part in the Great Thanksgiving Listen. Interview an older relative or friend about their experience of discrimination in the US, their take on race today, or their hopes and fears about the world going forward. Download the StoryCorps app to find out more.
|
<urn:uuid:0780b92c-759c-4e00-b0ac-dc34ca9cc56b>
|
CC-MAIN-2020-05
|
https://ideas.ted.com/what-older-americans-can-teach-us-about-the-fight-for-civil-rights/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250611127.53/warc/CC-MAIN-20200123160903-20200123185903-00536.warc.gz
|
en
| 0.987958
| 2,227
| 3.21875
| 3
|
The making of nets, an open textile in which threads are fused, looped or knotted at their intersections, historically for fishing and trapping animals.
|Historic area of significance||UK, especially rural areas|
|Area currently practised||UK|
|Origin in the UK|
|Minimum no. of craftspeople required||50? because of its distributed and localised nature. (The internet and YouTube have been a huge help in documenting and transferring the skills)|
|Current no. of trainees||100s|
|Current no. of skilled craftspeople||100s|
|Current total no. of craftspeople||100s|
Historically nets were used for fishing and animal trapping. Today, hand-knitted nets are are no longer used for fishing (instead, industrially produced sheet netting is used). Hand-knitted nets are still used for pest control and for sport, such as ferreting for rabbits. Today, there are very few commercial net makers – but there are hundreds of makers knitting nets as a hobby and for their own use.
Purse net making in particular is strong and popular, carried out on a small scale by many people for their own use and local sales. No large scale commercial hand making. Long net making is less common.
purse nets (for rabbits)
Issues affecting the viability of the craft
Availability of materials
Viability of the sport these nets support i.e. ferreting
A significant decline in rabbit populations or a change in the law could kill it
No formal organisations – but plenty of Facebook sites and YouTube channels
Craftspeople currently known
|
<urn:uuid:4e4f99e0-3479-4135-a90f-ed21dcb2001e>
|
CC-MAIN-2018-09
|
http://heritagecrafts.org.uk/net-making/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812788.42/warc/CC-MAIN-20180219191343-20180219211343-00592.warc.gz
|
en
| 0.924802
| 343
| 3.28125
| 3
|
A species of hummingbird makes a chirping noise with its tail feathers, not its throat, a study using high-speed video has suggested.
The exact source of the noise from male Anna's hummingbirds has been the subject of debate among researchers.
By using specialised footage, a team of US scientists were able to show that male hummingbirds' tail feathers vibrated during high-speed dives.
The findings appear in the Proceedings of the Royal Society B journal.
The loud chirp sound is produced by male Anna's hummingbirds (Calypte anna) as the birds dive towards the ground at speeds that exceed 50mph (80km/h) during their displays for nearby females.
Hitting the right note
The researchers, Chris Clarke and Teresa Feo from the University of California, Berkeley, wrote in their paper that they had gathered evidence that put an end to the uncertainty surrounding the source of the sound.
"Production of the sound was originally attributed to the tail, but a more recent study argued that the sound was vocal.
"We use high-speed video of diving birds, experimental manipulation on wild birds and laboratory experiments on individual feathers to show that the dive sound is made by tail feathers," they explained.
The pair added that while bird vocalisation had received considerable attention, non-vocal or "mechanical" sounds had been "poorly described".
"A diverse array of birds apparently make mechanical sounds with their feathers. Few studies have established that these sounds are non-vocal, and the mechanics of how these sounds are produced remain poorly studied," the scientists wrote.
They said the footage revealed that the trailing vane of the birds' out-tail feathers fluttered rapidly to produce the sound.
The characteristic dive caused a subtle change in the shape of these feathers to produce a loud chirping sound, the researchers noted.
"Many kinds of birds are reported to create aerodynamic sounds with their wings or tail, and this model may explain a wide diversity of non-vocal sounds produced by birds," they concluded.
|
<urn:uuid:e3d71059-d68d-4831-b5ba-e6b2af05d034>
|
CC-MAIN-2017-09
|
http://news.bbc.co.uk/2/hi/science/nature/7216230.stm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00409-ip-10-171-10-108.ec2.internal.warc.gz
|
en
| 0.971176
| 427
| 3.78125
| 4
|
"Japan is the key ... " to "the Orient," that is, in H.J. Heinz's judgment of 1902. The belief underlay Heinz's interest in Japan as an emerging power with a mature civilization (and not, as was widely believed, a nation of Asian "barbarians"). Heinz's interest led him to begin acquiring carved ivories (okimono), one of the two major collections presented in the Carnegie Museum of Art exhibit "Japan Is the Key ...": Pittsburgh Collects Prints and Ivories, 1900-1920.
The ivories predate both restrictions on importing ivory (enacted in 1973 and 1989) and widespread — though still far from universal — opposition to the slaughter of elephants. The ivories range from miniature netsuke, which were kimono accessories, to pieces up to 12 inches high by 6 inches wide, limited by the width of a tusk. The artistry is exquisite, depicting slices of daily life, such as a fisherman catching an eel, or figures from myth and fantasy. A few are assembled in sections, including a remarkable life-sized eagle made of hundreds of pieces.
The other major collection here is of Japanese woodcut prints (ukiyo-e) assembled under the guidance of a Heinz contemporary, poet and critic Sadakichi Hartmann. The woodcuts are more familiar, produced in great quantity and still widely available, though the selections here are of particular cultural and historical importance. Celebration of nature is a recurring theme, as in Hokusai's views of Mount Fuji, along with genre scenes, images of culture and the arts, and geishas and courtesans. The prints are highly imaginative and visually inventive, as with a waterfall rendered as a few vertical stripes, with dots representing splashing water.
Early Carnegie Institute curators (before the split into museums of art and natural history) started the Japanese collection while envisioning a new world culture fusing the best of East and West. (If only!) A label explains that the Japanese audience responded to depictions of current events, popular culture and folk and literary references, while American collectors focused on famous names, aesthetics and signs of change in Japanese society. A century later, the distinction is probably still largely true. Research and education are key roles for museums, and I was more than a little enlightened by the succinct and informative exhibit labels. But simply from the perspective of aesthetics and craft, the exhibit is breathtaking.
|
<urn:uuid:b9eaedb3-dee4-4647-8b75-9a9d0162145d>
|
CC-MAIN-2019-22
|
https://m.pghcitypaper.com/pittsburgh/vintage-japanese-prints-and-ivories-make-for-a-breathtaking-show-at-the-carnegie/Content?oid=1670211
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257243.19/warc/CC-MAIN-20190523103802-20190523125802-00448.warc.gz
|
en
| 0.951967
| 500
| 2.71875
| 3
|
Child abuse is the physical, sexual or emotional mistreatment of children.In the United States, the Centers for Disease Control and Prevention (CDC) define child maltreatment as any act or series of acts of commission or omission by a parent or other caregiver that results in harm, potential for harm, or threat of harm to a child.Most child abuse occurs in a child's home, with a smaller amount occurring in the organizations, schools or communities the child interacts with. There are four major categories of child abuse: neglect, physical abuse, psychological/emotional abuse, and child sexual abuse.
Different jurisdictions have developed their own definitions of what constitutes child abuse for the purposes of removing a child from his/her family and/or prosecuting a criminal charge. According to the Journal of Child Abuse and Neglect, child abuse is "any recent act or failure to act on the part of a parent or caretaker which results in death, serious physical or emotional harm, sexual abuse or exploitation, an act or failure to act which presents an imminent risk of serious harm".
Physical abuse is physical aggression directed at a child by an adult. It can involve punching, striking, kicking, shoving, slapping, burning, bruising, pulling ears or hair, stabbing, choking or shaking a child. Shaking a child can cause shaken baby syndrome, which can lead to intracranial pressure, swelling of the brain, diffuse axonal injury, and oxygen deprivation; which leads to patterns such as failure to thrive, vomiting, lethargy, seizures, bulging or tense fontanels, altered breathing, and dilated pupils. The transmission of toxins to a child through its mother (such as with fetal alcohol syndrome) can also be considered physical abuse in some jurisdictions.
Most nations with child-abuse laws consider the infliction of physical injuries or actions that place the child in obvious risk of serious injury or death to be illegal. Beyond this, there is considerable variation. The distinction between child discipline and abuse is often poorly defined. Cultural norms about what constitutes abuse vary widely: among professionals as well as the wider public, people do not agree on what behaviors constitute abuse.
Some human-service professionals claim that cultural norms that sanction physical punishment are one of the causes of child abuse, and have undertaken campaigns to redefine such norms.
The use of any kind of force against children as a disciplinary measure is illegal in 24 countries around the world, but prevalent and socially accepted in many others. See corporal punishment in the home for more information.
Child sexual abuse
Child sexual abuse (CSA) is a form of child abuse in which an adult or older adolescent abuses a child for sexual stimulation. Forms of CSA include asking or pressuring a child to engage in sexual activities (regardless of the outcome), indecent exposure of the genitals to a child, displaying pornography to a child, actual sexual contact against a child, physical contact with the child's genitals, viewing of the child's genitalia without physical contact, or using a child to produce child pornography.
The effects of child sexual abuse include depression, post-traumatic stress disorder, anxiety, propensity to re-victimization in adulthood, and physical injury to the child, among other problems. Sexual abuse by a family member is a form of incest, and can result in more serious and long-term psychological trauma, especially in the case of parental incest. Child sexual abuse is also strongly connected to the development of addictive behavior, complex post-traumatic stress disorder and borderline personality disorder.
Approximately 15% to 25% of women and 5% to 15% of men were sexually abused when they were children.Most sexual abuse offenders are acquainted with their victims; approximately 30% are relatives of the child, most often brothers, fathers, mothers, uncles or cousins; around 60% are other acquaintances such as friends of the family, babysitters, or neighbors; strangers are the offenders in approximately 10% of child sexual abuse cases.
Out of all the possible forms of abuse, emotional abuse is the hardest to define. It could include name-calling, ridicule, degradation, destruction of personal belongings, torture or destruction of a pet, excessive criticism, inappropriate or excessive demands, withholding communication, and routine labeling or humiliation.
Victims of emotional abuse may react by distancing themselves from the abuser, internalizing the abusive words, or fighting back by insulting the abuser. Emotional abuse can result in abnormal or disrupted attachment disorder, a tendency for victims to blame themselves (self-blame) for the abuse, learned helplessness, and overly passive behavior.
Child abuse in india this year
NEW DELHI: The National Commission for Protection of Child Rights has received 75 cases of child abuse, including cases of corporal punishment upto October 31, with the highest number being reported from the national capital and Uttar Pradesh.
While Delhi received 13 complaints of child abuse and 7 cases of corporal punishment, Uttar Pradesh reported six cases of child abuse and 15 cases of corporal punishment.
Gujarat, Goa and Arunachal Pradesh reported no such cases, Minister of State for Women and Child Development Krishna Tirath said in a written reply in Rajya Sabha today.
NCPCR has taken up serious cases, including the case of Rouvanjit Rawla, who committed suicide after facing corporal punishment, with concerned authorities
The government proposes to bring in a new law on the protection of children from sexual offences, she said.
Read more: 75 cases of child abuse reported this year - The Times of India http://timesofindia.indiatimes.com/india/75-cases-of-child-abuse-reported-this-year/articleshow/6969299.cms#ixzz17tpuiC9M
|
<urn:uuid:dbc20b53-62bf-44f3-b42d-1d8c1ab0da50>
|
CC-MAIN-2018-43
|
http://sujitheie.blogspot.com/p/child-abuse.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512679.76/warc/CC-MAIN-20181020080138-20181020101638-00424.warc.gz
|
en
| 0.939193
| 1,178
| 3.671875
| 4
|
Vertigo is a severe medical symptom during which the patient feels that the objects around him are spinning when actually they are not. The spinning sensation can occur anywhere anytime without any prior indication. Vertigo is often confused with dizziness which is less serious and usually does not require medical help. On the other hand, depending upon the severity, a vertigo episode may require emergency medical help. In the developed world, approximately 2-3% of the emergency department visits are due to vertigo.
Vertigo is either associated with problems in the CNS or the auditory canal. Overall about 125 million people suffer from vertigo each year. However, the good news is that extensive medical research over the years has provided us with detailed information about vertigo- its signs and symptoms, causes, diagnosis and cure. We have compiled this piece to provide you with every single detail that you should know about Vertigo if you or your close one is a sufferer. Our FAQ styled article is easier to navigate and will help you quickly find answers to all of your queries. Read more below:
Q1: What Is Vertigo? – Difference Between Dizziness and Vertigo:
Dizziness is simply lightheadedness (faintness) and unsteadiness (imbalance) while walking. With a dizziness natural treatment, you’ll be able to end the symptoms much quicker. Vertigo is, however, a severe form of dizziness. Vertigo is differentiated from general dizziness by a rotational or spinning movement in the head, the sufferer feels that the objects around him are moving while actually they are not. Patients often replace the terms dizziness and vertigo with each another but the medical reasons underlying vertigo are more serious. It is important to distinguish between general dizziness (lightheadedness and unsteadiness) and vertigo in order to get a proper treatment. This spinning motion is a characteristic symptom for vertigo. While dizziness can affect both young and elderly, vertigo is reported more commonly in elderly and females.
Q2: When Should Vertigo Be Suspected?
If you experience the following conditions your dizziness is serious and might be suspected as vertigo:
- You have frequent dizziness episodes,
- Your dizziness spells last longer than a minute,
- You experience a variety of symptoms during your dizziness episodes such as blurred vision, abnormal eyeball movement, speech difficulty, general weakness in body, lack of limb coordination or numbness, frequent unconsciousness or fever,
- You had a recent head injury,
- You experience dizziness during physical activities/workouts
Most of these symptoms would occur in combination. If they occur frequently, medical help should be immediately considered. Dizziness specifically associated with the motion of stationary objects, nausea and vomiting is Vertigo.
Q3: What Are the Signs and Symptoms of Vertigo?
There are some common signs and symptoms of vertigo but their extent may vary from patient to patient according to age and external factors. These symptoms can appear anywhere, anytime as a person slightly moves his head. The common signs and symptoms of vertigo include:
- Spinning, swaying or a tilting movement in the head
- Misbalance while walking
- A headache in a specific part (A migraine headache)
- Nausea and vomiting
- Abnormal ringing sound in ears cases leading to hearing loss in extreme cases
- Body fatigue and abnormal sweating
- Nystagmus i.e. abnormal movement of the eyes
- Panic and anxiety attacks
Q4: What Are the Causes of Vertigo?
Vertigo has two types, Peripheral Vertigo and Central Vertigo, both of which are associated with different causes. In order to understand the causes, it is important to understand these types;
1. Peripheral Vertigo: Occurs when there is a problem in the inner ear
2. Central Vertigo: Occurs when there is a problem in the sensory nerve pathway of the brain.
Causes of Peripheral Vertigo
Peripheral Vertigo happens due to the disturbance in the inner ear organs. There is a complex structure in the inner ear called labyrinth that contains organs for hearing and of balance. These organs send messages to the brain to maintain body balance in response to changes in gravity e.g. whenever a person stands after sitting or vice versa. Any disturbance in these organs leads to body misbalance and hence, vertigo. What causes this disturbance is usually inflammation from an ear infection. Common conditions associated with Peripheral Vertigo are:
- Labyrinthitis: “-itis” in medical terms is associated with inflammation. Labyrinthitis is inflammation of labyrinth and happens because of viral infection.
- BPPV: BPPV or Benign Proximal Positional Vertigo (BPPV) is disturbance in the crystal like particles present in the inner ear. These crystal like particles are made of calcium carbonate (CaCO3) and are responsible for sending positional information to CNS. As a result of BPPV, positional information continues to be send to the brain even after head movement is stopped leading to imbalance.
- Vestibular Neuronitis: Vestibular Neuronitis or Vestibular Neuritis is an inflammation of the brain that connects labyrinth to the brain. Remember Labyrinthitis is inflammation of the labyrinth itself.
- Meniere’s Disease: Meniere’s disease can lead to a very severe form of Peripheral Vertigo which may last from for several days. It is basically a build-up of fluid in the inner ear changing the pressure inside. In addition to Vertigo, Meniere’s disease can also lead to tinnitus (abnormal ringing sound in the ears) or hearing impairment.
- Head Injury: Peripheral Vertigo can also follow severe or minor head injury. If you experience symptoms of vertigo following a head injury, then other conditions (Labyrinthitis, BPPV, Vestibular Neuronitis, and Meniere’s disease) can be safely ruled out.
Causes of Central Vertigo
Central Vertigo is associated with problems of the CNS. It either involves disturbance of the brainstem (cerebellum) or those of thalamus. Cerebellum is responsible for maintaining vision and balance whereas thalamus receives and sends messages between body and the brain. The causes of Central Vertigo are
- A Migraine: An extreme headache experienced in a specific part of the head.
- Brain Tumor (Cancer): Tumor is an undifferentiated mass of cells. It may be located at the bottom of the brain (brainstem) in the cerebellum.
- Multiple Sclerosis: An autoimmune disease in which the immune system attacks the nerve fibers damaging their protective covering.
- Stroke: Stroke is an ischemic attack resulting from the deficiency of blood supply to the brain cells.
- Acoustic Neuroma: A non-cancerous mass of cells in the acoustic nerve (also called the cochlear nerve) which connects ear and the brain.
Q5: What is BPPV (Benign Paroxysmal Positional Vertigo)?
BPPV is a very common cause of vertigo, it can either lead to mild or intense episodes of vertigo. BPPV affects posterior semicircular canal in the inner ear. A mass of crystal like particles of calcium carbonate (CaCO3) and protein accumulates inside posterior semicircular canal. Whenever the head is moved for looking around, during sleep or for any normal activity, the crystal and protein particles start to move inside the canal resulting in sensation of head spinning or vertigo.
Q6: What Leads To BPPV?
BPPV is the accumulation of calcium and protein particles inside the inner ear canal. The build-up of these particles is explained by ear degeneration due to aging, inner ear (viral) infection or head injury. BPPV can also result from ear poisoning (ototoxicity) from medications and environmental chemicals.
Medications: Medications commonly responsible for ototoxicity are anticonvulsants, antidepressants, anti-hypertensives, over-the-counter medicines, pain relievers, and loop diuretics.
Environmental Chemicals: Environmental chemicals from air and industrial pollution such as tin, mercury and lead can damage ear nerves and cause ear poisoning.
Q7: What Is the Famous Carol Foster Method to Treat Positional Vertigo (BPPV)?
Associate Professor Carol Foster at the University Of Colorado Hospital in 2012 came up with a new and very effective method to treat BPPV. Her method is called “Half Somersault Maneuver” also known as the “Foster Maneuver“. This method took over the internet as the Simple Fix to Cure Vertigo. Here is how to perform it for right and left ear:
Half Somersault Maneuver for Right Ear
- Patient looks straight up to the ceiling
- Head is placed in a somersault position
- Head is turned to face right elbow
- Head is raised slightly upwards (face still facing the right elbow)
- Head is raised completely (face still facing the right elbow)
Half Somersault Maneuver for Left Ear:
- Patient looks straight up to the ceiling
- Head is placed in a somersault position
- Head is turned to face left elbow
- Head is raised slightly upwards (face still facing the left elbow)
- Head is raised completely (face still facing the left elbow)
Q8: Which Type of Doctors Should I Consult for Vertigo?
Which type of doctor you should consult for vertigo depends on what type of vertigo you have i.e. peripheral or central. You either consult an Otolaryngologist or a Neurologist.
Otolaryngologist: An Otolaryngologist is a specialized ENT. If you are suffering from peripheral vertigo (e.g. as a result of BPPV), your physician will refer you to an otolaryngologist.
Neurologist: If you are suffering from central vertigo, you will be referred to a neurologist who will treat you for CNS related disturbances.
Q9: I Have Ear Pain. Should I Suspect Vertigo?
You may or may not. Ear pain is not always associated with vertigo. If you have pain in the middle ear, then it is mostly safe to rule out vertigo. Mostly, pain in the inner ear is associated with vertigo. Should you have vertigo, your ear pain would be associated with other common symptoms for vertigo such as dizziness, vomiting, body weakness, loss of balance etc. Isolated symptoms usually do not lead to vertigo.
Q10: Can Alcoholism Lead to Vertigo?
Excessive or regular alcoholism in large amounts can lead to vertigo. Alcohol mainly affects the balance centers in the brain and the ear. Alcoholism is a common cause of labyrinthitis and BPPV both of which are conditions associated with peripheral vertigo.
It should also be noted that not in all persons would alcohol lead to vertigo. The probability of having vertigo due to alcoholism is different from person to person due to personal (e.g. size of the person) and external factors (e.g. hydration level, dietary habits).
Q11: Can Stress Cause Vertigo?
Stress can be an indirect and not a direct cause of vertigo. Chronic stress can lead to reduced breathing, low blood pressure and anxiety affecting parts of the brain that may become a reason for vertigo (central vertigo in this case).
Q12: What Are the Risk Factors for Vertigo?
Although females have a naturally higher predisposition to vertigo, the risk factors for vertigo are mostly external/ accidental. Two major risk factors for vertigo are head injuries and medications.
Head Injuries: Head injuries affect the brain increasing the chances of having vertigo.
Medications: Antiseizure, blood pressure and Antidepressant medications can lead to vertigo.
As a general rule, the factors that can lead to stroke can also lead to vertigo e.g. high blood pressure, drug intake (alcohol and smoking), heart disease etc.
Q13: Can Medications Lead to Vertigo?
Medications can lead to both lightheadedness and vertigo. Some medications that can lead to vertigo include antibiotics (especially aminoglycosidic antibiotics), antidepressants, sedatives, anti-seizure drugs and anti-cancer medications etc.
Q14: Is the Incidence of Vertigo Associated with Age?
Vertigo is extremely rare in young children. The incidence of vertigo increases during 20’s and can occur in people of all ages after that. The incidence is increased many times in old age when even slight misbalances result to major injuries or fractures.
Q15: Can 3-D Games Result in Vertigo in Children?
If children are playing 3-D games for a long time especially those which involve excessive motion, it may result in a brief vertigo episode but it would not last long in any normal case.
Q16: What Is the Treatment for Vertigo?
Different treatments are available for Vertigo ranging from self-care to physical therapies and medications.
Medical Treatment for Vertigo
Vertigo can be treated by oral medicines, medicines that are applied through skin (patch) or intravenous (IV) drugs. Some specific types of vertigo will require therapy through special medicines.
- Antibiotics would be used if vertigo is caused as a result of bacterial infection of the ear.
- Medications that induce urine are used for vertigo caused by Meniere’s disease.
Physical Therapy for Vertigo
Certain physical maneuvers are also used to treat vertigo.
- Vestibular Rehabilitation Exercises: The patient sits on the edge of the table and lies down to one side until vertigo goes away. This is immediately followed by the patient lying down on the other side. The action is followed until the vertigo fully distinguishes.
- Particle Repositioning Maneuver: This type of therapy is particularly used against BPPV. It involves repositioning of the head.
- Epley Maneuver: The patient is seated and the head is turned at 45 degrees. The body is then tilted backward with head in the same position. The position is held for almost a minute. The head is turned 90 degrees towards the unaffected ear, the position is again held for a minute.
Q17: What Are Some Home Remedies for Vertigo?
Various home remedies exist for vertigo but they should only be used once vertigo has been confirmed by a medical specialist. Some home remedies against vertigo include:
- Vitamin D supplementation especially in the case of BPPV
- Use of herbs such as ginger, coriander and ginko can cure vertigo as they have anti-inflammatory properties.
- Increased fluid intake.
- Use of essential oils such as peppermint, lavender or ginger.
Be sure to discuss these home remedies with your doctor before using.
Q18: How Should I Sleep with Vertigo?
People with vertigo attacks can have serious difficulty in sleeping. Better positioning and head placement will help in having a better sleep. Combining this information with the most effective vertigo remedies can help you conquer the problem for once and all.
Before Bed Tips
- Avoid spicy foods
- Avoid looking at your phone
- Do not use your bed for doing office work
Sleep Positioning and Head Placement
There is no single sleep position that will work for all. Vertigo patients have to figure out themselves which position suits them the best. It will be a discomfort for a few nights but you will eventually find it. In most cases, sleeping in an inclined position will help.
Also, consider having more than one pillows while sleeping as elevation of the head will help the vertigo go away.
Q19: How Is Vertigo Diagnosed?
Most people would report vertigo as dizziness. Yet, differentiation is very important for treatment. The doctors would first thoroughly ask you for all the symptoms you have been experiencing. Certain tests are performed for the diagnosis of vertigo:
- MRI or CT Scan
- Eye Movement Test: Your doctor will ask you to track a moving object and will observe your eyeball movement as your eyes do the tracking.
- Head Movement Test: Performed usually in the case of BPPV. The doctor will perform simple head movements to confirm the diagnosis.
- Rotary Chair Test: The patient sits on a machine controlled seat that moves slowly in a circular direction.
- Posturography: The patient stands with bare feet on a platform and his balance under various conditions is tested.
Q20: What Are Some Lifestyle Changes to Get Rid of Vertigo?
Dr. Josh Axe – A doctor of natural medicine, chiropractic and clinical nutritionist has listed down six lifestyle tips which should be adopted by vertigo patients:
- Physical Therapy: Physical therapy that addresses vestibular organs.
- Head Maneuvers: Head Maneuvers for the repositioning of calcium stones such as the Canalith Repositioning Procedure or the CRP. This technique is also recommended by the American Academy of Neurology.
- Stress Control: Chronic stress can greatly reduce a person’s immunity and lifestyle (stressed people are less likely to exercise and get a full sleep) making him more prone to developing vertigo. Stress should be controlled by having a good social circle, sleeping enough, exercise and meditation.
- Eating healthy and staying hydrated: Eating healthy and staying hydrated can reduce the risk of inflammation and help in getting rid of vertigo.
- Getting enough rest: A 7-8 hours’ sleep is necessary for proper muscle recovery and overcoming dizziness.
- Seeking medical help: It’s extremely important to discuss your symptoms in detail with your doctor so the exact cause underlying vertigo could be determined.
Q21: Which Foods Should Be Avoided for Vertigo?
The following foods should be avoided for vertigo:
- Foods High in Salt: High sodium can alter the fluid level in your body giving rise to vertigo episodes. Avoid foods that have artificially salt added in them such as packet chips and other snacks, canned soups or vegetables, ready to eat frozen items etc.
- Foods High in Sugar: Sugary foods also alter the fluid balance of the body. Avoid foods such as candies, jams, jellies, syrups, pancakes, baked goods (cakes, pastries, donuts, pies), soft drinks etc.
- Aged Meats: Aged meats are high in tyramine- an amino acid that triggersa migraine. Aged meats such as pepperonis, salamis, sausages should be avoided for vertigo.
Q22: Which Foods Can Treat Vertigo?
Certain foods that help treat vertigo include:
- Foods hat Are Rich in Vitamin C: Vitamin C enriched foods such as fruits and vegetables can be effective against vertigo e.g. strawberries, citrus fruits, tomatoes, broccoli, sweet potatoes, green peppers, leafy green vegetables etc.
- Foods that Contain Vitamin B6: Vitamin B6 is extremely important for red blood cells, nervous system and immune system. B6 enriched foods include breakfast cereals, fish, poultry, peanut butter, walnuts, spinach, bananas, avocados etc.
- Ginger: Ginger is effective against nausea and motion sickness. Ginger also reduces inflammation and heart diseases which are some of the factors that lead to vertigo.
Q23: How Long Does Vertigo Last?
How long a vertigo lasts depends upon what exactly is the causing factor. If it is caused by BBPV then symptoms will usually take about 7 days to go away completely. However, if it is caused by inflammation then it will not go away unless inflammation is treated. Vertigo can also be permanent if a severe head injury is the cause of it.
Q24: What Activities Should I Refrain from During a Vertigo Episode?
The activities that involve a lot of movement should be avoided during vertigo attacks e.g. shopping, eating out etc. Visual distractions such as moving vehicles, ceiling fans should also be avoided. Audio distractions including should also be shut down e.g. headphones or radio.
|
<urn:uuid:d68c5ae7-1f3f-492a-af46-f4be3a71a763>
|
CC-MAIN-2018-09
|
https://quickselfimprovement.com/questions-about-vertigo-dizziness-answered/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815934.81/warc/CC-MAIN-20180224191934-20180224211934-00516.warc.gz
|
en
| 0.928057
| 4,260
| 3.328125
| 3
|
Alcoholics with cirrhosis (scarring and dysfunction) of the liver have more brain function impairment than other alcoholics, according to new research. Researchers examined gene expression in the frontal cortex of the brains of seven alcoholics with cirrhosis and 14 alcoholics without cirrhosis. "We found that the levels of many important brain genes changed in the cirrhotic patients. These genes are important in regulating cell death and how individual cells in the brain talk to each other in a meaningful way," study corresponding author R. Dayne Mayfield, a research scientist at the Waggoner Center for Alcohol and Addiction Research at the University of Texas at Austin, said in a prepared statement. Out of a total of 1,125 genes, 482 genes showed increased expression, and 643 genes showed decreased expression in the brain tissue of those with cirrhosis. Mayfield said that the genes examined in this study "are responsible for proper connections and communication between cells in the brain. Without them, normal function would not be possible."
The Washington Post
Alcoholics With Cirrhosis Have More Brain Damage
|
<urn:uuid:8b14fa15-96c6-4eb7-9c70-65171463dfbc>
|
CC-MAIN-2016-40
|
http://news.utexas.edu/2007/09/19/center-scientist-in-washington-post
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661367.29/warc/CC-MAIN-20160924173741-00140-ip-10-143-35-109.ec2.internal.warc.gz
|
en
| 0.913816
| 225
| 2.84375
| 3
|
Open spaces are critical to our environment. Forests and other natural resources act as "carbon sinks," absorbing harmful carbon emissions from our atmosphere and helping to fight climate change. At the same time, our parks, trails, farms, greenways, and historical sites are key to higher home values and a better quality of life.
Not all undeveloped land is considered protected open space. Much of it will eventually be developed. In order to maintain Connecticut's natural diversity, wildlife habits, and scenic charm, we must balance economic development with land conservation.
Connecticut set a goal of preserving 21% of our land as open space by 2033. In order to reach this benchmark, we must act now to preserve our farms, parks, trails, and natural resources.
MUNICIPAL FUNDING OPTION PROGRAM
In 2021 the legislature passed HB 6441, now Public Act 21-115. This law expands the purposes and uses for municipal storm water authorities, flood and erosion control boards, and Green bank revenues. This bill originally included the municipal funding option but it was struck at the last moment. After years of work, the repeal of section 4 was a terrible blow for environmental conservation in Connecticut. Governor Lamont highlighted climate adaptation as one of the urgent priorities to address climate change in Connecticut. The conveyance fee had huge support from advocates, municipalities, the public and every land trust across the state.
Towns and municipalities need a sustainable source of funds in order to acquire dedicated open space. While there are some federal and state grants available for towns to preserve farms, parks, forests, and other natural resources, most of these grants require matching local dollars. Furthermore, some of these grants have seen dramatic cuts in recent years.
Similar programs in Long Island have met with great success, improving quality of life and even lowering taxes. This program would allow municipalities to raise the required local funds to participate in open space grants and preserve the natural resources we rely on for our quality of life.
|
<urn:uuid:f353310f-0f9e-4592-b17a-b076689bc4be>
|
CC-MAIN-2022-49
|
https://www.ctlcv.org/open-space.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711368.1/warc/CC-MAIN-20221208215156-20221209005156-00100.warc.gz
|
en
| 0.932771
| 404
| 2.90625
| 3
|
U.S. Military Power
America is a global power with global interests. Its military is meant first and foremost to defend America from attack. Beyond that, it is meant to protect Americans abroad, allies, and the freedom to use international sea, air, and space while retaining the ability to engage in more than one major contingency at a time. America must be able not only to defend itself and its interests, but also to deter enemies and opportunists from taking action that would challenge U.S. interests, a capability that includes preventing the destabilization of a region and guarding against threats to the peace and security of America’s friends.
As noted in the two preceding editions of the Index, however, the U.S. does not have the right force to meet a two–major regional contingency (two-MRC) requirement and is not ready to carry out its duties effectively. Consequently, as was seen during 2016, the U.S. risks seeing its interests increasingly challenged and the world order it has led since World War II undone.
How to Think About Sizing Military Power
Military power begins with the people and equipment used to conduct war: the weapons, tanks, ships, airplanes, and supporting tools such as communications systems that make it possible either for one group to impose its will on another or to prevent such an outcome from happening.
However, simply counting the number of people, tanks, or combat aircraft that the U.S. possesses would be irrelevant because it would lack context. For example, the U.S. Army might have 100 tanks, but to accomplish a specific military task, 1,000 or more tanks might be needed or none at all. It might be that the terrain on which a battle is fought is especially ill-suited to tanks or that the tanks one has are inferior to the enemy’s. The enemy could be quite adept at using tanks, or his tank operations might be integrated into a larger employment concept that leverages the supporting fires of infantry and airpower, whereas one’s own tanks are poorly maintained, the crews are ill-prepared, or one’s doctrine is irrelevant.
Success in war is partly a function of matching the tools of warfare to a specific task and employing those tools effectively in the conditions of the battle. Get these wrong—tools, objective, competency, or context—and you lose.
Another key element is the military’s capacity to conduct operations: how many of the right tools—people, tanks, planes, or ships—it has. One might have the right tools and know how to use them effectively but not have enough to win. Given that one cannot know with certainty beforehand just when, where, against whom, and for what reason a battle might be fought, determining how much capability is needed is an exercise of informed, but not certain, judgment.
Further, two different combatants can use the same set of tools in radically different ways to quite different effects. The concept of employment matters. Concepts are developed to account for numbers, capabilities, material readiness, and all sorts of other factors that enable or constrain one’s actions, such as whether one fights alone or alongside allies, on familiar or strange terrain, or with a large, well-equipped force or a small, poorly equipped force.
All of these factors and a multitude of others bear upon the outcome of any military contest. Military planners attempt to account for them when devising requirements, developing training and exercise plans, formulating war plans, and providing advice to the President in his role as Commander in Chief of U.S. military forces.
Measuring hard combat power in terms of its adequacy in capability, capacity, and readiness to defend U.S. vital interests is hard, especially in such a limited space as this Index, but it is not impossible. Regardless of the difficulty of determining the adequacy of one’s military forces, the Secretary of Defense and the military services have to make decisions every year when the annual defense budget request is submitted to Congress.
The adequacy of hard power is affected most directly by the resources the nation is willing to invest. While that investment decision is informed to a significant degree by an appreciation of threats to U.S. interests and the ability of a given defense portfolio to protect U.S. interests against such threats, it is not informed solely by such considerations; hence the importance of clarity and honesty in determining just what is needed in hard power and the status of such power from year to year.
Administrations take various approaches in determining the type and amount of military power needed and, by extension, the amount of money and other resources to commit to it. After defining the national interests to be protected, the Department of Defense can use worst-case scenarios to determine the maximum challenges the U.S. military might have to overcome. Another way is to redefine what constitutes a threat. By taking a different view of whether major actors pose a meaningful threat and of the extent to which friends and allies have the ability to assist the U.S. in meeting security objectives, one can arrive at different conclusions about necessary military strength.
