text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
1.08k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
Torah Is a Tree of Wisdom 1Happy is the one who has not walked in the advice of the wicked, nor stood in the way of sinners, nor sat in the seat of scoffers. 2But his delight is in the Torah of Adonai, and on His Torah he meditates day and night. 3He will be like a planted tree over streams of water, producing its fruit during its season. Its leaf never droops— but in all he does, he succeeds. 4The wicked are not so. For they are like chaff that the wind blows away. 5Therefore the wicked will not stand during the judgment, nor sinners in the congregation of the righteous. 6For Adonai knows the way of the righteous, but the way of the wicked leads to ruin.
<urn:uuid:4a52f035-8cc1-4c7e-a83b-f0ba41bad9c8>
CC-MAIN-2018-34
https://www.bible.com/bible/314/PSA.1.tlv
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210133.37/warc/CC-MAIN-20180815141842-20180815161842-00366.warc.gz
en
0.971353
166
2.671875
3
The 7.2-magnitude temblor in Turkey killed an estimated 582, adding to the 780,000 quake-related deaths over the past decade. Roughly three times that number likely suffered nonfatal injuries from some of the worst earthquakes on record, Susan A. Bartels, MD, and Michael J. VanRooyen, MD, both of the Harvard Humanitarian Initiative in Boston, reported online in The Lancet. Many of the deaths stemmed from brain or spinal cord trauma, followed by another round of deaths in the first several hours from injuries such as subdural hematomas, liver or spleen lacerations, and pelvic fractures. A third peak in mortality after an earthquake occurred in the days and weeks afterward from sepsis, multisystem organ failure, and disseminated intravascular coagulation from crush injuries. These findings came from review of 123 articles on earthquake-related morbidity and mortality in the medical literature from 1990 to 2010, though many had only anecdotal data. Massive earthquakes, like the 9.0 that hit Japan in March and the 9.1 in Indonesia that caused a deadly tidal wave in 2004, can have a mortality rate of 1% to 8%, with a ratio of one death to three injured survivors across many studies. Musculoskeletal quake injuries most commonly occurred as lacerations (65%), fractures (22%), and soft-tissue contusions or sprains (6%). Broken bones were reported as open fractures in 11% to 54% of cases and complicated by neurovascular injury in 6%. More than one-third were multiple breaks, with bones frequently in three or more pieces. Crush injuries with systemic complications occurred at a rate of about 2% to 15% after major earthquakes. Because resulting acute kidney problems can be lethal, people pulled from the rubble should be triaged with urine dipsticks to check for myoglobin and subclinical rhabdomyolysis, and they should receive aggressive fluid resuscitation despite initially normal vital signs. Whether to cut fibrous connective tissue to relieve some of the internal pressure from crush injuries is controversial. Some argue that it improves circulation and reverses muscle necrosis, but others see such possible benefits outweighed by the infection risk. Amputation of crushed limbs also is controversial, Bartels and VanRooyen noted in the paper. "Because necrotic tissue can release large amounts of myoglobin, potassium, and tissue thromboplastin, retention of a non-salvageable limb can be life-threatening," they explained. "Necrotic tissue can also serve as a nidus for infection and sepsis." Yet amputation often doesn't improve outcome, and the procedure itself is associated with mortality (P<0.001), opponents counter. One report concluded that even severely crushed limbs can recover full function, so amputation should be reserved for cases when a limb is already almost completely severed or when a trapped limb puts the patient's life in jeopardy. "Realistically, the correct approach to amputation will probably be dependent on the specific setting and local context," the reviewers suggested, pointing to factors like surgical capacity, number of causalities, and types of injuries sustained in a quake. Aside from the immediately apparent injuries, heart attacks have been seen to rise in the weeks after an earthquake. After the Northridge, Calif., quake in 1994, acute myocardial infarctions were up 35% compared with the prior week. Arrhythmias, strokes, and even blood pressure have been shown to rise afterward as well in various studies, perhaps due in part to stress and to interruptions in access to medications. Interruption in the supply of water and sanitation services, along with overcrowding in shelters after quakes, can also bring on epidemics of respiratory and water-borne illness, as with the cholera outbreak after the major quake in Haiti. Acute stress disorder is common after an earthquake, often followed in the weeks after by depression. But post-traumatic stress disorder was generally less common after natural disasters than after other types of disasters, with a frequency reported at 3.3% to 81% after earthquakes. Children and the elderly are especially vulnerable populations, the reviewers noted. The researchers reported having no conflicts of interest. Zalman S. Agus, MD Emeritus Professor University of Pennsylvania School of Medicine and Dorothy Caputo, MA, RN, BC-ADM, CDE, Nurse Planner
<urn:uuid:6b2a3403-7b6a-4049-a6ac-37377d474385>
CC-MAIN-2017-39
https://www.medpagetoday.com/emergencymedicine/emergencymedicine/29439
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689192.26/warc/CC-MAIN-20170922202048-20170922222048-00172.warc.gz
en
0.954826
937
2.96875
3
On May the 11th and 12th, our European Wilderness Society team member Gudrun Pflüger took more than 50 kindergarten kids between the age of three and six of the pedagogic kindergarten in Bischofshofen in the province of Salzburg, Austria out on the wolf trail. Gudrun was hired by the Health Initiative AVOS, a prevention program for staying healthy; exposing already the kids to the importance of a conscious way of living. The wolf combines all the ‚pillars’ important for a healthy life: movement, awareness, social competence and ‚natural food’- The little ones first got a peek into Gudruns film documentary “searching for the coastal wolves”, learning that wolves do not automatically see humans as a good dinner. Getting into nature Then, they were finding their way to the forest through their nose, sniffing and following ‚markings’ made from the ‚rose’wolf (who sprayed on elevated and pronounced places her disgusting intense deodorant a la ‚rose’). Along the way they also learned how wolves are moving (‚walking in a line’), how dangerous a hunt for the wolves is and how they can avoid being kicked by the hooves of the deer or moose. In between the groups came together for howling sessions and had their smart lunch. Smart, because the snacks should be healthy. At the end, they could cut out their own wolf mask, provided by the European Wilderness Society. This whole outdoor program was accompanied by students of the kindergarten pedagogic school, who eventually will take their own kids groups out on the trail of the wolf. Hence the seed is planted…
<urn:uuid:82f1104e-7f76-4819-9cb1-07246afda753>
CC-MAIN-2022-05
https://wilderness-society.org/kiddies-walk-the-wolf-way/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301063.81/warc/CC-MAIN-20220118213028-20220119003028-00399.warc.gz
en
0.958133
358
2.890625
3
Concentrating photovoltaic (CPV) is a solution that is gaining attention worldwide as a potential global player in the future energy market. Despite the impressive development in terms of CPV cell efficiency recorded in the last few years, a lack of information on the module's manufacturing is still registered among the documents available in literature. This work describes the challenges faced to fabricate a densely packed cell assembly for 500× CPV applications. The reasons behind the choice of components, materials, and processes are highlighted, and all the solutions applied to overtake the problems experienced after the prototype's production are reported. This article explains all the stages required to achieve a successful fabrication, proven by the results of quality tests and experimental investigations conducted on the prototype. The reliability of the components and the interconnectors is successfully assessed through standard mechanical destructive tests, and an indoor characterization is conducted to investigate the electrical performance. The fabricated cell assembly shows a fill factor as high as 84%, which proves the low series resistance and the lack of mismatches. The outputs are compared with those of commercial assemblies. A cost breakdown is reported and commented: a cost of $0.79/Wp has been required to fabricate each of the cell assembly described in this paper. This value has been found to be positively affected by the economy of scale: a larger number of assemblies produced would have reduced it by 17%.
<urn:uuid:b08151be-3e91-4da4-bf1b-7502c5ab06ce>
CC-MAIN-2017-04
http://solarenergyengineering.asmedigitalcollection.asme.org/article.aspx?articleID=2499445
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280723.5/warc/CC-MAIN-20170116095120-00118-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950675
278
2.546875
3
Jacob lived in Egypt for 17 years. He blessed Joseph and Joseph’s sons Ephraim (the younger) and Manasseh (the older) in that order. Jacob asked Joseph to take an oath to bury him in the hold land. Jacob blessed all his sons, each obtaining a role as a tribe. Judah will produce leaders, Levi will produce priests, Issachar will produce scholars, Zebulun will produce seafarers, Simeon will make schoolteachers, Gad will make soldiers, Judges will come from Dan, Asher will produce olive-growers. Reuben is criticized for confusing his father’s marriage bed. Simeon and Levi are criticized for the massacre at Shechem and for what they did to Joseph. Benjamin is blessed with the ferociousness of a wolf, and Joseph is blessed with fertility and beauty. Jacob is buried in Machpelah Cave in Hebron. Joseph dies at the age of 110. He also wishes his bones would be buried in the Holy Land. Joseph tells of the covenant of G-d, that the Israelites will be remembered and brought up out of Egypt to return to the Holy Land.
<urn:uuid:6f7e85cd-44c4-4cd6-a173-fd4335720b65>
CC-MAIN-2022-49
https://www.levshalomaz.org/vayechi/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710690.85/warc/CC-MAIN-20221129064123-20221129094123-00222.warc.gz
en
0.955972
252
2.96875
3
Letter O > O is for Ocean | Seashore > Crafts > 3-D Octopus Windsock & other links Numbers > Counting 1 to 8 Holidays and Events April > Int'l Week of June > Zoo and Aquarium Month Seasons > Summer Here are some activities to learn about the octopus a fascinating and intelligent ocean creature. Print as many of the learning aids and crafts the materials page to prepare for the presentation and activities. Activity #1: Observe Visit this link to see realistic pictures of octopuses. Click on the images to enlarge. Activity #2: Discuss Facts about the Octopus Using this coloring page read some very basic facts about the octopus. Point to body areas as you mention them. Activity #3 - Alphabet Letter O is for Octopus Activities Visit the link provided for detailed suggestions and printable activities for a letter O Octopus presentation. Activity #4: Printable Craft-3D Skills: Tracing-Pre-writing skill, Counting 1-8 and scissor cutting skills Print the template. Ideas: Print on white paper or directly on a light/pastel paper or construction paper This craft offers the opportunity to practice scissor cutting skills, counting 1 to 8 and tracing dotted lines a pre-writing skill. Step 1: Tracing Ask the children to trace with a crayon along the dotted lines first. Step 2: Counting 1 to 8 *The octopus is great to practice numbers one to eight because it has *Count the legs on the template. Count the eight suckers (ovals) on one of the legs. Step 3: Color/Paint and Decorate the Template The children can color or paint the template. Provide a variety of materials to do this: sponges, cotton balls, brushes, markers, pastels etc. Once the picture is dry (speed up drying with a hair dryer) proceed to the next step. Idea: Encourage the children to use the color orange that starts with the letter O for and Orange Octopus - use a variety of orange crayon shades or mix red and yellow to obtain different shades with Step 4: Scissor Cutting Once the octopus is decorated, children can cut it out with preschool scissors. This is an easy project to start practicing cutting straight lines. There is no age specific guidelines for when a child can accomplish this. The sooner the child is allowed to use scissors (ages 2.5 approx) the sooner he/she will master the skill. Use your discretion to do this type of activity and it should be supervised. Indicate to the children to cut just outside the straight dotted lines. Ideally make a presentation and show a finished product so they have an idea of what it looks like. Step 4: Assemble the craft Apply glue to the "lip strip" and glue to the inner side of the paper. You may add a handle with a piece of yarn or ribbon on the sides (as the illustration shows) and tape in place. Special Events & Occasions: June is Zoo and Aquarium Month - Idea: Make plans to visit an aquarium and see a real octopus! The Rainbow Fish by Marcus Pfister has a wonderful octopus character that teaches Rainbow Fish some wonderful lessons about sharing. Visit DLTK's Rainbow Fish Book Break for further ideas and activities for this TP Roll Octopus 3+ *materials to color or paint with
<urn:uuid:dfc32f97-609c-4a7d-bcaf-1ab32a5fff08>
CC-MAIN-2015-14
http://www.first-school.ws/activities/animals/ocean/octopuswindsock.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131293580.17/warc/CC-MAIN-20150323172133-00161-ip-10-168-14-71.ec2.internal.warc.gz
en
0.831993
769
4.03125
4
Q: I recently had a severe case of sciatica after a long plane trip. Why did this happen and how can I prevent it from happening again? A: It sounds like you may indeed have sciatica caused by your long plane trip. Sciatica is a condition in which pain is felt along the path of the sciatic nerve, which runs from the lower spinal cord through the buttock and leg to the foot. It is the longest nerve in the body, but sciatic pain is usually caused by pressure over the first few inches. Sciatica is the result of irritation of or pressure on the sciatic nerve, usually at the point where it leaves the spinal cord.A bulging or herniated disc is the most common cause, but muscle spasms in the same area are also a frequent cause. Bone growths or spurs on the vertebrae sometimes cause irritation. A herniated disc, but not muscle spasms, can be detected with imaging tests. It's easy to see, especially if a contrasting dye is injected around the spinal cord. Bone spurs can be detected by X-rays, but CT scans or MRIs may be required. But other factors can cause sciatica, even pressure on the nerve from a back-pocket wallet or sitting too long in one place. If this is the first time you've had this pain, it may be due to external pressure. But because it lasted so long, I suspect your problem was caused by something more serious. If you didn't visit your doctor or a neurologist to have this episode of your pain evaluated, it may be too late to determine the exact underlying cause. Surgery may be the best option for treating sciatica caused by bone or disc problems. But for these and other causes, the best approach is to first try medicines to ease the severity of the pain and changing behavior to limit the irritation or pressure causing the pain. Nerve blocks are essentially regional or local anesthetics and effective only in the short term. Weak lower back muscles and poor posture, whether sitting or standing, can cause sciatica or make it worse. So a regular program of appropriate exercise maintained over time is probably the best way to prevent sciatica in the future. There are many sources of information about the type of exercises that are most beneficial. Because you have had such a long bout of sciatica, it would probably be prudent for you to get professional help to know what to do and what not to do. If a herniated disc is in fact the source of your problem, surgery is always a consideration. Many people are understandably anxious about nervous system surgery because of the possibility of irreversible damage. But the procedure is now considered quite safe. There are several ways to do the surgery, each of which has its own risks and benefits. Before you decide, please make sure you fully explore and understand the benefits and risks of each, as well as the experience of the surgeon. In the meantime, when you next fly, try to sit up straight, change positions occasionally and get up and stretch from time to time. Plan ahead and get an aisle seat to make this easier. Write to Dr. Douma in care of the Chicago Tribune, Room 400, 435 N. Michigan Ave., Chicago, IL 60611.
<urn:uuid:fb50133d-63ce-4461-8ee3-f2c1e08101ed>
CC-MAIN-2016-18
http://articles.chicagotribune.com/2000-05-03/news/0005040086_1_sciatica-sciatic-nerve-spinal-cord
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860123151.14/warc/CC-MAIN-20160428161523-00116-ip-10-239-7-51.ec2.internal.warc.gz
en
0.959028
688
2.71875
3
Trivia: Influenza History – See If You Know It! About one hundred years ago, the world experienced one of the most deadly scourges in history — the 1918 influenza pandemic. Do you know which of the following are true of the 1918 pandemic? - More people died from it than from battle wounds in WWI. - It started in the U.S. - It was called “Spanish flu.” - Scientists did not know what caused it at the time. - None of these - Two of these - All of these The answer is (g): All of these. Calculating exactly how many people were infected and died from influenza during the 1918 pandemic is difficult for a variety of reasons; however, most estimates suggest that more people died from the pandemic than on the battlefields during World War I (WWI). The fact that the war was ongoing during the pandemic provides an interesting opportunity to explore the intersection of science and society. For example, because of the war, most countries hid the fact that the disease was widespread and they were losing soldiers to the illness. Because Spain was neutral, reports coming from that country more accurately depicted the severity of influenza circulating at the time. As a result, many people incorrectly believed that the pandemic started in Spain, oft referring to it as the “Spanish flu.” Historians and scientists now believe that the pandemic actually started in the U.S. — in Haskell County, Kansas. Interestingly, at the time of the pandemic of 1918, scientists did not know what caused influenza. Some believed Bacillus influenzae (known today as Haemophilus influenzae) caused the illness because that bacteria could be found in the lungs of some who had died from the disease during autopsies. However, scientists later realized that a virus was causing influenza. Influenza virus was isolated in the early 1930s, and influenza type A, the type that causes pandemics, was identified in 1933. The Vaccine Education Center at Children’s Hospital of Philadelphia (VEC) has been educating about the science of vaccines for almost two decades. During this time, we have developed a variety of materials that may be of interest for your classroom, to share with the community or for your own family’s vaccination needs. We hope you will take a few minutes to see what we have to offer: For the classroom The Vaccine Makers Project (VMP) is the classroom program of the VEC. The dedicated website, www.VaccineMakers.org, offers a variety of free lessons about the immune system, infectious diseases and vaccines. Influenza-related classroom resources include: - A lesson about Influenza and HIV that focuses on viral replication and how these two viruses use genetic variability as a means of adaptation - An eight-minute film clip about how Dr. Maurice Hilleman discovered antigenic shift and drift as well as predicted the 1957 influenza pandemic - A 3 ½-minute animation that describes how influenza viruses undergo antigenic shift and drift (also part of the eight-minute clip above) - Animation Expedition #9 – Antigenic shift and drift: How does influenza adapt? - "How Diseases Spread" lessons - Two lessons that teach about the spread of disease and the 1918 Pandemic About influenza and the vaccine The VEC offers a variety of materials for the public and healthcare providers to address common questions and concerns related to influenza disease and vaccines, including: - Influenza: What You Should Know — One in a series of Q&A sheets that address common vaccine and vaccine-safety questions. - Just the Vax: Influenza — A series of 10 trivia questions related to influenza; find additional question sets and an online game in the Just the Vax educator toolkit, and on the Vaccine Makers Project page on Kahoot!, a popular online trivia platform. - A Look at Each Vaccine: Influenza Vaccine — Web-based information. - Can a Flu Vaccine Give You the Flu? — This video is part of the Talking about Vaccines with Dr. Paul Offit series. - How Are Strains of Influenza Chosen for the Annual Vaccine? — This video is part of the Parents PACK Science Made Easy series. Stay up to date Vaccine Makers Project updates offer periodic updates for educators. Sign up. The Parents PACK program offers monthly updates for parents and the public. Sign up.
<urn:uuid:34ffb016-de70-4d21-918b-3b36fd4da8b5>
CC-MAIN-2023-50
https://www.chop.edu/pages/trivia-influenza-history-see-if-you-know-it
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00834.warc.gz
en
0.949493
934
3.078125
3
Few nutrients have as broad and critical a role as zinc. Considering this crucial mineral, the age-old image of two kids whispering to each other through cans — connected by a string — comes to mind. Zinc is the string, without which the body's "voices" can't be heard. Zinc is the nutritional version of a modern-day satellite or cell tower that allows the rapid-fire communication to which we're so accustomed. In addition to serving as a messenger and catalyst, zinc plays a central role in growth. It's linked to the production of testosterone, regulation of blood sugar and insulin and is important for proper vision, prostate and thyroid function. Zinc helps our bodies utilize fats, managing immune function and controlling inflammation. Studies show that many people with HIV and AIDS are zinc deficient. When malaria-infected African kids supplemented zinc, they more easily overcame the disease. Zinc is the most commonly deficient nutrient among American kids, leaving them more susceptible to infectious disease. Deficiency may worsen with age, especially given the typical American intake of processed foods, which are especially low in the nutrient. Estimates are that 80 percent of pregnant women worldwide may be zinc deficient, possibly leading to complications. Like many nutrients and plant foods, zinc affects the signaling of cells and plays a regulatory role in hormone release and genetic "behavior." In short, zinc is a player in the brave new world of nutrigenomics — how nutrients and diet affect our genes. Good zinc sources include oysters, beef, turkey, wheat germ and pumpkin seeds. Google "pumpkin seed recipes" to find numerous ways to prepare them. Pumpkin seeds, aka pepitas, are tasty when flavored and toasted. Once the seeds are separated from the pumpkin's flesh, rinsed, dried, lightly oiled and salted, consider other flavors such as curry, Cajun or your favorite powdered herb blends to lend some zing along with your zinc. Michael Altman is a nutritionist at Ventana Wellness and the Centre for Natural Healing. He teaches at Southern Oregon University and College of the Siskiyous. E-mail him at firstname.lastname@example.org
<urn:uuid:a4453a8f-8902-4bca-805a-1b1328214fc4>
CC-MAIN-2015-32
http://www.mailtribune.com/apps/pbcs.dll/article?AID=/20091123/OREGONHEALTHYLIVING/911210323/-1/OREGONHEALTHYLIVING12
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990217.27/warc/CC-MAIN-20150728002310-00103-ip-10-236-191-2.ec2.internal.warc.gz
en
0.937564
454
3.046875
3
if it is known, for a continuous differentiable function f(x), f'(c)=0 and f''(c)=0, what can be concluded about the graph of f(x) at x=c ? 1. The tangent to the curve is horizontal 2. There must be a point of inflection 3. The curve must be a straight line because the curvature is 0 4. There is an extremum and a point of inflection and the same place 5. The curve must be a straight line if the derivatives are 0 There may be more than 1 correct answer. I am having a hard time thinking any of them are true. I know that 5 would make sense but not if the equation is x^4 since the derivative of that at 0 would be 0. When it says the tangent to the curve is horizontal is it talking about just at that point of c? Thank you for the help!
<urn:uuid:dec102b8-60a7-4c93-94fc-407709063c83>
CC-MAIN-2014-23
http://math.stackexchange.com/questions/310568/what-can-be-said-about-this-function-based-on-the-derivative-being-0
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997859240.8/warc/CC-MAIN-20140722025739-00188-ip-10-33-131-23.ec2.internal.warc.gz
en
0.958019
192
2.734375
3
LOS ANGELES -- Biologists are looking for answers to explain why a huge number of baby sea lions are turning up starving and near death on Southern California's coastlines. The number of sick and dying sea lions admitted to rescue centers has topped 1,400 so far this year, said Sarah Wilkin, the marine mammal stranding coordinator for the National Oceanic and Atmospheric Administration. That number is five times the normal amount of sick baby sea lions for this time of year. "Nobody was quite prepared for the scope of this," said Wilkin. "The major common factor for all these stranded pups is that they're coming in emaciated, dehydrated, basically starving. They have been unable to find enough food to sustain themselves." Sea lions live on a diet of small fish like anchovies and sardines. Marine biologists are trying to understand what's happening inside the ocean to drive the sea lion pups onto the shore. Dave Koontz, SeaWorld’s director of communications, said that baby sea lions come inland in search of food when they can't find enough to eat in the ocean. There might be depleted levels of the type of fish that sea lions eat, or changing water temperatures or currants could be driving the small fish away into different areas. There may also be a disease that has wiped out the bait fish population. Koontz said it is typical to see some stranded baby sea lions, but that they have rescued an unprecedented number of pups this year. "As a point of reference, we rescued 131 marine mammals (including sea lions and other marine mammals) in 2012, which is an average year," he said. "This year alone, we’ve rescued more than 350, and of that, about 330 have been sea lions. It’s been an extremely unusual year." Once rescued, the baby sea lions have a good chance of recovering and being returned to the wild.