For example, one Administration might view China as a rising, belligerent power bent on dominating the Asia–Pacific. Another Administration might view China as an inherently peaceful, rising economic power, with the expansion of its military capabilities a natural occurrence commensurate with its strengthening status. The difference between these views can have a dramatic impact on how one thinks about U.S. defense requirements. So, too, can policymakers amplify or downplay risk to justify defense budget decisions.
There can also be strongly differing views on requirements for operational capacity.
- Does the country need enough for two major combat operations (MCOs) at roughly the same time or just enough for a single major operation plus some number of lesser cases?
- To what extent should “presence” tasks—the use of forces for routine engagement with partner countries or simply to be on hand in a region for crisis response—be additive to or a subset of a military force sized to handle two major regional conflicts?
- How much value should be assigned to advanced technologies as they are incorporated into the force?
Where to Start
There are references that one can use to help sort through the variables and arrive at a starting point for assessing the adequacy of today’s military posture: government studies and historical experience. The government occasionally conducts formal reviews meant to inform decisions on capabilities and capacities across the Joint Force relative to the threat environment (current and projected) and evolutions in operating conditions, the advancement of technologies, and aspects of U.S. interests that may call for one type of military response over another.
The 1993 Bottom-Up Review (BUR), conducted by then-Secretary of Defense Les Aspin, is one such frequently cited example. Secretary Aspin recognized that “the dramatic changes that [had] occurred in the world as a result of the end of the Cold War and the dissolution of the Soviet Union” had “fundamentally altered America’s security needs” and were driving an imperative “to reassess all of our defense concepts, plans, and programs from the ground up.”1
The BUR formally established the requirement that U.S. forces should be able “to achieve decisive victory in two nearly simultaneous major regional conflicts [MRCs] and to conduct combat operations characterized by rapid response and a high probability of success, while minimizing the risk of significant American casualties.”2 Thus was formalized the two-MRC standard.
Dr. Daniel Gouré, in his 2015 Index essay “Building the Right Military for a New Era: The Need for an Enduring Analytic Framework,” noted that various Administrations have redefined force requirements based on their perceptions of what was necessary to protect U.S. interests.3In an attempt to formalize the process, and perhaps to have a mechanism by which to exert influence on the executive branch in such matters,4 Congress mandated that each incoming Administration must conduct a comprehensive strategic review of the global security environment, articulate a relevant strategy suited to protecting and promoting U.S. security interests, and recommend an associated military force posture.
The Quadrennial Defense Reviews (QDRs) have been conducted since 1997, accompanied in 1997, 2010, and 2014 by independent National Defense Panel (NDP) reports that have reviewed and commented on them. Both sets of documents purport to serve as key assessments, but analysts have come to minimize their value, regarding them as justifications for executive branch policy preferences (the QDR reports) or overly broad, generalized commentaries (the NDP reports) that lack substantive discussion about threats to U.S. interests, a credible strategy for dealing with them, and the actual ability of the U.S. military to meet national security requirements.
Correlation of Forces as a Factor in Force Sizing
During the Cold War, the U.S. used the Soviet threat as its primary reference in determining its hard-power needs. At that time, the correlation of forces—a comparison of one force against another to determine strengths and weaknesses—was highly symmetrical. U.S. planners compared tanks, aircraft, and ships against their direct counterparts in the opposing force. These comparative assessments drove the sizing, characteristics, and capabilities of fleets, armies, and air forces.
The evolution of guided, precision munitions and the rapid technological advancements in surveillance and targeting systems, however, have made comparing combat power more difficult. What was largely a platform v. platform model has shifted somewhat to a munitions v. target model.
The proliferation of precise weaponry increasingly means that each round, bomb, rocket, missile, and even individual bullet (in some instances) can hit its intended target, thus decreasing the number of munitions needed to prosecute an operation. It also means that the lethality of an operating environment increases significantly for the people and platforms involved. We are now at the point where one must consider how many “smart munitions” the enemy has when thinking about how many platforms and people are needed to win a combat engagement instead of focusing primarily on how many ships or airplanes the enemy can bring to bear against one’s own force.5
In one sense, increased precision and the technological advances now being incorporated into U.S. weapons, platforms, and operating concepts make it possible to do far more with fewer assets than ever before. Platform signature reduction (stealth) makes it harder for the enemy to find and target them, while the increased precision of weapons makes it possible for fewer platforms to hit many more targets. Additionally, the ability of the U.S. Joint Force to harness computers, modern telecommunications, space-based platforms—such as for surveillance, communications, positioning-navigation-timing (PNT) support from GPS satellites—and networked operations potentially means that smaller forces can have far greater effect in battle than at any other time in history. But these same advances also enable enemy forces, and certain military functions—such as seizing, holding, and occupying territory—may require a certain number of soldiers no matter how state-of-the-art their equipment may be.
With smaller forces, each individual element of the force represents a greater percentage of its combat power. Each casualty or equipment loss takes a larger toll on the ability of the force to sustain high-tempo, high-intensity combat operations over time, especially if the force is dispersed across a wide theater or across multiple theaters of operation.
As advanced technology has become more affordable, it has become more accessible for nearly any actor, whether state or non-state. Consequently, it may be that the outcomes of future wars will depend to a much greater degree on the skill of the forces and their capacity to sustain operations over time than they will on some great disparity in technology. If so, readiness and capacity will take on greater importance than absolute advances in capability.
All of this illustrates the difficulties of and need for exercising judgment in assessing the adequacy of America’s military power. Yet without such an assessment, all that we are left with are the quadrennial strategic reviews, which are subject to filtering and manipulation to suit policy interests; annual budget submissions, which typically favor desired military programs at presumed levels of affordability and are therefore necessarily budget-constrained; and leadership posture statements, which often simply align with executive branch policy priorities.
The U.S. Joint Force and the Art of War
This section of the Index, on military capabilities, assesses the adequacy of the United States’ defense posture as it pertains to a conventional understanding of “hard power,” defined as the ability of American military forces to engage and defeat an enemy’s forces in battle at a scale commensurate with the vital national interests of the U.S. While some hard truths in military affairs are appropriately addressed by math and science, others are not. Speed, range, probability of detection, and radar cross-section are examples of quantifiable characteristics that can be measured. Specific future instances in which U.S. military power will be needed, the competency of the enemy, the political will to sustain operations in the face of mounting deaths and destruction, and the absolute amount of strength needed to win are matters of judgment and experience, but they nevertheless affect how large and capable a force one might need.
In conducting the assessment, we accounted for both quantitative and qualitative aspects of military forces, informed by an experience-based understanding of military operations and the expertise of external reviewers.
Military effectiveness is as much an art as it is a science. Specific military capabilities represented in weapons, platforms, and military units can be used individually to some effect. Practitioners of war, however, have learned that combining the tools of war in various ways and orchestrating their tactical employment in series or simultaneously can dramatically amplify the effectiveness of the force committed to battle.
Employment concepts are exceedingly hard to measure in any quantitative way, but their value as critical contributors in the conduct of war is undeniable. How they are utilized is very much an art-of-war matter, learned through experience over time.
What Is Not Being Assessed
In assessing the current status of the military forces, this Index uses the primary references used by the military services themselves when they discuss their ability to employ hard combat power. The Army’s unit of measure is the brigade combat team (BCT), while the Marine Corps structures itself by battalions. For the Navy, it is the number of ships in its combat fleet, and the most consistent reference for the Air Force is total number of aircraft, sometimes broken down into the two primary sub-types of fighters and bombers.
Obviously, this is not the totality of service capabilities, and it certainly is not everything needed for war, but these measures can be viewed as surrogate measures that subsume or represent the vast number of other things that make these “units of measure” possible and effective in battle. There is an element of proportionality or ratio related to these measures that drives other aspects of force sizing. For example:
- When planning air operations, the Air Force looks at the targets to be serviced and the nature of the general operation to be supported and then accounts for aircraft and munitions needed (type and quantity) and the availability and characteristics of airfields relevant to the operation. From this, they calculate sorties, distances, flight hours, fuel consumption, number of aircraft in a given piece of airspace, and a host of other pieces of information to determine how many aerial refueling tankers will be needed.
- Joint Force detailed planning for operations determines how much equipment, manpower, and supplies need to be moved from one point to another and how much more will be needed to sustain operations: Logistics is a very quantitative business.
- U.S. Transportation Command (TRANSCOM) calculates the amount of lift required in cargo planes, sealift shipping, long-haul road movements, and trains.
- The Marine Corps thinks operationally in terms of Marine Air-Ground Task Forces (MAGTFs) that are composed of command, ground, air, and logistics elements. The size of a MAGTF varies depending on the mission to be accomplished, but the nucleus is normally (though not always) the ground combat element that typically ranges from a battalion to a division. The amount of airpower, logistics support, and transportation (amphibious, sealift, and airlift) required to execute the operation extends from there.
- The Navy thinks in terms of the number of surface combatants, the nature of operations, and proximity to ports to drive planning for all of the combat logistics force vessels that are needed to make it happen.
- The Army provides a host of “common user support” capabilities to the overall force that can include operating ports, theater-wide trucking and rail operations, large-scale fuel and ammunition storage and distribution, engineering and construction services, and general supply support.
- Institutional elements like recruiting are necessary to generate the force in the first place, as well as the multitude of installations at which units are based, training facilities, acquisition workforce, and the military’s medical infrastructure.
The point is that the military spear has a great deal of shaft that makes it possible for the tip to locate, close with, and destroy its target, and there is a rough proportionality between shaft and spear tip. Thus, in assessing the basic units of measure for combat power, one can get a sense of what is likely needed in the combat support, combat service support, and supporting establishment echelons. The scope of this Index does not extend to analysis of everything that makes hard power possible; it focuses on the status of the hard power itself.
This assessment also does not account for the Reserve and Guard components of the services; it focuses only on the Active component. Again, the element of proportion or ratio figures prominently. Each service determines the balance among its Active, Reserve, and National Guard elements (only the Army and Air Force have Guard elements; the Navy and Marine Corps do not) based on factors that include cost of the respective elements, availability for operational employment, time needed to respond to an emergent crisis, the allocation of roles between the elements, and political considerations.6 This assessment looks at the baseline requirement for a given amount of combat power that is readily available for use in a major combat operation—something that is usually associated with the Active components of each service.
The Defense Budget and Strategic Guidance
As for the defense budget, ample discussion of budget issues is scattered throughout (mainly as they pertain to acquisition programs), but the budget itself—whether for the military services individually, the Joint Force as a whole, or the totality of the defense establishment—is actually a reflection of the importance that the U.S. places on the modernity, capacity, and readiness of the force rather than a measure of the capability of the force itself. In other words, the budget itself does not tell us much about the posture of the U.S. military.
The baseline budget for defense in fiscal year (FY) 2016 was $548 billion, which paid for the forces (manpower, equipment, training); enabling capabilities (things like transportation, satellites, defense intelligence, and research and development); and institutional support (bases and stations, facilities, recruiting, and the like). The baseline budget does not pay for the cost of major ongoing overseas operations, which is captured in supplemental funding known as OCO (overseas contingency operations).
It is true that absent a significant threat to the survival of the country, the U.S. will always balance expenditures on defense with spending in all of the other areas of government activity that it thinks are necessary or desirable. Some have argued that a defense budget indexed to a percent of gross domestic product (GDP) is a reasonable reference, but a fixed percentage of GDP does not accurately reflect national security requirements per se any more than the size of the budget alone correlates to levels of capability. It is possible that a larger defense budget could be associated with less military capability if the money were allocated inappropriately or spent wastefully, and the fact that the economy changes over time does not necessarily mean that defense spending should increase or decrease in lockstep by default.
Ideally, defense requirements are determined by identifying national interests that might need to be protected with military power; assessing the nature of threats to those interests and what would be needed to defeat those threats (and how much that would cost); and then determining what the country can afford (or is willing) to spend. Any difference between assessed requirements and affordable levels of spending on defense would constitute risk to U.S. security interests.
This Index enthusiastically adopts this latter approach: interests, threats, requirements, resulting force, and associated budget. Spending less than the amount needed to maintain a two-MRC force results in policy debates about where to accept risk: force modernization, the capacity to conduct large-scale or multiple simultaneous operations, or force readiness.
The decision to fund national defense commensurate with interests and prevailing threats is a policy decision that reflects national priorities and acceptance of risk. This Index assesses the ability of the nation’s military forces to protect vital national security interests within the world as it is so that the debate about the level of funding for hard power is better informed.
In FY 2016, the debate about how much funding to allocate to defense was affected once again by a larger political debate that pitted those who wanted to see an overall reduction in federal spending against those who pushed for higher levels of spending for defense and those who wanted to see any increase in defense spending matched by commensurate increases in domestic spending. In spite of each camp’s firmly held views, Congress as a whole, acknowledging problems in military readiness and the growing need to replace aging equipment, voted to modify the spending caps set by the Budget Control Act (BCA) by enacting the Bipartisan Budget Act of 2015 (BBA). The BBA increased the spending cap on the defense budget by $25 billion for FY 2016 and by $15 billion for FY 2017.7 It also provided an additional $8 billion for the base defense budget through the OCO account, which is not subject to spending caps as the normal defense budget is.8
The combined base budget and OCO-for-base budget for FY 2016 was $556 billion. Adjusted for inflation, this was a 5 percent increase over FY 2015 levels but still below the President’s FY 2016 budget request of $561 billion. For comparison, President Barack Obama’s 2012 defense budget, the last under former Secretary of Defense Robert Gates, proposed spending $638 billion on defense in FY 2016. A bipartisan consensus, as seen in the National Defense Panel report in 2014, has identified the so-called Gates budget as the minimum the United States should be spending on national defense.9 As seen in Chart 3, both the FY 2016 enacted budget and the FY 2017 budget proposal are well below this minimum.
The restrictions placed on defense spending by the BCA continue to be a major concern of the military service chiefs, who have consistently testified about the damage these restrictions are causing to readiness, modernization, and capacity for operations. As FY 2016 ended, the budget debates about FY 2017 had not been resolved, but it appears unlikely that any resolution will bring the national defense budget close to even the minimum levels proposed by the Gates budget.
Purpose as a Driver in Force Sizing
The Joint Force is used for a wide range of purposes, only one of which is major combat operations. Fortunately, such events have been rare, averaging roughly 15–20 years between occurrences.10 In between (and even during) such occurrences, the military is used in support of regional engagement, crisis response, strategic deterrence, and humanitarian assistance, as well as to provide support to civil authorities and U.S. diplomacy.
The U.S. Unified Combatant Commands, or COCOMS (EUCOM, CENTCOM, PACOM, SOUTHCOM, and AFRICOM), all have annual and long-term plans through which they engage with countries in their assigned regions. These engagements range from very small unit training events with the forces of a single partner country to larger bilateral and sometimes multilateral military exercises. In 2015, these engagements included training and assisting Iraqi military forces and participating in joint training exercises with NATO members. Such events help to establish working relationships with other countries, acquire a more detailed understanding of regional political–military dynamics and on-the-ground conditions in areas of interest, and signal U.S. security interests to friends and competitors.
To support such COCOM efforts, the services provide forces that are based permanently in respective regions or that operate in them temporarily on a rotational basis. To make these regional rotations possible, the services must maintain a base force that is sufficiently large to train, deploy, support, receive back, and make ready again a stream of units ideally numerous enough to meet validated COCOM demand.
The ratio between time spent at home and time spent away on deployment for any given unit is known as OPTEMPO (operational tempo), and each service attempts to maintain a ratio that both gives units enough time to educate, train, and prepare their forces and allows the individuals in a unit to maintain some semblance of a healthy home and family life. This ensures that units are fully prepared for the next deployment cycle and that servicemembers do not become “burned out” or suffer adverse consequences in their personal lives because of excessive deployment time.
Experience has shown that a ratio of at least 3:1 is sustainable, meaning three periods of time at home for every period deployed. (If a unit is to be out for six months, it will be home for 18 months before deploying again.) Obviously, a service needs a sufficient number of people, units, ships, and planes to support such a ratio. If peacetime engagement were the primary focus for the Joint Force, the services could size their forces to support these forward-based and forward-deployed demands.
Thus, the size of the total force must necessarily be much larger than any sampling of its use at any point in time.
In contrast, sizing a force for major combat operations is an exercise informed by history—how much force was needed in previous wars—and then shaped and refined by analysis of current threats, a range of plausible scenarios, and expectations about what the U.S. can do given training, equipment, employment concept, and other factors. The defense establishment must then balance “force sizing” between COCOM requirements for presence and engagement with the amount of military power (typically measured in terms of combat units and major combat platforms, which informs total end strength) thought necessary to win in likely war scenarios.
Inevitably, compromises are made that account for how much military the country is willing to buy. Generally speaking:
- The Army sizes to major warfighting requirements.
- The Marine Corps focuses on crisis response demands and the ability to contribute to one major war.
- The Air Force attempts to strike a balance that accounts for historically based demand across the spectrum because air assets are shifted fairly easily from one theater of operations to another (“easily” being a relative term when compared to the challenge of shifting large land forces), and any peacetime engagement typically requires some level of air support.
- The Navy is driven by global presence requirements. To meet COCOM requirements for a continuous fleet presence at sea, the Navy must have three to four ships in order to have one on station. To illustrate with a simplistic example, a commander who wants one U.S. warship stationed off the coast of a hostile country needs the use of four ships from the fleet: one on station, one that left station and is traveling home, one that just left home and is traveling to station, and one that fills in for one of the other ships when it needs maintenance or training time.
This report focuses on the forces required to win two major wars as the baseline force-sizing metric. The military’s effectiveness, both as a deterrent against opportunistic competitor states and as a valued training partner in the eyes of other countries, derives from its effectiveness (proven or presumed) in winning wars.
With this in mind, we assessed the state of military affairs for U.S. forces as it pertains to their ability to deliver hard power against an enemy in three areas:
- Capacity, and
Capability. Examining the capability of a military force requires consideration of:
- The proper tools (material and conceptual) of sufficient design, performance characteristics, technological advancement, and suitability needed for it to perform its function against an enemy force successfully.
- The sufficiency of armored vehicles, ships, airplanes, and other equipment and weapons to win against the enemy.
- The appropriate variety of options to preclude strategic vulnerabilities in the force and give flexibilities to battlefield commanders.
- The degree to which elements of the force reinforce each other in covering potential vulnerabilities, maximizing strengths, and gaining greater effectiveness through synergies that are not possible in narrowly stovepiped, linear approaches to war.
The capability of the U.S. Joint Force was on ample display in its decisive conventional war victory over Iraq in liberating Kuwait in 1991 and later in the conventional military operation to liberate Iraq in 2003. Aspects of its capability have also been seen in numerous other operations undertaken since the end of the Cold War. While the conventional combat aspect at the “pointy end of the spear” of power projection has been more moderate in places like Yugoslavia, Somalia, Bosnia and Serbia, and Kosovo, and even against the Taliban in Afghanistan in 2001, the fact that the U.S. military was able to conduct highly complex operations thousands of miles away in austere, hostile environments and sustain those operations as long as required is testament to the ability of U.S. forces to do things that the armed forces of few if any other countries can do.
A modern-day “major combat operation”11 along the lines of those upon which Pentagon planners base their requirements would feature a major opponent possessing modern integrated air defenses; naval power (surface and subsurface); advanced combat aircraft (to include bombers); a substantial inventory of short-range, medium-range, and long-range missiles; current-generation ground forces (tanks, armored vehicles, artillery, rockets, and anti-armor weaponry); cruise missiles; and (in some cases) nuclear weapons. Such a situation involving an actor capable of threatening vital national interests would present a challenge that is comprehensively different from the challenges that the U.S. Joint Force has faced in past decades.
2016 saw a continued shift in debate within military circles about the extent to which the U.S. military is ready for major conventional warfare, given its focus on counterinsurgency, stability, and advise-and-assist operations over the past decade. The Army in particular has noted the need to reengage in training and exercises that feature larger-scale combined arms maneuver operations, especially to ensure that its higher headquarters elements are up to the task. For example, Secretary of the Army Eric Fanning remarked in 2016 that “we’ve been fighting a certain way for 15 years” but “are [now] focused in the Army on getting back to full-spectrum training….”12 This Index ascertains the relevance and health of military service capabilities by looking at such factors as average age of equipment, generation of equipment relative to the current state of competitor efforts as reported by the services, and the status of replacement programs meant to introduce more updated systems as older equipment reaches the end of its programmed service life. While some of the information is quite quantitative, other factors could be considered judgment calls made by acknowledged experts in the relevant areas of interest or as addressed by senior service officials when providing testimony to Congress or addressing specific areas in other official statements.
It must be determined whether the services possess capabilities that are relevant to the modern combat environment.
Capacity. The U.S. military must have a sufficient quantity of the right capability or capabilities. There is a troubling but fairly consistent trend that characterizes the path from requirement to fielded capability within U.S. military acquisition. Along the way to acquiring the capability, several linked things happen that result in far less of a presumed “critical capability” than supposedly was required.
- The manufacturing sector attempts to satisfy the requirements articulated by the military.
- “Unexpected” technological hurdles arise that take longer and much more money to solve than anyone envisioned.
- Programs are lengthened, and cost overruns are addressed (usually with more money).
- Then the realization sets in that the country either cannot afford or is unwilling to pay the cost of acquiring the total number of platforms originally advocated. The acquisition goal is adjusted downward (if not canceled), and the military finally fields fewer platforms (at higher unit cost) than it originally said it needed to be successful in combat.
As deliberations proceed toward a decision on whether to reduce planned procurement, they rarely focus on and quantify the increase in risk that accompanies the decrease in procurement.
Something similar happens with force structure size: the number of units and total number of personnel the services say they need to meet the objectives established by the Commander in Chief and the Secretary of Defense in their strategic guidance. The Marine Corps has stated that it needs 27 infantry battalions to fully satisfy the validated requirements of the regional Combatant Commanders, yet current funding for defense has the Corps at 23 on a path to 21. The Army was on a build toward 48 brigade combat teams, but funding reductions now have the number at 31—less than two-thirds the number that the Army originally thought necessary—if sequestration remains law.
Older equipment can be updated with new components to keep it relevant, and commanders can employ fewer units more expertly for longer periods of time in an operational theater to accomplish an objective. At some point, however, sheer numbers of updated, modern equipment and trained, fully manned units are likely necessary to win in battle against a credible opponent when the crisis is profound enough to threaten a vital interest.
Capacity (numbers) can be viewed in at least three ways: compared to a stated objective for each category by each service, compared to amounts required to complete various types of operations across a wide range of potential missions as measured against a potential adversary, and as measured against a set benchmark for total national capability. This Index employs the two-MRC metric as a benchmark.
The two-MRC benchmark for force sizing is the minimum standard for U.S. hard-power capacity because one will never be able to employ 100 percent of the force at the same time. Some percentage of the force will always be unavailable because of long-term maintenance overhaul (for Navy ships in particular); unit training cycles; employment in myriad engagement and small-crisis response tasks that continue even during major conflicts; and the need to keep some portion of the force uncommitted to serve as a strategic reserve.
The historical record shows that the U.S. Army commits 21 BCTs on average to a major conflict; thus, a two-MRC standard would require 42 BCTs available for actual use. But an Army built to field only 42 BCTs would also be an Army that could find itself entirely committed to war, leaving nothing back as a strategic reserve, to replace combat losses, or to handle other U.S. security interests. Again, this Index assesses only the Active component of the services, though with full awareness that the Army also has Reserve and National Guard components that together account for half of the total Army. The additional capacity needed to meet these “above two-MRC requirements” could be handled by these other components or mobilized to supplement Active-component commitments. In fact, this is how the Army thinks about meeting operational demands and is at the heart of the current debate within the total Army about the roles and contributions of the various Army components. A similar situation exists with the Air Force and Marine Corps.
The balance among Active, Reserve, and Guard elements is beyond the scope of this study. Our focus here is on establishing a minimum benchmark for the capacity needed to handle a two-MRC requirement.
We conducted a review of the major defense studies (1993 BUR, QDR reports, and independent panel critiques) that are publicly available,13 as well as modern historical instances of major wars (Korea, Vietnam, Gulf War, Operation Iraqi Freedom), to see whether there was any consistent trend in U.S. force allocation. The results of our review are presented in Table 6. To this we added 20 percent, both to account for forces and platforms likely to be unavailable and to provide a strategic reserve to guard against unforeseen demands. Summarizing the totals, this Index concluded that a Joint Force capable of dealing with two MRCs simultaneously or nearly simultaneously would consist of:
- Army: 50 BCTs.
- Navy: 346 ships and 624 strike aircraft.
- Air Force: 1,200 fighter/attack aircraft.
- Marine Corps: 36 battalions.
America’s security interests require the services to have the capacity to handle two major regional conflicts successfully.
Readiness. The consequences of the sharp reductions in funding mandated by sequestration have caused military service officials, senior DOD officials, and even Members of Congress to warn of the dangers of recreating the “hollow force” of the 1970s when units existed on paper but were staffed at reduced levels, minimally trained, and woefully ill-equipped. To avoid this, the services have traded quantity/capacity and modernization to ensure that what they do have is “ready” for employment.
As was the case in 2015, the service chiefs have stated that current and projected levels of funding continue to take a toll on the ability of units to maintain sufficient levels of readiness across the force. Some units have reduced manning. Though progress has been made in some areas due to funding provided by Congress in 2014 and 2015, the return of further cuts under the Budget Control Act of 2011 threaten to undo these gains. For example:
- General Mark Milley, Chief of Staff of the Army, and Acting Secretary of the Army Patrick J. Murphy testified in April 2016 that the Army can maintain only one-third of its force at acceptable levels of readiness to meet full-spectrum operations. They discussed the challenges posed by this crisis in stark terms: “The risk of deploying unready forces into combat is higher U.S. casualty rates and increased risk to mission success.”14
- Air Force Chief of Staff General Mark A. Welsh and Secretary of the Air Force Deborah Lee James echoed the challenges expressed by General Milley and Acting Secretary Murphy, arguing that “the size of our force and state of our full-spectrum readiness are at or near all-time lows.”15
- While the Navy has fared better in rebuilding its readiness over the past year, Admiral Michelle J. Howard, Vice Chief of Naval Operations, has testified that “[w]e are still paying down the readiness debt we accrued over the last decade but more slowly than we would prefer….” She further warned that “[w]e will only maintain our status as the world’s greatest navy with constant vigilance, dedication to restoring our readiness and a commitment to sustained forces around the globe.”16 The Navy has preserved readiness over the past year through fastidious management of its resources and a resistance to overtaxing the fleet, but as demand for America’s global naval presence continues to remain high, this will stretch thin until the fleet grows to a healthy level.
It is one thing to have the right capabilities to defeat the enemy in battle. It is another thing to have a sufficient amount of those capabilities to sustain operations over time and many battles against an enemy, especially when attrition or dispersed operations are significant factors. But sufficient numbers of the right capabilities are rather meaningless if the force is unready to engage in the task.
Scoring. In our final assessments, we tried very hard not to convey a higher level of precision than we think is achievable using unclassified, open-source, publicly available documents; not to reach conclusions that could be viewed as based solely on assertions or opinion; and not to rely solely on data and information that can be highly quantified, since simple numbers do not tell the whole story.
We believe the logic underlying our methodology is sound. This Index drew from a wealth of public testimony from senior government officials, from the work of recognized experts in the defense and national security analytic community, and from historical instances of conflict that seemed most appropriate to this project. This Index considered several questions, including:
- How does one place a value on the combat effectiveness of such concepts as Air-Sea Battle, Network-centric Operations, Global Strike, or Joint Operational Access?
- Is it entirely possible to assess accurately (1) how well a small number of newest-generation ships or aircraft will fare against a much larger number of currently modern counterparts when (2) U.S. forces are operating thousands of miles from home, (3) orchestrated with a particular operational concept, and (4) the enemy is leveraging a “home field advantage” that includes strategic depth and much shorter and perhaps better protected lines of communication and (5) might be pursuing much dearer national objectives than the U.S. such that the political will to conduct sustained operations in the face of mounting losses might differ dramatically?
- How does one neatly quantify the element of combat experience, the erosion of experience as combat operation events recede in time and those who participated in them leave the force, the health of a supporting workforce, the value of “presence and engagement operations,” and the related force structures and deployment/employment patterns that presumably deter war or mitigate its effects if it does occur?
This Index focused on the primary purpose of military power—to defeat an enemy in combat—and the historical record of major U.S. engagements for evidence of what the U.S. defense establishment has thought was necessary to execute a major conventional war successfully. To this we added the two-MRC benchmark, on-the-record assessments of what the services themselves are saying about their status relative to validated requirements, and the analysis and opinions of various experts in and out of government who have covered these issues for many years.
Taking it all together, we rejected scales that would imply extraordinary precision and settled on a scale that conveys broader characterizations of status that range from very weak to very strong. Ultimately, any such assessment is a judgment call informed by quantifiable data, qualitative assessments, thoughtful deliberation, and experience. We trust that our approach makes sense, is defensible, and is repeatable.
Les Aspin, Secretary of Defense, Report on the Bottom-Up Review (Washington: U.S. Department of Defense, October 1993), p. iii, http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0CCUQFjABahUKEwjj4dWf6N3HAhVEmh4KHdG1C
dg&url=http%3A%2F%2Fwww.dtic.mil%2Fcgi-bin%2FGetTRDoc%3FAD%3DADA359953&usg=AFQjCNFvzw730XRz7YRxpc5BNr5_UdfMiQ (accessed September 4, 2015). ↩
Ibid., p. 8.Ibid., p. 8. ↩
Daniel Gouré, “Building the Right Military for a New Era: The Need for an Enduring Analytic Framework,” in Dakota L. Wood, ed., 2015 Index of U.S. Military Strength (Washington: The Heritage Foundation, 2015), pp. 27–36, http://index.heritage.org/militarystrength/important-essays-analysis/building-right-military-new-era/. ↩
John Y. Schrader, Leslie Lewis, and Roger Allen Brown, Quadrennial Defense Review 2001: Lessons on Managing Change in the Department of Defense (Santa Monica, CA: RAND Corporation, National Defense Research Institute, 2003), http://www.rand.org/content/dam/rand/pubs/documented_briefings/2005/DB379.pdf (accessed September 4, 2015). ↩
The United States has not had to contend in combat with any credible air force since the Vietnam War, but U.S. Air Force planners are increasingly concerned about an enemy’s ground-based, anti-air missile capability. For naval planners, ship-based, air-based, and shore-based anti-ship cruise missiles are of much greater concern than is the number of conventional surface combatants armed with large-caliber guns that an enemy navy has. Likewise, ground force planners have to consider the numbers and types of guided anti-armor weapons that an enemy possesses and whether an opposing force has guided artillery, mortar, or rocket capabilities. Guided/precision weapons are less expensive (by orders of magnitude) than the platforms they target, which means that countries can produce far more guided munitions than primary weapons platforms. Some examples: Harpoon ASCM ($2 million)/DDG-51 Arleigh Burke-Class destroyer ($2 billion); AT4 anti-armor weapon ($1,500)/M1A1 Abrams main battle tank ($9 million); 120mm guided mortar round ($10,000) or 155mm guided artillery round ($100,000)/M198 155mm howitzer ($500,000); S-300 anti-air missile ($1 million)/F/A-18 Hornet ($60 million) or F-35A Lightning II ($180 million). ↩
One example of balancing the forces is the Army’s Aviation Restructure Initiative, in which the active-duty force seeks to redistribute certain rotorcraft platforms among the active-duty Army and the National Guard, a plan that the Guard has contended will reduce the capabilities it has gained during recent combat engagements, such as its pilots’ proficiency flying Apache helicopters. For more on this issue, see U.S. Government Accountability Office, Force Structure: Army’s Analyses of Aviation Alternatives, GAO–15–430R, February 26, 2015 (updated April 27, 2015), http://www.gao.gov/assets/670/669857.pdf (accessed September 7, 2015). ↩
Paul L. Winfree, Romina Boccia, Justin T. Johnson, Daren Bakst, Nicolas D. Loris, James L. Gattuso, Jason Snead, Rachel Greszler, Robert E. Moffit, PhD, David R. Burton, and Curtis S. Dubay, “Analysis of the Bipartisan Budget Act of 2015,” Heritage Foundation Issue Brief No. 4477, October 28, 2015, http://www.heritage.org/research/reports/2015/10/analysis-of-the-bipartisan-budget-act-of-2015 (accessed August 30, 2016). ↩
See, for example, Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review, July 2014, p. 4, http://www.usip.org/sites/default/files/Ensuring-a-Strong-U.S.-Defense-for-the-Future-NDP-Review-of-the-QDR_0.pdf (accessed September 7, 2015). ↩
Since World War II, the U.S. has fought four major wars: the Korean War (1950–1953); the Vietnam War (1965–1973); the Gulf War/Operation Desert Shield/Desert Storm (1990–1991); and the Iraq War/Operation Iraqi Freedom (2003–2011). ↩
Defense references to war have varied over the past few decades from “major combat operations” (MCO) and “major theater war” (MTW) to the current “major regional contingency” (MRC). Arguably, there is a supporting argument for such shifts as planners attempt to find the best words to describe the scope and scale of significant military efforts, but the terms are basically interchangeable. ↩
William Cole, “Army Secretary’s Pacific Tour Stops in Hawaii,” July 27, 2016, http://www.military.com/daily-news/2016/07/27/army-secretary-pacific-tour-stops-hawaii.html (accessed August 30, 2016). ↩
The Department of Defense, through the Joint Staff and Geographic Combatant Commanders, manages a relatively small set of real-world operational plans (OPLANS) focused on specific situations where the U.S. feels it is most likely to go to war. These plans are reviewed and updated regularly to account for changes in the Joint Force or with the presumed enemy. They are highly detailed and account not only for the amount of force the U.S. expects it will need to defeat the enemy, but also for which specific units would deploy; how the force would actually flow into the theater (the sequencing of units); what ports and airfields it would use; how much ammunition, fuel, and other supplies it would need at the start; how much transportation or “lift” would be needed to get the force there (by air, sea, trucks, or rail); and the basic plan of attack. The Pentagon also routinely develops, explores, and refines various notional planning scenarios in order to better understand the implications of different sorts of contingencies, which approaches might be more effective, how much of what type of force might be needed, and the regional issue or issues for which there would have to be an accounting. These types of planning events inform service efforts to develop, equip, train, and field military forces that are up to the task of defending national security interests. All of these efforts and their products are classified national security information and therefore not available to the public. ↩
The Honorable Patrick J. Murphy, Acting Secretary of the Army, and General Mark A. Milley, Chief of Staff, United States Army, “On the Posture of the United States Army,” statement before the Committee on Armed Services, U.S. Senate, April 7, 2016, p. 4, http://www.armed-services.senate.gov/imo/media/doc/Murphy-Milley_04-07-16.pdf (accessed August 30, 2016). ↩
The Honorable Deborah Lee James, Secretary of the Air Force, and General Mark A. Welsh III, Chief of Staff, United States Air Force, “Fiscal Year 2017 Air Force Posture Statement,” statement before the Subcommittee on Defense, Committee of Appropriations, U.S. Senate, February 10, 2016, p. 3, http://www.af.mil/Portals/1/documents/airpower/FY16_AF_PostureStatement_FINALversion2-2.pdf (accessed August 30, 2016). ↩
Congressional Quarterly, “House Armed Services Subcommittee on Readiness Holds Hearing on President Obama’s Fiscal 2017 Budget for the Navy Posture,” CQ Congressional Transcripts, March 17, 2016, http://www.cq.com/doc/congressionaltranscripts-4856025?0 (accessed August 30, 2016). ↩
|
<urn:uuid:1e809304-62e2-4c45-ad56-0dc8596ea64f>
|
CC-MAIN-2017-13
|
http://index.heritage.org/military/2017/assessments/us-military-power/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191986.44/warc/CC-MAIN-20170322212951-00569-ip-10-233-31-227.ec2.internal.warc.gz
|
en
| 0.95052
| 10,713
| 3.171875
| 3
|
Geography of Shia Killing
This report aims to cast a quick glance at a few examples of countries where Shia minorities or even majorities are target of massacre, restrictions and acts of violence.
*Saudi Arabia: A suppressed minority
Shias in Saudi Arabia have been suppressed for years. However, during recent years, they have been able to make their protesting voice heard by media and have been frequently vociferous against acts of violence and other kinds of assaults against them. On the other hand, human rights organizations have time and again protested to violation of the rights of Shias and the suppression of Shia minority in this country, and have issued warnings against this problem. Preachers of hate in Saudi Arabia have been the source and origin of many cases of attacks against Shias in this country and elsewhere across the region.
Killing Shias in Saudi Arabia has been promoted by the government of Saudi Arabia for years through textbooks taught at schools, and young people in this country are systematically learning hatful viewpoints about Shias. Since 2011, protests have started to rise in the eastern part of Saudi Arabia, which is inhabited mostly by the country’s Shia Muslims. Sheikh Nimr al-Nimr, a Shia jurist and leader to those protests, however, was arrested by Saudi officials in 2012 and has been sentenced to “execution with sword and crucifixion in public” for acting against the national security and trying to overthrow the government. Al-Nimr was executed on or shortly before 2 January 2016. Shias make up more than 2 million of Saudi Arabia’s population, but for years, they have been living under discriminatory conditions and all kinds of pressure have been exerted on them by the country’s government. Although they live in the oil-rich part of Saudi Arabia, they have been suffering the worse economic conditions. No Shia Muslim in Saudi Arabia can occupy important administrative or military posts as a result of their religious denomination.
Daesh is following suit with Saudi Arabia’s muftis in massacring Shias. Sa’d bin Atiq al-Atiq, is a mufti, who is close to Saudi government and is an example of those hatemongers, who appeared on the state-run television of Saudi Arabia quite recently, describing Shias as people whose existence defiles the earth.
*Nigeria: Massacre amid media silence
Nigerian Shias are the most populous Shia group in Africa. At present, nobody knows where Sheikh Ibrahim Zakzaky, the leader of the Nigerian Shias, whose bloody pictures were published by media after his arrest by Nigerian forces, is being kept. Now that various dimensions of the killing of Shias in Nigeria have been relatively clarified, even international media like the New York Times have described this incident as the massacre of Shias.
Ibrahim Zakzaky has lost almost all his family members simply because of being a Shia Muslim. His wife and one son were killed in the recent bloody crackdown while his other three sons had been killed by the Nigerian army during last year’s Quds demonstrations in the country.
The problem, however, is not only the Nigerian army because Shias in this West African country are regular targets for Boko Haram Takfiri extremist group. It is said that Ibrahim Zakzaky has followers, who have never taken up arms and this is why they have been described as the weaponless army. With only their empty hands, Shias following Zakzaky have tried to block the onslaught by Nigerian army, but they were answered with hot lead and heavy weapons. The fact, however, is that the number of Shias in Nigeria has increased manifold during the past 30 years.
*Pakistan: Shias a regular target
An attack on Pakistani Shias in Parachinar region, which happened quite recently, was the latest instance in which the country’s Shia population has been massacred. Lashkar-e-Jhangvi, an extremist group which has made massacring Shias part of its regular agenda, has assumed responsibility for this incident in which at least 25 people lost their lives. According to figures released so far, Shias account for 15-20 percent of Pakistan’s population of 176 million, and bloody attacks on them have a long record. One of the biggest examples of the massacre of Pakistani Shias took place in 1988 under the former Pakistani president, Muhammad Zia-ul-Haq. In that pogrom, more than 80,000 Sunni extremists attack Shia-inhabited villages, razed them to the ground and massacred the Shia population there.
For this reason, religious ceremonies held by Shias, especially on the day of Ashura, have been regularly marked with suicide attacks in such Shia-dwelling regions as Parachinar, Kashmir, and Quetta. International human rights institutions have frequently accused the Pakistani government with indifferences and oversight in this regard. Even the Human Rights Watch has urged the government in Islamabad to take serious measures to curb massacre of Shias by Wahhabi groups. Most leaders of anti-Shia terrorist groups such as Sipah-e-Sahaba, Lashkar-e-Jhangvi, Taliban officials, and Lashkar-e-Taiba have studied in Dewbandi religious schools, which have powerful anti-Shia roots.
*Afghanistan: Protest to killing of Hazara people
Over a month ago, Afghanistan was scene of street protests for several days in which demonstrators voiced their protest at the killing of the country’s Shias. What triggered these protests, which were also held in front of Afghanistan’s presidential palace, was the beheading of seven Hazara Shias, who were said to have been beheaded by forces affiliated with Daesh terrorist group after being taken into captivity. Their beheaded bodies were found by people a while later. About 99 percent of people in Afghanistan are Muslim of whom about 70-75 percent is comprised of Hanafi Sunnis and 30-35 percent is Shias. Hazara Shias, however, have been regular targets for various extremist groups. Now, it seems that it is turn for Daesh terror group to kill Shias in Afghanistan. The forces of Daesh terrorist group have now made the country’s Shias one of their main targets in Afghanistan. Shias maintain that the government of Afghanistan is not taking necessary measures in order to protect them against such attacks.
*Bahrain: Shias who don’t die
How much blood must be shed for a revolution to be suppressed and for protesters in a country to be silenced? How many people must be tortured, arrested and killed until popular protests are quelled? The answers to these questions are not clear, at least, for the officials of Bahrain’s Al Khalifa regime when it comes to the country’s Shias, who make up the majority of Bahrain’s population. Threat, arrest, torture, exile, incarceration and massacre have never been able to reduce the intensity of protests by Shias in this tiny Persian Gulf country. Shias account for 70 percent of the population in Bahrain, but they have been subject to discriminatory treatment of the Sunni Al Khalifa ruling family. A people that make up the majority of the population in the country say that for years, they have been dealt with as second-degree citizens.
Such discriminatory treatment of Shias has caused many analysts to describe Bahrain as a country of apartheid. Al Khalifa regime does not allow Shias to occupy key posts or become members of the police force or join the army. According to a report by Bahrain Center for Human Rights, although Shias account for 70 percent of the population in the country, they only occupy 18 percent of government positions.
*Iraq: Shias, main goal of Daesh (ISIL)
They say that every time Daesh faces a setback in Iraq and Syria, it takes it out on Shia civilians. In Iraq, Shias account for 65 percent of the population, making the country’s biggest religious group. Iraq is home to many sacred cities of Shias, including Najaf and Karbala, which host shrines that are visited by millions of Shias every year. However, the country’s Shia population has been regular target of terrorist groups in Iraq in past years and is now considered as the foremost target of Daesh terror group.
Some human rights groups have warned that Daesh is targeting Shias in Iraq with various kinds of explosive attacks with the final goal of purging the country from Shia Muslims. It was only through Iran's assistance that religious ceremonies held by Shias in the lunar month of Muharram have been made secure for Shia pilgrims.
*Yemen: Shias under Saudi Arabia’s bombardment
Saudi Arabia is one of the biggest customers of arms and advanced bombs in the world. The main use of these bombs in recent months has been in air raids against Shias in Yemen, which has left thousands of civilians dead in the impoverished county. In addition, millions of Yemeni Shias have been forced to flee their homes as a result of Saudi attacks while Saudi blockade of its southern neighbor has faced people with many difficulties for meeting such primary needs as access to potable water.
According to available figures, 55 percent of the country’s population is made up of Shias who have constantly lived under suppression. Even before the beginning of the ongoing unrest in Yemen, the country’s army carried out frequent bombardment missions against Shia-inhabited regions. Yemen’s former dictator, Ali Abdullah Saleh, had also suppressed Shias in 2004 through support of Saudi Arabia.
By: Mohammad Karbasi
Middle East Analyst
The views expressed in this article are the author's opinion and do not necessarily reflect the views of the ODVV.
|
<urn:uuid:656573e1-7726-4194-8fec-5bb1cd760e67>
|
CC-MAIN-2022-27
|
https://odvv.org/blog-1042-Geography-of-Shia-Killing
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103324665.17/warc/CC-MAIN-20220627012807-20220627042807-00368.warc.gz
|
en
| 0.976038
| 2,009
| 2.53125
| 3
|
I and II Kings cover the rise and fall of the nation of Israel. In II Kings 6:24 - 7:19 the city of Samaria is besieged by the Aramean army, with the siege lasting so long that the city endured a severe famine.
Four desperate lepers outside the city gates looked at the odds for their survival and it wasn't good. If they stayed where they were, they would die of hunger. If they went into the city, there was no food there either, and they would die of hunger.
|
<urn:uuid:0a5e98b1-24b4-4a62-a3d4-3fc76b9cd2a0>
|
CC-MAIN-2019-35
|
https://offkilterbiblestudies.weebly.com/theology/archives/07-2015
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330750.45/warc/CC-MAIN-20190825151521-20190825173521-00523.warc.gz
|
en
| 0.973038
| 109
| 2.671875
| 3
|
Aquarium of the Pacific - Online Learning Center - Species Print Sheet
These frogs were first described by John White, hence the common name, White’s. The tree part of their name comes from their preferred habitat, tree canopies. White’s tree frogs are also known as the dumpy tree frogs, green tree frogs, giant green frogs (Florida), and Australian green tree frogs. They are described as quiet, very gentle, laidback animals that, unlike most of their relatives, are not into jumping. They are popular exotic pets world-wide.
At the Aquarium
Our frogs were donated to us by the Tennessee Ripley’s Aquarium. Their habitat is in the Tropical Pacific Gallery. They are fed crickets and worms.
Native: southern New Guinea, Indonesia, and widely distributed in Australia, especially in the north and east. Introduced: Florida and New Zealand
This species is a habitat generalist, highly adaptable to different environments ranging from coastal to arid habitats. Typically these frogs are arboreal inhabiting tree canopies near still water sources, but they are also found in woodlands far from water, grasslands, near streams and swamps on rocks, and in rock crevices and hollow tree trunks. They have adapted to suburban and urban areas where there are water sources: canals and drainage ditches, toilets, sinks, water tanks, and gutters. In New Guinea, they inhabit open monsoon forests in addition to gardens and parts of human dwellings.
The head of the White’s tree frog blends into the body—there is no obvious neck. The mouth is short and blunt. The legs of these frogs are short with long thick toes that end in wide, irregular-shaped pads. The fingers are about one-third webbed while the webbing of the toes is almost three-quarters. The skin on the back is smooth and granular on the sides. Adults have a well-developed lumpy or fleshy fold behind each eye, (the supratympanal ridge), that may be partially covered by the tympanums (similar to eardrums) which are visible on both sides of the head. Males have a wrinkled grayish colored vocal sac underneath the throat region; whereas, females have white throats.
The color of these frogs comes from blue and green pigments that are overlaid by yellow. The variation in coloration is dependent on temperature and color of the environment they inhabit. The dorsal side may be jade-green, blue-green, or olive. Both sexes may have irregular shaped white markings or distinct stripes on the sides and spots from the corner of the mouth to the base of the arms. There may be a white stripe along the hind edge of the lower leg and outer edge of the 5th toe. Coloration of the thighs varies from yellow to maroon. The ventral surface can be white or a grayish to yellowish white. The throat of females is white. Eyes are a golden color with horizontal irises.
Females are 10-15 cm (3.9-5.9 in) snout to vent in length. Males are about 2.54 cm (1 in) smaller.
Diet and Feeding
Adult White’s tree frogs are primarily insectivores eating grasshoppers, mosquitoes, beetles, flies, moths, and spiders. They also eat small mammals. When the prey is small enough, the frog propels its tongue out of its mouth to capture the insect on its sticky surface. They capture larger prey by pouncing on it and seizing it with their hands to force the meal into their mouths. Tadpoles are omnivores. They eat algae, mosquito larvae, drowned insects, and tadpoles of other species.
These frogs become sexually mature at about two years of age. Individual males start calling early in October from exposed, elevated surfaces to attract a female. Breeding season is from November to February when an attracted female will meet the male at a still water source. Mating take place in shallow water where the pair remains in amplexus for about two days. The female rapidly ejects 200-300 brown eggs that the male fertilizes during ejection. The eggs that are 1.1-1.4 mm (0.04-0.06 in) in diameter and encased in clear jelly are deposited on the surface of still water. The spawn sinks within 24 hours. Eggs are ejected and fertilized several times for about two days. A total of 2,000-3,000 eggs are deposited.
The eggs hatch in three days if the water depth and temperature are suitable. Tadpoles are a mottled brown on hatching. Metamorphose from tadpoles to froglets to adults takes two months in the wild.
White’s tree frogs are nocturnal, hunting for prey at night. During the day they look for cool, dark, and moist places to sleep. Their calls, made from high positions such as trees and gutters during most of the year, are low, slow, and repeated many times. In breeding season they descend closer to still-water sources where the males make a deep repeated crawk, crawk, crawk or barking sound to attract a female. They have an ear-piercing stress call that they issue when a predator is close
Prior to the mating, season the male develops a black nuptial pad on the inner surface of the thumb that enables him to hang onto the female for the duration of their mating that may be as long as two days.
To survive dry seasons, these frogs may burrow and cover themselves with a cocoon of sloughed skin and mucus to retain moisture.
White’s tree frogs have been known to live 23 years in a protected environment such as an aquarium. Their life span in the wild is probably shorter.
This tree frog species is classified as a species of least concern on the IUCN Red List because of their wide distribution, tolerance of a wide range of habitats, and their presumed large populations. White’s tree frogs are protected in Australia under the country’s Environmental Protection and Biodiversity Conservation Act of 1999. Special permits are required to keep them as pets and to export them. There are some concerns that the exportation of large numbers of the Indonesian population for the international pet trade may impact this geographic population. In Florida these frogs are bred for the pet industry in orchid shade houses from which some escape. Escapees and intentional releases are believed to be the source of the introduction of this species into Florida.
In the wild, they are preyed on by snakes and some birds and lizards. In suburban areas, predation by cats and dogs and pollution may reduce the number of tree frogs.
Like humans, White’s tree frogs get obese if overfed. They deposit fat layers over the top of the head and body that give these frogs a dumpy appearance, the source of one of their common names, dumpy frog.
The skin secretions of these frogs are lethal to blowflies. They contain peptides that have high antibacterial and antiviral properties and caerulens that may affect digestion. The secretions are being studied by the pharmaceutical industry for use in treating human illnesses and for use as an insecticide
|
<urn:uuid:0992e193-53aa-4ea8-9348-ab3a8f69d3b1>
|
CC-MAIN-2014-42
|
http://www.aquariumofpacific.org/onlinelearningcenter/species/whites_tree_frog/P1
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443451.12/warc/CC-MAIN-20141017005723-00123-ip-10-16-133-185.ec2.internal.warc.gz
|
en
| 0.955099
| 1,515
| 3.453125
| 3
|
Tackling Contamination In Data Centers
Data centers are not idle environments. Changing equipment, upgrading infrastructure, and daily maintenance all provide opportunities to introduce contaminants into the data center. Many data center operators make the mistake of overlooking environmental factors in their facilities. This oversight can be costly. Over time, contaminants damage critical components and lead to equipment failures and downtime.
Preventing Contaminants from Entering the Data Center
Staff need specialized training to not only remove contaminants, but to prevent them from entering the data center in the first place. Everyone who enters the data center, whether a technician, maintenance worker, or operator, should wear protective equipment to minimize the contaminants they bring into the facility. Because the majority of contaminants are tracked in on people’s feet and wheels on carts, contamination control mats should be placed at all entryways.
Properly Removing Contaminants
No matter how stringent prevention efforts are, some contaminants will make their way into the facility. Regular, specialized cleaning will remove the contaminants that enter the data center. Data center cleaning protocols are unique, and staff should be trained to follow established best practices. Environmental surfaces, equipment, and floors should be cleaned at least quarterly and the underfloor plenum should be cleaned at least annually. If contaminants are allowed to build up in the underfloor, they will eventually spread throughout the data center, putting critical equipment at risk.
Lastly, speedy response to emergencies is critical to minimizing damage from flooding, fire, or other disasters. Having a professional data center cleaning provider that is available 24/7 can make all the difference in containing the effects of a disaster. Cleaning and decontaminating a server room requires a methodical approach and specialized tools to restore the facility efficiently and effectively.
|
<urn:uuid:4d3ba1d3-0c4f-47f5-bf67-fa8a3aeb349d>
|
CC-MAIN-2018-51
|
https://www.cleanlink.com/cleanlinkminute/details/Tackling-Contamination-In-Data-Centers--55282
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827727.65/warc/CC-MAIN-20181216121406-20181216143406-00289.warc.gz
|
en
| 0.912968
| 357
| 2.53125
| 3
|
Definition - What does Junk Mill mean?
A Junk Mill is a mill that is used to perform heavy duty milling jobs. It is designed with a Kutrite that helps in chewing up the hardest drilling materials. The mill used in both the open hole and cased operations. It is a very simple and rugged tool which is used to mill all kinds of junk such as bridge plugs, bit cones, squeeze tools, hard-banded tool joints and packers on the drill pipe. To stabilize the Junk Mill, wear pads are produced so that a hole is not cut in the casing during the milling process.
Petropedia explains Junk Mill
The Junk Mill is designed with the heavy duty and standard configurations to chew up the junk present in the hole. It makes the milling jobs effortless even while cutting the hardest fish-like squeeze tools, drill pipe, alloy steel packers, reamers, rock bits, reamer blades and perforating guns. It is available in following types:
- Normal: It is designed for removing the general junk, packer, milling of tubing and cement.
- Flat-Bottom: It is different from the normal Junk Mill as greater amount of hardfacing is enforced on this type of Junk Mill.
- Conebuster: It is different from the flat bottom Junk Mill as a concave shape is given to the mill with this type of Junk Mill.
- Cobra: The blades of this Junk Mill have offset designs that make it different from the flat bottom junk mill.
|
<urn:uuid:9e3af05a-1f6a-46f6-a1c1-fc026cec2040>
|
CC-MAIN-2017-13
|
https://www.petropedia.com/definition/7081/junk-mill
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189903.83/warc/CC-MAIN-20170322212949-00516-ip-10-233-31-227.ec2.internal.warc.gz
|
en
| 0.929658
| 312
| 2.625
| 3
|
With advanced technology driving the digital evolution, organization have to adopt technology, and that the project manager tends to occupy the prime communicating position on building projects, coming into direct or indirect contact with nearly everyone involved. As such, they should familiarize themselves with this realm of knowledge and treat it with equal regard to areas such as structural or mechanical engineering. Building automation systems, which control such things as heating, air conditioning, fire alarms, sprinklers, door locks and security cameras, as automated buildings become more proliferous and more sophisticated the range of possible attacks might become more nefarious. For instance, losing control of temperature in a building and starting a fire by remotely overheating equipment in a building, where a fire alarm and sprinklers are disabled could be catastrophic. In order to prevent all these risks and losses in the building, below are the pitfalls to avoid in Smart Buildings and Intelligent Infrastructure.
The Five Pitfalls to Avoid
1. The first step in preventing such problems is to understand on a general level how these systems work, in the case of buildings the setup is relatively simple, physical components that control building systems, (a thermostat controlling HVAC), for example, can be accessed remotely by the building’s operators because they’re connected to the internet. In a recent security exercise, for instance, IBM hackers gained access to a large corporation’s building systems through a single Wireless Access Point — a piece of equipment found in most people’s living rooms and could subsequently control the temperature, fire suppression and security systems in all that company’s buildings across North America. Systems controlling heavy infrastructure are often more complex than off-the-shelf building automation systems, they also tend to be proprietary and customized, so it’s difficult to make generalizations about them, as such, a sophisticated team of engineers could combine their knowledge to make educated about exactly what equipment is being controlled, they can see in a network’s everyday functioning, then manipulate it in ways they know would cause the damage.
2. What can be done about this? The most effective answer lies in the problem, lack of awareness about these vulnerabilities. Automated building systems control equipment that works in essentially the same way since well before the digital revolution, this equipment is engineered, designed, manufactured and installed by a chain of people who likely have no knowledge, expertise or training in cyber security. An architect in close quarters with a building contractor or manage is typically the conduit through which all these parties communicate with each other, Thus, if architects were to treat knowledge of these weaknesses the same way they treat knowledge of the building equipment that contains them, they could help spread that awareness to everyone involved in a project, a vital first step in making safeguards against hacking a standard practice.
3. It’s most likely that the security of building and infrastructure controls will eventually fall to the responsibility of a single-source project manager, engineer and vendor, in much the same way that structural or mechanical engineering is handled today, but that is a nascent field and when it does take on a greater role in building projects, project manager, engineer and vendor will undoubtedly be tasked with coordinating with the person’s involvement, In the meantime, it is important that the persons involve in this building project educate themselves as much as possible about how a building’s operation works or get the building management personnel involve as well as the building architect, this will matter in a more connected future.
4. Although powerful smart-building capabilities exist, obstacles remain to their wider use. Smart is not in everyone’s design vocabulary, people are still using return on investment as an excuse not to build smart, high performance buildings, they do not understand that it often can be done for the same first cost, if you know how to do it, in some cases, the building automation systems capabilities are just sitting there, waiting to be tapped, especially in existing buildings, getting a smart, high-performance building should not cost more. “The idea is to get that data exchange between building systems working together to achieve the highest performance possible. It’s more about developing a comprehensive strategy that will determine the order in which the technology puzzle pieces will be assembled, the strategy needs to consider your prioritization of sustainability, energy, and occupant experience goals, and this strategy will impact the appearance of the assembled puzzle, that strategy will help determine the order of integration the building subsystems’ puzzle pieces.
Amount of usage in and out of the building increases
5. When smart building approaches are applied in existing buildings, energy savings can be substantial. A large airport is undergoing a major retrofit, integrating many building subsystems, including power and BTU monitoring, jet bridges, and cooling systems across all its terminals are expecting to see benefits in energy savings, as well as operational advantages and enhanced comfort of occupants and tenants and able to see changes in the ways high-performance buildings interact with utility electrical grids, when the grid and buildings work together for demand response situations, high-performance buildings can cycle up or down more frequently and quickly.
Decreasing energy consumption of the building
Successful Smart Building
Smart buildings are on the rise around the world as companies recognize the potential cost savings of automation, with the advent of the Internet of Things, every building with an integrated security and access control system has the capability to also integrate the building’s energy use, water use, ventilation and more.
Below are the steps to ensure successful automation of a commercial facility.
Perform a detailed cost analysis, the first step is to show your customers the potential savings by conducting a thorough cost analysis, when surveying, you should look at everything from air handlers and chillers, to irrigation and what types of lighting are currently in place, be sure to also include details like switching to LED lighting, updating compressors and chillers, show the total potential cost savings. Buildings waste a lot of energy, simply propping a door open can cause the automation system to go into overdrive, pumping out air and creating significant energy waste, the ROI on building automation can sometimes free up money for other projects, while enhancing technology, comfort and security.
Build relationships, there’s an ongoing shift in the decision-making authority from facility managers to the IT leadership, this can be problematic, as many CIOs are unfamiliar with the challenges of maintaining a facility’s physical security, facility managers can be equally frustrated by unfamiliar technology. Helping to create or improve the relationship between the CIO and the facility manager is crucial, educating the CIO about physical security and bridging the knowledge gaps for the facility manager with smart device technologies will be essential as the industry moves to a more loT-centric mindset, providers and integrators should present themselves as a coordination point.
Foster communication, as with any new technology, there will be those who are hesitant to embrace the change, for instance, the IT director may have concerns about putting all their eggs in one software basket. Global BAS Market Growing 11% annually, report says when a building is fully automated and networked, a failure in one area can cause failure in others. There may also be network bandwidth limitations that will have to be addressed to handle the amount of data that will be collected and shared between the various components of an automated system, concerns can usually be alleviated through detailed communication and concrete information about how the building’s systems can live side-by-side and how integration can benefit the customer in the long run, the most important thing is to ensure that everyone has an opportunity to voice those concerns at the beginning.
The aggregated data and powerful analytics that add intelligence to existing building infrastructure have the potential to transform the way in which companies manage energy across their estate portfolio, in particular, building engineers can be empowered to take a more targeted, data driven approach to their work while automation improves their productivity. This delivers substantial cost savings, while helping firms achieve carbon reduction targets with relatively low capital investments. Microsoft’s smart buildings pilot program shows that while various adoption barriers remain, these can be overcome by following a set of key design principles, most importantly, the underlying technologies are now more widely available and easier to implement. By sharing its experience with the public, Microsoft hopes to contribute to the evolution of the technology and encourage other companies to implement programs of their own, the potential for information technology to improve building energy efficiency is huge and the related electricity cost savings amount to US$20-25 billion, quite simply, firms seeking to enhance their bottom line need look no further than the office they’re sitting in.
Comark. (2017) 5 Steps to Successful Smart Building Automation. Retrieved from http://comarkcorp.com/5-steps-successful-smart-building-automation (Accessed 6 December 2017)
Accenture. (2011) Energy-Smart Buildings. Retrieved from http://czgbc.org/energy-smart-buildings-whitepaper.pdf (Accessed 9 December 2017)
Ross Brady. (2017) Hacking Architecture: A Crash Course on the Pitfalls Facing Smart Buildings and Intelligent. Retrieved from https://architizer.com/blog/practice/tools/hacking-architecture (Accessed 6 December 2017)
Kurt Roth. (2015) Smart Buildings: Challenges and Opportunities. Retrieved from http://www.bu.edu/systems/files/2015/12/Roth.pdf (Accessed 6 December 2017)
Rita Tatum. (2017) Overcoming Obstacles to Smart Buildings. Retrieved from http://www.facilitiesnet.com/buildingautomation/tip/Overcoming-Obstacles-To-Smart-Buildings –38739 (Accessed 6 December 2017)
Wallpapers Wide. (2017) Retrieved from http://wallpaperswide.com/house_boat-wallpapers.html (Accessed 8 December 2017)
Memoori 2017 Retrieved from https://www.memoori.com/smart-cities-oil-built (Accessed 13 December 2017)
|
<urn:uuid:aff0a4f3-5f0a-411e-8812-431bcc0ffe40>
|
CC-MAIN-2020-29
|
https://sipmm.edu.sg/five-pitfalls-avoid-smart-buildings-intelligent-infrastructure/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657170639.97/warc/CC-MAIN-20200715164155-20200715194155-00584.warc.gz
|
en
| 0.946113
| 2,068
| 2.6875
| 3
|
The first step in writing any essay is to identify the topic that you would want to discuss. With culture as a topic, an essay writer has the option of discussing it in a general method or narrowing it down further to make it more focused and in-depth. Once decided on your , it is best to create an essay plan, which will steer your essay’s general direction. The next step is to create an which will guide you on how you will compose the essay itself. Another critical step in essay writing is to identify the type of essay that you will use. suggests the following topics on writing your culture essay.
There are many countries in Asia and one of the Asian countries who has left its mark all over the world are the Indians. Their culture is a representation of their history, geography and demographics. Some of the identifying marks that are exclusive to them are their cuisine, religion and clothing. Aside from this, they have also provided influence and contribution on pop culture such as: recreation, films and poetry. says that writing an Indian culture essay provides something more than academic paper writing as researching alone on this very diverse culture is an experience in itself.
Transformative Policies: Adversaries can act in ways that help transform the intractable conflict between them, by contributing to a fundamental transformation of one or both opponents. For example, during the Cold War, cultural, educational, and other social exchanges between the United States and the Soviet Union were conducted at and levels. They contributed to changes in the way many members of the Soviet elites saw themselves and viewed Americans, and people on each side developed new perceptions of the other side. The changes in both identities and conceptions contributed to a transformation in the Soviet Union and the end of the Cold War.
The Industrial Revolution eroded and threatened to destroy England’s sense of national solidarity. As the culture, traditions, and economy of artisans, small producers, tradesmen, and the yeomanry gave way to wage labor, the factory system, and mass industrialization, industrial capitalism uprooted communities, devalued purposeful work, and corroded family life. Wealth, resources, and production became concentrated into what William Cobbett called “great heaps,” a process that created “but two classes of men, masters and abject dependents.” Lost were the traditional values of liberty and independence—and the open, confident, and generous approach to life those values engendered. In its place, market individualism emerged as the ruling ideology, an ideology possessed by a political vision not of a national society, however hierarchical, but of no society: that is, a utilitarian, ever more borderless world of atomized individuals maximizing their interests.
Your search returned over 400 essays for "cultural identity"
One qualm pertains to the data. As a qualitative researcher, I do understand that using audio- or videotapes can change the relationship that one is trying to establish with the research participants. I somewhat bought into the argument that these youths had been the participants to professional broadcasts before and that using these recording devices might have encouraged them to construct their identities in the same fashion, and building on this history. On the one hand, I have the experience that the very use of recording devices can be introduced as part of becoming familiar with the context so that, at some point, they are no longer viewed as special instruments or to construct me in a different way. On the other hand, such recordings would not only have allowed the researcher to substantiate some of the materials with concrete transcriptions, which often lend somewhat more credibility to what participants have said than the after the fact notes that the researcher necessarily has to construct. In addition, such recordings would have allowed a much more thoroughgoing analysis of the linguistic practices that characterize the culture than has been done at present (Chapter 4, pp.147-151). This analysis has left me wanting for more, and is but one example of where I felt that a little more data would have allowed more elaboration. In a sense, I find the book too short and wanted to have a little more in terms of data and analysis, all the while feeling that the theoretical apparatus has been well developed and presented.
Essay UK, Essay: Cultural identity. Available from:
translation and cultural identity selected essays on translation translation and cultural identity selected essays on translation and cross cultural communication unabridged
Free cultural identity Essays and Papers
Madman subtly different, with the economic returns from those fortunate enough to have relationship with you accurate view and interpretation of financial records and reports of the projects you are running. Advantages shopping online is that she didn’t have help you with called a critical lens essay love identity essay and friendship, and i tried to negative impact of media on society essay. While drive learn ability of the firm essay donation essays cross cultural communication essay on role models cheap custom paper personal statement medical. Will access practice registered nurse cultural identity essay example in the united states, it cultural identity essay example would not be the case. There energy push urethra and the urge to achieve.
|
<urn:uuid:90d7526b-002f-4280-9c73-441c992ba034>
|
CC-MAIN-2018-39
|
http://i-tees.com/essay-cultural-identity.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160337.78/warc/CC-MAIN-20180924090455-20180924110855-00440.warc.gz
|
en
| 0.956568
| 1,035
| 2.875
| 3
|
Combining Virtualization with iSCSI Storage
As businesses expand virtualization strategies in partnership with managed services providers, many of them are beginning to see how an iSCSI storage system can help them maintain a more robust host cluster.
What is iSCSI?
iSCSI stands for Internet Small Computer System Interface and consists of a storage solution designed to run on Internet Protocol networks. Since these kinds of networks are so common, iSCSI is useful for the transmission of data through WANs (wide area networks) and LANs (local area networks) as well as over the internet itself. In the last capacity, iSCSI systems allow for data transfers over great distances.
iSCSI Used with Server Virtualization
One of the most important facets of a virtualized workspace is the need to keep host servers from experiencing downtime. Each server failure can lead to a major disruption of company activities since it may support a dozen virtual machines or more, all of which will fail with the server.
In order to prevent such catastrophic outages, many businesses use clusters that will enable an alternate host server to take over should a primary one fail. This requires a pooled storage solution so that both primary and alternate servers can communicate with required data resources. The iSCSI protocol is ideal in this situation. Typical iSCSI systems use TCP/IP connections, routing data through a high-speed connection that is dedicated to this one task only so that applications requiring intensive I/O can function well.
|
<urn:uuid:f22be7cf-07d0-4615-a365-c66e36174059>
|
CC-MAIN-2014-10
|
http://blog.icorps.com/bid/108033/Combining-Virtualization-with-iSCSI-Storage
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021901207/warc/CC-MAIN-20140305121821-00032-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.928605
| 304
| 2.609375
| 3
|
1948.6 | Commemorating Coronation of George VI
Commemorating Coronation of George VI
Goldsmith & Silversmith Company Limited
1936-1937, 20th century
14.9 x 14.9 cm
Bequest of the Right Honourable Richard Bedford, Viscount Bennett
This artefact belongs to: © New Brunswick Museum
Keys to History
Few doubted the outcome of the 1935 federal election. In the late spring, Prime Minister R.B. Bennett (1870-1947) returned to Ottawa from London and pushed the remaining pieces of his reform legislation through Parliament. Even though the economy continued to recover steadily, Bennett's damaged reputation, a party torn by internal strife, and a hostile press all conspired to encourage public demands for a change of leadership. Presented with "King or Chaos," the Canadian electorate chose a refurbished Mackenzie King (1874-1950), whom they had thrown out of office five years earlier.
R.B. Bennett remained in Parliament as Leader of the Opposition until 1938. At the age of 65, when he was tossed out of office, Bennett took his time deciding his next course of action. In 1937 he, along with his sister Mildred (1889-1938), attended the Coronation of George VI (1895-1952) and Queen Elizabeth (1900-2002). From England he traveled to Germany in search of advice about his health, and was told he could not return to the pressures he endured from 1930 to 1935. In 1938, his beloved sister Mildred died, severing an important family tie. A change of direction for Bennett appeared imminent.
R.B. Bennett notes this clock in his last will and testament as "My gold and crystal Coronation Orb."
George VI and Queen Elizabeth were crowned in a spectacular ceremony in Westminster Abbey, London.
George VI died of lung cancer in February 1952. Queen Elizabeth, more familiar to the world as the Queen Mother, lived another 50 years, basking in the affection of a nation and former empire.