<urn:uuid:bb39478b-909e-4553-9246-659c39572834>
CC-MAIN-2016-40
http://www.pri.org/stories/2013-04-28/why-are-young-baby-sea-lions-dying-california
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661779.44/warc/CC-MAIN-20160924173741-00165-ip-10-143-35-109.ec2.internal.warc.gz
en
0.960114
400
2.8125
3
|This article needs additional citations for verification. (January 2010)| Countertop (also counter top, counter, benchtop, (British English) worktop, or (Australian English) kitchen bench) usually refers to a horizontal worksurface in kitchens or other food preparation areas, bathrooms or lavatories, and workrooms in general. It is frequently installed upon and supported by cabinets. The surface is positioned at an ergonomic height for the user and the particular task for which it is designed. A countertop may be constructed of various materials with different attributes of functionality, durability, and aesthetics. The countertop may have built-in applicances, or accessory items relative to the intended application. In Australian English, the term counter is generally reserved for a surface of this type that forms a boundary between a space for public use and a space for workers to carry out service tasks. In other contexts, the term bench or benchtop is used. - 1 Kitchen countertops - 2 Materials - 3 Sink installation - 4 References - 5 External links The common fitted Western-style kitchen, developed in the early 20th century, is typically an arrangement of assembled unit cabinetry covered with a more-or-less continuous countertop work surface. The "unfitted" kitchen design style exemplified by Johnny Grey may also include detached and/or varied countertop surfaces mounted on discrete base support structures. Primary considerations of material choice and conformation are durability, functionality, hygienics, appearance, and cost. When installed in a kitchen on standard (U.S) wall-mounted base unit cabinets, countertops are typically about 25-26 inches (635–660 mm) from front to back and are designed with a slight overhang on the front (leading) edge. This allows for a convenient reach to objects at the back of the countertop while protecting the base cabinet faces. In the UK the standard width is 600mm (Approximately 24 inches). Finished heights from the floor will vary depending on usage but typically will be 35-36" (889–914 mm), with a material thickness depending on that chosen. They may include an integrated or applied backsplash (UK: upstand) to prevent spills and objects from falling behind the cabinets. Kitchen countertops may also be installed on freestanding islands, dining areas or bars, desk and table tops, and other specialized task areas; as before, they may incorporate cantilevers, freespans and overhangs depending on application. The horizontal surface and vertical edges of the countertop can be decorated in manners ranging from plain to very elaborate. They are often conformed to accommodate the installation of sinks, stoves (cookers), ranges, and cooktops, or other accessories such as dispensers, integrated drain boards, and cutting boards. Countertops can be made from a wide range of materials and the cost of the completed countertop can vary widely depending on the material chosen. The durability and ease of use of the material often rises with the increasing cost of the material but some costly materials are neither particularly durable nor user-friendly. Some common countertop materials are as follows: - Natural stones - Silicate mineral - Crafted glass - Manufactured materials - Processed slabs - Compressed paper or fiber - Cultured marble - High pressure laminates - Post-formed high-pressure decorative laminates - Self-edged high-pressure decorative laminates - Quartz surfacing or engineered stone is 99.9% solid @ 93% aggregate / 7% polyester resin (by weight), colors and binders - Recycled Glass surface either with concrete or polyester resin binders - Solid-surface acrylic plastic materials - Solid-surface polyester acrylic - Cast-in-place materials - Natural stone suspended in a resin - Post-consumer glass suspended in a resin - Phenolic resin Natural stone is one of the most commonly used materials in countertops. Natural stone or dimension stone slabs (e.g. granite) are shaped using cutting and finishing equipment in the shop of the fabricator. The edges are commonly put on by hand-held routers, grinders, or CNC equipment. If the stone has a highly variegated pattern, the stone may be laid out in final position in the shop for the customer's inspection, or the stone slabs may be selected by experienced inspectors. Emerging technology allows for virtual stone placement on a computer. Exact photographs can now be taken which allow for the integration of a dxf file to lay on top of an stone image. . Multiple slabs of material may be used in this layout process. Then the countertop assembly is installed on the job site by professionals. Commonly, initial countertop fabrication takes place at or near the quarry of origin, with blocks being sawn to thickness and then machined into standard widths (600mm and upwards), before being surface polished and edged. This method removes the need to ship waste material, and reduces the time needed to prepare client orders. This practice is called "cut to size" A wide range of details may be pre-machined by the fabricator, allowing for installation of different sinks and cooker designs. A common drawback to natural stone is the need for sealing to prevent harboring of bacteria and/or fluids that may cause staining. In recent years oleophobic impregnators have been introduced as an alternative to surface sealers. With the advent of impregnators the frequency of sealing has been cut down to once every five to ten years on most materials. Wooden countertops can come in a variety of designs ranging from butcher block to joined planks to single wide stave. Wood is considered to be the most eco-friendly option when it comes to choosing a kitchen countertop as wood is a renewable resource. Wood countertops must be thoroughly cleaned and disinfected after contact with foods such as raw meat. Although the use of wooden work surfaces is prohibited in commercial food production areas in the EU, and the US Department of Agriculture advises against the use of wooden chopping boards, research by the Food Research Institute at the University of Wisconsin has shown that wooden work surfaces are no more dangerous, and in some cases safer than plastic alternatives. They have shown that while bacteria do get absorbed by the wood, they do not multiply and eventually die. While brand new plastic work surfaces are indeed easy to disinfect, once they have become heavily knife scarred they are nearly impossible to completely disinfect. This is not a problem with wooden work surfaces where the number of knife cuts made little difference. Post-formed plastic laminate "Postformed" (or literally "formed after being laminated" to the substrate) high pressure laminate countertop, often referred to as "plastic laminate countertop" is a material made more of wood product than plastic. The composition is of kraft paper, decorative papers, and melamine resins, bonded through high heat and pressure. This product is sometimes referred to as "Formica" or "Arborite," but these are trade names of a manufactured high pressure laminate, of which there are many manufacturers. The postform countertop is typically a high volume factory-produced product, which accounts for the economy of the product. The material composition consists of a single thin sheet of laminate (typically .030" - .040" in thickness) that gets bonded to a 45# density particle board substrate (or other similar base material such as MDF - medium density fiberboard, or plywood), with a PVA adhesive (poly vinyl acetate - a water-based adhesive). Traditionally postform countertops were manufactured with a solvent-based contact cement (a highly flammable, volatile organic compound - VOC). However, in today's marketplace PVA adhesives have taken over for reasons of environmental responsibility (no VOC's), safety (non-combustible), economy, and strength of the glue line. A typical system consists of the following: - An automated infeed system for sequencing the particle board into production. - The CorFab Machine, an automated feed-through machine that cuts to size, cuts and bonds build down sticks with a hot melt adhesive to the under side of the substrate, and shapes the edge detail, all in a single motion. - An automated laminating system that applies the adhesive to both the substrate and laminate. - An indexing unit that aligns the laminate to the substrate with the proper overhang. - A Pinch Roller that makes the bond between the laminate and substrate. - The Postforming Machine, that not only heats and forms the laminate around the substrate, but also cuts away the backsplash (when the top is to be used against a wall) from the main deck, all in a feed-through motion machine. - The AutoCove Machine, which heats and forms the backsplash upward 90 degrees, locking it into place with what is referred to as a cove stick, utilizing hot melt adhesive technology to hold it all together. - The final stage of the system usually consists of a trim saw that cuts the countertops to rough lengths, typically 8', 10' and 12', ready for distribution. Once manufactured the tops need only to be cut to length, mitered, fitted for assembly, and end capped (only if it is a visible finished end). A very specific machine for cutting the postform countertop is manufactured by only a few companies, it is commonly called a Cutting Station, Top Saw, or simply Miter Saw. This machine accurately cuts the countertop to field dimensions, making it easy for the installer to make the final scribe cuts on-site to complete the work. Sink cut outs can be made either in the field or at the installers shop. Overall, the postform countertop is the most economical countertop on the market, and has the broadest selection of surface material to choose from. Surfaces can be either a solid color, or a pattern, and textures range from a satin funiture finish to a heavily textured stone or pebbled appearance to a high gloss resolution. Because of this diversity, the postform countertop can satisfy a wide variety of design applications, and due to its economy, it can be easily replaced to provide a fresh appearance in any room. Self edge or wood edge laminate Self or wood edge plastic laminate countertops are also very popular for those who chose to have few or no surface seams. In this style, the top shop uses substrate for the countertop out of MDF, or particle board and then glue sheets of laminate to the substrate using Contact Cement. The laminate is then trimmed using a router. This method can't reproduce the curved contours of post-formed countertopping but can be made to easily conform to a much-wider range of floor plans with fewer seams. Custom architectural crafted glass, tempered glass, textured glass pieces, and the ancient art of verre églomisé, or reverse gilded glass, are applied to contemporary uses including countertops, backsplashes, and tabletops. Glass work may be customized to suit by craftsmen in the studio, then installed on site either in small components (such as a kitchen countertop composed of three rectangles of verre églomisé) or as immense, single units (for example, a glass countertop and sink basin formed of one continuous piece of textured glass). Surface texture comes in several variations, such as sanded, melted, pixels, and linear. Glass countertops also often have customized edges, including: bushed polished, textured, and fire polished edges. The glass is non-porous, relatively stain-proof, extremely hygienic, and "extremely heat resistant (up to 700 degrees)." Much work is being done to "recycle" glass using sources such as post consumer glass or post industrial float glass. The material can be crushed or cut into strips that is heated until the softening point of glass, binding the loose material back into a solid form. Solid surface materials Solid surface acrylic or polyester materials are usually prefabricated at the installer's shop and then assembled on site. The material is readily glued and the glue joints are then sanded, leaving almost no visible trace of the joint. The edge treatment for solid-surface countertops can be very elaborate. The material itself is usually only about 12 mm (1/2 inch) thick so an edge is usually created by stacking up two or three layers of the material. The built-up edge then can be shaped to a rounded edge or an ogee. Fancier edge treatments are more expensive. Engineered quartz surfacing Engineered stone quartz surfacing is made from approximately 95% natural quartz and 5% polymer resins (by weight). Testing has shown that they retain much of the toughness of quartz but display increased ductility due to the resin, improving impact resistance. Countertops are custom made and more scratch resistant as well as less porous than natural quartz surfaces, and don't need to be sealed like other stone surfaces. Due to the presence of the resins, quartz counters are less prone to staining. Thicknesses may be 6mm, 1.2 cm (1/2 inch), 2 cm (3/4 inch), 3 cm (1¼ inch) or 4 cm (1½ inch). Brands include CMMA Solid Surface by World BMC, Hanstone, NaturaStone, Silestone, Q, Caesarstone, Technistone, Cambria, and Zodiaq. Concrete may be utilized as a surfacing material in one of several forms: cast-in-place (in which the fabricator creates forms atop the previously installed cabinetry, places, and then finishes the material in situ), custom precast ( in which the fabricator creates site templates, duplicates the pattern in a production facility offsite, and installs the finished product atop the cabinetry), and the machining of pre-manufactured gauged slabs (similar to natural stone fabrication). Concrete, especially precast, lends itself to a high degree of customization due to the phase-change nature of its creation, filling a specific form with a fluid material which hardens (through mineral hydration) to a durable cast stone. Color choices, edge styles, three-dimensional sculpting, and integral features such as sinks, drainboards, and decorative embedments are design options which may be incorporated. Due to its site-specific and generally handmade nature, concrete countertops are often produced by small shops and individual artisans although there are several large-scale manufacturers of gauged slabs. Cultured marble countertops are man made vanity tops that have the appearance of and resemble real stone marble. Cultured marble countertops are made by mixing high strength polyester resin and real marble stone dust. The combination is then formulated with additional chemicals and poured into a cast mold. These molds can ultimately produce bathtubs, whirlpool decks, shower pans, window sills, and even vanity tops. The finished material is significantly less expensive than natural marble and four times stronger than natural stones such as granite or marble. The process of using a mold also allows the fabricated countertops to have features such as different surface textures and a vast array of colors which natural stone can not. Cultured marble countertops are aesthetically pleasing and a more economical and durable alternative to real stone marble. Stainless steel, stone, terrazzo, bamboo, and other materials are usually prefabricated and assembled on site as well. The difficulty of prefabrication rises with the more exotic materials. As with solid-surface synthetic materials, the edge treatments can vary widely, but the material is usually thicker so there is often no need to build up the edge with multiple layers of the material. Many predesigned, prefabricated units (including sinks, drainboards, and other accessories) are available in stainless steel. These may be used "stand-alone" or integrated into larger custom assemblies. Some stainless steel systems stand on integrated legs and do not require the support of cabinetry. In any of these styles, "self-rimming" sinks can be used. They are mounted in templated holes cut in the countertop (or substrate material) using a jigsaw or other cutter appropriate to the material at hand and are suspended by their rim. The rim forms a close fit, reinforced with a sealant, on the top surface of the countertop, especially when the sink is clamped into the hole from below. Most materials also allow the installation of a "bottom-mount" or "under-mount" sink. With these, the edge of the countertop material is exposed at the hole created for the sink (and so must be a carefully finished edge rather than a rough cut; this cut is generally done at the fabricator's workshop). The sink is then mounted to the bottom of the material from below. Especially for under-mount sinks, silicone-based sealants are typically used to assure a waterproof joint between the sink and the countertop material. The advantage of an "under-mount" sink is that it gives a contemporary look to the kitchen but the disadvantages are extra cost in both the sink and the counter top. Solid-surface plastic materials allow a third option: sinks made of the same plastic material as the countertop can easily be glued to the underside of the countertop material and the joint sanded flat, creating the usual invisible joint and completely eliminating any dirt-catching seam between the sink and the countertop. The disadvantage is that the sinks do not have the same impact resistance of stainless or cast iron and may differentially expand and contract with extreme temperature change (as might be caused by a pot of hot water dumped into the sink). In a similar fashion, with stainless steel, a sink may be welded into the countertop; the joint is then ground to create a finished, concealed appearance. - "Countertop Materials in Home Counters". CounterTop Guides. Retrieved 6 April 2012. - "Kitchen Countertop Options". HomeimproveMentor.com. Retrieved 6 April 2012. - Work Stand With Miter Saw David E. Henry - "Kitchen Countertops: Various Materials". Battaglia Imports. Retrieved 6 April 2012. - "Granite Countertops". CounterTop Guides. Retrieved 6 April 2012. - "Glass Table Top Edge Styles". 14 July 2014. Retrieved 11 August 2014. - "Kitchen Cabinets: What's Hot Right Now". The Sexy Kitchen. Retrieved 2008-02-19. - "The Qualities of Quartz Surfacing", Ed Rogers, CSI and Brenda Little, CSI, JD, LEED AP, The Construction Specifier, February 2009 - "Quartz as a kitchen countertop material". Retrieved 2012-06-21. - "Quartz Countertops: Why Quartz is Gaining Popularity". Scott Jenkins. Retrieved 2008-06-08. - "How Are Concrete Countertops Made?". ConcreteNetwork.com. Retrieved 6 April 2012. - "Concrete Countertops". Portland Cement Association. Retrieved 6 April 2012. - International Surface Fabricators Association, a nonprofit trade organization
<urn:uuid:1af44ae6-d1fa-4104-8e70-ad3c554abe08>
CC-MAIN-2015-06
http://en.wikipedia.org/wiki/Countertop
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115856087.17/warc/CC-MAIN-20150124161056-00111-ip-10-180-212-252.ec2.internal.warc.gz
en
0.928713
3,985
2.515625
3
What causes unsteady gait? 21 possible conditions Walking is typically a smooth motion created by putting one foot in front of the other. Unless you’re walking on an uneven surface, your walking pattern should feel steady and even. However, your walking pattern is no longer smooth if you have an unsteady... Read more Walking is typically a smooth motion created by putting one foot in front of the other. Unless you’re walking on an uneven surface, your walking pattern should feel steady and even. However, your walking pattern is no longer smooth if you have an unsteady gait. It may be shuffling, uneven, or feel otherwise unstable. An “unsteady gait” has many potential causes that range from temporary to long term. An unsteady gait can increase your risk for falls and injury, so it’s important to seek medical help for more serious causes of this symptom. Doctors may also describe an unsteady gait as an “ataxic” gait. This means the person is walking in an abnormal, uncoordinated, or unsteady manner. An unsteady gait can encompass several different symptoms. Examples include: - dizziness or vertigo when walking - shuffling when walking - instability, or lacking balance People with a chronically unsteady gait often have a wide stance when walking. They may walk slowly and exhibit caution when walking, and may even stumble. Many disorders and contributing factors cause an unsteady gait. According to the Cleveland Clinic, there are often multiple causes of an unsteady gait. These include: - alcohol intoxication - cardiac arrhythmia - cervical spondylosis - congestive heart failure - coronary artery disease - diabetes mellitus - foot disorders - hearing impairment - hepatic encephalopathy - human immunodeficiency virus (HIV)-associated neuropathy - lumbar spinal stenosis - multiple sclerosis - muscle weakness or atrophy - orthostatic hypotension - Parkinson’s disease - peripheral arterial disease (PAD) - peripheral neuropathy - sleep disorders - substance abuse - thromboembolic disease - vestibular disorders - visual impairment - vitamin B12 deficiency Taking four or more medications at a time is also associated with increased risk for an unsteady gait. Prescription medications such as these are also associated with increased risk for an unsteady gait: Seek immediate medical attention if you suddenly experience an unsteady gait coupled with any of the following symptoms: - a fall with injuries or a fall on your head - cannot speak clearly - difficulty breathing - drooping on one side of the face - loss of bladder or bowel control - occurs after a head injury - severe, throbbing headache - sudden confusion - sudden numbness in one or more body parts Make an appointment to see your doctor if you have recently experienced a fall or your unsteady gait makes you feel as if you may fall. Taking action is vital to keeping you safe and reducing the risk of future injury. Your doctor will first take a medical history and ask you about what medications you are taking. It’s also important to report if you have a history of falls or near falls, as well as any alcohol consumption history or use of recreational drugs. Your doctor will also evaluate your gait to view how you are walking. He or she may ask you to walk toe to heel. Other considerations are stance, step length, and if you need help when walking. Your doctor may classify your gait using a scale known as the Functional Ambulation Classification Scale. This scale rates your gait on a zero to five scale, with five being a person who can walk independently and without assistance from others. A doctor will then consider if you have related symptoms that may require additional tests. These can include: - blood pressure checks in a lying, seated, and standing position - blood testing for hemoglobin levels, thyroid function, electrolytes, blood glucose, and vitamin B12 tests - cognitive function testing - depression screening - hearing tests - vision tests Testing and diagnostic methods vary because there can be many causes of an unsteady gait. Treatments for an unsteady gait depend upon its causes. A doctor may prescribe medications to reduce an unsteady gait if you have the following conditions: - orthostatic hypertension - Parkinson disease - rhythm disorders - vitamin B12 deficiency Some conditions may require surgery to correct the unsteady gait cause. These include spinal conditions, such as lumbar spinal stenosis. Other treatments can include hearing aids for hearing problems, canes or walkers to aid in walking, and vision correction through glasses or a new glasses prescription. Some people may even benefit from physical therapy services that help them learn how to walk with a foot problem, such as foot numbness. Because an unsteady gait increases your risk for falls, it’s important to evaluate your home. Here are some steps you can take: - Take care to remove all objects from walkways. Examples include shoes, books, clothing, and papers. - Make sure your walkways are well lit. You may wish to place nightlights in wall outlets to ensure that your path is visible. - Place nonslip mats on your bathtub floor as well as where you step outside the tub. You can also place nonskid, adhesive strips on the tub floor. - Always wear nonskid shoes when walking inside your house to reduce your fall risk. - Keep a flashlight at your bedside and use it if you need to get up at night. - Gait abnormalities. (2015). Retrieved from http://stanfordmedicine25.stanford.edu/the25/gait.html - Mayo Clinic Staff. (2014, May 28). Parkinson’s disease. Retrieved from http://www.mayoclinic.org/diseases-conditions/parkinsons-disease/basics/definition/con-20028488 - Preventing falls among older adults. (2013, September 23). Retrieved from http://www.cdc.gov/features/olderamericans/ - Salzman, B. (2010, July 1). Gait and balance disorders in older adults. American Family Physician, 82(1), 61-68. Retrieved from http://www.aafp.org/afp/2010/0701/p61.html - Watson, S. (2012, July 23). A sluggish, unsteady walk might signal memory problems. Retrieved from http://www.health.harvard.edu/blog/a-sluggish-unsteady-walk-might-signal-memory-problems-201207235047 - What is ataxia? (n.d.). Retrieved from http://www.hopkinsmedicine.org/neurology_neurosurgery/centers_clinics/movement_disorders/ataxia/conditions/ See a list of possible causes in order from the most common to the least. Click to add a symptom to your list - Top Symptoms
<urn:uuid:330880de-7331-4a73-abd9-cb6fc3dcc573>
CC-MAIN-2017-22
http://www.healthline.com/symptom/unsteady-gait
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608984.81/warc/CC-MAIN-20170527171852-20170527191852-00125.warc.gz
en
0.882446
1,544
3.40625
3
Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed at raising awareness about data privacy and protection practices among businesses as well as internet users. In this blog series, we’ll attempt to do the same. This first blog post will shed light on data privacy as a whole, important data privacy laws, and some data collection practices that can help you adhere to these laws. What is data privacy? Every organization collects some data from consumers, customers, prospects, or employees. They do this to maintain records of their customers, gain a deeper understanding of the market, or identify ways to improve individuals’ experiences. This data can be anything that pertains to an individual such as their name, Social Security number, date or place of birth, mother’s maiden name, location, race, ethnicity, religion, genetic data, or biometric records or even medical, educational, financial, or employment information. Data privacy, or information privacy, deals with the proper handling of this data by enforcing protective measures and focusing on complying with data protection regulations. Every business, big or small, must pay attention to and take responsibility for how they collect, store, manage, and share consumer data. The history of Data Privacy Day Data Privacy Day is celebrated on January 28 every year to honor the introduction of the first binding international treaty, Convention 108, that protected individuals against intrusive data collection and the processing of personal data. It also sought to regulate the trans-frontier flow of personal data. The Council of Europe launched Data Protection Day in order to raise awareness and promote privacy and data protection practices among organizations. This was later adopted by other countries. Currently, Data Privacy Day is observed in the United States, Canada, Israel, and 47 other European countries. Now that you know what Data Privacy Day is all about, let’s take a look at some landmark data privacy regulations and laws. Complying with data privacy laws Many countries have laws to protect the privacy rights of their citizens. Organizations within these countries’ jurisdictions are required to comply with these laws failing which they may face legal action. Below, we’ve covered a few important data privacy regulations: General Data Protection Regulation (GDPR) The GDPR is a regulation on data protection and privacy in the European Union (EU) and the European Economic Area (EEA) aimed at enhancing an individual’s control and rights over their personal data. It also addresses the transfer of personal data outside the EU and EEA areas. This regulation is directly binding and applies to any enterprise processing the personal information of individuals inside the EEA regardless of the enterprise’s location and the individuals’ citizenship or residence. As of 2021, the United Kingdom also follows the law. Adopted on April 14, 2016, the GDPR quickly became a precedent for laws across the world, including in Turkey, Mauritius, Chile, Japan, Brazil, South Korea, South Africa, Argentina, and Kenya. For more information on meeting GDPR compliance requirements, check out our security admin’s survival guide for the GDPR. California Consumer Privacy Act (CCPA) The CCPA, adopted on June 28, 2018, has many similarities with the GDPR and is a state law intended to enhance privacy rights and consumer protection for residents of California, United States. Under this law, organizations are required to “implement and maintain reasonable security procedures and practices” in protecting consumer data. The CCPA applies to any business, including any for-profit entity that collects individuals’ personal data, that does business in California, subject to criteria specified in the Act. Check out our free e-book, A simple guide to the CCPA, to learn more. California Privacy Rights Act (CRPA) The CRPA, proposed in November 2020, is an extension of the CCPA. The proposition enshrines more provisions in California state law, allowing consumers to prevent businesses from sharing their personal data, correct inaccurate personal data, and limit businesses’ use of sensitive personal information such as their location, race, ethnicity, religion, genetic data, and private communications. The CRPA will take effect on January 1, 2023, applying to personal data collected on or after January 1, 2022. Gramm-Leach-Bliley Act (GLBA) The GLBA is another law in the United States which mandates that all financial institutions must have a policy in place to protect consumer information from foreseeable threats in security and data integrity. It also enforces consumers’ rights to privacy by requiring financial institutions to provide a privacy notice that explains what the company gathers about the client, where this information is shared, and how the company safeguards it. Health Insurance Portability and Accountability Act of 1996 (HIPAA) HIPAA is a United States federal law that mandated the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. Assessing data collection practices: Are you observing these fair information practices? Despite today’s data-driven world, ensuring data privacy requires minimized data collection. As a first step towards that, companies should implement practices to limit what’s being collected and why. Many data privacy regulations, such as the GDPR and the CCPA, are built on the Fair Information Practice Principles, a set of eight guidelines that can greatly help organizations prudently collect data and comply with privacy laws. The Fair Information Practice Principles are: Collection limitation: A limited amount of personal data should be collected. Data quality: Only data relevant to the stated purpose should be collected. This data should be accurate and up to date. Purpose specification: The purpose of collecting the data should be specified. Use limitation: Data shouldn’t be used for purposes other than what was specified. Security safeguards: Data should be protected from risks such as loss, unauthorized access or use, destruction, modification, or disclosure. Openness: Personal data collection and usage shouldn’t be kept secret from individuals. Organizations should be open about what data is being collected, its purpose, and where it’s stored. Individual participation: Individuals have the right to know who has their data, have their data communicated to them, know why a request for their data is denied, and have their data modified or removed. Accountability: Organizations that collect data should be held accountable for implementing these principles. In the next part of this blog series, we’ll be discussing the challenges in securing personal information and how to overcome them.
<urn:uuid:f14d6698-ce19-49ca-96d9-44cb20ab6bd2>
CC-MAIN-2022-21
https://blogs.manageengine.com/it-security/it-security-passwordmanagerpro/2022/01/27/data-privacy-day-part-1-what-you-need-to-know-about-data-privacy.html?utm_source=Zcampaigns&utm_medium=nlmail-news&utm_campaign=ME-Newsletter-COMMON&utm_term=february2022
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662578939.73/warc/CC-MAIN-20220525023952-20220525053952-00107.warc.gz
en
0.914694
1,380
3.484375
3
In 1876 the United States declared war on the Sioux in order to obtain the Black Hills in what is now South Dakota. Subsequently, Lt. Col. George Armstrong Custer led the 7th Cavalry in an attack on a Lakota and Cheyenne camp at the Little Bighorn River and was soundly de¬feated. Following this defeat, the U.S. military launched a major campaign against the Sioux and Cheyenne. In 1877, Sioux leader Sitting Bull brought 135 lodges of his people north from the United States to find refuge in Canada. They settled in the White Mud River area of Saskatchewan. Here the Sioux found the buffalo in greater numbers than in the United States. To the Sioux, this appeared to be the promised land where they could continue their traditional lifestyle. Major James Walsh of the Northwest Mounted Police met with Sitting Bull and told him that the Sioux would now have to obey the queen’s laws and in return they would receive the queen’s protection. He warned the Sioux that they were not to return to the United States to hunt or to steal. The Mounted Police had a reputation for being fair in their judgments. Some of the Mounted Police, including Walsh, felt that the Sioux had been badly treated in the United States. Walsh had a genuine concern for the well-being of Sitting Bull and his people. The following year, an additional 240 Sioux lodges sought asylum in Canada. The bands were under the leadership of Little Hawk and Fools Heart. The arrival of more Sioux in Saskatchewan was of great concern to the Canadian tribes, such as the Cree, Blackfeet, Piegan, and Blood, who had been enemies of the Sioux. It was the task of the Mounted Police to maintain the peace. In 1880, Major James Walsh, the Northwest Mounted Police officer who had been dealing with Sitting Bull’s Sioux was reassigned. N.F. Cozier replaced him and began to pressure the Sioux to return to the United States. He persuaded the young Sans Arc Sioux leader White Eagle of the futility of staying in Canada. The Sioux leader Gall was the first to lead his people back to the United States. In 1880, Gall led his people south into Montana to the Poplar River Agency (now the Fort Peck Reservation). They camped in a wooded site across from the agency. Gall’s band was soon joined by a Sans Arc band under the leadership of Spotted Eagle. This increased their camp from 38 lodges to 73 lodges. In response to the gathering of these “hostile” Sioux bands, the army sent a force of 400 soldiers from Fort Keogh under the command of Major Ilges. It is interesting to note that when the Sioux entered Canada, they were met by a single police officer who was successful in maintaining the peace. In the U.S., the Sioux were met with a show of overpowering military force. Gall took the initiative and asked for a council with the major. In this council, Gall indicated that he was reluctant to give up his old way of life. While the major lacked specific instructions on dealing with Gall, he insisted that Gall and his people were going to move to Fort Buford in three days. Gall explained that he could not surrender because to do so would be to face certain starvation. While surrendering to the army might have provided the Sioux with rations, Gall did not trust the army and would rather risk starvation as a free man. He was aware that the Sioux and Assiniboine at the Fort Peck Agency were destitute and that starving Indians refused to live there. Following the council with Gall, the Sioux warrior Crow then requested a council with the major. Crow and his warriors made it clear to the major that Sitting Bull was their chief and that they were going to wait to see what Sitting Bull was going to do. In 1881, Army troops with three-inch Rodman guns prepared to attack the Sioux camps of Gall and Crow King near the Poplar River Agency. The soldiers crossed the frozen Missouri River and found one camp with 32 lodges that was almost deserted. A short time later they reached Gall’s camp of 40 lodges and found it deserted. In what was later called the “Battle of Poplar River,” the Army bombarded the Sioux villages with artillery fire. Soon, the Sioux began to trickle out of the thickets to surrender. The term “battle” is perhaps a misnomer for this encounter. In spite of deep snow and bitter cold, the Army marched the three hundred captives-men, women, and children-to Fort Buford in North Dakota. The walk took four days. Sioux leader Low Dog and 20 lodges of his people surrendered at Fort Buford. They were shipped by steamboat to Fort Yates on the Standing Rock Reservation in South Dakota. A few months later, Sitting Bull and 187 members of his Lakota Sioux band returned south and surrendered to United States authorities at Fort Buford. When they boarded the steamer at Fort Buford, they believed they were going to be taken to Fort Yates near the Standing Rock Reservation so that they could be reunited with their families. At Fort Yates, however, they were told that they were to be transported to Fort Randall where they were to be confined as prisoners. The army was afraid that Sitting Bull would stir up trouble among the Indians at the agency. They spent 20 months at Fort Randall and were then allowed to return to the Standing Rock Agency. Thus in 1881, most of the Sioux refugees had returned to the United States and surrendered to the American army. The old hunting way of life was now over and the Sioux would have to settle down to life on the reservation.
<urn:uuid:ff1f441b-3790-41aa-a283-58906f576f58>
CC-MAIN-2020-29
http://nativeamericannetroots.net/diary/939
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655899931.31/warc/CC-MAIN-20200709100539-20200709130539-00039.warc.gz
en
0.988351
1,192
3.890625
4
Can you give me (one sentence) description of the importance of the Great Wall of China Stacey Warren - Expert brainly.com Hey! We 've verified this expert answer for you, click below to unlock the details :) At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio. Nam libero tempore, cum soluta nobis est eligendi optio cumque nihil impedit quo minus id quod maxime placeat facere possimus, omnis voluptas assumenda est, omnis dolor repellendus. Itaque earum rerum hic tenetur a sapiente delectus, ut aut reiciendis voluptatibus maiores alias consequatur aut perferendis doloribus asperiores repellat. I got my questions answered at brainly.com in under 10 minutes. Go to brainly.com now for free help! It was the state Chu who first built the wall. It was during the Qin Dynasty that the kingdom of Qin united the different parts into one empire. To defend off the invasions from northern invaders, Emperor Qin Shi Huang had all the walls joined up. Thus, the Great Wall came into being. Not the answer you are looking for? Search for more explanations. The importance of the Great Wall of China was to block off out-siders, who weren't welcomed, but also bring in new traders or people in search for better life, much like the Silk Road Han Dynasty also created, even though he just extended the Great Wall of China. thank you guys i will medal darren and darren can you plz give a medal to mr basketball
<urn:uuid:6a07216f-a2ca-4555-80e5-7420369b92c4>
CC-MAIN-2017-22
http://openstudy.com/updates/560c0babe4b030f0284d6d15
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463614615.14/warc/CC-MAIN-20170530070611-20170530090611-00198.warc.gz
en
0.778949
455
2.5625
3
The first of its kind, Abina and the Important Men is a compelling and powerfully illustrated “graphic history” based on an 1876 court transcript of a West African woman named Abina, who was wrongfully enslaved and took her case to court. The book is a microhistory that does much more than simply depict an event in the past; it uses the power of illustration to convey important themes in world history and to reveal the processes by which history is made. The story of Abina Mansah—a woman “without history” who was wrongfully enslaved, escaped to British- controlled territory, and then took her former master to court—takes place in the complex world of the Gold Coast at the onset of late nineteenth-century colonialism. Slavery becomes a contested ground, as cultural practices collide with an emerging wage economy and British officials turn a blind eye to the presence of underpaid domestic workers in the households of African merchants. The main scenes of the story take place in the courtroom, where Abina strives to convince a series of “important men”—a British judge, two Euro-African attorneys, a wealthy African country “gentleman,” and a jury of local leaders— that her rights matter. “Am I free?” Abina inquires. Throughout both the court case and the flashbacks that dramatically depict her life in servitude, these men strive to “silence” Abina and to impose their own understandings and meanings upon her. The story seems to conclude with the short-term success of the “important men,” as Abina loses her case. But it doesn’t end there: Abina is eventually redeemed. Her testimony is uncovered in the dusty archives and becomes a graphic history read by people around the world. In this way, the reader takes an active part in the story along with the illustrator, the author, and Abina herself. Following the graphic history in Part I, Parts II-V provide detailed historical context for the story, a reading guide that reconstructs and deconstructs the methods used to interpret the story, and strategies for using Abina in various classroom settings. The new, second edition of Abina and the Important Men features a new gender-rich section, Part V: Engaging Abina, which explores Abina’s life and narrative as a woman. Focusing on such important themes as the relationship between slavery and gender in pre-colonial Akan society, the role of marriage in Abina’s experience, colonial paternalism, and the meaning of cloth and beads in her story, this section also includes a debate on whether or not Abina was a slave, with contributions by three award-winning scholars—Antoinette Burton, Sandra Greene, and Kwasi Konadu—each working from a different perspective. The second edition also includes new, additional testimony that was rediscovered in the National Archives of Ghana, which is reflected in the graphic history section. Reviews and testimonials Paul Lovejoy, York University Abina and the Important Men is an excellent introduction to history and society through an innovative mix of primary text, annotated transcription and highlighted in cartoon form that captures the imagination of new students. It is a must for adoption in first year courses. Jeremy Rich, Middle Tennessee State University This is a very strong and original work. All three sections (the inclusion of the primary source, the historical context section and the reading guide) allow for a broad range of discussion topics. Students can compare the graphic novel section to the court transcript and discuss how historians develop historical narratives. Sharlene Sayegh, California State University, Long Beach Abina and the Important Men addresses an important gap in the teaching of history, one that recognizes that there are a variety of learning styles Jonathan T. Reynolds, Northern Kentucky University Trevor Getz has pushed the envelope of Africanist Scholarship. With Abina and the Important Men he offers unique insight into such contentious topics as personhood, gender, slavery, and colonialism. Along the way, he provides teachers and readers with a powerful tool for investigating the process of giving meaning to historical documents and narratives. This is exactly the sort of work that will help African history escape the dark and dusty halls of academia and help make it relevant to a wider audience. This is GENIUS. Jason Ripper, Everett Community College Academia has finally woken up to the interests of students and Oxford University Press is a willing partner in this awakening. Bravo! This book takes college-level course material in a fresh and invigorating direction. The story – images included – is engrossing, addresses themes regularly featured in our courses, and provides needed insight into a people who still get too little treatment even in world history courses. Also, the author’s added commentary on the source material and the general historical context ensure that when students have the book with them at home, they will still recognize the academic qualities of the volume. Erin O’Connor, Bridgewater State University This is an innovative approach to teaching social history and colonialism in Africa. The graphic history contains beautiful and compelling artwork, and the text closely follows historical documentation. Furthermore, the inclusion of the actual document transcription and historical context make it possible to teach this book on many different levels, getting students to think deeply about and probe the process of how history is made (both in the past and by historians). It would work well in courses on either African history or world history. Tiffany F. Jones, Cal State-San Bernardino This is a pioneering work in the narration and representation of African History and will appeal to students of all levels. The book engages in the actual historical process and makes it very evident for students the processes historians go through when compiling such a document. The fact that Abina and the Important Men highlights the difference between primary and secondary documents, and talks in detail about representation and translation, makes it particularly valid for all history classes. Alicia D. Decker, Purdue University This is an excellent project! It is fresh, engaging, and historically sound. I would definitely use this text in my Modern Africa and African Women’s History classes. I really like the way that the author and illustrator have divided the book into sections for different levels of analysis. Beginning students can focus on the graphic novel, while more advanced students can also discuss the production of historical knowledge and the larger historiography. Paul S. Landau, University of Maryland This is an important departure for Oxford University Press and an excellent combination of research and pedagogy. It is a fine work and I will use it in my teaching…. Students today do not easily grasp the difference between a primary and secondary source. This text merges that appreciation — for how historians work — into the fabric of the book. Maxim Matusevich, Seton Hall University The project’s originality is its main strength; it certainly stands out among other texts on slavery. It also makes the experience of enslavement more immediate, more visual, in other words, it brings it to life.