Prince Albert, Duke of York, ascended the British throne in December 1936 as George VI, following the abdication of his older brother, Edward VIII (1894-1972).
|
<urn:uuid:ea3e953f-26f9-4410-8e13-9ec6228a55bf>
|
CC-MAIN-2017-26
|
http://collections.musee-mccord.qc.ca/en/collection/artifacts/1948.6
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320261.6/warc/CC-MAIN-20170624115542-20170624135542-00080.warc.gz
|
en
| 0.955632
| 465
| 2.875
| 3
|
St. Antoine YMCA Site
In 1909, Joseph L. Hudson, founder of mercantile establishments known throughout the nation, and Dr. Adolph G. Struder, General Secretary of the Young Men's Christian Association of Detroit, together with several leading black citizens, established the Douglass institute, forerunner of the St. Antoine Street Branch YMCA . Organized in September 1920, the St. Antoine Branch provided community services through religious educational, and recreational activities. Construction of a building, which once stood here, began in 1924, just four blocks from the downtown YMCA where blacks were not allowed membership. The new building was well equipped and on Sunday afternoons the gymnasium was set up for eminent national leaders to come and speak on current local and national problems. Many blacks of Detroit in the 1920s had roots in the St. Antoine "Y".
|
<urn:uuid:f2424d08-8c31-4e21-89ab-a9b1f42517cc>
|
CC-MAIN-2020-50
|
http://michmarkers.com/default?page=L0442
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141197593.33/warc/CC-MAIN-20201129093434-20201129123434-00163.warc.gz
|
en
| 0.967539
| 183
| 2.75
| 3
|
Cryptocurrencies have caused a stir among both mainstream financial experts and everyday consumers in recent months. Thanks to last year’s bull run, more people than ever know about Bitcoin and different “altcoins”. However, the reaction hasn’t been totally positive. Hence, a lot of folks are very skeptical of Bitcoin and the blockchain, leading to a lot of misinformation. Thus, some of these untruths have morphed into widely held but false beliefs about cryptocurrencies.
“They are worthless”
Likely one of the biggest myths that people enjoy circulating, is that, they have no value. This is simply not true. One needs to understand that other goods and services do not acquire their value due to an inherent worthiness. Value is acquired based on what people are willing to pay for it. If you’d like to see this in action, then you can compare a designer t-shirt to a department store one. Is the designer shirt really worth that much more material wise? Not likely, but people have placed more value on designer items thanks to branding. This mentality applies to literally everything in life.
No practical use case – Only for criminals
There are those who bash cryptocurrencies for not having any practical applications. This has also been proven false. The average user may not see the immediate need for them in their everyday transactions. Especially, in developed countries where they have the convenience of credit cards and online banking. However, they can still be useful for many other purposes. For example, the speed and efficiency of the blockchain enables global remittance, allowing money to cross borders instantaneously instead of waiting days for settlement to occur.
This puts cryptocurrencies in a place that is far outside the box created by the average user, who largely thinks cryptocurrencies are strictly for illegal transactions. While it’s easy to think that, the fact is that criminals actually prefer to utilize cash. Most cryptocurrencies are not as anonymous as you think, and people who commit crimes don’t want all of their activity recorded in a ledger believe it or not.
Coins and the Blockchain are the same.
The most common misconception though, is that, the blockchain and cryptocurrencies are the same thing. Cryptocurrencies simply use the blockchain to function. They are as different as night and day, and the blockchain can be applied to many more things other than just crypto currencies. As time passes, this would likely be the most laughable of all these myths. Every day, there are more innovative technologies being developed via the blockchain, to help us find real solutions to problems in our everyday lives.
|
<urn:uuid:5b3a3fc3-351b-4b2b-8837-f0d7fd777e70>
|
CC-MAIN-2018-43
|
https://cryptocoremedia.com/ridiculous-myths-cryptocurrencies/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511703.70/warc/CC-MAIN-20181018042951-20181018064451-00239.warc.gz
|
en
| 0.963732
| 529
| 2.6875
| 3
|
According to medieval legend, the Holy Grail was the vessel from which Jesus Christ drank at the Last Supper, his final meal with his followers. Many works of literature describe the search for the Grail, which was believed to have sacred and mysterious powers. However, this quest, or search, did not always involve a physical object. For some, the Holy Grail represented a religious state of grace or union with God. In some accounts, the Grail held blood from Christ's wounds and was known as the Sangreal, meaning "royal blood."
medieval relating to the Middle Ages in Europe, a period from about A . D . 500 to 1500
The Legend of the Grail. Although many versions of the Grail legend exist, certain elements appear over and over again. Some
After the Last Supper, the Grail came into the possession of Joseph of Arimathea, who caught Christ's blood in it at the crucifixion. Joseph went to prison, but the Grail kept him alive by supplying daily nourishment. Released from prison, Joseph traveled to France and then to Glastonbury, England, carrying the Holy Grail. Soon, however, the Grail disappeared from the world because people were sinful. Hidden away in a mysterious castle, it was guarded by the descendants of Joseph's sister.
One of the best-known versions of the Grail's later history is connected with Arthur, the legendary king of Britain. This account says that the Grail lay somewhere in a wild and desolate part of Britain in the castle of the Fisher King, a wounded monarch who lay between life and death. Only if the purest of knights found his way to the castle and caught a glimpse of the Grail would the Fisher King's torment end and life be restored to his wasteland.
To the knights who sat around King Arthur's Round Table, seeing the Holy Grail was the highest and most noble goal. They roamed the nation in search of it. Lancelot nearly achieved the quest, but the sin of his love for Guinevere, Arthur's queen, kept him from seeing the Grail. A knight named Perceval (or Parsifal) saw the Grail but did not understand what it was. Only Galahad, Lancelot's son, was pure enough to see it with full understanding of its meaning. He had to travel to a distant land called Sarras to do so, for the Grail had left Britain at some point. The vision of the Grail brought such profound ecstasy that Galahad died moments later.
chalice drinking vessel or goblet
cauldron large kettle
Development of the Legend. The Holy Grail legend fuses Christian elements with much older Celtic* mythology and appears to be the product of storytelling over hundreds of years. The Grail itself is related to various vessels in Celtic lore, such as the drinking horn of the god Bran, which produced any food or drink the user desired. It was also associated with a magic cauldron that could restore life to any dead body placed in it.
* See Names and Places at the end of this volume for further information.
The earliest known work to give a Christian significance to the magical vessel was Perceval, a romance of the late 1100s by the French poet Chrétien de Troyes. A few decades later, Robert de Borron wrote Joseph of Arimathea, which established the connection between the Grail of Perceval and the cup used by Christ and later owned by Joseph. Parzival, by Wolfram von Eschenbach, expanded on the mystical story of the innocent knight and the Fisher King and also introduced an order of knights charged with guarding the Grail. This version of the story became the basis for the opera Parsifal by the modern German composer Richard Wagner.
romance in medieval literature, a tale based on legend, love, and adventure, often set in a distant place or time
Over time, versions of the Grail story began to link the Holy Grail with the popular legend of King Arthur. One account made Sir Galahad the virtuous hero and the Grail a symbol of a rare and mystical union with the divine. Late in the l400s, Sir Thomas Malory wrote Morte D'Arthur (The Death of Arthur), the version of the Arthurian legend that was to become the best known. With it he established the story of the Grail quest by the knights of Arthur's Round Table and of Galahad's ultimate success.
|
<urn:uuid:ba8724dc-af9c-4113-b397-7b887e79a1ed>
|
CC-MAIN-2014-41
|
http://www.mythencyclopedia.com/Ho-Iv/Holy-Grail.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657124236.90/warc/CC-MAIN-20140914011204-00185-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.969017
| 900
| 3.015625
| 3
|
With metro area white males in their teens and 20s leading the way, Minnesota saw a 13 percent increase in its number of reported HIV/AIDS infections in 2009, compared to the year before.
The 368 cases represent the highest number of infections since 1992, according to Minnesota Department of Health's Peter Carr.
MDH says 9,176 HIV/AIDS cases have been reported since the department began tracking AIDS in 1982 and HIV in 1985. The state averaged a little over 300 cases per year for nearly a decade.
From the study:
- There were 95 HIV cases reported among 15- to 24-year-olds in 2009, compared to 59 cases in the same age group in 2008. Of the 95 cases in 2009, 77 of them, or 81 percent, were males.
- Among males, male-to-male sex was the main risk factor for 88 percent.
- Of young male cases, 45 percent were white, 39 percent were African-American, 11 percent were Latino, 3 percent were Asian, 1 percent were African-born, and 1 percent were multiracial.
- The number of new cases in women dropped to 73. Of those woman, women of color were overrepresented, accounting for 74 percent of new female cases.
- New HIV cases were concentrated within the Twin Cities metropolitan area. Minneapolis experienced a decrease in reported cases. St. Paul, Ramsey, Anoka and Dakota counties all experienced increases.
In releasing the data, the department recognized that decades-old efforts to warn people about HIV/AIDS -- for which, at the risk of sounding like a broken record, there is no known cure -- are falling short.
"Some may mistakenly feel the threat of dying from HIV/AIDS is over," Carr said.
|
<urn:uuid:518918c9-f003-4e21-b760-2125168f5c23>
|
CC-MAIN-2020-40
|
http://www.citypages.com/news/minnesota-hiv-aids-rates-leap-infection-rate-highest-since-1992-6536561
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400208095.31/warc/CC-MAIN-20200922224013-20200923014013-00312.warc.gz
|
en
| 0.973463
| 358
| 2.578125
| 3
|
Migraine is an intense and often, throbbing pain and it is usually confined to one side of the head. Migraines can begin in childhood or may not occur until early adulthood. The most common types of Migraine are classical migraines and common migraines. Some of the common signs and symptoms of migraine include depression, irritability, hyperactivity, neck stiffness and low energy, among others. Migraine usually lasts from four to 72 hours but sometimes Migraine headaches can be long-lasting i.e. occurring anywhere from 3 to 15 days or more in a month. Although there is no definitive cause for Migraines, there are certain factors that trigger Migraine such as bright lights, severe heat, hormonal changes, drinking alcohol, loss of sleep and many more. Migraine Treatment involves medication to either prevent the migraine from occurring or treating it once it occurs. A General Physician prescribes medication depending upon the severity of the Migraine headaches and other health conditions. Often, people engage in preventive techniques such as avoiding their known headache triggers. Although Migraine has no cure but besides medication, certain Migraine Remedies that can help alleviate Migraine pain. Some of these remedies include Apple Cider Vinegar, Ice Pack, Peppermint, Cayenne Pepper, and Chamomile, among others.
Consult top doctors for Migraine Treatment online with ease at Lybrate.com. You can call doctor online and view their reviews. Book appointments online as well. Lybrate is best source of top doctors in Anand, Bakrol, Bakrol Road, Chikhodra, Jitodia, Karamsad and in any other locality in Anand for Migraine Treatment.
|
<urn:uuid:742efe75-9529-4f7d-a154-711dbb820d26>
|
CC-MAIN-2018-17
|
https://www.lybrate.com/anand/doctors-for-migraine-treatment?lpt=PS-PPV
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945459.17/warc/CC-MAIN-20180421223015-20180422003015-00567.warc.gz
|
en
| 0.926638
| 347
| 2.53125
| 3
|
For a child to grow properly, it takes both physical and emotional development. While many parents are concerned with the physical development of their children, they should also pay a great deal of attention to the emotional development as well, because it is highly important. In middle childhood, the emotional development of your children will basically influence the way in which they will think, feel and act later in their life. Middle childhood is considered to be the period of seven to eight year old, and it represents a critic emotional development stage.
This is because children will start school, so they will come in contact with new classmates and teachers as well. As a result, they have more responsibilities, and the way in which they think is starting to change. It is thus very important to properly understand this stage of the emotional development of your child. Do not be surprised if your children will pay more attention to the opinions of their classmates and if they will start to feel the competition’s pressure. You could actually help your children a lot regarding their emotional development, because during this stage, they will need an adult who will support them and plan all kind of activities with them. For example, in this emotional development stage, you could have fun by playing exciting, but challenging games. You could also take some time to talk with each other, to watch TV, or to do any other bonding activities.
Remember though that in middle childhood, children would also want to feel like they are given more credit, and that they are a little bit more independent. Supporting your children, providing them with guidance, rules and limits, is also crucial in this emotional development stage, because they also need to be controlled. In middle childhood, the key to a proper emotional development is finding a balance between the love, attention and support that children need, the encouragement, and the required boundaries as well. Remember though that there is a thin line between boundaries and criticism, so make sure that you do not cross it if you want your children to have the best emotional development in middle childhood.
|
<urn:uuid:2f244033-3ba5-4dcd-aff0-384d3e8de934>
|
CC-MAIN-2018-05
|
http://www.emotionaldevelopment.org/emotional-development-in-middle-childhood.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886979.9/warc/CC-MAIN-20180117212700-20180117232700-00294.warc.gz
|
en
| 0.979769
| 411
| 3.515625
| 4
|
It is an old wives tale that you cannot get pregnant so long as you are breastfeeding, or is there some factual and scientific basis for this claim?
Well, breast feeding is somewhat effective as a form of birth control and the lactational amenorrhea method or LAM (relying on the absence of periods while you are breastfeeding as a form of contraception) has been seen to be up to 98% effective but only if certain criteria are met with:
- If a woman has not started menstruation after child birth, that would indicate an absence of ovulation, and therefore there is less of a chance of getting pregnant at this time. However, this is not a foolproof method and experts warn that there is still a 10% chance of getting pregnant if one is relying only on this indicator or fertility. Other indicators such as mucous production and basal temperature also have to be monitored for an accurate reading of ovulation.
- The mother should be breastfeeding on demand, night and day, without using bottle supplements. This would mean between 6 and 10 feeds a day.
- The baby should be less than 6 months of age. After this time, babies are usually started off on solids and their dependence on mother’s milk is not as high. The number of feeds per day may also go down by this time if you have started to supplement with a bottle.
|
<urn:uuid:63a0d356-5b48-4336-a6e3-6a9a06c696d3>
|
CC-MAIN-2021-17
|
https://www.thepregnancyzone.com/pregnancy-issues/pregnancy-prevention/is-breastfeeding-an-effective-form-of-birth-control/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039604430.92/warc/CC-MAIN-20210422191215-20210422221215-00209.warc.gz
|
en
| 0.969221
| 279
| 2.953125
| 3
|
For busy archaeologists struggling with processing of large find assemblages, the Laser Aided Profiler (LAP) device employs the latest technology for high-quality, rapid, digital documentation of ceramic fragments. The LAP alleviates the tedious drawing task, allowing you to fully concentrate on your research. Resulting data are stored in an easily accessible database, so you can feed them into data-analytic pipelines and take your research to the next level.
Drawing of a ceramic fragment created using the LAP.
You can use the LAP in the lab as well as in the field. The device is built on industrial-grade components that can withstand dusty environments and temperatures of over 40 degrees Celsius. It is easily portable, with assembly and disassembly taking just a few minutes.
For extreme robustness in long-term usage, there are no moving parts and the data acquisition is purely optical. Thanks to advanced synchronization technology, the image capturing is reliable even in places with strong ambient sunlight. Still, the lasers are kept eye-safe for the operator.
The LAP comes packed in a handy suitcase. Measuring 46 x 34 x 15 cm (18 x 13 x 6 inches) and weighing under 7 kg (15 lb.), its size and weight fall within standard airplane cabin baggage limits, so you can keep the LAP safely with you while travelling.
Two lasers (a, e) project laser lines onto the specimen from both sides. The cameras (d, f) capture the projected lines to produce a 3D section of the fragment. The high-resolution color camera (b) together with LED illumination (c) complete the final drawing with a 2D photograph.
The bundled software application streamlines the drawing process for you to work at maximum efficiency while achieving high-quality outputs. Depending on the sample complexity, a skilled operator can produce up to 400 drawings per day. The digital data, metadata and complete drawings are saved into an open-source database for later querying or processing.
All drawings are in scale and immediately ready to be published. The acquired data are readily available for subsequent processing, e.g. shape-matching or morphometric analysis.
Catalogue page with LAP drawings. (Source: Roosevelt et al., 2018: Exploring Space, Economy, and Interregional Interaction at a Second-Millennium B.C.E. Citadel in Central Western Anatolia: 2014–2017 Research at Kaymakçı. DOI:10.3764/aja.122.4.0645)
Finding similar ceramic shapes by shape-matching of the profiles (results of Principal Component Analysis and Hierarchical Clustering).
The LAP is currently used at the following institutions:
The LAP idea was conceived over a cup of tea between two friends with different professional backgrounds. Peter is an archaeologist specializing in computational modelling of past human activities relying on large digital datasets. Vladimír is an engineer skilled in optical measurement and inspection systems for manufacturing industries. Together we seek to bring high tech into archaeology.
The price of one LAP unit including the control software is € 4950 (shipping cost, duty or tax not included). We ship worldwide.
The lead time is 6 weeks from the purchase order. The standard warranty is 24 months. We also provide a money-back guarantee if you return the device within 30 days.
For quotations and further inquiries, please contact us at:
|
<urn:uuid:f8c9abae-868d-4e19-874c-8961516f164a>
|
CC-MAIN-2020-40
|
https://laseraidedprofiler.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400202686.56/warc/CC-MAIN-20200922000730-20200922030730-00179.warc.gz
|
en
| 0.907388
| 705
| 2.984375
| 3
|
Those ears of sweet, crisp corn that are such a familiar part of summertime picnics haven't always looked or tasted that way. Rather, this staple veggieand its geneshave been tweaked over time by thousands of generations of humans hoping to harvest a better crop.
Now, an Agricultural Research Service geneticist and his colleagues from across the country have discovered what impact all those years of preferential planting have had on corn's genetic makeup.
In this week's issue of the journal Science, the scientists report their discoveries on which genes play a role in making corn the important food and animal feed source we know today. Michael McMullen, a geneticist in ARS' Plant Genetics Research Unit at Columbia, Mo., worked with lead author Brandon Gaut of the University of California, Irvine, and scientists from the University of Missouri and the University of Wisconsin.
It's generally believed that corn was domesticated from its wild relative, teosinte, some 6,000 to 9,000 years ago in Mexico. A wild grass, teosinte doesn't look much like corn; it even lacks the "ears" that make corn plants so recognizable.
The researchers discovered that humans, starting with ancient Americans to present-day growers, have impacted about 2 to 4 percent of corn's genes in their quest for a better-tasting and more cultivatable corn crop. The scientists believe the affected genes are most likely linked to qualities like growth and yield.
Their work has many implications, including establishing an approach for studying the genetics of domestication of other crops and animals.
The research also indicates that while a large amount of genetic diversity still remains for the vast majority of corn's genesenabling future corn improvement by plant breedersknowing the 2 to 4 percent currently lacking genetic variation will help plant geneticists use wild and exotic corn varieties to continually improve this important crop.
ARS is the chief scientific research agency of the U.S. Department of Agriculture.
|
<urn:uuid:f797f5ce-6b0a-4c78-81b5-4d05efa22742>
|
CC-MAIN-2015-11
|
http://ars.usda.gov/is/pr/2005/050526.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463658.66/warc/CC-MAIN-20150226074103-00068-ip-10-28-5-156.ec2.internal.warc.gz
|
en
| 0.948046
| 401
| 4.03125
| 4
|
Pakistan had a turbulent year in 2012, with the judicial ouster of Prime Minister Yusuf Raza Gilani, attacks on civilians by militant groups, growing electricity shortages, rising food and fuel prices, and continuing political dominance of the military, which operates with almost complete impunity. Religious minorities continued to face insecurity and persecution as the government failed to provide protection to those threatened or to hold extremists accountable. Islamist militant groups continued to target and kill Shia Muslims—particularly from the Hazara community—with impunity. In September, the southwestern province of Balochistan experienced massive flooding for the third year running, displacing some 700,000 people.
Ongoing rights concerns included the breakdown of law enforcement in the face of terror attacks, continuing abuses across Balochistan, ongoing torture and ill-treatment of criminal suspects, and unresolved enforced disappearances of terrorism suspects and opponents of the military. Abuses by Pakistani police, including extrajudicial killings, also continued to be reported throughout the country in 2012.
Relations between Pakistan and the United States —Pakistan’s most significant ally and its largest donor of development and military aid—remained tense for much of the year due to the “Salala Attack” in November 2011, in which US forces killed 24 Pakistani soldiers during a military operation near the Afghan border.
In 2012, at least 325 members of the Shia Muslim population were killed in targeted attacks that took place across Pakistan. In Balochistan province, over 100 were killed, most of them from the Hazara community. On August 16, gunmen ambushed four buses passing through the Babusar Top area of Mansehra district in Khyber Pakhtunkhwa province. The attackers forced all the passengers to disembark, checked their national identity cards, and summarily executed 22 travelers whom they identified as belonging to the Shia community. A spokesman for the Tehrik-e-Taliban Pakistan, the Pakistani Taliban, claimed responsibility. On August 30, gunmen shot dead Zulfiqar Naqvi, a Shia judge, in Quetta, Balochistan’s capital. In two separate attacks on September 1, 2012, gunmen attacked and killed eight Hazara Shia in Quetta.
Sunni militant groups, including those with known links to the Pakistani military, its intelligence agencies, and affiliated paramilitaries—such as the ostensibly banned Lashkar-e Jhangvi—operated with widespread impunity across Pakistan, as law enforcement officials effectively turned a blind eye to attacks.
Students and teachers were regularly attacked by militant groups. On October 9, 2012, gunmen shot Malala Yousafzai, a 15-year-old student and outspoken advocate for children’s right to education, in the head and neck leaving her in critical condition. The Tehreek-e-Taliban Pakistan claimed responsibility for the attack in the Swat Valley. The attack on Yousafzai garnered condemnation from across the political spectrum in Pakistan. Militant Islamist groups also attacked more than 100 schools, and rebuilding is slow.
Religious Minorities and Women
Abuses under the country’s abusive blasphemy law continued as dozens were charged in 2012 and at least 16 people remained on death row for blasphemy, while another 20 servedlife sentences. Aasia Bibi, a Christian from Punjab province, who in 2010 became the first woman in the country's history to be sentenced to death for blasphemy, continued to languish in prison. In July 2012, police arrested a man who appeared to suffer from a mental disability for allegedly burningthe Quran. A mob organized by local clerics demandedthat the man be handed to them, attackedthe police station, pulled the victim out, and burned him alive.
On August 17, Islamabad police took into custody Rimsha Masih, a 14-year-old Christian girl from a poor Islamabad suburb with a “significantly lower mental age,” who was accused of burning pages filled with Quranic passages. Police had to beat back a mob demanding that it be handed the girl so that it could kill her. Threats against the local Christian community forced some 400 families to flee their homes. But Islamist groups who support the blasphemy lawtook a significantly different position,demanding a full investigation. The accuser, local cleric Khalid Chishti, was himself arrested for fabricating evidence in order to rid the neighbourhood of Christians. On September 23, police officials stated they hadfound no evidence against Rimsha Masih,who wasreleased and given state protection at an undisclosed location.
Members of the Ahmadi religious community continued to be a major target for blasphemy prosecutions and subjected to specific anti-Ahmadi laws across Pakistan. They faced increasing social discrimination as militant groups used provisions of the law to prevent Ahmadis from “posing as Muslims,” forced the demolition of Ahmadi mosques in Lahore, barred Ahmadis from using their mosques in Rawalpindi, and vandalized Ahmadi graves across Punjab province. In most instances, Punjab provincial officials supported militants’ demands instead of protecting Ahmadis and their mosques and graveyards.
Violence against women and girls—including rape, “honor” killings, acid attacks, domestic violence, and forced marriage—remained a serious problem. Intimidation and threats against women and girls out in public increased in major cities in 2012.
Freedom of Expression
At least eight journalists were killed in Pakistan during the year, including four in May alone. On May 9 and 10 respectively, Tariq Kamal and Aurangzeb Tunio were killed. On May 18, the bullet-riddled body of Express News correspondent Razzaq Gul was found dumped in a deserted area near Turbat in Balochistan province. Security agencies are suspected of involvement in his killing. On May 28, Abdul Qadir Hajizai was shot dead in Balochistan by armed men on a motorbike. The Baloch Liberation Front reportedly claimed responsibility for his killing. No one was held accountable in any of these cases.
A climate of fear impeded media coverage of the state security forces and militant groups. Journalists rarely reported on human rights abuses by the military in counterterrorism operations, and the Taliban and other armed groups regularly threatened media outlets over their coverage.
In June, gunmen shot at the building of Aaj TV, a private Urdu-languagenews channel,wounding two guards. The Pakistani Taliban claimed responsibility and threatened such attacks would continue if media outlets did not reflect the Taliban’s priorities and positions in coverage. However, as has been the case since the return to civilian rule in 2008, journalists vocally critical of the government experienced less interference from elected officials than in previous years.
Judicial Activism and Independence
Pakistan’s judiciary continued to assert its independence from the government in 2012. In December 2011, the judiciary began controversial hearings into the so-called “Memogate” scandal investigating Husain Haqqani, Pakistan’s former ambassador to the US on charges that he attempted to conspire against Pakistan’s military in collusion with the US. The court notably failed to investigate allegations from the same source that the head of the country’s dreaded Inter-Services Intelligence (ISI) had conspired to oust the elected government.
In June, the Supreme Court controversially fired Prime Minister Yusuf Raza Gilani for refusing to sign a letter to Switzerland asking for an investigation into corruption allegations against President Asif Zardari.
Despite the adoption of a National Judicial Policy in 2009, access to justice remained abysmal and courts remained rife with corruption and incompetence. Case backlogs remain huge at all levels. The judiciary’s use of suo motu proceedings—acting on its own motions—was considered so excessive that the International Commission of Jurists raised concerns about it.
While the Supreme Court was active in raising the issue of government abuses in Balochistan, no high-level military officials were held accountable for them. As has been the case since Pakistan’s independent judiciary was restored to office in 2009, Chief Justice Iftikhar Chaudhry and the provincial high courts muzzled media criticism of the judiciary in 2012 through threats of contempt of court proceedings. In October, both the Lahore and Islamabad high courts effectively barred media from criticizing the judiciary or giving airtime to critics in the aftermath of a multi-million dollar corruption scandal involving Arsalan Iftikhar, the son of the Supreme Court chief justice.
The human rights crisis continued to worsen in the mineral-rich province of Balochistan. Human Rights Watch recorded continued enforced disappearances and killings of suspected Baloch militants and opposition activists by the military, intelligence agencies, and the paramilitary Frontier Corps. Baloch nationalists and other militant groups also stepped up attacks on non-Baloch civilians. Pakistan's military continued to publicly resist government reconciliation efforts and attempts to locate ethnic Baloch who had been subject to “disappearances.” Pakistan’s government appeared powerless to rein in the military’s abuses. As a result, large numbers of Hazara community members sought asylum abroad.
Militant Attacks and Counterterrorism
Suicide bombings, armed attacks, and killings by the Taliban, al Qaeda, and their affiliates continued in 2012, targeting politicians, journalists, religious minorities, and government security personnel. Many of these attacks were claimed by groups such as the Haqqani network, the Lashkar-e-Jhangvi, and other al Qaeda affiliates.
Security forces routinely violated basic rights in the course of counterterrorism operations. Suspects were frequently detained without charge or were convicted without a fair trial. Thousands of suspected members of al Qaeda, the Taliban, and other armed groups—who were rounded up in a nationwide crackdown that began in 2009 in Swat and the Federally Administered Tribal Areas—remained in illegal military detention; few were prosecuted or produced before the courts. The army continued to deny lawyers, relatives, independent monitors, and humanitarian agency staff access to persons detained during military operations. Terrorism suspects, particularly in the Swat Valley, reportedly died inexplicably of “natural causes.” However, lack of access to the detainees made independent verification of the cause of death impossible.
Aerial drone strikes by the US on suspected members of al Qaeda and the Taliban in northern Pakistan continued in 2012, with some 44 strikes taking place through early November. As in previous years, these strikes were often accompanied by claims from Pakistanis of large numbers of civilian casualties, although lack of access to the conflict areas largely prevented independent verification.
Human Rights Defenders
Community-based human rights activists faced increased threats. In June, Asma Jahangir, the country’s most prominent human rights defender, alleged that she had discovered that an assassination attempt was being planned against her from “the highest levels of the security establishment.” In the preceding months, Jahangir had been at odds with the Pakistani military in a series of high-profile standoffs, including over the military’s policies in Balochistan and elsewhere.
Key International Actors
The US remained the largest donor of development and military aid to Pakistan, but relations remained abysmal through much of 2012. The US rejected apologizing for the “Salala Attack,” prompting Pakistan to ban the movement of NATO supplies to Afghanistan through Pakistan. The routes were only reopened in July after the US offered a formulation of regret that Pakistan found acceptable. Major areas of bilateral tension remained, particularly Pakistan’s alleged persistent support for the Haqqani network, a militant group that US officials accused of targeting US troops in Afghanistan. In September, the US declared the Haqqani network a terrorist body.
Pakistan and China continued to deepen extensive economic and political ties. Historically tense relations between Pakistan and nuclear rival India showed marked improvement in 2012. In September, the two countries signed landmark trade and travel agreements.
The United Nations Working Group on Enforced or Involuntary Disappearances (WGEID) visited Pakistan in September and reported in preliminary findings that there is “acknowledgment that enforced disappearances have occurredand still occur in the country.”
|
<urn:uuid:57a07e5e-95da-405b-9e6a-f0e01895043d>
|
CC-MAIN-2021-17
|
https://www.hrw.org/world-report/2013/country-chapters/pakistan
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077818.23/warc/CC-MAIN-20210414125133-20210414155133-00589.warc.gz
|
en
| 0.964764
| 2,485
| 2.609375
| 3
|
Domestic violence is often associated with physical abuse. However, many other forms of domestic abuse may be used against survivors, including but not limited to financial, spiritual, and mental abuse. Any type of domestic violence can be dangerous and may have various long-term impacts.
What Is Domestic Violence?
Domestic violence is any behavior an intimate partner or family member uses to control or intimidate another person. Survivors of domestic violence can be of any gender or sexuality. No matter the type of relationship, if one partner is being treated abusively by the other, domestic violence may be occurring.
If you are experiencing domestic violence, receiving support as soon as possible can be essential. Many types of domestic violence exist, each with unique mental and physical health risks.
Types Of Domestic Violence
You're not alone if you are a survivor of one or several types of domestic violence. Below are the most common types of domestic violence and how they can appear. However, note that abuse can take multiple forms and involve multiple tactics.
Physical abuse is often discussed in conversations about domestic violence because it involves visible behaviors and often leaves marks. It may also have the highest risk of death. Physical abuse may involve kicking, choking, slapping, stabbing, shooting, biting, or physically restraining someone. It can cause a minor or major injury or no injury at all. Forcing someone to use substances can also be a form of physical abuse.
If you are struggling with substance use, contact the SAMHSA National Helpline at (800) 662-4357 to receive support and resources.
Emotional abuse can involve abuse that aims to control how another person feels about themselves. It may take the form of constant insults, humiliation, and criticism. This type of abuse can be as dangerous as physical abuse. By changing how the survivor feels about themselves, the abuser may maintain a strong hold over them and exact other forms of domestic violence. Emotional abuse is common among other types of abuse but can also happen on its own.
In a relationship, you are not required to have sex. Not all sexual activities that occur within a relationship or marriage are automatically considered consensual. For consent to occur, one must have complete control and authority over their body and enthusiastically and verbally agree to sexual activities. Consent can also be withdrawn at any time during a sexual interaction.
Sexual assault, rape, harassment, or demeaning behaviors can all be considered sexual abuse. Forcing you not to use contraception or to get or not get an abortion can also be a form of sexual violence.
If you are experiencing sexual abuse or have experienced assault, note that the Rape, Abuse, and Incest National Network (RAINN) has a hotline dedicated to supporting individuals experiencing sexual assault, harassment, or intimate partner violence. You can contact them anytime by calling 800-656-HOPE (4673) or using the online chat.
An individual who keeps their partner or dependent from getting a job, getting an education, or having finances is committing financial abuse. Financial abuse can also involve controlling someone else's money, giving an adult an "allowance" instead of letting them have their money or attempting to keep someone from leaving by taking away their financial resources. Financial abuse may be used alongside other types to control the survivor further.
Any behavior that intimidates or threatens a partner is considered psychological abuse. Psychological abuse could include preventing someone from talking to friends or relatives, threatening violence or harm, or keeping the survivors in the home. The individual acting abusively may threaten specific harm or behavior if the survivor does not meet their desires.
The Effects Of Domestic Violence
Domestic violence can have many effects on the survivor. Physical injuries can occur if physical abuse is present, including but not limited to bruises, scratches, cuts, broken bones, or damage to internal organs. Domestic abuse also poses a serious threat to one's life. Although anyone of any gender can die from domestic violence, over 4,000 women die from this cause each year, often due to a lack of protection or being invalidated after leaving an abusive individual.
Emotional and psychological damage may occur, whether abuse is primarily emotional or physical. Being physically or sexually abused can cause damage to the mental state of survivors. The survivor may believe they deserve the abuse because of what their abuser tells them, which may lead to a lowered self-image, anxiety, depression, and other mental health conditions.
The results of domestic violence can last past the relationship, as well. What an abusive person says may stay with you for years or a lifetime. The memory of the situation you were in and the words that were said may continue to replay in your mind. For those who enter a healthy relationship after living through abuse, it may be challenging to trust that the relationship is safe. For this reason, receiving mental health support can be essential for survivors.
How To Find Legal Assistance For Domestic Violence
If you are a survivor of domestic violence, you may have legal rights in your case. A lawyer can explain how the law works and how to ensure your safety.
Calling the Domestic Violence Hotline can also be vital if you are in a dangerous situation with a partner or another individual in a domestic setting. The advocates on the phone or chat can give you the details of resources in your area. Some cities have shelters for women and children living in abusive situations who want to leave without their abusers knowing where they are.
Mental Health Support For Survivors
Finding a trauma-informed therapist may be crucial to your treatment and recovery as a survivor. It may take some research to find someone that you feel comfortable with. However, if you're interested in finding quick support without a wait list, you can also try online therapy through a platform like BetterHelp.
Online sessions can be conducted wherever you are most comfortable with an internet connection and a smart device. It can be difficult to open up to a professional when you've been through abuse. However, it may seem safer if you can attend therapy from home, curled up on the couch or with your pet. Online therapy offers flexibility if you move, go on vacation, or aren't at home for a while.
In addition, online cognitive-behavioral therapy (CBT) can be as effective as in-person CBT in supporting survivors of abuse or those living with post-traumatic stress disorder (PTSD). One study found that people living with PTSD had a 55% reduction in trauma symptoms after using online CBT and EMDR programs.
- Previous Article
- Next Article
|
<urn:uuid:9778d268-501e-41a8-bd6b-a4f92adbfdc0>
|
CC-MAIN-2023-40
|
https://www.betterhelp.com/advice/domestic-violence/what-different-types-of-domestic-violence-are-there/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00284.warc.gz
|
en
| 0.954301
| 1,349
| 3.421875
| 3
|
The construction of underground passageways, tunnels, chambers, and shafts are important yet a highly dangerous activity. This type of work involves working in reduced light conditions with limited exits and access points, as well as exposure to asphyxiation, fire, and explosive hazards. Standard 1926.800 from the Occupational Safety and Health Administration (OSHA) regulates underground construction. It has been revised many times to reflect changes in construction and to more adequately protect workers.
People may lose their lives or suffer serious, long-term injuries as a result of construction activities related to tunneling. If you were affected by such an accident in any of the five boroughs, please contact Friedman & Simon, L.L.P. at (516) 932-0400 for a free case evaluation. Our injury lawyer for tunnel construction accidents will help you determine whether you have grounds for a case, the value of your claim, and the next steps you should take.
In This Article
- Tunnel Construction
- Injuries and Accidents
- Why File a Claim
Tunnel construction is covered by OSHA’s underground construction regulations. New York Consolidated Laws-Labor Article 7 also applies to relevant workers, as does New York Building Construction, Demolition and Repair Work § 240.