<urn:uuid:86cea9c7-28e8-4728-b0b9-1cabeb265576>
CC-MAIN-2018-47
https://abina.org/
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039748901.87/warc/CC-MAIN-20181121133036-20181121155036-00286.warc.gz
en
0.940853
1,470
3.140625
3
When considering using a full factorial experimental design there may be constraints on the number of experiments that can be run during a particular session, or there may be other practical constraints that introduce systematic differences into an experiment that can be handled during the design and analysis of the data collected during the experiment. Blocking is a technique used in design of experiments methodology to deal with the systematic differences to ensure that all the factors of interest and interactions between the factors can be assessed in the design. When blocking occurs one or more of the interactions is likely to be confounded with the block effects but a good choice of blocking should hopefully ensure that it is a higher order interaction that would be challenging to interpret or not be expected to be important that is confounded. The conf.design package in R is described by its author as a small library contains a series of simple tools for constructing and manipulating confounded and fractional factorial designs. The function conf.design can be used to construct symmetric confounded factorial designs. A very simple example would be a three factor experiment where each factor has low and high settings (levels). If we wanted to divide the experiment into two blocks of four experimental units then we could confounded the block effect with the three way interaction between the factors. The following code would create the required design plan: conf.design(rbind(c(1,1,1)), p=2, treatment.names = c("F1","F2","F3")) The first argument is a matrix, with a single row in this case as there are only two blocks, which specifies the levels of the factors for the effect to be confounded with the blocks. The output from this function call is: Blocks F1 F2 F3 1 0 0 0 0 2 0 1 1 0 3 0 1 0 1 4 0 0 1 1 5 1 1 0 0 6 1 0 1 0 7 1 0 0 1 8 1 1 1 1 This shows two blocks, labelled 0 and 1, and the settings of the experiments to run in each block. In the first block the four factor combinations would be: - F1 low, F2 low, and F3 low. - F1 high, F2 high, and F3 low. - F1 high, F2 low, and F3 high. - F1 low, F2 high, and F3 high. The remaining four combinations are use in the second block of experiments.
<urn:uuid:7b958195-b666-4c2f-a635-0e12630865f5>
CC-MAIN-2015-27
http://www.r-bloggers.com/design-of-experiments-%E2%80%93-blocking-and-full-factorial-experimental-design-plans/
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094629.80/warc/CC-MAIN-20150627031814-00254-ip-10-179-60-89.ec2.internal.warc.gz
en
0.939496
505
3.984375
4
It seems so easy for nature to produce forms of great beauty--as so often imitated in art. But how does nature manage this? And must we be content with just imitating nature? Or can we perhaps capture whatever fundamental mechanism nature uses to produce the forms it does, and use this mechanism directly for ourselves? My work in science has led me to the conclusion that for the first time in history, we are finally now at the point where this has become possible. And the key lies in the idea of computer programs. For a computer program, like a natural system, operates according to definite rules. And if we could capture those rules we should be able to make programs that do the kinds of things nature does. But in fact we can do vastly more. For nature must follow the laws of our particular universe. Yet programs can follow whatever laws we choose. So we can in effect make an infinite collection of possible universes, not just our particular universe. In the past, however, it has seemed difficult to get programs to yield anything like the kind of richness that we typically see in nature. And when one hears of images made by programs, one tends to think of rigid lines and simple geometrical figures. But what my work in science suggests is that people have created programs with too much purpose in mind: they have tried to make sure that their programs are set up to achieve specific goals that they can foresee. But nature--so far as we know--has no goals. And so the programs it runs need not be chosen with any particular constraints. And what my work in science has shown is that programs picked almost at random will often produce behavior with just the kind of complexity--and sometimes beauty--that we see in nature. All that is necessary is that we go beyond the narrow kinds of programs whose behavior we, as humans, can readily foresee. When I created Mathematica my goal was to build an environment in which one could easily set up programs of essentially any kind. And indeed the language that underlies Mathematica is based on concepts more general and more fundamental than even those of standard logic or mathematics. And by using these concepts it is possible to create programs that correspond to the kinds of rules that seem to operate in nature--or in anything like nature. In fact, with the Mathematica language, remarkably simple programs can often produce pictures of such intricacy and unexpected detail that we would never imagine that they could ever have been made just by following any set of rules.Sometimes the pictures one gets remind one of some familiar system in nature. And sometimes they look like the creations of a human artist. But often they are something different. They have parts reminiscent of nature. And parts that one could imagine being created by human artists. But then they have unexpected elements, like nothing seen before, together with a vast range of details far beyond what any unaided artist could ever produce. And this is the essence of the images in Graphica. scientist and creator of Mathematica
<urn:uuid:096afb1f-ac0e-4640-9f25-0bd5582989b5>
CC-MAIN-2014-52
http://www.graphica.com/defined/
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802773864.47/warc/CC-MAIN-20141217075253-00049-ip-10-231-17-201.ec2.internal.warc.gz
en
0.963492
615
2.796875
3
Tips for Learning Online Some students think that an online course is cyber-surfing for credit. An online course often requires more work than a traditional classroom course. Time management is the most important skill needed for success in distance learning. In addition to having enough time to complete course work, you need to be able to plan your time, make a schedule, and stick to it. Do you excel at the art of procrastination? If so, distance learning classes will be especially challenging. The following tutorial offers effective tips for beating procrastination: Overcome Procrastination Your online course work will require extensive written communication, particularly with e-mail or through thread discussions, also known as message boards. Threaded discussions are text-based messages that allow you and your classmates to engage in classroom discussions. Remember that these discussions are viewable to the entire class and follow the rules of Netiquette. Here are some additional communication tips: - Fill out your personal profile located on the Classlist link of your eLearning course. You only have to fill this out once; it will appear in all of your courses and is a great way to introduce yourself to your classmates. - Most instructors will have an activity so that you can meet your classmates. If they don't, take the initiative and e-mail your class. - Find a "Study Buddy." Students who utilize study groups or buddies typically do much better in class. The lecture notes and other materials posted online take the place of the traditional class lecture. Reading online is slower and more difficult than reading a physical text book. The following tutorial will assess your reading speed and provide effective tips for improving your speed and comprehension. While you are not taking notes in a traditional lecture, effective note taking will still be very important to your success. Writing helps you retain knowledge - don't rely on memory alone. Follow these tips for effective note taking: - Organize your notes along the order of chapter objectives. - Your notes should contain: - definitions of new vocabulary words - new concepts discussed in a chapter - any new procedures that are explained - questions you have about the material - Review your notes within 24 hours of first studying the material. If you don't review for 10-15 minutes within 24 hours, you will only retain 20% of what you initially learn. - Keeping good notes for each unit or topic will give you a tool you can use to prepare for exams without feeling like you're "cramming" everything in at the last minute. - Review, review, review! Do you consider yourself assertive? The Cambridge Dictionary describes assertive as:"someone who behaves confidently and is not frightened to say what they want or believe." Assertiveness and initiative are qualities needed for success in distance learning. You need to take the initiative to ask questions and resolve problems that the instructor may not be able to perceive. Many of the non-verbal cues that instructors use to determine whether a student is not understanding are not as available in an online class as they are in face-to-face learning environments. If you experience difficulty on any level, either with the technology or with the course content, you need to communicate your concerns immediately, otherwise the instructor will not know how to help. - For problems with the course content, contact your instructor - For technology problems, contact the Help Desk
<urn:uuid:7f47462a-948a-46f4-8b21-78aa05fae16a>
CC-MAIN-2015-22
http://uwf.edu/online/getting-ready-for-class/tips-for-learning-online/
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929256.27/warc/CC-MAIN-20150521113209-00129-ip-10-180-206-219.ec2.internal.warc.gz
en
0.928005
691
2.96875
3
This manuscript of the Book of Enoch (4Q201 Plate 821) is one of eleven manuscripts found in Qumran Cave 4. There are eleven fragments of the manuscript which comprise this apocryphal work, called the Book of Enoch. Until the discovery of the Dead Sea scrolls, the Book of Enoch was only preserved in Ethiopic and Greek. The uniqueness of this manuscript is that this is the only known copy of Book of Enoch in Aramaic. The Book of Enoch is one of the most important non-canonical texts from the Second Temple period. The first mention of Enoch is found in Genesis 5:18-24. The length of Enoch’s life was relatively short. Unlike other patriarchs, who lived before The Flood, Enoch only lived for 365 years. This fragment of the scroll narrates the Aramaic names of the twenty angels, who were the chiefs among the fallen angels. - Display / Frame – Acrylic Frame - Artifact dated back to … - Artifact location: IAA, Israel Museum - Dimensions of original: - IAA Access Number – 610082 - Portion in Bible – Genesis 5:18-24 - Replica size – 100% - Site of Origin Qumran, Cave 4 - Weight: 1 lbs - Width: 8.3 inches - Height: 9.8 inches - Depth: 0.5 inch
<urn:uuid:cfd9a1f7-0633-4f27-9a25-431886577698>
CC-MAIN-2019-43
https://www.biblicalreproductions.com/product/the-enoch-scroll-4q201-plate-821/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987763641.74/warc/CC-MAIN-20191021070341-20191021093841-00470.warc.gz
en
0.911261
297
3.0625
3
Summary and Keywords The atmospheric circulation in the mid-latitudes of both hemispheres is usually dominated by westerly winds and by planetary-scale and shorter-scale synoptic waves, moving mostly from west to east. A remarkable and frequent exception to this “usual” behavior is atmospheric blocking. Blocking occurs when the usual zonal flow is hindered by the establishment of a large-amplitude, quasi-stationary, high-pressure meridional circulation structure which “blocks” the flow of the westerlies and the progression of the atmospheric waves and disturbances embedded in them. Such blocking structures can have lifetimes varying from a few days to several weeks in the most extreme cases. Their presence can strongly affect the weather of large portions of the mid-latitudes, leading to the establishment of anomalous meteorological conditions. These can take the form of strong precipitation episodes or persistent anticyclonic regimes, leading in turn to floods, extreme cold spells, heat waves, or short-lived droughts. Even air quality can be strongly influenced by the establishment of atmospheric blocking, with episodes of high concentrations of low-level ozone in summer and of particulate matter and other air pollutants in winter, particularly in highly populated urban areas. Atmospheric blocking has the tendency to occur more often in winter and in certain longitudinal quadrants, notably the Euro-Atlantic and the Pacific sectors of the Northern Hemisphere. In the Southern Hemisphere, blocking episodes are generally less frequent, and the longitudinal localization is less pronounced than in the Northern Hemisphere. Blocking has aroused the interest of atmospheric scientists since the middle of the last century, with the pioneering observational works of Berggren, Bolin, Rossby, and Rex, and has become the subject of innumerable observational and theoretical studies. The purpose of such studies was originally to find a commonly accepted structural and phenomenological definition of atmospheric blocking. The investigations went on to study blocking climatology in terms of the geographical distribution of its frequency of occurrence and the associated seasonal and inter-annual variability. Well into the second half of the 20th century, a large number of theoretical dynamic works on blocking formation and maintenance started appearing in the literature. Such theoretical studies explored a wide range of possible dynamic mechanisms, including large-amplitude planetary-scale wave dynamics, including Rossby wave breaking, multiple equilibria circulation regimes, large-scale forcing of anticyclones by synoptic-scale eddies, finite-amplitude non-linear instability theory, and influence of sea surface temperature anomalies, to name but a few. However, to date no unique theoretical model of atmospheric blocking has been formulated that can account for all of its observational characteristics. When numerical, global short- and medium-range weather predictions started being produced operationally, and with the establishment, in the late 1970s and early 1980s, of the European Centre for Medium-Range Weather Forecasts, it quickly became of relevance to assess the capability of numerical models to predict blocking with the correct space-time characteristics (e.g., location, time of onset, life span, and decay). Early studies showed that models had difficulties in correctly representing blocking as well as in connection with their large systematic (mean) errors. Despite enormous improvements in the ability of numerical models to represent atmospheric dynamics, blocking remains a challenge for global weather prediction and climate simulation models. Such modeling deficiencies have negative consequences not only for our ability to represent the observed climate but also for the possibility of producing high-quality seasonal-to-decadal predictions. For such predictions, representing the correct space-time statistics of blocking occurrence is, especially for certain geographical areas, extremely important. Access to the complete content on Oxford Research Encyclopedia of Climate Science requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription. If you have purchased a print title that contains an access token, please see the token for information about how to register your code.
<urn:uuid:011c5519-8c80-42ba-a04a-950fbf219345>
CC-MAIN-2018-17
http://climatescience.oxfordre.com/view/10.1093/acrefore/9780190228620.001.0001/acrefore-9780190228620-e-611?rskey=8FcLf8&result=7
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948950.83/warc/CC-MAIN-20180427021556-20180427041556-00038.warc.gz
en
0.934284
820
3.296875
3
The nation’s public school system has always mirrored the state of politics in America, for better or for worse. But over the past three years, federal, state and local governments have injected politics into the K-12 system in unprecedented ways — spurred in large part by disparate responses to schooling and security during the coronavirus pandemic and by those who would force schools to adopt policies consistent with their culture war of the day. Now that education is playing a big role in the looming midterm elections, political influence in schools is the No. 1 concern for parents. A new survey shows that 68% of parents worry a little or a lot about politicians who are not educators making decisions about what happens in the classroom – the biggest concern reported overall and which exceeds by far their worry about a family member contracting COVID-19 or being able to pay their bills. Linked to their concerns about political influence in schools, the survey found that the next three main concerns for parents were the happiness and well-being of their children, their children suffering from stress and anxiety, and their children exposed to violence at school. The survey, “Hidden in Plain Sight: A Way Forward for Equity-Centered Family Engagement,” also polled teachers and principals and found that their top concerns were the same. A total of 70% are concerned that politicians who are not involved in education make decisions about the school curriculum, and 64% have the same concerns about parents who are not involved in education who make decisions about the school curriculum. Education editorial cartoons “But significant barriers remain because the system is designed to separate parents and teachers,” says Bibb Hubbard, founder and president of Learning Heroes, an education research organization focused on increasing parent engagement, which has leads the investigation. “We need to listen to parents and educators and put in place the structures and supports that we know will pay dividends in student achievement, educator retention, and family engagement.” Notably, while parents say they want the opportunity to express their feelings on some of the issues that have dominated the news, the poll found that only 19% expressed concerns about the school curriculum during At a school board meeting, 17% provided feedback on the recommended recommendations. books and 12% have requested that their child be excused from homework this school year. In an effort to elevate their role, the Department of Education is creating a parent council to help parents better engage with their children’s schools — a move that comes as Republicans tap into parents’ frustrations over the past year. a third year of pandemic tuition and threaten to unseat Democrats as the education party ahead of the midterm elections. The National Parents and Families Engagement Council is made up of 14 organizations that represent families, parents and caregivers from all walks of life, including more traditional umbrella groups, like the National Parent Teacher Association, as well as groups like Mocha Moms, Fathers Incorporated and National Parents Union. The council will also represent parents and caregivers whose children are enrolled throughout the K-12 system, including public schools, charter schools, private schools and homeschooling. The Biden administration — and Education Secretary Miguel Cardona, in particular — has made it a point to elevate the role parents play in their children’s education following last year’s election. , which revealed growing frustrations among exasperated parents in the middle of a third year. of pandemic schooling and highlighted the inroads Republicans have made in casting themselves as trustworthy on an issue long considered a Democratic stronghold. “Parents and educators have a Herculean task ahead to address setbacks in children’s learning and well-being,” says Hubbard. “They recognize that the key to recovery efforts is teaming up to support students.”
<urn:uuid:661cfdfa-622a-4325-9ddb-2c38e170a343>
CC-MAIN-2022-33
https://gfteachersfcu.com/parents-want-politics-out-of-classrooms-education-news/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00330.warc.gz
en
0.976683
773
2.609375
3
Chapter 8 - Prayer * How do you pray? Where and when do you pray? How many times daily? * Do you wash yourselves ritually before praying? * Do women also pray? * Do you pray at all times, or only on particular occasions? * Do you have particular prayers for the major religious festivals? * In what language do you pray? * What are the main physical positions adopted in prayer? What does the sign of the cross mean? * Why do you pray? Because God has commanded you to? Out of respect for religious rules? To gain entry to Heaven? Because it makes you feel better? * What do you say in your prayers? What texts do you use? The Bible? * Whom do you pray for? Can you pray for us? * Can we take part in your prayers? Can we pray together? If so, what texts should we use? * Is it permissible for Muslim prayers to be said in a Christian place of worship? * Is it possible to organize a Muslim prayer-room within a Christian building? II. Muslim Perspectives The words prayer and pray have a wide range of meanings and do not express quite the same ideas as their Islamic equivalents. The key Islamic concept to grasp here is ibāda, suggesting both worship and servanthood; prayer, as an act of ibāda, expresses the essential attitude of humble service of the servant before his or her Lord. Islam distinguishes further between salāt, the daily ritual prayers to be performed at certain prescribed times, and various forms of free, personal or private prayer. Examples of the latter include: dua (invocation, petition), munājāt (intimate dialogue with God) and dhikr (recollection of God in prayer). There is therefore a distinction between performing the prayers and praying. When a Muslim asks questions about prayer, he or she instinctively thinks of the prescribed canonical prayers (salāt), which are public, often communal and are performed according to quite specific prescriptions. Every other form of prayer is of much less significance. In contrast, Christians think of prayer primarily in terms of an attitude of spirit and heart; in their minds prayer is not tied to a particular ritual form. Thus, when Muslims say I do not pray, they mean I do not regularly perform the prescribed ritual prayers. It can nevertheless certainly be the case that God is often in the thoughts of such Muslims and frequently comes to the surface in their conversations. When Christians pray according to traditional monastic patterns (praying the hours) this resembles Muslim prayer (salāt) in its observance of a prescribed liturgy at set times. In Islam it is in the devotional life of mysticism and in the ways of prayer of the religious brotherhoods that one finds deeper prayer, meditation and wider understandings of prayer as spiritual, inward and wordless. Christians do not practice regular ritual prayer in the same way as Muslims practise salāt. It therefore seems clear that people in the West do not pray, because their attitudes are materialistic. In contrast, Muslims pray regularly, in public, and without any fear of what people will say, thus demonstrating that they belong to the Muslim community. Muslim consciousness of the transcendence of God brings to ritual prayer in Islam a sense of awe before the sacred. Vital importance is thus attached to the precise observance of the detailed ritual prescriptions concerning matters such as washing, bodily postures and ways of speaking (aloud, quietly or inwardly). In Christianity the feeling that God lives among us has led to a certain familiarity in relationship to God, and to a freedom of style which goes so far that it can be interpreted as lacking in reverence for God. To summarize, one can say that while Islam ascribes great significance to the outward form of prayer, Christianity puts great emphasis on the inward practice of prayer. In Islam the word prayer indicates specific religious practices: 1. The canonical ritual prayer (salāt) Salāt, the second pillar of Islam, means ritual prayer and is an essential component of Muslim worship. When praying, the Muslim is in solidarity with fellow-believers around the world, across continents and cultures and also across the ages, and through ritual prayer experiences fellowship with other Muslims, despite possible differences of opinion. Prayer brings together many different aspects of devotion to God such as recitation, listening, meditation and attentiveness to Gods presence. Prayer consists firstly of praise and thanksgiving, then also the seeking of forgiveness and of Gods blessing, and, as the occasion demands, mourning, intercession and so on. To ensure that ritual prayer, wherever and whenever it is performed, contains all these elements, its rite has been prescribed in detail. It is derived from the Quran and Hadith, and from the legal regulations which the schools of Law worked out on the basis of the Quran and Hadith. Ritual prayer is performed five times every day, at prescribed times. Many Muslim calendars also contain minutely detailed timetables for the prayers, the times for which can, however, be adjusted as necessity demands. The times for prayer are: at break of day (subh); at noon (zuhr); in the afternoon (asr); at sunset (maghrib); during the night (isha). The primary function of the call to prayer (ādhān), which the muadhdhin proclaims from the minaret, is to make people aware of the exact time for prayer. The ādhān gives a distinct rhythm to the life of Muslim towns. When possible, prayer is performed communally. The ideal place for prayer is the mosque. Those praying stand in rows behind the imam, who decides the rhythm of the prayer. Prayer can also be performed on ones own or in small groups outside the mosque, and in principle anywhere, so long as the place is ritually clean. The place of prayer can be indicated by a carpet, a cloth, clean paper on the floor or a circle of stones. In any case, when performing the ritual prayer one must face towards Mecca, as long as the direction can be established. The direction for prayer (qibla) is indicated in mosques by the mihrāb, the prayer niche pointing towards Mecca. The fact that all who are performing the prayer are facing towards the Kaaba in Mecca underlines the worldwide unity of the Muslim community. Before beginning ritual prayer one must carry out the prescribed ablutions (ritual acts of washing). Normally water is used, but if this is not to hand or available for use a symbolic act of cleansing with sand is performed. The Law distinguishes between the requirements to wash the whole of ones body (ghusl) and part of it (wudū). Ghusl is necessary if a person is in a condition of greater impurity (janaba). This is the case after sexual intercourse, including within marriage, or after contact with a corpse. Wudū is necessary in the case of lesser impurity (hadath), which applies after any excretion from the body (faeces, urine, pus and so on). In this case it is necessary to wash ones hands, mouth, nose, face, forearms, head, ears, throat and feet. Ones clothes must also be clean, but most important of all is purity of heart. It is instructive to compare the Islamic regulations with similar regulations in the Old Testament (Exodus 30; Leviticus 18; Deuteronomy 21; 23). After the ablutions the worshipper declares his or her intention (niyya) to pray. The prayer opens with the takbīr, the formula Allāhu akbar (God is greater). This is followed by the recitation of the opening sura of the Quran, the Fātiha.48 Every ritual act of prayer consists of 2 to 4 liturgical units, each called a raka. This consists of a time standing upright (wuqūf), bowing (rukū), prostration (sujūd) and sitting on ones heels (julūs); each of these bodily postures is accompanied by a specific and suitable prayer. The prayer at break of day includes 2 raka-s, the prayer at sunset includes 3, while the noon, afternoon and night prayers each consists of 4 raka-s. Ritual prayer includes the recitation of some short suras from the Quran, followed by greetings addressed to God (tahiyyāt), the Prophet and all Muslim believers. These are followed by the confession of faith (shahāda) and prayers for blessing on Muhammad and Abraham. The whole ritual usually lasts no longer than 5 to 10 minutes, unless longer Quranic texts or intercessions are added. Every week congregational prayers (salāt al-juma) take place on Friday at noon. The ritual is the same as for the daily prayers, expanded by fuller tahiyyāt and particularly by the sermon, delivered either by the imam or by another Muslim with the necessary ability. On the occasion of major festivals there are further special rituals, particularly at the two most important festivals: the festival of sacrifice, also known as the Great Festival (Īdul adha or Īdul kabir), and the festival of breaking the fast at the end of Ramadan, the month of fasting (Īdul fitr). Special rituals also mark the festival of the birth of the Prophet (al-mawlid al-nabawī), Ashūra and the nights of Ramadan. Mention should also be made of the impressive prayers used in the course of the major and minor pilgrimages. Salāt is above all an act of adoration, praise and gratitude towards God. It is performed out of obedience towards Gods command. Spiritual writers such as Muhammad al-Ghazāli (1058-1111) emphasize the following attitudes as essential in approaching salāt: purity of heart, attentiveness to Gods presence, reverent fear of God (taqwā), hope, modesty and the honest desire to amend ones life. There are also ritual prayers for particular occasions, such as prayers for rain, at the time of natural disasters and at the time of bereavement. Voluntary ritual prayers (nawāfil) are performed during Ramadan and at night (Quran 17:79). 2. Other prayers Sufism and the Sufi brotherhoods (tarīqa, pl. turuq) have developed the practice of dhikr (the recollection of God), which essentially consists of mentioning and celebrating the name of God (cf. Quran 2:152; 3:41). The constant repetition of Gods name, whether this is done alone or with others, essentially aims to achieve the total permeation of the believers heart and mind with recollection of Gods name. Traditionally, there are three stages to dhikr: the dhikr of the tongue (the simple oral recitation of Gods name); the dhikr of the heart (as the heart is taken up into the rhythm of the recitation); and the dhikr of intimacy (sirr), in which the believers whole body and soul vibrate with the recitation of Gods name. Sufis and brotherhoods also engage regularly in meditation (fikr and taammul), daily silent prayer (wird) and responsive litanies (hizb). These forms of prayer are, likewise, all strictly regulated in terms of ritual and text. The texts are often very striking. Nothing, however, is left to personal initiative. The Sufi disciple (murād) is asked to perform these rituals with great care under the direction of a Sufi guide (shaikh, pīr). The recitation of the 99 most beautiful names of God (Quran 20:8; 17:100) should also be mentioned. These names are recited meditatively by pious Muslims with the use of prayer-beads (subha, tasbiha). It is also significant that in various contexts and in situations of distress Muslims meditate on Quranic texts and find strength through doing so. Finally, there are countless spontaneous prayers, not least the many invocations which Muslims – especially simple believers – utter on all possible occasions: praise (al-hamdu lillāh – God be praised); surprise (mā shā Allāh – whatever God wills or as long as God wills); prayers for forgiveness (astaghfir Allāh – I ask for Gods forgiveness); prayers for healing (Allāh yashfī – may God heal); expressions of disapproval or indignation (lā hawla wa lā quwwata illā bi-llāh al-azīm – there is no power or strength other than with God). Muslim theologians have at times engaged in intense discussions about whether petitionary prayer is compatible with Islamic Law and what value should be ascribed to it. Since God knows everything, no prayer can alter his almighty will. Nevertheless, there is agreement among Muslims that dua is pleasing to God and therefore desirable. Has not God himself invited believers to address prayers of petition to him (cf. Quran 2:186; 22:12; 13:14) and has he not promised to hear them (2:186; 40:60)? God, mainstream Islam teaches, foresees all things from eternity and in his sovereign goodness he grants requests generously. The Mutazilites, with their tendency towards rationalism, were of the opinion that although petitionary prayer has no effect it is profitable as it forms in people an appropriate attitude towards God, the attitude of a poor servant (abd faqīr). Petitionary prayer does not change God, but it does change people. 3. Prayer and action The genuineness of prayer is demonstrated in ones relations with ones neighbour, especially in striving for righteousness and in care for the poor: It is not righteousness that you turn your faces towards East or West; but it is righteousness to believe in Allah and the Last Day, and the angels and the Book and the messengers; to spend of your substance out of love for him, for your kin, for orphans, for the needy, for the wayfarer, for those who ask, and for the ransom of slaves; to be steadfast in prayer and practise regular charity . . . (Quran 2:177) III. Christian Perspectives Prayer means turning to God in response to his giving himself to humanity. This turning to God can happen and be expressed in many and various ways: oral prayer; meditation; music, with or without an accompanying text; physical movement, including dance; the arts, including paintings, altar-pieces, images of saints, the icons of the Orthodox Church,49 stained glass windows and statues. One could also mention here appeals to the senses, for example through the use of incense, especially in Catholic and Orthodox churches, and the interior layout of churches. In what follows, however, the emphasis lies on prayers that make use of words, whether these are spoken aloud, quietly or inwardly. The origins of Christian prayer lie in the prayer-life of Jesus, with its Jewish roots, and also in what he said about prayer. 1. Jesus prayed and taught us to pray The Gospels often portray Jesus at prayer. Jesus loved to withdraw to pray alone. He sometimes spent the whole night in prayer, especially before major decisions or turning-points in his life. For example, at the beginning of his public ministry he withdrew into the desert to pray and fast; he also prayed before his Passion. He lived in continual unity with God the Father, inspired by the desire to be at one with his will. The roots of Jesus life of prayer were deep in Judaism and in its Scriptures. He quotes from the Psalms, the prayer-book of the Scriptures, either directly or re-phrasing freely. He taught his disciples how to pray. Private prayer should be uncomplicated and unadorned and should always avoid empty words and phrases (cf. Matthew 6:5-7). In response to an explicit request from his disciples, Jesus gives them the prayer beginning Our Father. Father because God loves us as his children; our because every prayer, even private prayer, is prayed in communion with others. The invocation Our Father is followed by three petitions concerning God and three petitions at the human level. Before his sufferings, Jesus celebrated a last meal out of which, after Easter, there evolved the memorial of that meal in the Lords Supper or Eucharist. This is the sacrament of the total self-offering of Jesus to the Father for the worlds salvation and of the real presence – albeit invisible and immaterial – of the risen Christ among us. So Christian prayer, as it has been taught and shaped by Jesus, is above all adoration of the Father, praise, thanksgiving, self-offering, request for forgiveness, help and hope. As with Islamic prayer, as Christians we distinguish between liturgical and private prayer. Very great importance is attached to private prayer. Prayer is a matter as much for women as for men. In the Catholic and Orthodox Churches, however, only men are ordained to preside at the Eucharist. 