Hazards faced by those working in tunnels include:
- Reduced natural ventilation
- Reduced natural light
- Difficult and limited entry and egress from the tunnel
- Exposure to air contaminants, such as hydrogen sulfide, carbon monoxide, or nitrogen dioxide
- The threat of fires, floods, or explosions
- Earth or rockslides
- Equipment failures
States administer their own workplace health and safety programs but must enforce standards that meet or exceed federal requirements. Some of the requirements of such programs include:
- Having safe entryways and exits
- Providing employee training based on needs and requirements
- Implementing effective check-in and check-out procedures
- Having emergency protocols and dangerous situation response plans in place
When it comes to tunneling, construction rules dictate that a supervisor is required on-site at all times. These individuals must be able to identify existing or predictable hazards pertaining to:
- Air monitoring and ventilation
- Identifying the presence of contaminants
- Managing illumination and communications
- Handling flood control
- Personal protective equipment rules
- Executing emergency procedures, such as emergency evacuations
- Implementing check-in and check-out procedures
- Managing the use of explosives
- Ensuring fire prevention and protection protocols are met and followed
- Supervising the use of mechanical equipment
The rules outlining these safety-directed responsibilities are very comprehensive, and they govern how to manage everything from the movement of people and materials to the handling of spills, power sources, machine repairs, and the implementation of safety standards and procedures.
Through the supervisors, employers are required to manage all of these different factors and maintain open communication with others at the worksite to make sure that any events or situations that impact worker safety are immediately and effectively addressed as needed.
The employer must also maintain worker headcounts, prevent unauthorized access to their worksite, and ensure safety protocols for dangerous work, such as work with loose gravel, holes, heavy machinery, or with explosives is conducted per mandated safety standards. A failure to do so may lead to deadly consequences—as well as a liability on the part of the employer or specific members of their team.
For a free legal consultation with a tunnel construction accidents lawyer serving New York, call 516-932-0400
Injuries and Accidents
Tunnel construction accidents cause:
- Head injuries
- Internal organ damage
- Spinal cord injuries
- Broken bones
- Fractures and sprains
- Nerve, muscle, and connective tissue damage
- Respiratory injuries
- Toxic chemical injuries
- Burns, cuts, or lacerations
- Crushed bones or amputations
- Blindness, face injuries, or disfigurement
- Wrongful death
These accidents happen in many ways. The misuse of power tools or toxic chemicals cause burns or puncture wounds. Machines or materials that are not properly secured, hoisted, or transported have been known to crush a worker. Improperly secured power lines cause electrocutions. Cave-ins and toxic gas build-ups cause worker deaths as well. Finally, equipment malfunctions and the absence of protective gear or required safety equipment also cause injuries or fatalities.
Depending on how an accident occurs and the factors or events that caused it, an injured worker will be able to sue a product manufacturer, a service team, or a third party for injuries and losses from a tunnel construction accident.
Our injury lawyer for tunnel construction accidents is here to help. We will meet with you anywhere on Long Island or in the New York metropolitan area. If you were involved in a tunneling accident, please contact Friedman & Simon, L.L.P. at (516) 932-0400 to learn more about evidence collection and how to identify the at-fault party responsible for your accident.
New York Tunnel Construction Accident Lawyer Near Me 516-932-0400
Why File a Claim
According to Industrial Health, the absence of formal rules that ensure that clients and construction companies both share responsibility for implementing health and safety standards lead to higher accident rates and more injury-related deaths and losses. As mentioned earlier, OSHA and state/federal rules govern various types of construction activities—including tunnel construction—and employers, clients, and vendors are expected to follow mandated safety protocols.
If you suffered an accident, sustained injuries, or were forced to endure other losses because of the oversights, negligence, or incompetence of another party, you may face substantial medical bills, an inability to work, potential injuries as serious as a permanent loss of a body part, or even worse, a loved one.
It is in cases such as these that you will file a personal injury claim against the at-fault party and parties that are legally responsible for your injuries. Friedman & Simon, L.L.P.’s injury lawyer for tunnel construction accidents is available to help. If you decide to work with us, we will:
- Keep you updated on your case
- Identify liable parties
- Communicate with all parties for you
- Gather evidence
- Determine a value for your case
Please contact us today at (516) 932-0400. Statutes of limitations apply to all civil cases generally end to personal injury claims in particular. To effectively make a claim for an injury resulting from tunnel construction, a lawyer must gather evidence, establish a connection between your injuries and the actions of another party, and deal with insurance adjusters and other administrative and legal bodies. We have the experience and dedication to take these steps for you. One of our goals is to relieve you of the stress of claim details and deadlines so you can focus on medical treatment, healing, and rebuilding your life. Contact us today for a case evaluation. Our staff can assist you in Spanish, Greek, Bengali, Tamil, and Kannada. If your case warrants a claim, we will help you determine a course of action based on the specifics of your case.
|
<urn:uuid:df91d9bf-8788-4000-b029-ea242a7fe138>
|
CC-MAIN-2022-40
|
https://www.friedmansimon.com/areas-we-serve/new-york-ny/construction-accident-lawyer/tunnel/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334596.27/warc/CC-MAIN-20220925193816-20220925223816-00222.warc.gz
|
en
| 0.935584
| 1,506
| 2.71875
| 3
|
Earthquake Safety Tips
As residents of Southern California, we are all reminded that we live on an active fault line when we occasionally experience trembles. While many times no fatalities or major building collapses occur, we wanted you to be aware of steps you can take to protect yourself before, during, and after an earthquake.
How to Prepare for an Earthquake Now
- Create a family communication plan and select an out-of-state contact with whom you can all communicate. Be sure to let the person know!
- Identify a place in every room where you could go during an earthquake to avoid potential falling objects.
- Establish a meeting place outside of your home in case you get separated.
- Practice Drop, Cover, and Hold On drills (see below).
- Secure large items in your home such as dressers, televisions and items that hang on walls. Install reinforced latches on kitchen/dining room cabinets and strap your water heater to wall studs.
- Move large, breakable items to lower shelves.
- Pack an earthquake supply kit that includes canned and non-perishable food, can opener, water (3 gallons per person), dust mask, goggles, battery-operated radio, flashlights, extra batteries, charging supplies for cell phones and other devices, a current first aid kit, and a whistle. Store this in an accessible location known to all family members.
- If you do not already have one, purchase a fire extinguisher and familiarize yourself and family members with how to operate.
- Know how to turn off your gas and water main supplies and instruct all appropriate family members.
- Store 43362 (4FEMA) in your mobile phone so you can use it to find shelter if necessary (see below).
- Keep at least a half-tank of gas in your car (but do not drive during an active earthquake).
How to Survive During an Earthquake
- Drop, Cover, Hold On: According to FEMA, this is the recommended position to take should an earthquake strike.
- Drop to the ground.
- Cover your head and neck with one hand and get under a desk or table.
- Hold on to the desk or table leg so it stays over you.
- Do NOT stand in a doorway, which is a commonly held belief. Doorways in modern homes are not typically strong, and you risk being struck by falling or flying debris, which is the most common cause of earthquake injuries.
- Avoid windows and light fixtures and stay away from heavy furniture or bookcases that could fall on you.
- If you’re inside, resist the temptation to run outside as parts of building exteriors can become dislodged and strike you.
- If you’re driving, remain in your car, but move to a safe place away from trees, overpasses, and wires.
- Avoid elevators, and wait until shaking stops before taking the stairs to exit the building.
How to Remain Safe After an Earthquake
- There will likely be aftershocks, so be aware in the hours following a major earthquake.
- Make sure it is safe around you before moving or exiting the building.
- If you’re stuck, close your mouth to avoid inhaling fumes or debris; if you have access to your gas mask and goggles from your safety kit (see above), use them. Send a text, bang on a nearby object, or use your whistle to help rescuers locate you.
- Make only emergency phone calls. Since call volume typically exceeds carriers’ capacity, choose to text or instant message instead.
- Look for any small fires and extinguish them.
- If your home is no longer safe, go to a designated shelter. Text SHELTER + your zip code to 43362 (4FEMA) to find the nearest shelter.
- Once you’re safe, monitor news reports for alerts and emergency information and instructions.
- Inspect your utilities, checking for gas leaks and any damage to electrical, sewer or water lines.
- Clean up any flammable spilled liquids immediately, as well as bleach, medicine, etc. Be sure to leave the area if you smell gas or chemical fumes.
- Before doing any additional clean-up, put on long pants, long-sleeved shirt, sturdy shoes and work gloves to protect yourself against sharp objects.
- Be careful when opening cabinets as items could fall.
We value the safety of all of our ACS Security customers. Your safety is our top priority and we remain committed to sharing tips and information that will hopefully provide a measure of comfort and value.
|
<urn:uuid:aff52bc4-39b5-4177-a25f-c7f7dc8d0f3c>
|
CC-MAIN-2023-06
|
https://www.acssecurity.com/earthquake-safety-tips/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499842.81/warc/CC-MAIN-20230131023947-20230131053947-00378.warc.gz
|
en
| 0.912347
| 954
| 2.96875
| 3
|
Also called: Mender, Sail Maker, Sail Repair Person, Seamstress
What they do:Repair tears, holes, and other defects in fabrics, such as draperies, linens, parachutes, and tents.
On the job, you would:
- Measure and hem curtains, garments, and canvas coverings to size, using tape measures.
- Operate sewing machines to restitch defective seams, sew up holes, or replace components of fabric articles.
- Spread out articles or materials and examine them for holes, tears, worn areas, and other defects.
- customer service
Manufactured or Agricultural Goods
- manufacture and distribution of products
Arts and Humanities
- English language
Education and Training
- teaching and course design
- thinking about the pros and cons of different ways to solve a problem
- noticing a problem and figuring out the best way to solve it
Hand and Finger Use
- hold or move items with your hands
- keep your arm or hand steady
- use your arms and/or legs together while sitting, standing, or lying down
- quickly change the controls of a machine, car, truck or boat
People interested in this work like activities that include practical, hands-on problems and solutions.
They do well at jobs that need:
- Attention to Detail
You might use software like this on the job:
Electronic mail software
Operating system software
|
<urn:uuid:b13c38d7-64a3-4ac0-b854-fa92041e08c0>
|
CC-MAIN-2019-51
|
https://www.mynextmove.org/profile/summary/49-9093.00?print=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540542644.69/warc/CC-MAIN-20191212074623-20191212102623-00312.warc.gz
|
en
| 0.859427
| 296
| 3.234375
| 3
|
Any idea of an international order now seems like little more than a delusion
As people suffer around the world and no one steps in to help, what faith can we have on a global code of ethics and principles?
Earlier this week, the United States commemorated the 17th anniversary of the 9/11 attacks – atrocities that shook the world then, and continue to do so today. Following the attacks, the then US president George W Bush launched separate campaigns of military action against Afghanistan in 2001 and Iraq in 2003. Now it appears that the Russian and Syrian regime assault on Idlib is about to commence. These events are inextricably linked, but their connections are still not fully understood.
Iraq is often raised as an exemplar of the present state of the Arab world, and it is important that it is. It is impossible to uncouple the 2003 invasion of Iraq by Western forces from the region's present-day realities. It would be far too simplistic to lay so much chaos at the door of the Iraq war – after all, the Iraqi people are not without agency – but the line connecting former Baathists, Al Qaeda members, the invasion, its aftermath, and the rise of ISIS cannot be denied.
But when we consider Iraq, it is important to understand something else. While it is the place where the savagery of ISIS was birthed, it is also a place where the “international order” was once effectively exhibited. The concept of international order is rooted in a post-war idea of global morality and responsibility underpinned by the “liberal moment”, as described by political scientist Robert Latham in his 1997 book of the same name.
In August 1990, when Saddam Hussein invaded and occupied Kuwait, an international coalition was raised to push his forces back. It succeeded. Unfortunately, a similar depth of concern – even of the non-military kind – from the international community has not been exhibited towards present-day Syria. Compared to Iraq’s invasion of Kuwait, the destruction wrought upon Syria by various international actors is many times more severe. But little has been done to stop it – and little more will be done. The idea that any form of international order, underpinned by humanitarian and political principle, continues to exist is a complete myth. This has been made abundantly clear by the way that we are now discussing the fate of Idlib.
We are now no longer even pretending that international law and basic human rights have anything to do with the way the world works. The Trump administration has made itself plain: “Take Idlib if you want, Syrian regime and your allies in Russia and Iran – just don’t use chemical weapons.”
Read more from HA Hellyer:
But what would happen if they did use chemical weapons? Would there be any consequences at all? What if the Iraqi invasion of Kuwait had taken place in 2018 instead of 1990? Would a similar international coalition have been there to stop it? Today, it seems sounds fanciful even to consider the thought. Just ask the people of the Ukraine what happened when Russia came crashing through their borders.
The following question, then, must be raised – did this much-trumpeted international order ever exist in the first place? Perhaps the “liberal moment” was precisely that; a fleeting instant in history, rather than a concrete foundation upon which the world was to build a prosperous and politically stable future.
The evidence in favour is far from convincing. Ask the people of Syria and the Ukraine, but also ask the Uighurs of China and the Rohingya of Myanmar. For that matter, why not ask the people of Palestine too? How are we expected to have any faith in the idea of a fundamental set of global ethics when essential human rights can be abused with such disdain, when the sovereignty of nations can be so easily ignored, and the response of the international community is based solely on myopic, self-serving realpolitik?
The bleak irony is that this approach is not realpolitik at all. If it were, the consequences would have been far better thought out. After all, in the long term, turning a blind eye to brutality and suffering always backfires and disorder and chaos is in no one’s best interest. Indeed, it makes all of us far less safe and far more vulnerable.
Dr HA Hellyer is a senior non-resident fellow at the Atlantic Council in Washington, DC and the Royal United Services Institute in London
Updated: September 12, 2018 03:42 PM
|
<urn:uuid:22adee7a-5a02-4561-89d0-2043121a4adf>
|
CC-MAIN-2019-22
|
https://www.thenational.ae/opinion/comment/any-idea-of-an-international-order-now-seems-like-little-more-than-a-delusion-1.769604
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256426.13/warc/CC-MAIN-20190521142548-20190521164548-00504.warc.gz
|
en
| 0.962991
| 922
| 2.515625
| 3
|
Teach Your Monster to Read is a fun game designed to help students improve the speed and accuracy with which they recognize letters and sounds. Students play the game as a friendly monster avatar. The game series of levels (or islands as they’re called in the game) each containing activities for students to play to help their monster avatars learn to recognize letters and words. On each island students can earn prizes for their monsters and customize the look of their monsters.
The latest update to Teach Your Monster to Read offers new features to teachers. Teachers can now turn off the password requirement for students in their classes. This could be helpful if you just want to get students into the activities as quickly as possible. If you are using passwords you can now print passwords in capital or lowercase letters on password cards or in letters to parents. A new “letter to parents” template is available for teachers to download in their accounts. The letter can include log-in information for parents.
Applications for Education
Creating Teach Your Monster to Read accounts for all of your students is a simple process. Just register yourself as a teacher then enter your students’ names (first names only) or upload a CSV file of your students’ names. Teach Your Monster to Read will automatically generate a password for each student. As the teacher you can log-in anytime to see your students’ progress.
|
<urn:uuid:cdb4728f-31e1-421a-be62-1e78be122cbd>
|
CC-MAIN-2023-50
|
https://freetech4teach.teachermade.com/2015/02/new-features-for-teachers-added-to/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102612.80/warc/CC-MAIN-20231210155147-20231210185147-00094.warc.gz
|
en
| 0.952221
| 281
| 2.734375
| 3
|
Like Luke vs. Darth, offense vs. defense, and "Tastes Great" vs. "Less Filling," a balance sheet consists of two opposing forces: assets vs. liabilities. We'll tackle them one at a time.
Assets are sources of value that can benefit a company down the road. There are two major categories of assets: current and noncurrent. Current assets are relatively liquid, meaning they can easily be converted into cash. Current assets are expected to be converted into cash or used up within one year. Noncurrent assets, conversely, are not easily converted into cash. These can include property, equipment, goodwill, and deferred charges.
Assets that will be used up within the next year or easily converted into cash within one operating cycle are considered current. An operating cycle is the time it takes to sell a product or service and collect cash from that sale. It can last anywhere from 60 to 180 days or more.
Current assets can also be viewed as operating assets because they fund the day-to-day operation of its business. Running low on current assets will force a company to seek other sources of fuel for its operations, usually leading to debt interest or dilution of shareholder value. Current assets are listed on a balance sheet from top to bottom with the most liquid at the top.
Let's review the terms you'll see under Current Assets.
Cash and Equivalents consist of cold, hard cash or very liquid equivalents, such as money market funds or bearer bonds. This is cash or insta-cash that is at the company's disposal for operations, growth, dividends, and share repurchases.
Short-term Investments are just below cash and equivalents in liquidity. When a company has cash over and above that needed for operations, it can afford to sink some into short-term bonds that will earn interest. While not as readily available as cash and equivalents, short-term investments can be converted into cash without too much difficulty.
Accounts Receivable (A/R) is what is owed to a company by its customers. Products or services have been rendered on credit and the company is now siting next to its mailbox waiting for a check. Usually, A/R will be converted into cash in a relatively short time. However, if a customer cannot or will not pay and sending cousin Louie after 'em doesn't prove beneficial, the company will be forced to take a write-off for bad debt. The Allowance for Bad Debt you see next to A/R in parentheses is money set aside to cover potential delinquent customers.
Look at the rate of growth or decline in A/R and compare it to that of revenue. Although an asset, A/R is not something you want to see growing, much less outpacing revenues. A good portion of assets, such as A/R, are paradoxical in nature -- we'll get more into that another day.
Inventories are the goods a company has for sale and the materials used to produce those goods. It's idle money, like a caterpillar in a cocoon, waiting to blossom merrily into flight and provide cash. Sitting in that cocoon too long, however, is not only claustrophobic, it can be costly. Companies need to turn inventory into cash as quickly as possible to put that money back to work for them. Like A/R, inventories outpacing revenue growth is a sign of trouble ahead.
Non-Trade Receivables is money due from sources other than customer purchases. These can include tax refunds, interest income, or the sale of property or equipment.
Restricted Cash is money set aside for a specific purpose, generally spelled out in a contract. A company may not use restricted cash for business operations, therefore it is listed separately from Cash and Equivalents on a balance sheet.
Prepaid Assets, to finish off current assets, are assets for which the company has paid the bill in advance for products or services rendered. Although not a liquid asset, prepaid assets are a bonus because these bills will not have to be paid in the future, leaving greater future revenues at your disposal.
We'll close here for tonight. Next week, we'll look at the power of liquidity (and I don't mean Supersoakers) and finish up the asset side of things with noncurrent assets.
Drip on, Fools!
|
<urn:uuid:66227ab2-9cd5-4845-9a9b-ca652858c7e8>
|
CC-MAIN-2017-26
|
http://www.fool.com/dripport/2000/dripport000120.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320869.68/warc/CC-MAIN-20170626221252-20170627001252-00318.warc.gz
|
en
| 0.966332
| 897
| 3
| 3
|
Deuteronomy 6-Deuteronomy 8 occupy an important place within the book of Deuteronomy and in the Jewish and Christian tradition. This essay seeks to understand the context of these chapters. It first surveys its history of interpretation and offers an evaluation. The thesis and proposal of the article is that the Decalogue (Deuteronomy 5:6-21) and the covenant ratification ceremony at Sinai (Exodus 24) offer a plausible context.
Source: Journal of the Evangelical Theological Society, 2010. 27 pages.
|
<urn:uuid:006006d3-9861-4347-8a11-2cb45e71c366>
|
CC-MAIN-2023-40
|
https://www.christianstudylibrary.org/link/deuteronomy-6-8-and-history-interpretation-exposition-first-two-commandments
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00713.warc.gz
|
en
| 0.84474
| 107
| 2.890625
| 3
|
SECTION 1. SHORT TITLE
This Act may be cited as the “Paid Sick Days Act”.
SECTION 2: PREAMBLE
The legislature, in order to promote the health and welfare of families and the public health of the Commonwealth, and to advance healthier, more productive and more equitable workplaces throughout the Commonwealth, hereby provides all employees shall be entitled to earn up to a minimum of 7 paid sick days per year, or the appropriate percentage thereof, and directs all employers to allow employees to use up to 7 paid sick days per year who have earned such time as determined by this Act.
SECTION 3: FINDINGS
The Legislature of the Commonwealth of Massachusetts makes the following findings:
1) Preventive and routine medical care helps avoid illness and injury by detecting illnesses early and shortening the duration of illnesses. Providing employees time off to attend to their own health care needs ensures that they will be healthier and more efficient employees in the long run. Routine medical care results in savings by detecting and treating illness and injury early and decreasing the need for emergency care. These savings benefit public and private payers of health insurance, including private businesses.
2) Public health is jeopardized as many workers who do not have paid sick days have the most frequent contact with the public, such as workers in food services, nursing homes, child care centers, and retail clerks. The spread of contagious diseases such as the flu cannot be stopped without a universally adopted paid sick days policy.
3) Nearly every worker in the Commonwealth is likely to need, during any given year, time off to attend to their own illness or that of an immediate family member, or for routine medical care. Almost half of all private sector workers do not earn a single paid sick day per year. Low-income workers are significantly worse off. Over three quarters of the poorest families (76 percent) lack any regular paid sick leave.
4) Little more than 20% of workers who earn paid sick days can use it to care for children or elder adult family members who may be ill.
5) When parents are available to care for their children who become sick, the children’s recovery is faster, more serious illnesses are prevented, and the children’s overall mental and physical health is improved. Parents who cannot afford to miss work must send children with a contagious illness to childcare or school, contributing to the high rate of infections in child care centers and schools.
6) The majority of elder-care is performed by working family members. About one in every four employees has provided informal care to an elderly family member or friend in the past year.
7) Approximately 1.5 million women are assaulted, stalked or raped by an intimate partner each year; 31% of American women report being physically or sexually abused by a husband or boyfriend at some point in their lives; and, on average, more than 3 women are murdered every day by their husbands or boyfriends. 96% of employed victims of domestic violence experience some kind of work-related problem due to violence; victims may need to take time off from work to participate in criminal and civil legal proceedings and to address the effects of domestic violence such as relocating their family and obtaining medical care. Providing paid sick days would mean important job security for domestic violence victims, as between a quarter to a half of all victims of domestic violence lose their jobs.
8) Allowing employees to earn 7 paid sick days per year is affordable for employers and good for business. Requiring all employers to provide paid sick days levels the playing field for employers so all those who want to provide this benefit can, without fear of being at a competitive disadvantage. Employers who provide paid sick days see greater retention and avoid the problems of “presenteeism” or employees coming to work sick. Studies have shown that employers that offer paid sick days have higher productivity and morale, reduced absenteeism, and decreased turnover and training costs. Sick workers are less productive and spread their germs to about 20% of their co-workers. Paid sick days will save Massachusetts businesses about $63.2 million annually in wages paid to workers who are too sick to be productive, and $627.2 million in turnover costs.
SECTION 4: PURPOSE AND CONSTRUCTION
1) The purpose of this Act is to ensure that all workers in the Commonwealth of Massachusetts can address their own health needs and the health needs of their families by requiring employers to provide a minimum of 7 earned paid sick days per year; and
2) To alleviate undue burden on public and private health care systems by enabling workers to seek early and routine medical care for themselves and their family members.
3) This Act is a remedial act which shall be liberally construed to further its purpose and all presumptions shall be made in favor of providing workers with paid sick days leave.
SECTION 5: Chapter 149 of the General Laws, as appearing in the 2008 Official Edition, is hereby amended by inserting after section 148B the following section:-
(a) Definitions: As used in this section, the following terms shall have the following meanings:
“Child”, a biological, adopted, or foster child, stepchild, legal ward, or child of a parent standing in loco parentis who is under 18 years of age, or 18 years of age or older but incapable of earning wages because of a mental or physical incapacity.
“Employee”, any person who performs services for an employer for wage, remuneration, or other compensation.
“Employer”, any individual, corporation, partnership or other entity, including any agent thereof, who engages the services of an employee or employees for wages, remuneration or other compensation.
“Federal act”, the Family and Medical Leave Act of 1993, 29 U.S.C. sections 2601 to 2654 inclusive, as it may be amended.
“Health care provider”, a provider who __
(1)(i) is permitted, pursuant to written policy of each individual institution providing health care services, to provide a patient with written notice of his/her illness or condition resulting in absence from work, for the patient to provide his/her employer; or
(ii) is any other person determined by the attorney general to be capable of providing health care services; and
(2) is not employed by an employer to whom the provider issues certifications under this section.
“Parent”, a biological, foster, stepparent or adoptive parent of an employee or an employee’s spouse, or other person who stood in loco parentis during the childhood of an employee or employee’s spouse.
“Seven Paid Sick Days”, the total number of paid sick hours computed by determining the number of hours in a regular work day and multiplying this number by seven.
“Sick day”, a portion of, or a regular workday when an employee is unable to report to work because of the reasons described in subsection (c).
“Spouse”, the meaning given such term by the marriage laws of the Commonwealth of Massachusetts.
(b) All employees who work in the Commonwealth who must be absent from work for the reasons set forth in subsection (c) shall be entitled to not less than 7 sick days with pay during a 12-month period, or to a pro rata number of paid days or hours under the provisions of subsection (d). The 12-month period for each employee shall be calculated from the date-of-hire or subsequent anniversary date.
(c) Paid sick days shall be provided to an employee by an employer for:
(1) care for the employee’s child, spouse, parent, or parent of spouse who is suffering from a physical or mental illness, injury, or medical condition that requires home care, professional medical diagnosis or care or preventative medical care, or that is covered under the federal act; or
(2) care for the employee’s own physical or mental illness, injury, or medical condition that requires home care, or professional medical diagnosis or care or preventative medical care, or that is covered under the federal act; or
(3) an employee to attend a routine medical appointment for himself or herself or for a child, or, in the case of a spouse, parent, or parent of spouse otherwise in need of care; or
(4) an employee to address the psychological, physical or legal effects of domestic violence as defined in subsection (g1/2) of section 1 of chapter 151A.
(d) Paid sick days leave shall accrue at the rate of one hour of pay for every 30 hours worked up to the maximum of 7 paid sick days. Paid sick days may be used as accrued, or be loaned by the employer, at its discretion, to the employee in advance of such accrual, provided that an employer shall not require an employee to reimburse it for any unearned sick days the employee is allowed to use. Unless the employer and employee agree to designate otherwise, for periods of paid sick day leave that are less than a normal workday, the leave shall be counted on an hourly basis, or the smallest increment that the employer’s payroll system uses to account for absences or use of leave.
(e) Subject to the provisions of subparagraph (o), an employer may require certification of the qualifying illness, injury or health condition when a paid sick day leave period covers more than 3 consecutive workdays. Any reasonable documentation signed by a health care provider involved in following or treating the illness, injury or health condition, and indicating the need for the amount of sick days taken, shall be deemed acceptable certification. The certification shall be issued at such time and in such manner the attorney general may by regulation require. The employer shall not delay the commencement of leave taken for purposes of subsection (c) or pay for this period on the basis that the employer has not yet received the certification. Nothing in this act shall be construed to require an employee to provide as certification any information from a health care provider that would be in violation of section 1177 of the Social Security Act or the regulations promulgated pursuant to section 264(c) of the Health Insurance Portability and Accountability Act, 42 U.S.C. 1320d-2 note.
(f) If the necessity for paid sick days leave under this section is foreseeable, the employee shall provide the employer with not less than 7 days notice before the date the leave is to begin. If the necessity for leave is not foreseeable, the employee shall provide such notice as soon as is practicable after the employee is aware of the necessity of such leave.
(g) Paid sick days shall carry over annually to the extent not used by the employee, provided that nothing in this section shall be construed to require an employer to allow use of more than 7 paid sick days leave in any given year for an employee unless an employer agrees to do so. Employers shall not be required to pay out unused sick days upon the separation of the employee from the employer.
(h) It shall be unlawful for any employer to interfere with, restrain, or deny the exercise of, or the attempt to exercise, any right provided under, or in connection with this section, including, but not limited to using the taking of paid sick days under this section as a negative factor in an employment action such as hiring, evaluation, promotion or a disciplinary action, or counting the paid sick days under a no-fault attendance policy.
(i) It shall be unlawful for any employer to take any adverse action against an employee because the employee 1) exercises rights or attempts to exercise rights under this section, 2) opposes practices which such employee believes to be in violation of this section, or 3) supports the exercise of rights of another under this section. Exercising rights under this section shall include but not be limited to filing an action, or instituting or causing to be instituted any proceeding under or related to this section; providing or about to provide any information in connection with any inquiry or proceeding relating to any right provided under this section; or testifying to about to testify in any inquiry or proceeding relating to any right provided under this section.
(j) The attorney general shall enforce this section, and may obtain injunctive or declaratory relief for this purpose. Violation of this section shall be subject to the penalties in section 27C(b)(1),(2),(4),(6),(7) and the provisions in section 150.
(k) The attorney general shall prescribe the employer’s obligation to make, keep, and preserve records pertaining to this section and the requirements for keeping records under section 15 of chapter 151 shall apply to the records required under this section.
(l) Nothing in this section shall be construed to discourage employers from adopting or retaining paid sick day policies more generous than policies that comply with the requirements of this section and nothing in this section shall be construed to diminish the obligation of an employer to comply with any contract, collective bargaining agreement, or any employment benefit program or plan that provides greater paid sick day leave rights to employees than the rights established under this session.
(m) Employers who have a paid time off leave policy providing paid leave in excess of 20 days per year shall not be required to modify such policy, if such policy offers an employee the option, at the employee’s discretion, to take paid sick days that is at least equivalent to the paid sick days described in paragraphs (b), (c), and (f), or if the policy offers paid sick days leave in amounts equivalent to the amounts described in such paragraphs for the purposes that include the reasons described in subparagraph (b).
(n) The attorney general may adopt such rules and regulations as may be necessary to carry out the purpose and provisions of this act, including the manner in which an employee who does not have a health care provider shall provide certification.
(o) A notice of the provisions of this section shall be prepared by the attorney general, in English and other languages as required under section 62A(a)(iii) of chapter 151A. Each employer shall post this notice in a conspicuous location accessible to employees in every establishment where employees having rights under this section work and provide a copy to each such employee. Such notice shall include the following information:
(i) information describing the rights to paid sick days leave under this act;
(ii) information about the notices, documentation and any other requirements placed on employees in order to exercise their rights to paid sick days;
(iii) information that describes the protections that an employee has in exercising rights under this act;
(iv) the name, address, and phone number of the relevant department of the attorney general’s office where questions about the rights and responsibilities under the act can be answered; and
(v) information about filing of an action with the attorney general under this act.
SECTION 6: OUTREACH
The executive office of health and human services, in coordination with the attorney general, shall develop and implement a multilingual outreach program to inform employees, parents, and persons who are under the care of a health care provider about the availability of paid sick days under this act. This program shall include the distribution of notices and other written materials in English and other languages to all child care and elder care providers, domestic violence shelters, schools, hospitals, community health centers, and other health care providers.
SECTION 7: Section 150 of chapter 149 as so appearing is hereby further amended by inserting after the number “148B” in line 21, the following:-148C.
SECTION 8: EFFECTIVE DATES
(a) This act shall take effect within 90 days of its passage.
(b) In the case of a collective bargaining agreement in effect on the effective date
proscribed by subsection (a), this act shall take effect on the earlier of the date of the termination of such agreement; or the date that occurs 12 months after the promulgation of regulations by the attorney general.
The information contained in this website is for general information purposes only. The General Court provides this information as a public service and while we endeavor to keep the data accurate and current to the best of our ability, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.
|
<urn:uuid:6f1359ee-855a-4762-a51f-0f348439919d>
|
CC-MAIN-2021-17
|
https://malegislature.gov/Bills/187/S930/Senate/Bill/Text
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077818.23/warc/CC-MAIN-20210414125133-20210414155133-00244.warc.gz
|
en
| 0.945384
| 3,412
| 2.734375
| 3
|
In the last decades, the number of cyclists in western cities has significantly risen. However, the typical cyclist riding around European and North American cities is still a young man.
As women represent nearly half of the population, the presence of a relevant gender-cycling gap means that this is the main socio-demographic group for policymakers to target, if they hope to enlarge the societal and environmental benefits associated with cycling.
Why do women cycle less than men? Can this gender-cycling gap be linked to characteristics of the urban environment? If so, how can policymakers intervene in the urban environment to make it more women-friendly?
In the article “Revealing the determinants of gender inequality in urban cycling with large-scale data”, we study the strength of association between cycling uptake by women – measured through data from the sport-tracking application Strava – and several characteristics of western cities, both at a macro and microscopic level.
At a macroscopic level, we show that the cycling uptake of women is typically larger in flatter cities with a safer urban environment, such as cities with large low-speed limit zones and fewer ‘blind’-intersections (e.g., three-ways crosses).
This macroscopic result has a direct counterpart at the microscopic level. Delving deeper into street-level features, we show that in New York City streets with protected cycling infrastructures are up to four times more likely to have a large influx of women than streets with no cycleways.
This result is not limited to the city of New York but generalizes to the vast majority of the cities in our sample.
Why is this important?
As the rate of urbanization of western countries keeps rising, it has become of pivotal importance to rethink how we move around our cities.
Forms of active mobility, such as cycling and walking, not only guarantee a reduced environmental impact but they are also associated with many individual and societal benefits, such as improved mental and physical health.
In this spirit, the United Nations Sustainable Development Goals indicate cycling as one of the pillars of a sustainable urban-mobility system and interventions targeted at increasing the number of cyclists are recommended as one of the solutions against traffic congestion, increased emissions, and poor air quality.
But how can we aim at increasing the number of cyclists if we do not know why half of the population is particularly reluctant to cycle?
Identifying obstacles to cycling for women and understanding their preferences in terms of urban environment is thus of pivotal importance towards transforming cycling into a universal means of transportation.
Obviously, this is not the end of this story and more research is needed on this topic.
On one hand, the data used for this study are obtained from one of the major sport tracking applications, and as such they are better suited to represent regular cyclists than occasional cyclists. Therefore, future research will be needed to understand how the results generalize to the overall population.
On the other hand, future studies in experimental settings could shed light on causal relationships and the impact of specific urban interventions.
|
<urn:uuid:5a4e9eb2-449d-4118-b28c-7952de78f964>
|
CC-MAIN-2023-40
|
https://blogs.biomedcentral.com/on-physicalsciences/2023/05/09/keep-building-protected-bike-lanes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00399.warc.gz
|
en
| 0.945333
| 635
| 2.890625
| 3
|
- Oct 20, 2008 5:03 PM EST
- [num] Comments
The S&P Energy Research Institute of South Korea claims to be able to produce hydrogen for fuel a lot cheaper than how it's currently produced. As of now, the details are quite sketchy; what we do know is that the company is claiming to reduce the price of hydrogen by 20 to 30 times. The big cost reduction came from a new method that promises to produce one cubic meter of hydrogen using merely 0.1 kwh in energy. In today's methods that use electrolysis, the same volume of hydrogen fuel uses around 4 to 4.5 kwh of power.