2. Liturgical prayer Liturgical prayer is communal prayer with prescribed rituals and texts. The Eucharist (also known as the Holy Mass by Catholics) stands at the centre of Christian life and prayer. In the Catholic Church a priest always presides at the Eucharist. It can be celebrated every day and at whatever time is chosen. On Sunday, the day when Christians particularly call to mind the risen Lord, the Eucharist is conducted with special solemnity. In the Catholic Church the Sunday liturgy can also be celebrated on Saturday evening. The Eucharist begins with the ministry of the word, i.e. readings from the Scriptures, which always include a passage from one of the four Gospels, followed by a sermon or homily and prayers of intercession. Then follow the preparation of the bread and wine; the Eucharistic Prayer, which includes the words of institution (the words of Jesus at the Last Supper); the Our Father; and the giving of communion, when believers receive Jesus Christ himself in the forms of bread and wine. The Eucharist is thus the great prayer of thanksgiving (hence the term Eucharist, from the Greek for to give thanks), the Christian congregations great prayer of adoration and praise; the Eucharist also involves sharing in Gods word and being united with Jesus Christ, who gives his real presence in bread and wine and so strengthens believers for their journey through life. Liturgical prayer according to traditional monastic patterns (praying the hours) is of great importance for monastic communities and for priests, but less common among lay people. This involves a sequence of prayers and readings from the Bible and the Church Fathers and includes recitation of the Psalms, hymns, responses and intercessions. In monastic communities it is recited or sung seven times daily: in the morning, at noon, in the evening and during the night. It can also be prayed by individuals. Prayer is also of central importance in Protestant churches. For Catholics the sacraments include confirmation, penance, marriage, holy orders (ordination to the Churchs ministry) and the anointing of the sick, as well as baptism and Eucharist; these are administered in the context of liturgical ceremonies. In many places, and following local traditions, there are also liturgical prayers during pilgrimages, liturgical prayers for rain, for a good harvest, for a successful birth, etc. 3. Private prayer Private prayer refers to the prayer of a person alone or of a group of people, such as, for example, family prayers in the evening. In terms of form it is free; indeed flexibility in terms of style is generally an essential characteristic of Christian prayer. Private and public prayer complement each other and are not in competition. Both are in accordance with the call of Jesus to pray without ceasing (Mark 13:33; Luke 18:1-8; 21:36; cf. Colossians 1:9; 1 Thessalonians 5:17; 2 Thessalonians 1:11). In the context of private prayer, alongside prayers expressed in an entirely free style, use is also made of prayers of the Church such as the Our Father, the Psalms, the Ave Maria (among Catholics) and other prayers, aloud or in silence. This is the practice of many Christians, especially in the morning and evening, or when they visit a church or chapel. Many Catholics also pray the rosary, reciting the Our Father and the Ave Maria alternately, with the recitation of one of the mysteries of the life of Jesus in the middle of the sequence. Many recite the rosary at least once a day. Christians who wish to deepen their life of prayer give time every day, if possible, to meditation and contemplation. Standing, kneeling, sitting or lying down, in a holy place or at home, they concentrate in silence on God to become conscious of his presence and to hear his word. The constant practice of this kind of regular attentiveness and listening to the words of Scripture, which can be helped by certain methods of meditation, is an effective way to grow closer to God. According to Catholic belief this can, by Gods grace, lead to the attainment of mystical gifts, whether in monastic seclusion or in the midst of everyday life. In addition, Christians who wish to follow Jesus with great devotion undertake spiritual exercises from time to time, in silence and in prayer, whether on one day every month or for one week every year. 4. To whom is prayer addressed? Prayer is directed to God. We pray to him through the mediation of Jesus Christ in the Holy Spirit. The discussion in chapter 5 (God the Three in One) is relevant here. We pray in and with Jesus, in the power of the Holy Spirit, to God alone. In the Catholic Church, the practice of asking the saints to pray for us is based on the assumption that they are intercessors for us with God.50 The fundamental orientation of prayer towards God, who alone is worthy of worship, is maintained. 5. The meaning of prayer The essential attitude underlying prayer is worship, thanksgiving and petition for help for oneself and for others. Through prayer we are guided to seek the will of God at every moment. It is a source of strength, of peace, of joy and of fruitfulness. It is helpful to have set times of prayer. These times of prayer will unconsciously make other areas of life fruitful, until finally the whole of life becomes prayer. Conversely, a life of genuine self-giving will enrich our prayer. Prayer will thus permeate our joys and our cares. Prayer is not a way of escaping from life. Prayer enables a person to search for the signs of the presence of God in individual and communal experience of life and to seek Gods will when faced with decisions. Prayer is strength for living; it influences our relationship both to ourself and to our neighbour, permeating our heart (cf. 1 Corinthians 13). 6. The many forms of Christian prayer Over the centuries, Christian prayer has changed and has assumed very varied forms at different times and places, in keeping with the prevailing cultures of countless peoples. Adaptation to contemporary culture can cause tensions but is a necessary process, which can also lead to new forms of prayer. This is especially the case in Muslim countries, where Christians attempt to integrate the richness of spiritual experience of these people and to translate this into the language of prayer. 1. It is worth emphasizing again the point made above (in section II) that the words prayer and pray have different meanings in Christian and Islamic contexts. 2. One should only compare like with like. Thus, for example, it is appropriate to compare salāt (Muslim liturgical prayer) with Christian liturgical prayer such as the Eucharist and praying the hours, giving consideration to their formal characteristics, positions for prayer and melodic chanting, as well as the daily and weekly cycles for prayer. Muslim petitionary prayer corresponds to Christian private prayer, especially prayers of supplication, while dhikr (recollection of God in prayer) corresponds to forms of Christian contemplation. 3. One should note the elements shared by Christian and Muslim prayer, such as: - the same aims and meaning in prayer, such as worship and thanksgiving; - similar daily and weekly patterns of prayer; - similarity between texts; the Psalms, for example, are relatively accessible for Muslims; - certain bodily positions. 4. One should avoid simplistic contrasts between the formality of Muslim prayer and the inwardness of Christian prayer. Naturally there are differences of emphasis, but it is of the essence of both traditions of prayer that they have inward as well as outward dimensions. Outward liturgical form is important for Christians as well as for Muslims. 5. As regards the absence of ritual ablutions in Christian prayer, it should be noted that before the time of Jesus legal and cultic purity was as strictly prescribed in Jewish religion as it is in Islam today. In the tradition of the great prophets, Jesus opposed formalism and spoke of the link between genuine prayer and healthy human relationships: Do you not see that whatever goes into the mouth enters the stomach, and goes out into the sewer? But what comes out of the mouth proceeds from the heart, and this is what defiles. For out of the heart come evil intentions, murder, adultery, fornication, theft, false witness, slander. These are what defile a person, but to eat with unwashed hands does not defile. (Matthew 15:17-20; cf. Mark 7:14-23) It is especially notable that for Jesus, and so for Christianity, sexuality is one of Gods good gifts; neither for men nor for women is it a cause of impurity. Christians are, however, called to use this gift humanely and responsibly. 6. Christians have a duty to show the proper respect due to God. It is, for example, the custom in the Catholic Church to sign oneself with holy water on entering a church or chapel, or for the priest to wash his hands during the celebration of the Eucharist, as a symbol of purity of heart. The emphasis is on purity of heart, rather than physical purity, as is made clear by the prayers of penitence at the beginning of the celebration of the Eucharist. 7. Christians pray for the Church, for political leaders, for all people and also for themselves. They pray for those close to them and for those for whom they are responsible. They should learn to pray frequently and wholeheartedly for their Muslim neighbours, and should also ask their Muslim friends to pray for them; Christians and Muslims can thus express the relationship before God in which they stand together. 8. As regards shared prayer between Christians and Muslims, there are various possibilities: (i) Public church services. There should be no objection to Muslims coming to churches and other places of prayer for a visit and a time of silent prayer, or even, if they wish, to attend official services of Christian prayer as silent guests. However, active and explicit participation in the liturgical prayers of the Church, such as the monastic cycle of prayer or the Eucharist, assumes membership in the Church as a believing community; such participation in liturgical prayer is in itself a confession of committed belief in the Christian faith. It is a quite different matter respectfully to invite Muslims to take part in our prayers as silent guests, in the spirit of the fellowship created by faith in the One God. Muslims will naturally understand the need to respect the dignity of the place and its local customs. (ii) When a public Christian church service concerns a Muslim directly – as for example in the case of a funeral, an interreligious wedding or a baptism in the family of Christian relatives, neighbours or friends – they will understand that such ceremonies have a distinctively Christian character. This applies equally to rituals and texts. At the same time, however, the Churchs liturgical guidelines regarding the selection of readings and the sermon provide for some adaptation in view of the different participants and the relevant circumstances. Significant modifications of the rituals can be considered, especially when a particular ritual might be offensive to adherents of other religions. It is also quite possible to use certain Muslim spiritual texts, preferably unofficial texts, such as the prayers of Muslim mystics. In contrast, the use of Quranic or Muslim liturgical texts is usually inadvisable. At funerals, Muslims have occasionally been asked to recite the Fātiha (the opening sura of the Quran)51 over the deceased person – and they have been grateful for this. It is important, however, to work within the guidelines of the local church and to avoid actions which would endanger good relations between the different communities. (iii) At public interreligious events – such as prayer-meetings, conferences and lectures – each religious group, one after another, might be expected to read a text from its own tradition (from the Bible or Quran, for example) with quiet sensitivity to the others present. It should be noted that on such occasions Muslims are normally unwilling to say the first two words of the Our Father; they are also likely to feel that the Fātiha, which is a key text within Islamic prayer, should only be recited by Muslims. (iv) Greater flexibility is possible for small groups of Muslims and Christians who know each other well and are conscious of the danger of syncretism. Here it is possible to say together unofficial texts of the kind mentioned above in paragraph (b), possibly from the mystics of both traditions, or indeed texts written by members of the group itself. Spontaneous prayer is also possible here. Basic prayers of both faiths, such as the Our Father or the Fātiha, can be recited together, provided that everybody present has agreed to this and that nobody present feels spiritually pressurized.52 Much will depend on the atmosphere of the group in question. (v) If a group of Muslims, children or adults, ask for a prayer room within a Christian institution, for example in a Christian school, this request should be granted. There is a range of opinions in Europe on whether it is prudent and appropriate for churches and chapels no longer used by Christians to be made available, either for rent or to be purchased, to be used for Islamic worship or for other activities of the Muslim community.
<urn:uuid:bf55871a-1858-41d3-b7f5-9dd7eba334c6>
CC-MAIN-2015-22
http://www.answers-to-muslims.com/html/prayer.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928414.45/warc/CC-MAIN-20150521113208-00031-ip-10-180-206-219.ec2.internal.warc.gz
en
0.952586
6,344
3.140625
3
Enslaved by Words: Legalities & Limitations of 'Post-Racial' Language Texas Southern University - Thurgood Marshall School of Law May 26, 2012 2011 Michigan State Law Review 705 This Article examines racial language in the law to show how discrimination is perpetuated in politically correct speech. It argues that names and labels authorized by law maintain racist trappings that fueled the projects of colonialism and slavery; it also puts to rest the notion of “post racial” since such a state is impossible due to the systemic nature of prejudice, where racism is structural. Indeed, laws and legal institutions have a profound influence on the way Americans conceive and speak of one another, and at minimum, may be seen as providing society with a legal base of racial vocabulary. Although the law is not the originator of terminology that supports structural distinction, legitimating of these terms helps lay cornerstones for the foundation. This analysis draws on federal and state constitutions and statutes and the U.S. Census to determine why words like “Indian,” “colored” and other seemingly innocuous terms like “black” and “white” are inherently oppressive. Despite their politically correct appeal, these terms create false binaries, reinforce racial hierarchies like the “one drop rule,” or somehow denigrate their referent. Although the census ritual has been going on for centuries, determining the principles that guide their system is a daunting task. The logic is puzzling, yet the negative effects of language are clear; racial language is never “only words,” but conceptual building blocks that support racial projects of the present. Number of Pages in PDF File: 49 Keywords: Race, Language, Structural Racism, Naming, TaxonomyAccepted Paper Series Date posted: May 23, 2012 ; Last revised: February 28, 2014 © 2014 Social Science Electronic Publishing, Inc. All Rights Reserved. This page was processed by apollo2 in 0.281 seconds
<urn:uuid:eac1ce4c-382c-4b69-99b1-e33ab090a095>
CC-MAIN-2014-49
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2064055
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400373899.42/warc/CC-MAIN-20141119123253-00237-ip-10-235-23-156.ec2.internal.warc.gz
en
0.919905
411
2.828125
3
By Cameron Chai Scientists at UCLA has have isolated two molecules simultaneously on a substrate, controlled the stimulation with UV rays, and recorded their findings both before and after the stimulation. This is an endeavor to monitor substances at the nanoscale. The paper was published in the March 10 issue of Science. Paul S Weiss, who leads the team, is the director of UCLA's California NanoSystems Institute (CNSI) and professor of materials science and engineering at the Henry Samueli School of Engineering and Applied Science. This manipulation of molecular reactions is called regioselectivity. The molecules can be isolated and combined for getting various regioselective responses. The theoretical study was led by Kendall Houk, professor of chemistry and biochemistry at UCLA. Weiss stated that the scanning tunneling microscope can be used to determine molecular light absorption and charge dissipation in solar cells. He further added that manufacturers can enhance these molecules with artificial chemists. A research team led by Professor Alex Jen at the University of Washington collaborated on this project. Moonhee Kim in Weiss' lab isolated pairs of molecules by developing nanostructures to let only two molecules fit into a single place. In order to isolate and align the molecules in the desired manner, Kim used cutouts, in which certain shapes will only fit. She designed a cutout in a self-assembled monolayer, or SAM on a flat surface of gold. The cutout could hold two molecules that bound with the required alignment. For this, sulfur was applied to the molecule bottoms. The isolated molecules were then imprisoned on the substrate and simulated with light for initiating a reaction. The team could confirm the alignment and response of the molecules with the microscope designed jointly by Kim and Weiss.
<urn:uuid:f0bdc319-8d8c-42e6-98ec-06b0d51262a8>
CC-MAIN-2014-15
http://www.azonano.com/news.aspx?newsID=21926
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206647.11/warc/CC-MAIN-20140423032006-00259-ip-10-147-4-33.ec2.internal.warc.gz
en
0.954668
357
3.078125
3
1. If the size of the box of the lyre of the constellation Lyra is 5 degrees on a side, how many full moons would fit along the side? How many Suns? 2. How many arcseconds make up 360 degrees? 3. If you hold your arm out and make a fist, how many degrees of the sky does it blot out. 4. (T/F) The Dipper is just another name for the constellation Ursa Major. 5. In what constellation is the star Vega? Polaris? Deneb? 6. Which is brighter, a first magnitude star or a third magnitude star? 7. One star appears 10,000 times brighter than another. What is the difference in magnitudes between these two stars? 8. (T/F) Gamma rays have a longer wavelength than X-rays. 9. Name three wavebands which cannot pass through the Earth's atmosphere to reach the ground. 10. What does the prefix "nano-" mean? 11. Sketch the optical layout of our Celestron Schmidt-Cassegrain telescopes. 12. For a given telescope, the longer the focal length of the eyepiece, the (smaller,larger) the magnification and the (smaller,larger) the field of view. 13. What is the effective focal length of a telescope with a 4 meter mirror if you observe at the f/8 Cassegrain focus. What focal length eyepiece is needed to yield a magnification of x100. 14. If the faintest stars you can see with an 8 inch telescope are magnitude 14, what is the magnitude of the faintest stars you can see with a 16 inch telescope? 15. (T/F) The zodiac is the group of constellations located within about 9 degrees of the celestial equator. 16. (T/F) The point directly overhead is called the north celestial pole. 17. Briefly state what the following are: Meridian; Zenith; Horizon Plane; Transit; Synodic vs Sidereal period. 18. At what latitude does the noon sun pass directly overhead at mid-summer. What is the special name for this latitude? 19. At about what time of night would you expect to see the constellation Sagittarius rise over the Eastern horizon on May 15? 20. Which of the following is a circumpolar constellation? a) Aquila; b) Delphinus; c) Cassiopeia; d) Canis Major; e) Aries. 21. From what location on the Earth are all parts of the celestial sphere visible for at least some time during the year ? 22. What is the sun's location on 21 March and in which direction is it moving with respect to the celestial equator? 23. On what day of the year is the declination of the sun the largest? What is its value on that day? 24. Answer the following questions using the fact that Charlottesville is at a latitude of +38 degrees. (You should draw a sketch to remind yourself of the relationship between the various quantities involved.) 25. If the sidereial time is 20 hours, will an object with a Right Ascension of 16 hours be found east or west of the meridian ? 26. What is the sidereal time on July 21 at 10pm? Could you see a galaxy with coordinates RA=4h 20m Dec=+40 at that time ? 27. When does third quarter moon rise ? 28. How many degrees separate the sun and moon when the moon's phase is waxing crescent, 3 days past new moon. 29. Describe what precession of the Earth's rotation axis is and why it occurs. How does precession affect: the location of the NCP in the sky; the location of the vernal equinox in the sky; the month in which spring occurs; the astrological sign of someone who is born at the end of March. 30. What is the interval of time for a full precession cycle. 31. How many degrees around the equator does the vernal equinox move in a century. 32. (T/F) In precession, the sun and moon slowly pull the Earth's equatorial bulge into alignment with the ecliptic. 33. (T/F) Orion will always be a winter constellation. 34. What kind of eclipse does someone in the penumbral shadow of the moon see? 35. Eclipses can only occur : 36. Why is the moon still visible during a total lunar eclipse? 37. What is the inclination of the moon's orbit relative to the ecliptic; what are the nodes of the moon's orbit; Why must the moon be at a node for an eclipse to occur? 38. (T/F) The moon's line of nodes precesses once every 26,000 years. 39. (T/F) Eclipses occur, typically, about every four months. 40. Roughly how often does Mars pass through the constellation of Orion? 41. (T/F) Neither Venus nor Mercury can reach quadrature. 42. An inferior planet has a greatest elongation of 33 degrees. What is its distance to the sun in AU? 43. (T/F) Mars shows a half phase at Quadrature. 44. You are on Mars. It is martian midnight. You see a planet high in the sky. Which of the following planets could that planet be? 45. (T/F) Venus orbits the sun in about 7 months. If Venus is at greatest eastern elongation in January, then the next time it will be at greatest eastern elongation will be in July. 46. In general, Uranus undergoes retrograde motion twice as often as Neptune. 47. Jupiter is about to reach opposition. Which direction in the sky is it moving? 48. Why is Saturn so oblate ? 49. Why are there rather few asteroids whose orbits have perihelion distance less than 1 AU? Answer the same question for comets. 50. (T/F) A comet tail is material coming off the comet nucleus and trailing behind as it moves through the solar system. 51. What is the difference between meteors seen during a meteor shower, and meteors seen at other times of the year.
<urn:uuid:0a8744f5-6fe7-4cd7-b690-0e2fb1668857>
CC-MAIN-2015-11
http://www.astro.virginia.edu/class/whittle/astr1230/review_questions_f13.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465456.40/warc/CC-MAIN-20150226074105-00157-ip-10-28-5-156.ec2.internal.warc.gz
en
0.912689
1,340
3.5625
4
You may be surprised to know that oil and natural gas are produced from dead animals that lived millions of years ago, 570 million years ago to be exact. Back then, in what scientists call the Paleozoic Era, New Mexico wasn’t anything like it is today. It was under the ocean! But even the ocean wasn’t like it is today. There were no sharks, dolphins, seahorses or any kind of animal we know in this ocean, millions of tiny creatures called plankton were food for larger animals such as trilobites, crinoids and brachiopods… Trilobites are hard-shelled, segmented creatures that lived over 300 million years ago. They went extinct before dinosaurs even existed. When scientists were learning about different eras in time, they discovered that trilobites were one of the key creatures of the Paleozoic Era. Crinoids are known as sea lilies because they live on a stem and have a body that looks like a flower. They kind of look like starfish, except for the stem. Crinoids were abundant in the shallow tropical seas during the Paleozoic Era, but they are very uncommon today. Brachiopods are marine animals that look like clams because they have two shells, but they are really quite different. They usually make their homes in very cold water, either deep in the ocean or towards the North and South Poles. Because of where they live, most people never see brachiopods. You may be asking, what do these animals have to do with oil and gas? The answer is that they ARE oil and gas. Check it out… As these and other animals died, their skeletons would be buried under mud and sand, which protected them from harsh conditions in the ocean. Once the bones of the animal hardened, the surrounding material would form around it, preserving the shape forever. This is called a fossil. 320 million years passed and by then the ocean floor was covered with fossils and dead plankton. This was during the Mesozoic Era, when dinosaurs roamed the earth. The water level dramatically dropped because of evaporation, so the fossils were no longer under water, but they were still protected by mud and sand. New material started to pile up on the fossils, pushing them deeper into the earth and causing huge amounts of heat and pressure. After 250 million years of heat and pressure, the fossils began to change from their organic state into hydrocarbons, which are substances containing both hydrogen and carbon. The hydrocarbons are protected by sedimentary rock. The rock can effectively protect the hydrocarbons because it is inorganic and contains no carbon. The hydrocarbons have now been subjected to temperatures ranging from 150 to 300 degrees Fahrenheit for millions of years. All the pressure and heat creates a chemical change in the hydrocarbons, which creates oil and natural gas. Now you can see how fossils formed long ago make fuel today. That’s why we call them fossil fuels!
<urn:uuid:c92bc95f-3567-4d0d-9372-e61ce1495b48>
CC-MAIN-2016-30
https://www.nmoga.org/where-do-fossil-fuels-come-from
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257825124.22/warc/CC-MAIN-20160723071025-00124-ip-10-185-27-174.ec2.internal.warc.gz
en
0.975184
623
3.859375
4
In high-altitude piston aircraft, what type of forced induction (boost) is used? Turbocharger or supercharger? You can have either (turbo- or super-) or both (superturbo-), there is also the turbo-compound engine. Most WWII aircraft engines had mechanically driven superchargers, and the turbosuperchargers (with intercoolers) were added to achieve desired altitude performance. Modern aviation piston engines designed to run at high altitudes typically include a turbocharger rather than a supercharger. The change in thinking is largely due to economics. Aviation gasoline was once plentiful and cheap, favoring the simple, but fuel-hungry supercharger. As the cost of fuel has increased, the supercharger has fallen out of favor. — Wikipedia [edited for context; citations missing from main article] During WWII, two-speed two-stage intercooled superturbocharged engines were common. (Frames from YouTube) Compressed air via the exhaust-driven-turbine is channeled to a geared mechanically-driven supercharger. (The jet-engine must have had a laugh.) You get the super part, which is a mechanically-driven compressor boost. The turbo part, which is a turbine-driven compressor boost. Intercooler for cooling the air. The two speeds and stages are for low- and high-altitude operations. Otherwise the engine could blow at low-altitude. - Above is an example of having both, however as noted in the comments, superturbocharger as a term is nowadays used to describe a turbocharger. Here's a declassified training film—from which the above frames were taken: Turbosupercharger: Master of the Skies (1943) Initially, all supercharging was done with, well, superchargers. Read NACA Technical Note 48 for a nice summary of German work on superchargers during WW I which reached the point of almost being ready for operational use when the war ended. All of these projects failed in the sense that the war ended before the technology could yield military advantage. While we have nothing by way of the detailed reporting on German wartime research accorded to British and American efforts, it appears that Germany came closest to producing combat-ready supercharged engines. Certainly they had a denser supplier network than the Allies, more consistent research goals, and accumulated far more hours of test flying. Turbochargers were investigated soon after but were used much less frequently for two reasons: - Due to the higher inertia a turbocharger reacts only slowly to speed changes, which limits the pilot's options especially in fighters. - To avoid overstressing the engine, turbochargers need a wastegate. Before automatic wastegates were developed, the risk of manual mishandling of the wastegate setting was all too real. Turbochargers were first used in production aircraft engines such as the Napier Lioness in the 1920s, although they were less common than engine-driven centrifugal superchargers. Only when bombers and airliners needed to maximise their range did the advantage of turbochargers, their higher efficiency, take effect. In many cases a supercharged engine had a turbocharger added because the high energy content of the exhaust gases offered easy gains in efficiency. Note that most early examples of turbocharged aircraft were types in which the engines are run at a constant power setting over many hours. What also helped was the development of jet engines which spurred both the research into high-temperature alloys and turbine aerodynamics. This was a mutually reinforcing development, because the first turbojet designs were based on then-existing turbochargers. With automatic wastegates, little requirement to frequently adjust engine power, much experience in high-temperature materials and high fuel prices, today the turbocharger is the obvious choice for boosting engine pressure. The most recent piston-powered high altitude platforms, the Boeing Condor and the Grob Strato 2C, used turbochargers. In case of the Condor this was a two-stage turbocharger with intercooling, however, flight test revealed synchronisation problems between both stages. The Strato 2C had two turbochargers and one supercharger, all with intercooling.
<urn:uuid:b561b12c-1bb2-440a-a8a6-5b54a48f0e2c>
CC-MAIN-2024-10
https://aviation.stackexchange.com/questions/33407/in-high-altitude-piston-aircraft-what-type-of-forced-induction-boost-is-used
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475897.53/warc/CC-MAIN-20240302184020-20240302214020-00359.warc.gz
en
0.969205
895
3.3125
3
The Value of Work By Steve Gillman What is the value of work? It is common to note that people are happier when they have meaningful work to do. It has also been shown that on average, health declines more if one retires rather than continuing to work. It seems that humans need to be doing something productive to be happy. On the other hand, it is also common for people to actually hate the work they do, and be stressed by it. This can't be healthy. In fact, there are plenty of studies which show all sorts of negative effects on health that come from stress. Work, then, can be bad for you or good for you. That raises some questions about the value of work on a personal level. Questioning the Value of Work 1. What kind of work should one be doing to remain happier as one ages? Are you doing the work that you are best suited to? Are you doing something that you enjoy and will continue to enjoy? Should we see it as normal to move from profession to profession as we age, in order to stay mentally engaged? 2. Does the work need to be productive or is just keeping busy the goal? Is it important to actually be producing much with our work, or is it enough just to have something to do? Would you be happy keeping busy at a job that really wasn't necessary? 3. Could it be that work has been credited for the deeper value of simply exercising ones capacities, which could be done through travel, hobbies, volunteering for a cause or studying something of interest? In other words, do you really need to have a job or to "work" in the sense of doing something of economic value? Could the value of work be just one way to achieve the deeper needs you have to be creative and active? Could you be as happy playing chess and writing poems that never get published? 4. Is the pay received from work enough to compensate for a job that is hated? Can you be happy doing something you don't enjoy for forty hours weekly if it buys you enough of what you want in other areas? How much more would you have to make to take a job that was hated versus doing work you enjoy? Yes, there are more questions than answers here, and that is the point. This is something you have to think through for yourself. The value of work is a personal matter and will mean something different to each of us.
<urn:uuid:4d3a7987-c3e9-4e8d-abfb-2cc7eb01fdef>
CC-MAIN-2017-39
http://www.everywaytomakemoney.com/value-of-work.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685850.32/warc/CC-MAIN-20170919145852-20170919165852-00511.warc.gz
en
0.977055
538
2.546875
3
Yosemite National Park Announces the Public Comment Period for the Invasive Plant Management Plan Environmental Assessment Invasive plants are one of the greatest threats to the integrity of National Park Service lands. Non-native plants invade an estimated 4,600 acres of federal land in the United States every day, and already infest millions of acres in the national parks. Fortunately, Yosemite National Park is at the early stages of invasion, with less than 1% of the landmass within the Park contaminated with invasive plants. Unfortunately, 177 non-native plant taxa have already established within Park borders, many with the potential to spread rapidly. The purpose of this Invasive Plant Management Plan Environmental Assessment for Yosemite National Park is to evaluate a range of alternatives to prevent the establishment and spread of invasive plants into uninfested areas of the park, and quickly and effectively eradicate new infestations. The public comment period for the Invasive Plant Management Plan Environmental Assessment will open on Friday, June 13, 2008 and will run through Sunday, July 13, 2008. The plan is available on the park's website at http://www.nps.gov/yose/parkmgmt/invasive.htm. A public meeting will take place on Wednesday, June 25, 2008 from 1:00 p.m. to 5:00 p.m. during the monthly Open House in the Yosemite Valley Visitor Center Auditorium. Additionally, park representatives will be available at the El Portal Planning Advisory Meeting on Tuesday, July 8, 2008 at 7pm in the Clark Community Hall. Written scoping comments should be postmarked no later than July 13, 2008. Comments can be submitted at public meetings, by mail, fax, email, and through the Planning, Environment, and Public Comment (PEPC) commenting system. To request a hard copy or CD ROM version of the EA and to submit written comments: Mail: Superintendent, Yosemite National Park For more information on park planning efforts, visit the website at www.nps.gov/yose/parkmgmt.htm.