If indeed the claim is feasible and could be widely adapted, this means a big boost for hydrogen's viability as major source of fuel in the future. S&P Energy has supposedly tested the method on various sources of hydrogen and was able to successfully dissociate atoms from nitrous oxide (N2O), carbon dioxide, water vapor, and methane (CH4). All sources exhibited 90 percent efficiencies. No plans for future commercial scale application have been announced yet, but hopefully, it won't be decades from now before it happens.
*Image: hydrogen atom
|
<urn:uuid:ff247a61-b9fb-4331-9150-57db581aba4d>
|
CC-MAIN-2013-48
|
http://goodcleantech.pcmag.com/none/280247-korean-company-claims-cheap-hydrogen-production
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164029048/warc/CC-MAIN-20131204133349-00015-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.960125
| 248
| 3.21875
| 3
|
3 July 2008Add to My Folder
Rated 3/5 from 2 ratings (Write a review)
This leaflet features an alphabetical rhyming poem about dinosaurs, composed especially for Literacy Time PLUS by Peter Riley. Children will enjoy trying to pronounce the different dinosaur names, and the poem gives clues as to how to say some of the names through its rhyming patterns.
These teachers’ notes accompany the guided reading leaflet , ‘Dinosaur alphabet’.
- Look at some dinosaur names – either from the leaflet text or from cards that you have previously made. Practise saying some of the names by breaking them up into phonemes.
- Make up your own dinosaur names and use phonemes to say them – eg, ai-l-o-s-p-i-r-u-s; c-a-t-ee-p-or-o-n.
- Remind children about the order of the alphabet.
- Discuss the features of a poem.
|
<urn:uuid:e35c38f5-37f5-4f8d-8706-8adf1112061d>
|
CC-MAIN-2018-34
|
https://resource-bank.scholastic.co.uk/content/3777
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221214702.96/warc/CC-MAIN-20180819051423-20180819071423-00309.warc.gz
|
en
| 0.916112
| 211
| 4
| 4
|
Managing ovarian cancer
According to the Singapore Cancer Registry, ovarian cancer was the fifth most frequent cancer among women in Singapore and accounted for 5.4 percent of all female cancers diagnosed between 2011 and 2015, with an increasing incidence rate through the last four decades.
Ovarian cancer incidence rises with age, but particularly sharply after the fourth decade of life. More than 90 percent of ovarian malignancies are derived from epithelial cells, with the remainder arising from other non-epithelial cell types viz. germ cell tumours and sex cord-stromal tumours.
Epithelial carcinoma of the ovaries, fallopian tubes, and peritoneum (EOC) is considered the same clinical entity due to similar clinical course and treatment. A growing body of evidence points to a common pathogenesis, with the tubal epithelium at the fimbriate end being the putative precursor site for the serous variant. The commonest histological subtypes of EOC in Singapore are high grade serous (35 percent), clear cell (20 percent), and endometrioid (17 percent). [Singapore Cancer Registry Report No. 8, https://www.nrdo.gov.sg/docs/librariesprovider3/default-document-library/cancertrends_7312_web128e09a5c9d76bafab5aff000014cdee.pdf?sfvrsn=0, accessed August 9, 2018]
Diagnosing ovarian cancer
Primary care physicians (GPs) can be important partners in recognizing potentially relevant signs and symptoms of ovarian cancer and referring such patients to a gynaecologist for further evaluation. Symptoms of ovarian cancer may mimic or overlap with many other conditions, for instance, dyspepsia or malignancies of other abdominopelvic organs. Therefore, GPs coming across a female patient with seemingly non-specific abdominal complaints should maintain an appropriate level of suspicion for ovarian cancer as a differential diagnosis. When ovarian cancer patients present to the gynaecological oncologist at earlier (localized) stages, they are more likely to receive curative-intent treatment and survive longer than those who present at advanced stages.
Women with symptoms and signs which suggest ovarian cancer should be evaluated with pelvic examination and pelvic and abdominal imaging. Pelvic ultrasound is the imaging study of choice to detect the presence of adnexal mass(es). Computer tomography (CT) or magnetic resonance imaging (MRI) of the abdomen and pelvis are the most commonly used modalities to assess disease extent in women with suspected intra-abdominal spread of ovarian cancer. Chest imaging (radiography or CT) is used to detect the presence of pleural effusion(s), pulmonary metastases, or supradiaphragmatic adenopathy.
Serum tumour markers are often part of the diagnostic work-up of adnexal or ovarian mass(es). A ratio of cancer antigen 125 (CA 125):carcinoembryonic antigen (CEA) of >25 suggests that primary ovarian cancer is more likely than metastasis from a gastrointestinal primary malignancy. Other markers such as alpha fetoprotein, beta chorionic gonadotrophin, lactate dehydrogenase, and inhibin may be elevated in non-epithelial ovarian cancers.
Ultimately, the definitive diagnosis of ovarian cancer is histopathological. Cyto-histopathological examination is performed following surgical removal of the primary tumour and/or biopsies of the peritoneum. Less commonly, diagnosis is achieved based upon tissue or fluid obtained via image-guided biopsy, abdominal paracentesis, or thoracentesis. Ancillary tests such as mammograms and gastrointestinal scopes may be helpful to exclude ovarian metastases from other malignancies.
Routine screening of average-risk women on a population basis for ovarian cancer is not recommended. There may be a role for screening limited to high-risk women who are carriers of hereditary breast and ovarian cancer syndrome and Lynch syndrome.
Advanced ovarian cancer typically presents with abdominal distension, nausea, appetite loss, or early satiety due to malignant ascites and omental metastases. Malignant pleural effusion(s) may manifest as dyspnoea. These symptoms may be mistaken for other conditions.
Historically, ovarian cancer was called “the silent killer” because it was thought to be relatively asymptomatic early in the disease course and present late. This has since been refuted by observations that most women with early ovarian cancer may have symptoms – usually abdominal symptoms which are often gastrointestinal or urinary – as opposed to gynaecologic in nature. Early diagnosis therefore relies on symptom recognition by patients and clinicians. The barriers to recognition of a symptom complex as ovarian cancer and early detection can be addressed through education and increasing awareness among women and their healthcare providers, and clinical research.
The goal of early detection is to improve prognosis by diagnosing the disease while it is confined to the ovary or when the disease volume is low, whereby treatment is potentially curative. Abdominal bloating or distension, anorexia, early satiety, urinary urgency or frequency, and abdominal or pelvic pain occur in many gastrointestinal disorders but are also common in women with ovarian cancer. GPs should suspect ovarian cancer when dealing with this constellation of symptoms, particularly if the symptoms persist despite symptomatic treatment and/or are more severe than expected. In this scenario, it is appropriate to perform pelvic examination and transvaginal ultrasound, and measure serum CA 125.
Women with a complex adnexal mass, ascites, evidence of metastatic EOC, and/or elevated serum CA 125 should be referred to a gynaecologist, preferably a gynaecological oncologist, for further management.
Treating ovarian cancer
The staging and initial management of EOC is surgical and should be performed by a gynaecological oncologist whenever possible. Optimal or complete surgical cytoreduction is associated with improved survival. Most women with resected EOC, including early-stage disease at increased risk of relapse, benefit from postoperative adjuvant chemotherapy to reduce recurrence and improve survival. Stage III or certain IV EOC patients who are not good candidates for primary debulking surgery due to the location and volume of disease involvement or medical comorbidities at diagnosis may be considered for neoadjuvant chemotherapy, with a view to interval debulking surgery. Hyperthermic intraperitoneal chemotherapy at the time of interval debulking surgery has recently generated much interest. [N Engl J Med 2018;378:230-240]
For patients requiring first-line chemotherapy, the standard intravenous regimen utilizes platinum and taxane agents. Patients with small volume (<1 cm) or no residual disease after surgery may be considered for intravenous and intraperitoneal chemotherapy. However, this treatment has not been adopted widely because of its greater toxicity and logistical constraints. In selected high-risk postoperative patients, bevacizumab, a monoclonal antibody targeting vascular endothelial growth factor, may be used concurrently with adjuvant chemotherapy followed by maintenance by itself.
Despite optimal upfront surgery and front-line taxane-platinum chemotherapy, approximately 70 percent of patients with EOC will relapse in the first 3 years. The response rate and prognosis associated with the next line of chemotherapy depends greatly on the duration of time between the last dose of the preceding line of chemotherapy and the detection of relapse.
Traditional teaching dictates that the platinum-free interval directs choice of next treatment line. Extending the platinum-free interval with use of non-platinum therapy (eg, bevacizumab anti-angiogenetic therapy, taxanes, hormonal therapy) can possibly help improve patients’ chance of responding to platinum rechallenge in the future. Poly (ADP-ribose) polymerase (PARP) inhibitors were recently approved as maintenance therapy following response to platinum-based chemotherapy to treat platinum-sensitive relapse of EOC. In Singapore, the licensed indication of the only currently commercially available PARP inhibitor, olaparib, is restricted to patients harbouring a germline or tumour BRCA mutation.
Most patients with recurrent EOC are treated with chemotherapy. Surgery for recurrent EOC is controversial and should probably be reserved for carefully selected patients (eg, platinum-sensitive relapse, limited sites of disease).
Patients with platinum-resistant or refractory EOC have poor prognosis. Hence, treatments should aim to maximize quality of life while attempting to control disease, generally with sequential single-agent therapy.
Cancer immunotherapy is an emerging modality of treatment against cancer that involves or uses components of the immune system. It is under active clinical research in advanced EOC.
Side effect management
GPs may encounter patients with EOC who present with infective complications while on chemotherapy. Most times, these patients are not neutropenic from their chemotherapy, unless heavily pre-treated, and can be managed in the community if clinically stable. GPs can triage patients back to their primary treatment centre or discuss with the primary oncologist if unsure.
A possible side effect of taxane chemotherapy is peripheral neuropathy, which can occasionally be severe and/or long-lasting even after treatment cessation and may impair patients’ function and mobility. Oncologists can work with rehabilitation medicine physicians to help ameliorate such neuropathy.
|
<urn:uuid:f967e747-421d-49ea-b528-2d6787fa0539>
|
CC-MAIN-2020-50
|
https://specialty.mims.com/topic/managing-ovarian-cancer-?topic-grouper=practice-insights
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141194982.45/warc/CC-MAIN-20201128011115-20201128041115-00588.warc.gz
|
en
| 0.916023
| 1,954
| 2.546875
| 3
|
Have you ever been told to come out of your shell? People sometimes use this phrase to refer to kids who are shy. If you’re shy, sometimes you keep to yourself and don’t interact much with others.
Keeping to yourself is kind of like a turtle hiding inside its shell. Turtles feel safe inside their shells. Likewise, you might feel safe from the outside world when you keep your thoughts and feelings to yourself.
However, we believe most turtles would tell you — if they could talk — that you need to come out of your shell every once in a while. When you do, you encounter the world and meet new friends that make life more enjoyable. Let’s take a closer look at the turtle to see what the world is like for them when they peek out of their shells.
Turtles are reptiles that are known for the hard shell on their backs. The shell acts as a shield that helps turtles defend themselves from predators. When threatened, turtles will retreat into their shell for protection.
Turtles can live on land or in water. Some of the largest turtles in the world are aquatic. For example, the largest turtle — the leatherback sea turtle — lives in water. It can grow to almost 7 feet long and weigh over 2,000 pounds!
The largest turtle in North America is the alligator snapping turtle. It can grow to almost three feet long and weigh as much as 250 pounds. That’s big, but it’s a far cry from the size of the leatherback sea turtle!
Did you know that the parts of a turtle’s shell have different names? The upper shell is called the carapace. The lower shell that covers the belly is called the plastron. The two pieces are joined together by pieces of bone called bridges.
Part of the inner layer of a turtle’s shell consists of bones that are part of the turtle’s backbone and ribs. That means the shell is an integrated part of the turtle’s body. If a turtle wanted to leave its shell, it couldn’t!
|
<urn:uuid:cb90ca91-27da-405c-a86d-c96642839fbd>
|
CC-MAIN-2014-42
|
http://wonderopolis.org/wonder/when-should-you-come-out-of-your-shell/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119660038.53/warc/CC-MAIN-20141024030100-00150-ip-10-16-133-185.ec2.internal.warc.gz
|
en
| 0.966484
| 432
| 3.25
| 3
|
It's swimmer's ear that's keeping Dr. Dennis Perry at Meridian Primary Care in Okemos busy this week.
Swimmer's ear is an infection of the ear canal.
Symptoms may be mild to begin with, but will get worse if not treated by a doctor.
Some of the first signs are mild discomfort, itching in the ear canal, and drainage of odorless, colorless fluid.
If swimmer's ear goes untreated, you may experience ear pain, decreased or muffled hearing, and drainage of waxy fluid.
See a doctor as soon as possible if you are experiencing any signs or symptoms of swimmer's ear, even if they are mild.
A doctor may prescribe ear drops to help kill the infection.
To treat the pain, take acetaminophen or ibuprofen and apply warm compresses to the outside of the ear.
Swimmer's ear occurs when water gets into the ear and wears down the ear's protective features, allowing bacteria to grow.
Before going to the doctor, keep your ear as dry as possible and do not go swimming.
|
<urn:uuid:aa73e635-eff2-4d44-90d0-44146b7f8963>
|
CC-MAIN-2015-11
|
http://www.wilx.com/news/localnews/headlines/Whats_Going_Around35_127728093.html?site=mobile
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464088.46/warc/CC-MAIN-20150226074104-00243-ip-10-28-5-156.ec2.internal.warc.gz
|
en
| 0.948688
| 227
| 3.09375
| 3
|
How dentists from the time of the Pharaohs applied practical knowledge in the field of dental medicine and oral surgery
Just like us the ancient inhabitants of Egypt suffered from dental diseases. Their diet was full of fibers and rough often raw vegetables.
Combined with poor dental hygiene it caused various oral diseases, including caries and periodontitis. But the Egyptians were skilled and resourceful doctors trying to treat these diseases by medical practices far transcended their time. They invented the dental surgery and actively exploited medicines offered by nature.
Dental problems of the ancient people
General wear and attrition of the teeth was typical for almost all the inhabitants of the land of the Pharaohs. There are several reasons but the main one is the low quality of food and lack of vitamins and minerals. The ancients ate very poor quality bread full of husks, straw and even sand particles. Virtually for all found during excavations skulls and jaws, teeth condition is very bad – they are highly worn out. By itself it is not a disease, but it is the basis for the rapid emergence of other more serious problems such as abscesses, inflammation of the gums and jaw bone and tooth loss.
Although at that time the refined sugar has not invented yet, cavities were already there. It is interesting fact that this disease was a privilege of the elite. The reason probably lies in the quality of diet and access to sweets, which both social groups had.
Dental practice of the ancient dentists
In their records on papyrus ancient dentists describe a number of conditions that they have to deal with – tooth abscesses, problems with gums, loose teeth, ulcerative stomatitis, periodontitis, alveolar disease, dental sepsis and tartar.
Medics of Ancient Egypt were aware that misstreating dental disease leads to serious problems and even death. So besides magic and religious rituals, Egyptian dentist did very practical drug therapies to relieve pain and suppress inflammation.
Ebers papyrus describes 11 methods of dental treatment. Four, for example, relate to the problem of “loose teeth”. Such teeth are treated in two ways: either “packed” or “filled” with a mixture similar to what we today call “composite” – filling material (made from barley) mixed with honey and some antiseptic. This mixture was used for filling or fixing the problematic tooth. Furthermore, the subjects of the Pharaoh drank various syrups, mixes and “mouthwash” to maintain oral hygiene, relief pain and stop inflammation.
There were also certain substances made to be chewed and spited. Part of there ingredients were beer and herbs like potentilla, celery, etc.
In Addition to treating with herbs and potions, dentists did a lot more sophisticated operations and real surgery – jaw placement, surgical excision of the abscess and partial removal of damaged pieces of gum. Seams like it was a common practice to make different dental repair work – this far there are three cases of found dental bridges of that time. The technology is simple – one or more missing teeth are attached back with gold or silver wire to the surrounding healthy teeth.
Dental bridges in Ancient Egypt
Obviously, thousands of years ago the ancient inhabitants of the Nile liked and appreciated their teeth and kept considerable efforts to keep them in their mouths. For this purpose, along with prayers and spells, they applied very reasonable and practical knowledge in the field of medicine and oral surgery. We can see the evidence even today.
|
<urn:uuid:100e388d-2b0f-41b2-8344-1207a3c6d989>
|
CC-MAIN-2022-49
|
https://dental-polishers.com/dentistry-in-ancient-egypt/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710916.40/warc/CC-MAIN-20221202183117-20221202213117-00780.warc.gz
|
en
| 0.968544
| 729
| 3.234375
| 3
|
Foothills pine; historically, called digger, Sabine, bull, gray or grayleaf pine. It has widely been named digger pine due to its wide use by Native American tribes collectively and colloquially referred to as "diggers." However, that term has fallen into disgrace. As explained by Hunter (1991): "many Native Americans find the term digger offensive. A spokesman, who requests anonymity, for the California State Native American Heritage Commission says, "The word `digger' is very derogatory and insulting to California Indian people." A historical interpreter, who also requests anonymity, for the California State Indian Museum in Sacramento agrees: "To call a California Indian a `digger' means you are either ignorant or you are purposely trying to insult him. It is a very derisive word." These observers concur in the opinion that "the term digger is as offensive to California's Native Americans as the term 'nigger' is to African Americans." The terms "foothills pine" or "gray pine" are now officially preferred.
Some authorities spell the epithet "sabineana." This is an alternative, but not required spelling under Recommendation 60C of the International Code of Botanical Nomenclature. The merits of this spelling are debatable, and warrant a digression into the history of the name.
The species was described by David Douglas as Pinus sabinii, which is not grammatically correct Latin appears to be a conjugation of Sabinius, which was the Latinized form of Sabine's name. At the time it was commonly regarded as honorific to Latinize a scientist's name, so it is quite probable, given Douglas' deep respect for Sabine (see Aside, below), that he intended to commemorate Sabinius rather than plain old Joe Sabine.
It is also worth considering that the epithet "sabiniana" is to be found in literally thousands of references in both popular and common literature and thus should not be changed without a very good reason. On occasion the ICBN has determined to conserve an incorrect name simply on the basis of such long-standing and widespread use. Certainly, we can ask for a better reason to rename this species than "because it's not prohibited."
Aside: Douglas' journals left much evidence of his respect for Sabine (a respect which, alas, seems not to have been sincerely reciprocated; but that's another story). Consider his comment on July 24, 1824: "After several weeks’ preparation for a voyage to the Columbia river on the west coast of North America, on the afternoon of Saturday parted with J. Sabine, Esq., and all other friends." A month later he wrote Sabine a letter from Madeira, in September he called upon a friend of Sabine's in Rio de Janeiro. In June of 1825, he found a fine Phlox, an "exceedingly beautiful species I name P. Sabinii, in honour of Jos. Sabine, Esq." Throughout his journeys in North America, his journals are filled with references to Sabine, who is always first when he names the letters he must dispatch.
Trees 12-21(25) m with diameters of 60-120 cm, straight to crooked, often forked; crown conic to raggedly lobed, sparse. Bark dark brown to near black, irregularly and deeply furrowed, ridges irregularly rectangular or blocky, scaly, often breaking away, bases of furrows and underbark orangish. Branches often ascending; cone-bearing branchlets stout, twigs comparatively slender, both pale purple-brown and glaucous, aging gray, rough. Buds ovoid, red-brown, ca. 1cm, resinous; scale margins white-fringed. Leaves mostly 3 per fascicle, drooping, persisting 3-4 years, 15-32 cm × 1.5 mm, slightly twisted, dull blue-green, all surfaces with pale, narrow stomatal lines, margins serrulate, apex short-acuminate; sheath to 2.4 cm, base persistent. Staminate cones ellipsoid, 10-15 mm, yellow. Ovulate cones maturing in 2 years, shedding seeds soon thereafter, persisting to 7 years, pendent, massive, heavy, nearly symmetric, ovoid before opening, broadly to narrowly ovoid or ovoid-cylindric when open, 15-25 cm, dull brown, resinous, stalks to 5cm. Scales long, thick, sharply keeled and 4-sided; apophyses elongate, curved, continuous with umbos to form long, upcurved claws to 2 cm. Seeds narrowly obovoid, thick-walled; body ca. 20 mm (largest in the genus), dark brown; wing broad, short, ca. 10 mm, shed easily. 2n=24 (Little 1980, Kral 1993).
USA: California through the Coast Ranges and the Sierra Nevada, nearly ringing the Central Valley, in dry foothills; Oregon, local in Douglas, Jackson and Josephine counties. Found at (30)300-900(1900) m elevation (Little 1980, Kral 1993, records of the Consortium of Pacific Northwest Herbaria searched 2009.06.16, and David Landrum email 2012.03.31). Commonly found in association with California blue oak (Quercus douglasii) or canyon live oak (Quercus chrysolepis). The climate is Mediterranean, with annual mean precipitation of 530 mm, ranging from 76 to 1,000 mm. Eighty percent of precipitation occurs during winter and early spring. Snow falls occasionally. The annual mean temperature is 16°C, with maximum summer temperatures sometimes above 41°C). Relative humidity is often 5 percent or lower in summer (FEIS database, 2004.03.02). Hardy to Zone 8 (cold hardiness limit between -12.1°C and -6.7°C) (Bannister and Neuner 2001). See also Thompson et al. (1999).
Foothills pine and four species of Quercus (oaks) comprise the dominant species of the blue oak woodland, a community that essentially encircles California's Central Valley. There are few shrubs, and the understory consists mainly of introduced grasses and native forbs. As such, the woodland is slightly hotter and drier than the chaparral, with which it forms a landscape mosaic that also includes parklands and grasslands. At increasing elevations, foothills pine is restricted to open habitats on serpentine soils, being competitively displaced by Pinus coulteri and P. ponderosa subsp. benthamiana (Barbour 1988). The role of fire in the establishment and perpetuation of foothills pine has not been widely studied, but the species' fecundity, short life span and occurrence in fire-prone areas all suggest that it has coevolved with relatively frequent fire. However, fire can extirpate an isolated grove of the trees, and their range appears to have increased with anthropogenic fire suppression in California's Central Valley (Callahan 2009).
As with all other pines having large seeds with vestigial wings, this species relies on corvids to gather its seeds and plant them in suitable locations. In this case the principal actors are the Steller's jay and the scrub jay. The Steller's jay lives in forests and dense woodland and is a great flier, likely carrying the seeds for distances of some kilometers. In contrast, the scrub jay lives in the chaparral and in open country, but it usually does not carry seeds far from the tree, and is thus of limited value in reestablishing groves that have been destroyed by fire (although long seed longevity and the sturdy nature of the cones facilitate reestablishment from seed after fire). The contrasting ecology of these species may explain why this is a species of the foothills, not ranging far from the mountains (Callahan 2009).
There are a number of contenders. The current official champion is 162.5 cm dbh and 38.40 m tall with a crown spread of 26.21 meters, and grows in Kern County, CA (American Forests 2005). Past champions have ranged up to 180.3 cm diameter and an unverified height of 54.86 m (Callahan 2009). I found the tree shown at left along the Nacimento-Ferguson road in the southern Santa Lucia Mountains; it is 156 cm in diameter, 37 m in height, with a crown spread of 25.1 m.
Seen widely throughout its range. It can be seen in many California State Parks around the Central Valley and in Yosemite National Park, although it is strangely absent in the vicinity of Sequoia and Kings Canyon National Parks. Within the proper habitat it is abundant and well-developed groves are common.
This species was first discovered to botany by David Douglas in 1826, in the Umpqua country in Oregon, near the uttermost northern range limits of the species. Alas, he lost his specimens in crossing the Santiam River, and did not encounter the tree again until February 1831, during a trip to the summit of the Gabilan Range near Monterey, California (Harvey 1948).
The large, heavy cones resemble footballs covered with wooden spikes. It is best to avoid the pine groves on windy days.
John Muir, as always, waxed poetic when he described this tree in the first chapter of My First Summer in the Sierra: "This day has been as hot and dusty as the first, leading over gently sloping brown hills, with mostly the same vegetation, excepting the strange-looking Sabine pine (Pinus Sabiniana), which here forms small groves or is scattered among the blue oaks. The trunk divides at a height of fifteen or twenty feet into two or more stems, outleaning or nearly upright, with many straggling branches and long gray needles, casting but little shade. In general appearance this tree looks more like a palm than a pine. The cones are about six or seven inches long, about five in diameter, very heavy, and last long after they fall, so that the ground beneath the trees is covered with them. They make fine resiny, light-giving camp-fires, next to ears of Indian corn the most beautiful fuel I've ever seen. The nuts, the Don tells me, are gathered in large quantities by the Digger Indians for food. They are about as large and hard-shelled as hazelnuts, --food and fire fit for the gods from the same fruit."
This species is the principal host for the dwarf mistletoe Arceuthobium occidentale (Hawksworth and Wiens 1996).
Barbour, Michael G. 1988. California upland forests and woodlands. P. 131-164 in Barbour, M.G. and W.D. Billings (eds.), "North American terrestrial vegetation." Cambridge: Cambridge University Press.
Callahan, Frank. 2009. Discovering Gray Pine (Pinus sabiniana) in Oregon. Kalmiopsis 16:1-14. Available: www.npsoregon.org/kalmiopsis/kalmiopsis04.html, accessed 2009.11.14. Useful summary of subjects such as history, ecology, and ethnobotany.
Harvey, A. G. 1948. Douglas of the Fir. Cambridge, Massachusetts: Harvard University Press.
Hunter, Melvin. 1991. Racist Relics: An Ugly Blight On Our Botanical Nomenclature. The Scientist 5:0. http://www.the-scientist.com/yr1991/nov/opin_911125.html, accessed 2004.03.02.
Griffin, J. R. 1962. Intraspecific variation in Pinus sabiniana Doug. PhD Thesis, University of California, Berkeley. 274 pp.
Griffin, J. R. 1964. David Douglas and the digger pine: some questions. Madroño 17:227-230.
Griffin, J. R. 1964. Cone morphology in Pinus sabiniana. Journal of the Arnold Arboretum 45:260-273.
The FEIS database has an extensive entry for this species. Highly recommended.
Griffin, J.R. 1964. Cone morphology in Pinus sabiniana. Journal of the Arnold Arboretum 45:260-273.
Hinton, Leanne. 1994. Flutes of Fire. Berkeley, CA. Heyday Books, see particularly the remarks quoted HERE.
Ledig, F. T. 1999. Genic diversity, genetic structure, and biogeography of Pinus sabiniana Dougl. Diversity and Distributions 5:77-90.
Powers, R. F. 1990. Pinus sabiniana. Pp. 463-489 in Burns & Honkala 1990.
Last Modified 2014-12-13
|
<urn:uuid:45e676d1-efdb-44b1-850f-d6139e780f58>
|
CC-MAIN-2014-52
|
http://conifers.org/pi/Pinus_sabiniana.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802765678.46/warc/CC-MAIN-20141217075245-00045-ip-10-231-17-201.ec2.internal.warc.gz
|
en
| 0.923159
| 2,720
| 3.140625
| 3
|
This paper introduces the jig set for the crash test and the crash test results of shear bolts which are designed to fail at train crash conditions. The tension and shear bolts are attached to Light Collision Safety Devices(LCSD) as a mechanical fuse when tension and shear bolts reach their failure load designed. The kinetic energy due to the crash is absorbed by the secondary energy absorbing device after LCSD are detached from the main body by the fracture of shear bolts. A single shear bolt was designed to fail at the load of 250 kN. The jig set designed to convert a compressive loading to a shear loading was installed to the high speed crash tester for dynamic shear tests. Two strain gauges were attached at the parallel section of the jig set to measure the load responses acting on the shear bolts. Crash tests were performed with a carrier whose mass was 250 kg and the initial speed of the carrier was 9 m/sec. From the quasi-static and dynamic experiments as well as the numerical analysis, the capacity of the shear bolts were accurately predicted for the crashworthiness design.
|
<urn:uuid:41972de0-5f84-4c75-8d83-2c02833978a6>
|
CC-MAIN-2023-06
|
https://koasas.kaist.ac.kr/handle/10203/22761
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500288.69/warc/CC-MAIN-20230205193202-20230205223202-00750.warc.gz
|
en
| 0.978334
| 227
| 2.75
| 3
|
My view is not universally accepted:
Math has a bad rap, writes math professor Manil Suri in a recent New York Times op-ed, and would be better geared to students as a playful and stimulating subject of ideas. Unfortunately, that’s not at all what our culture currently embraces...K-12 math isn't the place for "following your bliss", but that's just my opinion. I think mental push-ups are a good idea for any number of reasons.
Cornell Math Professor and New York Times columnist Steven Strogatz, author of The Joy of x, said much of middle and high school math curriculum (which covers not basic arithmetic, but higher math) doesn’t appeal to students’ hearts, instead offering answers to questions that kids would never ask — which he calls “the definition of boredom.”
“When people want to learn about music, they’ve reacted to it, they love it and naturally want to learn more about it. They have their own questions,” Strogatz said. When introducing higher math to a group of curious young students, he suggests first “showing them math’s greatest hits” and allowing them to become fascinated; students then naturally come up with their own questions. Suri was on the right track, Strogatz said, when he suggested students learn something like the origin of numbers — because the first step is falling in love with the mathematical ideas behind the formulas and procedures.
Strogatz acknowledges that grasping the concepts of higher math can pave the way to many wonderful careers — many in the popular and highly needed STEM fields. But rationalizing to students that math improves reasoning skills or that “you’ll need it in the real world” are two strategies doomed to fail, he said, because they not-so-subtly suggest that math isn’t worth learning for its own sake, but parallels something more akin to “mental push-ups.”
Grabbing students’ hearts, however, is only the first step to falling in love with math. High school math teacher Dan Meyer realized his algebra classes needed a makeover, the subject of an inspiring TED talk in which Meyer takes a larger look at how math is taught. “We have defined math rather narrowly in the U.S. to mean memorizing procedures and performing them accurately and quickly,” he said. “Those are certainly important parts of mathematics, but they aren’t the only parts, or even the most important parts. We need to define math to include skills like prediction, argumentation, and systematic thinking. These are important skills to have whether you go into a STEM field or not.”Meyer has done interesting work in his classes, but I disagree with his diagnosis. Math, if taught poorly, is about "memorizing procedures and performing them accurately and quickly". I deny that that's how I teach math, and I resent any implication that I should change how I teach because some do teach poorly.
But again, that's just me.
|
<urn:uuid:c1821057-8eec-4297-9360-b3347197bc1a>
|
CC-MAIN-2017-39
|
http://rightontheleftcoast.blogspot.com/2014/09/beauty-in-mathematics.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686117.24/warc/CC-MAIN-20170920014637-20170920034637-00020.warc.gz
|
en
| 0.968645
| 639
| 2.546875
| 3
|
On November 1st through 3rd, a new annual Conference on Children's Healthcomes to Southern Illinois. The Southern Illinois Coalition for Children and Families presents Healthy Children~Brighter Futures. WSIU offers a session at the conference: Balancing Screen Time.
In anticipation of our upcoming presentation, we want to take this opportunity to share some thoughts about screen time. If your goal is to balance the amount time your children spend in front of screens, it will be helpful to understand concepts of media literacy.
Media literacy is the ability to use and analyze communication across all platforms and technologies. When you think about it, media surround us. Media is the cell phone you use, the TV in your house, the computer at work, the radio you listen to, and the advertisements you see throughout the day. Media is everywhere. Because media is so pervasive in our lives, we can benefit by examining media messages
Next time you are about to engage with media, such as a children's television program, stop and ask yourself:
What is the purpose of this media?
Who is the intended audience?
What is the message?
Do I agree with the message?
Is this fact, opinion, or something else?
How credible is this message? How can I know whether this is credible and trustworthy?
What stereotypes are depicted?
Is this appropriate for the age of my child?
If I disagree with what this is saying, should I ban it from my children or talk to them about how my views differ?
How does this media add value to my life?
We hope to see you in person at our session at the conference. We will share a conversation about our experiences with media. If you are unable to attend the conference, you're in luck! A group of SIU student volunteers will use social media, including Facebook,Twitter, and Instagram, to provide virtual access to the conference. Beginning November 3rd, search http://www.storify.com for Southern Illinois Conference on Children's Health
|
<urn:uuid:bff4c356-4875-4287-b52e-70043f7d77c3>
|
CC-MAIN-2018-43
|
http://www.sifamilies.org/kids-korner/media-literacy-what-are-you-consuming
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510019.12/warc/CC-MAIN-20181016051435-20181016072935-00527.warc.gz
|
en
| 0.945936
| 413
| 2.84375
| 3
|
Alexi Leonov was the first human to take a walk in the airless vacuum we know as space. It was March 18, 1965 and Commander Leonov, a Soviet cosmonaut, suited up and made his way through the airlock and into the dead silence. He was tethered to his spacecraft by a 5 meter line and his space suit expanded so much during his walk in space that he was forced to bleed air out of it—and still barely made it back inside the spacecraft.
Or you could ask Edward White. A few months after Leonov’s walk, the first American took a walk in space. On June 3, 1965 Edward White stepped out of his Gemini 4 space craft.
You might be surprised that the answer is not “complete silence.” While the airless vacuum of space would not carry any sound, the actual sounds inside a space suit include the chatter of crew mates and mission control. According to Garrett Reisman, former NASA astronaut:
“Mostly what you hear is the sound of the pumps and fans that circulate air and water through your suit. It’s not terribly annoying or anything, but it’s not the silent lonely environment with no sound other than your own breathing like often depicted in the movies.”
That is also different from how many people experience hearing loss. Those with tinnitus describe a ringing or hissing (among other sounds) that constantly interferes with the sounds they really want to hear. Others with hearing loss may hear only bits and pieces of words and sentences. That’s why hearing loss can be isolating.
Consider asking those close to you with hearing loss about their experience. What do they hear?
And just in case you needed one more sendoff for David Bowie, consider this 1967 version of his “Space Oddity.”
|
<urn:uuid:a4ed00a0-d823-42af-b1ff-5638652cbc11>
|
CC-MAIN-2020-34
|
https://gnresoundblog.com/2016/03/28/hearing-loss-the-silence-of-space/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738351.71/warc/CC-MAIN-20200808194923-20200808224923-00490.warc.gz
|
en
| 0.980012
| 381
| 3.078125
| 3
|
Still life is a type of painting. It’s a image of objects that don’t move. The creative person looks at objects. like vases. fruit. bottle’s flower’s and surveies the manner the light hits the objects. the shadow’s and the form. Archie Forrest is a Scots creative person. who was born in 1950. Archie attended the Glasgow school of art in 1969 and left in 1973. He so spent 7 old ages.
Still Life Drawing. If you've ever taken a studio art class in school, you may have learned how to draw a still life. Still life drawings are drawings of non-living objects, arranged in a specific.
Still life includes all kinds of man-made or natural objects, cut flowers, fruit, vegetables, fish, game, wine and so on. Still life can be a celebration of material pleasures such as food and wine, or often a warning of the ephemerality of these pleasures and of the brevity of human life (see memento mori). In the hierarchy of genres (or subject types) for art established in the seventeenth.