<urn:uuid:fc4da8f4-a264-4a4a-a6ad-0197fca1da1c>
CC-MAIN-2016-36
https://www.nps.gov/yose/learn/news/ipmp608.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292975.73/warc/CC-MAIN-20160823195812-00230-ip-10-153-172-175.ec2.internal.warc.gz
en
0.920691
420
2.75
3
Pssst… we can write an original essay just for you. Any subject. Any type of essay. We’ll even meet a 3-hour deadline.Get your price 121 writers online Anglo-Saxon poetry is most known for its regard to the timely darkness of the world they were written in. Both from the Anglo-Saxon period, “The Wanderer” and “The Seafarer” exhibit strong characteristics of literature of the time. Accompanied by a strong relationship in theme and purpose of the two poems, the tones of the narrators create polarity that distinguishes “The Wanderer” from “The Seafarer.” “The Wanderer” begins with a strong impression of a melancholy tone perceived by the reader as he begins to tell his story as an exile, living in near solitude and helplessness. He describes his situation: “No one knew me now, no one offered comfort, allowed me feasting or joy.” It is obvious through this passage that his conflict is interpersonal—he is not with anybody who will offer him what he once would never have to ask for. Believing that the world was corrupt because of these on-land struggles, his tone becomes dark and his words spit hatred of evolving times when “warmth is dead.” However, the same idea of the unwelcoming feeling the land its inhabitants bear is presented in “The Seafarer,” only the narrator takes on the situation with what can only be described as a passion. The narrator essentially finds a way out and utilizes the sea as an escape. Though his narration is riddled with complaints of hunger, chill, and lack of shelter, the seafarer prefers the hardships of home at sea than on land, in a world he claims is “blown clear of love.” The seafarer faces the internal conflict of where he should be—in the desolate, roaring waters or in a social environment on land. He also mentions the changing of times and how the world has “bent like the men who mold it,” which is further incentive for the narrator’s preference to the sea. His picture of the sea is that of a potential journey, which essentially would make the journey worth any turmoil. The main difference in tone comes from the narrators’ perspectives. Where the wanderer is left without any choice but to live as an outcast, the seafarer chooses to outcast himself. Because the wanderer is in this position, the telling of his conflict reflects the emotion behind loneliness, rejection, and lack of direction. The seafarer, on the other hand, knows exactly what he is putting himself through and chooses the tumultuous life at sea because he is seeking journey and adventure, which he feels is not available to him on land. At points in both poems, there is both a sense of hopelessness and of hope. There is a theme that corruption lies in society, and the people—lords and rulers in particular—are no longer at the aid of people or peers. The wanderer is an exile and the seafarer is urged into solitude due to this corruption. Thematically, faith also plays a large role as both the wanderer and seafarer believe God is a rock in a shaken society. While the wanderer has nowhere to go and nobody left to accept him, he places his faith in God to lead him and assure him everything will piece together. For the seafarer and his conflict, his solitude will not become a problem in reaching spiritual achievement because God is stable despite the rough seas of his life. The idea of God being hope is prevalent in both. Christianity is a single light that shines in the dark Anglo-Saxon age, and is mentioned in both “The Wanderer” and “The Seafarer.” This presence of faith intertwined with the dark settings presented relate both poems to common characteristics of Anglo-Saxon poetry, one characteristic being the presence of war and turmoil, both which appear in “The Wanderer” and “The Seafarer.” The prominent purpose of the poems is to detail these struggles and conflicts found within the narration, including the struggle of changing social philosophies and a lack of growth through experience. Both narrators reference to a decline from what was a “golden age” of rulers and emperors to a world where only the strong survive; the ability to accept this change in social morals is an ongoing challenge. Both speakers have also realized the impact of life experience after gaining knowledge of life as a result of their situations; the wanderer understands what makes a man wise, while the seafarer comes to realize that his permanent home will be in Heaven, away from the dying world. These growths were brought on by experiences both good and bad, which the wanderer and the seafarer feel there is a severe lack of among people who choose to only live in comfort. No two works of literature can be exactly the same, but “The Wanderer” and “The Seafarer” draw some very similar parallels in terms of theme and purpose that directly relate them to the characteristics of Anglo-Saxon poetry. It is the subtle differences in the general tones of the speakers that separate these two poems into their own identities, but within the same category of elegiac Anglo-Saxon poetry. To export a reference to this article please select a referencing style below: Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you. Your essay sample has been sent. Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.Order now Are you interested in getting a customized paper?Check it out!
<urn:uuid:ba52e87a-149f-477b-875e-788ca91b67d9>
CC-MAIN-2020-10
https://gradesfixer.com/free-essay-examples/a-literary-study-on-the-anglo-saxon-poetry-features-and-styles-based-on-the-wanderer-and-the-seafarer/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146485.15/warc/CC-MAIN-20200226181001-20200226211001-00080.warc.gz
en
0.966325
1,205
3.53125
4
In a recent study by PCTools, Windows Vista was found to be far more vulnerable to malware than Windows 2000. These tests were run on both server and client editions of the operating system and the following statistics were provided: Windows Vista was found to allow 639 threats per thousand computers while Windows 2000 only was allowing 586. Based on these statistics 64% of Vista users are in danger, however; only 59% of Windows 2000 users are in danger. These numbers seem damaging to Microsoft considering that Vista has been marketed as the most secure version of Windows to date. However, after a bit of examination, these statistics are not quite as blunt as they seem. The 5% difference between the two operating systems is not a large margin. Also Dennis Kudin points out that software such as Internet Explorer 7 will not run on Windows 2000. Internet Explorer 7 provides security that requires newer service packs that Windows 2000 simply cannot run. This provides a whole new target for Vista that Windows 2000 does not have. Windows Vista provides the UAC (User Access Control) system to stop processes from being administrators without permission. Most Windows 2000 users ran under administrator by default, which would allow malware to be more effective. Microsoft’s director of project management security, Austin Wilson, commented on his blog that Vista was tested fully and stated “We study the malware space very carefully and publish our results twice a year in the Security Intelligence Report. This report is compiled from statistics on malware infections based on over 450 million executions of the Malicious Software Removal Tool (MSRT) every month. Microsoft is a member of AMTSO (Anti Malware Testing Standards Organization) and its charter includes defining test methodology so that there is a minimum quality bar to all testing of this type.“ It seems that PC Tools may have been rather hasty in their claim, however; with all the “added security features” and testing that Vista has undergone a 64% infection rate seems to be a bit high. Even with the security provided by UAC and Vista’s built in security, Austin Wilson recommends, and rightfully so, that users still run firewall and anti-virus software.
<urn:uuid:54409941-309c-415a-9822-ab06409143ec>
CC-MAIN-2014-35
http://blog.psych0tik.net/2008/05/windows-vista-is-less-secure-than-windows-2000/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921550.2/warc/CC-MAIN-20140901014521-00335-ip-10-180-136-8.ec2.internal.warc.gz
en
0.961795
442
2.640625
3
Everything seems to hurt Jovi Craig. When she recently had a cervical biopsy, a relatively minor in-office procedure, she says she "was literally crying and gripping the table in pain," despite taking the painkillers her doctor had prescribed. Friends sometimes make light of Craig’s sensitivity to pain, and even some doctors she’s seen have been dismissive. But the 33-year-old communications manager from Newark, Calif., is not a wimp; some people really do feel more pain than others. Women and Pain Her gender may hold a key. A 2002 study showed a difference in women’s and men’s pain thresholds. According to one of the researchers on that study, William Maixner, PhD, DDS, director of the Center for Neurosensory Disorders at the University of North Carolina, when the body is injured, it releases a flood of pain-relieving substances, notably beta endorphins, a natural opioid. But many women’s bodies release fewer beta endorphins than men’s bodies do, Maixner says. Fewer natural painkillers can translate to more pain for women from the same injury -- although, interestingly, women's threshold for pain gets higher when they're giving birth. This difference may have evolved, Maixner speculates, because beta endorphins dull all of the five senses. If his theory is right, it could explain studies that show women are more likely to develop conditions such as migraine headaches and to suffer more acutely after an operation. Individual differences seem to be due to genetic variations, Maixner says. Also, pain thresholds fluctuate. Stress and pain go together, and researchers have found that life events, such as the death of a close friend or family member or job loss, can increase sensitivity to pain. On the other hand, a heightened sensitivity to the daily bumps and bruises of life can make you more stressed out -- and even more thin-skinned. Craig is learning to deal with her low pain threshold by being upfront with her doctors, practicing deep breathing, and listening to meditation tapes when she undergoes a procedure. But she wishes others would realize she’s not overreacting. She says, "If I could control it, believe me, I would!" If you have a low pain threshold, try these strategies to reduce the toll it takes on you, says Maixner: Speak up. Inform your doctor or other medical professionals ahead of time that you’re highly sensitive to pain, so they can take extra measures during procedures and provide appropriate relief afterward. Relax. Deep breathing can reduce the production of epinephrine, a chemical that increases sensitivity to pain. Try Jovi Craig’s tactic of listening to relaxing music before, during, and after procedures to stay calm. Train. Cognitive behavioral therapy can help you learn coping skills.
<urn:uuid:762825a0-37a9-402c-a2a3-0dbf3dcad5a9>
CC-MAIN-2019-51
https://www.webmd.com/women/features/low-pain-threshold-heres-why
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541288287.53/warc/CC-MAIN-20191214174719-20191214202719-00343.warc.gz
en
0.952986
598
2.53125
3
Alzheimer's Treatment with Stem Cells With stem cell therapy, the progression of Alzheimer's disease can be slowed down and regressed, and even stopped completely. The success rate of the treatment is proportional to the patient's age, the duration of the disease and the patient's condition. If the disease has severely progressed, treatment may need to be repeated more than once. - The treatment of Alzheimer's disease with stem cells is recognized as a new method that scientists are working on. - Stem cells have the ability to turn into brain cells when they touch these cells, and that being the case, they are used in the treatment of Alzheimer's disease. - Stem cell therapy is used in autoimmune system diseases because it has the effect of improving, triggering and regulating the body's autoimmune (defense/immune) system. Since the regulation of the autoimmune system has positive effects in the treatment of Alzheimer's disease, stem cells are once again important in the treatment of the disease. - Stem cells are used in the treatment of aged and weakened organs in the body as well. Therefore, they are also effective in treating organs with impaired functions due to aging or Alzheimer's. - The size of the administered stem cells is small enough to pass through the brain cells. Therefore, the success rate of the treatment increases significantly in early diagnosis. The treatment protocol is precisely determined according to the patient's condition and a different protocol is applied for each patient. - Previous studies reported a very high percentage of positive results with stem cell therapy. This treatment significantly prevented progression to further phases of the disease in 75% of the patients and helped to resolve the existing serious condition. What is Alzheimer's? Alzheimer's disease is one of the most common types of dementia (diminished mental skills due to disease). Although the cause of the disease has not been fully identified, Alzheimer's is caused by premature death of brain cells or by shrinkage of these cells, resulting in them losing their activity. Exactly as in the case of dementia, Alzheimer's is a disease progressing from disruption of daily activities to failure of the patient to express himself/herself, impairment of his/her relations with the environment, deterioration of his/her calculation judgment skills and perception in further stages, which causes personality changes, a number of psychological symptoms in later stages. In later stages of the disease, the patient becomes unable to even take care of himself/herself. S/he may become bedbound and fail to fulfill his/her daily needs and become a completely dependent patient. What are the symptoms of Alzheimer's disease? Initial symptoms of the disease; - As the nerve cells in the brain begin to die, short-term forgetfulness occurs as well. (the patient cannot remember what s/he did and what s/he ate the day before). - She/he can't remember words, dates, or directions he/she already knew. - She/he begins to find it hard to make calculations and practical thinking. - She/he forgets the places of things (puts them in elsewhere) - As the disease progresses, he/she cannot complete his/her daily routine and he/she asks the same questions again and again, and begins not to recognize his/her relatives. - His/her character traits change and s/he may start blaming people. - The patient whose psychology deteriorates becomes introverted. - She/he avoids assuming responsibility. - She/he cannot meet his/her needs such as speaking, walking, going to the toilet, and becomes bed bound. Causes of Alzheimer's Disease Alzheimer's disease occurs when the brain cells die earlier than programmed, the cause of which is not fully understood. (Every person experience brain cell death with age, but in Alzheimer's disease, this process occurs very quickly and earlier than expected). Although it is seen very rare (in approximately 5 out of 100 patients), it has genetic forms as well. Although the exact cause of the disease is not known, a number of conditions causing risk include age, past depression, vascular diseases, and serious head injuries in the past. The effects of the Alzheimer's can be slowed down with the medication currently used for this disease. This increases the use of mental functions of Alzheimer's patients, delaying them to live in a dependent state. However, since there is no definite treatment of the disease with drugs, it is very important that people with Alzheimer's disease and their relatives receive support services. Treatment of Alzheimer's with Stem Cells Stem cells have the ability to turn into brain cells when they touch dying brain cells, and that being the case, they are used in the treatment of Alzheimer's disease. The size of the cells given is small enough for them to penetrate into the brain tissues and therefore, the recovery rate increases significantly in early diagnosis. The number of cells to be administered is determined according to the age and weight of the patient. Treatment is carried out using mesenchymal stem cells (derived from the patient's own adipose tissue or bone marrow). The treatment of the patient is decided according to the condition of the patient. It can be performed in 3 sessions 45 days apart or in 3 consecutive days. The treatment protocol is precisely determined according to the patient's condition and a different protocol may be applied for each patient. The most obvious and lasting effects of the treatments were obtained in the initial stage of the disease, in which neurological and mental symptoms have appeared (in 90% of the cases). Positive results were also obtained in patients with organic brain lesions (atrophy of the frontoparietal lobes). If the disease is too advanced and no adipose tissue can be removed from the patient, using "fetal stem cells" may be recommended for treatment. As a result of application of stem cells in patients with significant mental disorder, the quality of life of the patients significantly increased (general condition, sleep, appetite, etc.) as well. This disease can be treated at our GenCell Stem Cell Treatment Center in Kiev, Ukraine. FREQUENTLY ASKED QUESTIONS Is Alzheimer's a Genetic (Hereditary) disease? Genetic factors are known to play a role in Alzheimer's disease. 30% of the patients have dementia in their families. This factor is more effective in patients diagnosed at a younger age (under 65 years old). Are there any precautions to avoid Alzheimer's disease? It is known that doing sports is important to avoid Alzheimer's. It is believed that doing physical exercise three times a week reduces the chance of dementia by 70%. Not smoking, consuming vitamin B12, taking vitamin D, reducing alcohol consumption and brain exercises are some of the measures that can be taken against Alzheimer's. How is Alzheimer's diagnosed? The most important symptom of Alzheimer's disease is the patient's forgetfulness. However, it is not right to consider all forgetfulness as Alzheimer's. Many people experience forgetfulness in their daily lives, but continue to live without Alzheimer's. Patients considered to have Alzheimer's disease should be evaluated with neurological examinations, laboratory tests and neuropsychological tests. To people at high risk, EEG, i.e. cortical mapping, MRI and PET scans may also be recommended. - Hunsberger, J. G., Rao, M., Kurtzberg, J., Bulte, J. W., Atala, A., LaFerla, F. M., ... & Doraiswamy, P. M. (2016). Accelerating stem cell trials for Alzheimer's disease. The Lancet Neurology, 15(2), 219-230. - Duncan, T., & Valenzuela, M. (2017). Alzheimer’s disease, dementia, and stem cell therapy. Stem cell research & therapy, 8(1), 111. - Sugaya, K. (2005). Possible use of autologous stem cell therapies for Alzheimer's disease. Current Alzheimer Research, 2(3), 367-376. - Ager, R. R., & LaFerla, F. M. (2016). Stem cell therapy for alzheimer's disease. Reviews in Cell Biology and Molecular Medicine. - Kang, J. M., Yeon, B. K., Cho, S. J., & Suh, Y. H. (2016). Stem cell therapy for Alzheimer’s disease: A review of recent clinical trials. Journal of Alzheimer's Disease, 54(3), 879-889. - Kim, H. J., Seo, S. W., Chang, J. W., Lee, J. I., Kim, C. H., Chin, J., ... & Kim, S. T. (2015). Stereotactic brain injection of human umbilical cord blood mesenchymal stem cells in patients with Alzheimer's disease dementia: a phase 1 clinical trial. Alzheimer's & Dementia: Translational Research & Clinical Interventions, 1(2), 95-102.
<urn:uuid:9084bcd1-6eb8-49fb-a48f-e306ba7b2d6e>
CC-MAIN-2022-05
https://www.gencell.com.ua/en/alzheimers
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301592.29/warc/CC-MAIN-20220119215632-20220120005632-00169.warc.gz
en
0.929286
1,875
3.171875
3
I found this article so intriguing. “A picture is worth a thousand (coherent) words: building a natural description of images". At the same time, it shouldn’t come as totally unexpected. After all, Google has been doing amazing things with images for a long time. Google Goggles is just an indispensible tool. Take a picture and let Googles help you decipher what it is. It’s a great replacement for a specific QR Code reader application but can be so useful in answering the questions “What is that?” or “Tell me more about that?” It’s a great tool for inquiry. In addition, Google’s Search by Image lets you get alternative views to a picture that you’ve taken or found online. Humanity has been feeding the web images forever, tagging and describing them, and search engines are there to index them. An algorithm to describe the images just seems to me to be a natural in the progression of things. Just the possibilities of this are kind of mind boggling. Google has a picture of my house online. I wasn’t there when they drove by but they did. Can you see comments generated like “Looks like Doug needs to cut his grass”. Or, in the next stage of commerce, identifying all the dandelions on my front lawn and sending an email to the local landscaping companies who have subscribed to a service with the message “We’ve got a live one…” Technology serves us best when it makes out lives better. - Immediate results from an x-ray or MRI with a detailed description not subject to human error; - A description of a robbery suspect moments after a holdup at the local variety store; - A description of a hit and run vehicle caught on camera, again moments after it happened. Sometimes, we’re slow at adopting new technologies. While the process seems at its infancy now, it’s bound to mature. What will our lives be like when it does? What does this do to our privacy? This article makes for a great classroom discussion. Can students extend the list of uses for an application like this?
<urn:uuid:1b092b4f-a954-4560-a66d-51a48d73e130>
CC-MAIN-2017-47
https://dougpete.wordpress.com/2014/11/20/a-natural-progression/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809160.77/warc/CC-MAIN-20171124234011-20171125014011-00310.warc.gz
en
0.930831
462
2.578125
3
When we believe in others more than they believe in themselves, we want to push them to become what we see in them. Our intentions are noble; our passion authentic. The trouble is that children and adults alike are likely to perceive excessive urging as criticism and disappointment, which to some degree it is. Rather than responding with “Yes, you’re right. I can do this,” they are likely to think, “I am disappointing others again. I am never good enough.” Pushing, even with good intentions, minimizes the importance of autonomy and inner motivation. Excessive pushing also tends to trigger resistance. Encouraging words are more likely to be taken in and believed when they are spoken earnestly but without excessive force. It’s fine to say, “You can do it,” but it’s best to avoid bringing exaggerated heat and repetition to that encouragement. That which proves too much, proves nothing! As Dean Rusk said, “One of the best ways to persuade others is with your ears – by listening to them.” The basis for any persuasion is understanding what motivates the other person. Inspiration comes from example and true friendship or at least a respectful relationship. Far better to live your own path imperfectly than to live another’s perfectly. by Alison Poulsen, PhD
<urn:uuid:54b71d80-57d5-4e87-b7bd-5e9e1a7a98b3>
CC-MAIN-2014-35
http://www.sowhatireallymeant.com/2011/09/15/inspire-vs-attack-%E2%80%9Cwhy-don%E2%80%99t-you-just-believe-in-yourself-why-do-you-always-have-to-let-fear-get-the-best-of-you%E2%80%9D/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500824970.20/warc/CC-MAIN-20140820021344-00304-ip-10-180-136-8.ec2.internal.warc.gz
en
0.956861
285
2.6875
3
Although their yellow flowers can be used to make wine and the leaves are a tasty addition to salads, few people want to encourage dandelions to grow in their garden. Unlike shallow-rooted weeds, the deep taproots of dandelions make them difficult to pull out. Store-bought herbicides do kill dandelions, but the chemicals are harmful to waterways, people, pets and wildlife. For a healthier way of ridding your yard of dandelions, concoct your own herbicide with a handful of common household ingredients. If you can boil water, you can kill dandelions. All you need is a stove-top kettle or electric kettle and water. After bringing the water to a boil, pour it directly onto the leaves of the dandelions, making sure that enough water reaches the root. Within two to four hours, you'll notice the leaves have turned brown. You can then pull out the dandelion, root and all. Isopropyl alcohol, also known as rubbing alcohol, is readily available in the first aid section of most pharmacies. Mix 2 tablespoons of the alcohol with 1 quart of water. Pour the mixture into a spray bottle and spritz your dandelions being certain to wet all the leaves. The alcohol sucks the moisture from the leaves and kills the plant. This mixture is best applied on a sunny day when there is little wind. If the leaves haven't withered after a couple hours, spray the plant again. You can use the natural acidity of white vinegar or apple cider vinegar to destroy your dandelions. Simply pour pure vinegar into a spray bottle and spray the unwanted plant until it is covered in vinegar. Within a few hours, the leaves will wither and turn brown. Doing this on a hot, sunny day will help speed the demise of the dandelion. After the plant dies back, pull it out and rinse the area with water. If you only have time to attack your dandelions on a cool or cloudy day, adding lemon juice will give your vinegar more of a punch. Adding dish soap will help the mixture stick to the leaves better, giving the vinegar and lemon juice more time to work against the weed. When using this recipe, opt for an all-natural, biodegradable dish soap. Mix 1 tablespoon of liquid dish soap, 1/4 cup of lemon juice and 1 quart of vinegar. Pour this into a spray bottle and spray enough to thoroughly coat all parts of the dandelion. If the dandelion hasn't completely withered within three hours, spray the plant again. - Jupiterimages/Photos.com/Getty Images
<urn:uuid:d9dba45a-b38c-43e4-b36b-8fc1f8a28fcc>
CC-MAIN-2018-26
http://homeguides.sfgate.com/homemade-natural-dandelion-weed-killer-44593.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860684.14/warc/CC-MAIN-20180618164208-20180618184208-00209.warc.gz
en
0.922149
539
2.546875
3
Demystifying the Nutrition Facts panel can help you eat more healthfully. Eye-catching claims on the front of food packages compete for your attention: Made with whole wheat! Reduced sugar! A good source of fiber! Truth is, the most helpful information on a food product is on the back (or side) of the pack, in the Nutrition Facts Panel, which is standardized by law. By having a basic understanding of what the terms in this panel mean—and how they affect you—you can make healthy, informed choices about what you’re putting into your body. 1. Serving size. To make comparing foods easier, similar foods must have similar serving sizes—but “one serving” might not be what you typically eat in one sitting. Always check the serving size and adjust 2. Calories. Again, these only reflect calories in a single serving, and you’ll need to adjust if you eat more or less than that. 3. Total Fat. Reflects the total grams of fat per serving and the calories coming from fat. This information is less useful than the breakdown of the type of fat in the foods. 4. Saturated Fat. Look for as low as possible. Current dietary recommendations say that people should eat 7 percent or less calories from saturated fat. Per 2,000-calorie intake, that means a total of 16 grams per day. 5. Trans Fat. Look for “0.” But keep in mind that food with less than 0.5 grams of trans fat per serving can be labeled as “0.” Instead look on the ingredient list for any “partially hydrogenated” or “hydrogenated” ingredients, which are also sources of trans fats. 6. Cholesterol. As low as possible (aim for 300 mg or less daily). 7. Sodium. As low as possible (USDA Dietary Guidelines recommend 2,300 mg/day or less). 8. Dietary Fiber. As high as possible (aim for 25 grams for women or 38 grams for men daily). 9. Sugars. Interesting but not always useful, since labels don’t discriminate between naturally occurring sugars (such as in milk or fruit) and added sugars. 10. Vitamins and minerals. Vitamins A and C, calcium and iron are required to be listed on labels. They’re shown in the form of Percent Daily Values. Daily Values are reference amounts set by the Food and Drug Administration (FDA). You can use Daily Values to help you understand how a food may help you meet your needs for a specific nutrient. Percent Daily Values on Nutrition Facts panels are based on a 2,000-calories-per-day diet. Tip: Scanning the ingredients list can tell you a lot about a product. Ingredients are listed in order of how much the food contains, by weight. So if you’re noticing ingredients you’re trying to limit (think: salt, sugar or high-fructose corn syrup) high up in the list, you might think twice about opting for this product.
<urn:uuid:594aec86-000d-497e-9446-2de34f927be7>
CC-MAIN-2017-34
http://www.eatingwell.com/article/278072/your-guide-to-nutrition-labels/?quicktabs_1=2
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104172.67/warc/CC-MAIN-20170817225858-20170818005858-00213.warc.gz
en
0.925281
664
3.671875
4
Support provided by: Study Guide: Soul of a Nation (Episode 5) In the post-World War II era, rising evangelist Billy Graham tried to inspire a religious revival that fused faith with patriotism in a Cold War battle with "godless communism." As Americans flocked in record numbers to houses of worship, nonbelievers and religious minorities appealed to the U.S. Supreme Court to test the constitutionality of religious expression in public schools, and civil rights leader Martin Luther King Jr. emerged as a modern-day prophet, calling upon the nation to honor both biblical teachings and the founders' democratic ideals of equal justice. Christianity and Cold War America On Sept. 23, 1949, President Truman informed the nation of a startling new development: the Soviet Union, America's ally in World War II, had exploded a nuclear device. Once a friend, the USSR was now a foe, and the threat of its nuclear capability shattered the postwar return to normalcy. The event was announced a few days before a little-known evangelist named Billy Graham was scheduled to launch a crusade in the city of Los Angeles, home to film stars, sex and sin. Graham seized the moment, positioning Christian America against "godless communism." He sought to save souls, but he also sought to save the nation. As Graham barnstormed across the country, he combined Christianity and patriotism in a way that appealed to many people, including President Dwight Eisenhower, who urged Americans to attend church, adding that "our form of government has no sense unless it is founded in a deeply felt religious faith, and I don't care what it is." At a huge rally in New York's Madison Square Garden, Vice President Richard Nixon shared the pulpit with Graham and reassured the audience: "I'm sure we all realize that one of the most basic reasons for American progress in the past and for our strength today is that from the time of our foundation we have had a deep and abiding faith in God." But some Americans pushed back against this fusion of religion and patriotism. In Champaign, Ill., a self-described humanist, Vashti McCollum, challenged the widespread practice of "release time," when public school students were "released" from academic instruction and allowed to receive religious instruction on school grounds. Her case, McCollum v. Board of Education, eventually reached the Supreme Court. In 1948, in an 8-1 decision, the court ruled the practice unconstitutional. The ruling gave rise to howls of protest and created a lurking suspicion that the court harbored a secret hostility toward religion. In 1962, the Supreme Court made another controversial ruling in Engel v. Vitale. Brought by five Long Island families of Jewish heritage, the case challenged the longstanding practice of prayer in public schools. The court found in favor of the plaintiffs, once again unleashing an avalanche of criticism. In the years that followed, the court ruled on Bible reading in public schools, a moment of silence in public schools, and displays of a Christmas crèche in a public courthouse. To its critics, the court appeared intent on draining religious expression from public spaces. In fact, it was attempting to find a middle ground that protected religious minorities from unwanted expressions of and exposure to religious symbols and language. In both the McCollum and Engel cases, Justice Hugo Black wrote the majority opinion. In McCollum he referred again to Thomas Jefferson's letter to the Baptist Association of Danbury, Conn. and repeated Jefferson's language about "a wall of separation between church and state," as well as the court's view that such a wall "must be kept high and impregnable." The court's decision in McCollum has been described as "the greatest single safeguard to separation of church and state outside the First Amendment itself." Read an excerpt from it: Pupils compelled by law to go to school for secular education are released in part from their legal duty upon the condition that they attend religious classes. This is beyond all question a utilization of the tax-established and tax-supported public school system to aid religious groups to spread their faith, and it falls squarely under the ban of the First Amendment. ... To hold that a state cannot … utilize its public school system to aid any or all religious faiths or sects in the dissemination of their doctrines and ideals does not, as counsel urges, manifest a governmental hostility to religion or religious teachings. A manifestation of such hostility would be at war with our national tradition as embodied in the First Amendment's guaranty of the free exercise of religion. For the First Amendment rests upon the premise that both religion and government can best work to achieve their lofty aims if each is left free from the other within its respective sphere. "What Kind of America I Believe In" On Sept. 12, 1960, Democratic presidential candidate John F. Kennedy addressed the Greater Houston Ministerial Association in response to alarm over the prospect of a Catholic president. Evangelist Billy Graham worked behind the scenes to support a Protestant campaign against Kennedy and encourage influential Protestant ministers to endorse Republican candidate Richard Nixon. Just days before Kennedy spoke in Houston, Graham organized a gathering of ministers in Washington, D.C. presided over by prominent Protestant preacher Norman Vincent Peale. The Houston address was a dramatic public moment in the 1960 campaign, and the sense was that Kennedy successfully "embraced his faith while specifically denying that it would be a hindrance in carrying out the constitutional duties of the presidency," as one writer has put it. The candidate spelled out his view of the separation of church and state and addressed what historian Grant Wacker describes in this episode as "a historic Protestant fear that a Catholic president could not possibly be uncompromised in relation to the Vatican." Read excerpts from Kennedy's Houston speech: I believe in an American where the separation of church and state is absolute, where no Catholic prelate would tell the president -- should he be Catholic -- how to act, and no Protestant minister would tell his parishioners for whom to vote; where no church or church school is granted any public funds or political preference and where no man is denied public office merely because his religion differs from the president who might appoint him or the people who might elect him. I believe in an America that is officially neither Catholic, Protestant, nor Jewish; where no public official either requests or accepts instructions on public policy from the pope, the National Council of Churches, or any other ecclesiastical source; where no religious body seeks to impose its will directly or indirectly upon the general populace or the public acts of its officials; and where religious liberty is so indivisible that an act against one church is treated as an act against all. ... I am not the Catholic candidate for president. I am the Democratic Party's candidate for president, who happens also to be a Catholic. I do not speak for my church on public matters, and the church does not speak for me. ... But if the time should ever come -- and I do not concede any conflict to be even remotely possible -- when my office would require me to either violate my conscience or violate the national interest, then I would resign the office; and I hope any conscientious public servant would do the same. "Equal Souls, Equal Votes" While the Supreme Court moved to circumscribe the place of religion in public schools and public spaces, faith fueled the movement for civil rights. Local activists had worked for years to pave the way, but the man who emerged as the chief spokesman for the movement was Martin Luther King Jr., a Baptist preacher who had studied the teachings of Gandhi and developed his own philosophy of nonviolent resistance. Historians have called his "Letter from Birmingham Jail," written in April 1963, the tide-turning document of the civil rights movement and an eloquent summation of his political and theological philosophy. King aide Andrew Young wrote that "more than any other document or statement, Martin's letter helped to lay a strong moral and intellectual basis not only for our struggle in Birmingham, but for all subsequent movement campaigns in the South. It has become a classic in American literature." Near the end of his letter King asked: "What else is there to do when you are alone for days in the dull monotony of a narrow jail cell other than write long letters, think strange thoughts, and pray long prayers?" Read an excerpt from the letter that includes King's famous statement about injustice: I am in Birmingham because injustice is here. Just as the eighth-century prophets left their little villages and carried their "thus saith the Lord" far beyond the boundaries of their home towns; and just as the Apostle Paul left his little village of Tarsus and carried the gospel of Jesus Christ to practically every hamlet and city of the Graeco-Roman world, I too am compelled to carry the gospel of freedom beyond my particular home town. Like Paul, I must constantly respond to the Macedonian call for aid. Moreover, I am cognizant of the interrelatedness of all communities and states. I cannot sit idly by in Atlanta and not be concerned about what happens in Birmingham. Injustice anywhere is a threat to justice everywhere. We are caught in an inescapable network of mutuality, tied in a single garment of destiny. In his Oval Office speech to the nation on June 11, 1963, President John F. Kennedy addressed civil rights as a moral issue that was "as old as the scriptures and is as clear as the American Constitution." As historian Clayborne Carson points out in this episode, "That's precisely what King has been saying." Historian Frank Lambert underscores the point: "Martin Luther King did see America's founding documents as giving a voice, giving expression to fundamental biblical principles. We're all equal before God, says the Bible. All men are created equal, says the Declaration of Independence." King always "put one foot in the Constitution and the other in scripture," according to author Taylor Branch, whose three-volume history of America in the King years explores religion's important role in the civil rights movement. King's oratory, writes Branch, "mined twin doctrines of equal souls and equal votes in the common ground on nonviolence." Read an excerpt from Branch's book Pillar of Fire on how religion and democracy were intertwined in King's words and thoughts while he was in jail in Birmingham: Invariably [King] pulled up hope in paired phrases of secular and religious faith. "We will win our freedom," he wrote, "because the sacred heritage of our nation and the eternal will of God are embodied in our echoing demands." No fewer than five times he called upon variants of "Constitutional and God-given rights" as the twin footing that grounded his outlook. There was something characteristically American about the notion of divine sanction for democratic values, but King's own struggle against despair pushed beliefs back to the earliest prophets of monotheism. Centuries before Plato, they introduced a deity that shockingly held kings and peasants to the same moral laws and rejected the forceful authority of state violence as evil. Their concept of equal souls anticipated and lifted up the democratic principle of universally equal votes. To hold the belief in justice among equal souls as the key to religious as well as political conviction seem at once crazy and noble, wildly improbable and starkly human. ... "One day the South will know," he concluded, "that when these disinherited children of God sat down at lunch counters, they were in reality standing up for what is best in the American dream and for the most sacred values in our Judeo-Christian heritage, thereby bringing our nation back to those great wells of democracy…" At the March on Washington on Aug. 28, 1963, thousands of civil rights workers and protestors gathered at the foot of the Lincoln Memorial to hear King's "I Have a Dream" speech. The moral urgency of the moment pushed John Kennedy to introduce a civil rights bill, eventually passed by Lyndon Johnson. King was euphoric, but he broke with Johnson over the Vietnam War, refusing to compromise his principles in order to retain his access to political power. By the time he was assassinated at age 39, King had assumed the mantle of an American prophet. How would you describe the role the Cold War played in the convergence of American religion and politics? How did religious and political leaders use Protestant Christianity to counter fears of communism, Catholics, and the national insecurities of the time? Dwight Eisenhower was the first president to write and recite a prayer at his inauguration. He approved adding "one nation, under God" to the Pledge of Allegiance and "In God We Trust" to U.S. currency. What were the characteristics of Eisenhower-era religiosity? What was evangelist Billy Graham's message to America, and how did it resonate in the '50s and '60s? How did he represent postwar evangelicalism? Professor Stephen Prothero speaks of a "marriage" between religion and politics after World War II. Philip Goff says both Dwight Eisenhower and Billy Graham "marry" religion and democracy. Do you agree? Could the same also be said of Martin Luther King Jr.? What evidence or examples of such a close relationship between religion and democracy do you find in American history, in this episode, and in other episodes in the series? Philip Goff also says "religion is a sign of democracy" and "democracy is, in fact, a public expression basically of a deeply felt religion." What do you think? Is there a contradiction between the marriage of religion and democracy and the separation of church and state? Professor Frank Lambert observes that the 1950s were a time of "reclaiming this notion that we're a chosen people," a dominant idea in America's self-understanding and one that recurs throughout God in America. How does the notion of a special mission and a special relationship with God come back into play in religion and politics during the Cold War? According to one sociologist of religion, "There has not been a generation since 1630 that has not understood Americans to be in some sense or other a chosen people." What do you think of this conclusion? How do you understand the meaning of Americans as "chosen people"? How is the First Amendment tested in the stories in this episode? What is at issue in the two Supreme Court cases that are highlighted? Why did the court rule as it did? What events and circumstances in the larger world encouraged the court to move in the direction of protecting religious minorities? Why was Vashti McCollum's legal case against the public schools of Champaign, Ill., viewed as such a threat? How do the stories of the McCollum family, the Long Island families in Engel v. Vitale, and their interactions with public education compare with the story earlier in the series of the immigrant Catholic families of New York and the efforts of Bishop John Hughes on behalf of the education of Catholic children? How would you have decided the McCollum and Engel court cases? Why? Do you agree with Professor Stephen Prothero that public schools "have always been a place where we inculcated this religious sensibility and where we made the connection between Christianity and morality and citizenship"? Should they be? Are there other sources of morality besides religion? Why did some Protestants fear the prospect of a Catholic president? What did John F. Kennedy do to address their concerns, and what did he say to try to convince them otherwise? What relevance do you think the debates about religion in the 1960 presidential campaign have for politics today? Analyze the moral vocabulary of Martin Luther King Jr. and the way he uses words such as freedom, righteousness, justice, and community. What meaning does he give them? What religious reasoning does he employ? How is his language different from the political discourse of the time? "Throughout American history the main story we've gravitated toward has been the Exodus story," says Professor Stephen Prothero. What are the themes of the Exodus story, and where do you see them played out in the history of America and in the episodes of God in America? A commitment to religiously rooted nonviolence was arguably the civil rights movement's most powerful tool for social reform. What became of nonviolent change after the death of Martin Luther King Jr., and why do nonviolent strategies seem to have disappeared? The life, death and legacy of Martin Luther King Jr., says Andrew Young, "point to the fact that this is a religious universe." What do you think he means by this? What is he saying about the significance of religion for the civil rights movement? How did the civil rights movement demonstrate the public power of religion in America? The Restructuring of American Religion: Society and Faith Since World War II by Robert Wuthnow Religion in America Since 1945: A History by Patrick Allitt Spiritual Politics: Religion and America Since World War II by Mark Silk A Prophet with Honor: The Billy Graham Story by William Martin The Preacher and the Presidents: Billy Graham in the White House by Nancy Gibbs and Michael Duffy Original Sin and Everyday Protestants: The Theology of Reinhold Niebuhr, Billy Graham, and Paul Tillich in an Age of Anxiety by Andrew Finstuen A Testament of Hope: The Essential Writings and Speeches of Martin Luther King Jr. edited by James M. Washington Parting the Waters, Pillar of Fire, and At Canaan's Edge by Taylor Branch The Preacher King by Richard Lischer Let the Trumpet Sound: A Life of Martin Luther King Jr. by Stephen B. Oates Walking with the Wind: A Memoir of the Movement by John Lewis A Way Out of No Way: The Spiritual Memoirs of Andrew Young by Andrew Young God's Long Summer: Stories of Faith and Civil Rights by Charles Marsh Blessed are the Peacemakers: Martin Luther King Jr, Eight White Religious Leaders, and the Letter From Birmingham Jail by S. Jonathan Bass Rhetoric, Religion, and the Civil Rights Movement edited by Davis Houck and David Dixon King's Dream by Eric Sundquist The Word of the Lord Is Upon Me by Jonathan Rieder The Making of a Catholic President: Kennedy vs. Nixon 1960 by Shaun Casey God in the White House by Randall Balmer Protestantism in America by Randall Balmer and Lauren F. Winner Religion in American Politics: A Short History by Frank Lambert The Scandal of the Evangelical Mind by Mark Noll The Spirit of the Law: Religious Voices and the Constitution in Modern America by Sarah Barringer Gordon Separation of Church and State by Philip Hamburger The Battle Over School Prayer: How Engel V. Vitale Changed America by Bruce J. Dierenfield The First Amendment in Schools by Charles Haynes et al. One Woman's Fight by Vashti Cromwell McCollum PBS: Crusade: The Life of Billy Graham Stanford University: The Martin Luther King Jr. Research and Education Institute Martin Luther King Jr. Center for Nonviolent Social Change PBS: AMERICAN EXPERIENCE: Eyes on the Prize First Amendment Center Wheaton College: Billy Graham Center Archives The Lord Is Not on Trial Here Today by Jay Rosenstein Published October 11, 2010 You don't have permission to access /wgbh/pages/frontline/includes/footer.inc on this server.
<urn:uuid:9aee7fd8-beaf-49dc-b6f7-c82b1fa461f9>
CC-MAIN-2014-49
http://www.pbs.org/godinamerica/study-guide/five.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379462.60/warc/CC-MAIN-20141119123259-00046-ip-10-235-23-156.ec2.internal.warc.gz
en
0.958686
3,965
3.453125
3
On Science Friday this past week, Holly Ingraham of UCSF was interviewed on her new study of atrazine’s impact on human placental cells. This builds on our conversation with atrazine, starting from March’s discussion on atrazine in frogs. In the study, they showed atrazine (& its metabolized products) increased activity of a gene that results in abnormal baby weight. Also they found amplification of a gene that is highly active in infertile women (no direct association yet). Science Friday interview with Holly Ingraham Holly also studied atrazine impacts on zebrafish, a widely used animal in developmental studies. She observed some genetic changes at doses as low as 2 part per billion (EPA’s drinking water limit is 3 ppb). In terms of human effects, she started to see genetic changes at 200 ppb (syngenta called these levels environmentally irrelevant). The chief effect in humans was changing hormone signaling mechanisms, which is fairly significant. Future studies will focus on how atrazine affects the brain, specifically areas that control metabolism. This will hopefully shed light on why atrazine affects endocrine cells. A quote from Holly: These atrazine- sensitive genes are central to normal reproduction and are found in steroid producing tissues. You have to wonder about the long-term effects of exposing the rapidly developing fetus to atrazine or other endocrine disrupters. Her research was funded by the National Institutes for Health.
<urn:uuid:c14c168d-bd1a-448c-a597-9cdc170a37ea>
CC-MAIN-2017-22
http://www.sciencecafesf.com/2008/05/11/another-study-on-atrazine/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607786.59/warc/CC-MAIN-20170524035700-20170524055700-00460.warc.gz
en
0.944652
307
2.546875
3
Mocha Dick – Inspiration for Moby Dick Mocha Dick is one of the most famous whales in history. This great bull sperm whale was a true legend of the sea, known for his incredible size, strength, and intelligence. He was both feared and respected by Nantucket whalers, and his exploits inspired many stories and myths over the years. Mocha Dick’s story is one that has captured the imagination of people around the world for centuries and may well have inspired Herman Melville’s antagonist Moby Dick. Mocha Dick was first encountered in the early 19th century, off the coast of Chile around Mocha Island, hence his unusual name. He was a leviathan, estimated to be over 70 feet long. He was an albino whale which made him easily distinguishable from other sperm whales. American explorer and author Jeremiah N. Reynolds published his account, “Mocha Dick: Or The White Whale of the Pacific: A Leaf from a Manuscript Journal” in 1839. In this account, he describes Mocha Dick to be “as white as wool”. Although docile by nature if attacked or riled he was ferocious and had the ability to outsmart whalers, often attacking their ships in reprisal and evading capture. Over the years, Mocha Dick became something of a legend among whalers. With his incredible strength and agility came cunning and intelligence. Many sailors believed that he was possessed by a supernatural spirit, which gave him these incredible powers. Others thought that he was simply a creature of exceptional ability and intelligence and that he had learned how to outsmart his human hunters through years of experience. It is believed that Mocha Dick had around 100 encounters with whaling ships. During those encounters, it is said he killed around 30 men and sunk 20 whaleboats. Mocha Dick was also known for his compassion and his ability to form strong bonds with other whales. He was often seen swimming with pods of other whales, and he would sometimes protect them from whalers and other predators. He was also known to show affection towards humans, and there are stories of him playing with sailors who were stranded at sea. The date of his demise seems to vary (1838 or 1859) but when the whalers examined his body he had at least 19 rusting harpoons embedded into his blubber. They also extracted 100 barrels of oil from him, the average for a whale at that time would be around 25-40 barrels. There were many other sitings and killings of white whales in the years after, but none were quite so legendary as Mocha Dick. Lovesail.com is a worldwide network of single sailing enthusiasts that meet for dating, friendships and crewing opportunities. Visit our friendly sailing community today.
<urn:uuid:4c38f4cd-a355-4cf0-b0f7-544ce17d4852>
CC-MAIN-2023-40
https://www.lovesail.com/ls-news/2023/03/mocha-dick-inspiration-for-moby-dick/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00514.warc.gz
en
0.991343
583
3.140625
3
What is Hyaluronic acid? Hyaluronic acid was discovered by Karl Meyer in 1934 and has been successfully used in personal care and wound healing. Until 1990's, only have method of producing hyaluronic acid was extracting it from rooster combs. Currently, there are two forms of hyaloronic acid on market: one from rooster combs and other by fermentation in lab. Only have use vegan-approved version that originates from lab. In nature, hyaluronic acid is also found in extracellular matrix of human tissue. Topically applied, hyaluronic acid forms an air-permeable layer and penetrates into dermis, thus boosting elasticity and hydration of skin. Protective, breathable barrier on skin, locks in moisture, which gives skin a youthful appearance. cuticular layer of skin normally contains 10-20% water. As age, however, it can drop to below 10%. Hyaluronic acid comes to rescue with its unique ability to more than 1000 ml of water per gram of hyaluronic acid, which is a key factor in allowing skin to retain more water. Amazingly, hyaluronic acid adjusts its moisture absorption level based on relative humidity in air. It's ideal ingredient in skin care products, as it adjusts to skin's need for a moisturizing effect, depending on relative humidity of seasons and climate of an area. Hyaluronic acid also protects epidermis by scavenging reactive oxygen species, generated by ultra-violet light that would normally cause sunspots. Hyaluronic acid benefits: - Hyaluronic acid is a substance that is naturally present in the human body. It is found in the highest concentrations in fluids in the eyes and joints. - The hyaluronic acid that is used as medicine is extracted from rooster combs or made by bacteria in the laboratory. - Hyaluronic acid is also used as a lip filler in plastic surgery.It is also using to prevent the effects of aging. - Hyaluronic Acid (HA, Hyaluronic, Cyclic Acid) is a critical component of the skin that helps to retain moisture, keeping the skin firm, and preventing wrinkles by adding volume to the skin. How Hyaluronic acid works: Hyaluronic acid works by acting as a cushion and lubricant in the joints and other tissues. In addition, it might affect the way the body responds to injury. Hyaluronic acid Dosage: For treating osteoarthritis: healthcare providers inject hyaluronic acid into the knee joint. Hyaluronic acid Precautions: Hyaluronic acid is likely safe when taken by mouth, applied to the skin, or given by injection and appropriately. Rarely, hyaluronic acid may cause allergic reactions. Where to buy Hyaluronic acid? If you want to buy capsule products, please select the Amazon. If you want to buy extract powder, please choose us. More detailed information about the high-quality suppliers, please click here: www.best-dietary-supplements.com
<urn:uuid:22072530-ee0d-40fc-8ff3-a18f512555e0>
CC-MAIN-2017-43
http://best-dietary-supplements.com/hyaluronic-acid-26
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823282.42/warc/CC-MAIN-20171019103222-20171019123222-00372.warc.gz
en
0.937485
655
3.125
3
Recently we have been studying Gwen Harwood’s poem “Barn Owl” which tells the story of a child who leaves bed at sunrise and shoots a Barn Owl that lives in the barn. The Barn Owl comes home to the barn every morning to sleep. The child expected the owl to die immediately he shot it but it didn’t; instead it was badly hurt and the poem describes how it fell from the beam and was tangled in its own inards. The child’s father came to the barn when he heard the shot and told the child to finish what he started and put the owl out of its misery. Revision of the points we discussed while analysing the poem – - the poet does not tell us if the child is a boy or a girl. Most of the class thought the child was a boy but others imagined a girl - most students thought the child was about 12. The poet doesn’t tell us. - the poem is set at sunrise on a farm - there are only two characters in the poem – the child and father – plus the Barn Owl - The poem begins when the child gets out of bed and goes to the barn to kill the owl. No reason is given in the poem for this. We don’t know why he/she wanted to kill it. As a class we discussed what could have happened before the poem started and what prompted the child to want to do this. There were various ideas about what happened before hand. Through the poet’s choice of words we can see this is a poem about power. For example before he shoots the owl, he describes himself as “a horny fiend” “master of life and death” and “a wisp-haired judge whose law would punish beak and claw”. - Who is involved in the power struggle? In the poem the child talks about the his father dreaming of ” a child obedient, angel-mild, old no-sayer, robbed of power by sleep”. This suggests the child is angry with his father and wants to show him he is not an obedient angel and because he is going to shoot the owl very early in the morning, his father won’t have a chance to say ‘no’. - After the owl has been shot, the child describes himself in a different way – “lonely” “afraid” “cruel”. Something has changed. The owl did not die immediately, it suffered terribly and he didn’t know what to do. The feeling of power has gone. - When his father came in and told the child to “end what you have begun”, he shot the owl and cried on his father’s shoulder. - In class we talked about why the father made him kill the owl and most students said the reason was to put the owl out of its misery. However, the father could have done that. Perhaps the father needed to teach the child a lesson about growing up. - This may be the message the author is trying to put across in the poem? - We also discussed in class about gaps in the poem. In particular who’s missing? The mother is nowhere around. There are no siblings either. Why? Task 1 is to re-write the poem as a story, filling in the gaps, starting the story before the poem begins and ending it afterwards. Use your imagination to write a story explaining why mum is missing, why the boy is angry and wants to show his dad he has power, and finishes the story off for us. Example: You might think that mum is sick and in hospital; the father went hunting rabbits and would not allow the child to go along. In anger, the child decided to show his father he could hunt. After the owl was killed, the father realised how much it meant to the child to go with him, so he allowed him to go along but only after teaching him about how to be responsible around guns. Task 2 – write a story about a time you did something you regret.
<urn:uuid:2133168d-fd73-4383-8bd7-385ec46cadd3>
CC-MAIN-2019-13
https://lynnflannery10.wordpress.com/2013/03/13/analysis-of-barn-owl/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202572.29/warc/CC-MAIN-20190321193403-20190321215403-00252.warc.gz
en
0.985116
856
3.28125
3
A healthy diet, understood as “sufficient, complete, balanced, satisfactory, safe, adapted to the diner and the environment”, is the recommendation that the general population should attend, and also people affected by covid-19 with mild symptoms or the asymptomatic. Scientific evidence does not support that any food group protects against covid-19, but it does support that some hoaxes and half-truths, such as the disproportionate consumption of micronutrients such as vitamin D or iron, can be especially harmful to health. Neither garlic nor ginger prevent infection; the properties of zinc in many foods do not prevent infection; probiotics – which have been shown to be highly effective in numerous infections – do not improve the treatment of this disease. In recent months there have been reports of numerous medical societies and organizations and specialists in nutrition and endocrinology to lay the foundations for the most adequate diet during the pandemic and to try to banish the many hoaxes that swarm in this regard. María Barado, specialist in nutrition and dietetics, emphasized this lack of scientific evidence and observed that what has been shown is the impact that the microbiota or intestinal flora has on the development of the worsening of the symptoms of the disease and the importance therefore that it is in the best possible conditions. “When news is given about the supposed protective effect of a food against any pathology, it is not taken into account that it can be harmful for those who suffer from a basic disease and that said food can worsen it,” María Barado told EFE, Professor of Nutrition at the International University of La Rioja (north). The Spanish Nutrition Association and the General Council of Official Associations of Dietitians-Nutritionists concluded that the consumption of certain foods or a certain diet “cannot prevent the risk of contagion from healthy people, and in sick people the diet could only help in the managing the symptoms of the disease itself, but in no case treating it “. And those organizations point out that a healthy diet, understood as “sufficient, complete, balanced, satisfactory, safe, adapted to the diner and the environment”, is the recommendation that the general population should attend, and also those affected by the covid- 19 with mild or asymptomatic symptoms. María Barado stressed in this regard that there are seven basic recommendations to benefit from a healthy diet: hydration; five servings of fruits and vegetables a day; increase the consumption of whole grains and legumes; consume low-fat dairy; consume protein of animal origin, especially lean meats, oily fish, eggs or cheeses; increase the consumption of nuts and olive oil; and avoid ready meals. Among the recommendations that have been disseminated in recent months and that in his opinion may be more dangerous to health, he cites the consumption of vitamin D or iron -associated with “lactoferrin” – without being prescribed by a professional, and observed that the consumption of these micronutrients can cause an accumulation in the body that leads to harmful effects. Vitamins and minerals Barado recalled that vitamins and minerals are essential to strengthen the immune system and that the main sources to obtain them are fruits and vegetables, emphasized the preference to lean towards those that are “seasonal”, and also insisted on the importance of milk and its derivatives as sources of protein and calcium. Unverified information “can cause damage to people’s health since it can act against a pathology that the individual has previously,” the professor warned, and referred to how people’s perception of it has changed. what is a “healthy diet” and how this concept has been adapted to the new opportunities that come from other markets. Until trends were imposed on the limitation of the consumption of certain foods, diets that propose the exclusion of some products and even intermittent fasting, said the specialist, who stressed the importance of not attending to information “without any scientific rigor” to avoid situations that may endanger people’s health.
<urn:uuid:cd1b345f-d4f8-4673-803b-5f60d191bef1>
CC-MAIN-2021-31
https://graphiconlinenews.com/food-against-covid-19/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154219.62/warc/CC-MAIN-20210801190212-20210801220212-00162.warc.gz
en
0.959382
840
3.296875
3
Houston - Despite the warnings against getting too much sun, about half of Americans over the age of 30 have had a sunburn at least once in the past year. There are some easy ways to relieve the sting of a serious sunburn. For instance, to take the edge off, try a washcloth soaked in milk. Milk has anti-inflammatory properties, so it can help soothe irritated skin, just make sure it's cow's milk. Moistened tea bags can also take the sting out of a burn. Tea contains tannic acid, a substance used in World War I to treat burns. Drinking two cups of tea a day may also prevent a sunburn in the first place. Finally, Cucumbers! Cucumbers contain vitamins, so running a piece of cucumber over a burn can decrease the inflammation damage in the skin. All simple sunburns solutions so you can have a smoother summer. Of course, the the best way to avoid sunburn, is to stay out of the sun, especially in the middle of the day, and always wear sunscreen with an SPF of 15 or higher. Copyright 2013 by Click2Houston.com. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
<urn:uuid:87d17e88-64c4-4113-9a38-2b56bca67786>
CC-MAIN-2017-26
http://www.click2houston.com/news/home-remedies-that-soothe-summer-sunburns
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321306.65/warc/CC-MAIN-20170627083142-20170627103142-00496.warc.gz
en
0.932407
263
2.640625
3
The human papilloma virus (HPV) vaccine (Gardasil, Cervarix) has been approved for use in girls for several years now, allowing us to protect our young female patients from many cases of cervical cancer and genital warts. While the benefits likely will not be seen for some time, as pediatricians we are excited to be able to provide, for the first time, definitive protection against a virus-caused type of cancer. Approval for use of the vaccine against HPV in boys has been slower in coming, however. While they do not get cervical cancer, for obvious reasons, males are susceptible to other forms of disease caused by HPV, including genital warts, and they can also serve as a vector for transmission of this virus to their sexual partners, so including them in the target group for protection makes good scientific sense. Recently, however, the American Academy of Pediatrics came out with a recommendation to use the vaccine (Gardasil) in males as well as females. This was followed by a similar recommendation by the Advisory Committee on Immunization Practices (ACIP) of the Centers for Disease Control and Prevention (CDC). Having received this “official” approval, many of us have begun immunizing our adolescent male patients, and the acceptance of the vaccine by these patients and their parents has been encouraging. Initially, payment for the vaccine was an issue, but the vaccine has been approved for use by the Vaccines for Children (VFC) program, and most health insurance carriers are covering the vaccine for their insureds as well. Most, but not all, however. Our group, along with a number of others, has been told by the large national insurance company United HealthCare that the HPV vaccine is NOT a covered benefit for adolescent males. While other national insurance companies have been paying for the vaccine for months now, UHC was first waiting for the CDC to recommend it. Now that that has occurred, they state that they are waiting for that recommendation to be published in MMWR, the weekly report of the CDC, which can take time to occur, And after that, they claim that, by their contracts, they have an ADDITIONAL 60 days to begin to pay for it. So despite the fact that this vaccine has been recommended and recognized as important for good health by many organizations and governmental bodies, United HealthCare is using SEMANTICS to delay covering a medical procedure which has been shown to be effective in preventing disease in patients who are paying premiums to United for just that sort of health assurance. Frankly, in my opinion, this is a disgrace. The only reason for refusing to cover this vaccine upon CDC recommendation can be that United HealthCare does not want to cover the expense of this admittedly costly vaccine. As physicians, we recommend that all adolescents, male and female, be vaccinated against HPV. And as parents, we want to do all that we can to protect our children, of both genders, from a preventable disease. If United HealthCare is your insurer, call them and object to their short-sighted and greedy policy. There is no reason that your children should be denied the protection paid for by virtually every other major health insurance company. - CDC Panel Votes to Extend HPV Vaccine to Young Boys – ABC News (news.google.com) - HPV vaccine for boys recommended by US advisers (guardian.co.uk)
<urn:uuid:a05135e1-1bdf-44b9-96e4-f9ab067d275c>
CC-MAIN-2017-39
https://survivorpediatrics.wordpress.com/2011/11/05/insurance-companies-make-it-difficult-for-pediatricians/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685698.18/warc/CC-MAIN-20170919131102-20170919151102-00579.warc.gz
en
0.975536
698
2.9375
3
How To Make an Effective Presentation Outline Edraw Content Team Do You Want to Make Presentation Outline? EdrawMind helps move ideas forward, faster and better. Learn from this complete guide to know how to make a perfect Presentation Outline. Just try it free now! A presentation outline presents a comprehensive idea of what you plan to share with the audience. It is a synopsis of a talk, pitch, or subject matter under discussion. It serves as a guide for writing a paper, publishing a study, or building a presentation and enables you to structure your information in a way that is easy to understand. Making a presentation outline is similar to having all the necessary pieces in place before building a house. It may appear counter-productive to spend time and resources sorting things in the form of an outline. However, outlining saves time and gives clarity on a particular topic. A presentation outline assists you in preparing for your pitch or speech. It provides a clear path to take your audience from where it is to where you want it to be. It plays an important role in positively shaping people's perspectives about your planning and execution skills. There are several other advantages associated with creating a presentation outline which includes: - It helps in brainstorming your presentation and saves time by giving a clear idea of what you need to focus on. - It helps structure ideas so that they appear in a logical order. - It enables you to determine the main points you need to keep in your presentation. - You can categorize ideas into groups and create separate slides for each group for further clarity. - It helps you rehearse your presentation while going over the important points. - It provides a visual aid to help people understand your topic in a better way. The following steps will help you create a presentation outline: 1 Considering the Purpose of Presentation Determination of your presentation goal is fundamental to creating an outline. To find the purpose, you need to think about what you want from your audience. Finding this out will enable you to build your whole presentation. There are six purposes your presentation possibly have: - Inspiring to act Considering the purpose will help you build an impressive presentation. The following few questions will enable you to figure this out: - What do I want people to take away or understand from my presentation? - How will my talk help those attending the presentation? - What do I want people to do after the presentation is over? Answers to these questions will help you create a summary of your presentation and will serve as a fine starting point. 2 Creating Structure Creating a structure implies considering where different points belong in your discussion and where to use the supporting material. There are three main components of a presentation: - Main body Structuring your points and arguments in these parts will enable you to transition from one part of the presentation to another without creating any trouble. 3 Using an Attention Grabber Thinking about how you want to open your topic is an integral part of planning a presentation. If you want your audience to get engaged with what you are talking about, you can ask an interesting question, share a related story or quote something entertaining. It sets the tone for the rest of your discussion. 4 Considering Visual Content You can add images, videos, or other visual content to your presentation to convey what you want to. It helps you to communicate emotions, excitement, passion, and experiences effectively. You can also focus on using different fonts and colors to make your presentation more interactive and interesting. 5 Including a Call to Action A creative call to action will inspire your audience to take appropriate action. It will show what you want your audience to do after the presentation. Let your audience know what it will get from performing the required action. You can make a presentation outline in the following two ways: With PowerPoint and Word 1 Creating an Outline in Word - Open Word document. - Select View > Outline. This will automatically generate an outline and open the Outlining tools. - If there are headings in your document, you will witness those headings organized by level (from H1 to H9). If there are no headings in the document, the outline will appear as a bullet list. You can assign or edit headings, and heading levels. You can also set up the structure of your document. - Select a bullet item. - Select a heading Level 1 for slide titles, Level 2 for bullet points on that slide from the Outline Level box. - When the work is done, select Outline View to edit your document. - Select Save to save your document, name your file, and then select Save once more. - Select Close to close the document. 2 Importing a Word Outline into PowerPoint - Open PowerPoint and select Home > New Slide. - Select Slides from Outline. - In the Insert Outline dialog box, find and select your Word outline. Select Insert. - If you are creating the presentation outline with EdrawMind, start with a Mind Map/ Outliner at the left of the top bar. Mind Map/ Outliner can be switched to each other with one click. - EdrawMind provides you with several tools to create, draw, and customize your outline and record everything you need with the various functions. You can use different themes and fonts to enhance the visual impact of your presentation. You can also categorize your points into main topics and subtopics as per your need. - EdrawMind enables you to export in any way you want. You can save your document to Microsoft Word, Excel, or PowerPoint file to make your document available on any computer with Microsoft Office. This presentation outline template describes three components of the outline: The introduction, the main body, and the conclusion. The introductory part opens the topic with an attention grabber and summarises the importance of the topic and its relevance of the topic to the audience. It also includes learning objectives that points out what the audience is going to learn from this presentation. The main body part constitutes the main idea of the topic. This idea is substantiated by supporting material. The concluding part constitutes a summary of the topic discussed and what the audience learned from it. It reviews the main points and calls the audience to take appropriate action. Here are some important points to consider to create an effective presentation: - Know Your Audience. Get to know your audience by researching ahead of time so that you can make your presentation relatable. - Add Quotes, Testimonials, or Data. Adding additional information to your presentation can help you engage your audience better. - Visualize Your Ideas. The way you present your ideas is fundamental to the success of those ideas. EdrawMind helps you to create and present your ideas most effectively and efficiently. - Identify Key Takeaways from Your Presentation. It will enable you to recall, review, and reassert what you want to communicate with your audience. - Gather Feedback. Gathering honest feedback will help you make further improvements and adjustments to your presentation to make it more effective. A presentation outline is a tool to communicate your ideas precisely. It helps you brainstorm and plan your presentation in a logical flow. Moreover, it helps to grab the attention of your audience by providing it with a visual depiction of what you are going to talk. If you want to create an impressive and creative presentation outline, EdrawMind will help you in this regard. It has a variety of functions and tools which enable you to create a dynamic outline suited to your topic. It enables you to brainstorm and present your ideas most effectively by using different diagrams, charts, graphs, clipart, etc. EdrawMind provides the best solution to your presentation problems.