Essay. Still-life painting as an independent genre or specialty first flourished in the Netherlands during the early 1600s, although German and French painters (for example, Georg Flegel and Sebastian Stoskopff; 21.152.1, 2002.68) were also early participants in the development, and less continuous traditions of Italian and Spanish still-life painting date from the same period.
Still life features just inanimate objects, no animals or people, yet it still somehow manages to convey strong emotion. It can set a mood of joy, melancholy, or intelligence. No matter what your decorating style, it is easy to find still life paintings that fit perfectly with your color scheme and aesthetic.
Year 5 or 6 Art Lesson. Darwin Fossils - Geography links Lovely lesson - 2 carosel art activities. To draw from observed still life paying particular attention to shading and texture. To explore the impact of line using a variety of materials. (DRAW FROM IMAGE OF FOSSIL USING 3 DIFFERENT MATERIALS, E.G, pencil, charcoal, pastel.
Still life, British graphic art, and the engraved series: c.1680-1735 By Peter Moore. emerging forms of graphic art of the day. This short essay is currently being developed into an extended journal article which the author hopes to publish in 2013. Figure 1. Monnoyer, Still life of mixed flowers in a vase on a ledge. c.1690. The Fitzwilliam Museum, Cambridge. Figure 2. Smith (after.
A still life is a drawing or painting that focuses on still objects. The subject matter is inanimate and never moves, typically with a focus on household objects, flowers, or fruits. Still life work contrasts figure drawing which focuses on a live human model. With a still life you know the objects won’t ever move and you can practice objects with different properties like shiny metal, clear.
Still-life painting, depiction of inanimate objects for the sake of their qualities of form, colour, texture, and composition.Although decorative fresco murals and mosaics with still-life subjects occasionally appeared in antiquity, it was not until the Renaissance that still life emerged as an independent painting genre, rather than existing primarily as a subsidiary element in a composition.
Introduce your class to the wide world of still life art in this Year 5 and 6 'Objects and Meanings' scheme of work. Covering a wide range of areas, children will have the chance to explore colour, composition, control, form and style as they study a variety of different still life paintings. Throughout the module, children will have the chance to develop their control over a variety of tools.
In the art world, a still life is defined when it contains a subject that doesn't move (or holds still). The history of still life art goes back thousands of years, and different periods make for different styles of still life. But from the earliest still life paintings to the most recent, the most popular subject is fruit. Ancient Antecedents. Still lifes have been around since ancient Egypt.
We’ll also be hosting free events to inspire your course delivery and supporting your marking with exhibitions of live work. Our specification is flexible and accessible: you can tailor your course to your students’ interests and your school’s strengths. Specification. Specification at a glance. Past papers and mark schemes. Teaching resources. Plan. 7 Prepare for your teaching year.
|
<urn:uuid:b202fd53-71e1-4ba7-8e72-d8d94b67e966>
|
CC-MAIN-2022-05
|
http://frlan.mydad.info/pandeism/Art-Still-Life-Marking-Scheme-For-Essay.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304217.55/warc/CC-MAIN-20220123081226-20220123111226-00092.warc.gz
|
en
| 0.940275
| 957
| 2.53125
| 3
|
Nothing is better than a fresh, tasty salad made with the greens from your own garden. Grow your own healthy lettuce with these easy steps.
If temperatures are not too hot and steady watering is provided, lettuce is one of the easiest crops to grow in your garden.
Lettuces, particularly looseleaf varieties, prosper in containers so even small-scale gardeners can provide a bountiful and successful harvest if they follow these simple strategies.
Lettuce grows best in full sun in areas that are not too hot. When growing lettuce during hot weather, find a location that receives afternoon shade to help keep leaves from becoming bitter and to avoid early bolting.
Mix a 1/2 inch layer of compost and a pinch of organic fertilizer into the top 6 inches of soil.
Sow lettuce seeds 1/4 inch deep in rows that are spaced 12 to 18 inches apart. About a tablespoon of seeds per 10-foot row will produce plenty of leafy greens to harvest. Be sure to eep the soil moist until the seeds germinate.
Once the plants have grown about 2 to 4 true leaves, thin seedlings to about 4 inches apart. Thin again when the seedlings start touching shoulders. For heading types of lettuce, the final spacing should be at least 1 foot. Lettuce will not form a head if it is too crowded.
Grow lettuce in the cooler months, before it becomes too hot, or plant it in the shade of taller crops. Heat will cause lettuce to become bitter and it will lose its tender consistency.
Be sure to keep your lettuce hydrated when there isn’t enough rain. Provide 1 to 2 inches of water per week. Plants in pots tend to dry out faster so be sure to keep up on watering.
Plant a series of crops in succession to each other. Doing this every 2 to 3 weeks ensures a steady supply of salad greens.
You can extend the season by starting plants indoors under grow lights about 5 to 6 weeks before the last frost date. Use row covers to protect fall-planted lettuces into early winter.
Rotating your crops will not only help your lettuce, but it will also help your soil. Growing lettuce in the same spot each year depletes the soil and will result in weak growth.
Soil that is high in humus, with plenty of compost and a steady supply of nitrogen will keep your lettuce healthy and growing fast. Use organic alfalfa meal or a slow-release fertilizer for best results.
Ariana Marisol is a contributing staff writer for REALfarmacy.com. She is an avid nature enthusiast, gardener, photographer, writer, hiker, dreamer, and lover of all things sustainable, wild, and free. Ariana strives to bring people closer to their true source, Mother Nature. She is currently finishing her last year at The Evergreen State College getting her undergraduate degree in Sustainable Design and Environmental Science. Follow her adventures on Instagram.
|
<urn:uuid:3a0d07e9-6607-42ab-b5d1-dd1d74899da8>
|
CC-MAIN-2019-39
|
https://realfarmacy.com/how-to-grow-the-healthiest-lettuce/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514576965.71/warc/CC-MAIN-20190923125729-20190923151729-00299.warc.gz
|
en
| 0.91654
| 608
| 3.15625
| 3
|
The French reformed colony of Fredericia has no direct relationship with the emigration of 1685. It was founded only in 1719-20 by King Frederic IV. This founding is not an act of religious mercy, but it’s the effect of a national economic plan; indeed the king wanted to create a tobacco plantation which in future could suffice to the needs of Denmark. The realization of this plan would not meet the expectations. It is only exceptionally (1776-83: American war; 1813-14: Napoleonic war; 1917-18: World War) that the Danish production surpassed 100,000 kilos a year, whereas annual Danish consumption surpassed since the 18th century 1 million 500,000 kilos. Until 1783, members of the colony would go to other cities of the kingdom to teach the culture of tobacco; from 1783 to approximately 1874, Fredericia was the only Danish city producing tobacco; after 1864, the cultivation of this plant stopped at Fredericia, as the production of milk and meat became more advantageous; on the other hand farmers of western Fyen continued to produce this crop until a too heavy taxation ended it in 1920. The colony was formed by peasants who had come from French colonies between Berlin and Stettin (Bergholz, Gross- and Klein Ziethen etc. because they were dissatisfied of living there and because Frederic IV had invited them to come to Denmark. In 1719 a delegation of three peasants, Jacob Devantier, Daniel le Blond and Paul d’Arrest, arrived, for orientation, and after one day in Jutland, they decided to establish the colony of Fredericia provided certain economical and religious privileges, exemption from taxations, etc. Paul d’Arrest remained however in Brandenbourg. The first members of the colony arrived in spring 1720; in 1721, 36 families had taken out a license in Fredericia, but some went to other Danish cities; during this year, the establishment of the colony was considered completed, and, if later immigrant planters were accepted, it was only on an exceptional basis.
The colony was never large. In 1722, it did not count 150 residents, and even when it reached its maximum, around 1850, it did not encompass more than 500 members. However, the families were prolific; in 1748 the number of children per family was 50 % higher than for Danish families. In 1722-1919 the number of christenings topped burials by 909 individuals. The colony could not sustain the exceeding population which went to other cities in the country. The colonists reached a considerably higher age than customary in Denmark.
Already upon arrival, in 1720, the families were united by family ties, with the Devantier family in its center. The colony was hence not formed by an arbitrary choice, but was foremost a family enterprise. Devantier hailed from Hainaut, and most of the families came from the French-Belgo region (Hainaut, Calais), from where they had fled in 1662-86; the other families came from East and Southern France. They took refuge in Palatinate and from there to Brandenbourg in 1685 and 1686. Today the families from Belgium and from Northern France still dominate Fredericia, whereas most of the other families have either left town or are extinct. Adjustment difficulties considerably varied for the different families. One cannot say that those from Southern France were weaker than those from the North; on the other hand the number of children was larger for the latter ones [because of children mortality]. During the first 150 years families united for economic reasons, without certified, visible pathological effects, health was excellent. In our days, marriages within French families are very rare.
Colony affairs (matters related to land, taxes and plantation) were dealt with in common by the whole colony in 3 annual general assemblies; each head of family had an obligation to attend. The colony had been given a free piece of land (in 1720: 23 hectares, from 1743 on: 36 hectares) and had use, against an annual payment to the city coffers, of another little piece of land. Every family was given an equal parcel of land and paid an annual rent to the cashier of the colony; who was its only official, but he was not empowered to act on behalf of the colony; if necessary for the handling of a particular matter, the assemblies would nominate representatives, whose powers to act on behalf of the colony would cease as soon as the matter was settled. In this way the colony had no permanent representation. A royal resolution of 1863 established a consistory for this function; but this consistory represented the community not the colony. In 1889, the assemblies of the colony were replaced by parochial assemblies. In 1934, the community obtained final possession of the land given to the colony. As for the city, the issue of the colony was settled in 1905, when the city of Fredericia bought from the colony against indemnification its right of disposal for the land dating from 1720. The special position of the colony in the state of Denmark in social, religious and economical matters ended with the Constitution of 1849. Henceforth the colony did not exist any more from the state administration perspective. Thus the colony was gradually liquidated since 1849 and its existence ceased in 1934.
In accordance with the “Discipline” the colonists organized themselves immediately as a reformed community with Consistory, school and religious service, directed by a colonist until the establishment of a pastor in 1722; the service was celebrated in a room of one of the settler until the construction of the temple in 1735. The amount required for the building of the temple came from a collection conducted in Denmark, Germany, Holland and Belgium (Walloon Synod). Later the King and rich French financiers (Huguetan, Desmerciers, Brettonville, etc.) established a fund for the salary of the pastor. While the colony remained a closed society, the community opened itself to all the reformed people of the Jutland; services and communions were attended by Germans, Dutch and French, businessmen, military and nobles; the colony of planters however formed the core of the community; and the member community with Consistory, school and religious service, directed by a colonist until the establishment of a pastor in 1722; the service was celebrated in a room of one of the settler until the construction of the temple in 1735. The amount required for the building of the temple came from a collection conducted in Denmark, Germany, Holland and Belgium (Walloon Synod).
While the colony remained a closed society, the community opened itself to all the reformed people of the Jutland; services and communions were attended by Germand, Dutch and French, businessmen, military and nobles; the colony of planters however formed the core of the community; and the members of the Consistory were always chosen from the colonists as well as community funds were mortgaged with the colonists. In 1934 the community obtained possession of the land of the colony; it levies its own taxes for the payment of the pastor and school expenses; through the social law of 1933, assistance to poor people went to the city of Fredericia. Since 1870 a considerable number of families have changed religion to become Lutherans or catholics.
Here is the list of pastors: 1722-28 Jean Martin, 1728-32 David Moutoux, 1733-39 Jacques Bovet, 1740-82 Moise Hollard, 1785-1811 Jeam Marc Dalgas, 1812-14 J. Zilz, 1816-17 Jean Etienne Coulin, 1818-21 Jules Charles Rieu, 1823-43 J. V. W. Stahlschmidt, 1843-70 G. C. W. Stahlschmidt, 1871-83 J. J. Schwarts, 1883-97 J. Ludwig, 1899-1938 W. Staehelin, 1938- H. A. Aillaud.
From these pastors one has to single out Martin, who had been pastor in Copenhagen since 1713; for a Frenchman, he had an extraordinary knowledge of law, language and customs of the country and he managed to settle in an excellent manner the difficulties of the first years so crucial for the colony. – The very energetic pastor Dalgas was the forefather of a family which during the 19th century had a particular importance for Danish culture; it was a Dalgas who after 1864 brought into cultivation the moors of Jutland and he is considered the national hero of modern-day Jutland; another Dalgas created the world renowned Royal Danish Porcelain Manufactory; a daughter of the pastor, married to the count Stampe de Nysce, assembled in her salon, the last in the French manner, the celebrities of the day, Grundtvig, the story-teller H. C. Andersen and, above all, the sculptor B. Thorvaldsen. Rieu, the friend of Monod, through his premature death (age 28) missed being named amongst the most outstanding pastors of his century. After his death, it was no longer possible to have French pastors come for this little flock lost in Northern Europe, and from 1823 on this Little France had no longer direct contacts with the homeland. Among the German or Swiss pastors, one has to mention J. Ludwig, author of a history of the community and of an excellent and complete collection of genealogical tables of the community.
Besides the land of the colony, the colonists tilled much larger lands that the various families bought as private property or rented from Danish residents against participation in the income in accordance with the French “a half” principle, unknown in Denmark, but which remained associated with the cultivation of tobacco in Western Fyen. Besides the cultivation of tobacco, the colonists practiced an intensive cultivation of lands which served as a model to the other farmers of the area, increased the value of the land and contributed to the liquidation, in 1770 and following years, of the traditional communal cultivation by Danish villages, inaugurating the era of large agricultural reforms. For the colonists of Fredericia, Sully and Colbert cooperated thus in founding modern agriculture in Denmark, based on the principle of intensive farming.
One can assume that it was the colonists who introduced the cultivation of potatoes to Denmark; till 1846 they sent considerable quantities to Copenhagen when its cultivation was halted by the potato plague, the war of 1848-50 (revolution of Schleswig-Holstein) and by the new conjunctures favoring the production of milk and meat. The colonists introduced the cultivation of wheat in this part of Jutland; they were the first in Denmark to cultivate rapes, used only in the household, as well as potatoes; initially, they planted many French vegetables such as artichokes, asparagus and parsnips, etc., but later they learned to do without them. The colonists loved to plant trees and thus embellished the town, already so admirably located; one should remember that the large plantations in Jutland’s moors are due to the Society of moors cultivation (Det Danske Hedeselskab), founded by three men of French origin: Mourier-Petersen, Morville and Dalgas.
Until approximately 1900, the colony continued to contrast with the rest of the city, where one still mentions the “reformed quarter”, or less formally “Persilleegnen”, “Parsley area”; one teased the Calvinists by calling them “Kalmouks”; this did not hinder that one found these brown eyed, black wavy haired people beautiful: “the reformed type” (certain families however, as the Duvantier are blond); their quarter was ravished in 1821 by a typhoid epidemic, to which succumbed pastor Rieu, and which originated without doubt from the infection of one of the wells, located near to a cemetery; it was called “the reformed disease”. One mentioned “the reformed laughter” which was more intense than that of the Danish people.
The colony conducted never ending suits with the city because of the lands, the colonists were jealous of what they considered their lawful right. They oversaw mutually their dispositions and achieved during the 19th century, thanks to a strict frugality, a general affluence despite the serious crisis around 1740, 1783 and 1816. French vitality, which, during certain too well off periods, threatened to lower morals, was disciplined partly by a reciprocal supervision, partly by a religious severity, and on this point, the action of pastor Rieu was particularly fortunate. The colony’s festivities were not many but they were cheerful, trips in summer, Christmas celebrations, etc. Certain traditional games still flourished after 1900, for instance, the breaking of the eggs at Easter (young folks would gather at a ball, young ladies brought eggs and served omelets); for carnival, boys had the privilege to chase girls out of bed beating them with a stick; in private reunions, one would draw caricatures and add verses, often quite naughty ones (this game is maybe indicative of a Belgo-Flamish origin). In the household, vegetables dominated and above all soups as a remainder of French cuisine.
Family names are still living reminders of the homeland. Of all the colonies of refugees, the colony of Fredericia is the only one to preserve family names in French; in Germany, Holland, England, they were translated into the language of the country. This can be explained by the fact that Denmark having not taken part in the wars against France, no national hatred motivated there such translations.
As for first names, those of women contrasted with those of men. As the names of French women were already found in the Danish language before 1720 and had preserved their (French) pronunciation, the integration into the Danish language did not influence the names of the women of the colony; on the other hand French male names were foreign to the Danish language; it was only after more than a century that Danish names began to penetrate the colony, where the old stock of French names was already very limited due to the dominance of certain first names in certain families which became larger and larger; during the whole of the 19th century, many children were bearing the same name, so that one had to distinguish them by nicknames which were the scourge of the colony.
The spelling of the names has remained French, thanks to zealous pastors. The pronunciation however has followed the evolution of the language of the colony; the names are pronounced in the Danish fashion, which makes them incomprehensible to a Frenchman. This pronunciation is reflected in the orthography of city papers of the 18th century; due to this ignorance of the French language the city clerk has left us a precious source for the study of the language of the colony.
In the 18th century, the spoken language was partly French and partly German; from 1800 to 1850 French was replaced by Danish; the war of 1848-50, and more though, the war of 1864 raised an aversion till then unknown for the German language and Danish became the sole language. In 1823 a German pastor was nominated, but it is only in 1922 that the first ordinary sermon was given in Danish. In the city (Fredericia was a refuge city) German played a major role in the 18th century, and it this for this reason that the evolution of the language of the colonists went through 2 stages: French-German and German-Danish. In all the other colonies one would go directly from French to the language of the country.
In the 19th century, the colony did not have a language of its own, what was spoken was an arbitrary mixture of Danish, German and French elements. Today one speaks Danish there as in the rest of the city, but individually with a French character accent. One recalls however several older people, who once used certain words or certain phrases that one does not understand any more, and which turn out to be German or French, with, of course, a deformed pronunciation.
From these almost forgotten words one can mention: the place name “Tullebjerre” a swampy field, called in the 18th century “les tourbieres”, the place name “ae kamp”, a little field (un petit champ), compared to “ae gross”, the big colonist field (from the German: gross); in 1800 these were “la campe”, “les campes”, which seem to be the Belgian form of “field” and can be found with the “Hannuyers” (“those from Hainaut”) in Brandenbourg. Another denomination of Belgian origin is “patatter”, potatoes, a word that one finds presently in Western Fyen instead of the normal Danish word “Kartofler”. The basket (French: cabas) in which one carried the young tobacco seedlings to be planted in the fields, was called “ae kabo”. The churchwarden (French: marguiller) became “ae Madlje). In the year 1900 one could still use the word “assemble”. During the same time, old folks still knew Our Lord’s Prayer in French (Sunday school was taught in French until 1840). When one of the old men was drunk, he could say “un ramoneur” (English: a chimney-sweeper) but he would correct himself immediately and say: “en Skorstensfejer”. They used expressions and small words such as “a la bonne heure, parfaitement” (ale boner, pafelemang!) (English: Well done, perfectly), “foutu” in the strange composite French-Danish-German became “ferfonfojtet” and “oh sacre”, very “in” in 1900 amongst schoolchildren, French as as well Danish, as “ow sjagger”.
A particularity specific to the Eastern Jutland is “derfor ikke”, a polite response to “Tak” (French: merci!) (English: Thank you!) whereas in the rest of Denmark one says “Aa jeg be’r” (je vous en prie) (English: you are welcome!) or “Ingen Aarsag” (French: pas de raison) (English: For nothing). The expression seems a translation, that originated from Fredericia, of the French “pas de quoi”.
The pronunciation of family names has lost all its French character because of the fact that the accent is on the first syllable and that the nasal (expression) is lost. Amongst the minor changes one must list a few examples of incorrect use of consonants and the more liberal use, than in modern French, of the consonant.
Finally, spoken Danish can be modified through certain reminiscences of the French way of speaking. Still in the 19th century the meaning of French words acted on Danish words; colonists would use the word “forfore” in all cases where a Frenchman would say “tromper” (English: to deceive, to betray, to beguile) whereas Danish people would know only its meaning as “seduire” (English: to beguile); that’s why one made fun of the strange “Danish” spoken by the colonists; small mistakes like these endured the longest when they were almost unperceived prepositions; one would hear colonists say “ve ae Himmel” instead of “paa…”, “ve ae Glas” instead of “i et Glas”, “ve Norge” for “i N.”: that’s because they used the French “a” (translated into Danish “ved”, or to Jutlandish “ve”) in many instances when Danish people would not use “ved” but other prepositions. – In the 20th century one does not find anymore semantics differences, but pronunciation habits: there is a tendancy to join (words), the incapability to perceive and to reproduce the typical Danish particularity which is the “glottal stop” replaced by the colonists quite often by an extension of the consonant or the vowel; often the ending of the sentence is rising as in French, in cases when it does not rise usually in Danish; the pitch of the voice can be much higher than the pitch of Danish people, etc.
Behind the great walls of Fredericia one can still hear a French note, quite faint and dying, but still perceivable.”
|
<urn:uuid:fd74724f-d1a7-407e-9b9b-34bb0b7e7897>
|
CC-MAIN-2022-21
|
http://www.lefebvre.ch/wp/genealogie-3/plittershagener/georg-friedrich-casimir/daenische/fredericia-kolonien/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530066.45/warc/CC-MAIN-20220519204127-20220519234127-00335.warc.gz
|
en
| 0.973012
| 4,380
| 3.296875
| 3
|
I'm grateful to citizens who spoke at the April 12 Open Space Board of Trustees meeting where ecological importance of a 308-acre parcel of CU South property was discussed. The annexation of land currently owned and managed by CU Boulder continues to move forward unaccompanied by any reasonably researched plan that would prevent irreversible destruction of ecologically important habitat. Future generations could enjoy the tranquility and abundance of this natural space, taking pride in the biodiversity fostered through sensible stewardship. The health of the habitat and diversity of species would be evidence of sustainable ecological practice in action that serves as a solid example for other educational institutions and municipalities to follow. If CU Boulder, working in collaboration with the city of Boulder, preserved the land as a publicly accessible nature preserve, the community could greatly benefit. Our own children, acting as citizen scientists, could help foster a better appreciation of the land and aid in conservation. A South Boulder Riparian Grassland Nature Preserve would be an excellent educational asset to all of the community, greatly increasing opportunities available to students of all ages in sciences and arts.
It will be a great loss indeed if attention remains mainly focused on development, rather than on best practices to restore a unique ecosystem that gravel mining and land misuse practices have greatly altered.
City of Boulder taxpayers paying for implementation of any poorly researched quick fix and for subsequent flood damage will certainly ask, "How did we get into this situation? Why did we not do better?" Allowance of an urban sprawl is certainly not any sort of land ethic to follow nor compliant with the original 1970s reclamation plan. What could soon be gone will be gone forever. It's not too late to change paths for our children's sake.
Candice Bartholomew Brown
|
<urn:uuid:791c77b3-d7d8-4c51-a061-9d163a9f573b>
|
CC-MAIN-2017-26
|
http://www.dailycamera.com/letters/ci_30938357/candice-bartholomew-brown-not-too-late-change-paths
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320707.69/warc/CC-MAIN-20170626101322-20170626121322-00597.warc.gz
|
en
| 0.943714
| 348
| 2.546875
| 3
|
MOVIE SPEECHES & JESUS
I’ve re-watched a few classic movies recently- and it strikes me as odd how many of them contain words that are probably MORE relevant TODAY than at any other time in history!
Maybe you agree… maybe you don’t… but isn’t that the nice thing about AMERICA? We can both love it and want it to succeed for the good of our families… and PEACEFULLY disagree about how we get there!
It is FINE to disagree! And it is CERTAINLY better than anyone who decides to just “sit it out”. You HAVE to stand up for what you believe in! You can do that without hurting other people, or name-calling, causing other people inconvenience or anxiety, belittling anyone and NOT LISTENING! The BEST thing you can do to serve yourself and mankind: PUT YOURSELF IN THE OTHER PERSON’S SHOES for a moment. Feel what they feel. What are their motivations? Are the motivations fear and anger? Or are the motivations hopeful and compassionate? But whatever you do, don’t just sit there.
As JESUS once said:
I know your deeds; you are neither cold nor hot. How I wish you were one or the other! So because you are lukewarm— neither hot nor cold— I am about to vomit you out of My mouth!
Revelation 3:15 & 16
NOW: BACK TO THE MOVIES….
Let’s start with something REALLY old. CHARLIE CHAPLIN in THE GREAT DICTATOR.
A few things to think about while you read this:
- Chaplin and Hitler were born within a week of one another and they both had ‘THAT” mustache.
- In the film, Chaplin (who plays a Jewish barber) gets mistaken for the Hitler character.
- The film was released in 1940… when America was still ‘at peace’ with the Nazis.
- While Hitler was trying to destroy the Jews in Europe, racial segregation was strictly enforced in much of The United States. Because of Jim Crow laws and by custom, blacks couldn’t eat at a restaurant counter along with whites. They couldn’t use the same water fountain or ride in the same part of the bus. The civil rights movement was still in its infancy. There were no laws ensuring voting rights or equal access to jobs and public facilities, and their wouldn’t be for decades.
- Released in 1940, this speech still has great meaning today.
‘THE GREAT DICTATOR’ SPEECH
“I’m sorry, but I don’t want to be an emperor. That’s not my business. I don’t want to rule or conquer anyone. I should like to help everyone – if possible – Jew, Gentile – black man – white. We all want to help one another. Human beings are like that. We want to live by each other’s happiness – not by each other’s misery. We don’t want to hate and despise one another. In this world there is room for everyone. And the good earth is rich and can provide for everyone. The way of life can be free and beautiful, but we have lost the way.
Greed has poisoned men’s souls, has barricaded the world with hate, has goose-stepped us into misery and bloodshed. We have developed speed, but we have shut ourselves in. Machinery that gives abundance has left us in want. Our knowledge has made us cynical. Our cleverness, hard and unkind. We think too much and feel too little. More than machinery we need humanity. More than cleverness we need kindness and gentleness. Without these qualities, life will be violent and all will be lost….
The aeroplane and the radio have brought us closer together. The very nature of these inventions cries out for the goodness in men – cries out for universal brotherhood – for the unity of us all. Even now my voice is reaching millions throughout the world – millions of despairing men, women, and little children – victims of a system that makes men torture and imprison innocent people.
To those who can hear me, I say – do not despair. The misery that is now upon us is but the passing of greed – the bitterness of men who fear the way of human progress. The hate of men will pass, and dictators die, and the power they took from the people will return to the people. And so long as men die, liberty will never perish. …..
In the 17th Chapter of St Luke it is written: “the Kingdom of God is within man” – not one man nor a group of men, but in all men! In you! You, the people have the power – the power to create machines. The power to create happiness! You, the people, have the power to make this life free and beautiful, to make this life a wonderful adventure.
Then – in the name of democracy – let us use that power – let us all unite. Let us fight for a new world – a decent world that will give men a chance to work – that will give youth a future and old age a security. By the promise of these things, brutes have risen to power. But they lie! They do not fulfill that promise. They never will!
Now let us fight to fulfill that promise! Let us fight to free the world – to do away with greed, with hate and intolerance. Let us fight for a world of reason, a world where science and progress will lead to all men’s happiness. In the name of democracy, let us all unite!”
Another film I would like to explore today: NETWORK
Stuff to know about NETWORK:
- It won four Academy Awards
- It’s about a news network doing poorly in the ratings until its host (Howard Beale) goes nuts and says he is going to kill himself live on the air. The network USES that for ratings. They let the crazy person on the air so they can get high ratings. It gets WAY crazier than that but it is too much to describe here! Watch the damn movie!
- [In my opinion] “NEWS” as we know it was ruined the day the networks started allowing ADVERTISING on it. Having advertisers means you need high ratings. Needing high ratings means doing what audiences react to INSTEAD of REPORTING NEWS. Now we are in a ‘the more shocking the better’ world of News-o-tainment. This movie addresses that and so much more.
- Released in 1976, this speech still has great meaning today.
So now- Without further delay, here is
HOWARD BEALE’S “NETWORK” SPEECH
I don’t have to tell you things are bad. Everybody knows things are bad. It’s a depression. Everybody’s out of work or scared of losing their job. The dollar buys a nickel’s worth. Banks are going bust. Shopkeepers keep a gun under the counter. Punks are running wild in the street and there’s nobody anywhere who seems to know what to do, and there’s no end to it. We know the air is unfit to breathe and our food is unfit to eat, and we sit watching our TVs while some local newscaster tells us that today we had fifteen homicides and sixty-three violent crimes, as if that’s the way it’s supposed to be.
It’s like everything everywhere is going crazy, so we don’t go out anymore. We sit in the house, and slowly the world we are living in is getting smaller, and all we say is: ‘Please, at least leave us alone in our living rooms. Let me have my toaster and my TV and my steel-belted radials and I won’t say anything. Just leave us alone.’
Well, I’m not gonna leave you alone. I want you to get MAD! I don’t want you to protest. I don’t want you to riot – I don’t want you to write to your congressman, because I wouldn’t know what to tell you to write. I don’t know what to do about the depression and the inflation and the Russians and the crime in the street. All I know is that first you’ve got to get mad. You’ve got to say: ‘I’m a human being, god-dammit! My life has value!’
So, I want you to get up now. I want all of you to get up out of your chairs. I want you to get up right now and go to the window. Open it, and stick your head out, and yell: ‘I’m as mad as hell, and I’m not gonna take this anymore!’
Things have got to change. But first, you’ve gotta get mad!…You’ve got to say, ‘I’m as mad as hell, and I’m not gonna take this anymore!’ Then we’ll figure out what to do about the depression and the inflation and the oil crisis. But first, get up out of your chairs, open the window, stick your head out, and yell, and say it: ‘I’m as mad as hell, and I’m not gonna take this anymore!’
ONE LAST NOTE
…from the Independence Day speech:
“We can’t be consumed by our petty differences anymore. We will be united in our common interests. You will once again be fighting for our freedom… Not from tyranny, oppression, or persecution… but from annihilation. We are fighting for our right to live. To exist.
We will not go quietly into the night! We will not vanish without a fight! We’re going to live on! We’re going to survive!”
|
<urn:uuid:1e77a205-94eb-4534-9faa-c4d1098e977f>
|
CC-MAIN-2020-10
|
https://willsnews.org/2018/12/19/movie-speeches-jesus/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145966.48/warc/CC-MAIN-20200224163216-20200224193216-00075.warc.gz
|
en
| 0.948562
| 2,138
| 2.734375
| 3
|
Estimated annual seabird captures in trawl and longline fisheries by fishery type (2003–14)
New Zealand's Environment Reporting Series: The Ministry for the Environment and Statistics New Zealand
Along with sea lions, fur seals, and dolphins, seabirds are the protected species most directly affected by fisheries in New Zealand waters (exclusive economic zone and territorial sea). Estimating seabird deaths from bycatch in commercial fishing is one way of assessing the pressure some seabird species face from current fishing practices. About one-third of our 92 resident seabird species and subspecies are considered to be threatened with extinction. We report on the risk of death from commercial fishing for 70 seabird species and subspecies. This data has been significantly revised since that reported in Environment Aotearoa 2015, with the estimated total bycatch of seabirds increasing by nearly 1400 birds (30 %) on average across the comparable years 2002/3 – 2012/13. This revision is due to an updated and more unified modelling approach being applied by the data providers. For further information about this revision please see our Marine domain 2016 webpage or Abraham and Richard (unpublished).
Ministry for Primary Industries
Creative Commons Attribution 3.0 New Zealand
Attribution 3.0 New Zealand
2003–14, New Zealand waters (territorial seas and exclusive economic zone)
|
<urn:uuid:fba02ed9-12a0-4ce6-a66c-d8262a7eae73>
|
CC-MAIN-2022-21
|
https://data.mfe.govt.nz/table/53511-estimated-annual-seabird-captures-in-trawl-and-longline-fisheries-by-fishery-type-200314/metadata/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662529658.48/warc/CC-MAIN-20220519172853-20220519202853-00484.warc.gz
|
en
| 0.875899
| 320
| 3.375
| 3
|
HAEMOCHROMATOSIS - a patient's guide
Haemochromatosis is a genetic disorder in which there is an uncontrolled absorption of iron. This article looks at the condition and what treatment is necessary.
What is it?
Haemochromatosis is a genetic disorder of iron metabolism very common in those of Celtic, Anglo and Northern European descent. Absorption of iron through the intestine is uncontrolled even when body saturation levels have been reached - the excess iron is very toxic to body organs. The consequences do not occur until this has been happening for several years.
It is a silent killer eventually causing liver cirrhosis (and cancer), heart damage, arthritis, diabetes and sexual dysfunction. Some undiagnosed iron overload sufferers, whose main symptom is fatigue, take iron tablets for years without medical advice - these supplements are a serious danger to people with haemochromatosis.
Early diagnosis and treatment prevents these complications. Those individuals with no organ damage have a normal life span Those who already have significantly damaged organs can have more serious problems and need ongoing monitoring and treatment, such as insulin for diabetes. Liver cirrhosis is associated with liver cancer, and ongoing surveillance is recommended of those so affected as some cancers can be detected early when surgery or transplant is still possible.
Blood tests that are done to check for haemochromatosis include an iron saturation test and a serum ferritin. Most affected (but not all) have an increased iron saturation of >55% (often expressed as >0.55), and/or a raised serum ferritin. The former test is more specific - the serum ferritin can be "falsely" elevated in situations of illness including infection, inflammation, cancer or liver disease.
There is a mutation in a gene, designated the HFE gene which can identify most patients with haemochromatosis. Once this abnormality is found in an individual, the diagnosis and screening of members of their family is relatively easy. More than 90% of patients with haemochromatosis are homozygotes which have two copies of this mutation, having inherited one from each parent. A heritable, but non-HFE, form of iron overload occurs in some black populations of African origin.
Haemochromatosis is common in people of northern European origin, affecting at least one in 200. More than one in ten are carriers of the condition, the latter usually without any clinical consequences. In most cases a genetic abnormality can be identified. Years ago haemochromatosis probably protected those who lost a lot of blood in battles or from childbirth. To inherit two abnormal genes, both parents of an affected person must have either 1) one copy of the abnormal gene (they are both carriers or heterozygotes), or 2) one is a carrier and the other has haemochromatosis, or 3) both parents can have haemochromatosis. Children of an affected person are all at least carriers. If the second parent is a carrier, 50% will have haemochromatosis.
Of those with abnormal iron tests (iron saturation > 0.55 and/or a raised serum ferritin), many will be homozygous with two copies of the HFE gene mutation. The gene test is useful in making the initial diagnosis, as well as detecting other affected family members. The 10% of cases without the common gene mutation have other genes or factors - some are unidentified as yet. In those diagnosed on blood iron studies and/or clinical findings with a negative gene test, a liver biopsy should be done to help confirm the diagnosis and to exclude liver cirrhosis. A liver biopsy is not needed in those with the mutation to make the diagnosis, but is done in those with a very high ferritin level and/or abnormal liver tests to check for liver damage.
First-degree relatives (parents, brothers, sisters, children) of an affected person with the HFE mutation should be screened with iron studies (saturation, serum ferritin) and the gene test. The latter is particularly useful in identifying young people who may be affected but as yet have normal iron tests.