<urn:uuid:0c84faca-4c58-44cd-918b-102dbbc992d1>
CC-MAIN-2022-33
https://www.edrawmind.com/article/how-to-make-a-presentation-outline.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00147.warc.gz
en
0.895236
1,645
2.765625
3
What's in a IFilter? IFilter interface was designed by Microsoft for use in its Indexing Service. Its main purpose is to extract text from files so the Indexing Service can index them and later search them. Some versions of Windows comes with IFilter implementations for Office files, and there are free and commercial filters available for other file types (Adobe PDF filter is a popular one). The IFilter interface is used mainly in non-text files like Office documents, PDF documents etc., but is also used for text files like HTML and XML, to extract only the important parts of the file. Although the IFilter interface can be used for general purpose text extraction from documents, it is generally used in search engines. Windows Desktop Search uses filters to index files. For more information on IFilter, see the Links section. So what else is new? There are already quite a few articles and pieces of information on how to use the IFilter interface in .NET (see the Links section), so why write another article you ask? Well, there are some problems with the implementations offered in those articles (details below) which caused me to take a different approach to using and loading filters. I'm currently using this implementation in a new product I'm developing (more details will be revealed here), and since it's working great, I decided to share it with you (yes, You!). Issues with the current implementations These are the issues I and others have found with the current implementations, I'll discuss each in detail below: - Extracting text from very large files. - COM threading issues. - Adobe PDF filter crashing the application when it's closed. Extracting text from very large files All of the sample code I found on using IFilters in C# provided a method that extracts the entire text of a document and returns that as a string. Usually, it's something like this: public static string GetTextFromFile(string path) Now, this might be OK for some uses, but for a general purpose indexer, I find that it isn't the most scalable way to extract text from documents. Some documents may be very large (30 MB PDFs or Word documents are not uncommon), and extracting the entire text at once can have negative effects on the garbage collector since these objects will be stored in the .NET "Large Objects Heap" (see the Links section for more information). COM threading issues Since filters are essentially COM objects, they carry with them all the COM threading model issues that we all love to hate. See the Links section for some of the reported problems. To make a long story short, some filters are marked as STA (Adobe PDF filter), some as MTA (Microsoft XML filter), and some as Both (Microsoft Office Filter). This means MTA filters will not load into C# threads that are marked with the [STAThread], and STA filters will not load into [MTAThread] threads. Some people recommend manually changing the registry to mark "problematic" filters as Both, but this isn't something you want to do during the installation of a product, nor can you reliably do it because you don't know which filters are installed on the customer's machine. We basically need a way to load an IFilter and use it no matter what its threading model or our threading model is. Adobe PDF filter crashing the application when it's closed There are quite a few reports about problems with the Adobe PDF filter v6. See this and this for some examples. I researched this issue for some time, and I believe I found what the problem is. It seems Adobe forgot (or not..) to export the DllCanUnloadNow function from their PDFFILT.dll. Since a filter is implemented as a COM object, it should export this function to let COM know when it can unload this library. It seems that this causes problems for C# applications because the .dll is never unloaded, and when it does, it's probably a bit late. In a previous version of my application, I managed to work around this issue by specifically unloading the PDFFILT.dll library. In the current implementation, this workaround is not needed. How my implementation solves these issues? Implement a FilterReader I decided to go the hard way and implement a TextReader derived class called FilterReader. This solves issue #1 because we don't have to extract the entire text at once. Instead, you can simply use the reader to get a buffer at a time. If you still want to get the entire text as a string, use the In order to get an IFilter instance, you should call the LoadIFilter API and pass it a file name. LoadIFilter eventually calls CoCreateInstance() to actually instantiate the filter, and thus abide to COM rules. To avoid the threading issues, I decided to bypass COM and instantiate the filter COM class myself. This has the following implications and assumptions: - I needed to find the correct COM class that implements the filter for a specific file type. - I needed to dynamically load the COM DLL that implements that COM class and call the DllGetClassObject function that is exported from that .dll. - I didn't want to re-implement all of the COM infrastructure, so in order to solve the issue of unloading COM DLLs only when they're not needed, I decided to keep the DLLs loaded during the entire application lifetime and only unload them when the application dies. Note that this essentially solves issue #3 since we manually unload the PDFFILT.dll. IFilter should not be used by multiple threads since it is no longer protected by COM. - I assumed that STA filters will behave correctly when called from an MTA thread when COM is not involved. Until now, I didn't encounter any problem with this approach. If you find a filter that behaves badly when used this way, please let me know. How to use the code Using the code is very simple: instantiate a FilterReader by passing it the file you want to extract text from, and use it like any TextReader derived class: TextReader reader=new FilterReader(fileName); Finding the correct COM class Since I've decided not to use LoadIFilter, I needed to find a way to locate the correct DLL and class ID of the object implementing the filter for the file whose text we're interested in. This was a simple task, thanks to the excellent RegMon utility from SysInternals. I simply called LoadIFilter and traced which registry keys where read during that operation. I then used the same logic in my own implementation. The details can be found in the FilterLoader class. When a class\DLL pair is found for a certain file extension, this information is cached to avoid traversing the registry again. During the research I made on how LoadIFilter works, I came across a utility called IFilter Explorer that shows which filters are installed on your computer. From that tool, I also learned that some indexing engines use methods not implemented in LoadIFilter to find filters. One of these methods uses the content type registered for that extension. My version of LoadIFilter also handles loading filters for files that have no filter registered for them but do have a filter registered for their content type. Loading the DLL and instantiating the filter implementation OK, so we have the name of the DLL and the ID of the class implementing our filter, how do we create an instance of that class? Most of the work is handled by the ComHelper class. The steps needed to accomplish that are: - Load the DLL using the LoadLibrary Win32 API. - Call the GetProcAddress Win32 API to get a pointer to the Marshal.GetDelegateForFunctionPointer() to convert that function pointer to a delegate. Note: this is only available in .NET 2.0. For an equivalent method in .NET 1.1, see the Links section. - Call the DllGetClassObject function to get an private static IClassFactory GetClassFactoryFromDll(string dllName, Guid filterPersistGUID=new Guid(filterPersistClass); if (dllGetClassObject(ref filterPersistGUID, ref IClassFactoryGUID, out unk)!=0) return (unk as IClassFactory); Once we have an IClassFactory object, we can use it to create instances of the class implementing our filter: private static IFilter LoadFilterFromDll(string dllName, Guid IFilterGUID=new Guid("89BCB740-6119-101A-BCB7-00DD010655AF"); classFactory.CreateInstance(null, ref IFilterGUID, out obj); return (obj as IFilter); We finally have an IFilter instance that can be passed to our FilterReader (after doing the standard filter initialization code): IPersistFile persistFile=(filter as IPersistFile); IFILTER_INIT iflags = if (filter.Init(iflags, 0, IntPtr.Zero, out flags)==IFilterReturnCode.S_OK) Note that because we didn't use any COM calls during that process, we get a "raw" interface pointer to the filter class and COM does not create any proxy\stubs to protect that interface. I've been using this approach for several months now without any problems. Here's a summary of the benefits and implications with this approach: - No COM threading issues that cause certain filters not to function correctly. - No need to mark your thread as [STAThread] when using filters (this is a problem especially with web applications). - The Adobe PDF filter does not crash at the end of the application. - Better scalability when dealing with large files. - Better filter search logic than LoadIFilter (using content type). - Bypassing COM may damage your health :) - Actually, I very much enjoy bypassing COM, but FDA regulations force me to have that warning here. - Once filter DLLs are loaded into your application, they will stay loaded. If this is a problem for you, don't use this approach. - No COM protection for multi-threaded access to filters (Yeah, so?). Links and References
<urn:uuid:8e4e1fbf-073c-4cff-880b-0845ad59379c>
CC-MAIN-2018-51
https://www.codeproject.com/Articles/13391/Using-IFilter-in-C?fid=278909&df=90&mpp=10&prof=True&sort=Position&view=Normal&spc=Compact&fr=61
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376832259.90/warc/CC-MAIN-20181219110427-20181219132427-00323.warc.gz
en
0.882962
2,230
2.640625
3
Help save lives this holiday season What is Hodgkin lymphoma? Hodgkin lymphoma (HL) is a cancer that starts in lymphocytes. Lymphocytes are cells of the lymphatic system. The lymphatic system works with other parts of your immune system to help your body fight infection and disease. The lymphatic system is made up of a network of lymph vessels, lymph nodes and the lymphatic organs. Lymph vessels carry lymph fluid, which contains lymphocytes and other white blood cells, antibodies and nutrients. Lymph nodes sit along the lymph vessels and filter lymph fluid. The lymphatic organs include the spleen, thymus, adenoids, tonsils and bone marrow. Lymphocytes develop in the bone marrow from basic cells called stem cells. Stem cells develop into different types of cells that have different jobs. Lymphocytes are types of white blood cells that help fight infection. There are 2 types of lymphocytes: - B cells stay in the bone marrow to mature. - T cells move to the thymus to mature. Lymphocytes sometimes change and no longer grow or behave normally. These abnormal cells can form tumours called lymphomas. Hodgkin lymphoma usually starts in abnormal B cells called Hodgkin and Reed-Sternberg cells, or HRS cells. These cells are much larger than normal lymphocytes and have a large nucleus or more than one nucleus. Hodgkin lymphomas are divided into 2 main forms based on whether or not HRS cells are present: - Classic HL means that the HRS cells are present. The classic forms of HL include nodular sclerosis HL, mixed cellularity HL, lymphocyte-rich classical HL and lymphocyte-depleted HL. - Nodular lymphocyte predominant HL means there are very few or no HRS cells present. Because lymphocytes are found throughout the lymphatic system, HL can start almost anywhere in the body. It usually starts in a group of lymph nodes in one part of the body, most often in the chest or neck or under the arms. It usually spreads in a predictable, orderly way from one group of lymph nodes to the next. Eventually, it can spread to almost any tissue or organ in the body through the lymphatic system or the bloodstream. Other cancers of the lymphatic system are called non-Hodgkin lymphomas (NHL). The HRS cells of Hodgkin lymphoma look and behave differently from non-Hodgkin lymphoma cells. Hodgkin lymphomas and non-Hodgkin lymphomas are treated differently.
<urn:uuid:7b34fbaf-3414-4724-b4c6-72856613dda5>
CC-MAIN-2016-50
http://www.cancer.ca/en/cancer-information/cancer-type/hodgkin-lymphoma/hodgkin-lymphoma/?region=on
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540698.78/warc/CC-MAIN-20161202170900-00102-ip-10-31-129-80.ec2.internal.warc.gz
en
0.934541
535
3.84375
4
As you could see here, most English compounds are not hyphenated. However, a hyphen is used when a compound is a modifier. A modifier changes or adds to the meaning of the word that follows. In the phrase That’s a big house, the word big is a modifier; it adds something to the concept house. When the compound is a modifier, especially when it modifies a noun, we use a hyphen: This is a well-written article. But there is no hyphen in the following sentence: I think the article is well written. Here are some more examples: They are five-year-old children. (Notice that there is no plural -s). The children are five years old. He is a part-time mechanic. He works part time. This is a long-term project. We must plan for the long term. The hyphen often helps to clarify what the writer wants to say. He is selling his little-used bike means that the bike has not been used much. He is selling his little used bike would mean that the bike is little (small) and has been used. Do you understand the difference between a single family home and a single-family home? And between a small business owner and a small-business owner? Or an old furniture salesman and an old-furniture salesman? We can leave out the hyphen if there is no risk for confusion: I found a used car dealer. An adverb ending in -ly is not followed by a hyphen: A smartly dressed woman
<urn:uuid:2f148f5e-30bc-4939-8f9e-aad7d4073c08>
CC-MAIN-2022-33
https://copyeditor.se/tag/modifier/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00066.warc.gz
en
0.963301
339
3.34375
3
What is a chalazion? A chalazion is a lump on the upper or lower eyelid caused by a blockage in one of the meibomian glands in the lid. It may be soft and fluid-filled if it is recent, or, it may be firmer if it has been long-standing. A chalazion can also be referred to as a meibomian cyst, tarsal cyst, or a conjunctival granuloma. What are these glands? The meibomian glands may also be referred to as palpebral glands, tarsal glands, or tarsoconjunctival glands. There are 30 to 40 of these glands in each of the upper and lower eyelids. The upper lids contain a tarsal plate, a small piece of cartilage that gives the lid shape and protection. The meibomian glands line the lid on both the inside and outside portions of the plate. These glands produce a thick liquid secretion that is discharged into the tear film of the eye. This liquid is called sebum and is a mixture of oil and mucin. The liquid is secreted through the gland openings just behind the eyelashes at the lid margins, and acts to lubricate the surface of the eye. (Download below to continue reading)
<urn:uuid:675bba2f-918d-4294-ad20-1ee1428fda62>
CC-MAIN-2019-43
https://kopanoptometry.com/chalazion
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986648481.7/warc/CC-MAIN-20191014003258-20191014030258-00129.warc.gz
en
0.921567
277
3.390625
3
Our education system has not undergone any change with changes brought about by political Independence. It bears no reminiscence of freedom and appears as listless as it is used to be during the days of slavery. According to the Human Development report Pakistan is placed at the 136th position of having just 49.5% educated population. In addition to that, Pakistan is ranked at 113th out of 120 UN members according to the research done by UNESCO. Major flaws of the education system of Pakistan have contributed vividly to an ever increasing austerity in Pakistan. Our literacy rate is said to be about 56%; In fact this figure is not reliable it’s a mirage and also includes those who can only write their names. Surprisingly, with the rows of educational plans, policy conference and five year plan our literacy could not increase. Our literacy rate is stagnant mainly because of the illiterate women population which makes up half of the population The first and the foremost flaw, in Pakistani education is that it is based on unequal lines. Medium of education is different in private and public sectors which create a sense of discrimination among people. Such a distraught is a basic doctrine that aggravates ill literacy in Pakistan Another, major contributor to this worst situation is the regional disparity. The schools in Baluchistan the largest province by area are below standard as that of Punjab the largest province of Pakistan by population. Moreover, in FATA the literacy rate is deplorable constituting 29.5 % in males and 3 % in females. One of the other impediments, in Pakistani Education is that, teachers are not well qualified. Teachers here are not being properly trained. There is no such concept of training in Pakistan. How would they be able to educate a child? When they themselves are not being trained. Training centers should be built in all areas especially in rural areas. Finally, poverty is also one of the greatest hindrances that deter parents to send their child to school or private university. Since they are not affluent so they are forced to send their child in Maddarssah where education is free. The government has to modify its financial infrastructure, education loans should not be based on interest; they should be made interest free, they should be made easily accessible to a common man In today’s world the benchmark for excellence is education. Moreover, if a country has a distraught academic infrastructure than it is bound to fall prey to poverty, unemployment and economic turmoil. The illiteracy rate in Pakistan is alarmingly high and it calls for modification and education friendly policies. Lack of education standard in Pakistan is the root cause of all the problems. The federal and provincial governments need to work in harmony in order to overcome the flaws in Pakistani Education. By – S.M.MUJTABA
<urn:uuid:dcfeae49-78b3-402f-92c3-0baa03e14602>
CC-MAIN-2020-16
https://www.pakistantribe.com/2914/education-system-in-pakistan-on-the-brink-of-fiasco
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371886991.92/warc/CC-MAIN-20200410043735-20200410074235-00452.warc.gz
en
0.967833
562
2.6875
3
Fossil Time Capsules: Unwrapping Depression Era Fossil Stashes Yields New Discoveries February 2, 2011 Let’s say you’re a budding young paleontologist looking to make your mark. The first thing you have to do is pack up your shovel and pick, head out into some remote badlands, and find yourself a bunch of fossils that no one has ever seen before. Let’s say that doesn’t pan out. You might have better luck digging in the basement. On the eve of America’s entrance into World War II, dozens of workers were out collecting fossils in counties all over Texas. They were part of a survey funded by the Work Projects Administration (WPA) and managed by Elias Sellards, the director of The University of Texas at Austin’s Bureau of Economic Geology. When war finally came, many of the workers traded in their picks for rifles. Over two and a half years, they had collected more than 11,000 vertebrate fossils and shipped them back to the university. They found reptiles, amphibians, dinosaurs, and more. The field work ground to a halt and a mountain of potential research was shelved. A small portion of the specimens were prepared and studied, and an even smaller portion of those were eventually put on display in the Texas Memorial Museum on the main university campus. The majority are stored away in the Vertebrate Paleontology Laboratory (VPL) in north Austin. The WPA collections include at least 41 “jacketed” specimens, blocks of rock and fossil still encased in the white plaster jackets they were wrapped in to stay intact on their journey back to Austin. They range in size from dinner plates to refrigerators. While notes and photographs still exist relating to the contents, no one has seen what’s inside for 70 years. “A lot of people died and the world was different after the war,” says Tim Rowe, director of the VPL and professor in the Jackson School of Geosciences. Now a doctoral candidate has opened up the largest WPA jacket and is carefully removing and preparing a remarkably complete and well preserved skeleton of an ancient relative of crocodiles. The animal was only known from skulls before, so her description of the rest of it will fill an important gap. It also comes from a legendary fossil site with many more secrets left to reveal. In Howard County in West Texas, the WPA workers hit paleo pay dirt at one of only a handful of high quality fossil sites from the Late Triassic in North America. “That’s a time zone we know very little about,” says Rowe. The WPA workers collected thousands of specimens from Howard County. They found crocodile-like animals, dinosaurs, and amphibians. Many were species new to science, including Trilophosaurus buettneri, a lizard-like reptile. Some of the jacketed specimens weighed over 1,000 pounds. “The physical labor that went into that was immense,” says Rowe. “You can tell these guys wanted it really bad.” He notes that $220,000 was spent on the effort, an astronomical sum in Depression Era dollars. Only a few people involved in the survey were career paleontologists. Following the war, they mostly scattered to other institutions. Postdoctoral researcher Joseph Gregory went on to became a professor at the University of California at Berkeley, and eventually became director of the University of California Museum of Paleontology. One of the last living people involved with the WPA survey, Glen Evans, died last year. Michelle Stocker is the doctoral candidate in the Jackson School preparing and studying the jacketed specimen. Because her specimen hails from one of the oldest Late Triassic sites in North America, it entombs animals that are in some sense earlier, less evolved versions of animals found in later sites, says Stocker. She’s comparing the complete assemblage of animals from Howard County to another area to look at changes in diversity and faunal composition through time and across space. She focuses on specific clades, or groups of related animals, such as Archosaurs, a clade containing dinosaurs, birds and crocodiles. “Knowing the more primitive members of all those clades gives you a better idea of how those members are related to each other because they don’t have their own special derived characters already confusing the relationships,” she says. “They have more of the shared characteristics of the larger group they belong to and you can tie them together more easily.” She said the sheer number and diversity of fossils from this time period make it even more useful. “So it gives you a really detailed picture of the fauna in that part of the Late Triassic that you don’t get well in other places,” she says. “It’s amazing to see such an abundance of specimens and taxa from one place.” For many years, land owners were reluctant to allow researchers back onto the land to continue the research. But as 2010 was drawing to a close, Stocker and her paleontologist husband were granted permission to do field work at the original WPA sites. They planned to go out in February to relocate each of the original WPA localities and fully document them with digital photographs, GPS readings, and detailed notes. They also planned to search for more fossils and to apply modern dating techniques to the soils to better constrain the ages of the fossils. Light of Day Three of Stocker’s colleagues hoisted the 7 foot long plaster jacket weighing over 1,000 pounds off the VPL’s basement floor with a crane lift. They brought it up to the ground floor through a trap door, rolled it over to the preparation lab and set it on a large table. With a pocket knife, Stocker and Sebastian Egberts, a former assistant preparator, cut through the plaster and burlap, revealing a block of reddish mudstone. “We opened the jacket the way you would open a tin can so that we could ‘peel off’ the top while still maintaining the structure of the side walls for support,” she says. That was in fall 2008. Two years and hundreds of hours of careful picking and chipping later, she and the occasional volunteer have freed the entire skull and much of the vertebral column of a juvenile phytosaur named Angistorhinus. From a distance, the live animal would have looked a lot like a modern crocodile. She estimates it was about 10 to 13 feet (3 to 4 meters) long from snout to tail and lived around 220 million years ago. More of the vertebrae, leg bones, and ribs remain to be prepared, as well as a second unopened jacket that is thought to contain the tail and perhaps parts of the pelvis. The work has been slow and difficult, but Stocker says three things make this specimen stand out for someone interested in the evolution of tetrapods (four legged animals) in the Triassic. First, it includes parts of the body never seen before for Angistorhinus, including ribs, vertebrae, limbs, and tail. Second, the vertebrae are fully articulated, an uncommon situation that improves the accuracy of reconstruction. And third, it is a juvenile, which sheds light on how phytosaurs’ bodies changed as they matured. The discovery also fits in nicely with Stocker’s larger dissertation project mapping which animals lived when and where in the Late Triassic of North America, and how they relate to each other in evolutionary terms. Jack in the Box It’s surprising how much fossil material is wrapped up and squirreled away just beyond reach in museums and university collections around the world. Any place with a large collection going back several decades has them. The American Museum of Natural History in New York has still-jacketed specimens collected in the 1910s in Alberta, Canada by Barnum Brown, world famous paleontologist who also discovered the first remains of Tyrannosaurus rex. Carl Mehling, collections manager for vertebrate collections, reckons they have hundreds of unopened jacketed specimens in all. Even here at UT Austin’s VPL, in addition to the 41 WPA jackets, there are crates of dinosaur fossils given to the university by the American Museum in the 1930s for the Texas Centennial Exposition. The fossils, originally unearthed in 1903, ultimately required too much preparation to display. The jacketed blocks, which range from football to desk drawer-sized and weigh hundreds of pounds, await their time in the sun, still packed in straw in their original wooden crates, made of rough hewn timbers nearly a foot thick. So you might be thinking, good grief, why doesn’t someone just pop those suckers open and see what’s in them? Paleontologists love fossils. They’re hyper curious by nature. What’s stopping them? Ask anyone who manages these collections, and they’ll give you the same reasons. It’s much easier to get grants and excite graduate students to go on exotic field trips than to prepare fossils. Fossil preparation is much slower and harder to do than field collection. You have to sit for hour upon hour, day after day, chipping grains of rock from a specimen under a microscope. Lots of people are good field collectors, but few have the patience and dexterity to be good preparators. So backlogs are inevitable. Other factors make it easier to just leave them be, says Wann Langston, emeritus professor in the Jackson School. “As long as they are wrapped up in their jackets, they aren’t going to get damaged or lost,” he says. “If they’re opened up and there’s nothing of interest to the individual, they lie around for a while and things happen.” Paleontologists look at the dusty old jackets the same way a cautious child might consider a jack in the box. “When you unpack something, it grows,” says Mehling. “You can stack jackets, but you can’t stack prepared specimens. You have to store them in drawers and trays with foam. And in this business, space is always an issue.” Like every area of science, paleontology has become highly specialized. Ernie Lundelius, emeritus professor in the Jackson School, says a researcher isn’t going to open up a jacket unless he or she is confident it will further their own research. “There’s just not enough money to open and clean them up just to clean them up,” he says. “They’re usually tied to some research project. That’s true of Michelle and her phytosaur because she’s interested in that specific group of reptiles from the Triassic. If I were to cut into a great fortune of a billion dollars, I’d say lets clean all of them up and see what we’ve got.” A New Generation Now a new cohort of young paleontologists are making opening these jacketed specimens an integral part of their research. And it’s paying off handsomely. Sterling Nesbitt, a graduate student at Columbia University with a keen interest in Late Triassic animals, heard the American Museum had jacketed specimens collected in the 1940s from a legendary fossil bone bed on Ghost Ranch in New Mexico. He saw one labeled “phytosaur” and decided to open it up. Because there were no photos or accompanying notes to provide more details, it was a bit of a leap of faith. That jacket and others collected nearby turned out to contain a new species closely related to crocodiles, but which had co-evolved traits similar to some dinosaurs. Nesbitt’s work upended scientists’ view of what the Ghost Ranch quarry actually represents. It was thought that the quarry was the result of a mass die-off of just one kind of dinosaur, Coelophysis. Nesbitt showed a lot of other animals died there too. His work on already-prepared specimens from the same location also dispelled earlier notions that Coelophysis was a cannibal. After receiving his doctorate, Nesbitt joined the Jackson School as a postdoctoral researcher. He’s now a postdoc for the University of Washington, while continuing to work in the collections at UT Austin’s VPL. Fortunately for Stocker, she had some idea of what was in her WPA jacket before she even opened it. There were surviving photographs from when it was collected and a letter from its discoverer, Grayson Meade, about what he thought was there. “The new quarry is looking damn good,” wrote Meade to his colleague Glen Evans in May 1940. “[W]e have found quite a portion of a partially articulated phytosaur skeleton. About four or five feet of the vertebrae are mostly in articulation. There are leg bones, some ribs, and the mandible. … There is every indication that the skull should be there, and more of the skeleton. I didn’t reach the end of it knowingly at any rate.” by Marc Airhart Vertebrate Paleontology Laboratory For more information about the Jackson School contact J.B. Bird at email@example.com, 512-232-9623.
<urn:uuid:5d11c573-5a25-4102-9d25-d4de3f5900c7>
CC-MAIN-2019-35
http://www.jsg.utexas.edu/news/2011/02/fossil-time-capsules-unwrapping-depression-era-fossil-stashes-yields-new-discoveries/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318375.80/warc/CC-MAIN-20190823104239-20190823130239-00397.warc.gz
en
0.964071
2,851
3.078125
3
Try our Halloween reading quiz. Using the vocabulary below, try and complete the gaps. On Saturday 31st October, many people all across the UK will be celebrating Halloween! But what are the origins of this s__________ fes__________, and how will we be celebrating it here at LSI Portsmouth? Halloween has its origins in p__________ festivals that were held at the end of October in Britain and other parts of Europe. The Celtic people though that the barrier between our world and the world of g__________ became really thin. This meant that the s__________ of d__________ people would come alive and walk among the living, and weird creatures with dark powers could wander about on Earth. In order to avoid being harmed by the spirits and c__________, people would dress up in f__________ costumes, to try and protect themselves. The Celts would have a big p__________ to try and scare away the ghosts and spirits! Nowadays, people continue the t__________ of wearing s__________ costumes, such as dressing up as v__________, w__________, w__________ and ghosts. People often have parties, and decorate their houses to look cr__________ and ha__________. You may see lots of pumpkins in the shops at the moment. These are h__________ o , and then have s__________ faces c__________ into them. Carving faces into pumpkins is also a tradition that originated long ago. Click here for the answers Last year, LSI Portsmouth had a huge party, with DJs, lots of Halloween candy, and prizes for the best scary costumes. Check out some photos from the party: This year, we will be selling tickets to the infamous international party on Guildhall Walk!! The party will be on the 29th October at Popworld. If you need a ticket, go and see Belle in room 305. There will be HUGE cash prizes for the scariest costumes, as well as the most innovative costume. It’s time to get creative! On Friday 30th, we will be hosting a halloween film club, with a choice of terrifying horror films to choose from, as well as free drinks and warm popcorn! There is also loads of halloween parties happening across the city on October 31st, so if you’d like to find out more about what’s going on, pop into Belle’s office for a chat!
<urn:uuid:4b193539-58e5-4862-84f5-dafbca182ccf>
CC-MAIN-2021-17
http://blog.lsi-portsmouth.co.uk/2015/10/halloween-in-portsmouth-spooky.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038460648.48/warc/CC-MAIN-20210417132441-20210417162441-00113.warc.gz
en
0.957901
501
2.53125
3
If you’re searching for “thermal envelope” you are trying to understand how to make your home as energy efficient as possible. This post will help improve your understanding the thermal envelope of your home. Contents In This Post: - What Is Thermal Envelope? - Understanding Heat Transfer - Whole Home Efficiency - Insulation & R-Values - Air Barriers - Choosing Thermal Envelope Solutions Making your existing home energy efficient or building you a brand new home will present plenty of challenges. You have to think about the shape and size of the building as well as how it will be cooled and heated. Ensuring that it has the right insulation by using the right type of materials with correct thermal properties will help to make the environment efficient and comfortable. When you are sealing the home for efficiency, you need to address the envelope is important. This will be the layer that will separate the conditioned living area from the outside space. It is basically the heat flow control layer. What Is Thermal Envelope? When the thermal envelope is discussed, they are talking about the space where heat will rise in the home and be trapped, normally the ceiling. The attic is often considered to be outside of the thermal envelope. However, attention to insulating and sealing the space in the home could also mean big returns in coziness and value. Understanding Heat Transfer Picking the right type of insulation and air barrier may help to provide good returns for increasing the efficiency in your home. Understanding just how air works can help to provide you with a way to make a good choice. During winter, we often wear hats because heat leaves the top of you. Its similar to your house. The more that you use the air barrier with a good R-zone based on the climate in your area, it will increase efficiency in your home. It is because of this efficiency that you may find that your HVAC system doesn’t need to be large, which saves your money on your energy bills. Whole Home Efficiency When you are building a high efficiency home or making your home efficient, you should take several practices into consideration. You need to pay attention to buying the best insulated windows, correct size of a HVAC system, and having the right insulation – especially in the attic where heat escapes and is trapped outside of the living space. The best insulation should be the one that fits your home and has a high R value. Insulation & R-Values R-value is a measurement for thermal resistance. The higher that the R-value is, the higher the thermal resistance will be. Basically the higher that the R value is, the cooler or warmer your house will be. When you use spray foam insulation you will get about a R-7 per inch. When you go up the law of returns will apply. There will be a certain point when the insulation that you add doesn’t make a difference if the air barrier isn’t properly worked. You will be removing the unwanted air from the outside. If you look at it that way, you are going to have an efficiently sized HVAC system, since you don’t have to worry about air leakage. Insulation and air barrier shouldn’t be confused. Both are a part of becoming an efficient home. The benefits of spray foam are a way that they can be covered at the same time. Air barriers prevents or helps to prevent unwanted air from entering your home and it prevent conditioned air from escaping your home. Spray foam insulation can do this by providing an air barrier and helping to gain thermal resistance. Using open-cell spray foam can help to reduce or remove the noise in your structure. The attic or ceiling is a great place to start, especially if your next to an airport. Another benefit of giving your home a thermal envelope with great insulation is to provide it with a great sound barrier. Using the same type of tools can create comfort in other ways. Sound pollution in your home can damage your well being of your family. From the sound of people talking in the next room to outside noise, the level of noise in your home matters for your comfort level. Choosing Thermal Envelope Solutions Deciding on the right type of home insulation will take some research, but picking the right type will become invaluable by providing you with an efficient environment for working and living. If you live in Arizona in Phoenix, Mesa, Chandler, Scottsdale, Glendale, Gilbert, Tempe or elsewhere in the valley Barrier Insulation, Inc. provides insulation installation to improve your thermal envelope. We install all types of home insulation and also offer service for commercial insulation installation. For more information or to schedule an appointment please call us today!