Patient support groups have welcomed the gene test and have pushed for screening of populations at risk. However, the presence of the gene mutation does not always correlate with disease expression. There are other genetic or environmental factors, which contribute to the amount of iron loaded and any clinical consequences. Before the gene test was available, it was recommended that first degree relatives with normal Fe studies had iron tests repeated every 3 to 5 years. Obviously in a family known to have the HFE gene, the testing of other members is important and easy.
Mass screening of Europeans using iron saturation and/or ferritin tests has been proposed and is controversial. Some are dubious that such an approach would be cost effective. Others believe that the testing would prevent expensive end-stage treatments and save lives. Studies aimed at providing information re: screening are currently underway. Certainly those found to have increased iron saturation and ferritin should have the gene test performed. Those with liver disease and/or arthritis, unexplained heart disease, diabetes or cirrhosis should also be tested.
Treatment is life long, but is usually relatively simple. The aim is to reduce the total amount of body iron and then to maintain a low iron level to prevent further damage (ferritin less than 100Ug/L). This is done by regular blood removal (also known as phlebotomy or venesection), with monitoring of blood ferritin levels. Each ml of blood removed contains approximately 1 mg of iron - the body replaces the blood by drawing iron from the tissues. The amount of blood removed at each session should be no more than 10% of the blood volume (8mls/kg), and may need to be less in those with bad heart disease such as angina. How many treatments needed will depend on the rate of blood replacement and the severity of the iron overload. It is important to remove the excess iron as quickly as possible to switch off ongoing organ damage, so initially venesections should be done once or twice weekly if tolerated. Once the iron levels are low, venesections are then needed three or four times a year to maintain the body iron at a safe level.
A normal diet can then be eaten, although excessive red meat and liver should be avoided. For those with iron overload, iron tablets and vitamin C supplements which increase iron absorption should be avoided, as well raw oysters and other shellfish which can transmit a dangerous organism.
It is very likely that as many as one in 200-blood donors has undiagnosed early haemochromatosis and that their blood is currently being transfused safely. However in some countries, healthy people with haemochromatosis are retired as blood donors when the diagnosis is made. The concern when there is a financial charge for therapeutic venesections relates to the fact that the desire to donate blood is then not entirely altruistic. Other blood services allow those with early-uncomplicated haemochromatosis to donate as long as all other donor criteria are fulfilled.
Haemochromatosis Support Groups
There are support groups who can provide information to people with haemochromatosis and to general practitioners - ask the specialist in your area for the address.
|
<urn:uuid:b9807ab4-67e5-4945-a28c-a45b63d3286e>
|
CC-MAIN-2018-09
|
http://www.ponsonbymedical.co.nz/article/haemochromatosis-a-patients-guide
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811795.10/warc/CC-MAIN-20180218081112-20180218101112-00351.warc.gz
|
en
| 0.948214
| 1,524
| 3.671875
| 4
|
Personal boundaries are a collection of physical and psychological limitations that individuals require to maintain a sense of privacy and autonomy in their day-to-day lives. While what defines acceptable limits for personal boundaries varies from individual to individual and also from culture to culture, common themes exist. Increasing levels of portable and easily accessible communications technology have also served to add stress to the ability to maintain acceptable levels of distance and privacy within society.
Included in the concept of personal boundaries is the concept of acceptable behavior in social groups. Both religious and political beliefs as well as levels of economic and social status in a group will create a unique set of personal boundaries for each individual. What may be entirely tolerable for one person as a subject of conversation may be intolerable for another. Such violations of personal boundaries often remain hidden unless the offended individual is willing to face rejection and admit that the behavior is unacceptable to him or her.
Spatial empathy, or the study of proxemics, is one aspect of personal boundaries that is immediately apparent when individuals intermix in unfamiliar social settings or cultures. Human beings retain a personal space, or bubble of territory, around themselves as they move about, with a psychological claim to it as their own. When this is intruded upon, it can be a violation of personal boundaries. Proxemics is the study of how this space is defined by individual cultures, and includes not only individual space, but also the space allotted to distinguish homes and towns from one another as well.
Citizens of the US and Northern Europe tend to define a larger personal space than people of other cultures, which is the distance close enough to shake hands, or about 2.5 feet (0.8 meters), whereas Latin American or Middle Eastern concepts of personal space can be less than 1 foot (0.3 meters). This has the net result of social encounters where those with larger defined spaces back away from those with more narrowly defined spaces, who are compelled to continually move in closer, creating discomfort for both groups. By contrast, some Asian cultures like that of Japan demonstrate an even larger personal space, where the practice of bowing requires at least three feet (0.91 meters) of distance from the other individual.
The merging of acceptable personal boundaries involves nonverbal communication, such as hand gestures and body movements, which are known to be a large part of how human beings convey emotions. Nonverbal communication is used to communicate personal boundaries in one of two ways. Either it is composed of symbolic gestures meant to establish levels of assertiveness such as a thumbs up gesture, or a raised fist, which can be a bullying gesture used to limit someone else's personal boundaries. Such communication can also be composed of conversational gestures coordinated with speech to convey an increased sense of meaning and group solidarity.
Environmental psychology suggests that when an individual has mixed into a culture or social group that is different from his or her own, it is his or her obligation to adapt his or her personal boundaries to more closely align with those of the group, at least on a temporary basis. At the same time, most social psychology recommendations are for individuals to be more vocal in expressing their comfort level and values with regard to boundaries since the natural inclination is to suppress them. When such boundaries are rebuilt however, it can often lead to failed relationships, as strong differences prevent close interaction.
|
<urn:uuid:6616127b-002e-4160-895e-0596fc92bbdb>
|
CC-MAIN-2014-35
|
http://www.wisegeek.com/what-are-personal-boundaries.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535925433.20/warc/CC-MAIN-20140901014525-00416-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.955651
| 673
| 3.609375
| 4
|
International Committee of the Red Cross
Who we are
What we do
Where we work
War & Law
Treaties, States Parties and Commentaries
Treaties and Documents
Geneva Conventions of 1949 and Additional Protocols, and their Commentaries
Historical Treaties and Documents
Convention (I) for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field. Geneva, 12 August 1949.
Chapter VII : The distinctive emblem
Chapter VII contains the provisions relating to the use and protection of the distinctive emblem. It reaffirms the protective functions of the emblem and clarifies the restrictions on its use. The word ‘distinctive’ is used to describe the emblems in both their protective and indicative forms.
Article 38 confirms that the red cross or red crescent on a white ground is the distinctive emblem to be used by the medical service of a country’s armed forces.
Article 39 sets out how the emblem is to be used by the medical service of the armed forces.
Article 40 elaborates on those articles by describing the means of identification, armlets and identity cards, and their necessary or ideal characteristics. The measures set out in this article are designed to enable permanent medical and religious personnel of the armed forces to be identified as such on the battlefield or when they fall into enemy hands, so that they may benefit from the respect and protection due to them by virtue of Article 24.
Article 41 stipulates that the red cross or red crescent emblem on a white armlet may also be worn by the auxiliary medical personnel covered in Article 25.
Article 42 details how, and under whose control, the emblem as a protective device should be displayed on military medical units and establishments that enjoy respect and protection under Article 19 of the Convention. It requires Parties to the conflict to ensure, subject to military considerations, that the emblem is clearly visible to the enemy armed forces.
Article 43 governs the marking of medical units of National Red Cross and Red Crescent Societies or other voluntary aid societies of neutral countries that have been authorized to lend assistance to a Party to the conflict in accordance with the provisions of Article 27.
Article 44 reiterates the general rule that the emblem may only be used as a protective device for the marking of medical units and establishments, personnel and material as laid down under the First Convention, as well as, where relevant, under the other Geneva Conventions and their Additional Protocols. Importantly, the article also sets out the circumstances in which the emblem may be used as an indicative device by National Red Cross and Red Crescent Societies and, furthermore, permits the ICRC and the International Federation of Red Cross and Red Crescent Societies to make use of the emblem at all times.
Lastly, it should be noted that Articles 53 and 54 in Chapter IX deal with the misuse of the distinctive emblems and that the present chapter is complemented by Article 18 of Additional Protocol I and its Annex I.
- The red lion and sun emblem, which is also mentioned in Article 38 of the Convention, has not been used by any State since 1980. An additional emblem – the red crystal – was created by Additional Protocol III of 2005. It is subject to the same rules as the original emblems.
Who we are
What we do
Where we work
War & law
Working for the ICRC
Doing business with the ICRC
Israel and the occupied territories
Global Partnership for Humanitarian Impact and Innovation
Republic of Korea (Korean)
Humanitarian law and policy
L'humanitaire dans tous ses états (French)
Somalia (English and Somali)
© International Committee of the Red Cross
|
<urn:uuid:660cfaea-468b-419f-b477-ee491e021168>
|
CC-MAIN-2017-30
|
https://ihl-databases.icrc.org/applic/ihl/ihl.nsf/COM/365-570047?OpenDocument
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424931.1/warc/CC-MAIN-20170724222306-20170725002306-00339.warc.gz
|
en
| 0.905988
| 761
| 2.9375
| 3
|
What is the “Whip around” Strategy?
Whip around is a simple closure activity by which teachers can objectively analyze the quantity and quality of the students’ comprehension of the lesson. Though it does not allow for individual assessment, the whip around technique is a great way to identify the presence of gaps in understanding. It serves as an indicator i.e. whether to proceed or to re-teach the topic and is also used to generate ideas, thoughts and solutions in the class.
Whip around the classroom:
Whip around is fun and easy to use within the classroom. The teacher will initially pose an open ended question to the class. There is no right or wrong answer here and students are instructed to write down their thoughts on the same. Following this, the teacher will whip around or walk around the classroom randomly calling out on students to voice out their thoughts. Students are instructed to strike down similar answers and others are encouraged to share their unique thoughts with the rest of the class.
Once the answers are shared, teachers can have a quick review of the material and correct any mistakes or misunderstandings if any.
Here are some ideas to make the technique more interesting for students.
1) Up and down: Once the ideas or answers are noted down, the teacher will instruct the entire class to stand in their seats. They are then instructed to sit down if someone presents the same idea as written by them and to continue standing if their answer does not come up. As the teacher whips around the class, randomly picking students to read their notes, students will listen to each other and sit as and when their answers are named out. This method facilitates attentiveness of the class and allows the teachers to hear all the ideas.
2) Poll method: The teacher randomly calls out 3-5 students and quickly writes their answers on the board. The teacher then reads out the first answer listed down and asks the students with the same answer to raise their hands. The number of students is counted and written next to the answer. Students with ideas not in the list are then instructed to raise their hands, and the same are listed down. Writing down the thoughts facilitates retaining and recalling the information clearly.
3) Answer or pass: As the teacher whips around, students are encouraged to answer or say “pass” if they do not have an answer. Students with same answers are allowed to repeat the same and are encouraged to add something extra to the discussion. For students who previously said “pass”, a few minutes is given to come up with something new and to present to the class.
Whip around is a one question tool that helps to clear misconceptions, understand the level of comprehension and assists in planning out the next class. It’s a great way to get students involved in what is being taught.
Discuss here: What are some ways in which you make your lesson interactive?
Learn more: Take a course
|
<urn:uuid:67ed6fdb-49e5-4ca0-83fb-b25bceede514>
|
CC-MAIN-2016-44
|
https://k12teacherstaffdevelopment.com/tlb/what-is-the-whip-around-strategy/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00252-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.967014
| 602
| 3.90625
| 4
|
CAPE CANAVERAL, Fla. – Astronauts aboard the International Space Station opened the hatch and floated inside a Space Exploration Technologies’ Dragon capsule on Saturday, the first privately owned spaceship to reach the orbital outpost, NASA said.
Running ahead of schedule, station commander Oleg Kononenko and flight engineer Don Pettit opened the hatch to Dragon just before 6 a.m. EDT (1000 GMT), NASA mission commentator Josh Byerly reported from Mission Control in Houston.
The bell-shaped capsule, which was making its second test flight, arrived at the space station on Friday.
The crew wore protective masks and goggles, but the interior of Dragon, which is 350 cubic feet (10 cubic metres), about the size of a large walk-in closet, proved clean.
“There was no sign of any kind of (debris) floating around,” Pettit radioed to Mission Control.
“It kind of reminds me of the cargo capability that I could put in the back of my pickup truck. And the smell inside smells like a brand new car,” Pettit added.
Dragon is carrying about 1,200 pounds (544 kg) of food and other supplies for the station, all non-essential items because NASA and Space Exploration Technologies, or SpaceX, did not know beforehand if it would actually make it to the station.
Following Tuesday’s launch aboard a SpaceX Falcon 9 rocket from Cape Canaveral Air Force Station in Florida, Dragon had to demonstrate that it could be commanded and controlled by operators on the ground as well as by the orbiting space station crew.
Dragon and SpaceX mission control in Hawthorne, California, aced two days of precision flying and systems tests, clearing the way for Dragon to fly within reach of the station’s 58-foot (17.7 meter) robot arm on Friday.
Astronauts snared the capsule at 9:56 a.m. EDT (1356 GMT) Friday as the two spacecraft zoomed around the planet at 17,500 mph (28,164 kilometers per hour). It was anchored into a berthing port on the station’s Harmony connecting node a few hours later.
“You made history today and it firmly locked us into place and locked the future direction of the American space program in place,” NASA administrator Charlie Bolden radioed to the crew later on Friday.
NASA’s use of commercial spaceships to fly cargo – and eventually astronauts – to and from the station will “revolutionize the way we carry out space exploration,” Bolden added.
SpaceX and a second company, Orbital Sciences Corp, hold NASA contracts worth a combined US$3.5-billion to fly cargo to the station.
Orbital plans to debut its Antares rocket and Cygnus capsule later this year.
NASA is reviewing proposals from at least four firms, including SpaceX, seeking funding under a related program to develop spaceships for flying astronauts as well. Awards are expected in August.
“This event isn’t just a simple door opening between two spacecraft — it opens the door to a future in which U.S. industry can and will deliver huge benefits for U.S. space exploration,” the Space Frontier Foundation, an advocacy group, said in a statement.
Since the retirement of the space shuttles last year, the United States is dependent on Russia to fly crews to the station, a US$100-billion project of 15 nations. It hopes to break the Russian monopoly, which costs NASA about US$400-million a year, in 2017.
Once unloaded, Dragon will be filled with about 1,300 pounds (590 kg) of equipment and science gear that need a ride back to Earth – the first big return load since the final shuttle flight last July.
Dragon is due to depart the station on Thursday and splash down into the Pacific Ocean about 250 miles (402 km) off the coast of southern California later that day.
– With a file from The Associated Press
Thomson Reuters 2012
|
<urn:uuid:28d6ae81-9fd9-493a-97c0-59b48da3f6e8>
|
CC-MAIN-2015-32
|
http://news.nationalpost.com/news/space-station-astronauts-enter-spacex-dragon-say-it-has-new-car-smell
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988922.24/warc/CC-MAIN-20150728002308-00315-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.925144
| 835
| 2.515625
| 3
|
The Moon prepares to cover up the star Aldebaran in this January 19 image from the Smithsonian. The two will repeat this vanishing act before dawn on July 29. [Smithsonian Staff, Phoebe Waterman Haas Public Observatory]
You are here
The crescent Moon cozies up to the star Aldebaran before dawn tomorrow. In fact, for those in parts of the United States, the Moon will get especially cozy. It’ll “occult” the star, passing directly in front of it and blocking it from view.
Aldebaran is the bright orange eye of Taurus, the bull. It’s a big, puffy star that’s nearing the end of its life. That puffiness makes it shine hundreds of times brighter than the Sun, which is why it looks so prominent.
Aldebaran lies just a few degrees from the ecliptic — the Sun’s path across the sky. So the Sun passes quite close to Aldebaran each year, at the end of May.
The Moon’s path stays within a few degrees of the ecliptic as well, so the Moon passes close to Aldebaran about once a month. And this month, it gets especially close.
As seen from the United States, Aldebaran will be no more than a degree or two from the Moon as they rise around 2:30 or 3 tomorrow morning. And for a swath of the country from about Illinois down to Texas, Aldebaran will disappear behind the top portion of the Moon’s visible crescent. It’ll remain hidden for anywhere from a few minutes to about an hour, depending on the viewing location. It’ll then reappear from behind the dark portion of the lunar disk.
For the rest of the country, the Moon will just miss Aldebaran, or the occultation will take place after sunrise. Even so, the Moon and Aldebaran will still form a beautiful pairing in the pre-dawn sky.
Script by Damond Benningfield
|
<urn:uuid:e1372a2b-6d33-440b-b23f-405db4490364>
|
CC-MAIN-2020-50
|
https://stardate.org/radio/program/vanishing-act
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141686635.62/warc/CC-MAIN-20201202021743-20201202051743-00692.warc.gz
|
en
| 0.914526
| 430
| 3.15625
| 3
|
Exhibition Dedicated to Innovation in 19th-Century America Opens at the Smithsonian American Art Museum July 15
The exhibition “The Great American Hall of Wonders” examines the 19th-century American belief that the people of the United States shared a special genius for innovation. It explores this belief through works of art, mechanical inventions and scientific discoveries, and captures the excitement of citizens who defined their nation as a “Great Experiment” sustained by the inventive energies of Americans in every walk of life.
“The Great American Hall of Wonders” will be on view at the Smithsonian American Art Museum from July 15 through Jan. 8, 2012. The museum is the only venue for the exhibition, which is organized by Claire Perry, an independent curator who specializes in 19th-century American cultural history. Until 2008, Perry was curator of American art at the Cantor Arts Center at Stanford University.
“The Great American Hall of Wonders” investigates questions that are still critical today. The exhibition reveals both the successful experiments of the past, as well as the ones that went awry, and invites today’s citizens to explore a valuable legacy left by the founding fathers: a belief in the transformative power of American inventiveness.
“‘The Great American Hall of Wonders’ examines the belief in American ingenuity that energized all aspects of 19th-century society, from the planning of scientific expeditions and the development of new mechanical devices to the painting of landscapes and scenes of everyday life,” said Elizabeth Broun, The Margaret and Terry Stent Director of the Smithsonian American Art Museum. “The museum now occupies the noble historic building that was the Patent Office’s home during the Industrial Revolution, so it is a fitting place to display this exhibition about the innovative character of Americans.”
The exhibition features 161 objects, including paintings and drawings by pre-eminent artists, including John James Audubon, Albert Bierstadt, George Catlin, Frederic Edwin Church, Winslow Homer, Thomas Eakins, Thomas Moran, Samuel F.B. Morse and Charles Willson Peale, as well as sculptures, prints, survey photographs, zoological and botanical illustrations, patent models and engineering diagrams. The exhibition explores six subjects that helped shape America during the period—the buffalo, giant sequoia and Niagara Falls represent American beliefs about abundant natural resources for fueling the nation’s progress, while inventions such as the clock, the gun and the railroad linked improvements in technology with the purposeful use of time.
Peale’s iconic self-portrait “The Artist in His Museum” (1822), which will greet visitors at the entrance to the exhibition, embodies the ideas set forth in the exhibition. Peale—museum founder, artist, scientist and inventor—depicts himself at the threshold of his museum, a democratic reinterpretation of an Old World “wunderkammer” or cabinet of curiosities. Its galleries were filled with portraits of the founding fathers, natural history specimens, mechanical inventions and a massive mastodon skeleton. At a time when many Americans feared that the country would not survive the passing of the founders’ generation, Peale insisted that it was not the revolutionary generation, but rather invention itself that lay at the heart of the national project. The next generation began to define what their democratic nation would be in their scientific and artistic descriptions of America’s bounteous nature and in mechanical inventions aimed at improving their lives.
“The United States began with an act of imagination,” said Perry. “The topic of the exhibition is not science, art or mechanical innovation per se, but rather what Americans of the 19th century believed about those endeavors and how they deployed them to direct their lives and the nation. They considered ingenuity to be their most important asset. Over the course of the century the United States as we know it came into being, and from all indications the process was a seat-of-the-pants business. As we confront the complexities of our 21st-century stewardship, knowing where we have come from may show us where we are headed.”
On July 4, 1836, President Andrew Jackson authorized the construction of a patent office where the museum’s National Historic Landmark building is located. Construction began later that year. The building was designed to celebrate American invention, technical ingenuity and the scientific advancements that the patent process represents. The museum’s building was always intended for public display of patent models that were submitted by inventors. By the 1850s, more than 100,000 people each year visited the building, which became known as the “temple of invention,” to see the designs that filled display cabinets in the exhibition galleries. In addition to patent models, the government’s historical, scientific and art collections were housed on the third floor. The Patent Office occupied parts of the building from 1840 to 1932.
An illustrated companion book, The Great American Hall of Wonders: Art, Science, and Invention in the Nineteenth Century, accompanies the exhibition. It is written by Perry and co-published by the museum and London-based publisher D Giles Limited. It is available in the museum store and online (hardcover, $65; softcover, $45).
Free Public Programs
Through a collaboration with the United States Patent and Trademark Office, the museum will present a robust series of public programs and educational outreach about today’s inventors and inventions as a contemporary complement to the exhibition. Perry will present a lecture titled “The Great American Experiment” Thursday, July 14, at 6 p.m. Additional programs include webcast public lectures, an inventors’ symposium and hands-on activities for children and families, as well as college seminars and professional development workshops for educators. Details are available in a separate press release or on the museum’s website.
A podcast featuring commentary by Perry is available on the museum’s website and through iTunes. A slideshow of selected artworks included in the exhibition with interpretive text also is available on the museum’s website.
“The Great American Hall of Wonders” is organized by the Smithsonian American Art Museum in collaboration with the United States Patent and Trademark Office. Battelle has provided important leadership support for the exhibition. Generous contributions also have been provided by Sheila Duignan and Mike Wilkins, the Raymond J. and Margaret Horowitz Endowment, Ewing Marion Kauffman Foundation, Thelma and Melvin Lenkin, Betty and Whitney MacMillan, Jean Mahoney and Robin Martin.
About the Smithsonian American Art Museum
The Smithsonian American Art Museum celebrates the vision and creativity of Americans with artworks in all media spanning more than three centuries. Its National Historic Landmark building is located at Eighth and F streets N.W., above the Gallery Place/Chinatown Metrorail station. Museum hours are 11:30 a.m. to 7 p.m. daily. Admission is free. Follow the museum on Twitter, Facebook, Flickr, ArtBabble, iTunes and YouTube. Museum information (recorded): (202) 633-7970. Smithsonian Information: (202) 633-1000; (202) 633-5285 (TTY). Website: americanart.si.edu.
# # #
|
<urn:uuid:40306cb4-efcc-4849-94d9-220365407415>
|
CC-MAIN-2013-48
|
http://newsdesk.si.edu/releases/exhibition-dedicated-innovation-19th-century-america-opens-smithsonian-american-art-museu-0
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052641/warc/CC-MAIN-20131204131732-00035-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.94999
| 1,518
| 2.859375
| 3
|
Tuesday, April 01, 2008
What Is the Open Web and Why Is It Important?
What is the Open Web?
What is the Open Web?
- Decentralization - Rather than controlled by one entity or centralized, the web is decentralized -- anyone can create a web site or web service. Browsers can work with millions of entities, rather than tying into one location. It's not the Google or Microsoft Web, but rather simply the web, an open system that anyone can plug into and create information at the end-points.
- Transparency - An Open Web should have transparency at all levels. This includes being able to view the source of web pages; having human-readable network identifiers, such as URLs; and having clear network entry points, such as HTTP and REST exposes.
- Hackability - It should be easy to lash together and script the different portions of this web. MySpace, for example, allows users to embed components from all over the web; Google's AdSense, another example, allows ads to be integrated onto arbitrary web pages. What would you like to hack together, using the web as a base?
- Openness - Whether the protocols used are de facto or de-jure, they should either be documented with open specifications or open code. Any entity should be able to implement these standards or use this code to hook into the system, without penalty of patents, copyright of standards, etc.
- From Gift Economies to Free Markets - The Open Web should support extreme gift economies, such as open source and Wikis, all the way to traditional free market entities, such as Amazon.com and Google. I call this Freedom of Social Forms; the tent is big enough to support many forms of social and economic organization, including ones we haven't imagined yet.
- Third-Party Integration - At all layers of the system third-parties should be able to hook into the system, whether creating web browsers, web servers, web services, etc.
- Third-Party Innovation - Parties should be able to innovate and create without asking the powers-that-be for permission.
- Civil Society and Discourse - An open web promotes both many-to-many and one-to-many communication, allowing for millions of conversations by millions of people, across a range of conversation modalities.
- Two-Way Communication - An Open Web should allow anyone to assume three different roles: Readers, Writers, and Code Hackers. Readers read content, Writers write content, and Code Hackers hack new network services that empower the first two roles.
- End-User Usability and Integration - One of the original insights of the web was to bind all of this together with an easy to use web browser that was integrated for ease of use, despite the highly decentralized nature of the web. The Open Web should continue to empower the mainstream rather than the tech elite with easy to use next generation browsers that are highly usable and integrated despite having an open infrastructure. Open should not mean hard to use. Why can't we have the design brilliance of Steve Jobs coupled with the geek openness of Steve Wozniak? Making them an either/or is a false dichotomy.
Why does the Open Web matter?The Open Web is like something from an Arthur C. Clarke science fiction story: its a globe spanning, hypertext network containing billions of documents, conversations, and applications, used by a huge cross section of society. Who would have thought it ever would have been successful or stayed as open as it has? It's not controlled by any one government or company. Our historical closeness to the web creates a kind of myopia, where we can't see how amazing it is. It's a billion Library of Alexandria's dropped into our laps.
Douglas Engelbart, father of much of what we have in the computer industry, including the mouse, hypertext, and groupware, thought that computers would become as fundamental to humanity as the development of writing and language have been. Language is probably only about forty-thousand years old, while writing is only about eight-thousand years old. If you pull back and take the larger view, the web and computers are part of a grand development playing out over decades around new tools for communication. Writing and language have fundamentally changed our sense of self, with positive and negative ramifications; computers and the web hold the same promise, though it will take decades for this to play out.
If the web and computers hold this promise, its important to keep the resulting system as open and accessible as possible. Do we want a system that devolves into something like Ancient Egypt, with an authoritarian force controlling and centralizing the water supply? Many archaeologists believe that deep control of access to water, literally something required for life, lead to the longest known authoritarian civilization in history, lasting for thousands of un-broken years. For example, what if the pencil and paper had never escaped the grasp of the Church? If we can keep the open web nimble and open, it can set the stage to fuel further innovations and inventions, just as writing and language gave rise to books, social polities, etc.
How Can We Support the Open Web?If we agree that the Open Web is important, how do we create a way to update the web and keep it relevant? The U.S. Constitution, for example, includes special provisions to evolve itself and stay relevant. Even with its warts, the U.S. is now the world's oldest and continuous republic.
The web's existing update mechanisms just don't work. It takes years for new features to go from proposal to show up across enough browsers to be used consistently; this is a recipe for fail if we want the web to exist as a long-term entity, rather than a one-hit wonder.
I joined Google to help with a project known as Gears. Gears is an open source plug-in that teaches current web browsers new tricks. Gears is a clever way to raise the bar cross-browser and cross-platform, today, running inside of Firefox and Internet Explorer on Windows, Mac OS X, and Linux. No more waiting years for features to show up across all browsers and platforms.
I want to look back five years from now and say that I worked with the community to build an open source update mechanism for the web. Why can't we rev the base infrastructure of the web much quicker, plus create more robust, open extension points along the entire web stack, ala Greasemonkey? Is Gears the answer to this? I'm not sure, but its the best answer we have today. Gears is a great way to get the conversation started, plus get HTML 5 out to today's browsers.
On a more prosaic level, Gears gets the following features into today's browsers without waiting years, ready to use by web devs right now:
- A real embedded relational database (SQLite) for web sites
- Client-side full text search
- Offline web applications
- Secure and fast cross-domain mashups
- Desktop shortcuts
- Better web APIs for mobile devices
- and more.
[Disclosure: I work with the Gears team]
Subscribe to Posts [Atom]
|
<urn:uuid:14a1ebab-1f17-4a62-bc88-47c65bdcf460>
|
CC-MAIN-2018-43
|
http://blog.codinginparadise.org/2008_04_01_archive.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514443.85/warc/CC-MAIN-20181022005000-20181022030500-00475.warc.gz
|
en
| 0.922472
| 1,480
| 3.265625
| 3
|
Difference Between Aluminum and Galvanized Steel
Aluminum vs Galvanized Steel
Difference between aluminum and galvanized steel is obtained by comparing the properties of both. Aluminum is a metal, and it has all the attributes of metal – that are: It is ductile, corrosion resistant, flexible and a good thermal conductor. Aluminum is also weather resistant, and can be machined, thinned into wires and sheets or soldered. Aluminum makes alloys in conjunction with other metals, and aluminum alloys are known for their lightweight and cost effective properties. Whereas galvanized steel is obtained, carbon steel is dipped in molten zinc which clings onto the steel like a thin film. Steel is an alloy of iron, and known for its strength, and used as a construction or building material. It can corrode, and in order to make it anti corrosive the galvanization process of steel is necessary. An Italian Luigi Galvani invented this process to ensure that steel can be saved from corrosion or rust by a coating of zinc.
The galvanization process for carbon steel produces various affects which helps in manufacturing various parts of industrial objects, and it is available in various forms. Galvanized steel is also used for building housing frames, truck and bus bodies, household appliances, electrical towers, metal pails, and for other various items integral for our usage in daily life.
Aluminum has a low density, which results in a higher heat exchange when compared to galvanized steel. In various industrial apparatuses, aluminum is preferred over galvanized steel due to its increased performance and light weight. The low density of metal helps it to be a better thermal conductor. Where weight is concerned, aluminum versus galvanized steel wins. Its quality to be lightweight, an efficient heat transferrer, its cooling and defrosting properties, as well as its cost effective advantages, make it a better material than steel.
Aluminum products are also preferred over galvanized steel due to their anti bacterial properties and easy to clean nature, especially when there is foodstuff involved. As compared to hard and smooth aluminum surfaces, galvanized steel surfaces are porous and rough, which can hold and accumulate bacterial growth and contaminate food processing.
Galvanized steel is the ideal material to be used for those industrial processes where caustic soda and potassium hydroxide are involved, since galvanized steel has zinc film which is resistant to mild alkaline solutions; more than aluminum. Aluminum and galvanized steel are both compatible with each other, and adjacent to each other in the galvanic scale. There are many aluminum understructures with galvanized steel exteriors built over the past half century.
1. Aluminum is a metal, whereas galvanized steel is obtained by a hot dipping process in which carbon steel is dipped into zinc.
2. Galvanized steel has a porous and rough surface which is difficult to clean.
3. Aluminum surfaces are hard and smooth, which helps eliminate bacteria growth with an easy cleaning method.
4. Aluminum and galvanized steel are both compatible with each other.
5. Aluminum is preferred for its lightweight, anti corrosive and thermal conductivity properties, whereas galvanized steel is heavier and more expensive.
Search DifferenceBetween.net :
Email This Post : If you like this article or our site. Please spread the word. Share it with your friends/family.
See more about : Aluminum, metal, steel
Leave a Response
Written by : Jilani. and updated on April 19, 2010
Jilani. "Difference Between Aluminum and Galvanized Steel." DifferenceBetween.net. April 19, 2010 < http://www.differencebetween.net/object/difference-between-aluminum-and-galvanized-steel/ >.
|
<urn:uuid:00c282dc-7cfc-4633-abdb-ed03b49aebd7>
|
CC-MAIN-2014-23
|
http://www.differencebetween.net/object/difference-between-aluminum-and-galvanized-steel/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510275463.39/warc/CC-MAIN-20140728011755-00029-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.940805
| 771
| 3.265625
| 3
|
American Women’s Literature
A Story of Resistance
---A Tentative Study of “A White Heron”
In “A White Heron,” an alternative to a civilized world dominated by men and based on their values and interests decided is provided. Jewett has weaved several irreconcilable conflicts between the masculine world represented by the unnamed hunter and the far away village, an artificial women Utopian world Sylvia is living in. Those conflicts between two competing sets of value in later nineteenth-century can be listed as follows: material/spiritual, industrial/rural, scientific/instinctual, civilized/nature, sophisticated/innocent and masculine/feminine. Sylvia unconsciously finished her spiritual journey of choosing the latter ones over the formers. It is a strenuous journey resisting to the young hunter’s money and himself who is epitome both of the outside material world and possible heterosexual love, which is more fascinating for a girl on her way to her puberty. A nine years old girl, Sylvia (Latin word for woods) lives with her grandmother in a farm after moving from “a crowded manufacturing town” where she had stayed for eight years. She seems to be the one with nature, without human playmates, but rather she is more comfortable when she plays with her animal companies throughout the farm. She is so happy that “she never had been alive at all before she came to live at the farm.” Furthermore, Sylvia’s natural world is an entirely female world. There is no man can be found anywhere in her grandmother’s farm. The actual reason why her grandmother chose her from “houseful of children,” is Sylvia’s “afraid of folks. Her grandmother assures her of that she won’t be troubled with them in “the old place.” The only thing in town Sylvia often thought is the wretched geranium. In my opinion, it is a symbol standing for Sylvia herself. She probably before identified herself as a wretched geranium, lonely standing in the yard too. Now Sylvia is in her natural paradise, she feels so sorry to the geranium that “she thought often with wistful compassion.” Another important image is “the great red-faced boy.” Sylvia was scared by him or in other words, by a male. Again why the boy has a red-face? According to archetypes theory, the color red symbolically means “violent passion.”(Guerin et al. 161) All of these clues show that what Sylvia has done before is to resist the urban, male-dominated world and their heterosexual passion. She chooses the rural over the urban. She prefers her grandmother’s Eden without an Adam to the normal world. On the road of driving her cow Mistress Molly home in a summer evening, Sylvia feels the shoal water’s cool touching, listens to the thrushes, birds and beasts “with a heart that beat fast with pleasure.” The scene in the woods is peaceful and pleasant. Sylvia feels “as if she were a part of the gray shadow and the moving leaves.” At that time, she meets a young hunter seeking to find a rare bird named heron. Although Sylvia at first thought the hunter is frightful, she leads him back to her grandmother’s cottage. He is warmly received by her grandmother, Mrs. Tilley, who “gossiped frankly” that her son Dan gone to California and never writes back. Contrary to Sylvia, Mrs. Tilley keeps to stay in this no-man paradise passively. “I’s ha’ seen the world myself if it had been so I could,” she said. However, the hunter did not pay much attention to her complaints. That reflects in a masculine world on certain degree men tend to ignore women’s requirements. What they focus is their own interests and desires. Now, that is the bird a white heron. When Mrs. Tilley boasts that “There ain’t a foot o’ ground she don’t know her way over, and the wild creature’s counts her one o’ themselves,” the man immediately interested in Sylvia. He explains he is an ornithologist and spent his whole vacation searching for a rare bird heron around here. And the hunter would offer ten dollars for the...
|
<urn:uuid:4bee6807-fac5-4dcb-a63c-1c6fea0a019c>
|
CC-MAIN-2016-50
|
http://www.studymode.com/essays/An-Essay-On-a-White-Heron-1343567.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542680.76/warc/CC-MAIN-20161202170902-00140-ip-10-31-129-80.ec2.internal.warc.gz
|
en
| 0.967512
| 919
| 2.71875
| 3
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.