<urn:uuid:d61dfd64-4741-4ec3-89b1-43d9595543c0>
CC-MAIN-2023-50
https://www.azinsulation.com/blog/understanding-thermal-envelope-home/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00539.warc.gz
en
0.926147
978
2.5625
3
Octavia’s Brood: Science Fiction Stories From Social Justice Movements is a collection of radical science fiction written by organizers, activists and changemakers, edited by Walidah Imarisha and adrienne maree brown. Published 2015 by AK Press/Institute for Anarchist Studies. Have you ever wondered why the Black population in Oregon is so small? Oregon has a history not only of Black exclusion and discrimination, but also of a vibrant Black culture that helped sustain many communities throughout the state—a history that is not taught in schools. Author and educator Walidah Imarisha leads participants through a timeline of Black history in Oregon that speaks to the history of race, identity, and power in this state and the nation. Participants discuss how history, politics, and culture have shaped—and will continue to shape—the landscape not only for Black Oregonians but all Oregonians. Performance/poetry dynamic duo consisting of Walidah Imarisha and Turiya Autry. Sundiata Acoli is a Black Panther political prisoner, arrested with Assata Shakur. He has been incarcerated over 33 years and continues the struggle for freedom. Walidah is a member of SAFC. A short documentary filmed and co-directed by Walidah Imarisha that addresses the social injustice that took place during and after the hurricane Katrina disaster. A national radical publication, Walidah served on the editorial board. A national radical magazine and CD focused on supporting indepenent hip hop and challenging militarization overseas and in communities of color. Walidah helped to found and served as the first editor of the magazine. Walidah was on staff of this foundation that gives grants to women and trans artists creating social change and aided in designing their new programs. In addition, she wrote the poem that was adopted as their vision statement.
<urn:uuid:ef265c68-538b-4705-a286-bf39fbdeb677>
CC-MAIN-2017-43
http://www.walidah.com/projects-1/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822851.65/warc/CC-MAIN-20171018085500-20171018105500-00209.warc.gz
en
0.953422
383
2.53125
3
Since December 2019, just a month before the Chinese Spring Festival, multiple cases of pneumonia of unknown etiology appeared in Wuhan, Hubei Province, China. Later, a novel coronavirus was identified in a bronchoalveolar lavage fluid sample from the Wuhan Seafood Market using metagenomic next-generation sequencing technology.1 On February 11, 2020, the virus was named severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) by the International Committee on Taxonomy of Viruses (ICTV). SARS-CoV-2 is the seventh member of the coronavirus family that can infect humans after the emergence of severe acute respiratory syndrome coronavirus (SARS-CoV) and Middle East respiratory syndrome coronavirus (MERS-CoV). The World Health Organization announced that the novel coronavirus pneumonia epidemic caused by SARS-CoV-2 was classified as a public health emergency of international concern on January 30, 2020. The new coronavirus disease caused by SARS-CoV-2 was named coronavirus disease 2019 (COVID-19). As of March 9, 2020, a total of 80,905 laboratory-confirmed COVID-19 cases with 3123 deaths have been reported in mainland China, and the epidemic has spread to >100 countries worldwide.2 China has incorporated COVID-19 into class B infectious diseases, as stipulated by the law of the People’s Republic of China for the prevention and control of infectious diseases, and has taken preventive and control measures in accordance with Class A infectious diseases. The unprecedented number of COVID-19 cases not only in China but also in many countries has triggered the alarm for public health to respond to emerging and re-emerging diseases. A comprehensive strategy, including surveillance, diagnostics, clinical treatment, research, and development of vaccines and drugs, is urgently needed to win the battle against COVID-19 and other infectious diseases. Etiology of SARS-CoV-2 Coronaviruses are not new infectious pathogens in the world. The first described coronavirus was isolated from chickens in 1937. Human coronaviruses were first identified in the mid-1960s (https://www.cdc.gov/coronavirus/index.html). Coronaviruses belong to the Coronaviridae family. Coronaviridae is a family of enveloped, single-stranded, positive-sense RNA virus. The total length of the genome is 30 Kb, consisting of a 5’-terminal noncoding region, an open reading box (ORF) 1a/b-coding region, an s region encoding the spike glycoprotein (S protein), an e region encoding the envelope protein (E protein), an m region encoding the membrane protein (M protein), an n region encoding the nucleocapsid protein (N protein), and a -3’-terminal noncoding region. Among them, the poly protein encoded in the ORF1a/b region of the nonstructural protein can be cut by 3CLpro and PLpro of the virus to form RNA-dependent RNA polymerase and helicase, which can guide the replication, transcription, and translation of the virus genome.3 The structural protein S can specifically bind to the receptor of the host cell, and this is the key protein for viruses to invade susceptible cells. The M and E proteins are involved in the formation of the virus envelope, while the N protein is involved in the assembly of the virus. According to the genome structure and phylogenetic analysis of coronaviruses, the Coronaviridae family can be divided into four genera: α, β, γ, and δ. The coronaviruses of the α and β genera generally infect mammals and humans, while the coronaviruses of the γ and δ genera mainly infect birds. SARS-CoV-2 is a novel coronavirus of the β genus; it is round or oval, with a diameter of approximately 60–140 nm and a crown-shaped appearance under an electron microscopy.4 Besides SARS-CoV-2, six other coronaviruses can infect humans, including human coronavirus 229E (HCoV-229E), OC43 (HCoV-OC43), NL63 (HCoV-NL63), HKU1 (HCoV-HKU1), SARS-CoV, and MERS-CoV. A protein sequence analysis showed that the amino acid similarity of the seven conserved nonstructural proteins between SARS-CoV-2 and SARS-CoV was 94.6%, suggesting that they might belong to the same species. The homology between the SARS-CoV-2 genome and the bat SARS-like coronavirus (Bat-CoV (RaTG13)) genome is 96%.5 Coronaviruses are sensitive to heat and ultraviolet rays. They can be stored for several years at −80 °C and inactivated at 56 °C for 30 min (the most commonly used method to inactivate SARS-CoV-2 in the laboratory). In addition, 75% ethanol, peracetic acid, and chlorine-containing disinfectants can effectively inactivate SARS-CoV-2.5 Pathogenicity of SARS-CoV-2 Coronavirus can cause human respiratory tract infection or animal intestinal infection. The process of virus infection requires the participation of receptors on the surface of the host cell membrane. The S protein on the surface of coronavirus can recognize and bind to the receptor and then invade the host cell through clathrin-mediated endocytosis.6 Different coronaviruses can use different cell receptors to complete the invasion. For example, the receptor of HCoV-229E is aminopeptidase N (also known as CD13), the receptor of SARS-CoV is ACE2,7 and the receptor of MERS-CoV is DPP4 (also known as CD26).8 It has been indicated that aminopeptidase N and DPP4 are not receptors of SARS-CoV-2 and that ACE2 can be used as its receptor.5 The pathogenicity of HCoV-229E, HCoV-OC43, HCoV-NL63, and HCoV-HKU1 is relatively low, generally only causing slight respiratory symptoms. SARS-CoV and MERS-CoV can cause SARS and MERS, respectively. Both caused outbreaks with severe symptoms and a high mortality.7,8 Pathological findings of COVID-19 revealed that the overactivation of T cells, manifested by an increase in Th17 and the high cytotoxicity of CD8 T cells, partially accounts for the severe immune injury.9 People are generally susceptible to SARS-CoV-2, with an incubation period of 1–14 days, with an average of 3–7 days; the main source of infection is COVID-19 patients, and asymptomatic patients may also be the source of infection.10,11 The main route of transmission is respiratory droplets, and people can also be infected by coming into contact with articles contaminated with virus droplets. In addition, a study showed that SARS-CoV-2 nucleic acid can be detected in the feces and urine of patients with COVID-19, suggesting that SARS-CoV-2 may be transmitted through the digestive tract through the fecal–oral route. The main symptoms of COVID-19 caused by SARS-CoV-2 are fever, dry cough, and fatigue. A few patients may have runny nose, sore throat, and diarrhea. Some patients may have dyspnea, and those who have a serious form of COVID-19 may rapidly progress to acute respiratory distress syndrome, coagulation dysfunction, and septic shock.11,12 From the existing treatment cases, mild patients only show low fever and slight fatigue but no pneumonia. Most patients have a good prognosis, a few patients may have a severe condition, and the elderly and those with chronic basic diseases have a poor prognosis. COVID-19 detection and diagnosis With the successful virus isolation and genome sequencing of SARS-CoV-2, the current diagnosis mainly depends on quantitative reverse transcriptase polymerase chain reaction to detect the SARS-CoV-2 nucleic acid. The novel coronavirus is highly homologous to the known SARS-CoV-2 coronavirus in respiratory specimens or blood samples and can be used as a diagnostic standard for SARS-CoV-2 infection.13 Recently, immunoglobulin M (IgM) and IgG antibody detection reagents and SARS-CoV-2 antigen detection reagents established by colloidal gold and enzyme-linked immunosorbent technologies have also been successfully developed and applied for auxiliary diagnosis. COVID-19 prevention and control The basic principles of prevention and control of infectious diseases are to eliminate the source of infection, cut off the route of transmission, and protect the susceptible population. SARS-CoV-2 is mainly transmitted through respiratory droplets and contact. Necessary personal protective measures are helpful to control the spread of SARS-CoV-2. A vaccine is an effective measure to protect susceptible populations. To date, there are no SARS-CoV-2 vaccines available or clinical trials for vaccinations, but several domestic and foreign research institutions and enterprises have used several methods, including mRNA nanovaccine technology, recombinant or inactivated vaccine technology, and DNA vaccine technology, to develop a SARS-CoV-2 vaccine. For example, Moderna, a biotech company, is working with the National Institutes of Health on a potential mRNA vaccine candidate against COVID-19. AbMax Biotechnology Co., Ltd. announced that they have successfully developed a SARS-CoV-2 antibody. COVID-19 clinical treatment Symptomatic treatment and supportive therapy Currently, symptomatic treatment and supportive therapy are mainly adopted for patients with COVID-19, and these include the treatment of basic diseases, symptom relief, effective protection and supportive treatment of internal organs, active prevention and treatment of complications, and respiratory support if necessary. More attention should be paid for maintaining the balance of water and electrolytes and maintaining the stability of the internal environment. Glucocorticoids can be used for a short time according to the degree of dyspnea and the progress of chest imaging. Currently, there are no specific anti-SARS-CoV-2 drugs in the clinic. The most efficient research strategy is “old drug, new use.” Remdesivir (GS-5734), a drug under development by Gilead Sciences in the United States, is a nucleoside analog prodrug that can inhibit Ebola virus, thereby playing an antiviral role.14 In vitro and in vivo experiments confirmed that a low dose of remdesivir can inhibit SARS-CoV and MERS-CoV. It has a good inhibitory effect. Remdesivir, with complete pharmacokinetic results and good safety, may be one of the most promising drugs against SARS-CoV-2 pneumonia. Currently, under the leadership of China Japan Friendship Hospital, a phase III clinical trial of radcivir for the treatment of COVID-19 has been officially launched in Wuhan Jinyintan Hospital on February 5, 2020, and its efficacy will be determined using a strict clinical double-blind test validation. Recent studies have shown that radcivir and chloroquine exhibit good inhibitory effects on SARS-CoV-2 in vitro.15 In addition, according to the novel coronavirus pneumonia diagnosis and treatment plan (trial version sixth), inhalation of alpha interferon inhalation and ralproveravir/ritonavir or intravenous injection of ribavirin can also be administered.13 Chinese medicine treatment COVID-19 belongs to the category of Chinese medicine for epidemic diseases. The cause of the disease is viral infection. Different people can be treated based on the syndrome differentiation: the early stage (cold dampness and stagnant lung), the middle stage (pestilence and toxin closing lung), the severe stage (internal closure and external removal), and the recovery stage (deficiency of lung, spleen, and qi). To date, at least 54 preventive, observational, and interventional drug studies have been registered in the national clinical trial registration center, involving a variety of traditional Chinese and Western medicines, and these include Lianhua Qingwen capsule, chloroquine, darunavir/corbistar, etc. SARS-CoV-2 is now turning into a major challenge in China. The sudden outbreak of COVID-19 once again proves that biosafety is an indispensable part of human security. Bats are only the natural hosts of SARS-CoV-2. There should be one or two intermediate hosts of wild animals between the natural host and humans. If wild animals are not treated well, humans may be punished by nature. Currently, the number of cases of COVID-19 infection is still increasing. To further eliminate the source of infection, prevent the route of transmission, protect the susceptible population, and achieve early detection, early isolation and treatment must depend on the joint efforts of clinical and medical treatment, public health, and basic research. To fight this disease, we need to be well prepared at the frontline to stay ahead of this epidemic. Wu, F. et al. A new coronavirus associated with human respiratory disease in China. Nature 579, 265–369 (2020). World Health Organization. WHO | Novel Coronavirus – China (WHO, 2020). Zumla, A., Chan, J. F. W., Azhar, E. I., Hui, D. S. & Yuen, K. Y. Coronaviruses-drug discovery and therapeutic options. Nat. Rev. Drug Discov. 15, 327–347 (2016). Zhu, N. et al. A novel coronavirus from patients with pneumonia in China, 2019. N. Engl. J. Med. https://doi.org/10.1056/NEJMoa2001017 (2020). Zhou, P. et al. A pneumonia outbreak associated with a new coronavirus of probable bat origin. Nature 579, 270–273 (2020). Wang, H. et al. SARS coronavirus entry into host cells through a novel clathrin- and caveolae-independent endocytic pathway. Cell Res. 18, 290–301 (2008). Kuba, K. et al. A crucial role of angiotensin converting enzyme 2 (ACE2) in SARS coronavirus–induced lung injury. Nat. Med. 11, 875–879 (2005). Lu, G. et al. Molecular basis of binding between novel human coronavirus MERS-CoV and its receptor CD26. Nature 500, 227–231 (2013). Xu, Z. et al. Pathological findings of COVID-19 associated with acute respiratory distress syndrome. Lancet Respir. Med. https://doi.org/10.1016/S2213-2600(20)30076-X (2020). Chen, N. et al. Epidemiological and clinical characteristics of 99 cases of 2019 novel coronavirus pneumonia in Wuhan, China: a descriptive study. Lancet https://doi.org/10.1016/S0140-6736(20)30211-7 (2020). Chang, D. et al. Epidemiologic and clinical characteristics of novel coronavirus infections involving 13 patients outside Wuhan, China. JAMA https://doi.org/10.1001/jama.2020.1623 (2020). Holshue. M. L. et al. First case of 2019 novel coronavirus in the United States. N. Engl. J. Med. https://doi.org/10.1056/NEJMoa2001191 (2020). National Health Commission. The novel coronavirus pneumonia diagnosis and treatment plan (trial version sixth). http://en.nhc.gov.cn/index.html (2020). Mulangu, S. et al. A randomized, controlled trial of Ebola virus disease therapeutics. N. Engl. J. Med. 381, 2293–2303 (2019). Wang, M. et al. Remdesivir and chloroquine effectively inhibit the recently emerged novel coronavirus (2019-nCoV) in vitro. Cell Res. https://doi.org/10.1038/s41422-020-0282-0 (2020). About this article Cite this article Yang, P., Wang, X. COVID-19: a new challenge for human beings. Cell Mol Immunol 17, 555–557 (2020). https://doi.org/10.1038/s41423-020-0407-x The protection motivation theory for predict intention of COVID-19 vaccination in Iran: a structural equation modeling approach BMC Public Health (2021) BMC Infectious Diseases (2021) Anthropogenic influence in observed regional warming trends and the implied social time of emergence Communications Earth & Environment (2021) Emerging point-of-care biosensors for rapid diagnosis of COVID-19: current progress, challenges, and future prospects Analytical and Bioanalytical Chemistry (2021) Emergent Materials (2021)
<urn:uuid:f5830016-370b-4e2b-b0c2-088a7a0eb061>
CC-MAIN-2021-31
https://www.nature.com/articles/s41423-020-0407-x?error=cookies_not_supported&code=b7ff6d4a-fa34-4ae7-8699-bde4bacc1431
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155268.80/warc/CC-MAIN-20210805000836-20210805030836-00471.warc.gz
en
0.891291
3,720
3.609375
4
Develop your reading skills. Read the following text and do the comprehension questions Football or soccer, which is considered to be the most popular sport in the world, is a team sport played between two teams of eleven players using a spherical ball. The object of the game, which is played on a wide rectangular field with a goal on each end of the field, is to score by putting the ball into the adversary goal. The goal is kept by a goalkeeper who is allowed, at the exception of other players, to use his / her hands in the game. The winners are those who score the most goals. If the football (or soccer) match ends in a draw the two teams may be redirected to play extra time and / or penalty shootouts (each team taking turns to have a set number of kicks at the goal.) The way football is played now was first codified in England. Nowadays, it is governed by the FIFA, "Fédération Internationale de Football Association" (International Federation of Association Football.) The game is played now all over the world and competitions are organized nationally, continentally and internationally. The most prestigious of football competitions is the World Cup, which is held every four years. Adapted from Wikipedia
<urn:uuid:260167b9-8d91-48b8-b76c-fba70f8995cb>
CC-MAIN-2016-44
http://www.myenglishpages.com/site_php_files/reading-football-soccer.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718987.23/warc/CC-MAIN-20161020183838-00529-ip-10-171-6-4.ec2.internal.warc.gz
en
0.979832
253
3.1875
3
232 toxic chemicals in 10 minority babies. Pollution in Minority Newborns: FAQ Why have you tested minority cord blood? This is EWG’s second cord blood study. Our first cord blood study, released in 2005, involved 10 newborns whose demographic information was unknown. In this study, we focused on children from minority communities because of the dearth of biomonitoring studies of these populations. To our knowledge, this is the first study that tests for such a large number chemicals in cord blood from infants African American, Latino, and Asian heritage. The purpose of this study was to make sure that racial and ethnic minority communities are considered as we explore the impacts of pollution in people. Can I have my own baby's cord blood tested? With a few exceptions, commercial laboratories do not offer cord blood testing for individuals. Your physician may be able to have your child’s cord blood tested for lead and a few other common pollutants. But extensive tests such as we have commissioned are done only for scientific studies. You can contact a nearby university to find out if you can enroll your child’s cord blood in a scientific study. Can I test my own body for chemicals? Most commercial laboratories do not offer biomonitoring tests for chemicals. The exceptions are lead and mercury. Your physician may be able to arrange testing for those chemicals. You can inquire about enrolling yourself in a scientific study. Lead is very dangerous to developing bodies? How can I have my children tested for lead? Ask your pediatrician when to test children for lead and how to interpret the test results. How can I protect myself and my family from chemicals? Limit your exposure to toxic chemicals (check out our Healthy Home Tips to find out how). We invite you to join us in our fight for policies that restrict harmful chemicals in the environment. Policy reform is the most permanent, cost-effective and fair way to protect our health. Visit our action page to learn more. How did you pick chemicals to be targeted by your tests? We focused on pesticides, industrial pollutants and chemicals typically found in consumer products, food and water. Some, like PCBs, have been banned for decades but persist in the environment. We looked for some chemicals, like bisphenol A and perchlorate, that have been detected in most Americans over age 6 and that pose a special danger to the fetus and newborn. Why did you limit your tests to 10 subjects? Studies of chemicals in human tissues are expensive. Our laboratory costs alone were almost $7,000 per sample. The methods are highly specialized and few laboratories have the technical expertise to run the analyses. Many cord blood studies often have fewer than 20 study participants. From this study, we conclude that a random sampling of umbilical cord blood from 10 American newborns of African American, Latino and Asian heritage was contaminated with 175 to 232 of 383 possible chemicals. This study is the first to detect BPA, polycyclic musks and a few other chemicals in U.S. cord blood samples. Why are in utero chemical exposures so significant? During pregnancy, the placenta transfers nutrients from the mother to the fetus and moves fetal waste to the mother, who excretes them. Numerous studies show that the placenta does not, as once thought, shield the developing fetus from the hundreds of industrial chemicals and pesticides with which the mother comes in contact. In-utero contamination is particularly worrisome because of the unique vulnerabilities of the developing fetus (Grandjean 2008). - The blood-brain barrier, a protective mechanism that prevents many harmful chemicals from entering the human brain, is not fully developed until after birth (Rodier 1995). - The developing fetus cannot detoxify and excrete many chemicals as completely as a mature body (Birnbaum 2003). - The fetus undergoes rapid cellular division, proliferation and differentiation, during which processes its cells are particularly susceptible to chemical exposures Exposure to toxic industrial chemicals during critical windows of development can result in permanent and irreversible brain and organ damage (Grandjean 2008, Barr 2007). How and when is the mother exposed to these chemicals? More than 80,000 commercial chemicals are approved for use in the U.S., a number that grows by 2,500 new chemicals yearly (EPA 1997). U.S. industries produce or import 3,000 of these substances in quantities of greater than one million pounds per year (EPA 2005c). Many pesticides banned in the U.S. for decades persist in the environment, build up in the food chain and continue to contribute to daily exposures (PCBs and DDT, for example). Government sources detail more than 3,000 chemicals used as food additives (FDA 2005), an estimated 10,500 ingredients in personal care products (FDA 2000), and more than 500 chemicals approved as active ingredients in pesticides (EPA 2002a,2005b). Many of these chemicals, whether used purposefully or unwanted impurities, can contribute to a person's body burden through exposures from food, air, water, dust, soil and consumer products. What are the implications of chemical exposures for human health? For many chemicals in our bodies, the health consequences are unknown. Studies aren't required under federal law and in most cases haven't been done. What steps can women who are pregnant or planning to be pregnant take to reduce any adverse effects on their children? Some exposure to pesticides, industrial chemicals and environmentally persistent pollutants are unavoidable. But some are. - Eat fewer processed foods, because they often contain chemical additives. - Eat organic produce. - Don't microwave food in plastic containers. Use glass or ceramics. - Filter your tap water. - Eat fewer meat and high-fat dairy products. - Use fewer cosmetics and other personal care products. - Avoid artificial fragrances. - Don't use stain repellants on clothing, bedding or upholstery. - Use fewer strong household cleaners, more soap and water. - Use manual or electric yard tools instead of gasoline-powered models. - Avoid gasoline fumes when you're filling your car. - Eat seafood known to be low in PCB and mercury contamination, such as wild Alaska salmon and canned salmon. Avoid canned tuna — it contains mercury. If you're pregnant, ask someone in your household to take over household cleaning and pumping gas. Don’t paint the baby’s room while you’re expecting. Don't use nail polish. For more specifics, sign up to get our Healthy Home Tips in your inbox. Will infants born with contaminants in their bodies shed them? That depends. Some chemicals like perchlorate have very short half lives and exit the human body very quickly, but other chemicals like lead have longer half lives and may persist months or even years.
<urn:uuid:9626a8fe-1b38-4500-8433-969e79dfa3af>
CC-MAIN-2019-47
https://www.ewg.org/research/minority-cord-blood-report/faq
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668004.65/warc/CC-MAIN-20191114053752-20191114081752-00546.warc.gz
en
0.937462
1,409
2.734375
3
Submitted to: American Society of Agri Engineers Special Meetings and Conferences Papers Publication Type: Other Publication Acceptance Date: July 15, 1996 Publication Date: N/A Interpretive Summary: Waste management systems are complex and operate under great variability. Each step of a waste management system has the potential for nutrient loss associated with environmental risks. Nutrient flow can be predicted using modeling methods to estimate contamination risk, recognizing that actual conditions may vary substantially from predicted levels. Variability at specific sites occurs as a result of nutrient concentrations, site vulnerability, and/or handling methods. Soil coring and analysis provide measures of contaminant levels but are expensive and time consuming for general surveys of waste handling sites. Less expensive, quicker, but adequate methods are needed for evaluating the relative level of contaminant movement beneath waste management sites. Electromagnetic methods have the potential to fulfill that need and have been assessed near liquid storage ponds. For livestock production systems, such as cattle feedlots, most of the manure is handled in solid rather than liquid form. Therefore, electromagnetic methods need to be evaluated for solids handling areas as well. This report presents survey results from a compost site and a waste storage pond. The methodology shows good potential as a waste site diagnostic tool indicating concentrations of nutrients exceeding thresholds, thereby signaling a need for remedial action. Technical Abstract: Methods of estimating the environmental impact at waste management sites often involve the need for sophisticated laboratory techniques and extensive sampling machinery (coring machines, etc.) with the risk of altering the system under examination. Noninvasive methods such as electromagnetic (EM) instrumentation offer advantages of relative ease of use with no physical alteration of the site (Brune and Doolittle, 1990). This paper reports the use of EM instrumentation for surveying agronomic and waste treatment sites at locations which had been previously profiled by soil coring for evaluation of nutrients in the soil profile. Surveys were made using a geophysical EM instrument capable of measuring conductivity three to 7.5 meters below the surface of the ground with horizontal or vertical polarization. Two specific sites were analyzed to evaluate the effects of management practices: 1) a composting site with one section in use since 1985 and with expanded operation to another section in 1989, 2) a waste storage pond (operational in 1973) holding precipitation runoff from a cattle feedlot. Correlation analysis between the EM conductivity measurements and chemical analysis at both sites (concentrations of ammonium, nitrate, chloride, and phosphorus) show significant (p<0.05) correlations for the ions while nonionic P did not show a significant correlation. The EM measures were able to distinguish the six year- old site from the ten year-old site (p<0.05). The results indicate that EM methods provide information useful for livestock site surveys of livestock waste management facilities.
<urn:uuid:ef3f691f-454a-4bc9-b781-cb04a6ef8a52>
CC-MAIN-2014-52
http://www.ars.usda.gov/research/publications/publications.htm?SEQ_NO_115=72687
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768529.27/warc/CC-MAIN-20141217075248-00021-ip-10-231-17-201.ec2.internal.warc.gz
en
0.923601
587
3.125
3
Thank you for visiting IDOC's website and for taking the time to find out more about The Yellow Star Project. The mission of The Yellow Star Project is vitally transparent: to help check the groundswell of revisionism about the Holocaust and stem the worldwide resurgence of anti-Semitism and racially motivated hate. We are now reaching out to donors and educators to encourage their involvement in The Yellow Star Project, and we invite your support and participation. The project seeks funders and sponsors to finance the design and production of The Yellow Star Student Edition, together with a Teacher's Guide, enabling teachers and educators to put a human face on this history. Along with these publications, The Yellow Star Project will encourage students to examine and discuss materials on present-day genocidal atrocities, such as those in Iraq, the Sudan, Rwanda, Bosnia and East Timor. We live in a world of interdependency, and it is crucial that young people understand that our fate as a human race is the sum of our actions as individuals. We are each responsible for one another. The sickening mentality that condoned and perpetuated the Holocaust decades ago is still evident in the world today, but many of the victims have changed. However, we believe the challenges students face in the future may become easier if they understand the implications of the past. We do not intend to turn the millions of Holocaust victims into martyrs. The Yellow Star Project aims to keep alive the memory of those who were persecuted by extreme hatred while at the same time using the lessons learned from the Holocaust to ensure that our next generation of leaders will acknowledge that hate like this existed then, as it exists now, and it must not prevail. We realize that while Holocaust teaching supplements exist in a variety of forms, many school districts simply do not have the funds to purchase them and some educators may not know how to get the most out of such materials. The goal of the Project is to provide educators with the tools they need to teach their students about the Holocaust free-of-charge, while at the same time, publishing additional Holocaust books and creating other media for the American public to purchase. We hope you will look through Project information on this website and learn more about what we plan to accomplish over the next several years. If you have any questions, comments, or if you would like to get involved, please contact us:
<urn:uuid:3cda4e6f-1d13-472e-aaaf-c2f64910a743>
CC-MAIN-2017-26
http://yellowstarproject.org/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320243.11/warc/CC-MAIN-20170624082900-20170624102900-00430.warc.gz
en
0.95053
485
2.59375
3
What are Hammer Toes? “Hammer toes” is the term used to describe the collective physical deformity of the second, third, and fourth toe wherein they are permanently bent at one or two of their joints – usually at their middle joints or proximal interphalangeal joints. Otherwise known as “contracted toes”, the condition earned its named for the resulting bowed appearance of the toes that made them look similar to hammers. The distortion of the normal contour of the toes is usually a result of wearing shoes that are too short or narrow and apply constant pressure to the toes, forcing them to be pushed together and lie obliquely – this is especially the case in shoes that are designed to narrow towards the toe box. Hammer toes can be easily detected through careful observation; the malformation of the toes start out as mild distortions but can get worse after some time especially if the factors causing the hammer toes are not done away with. If the condition is given attention early enough, the toes may still be flexible and can be treated without having to receive surgical intervention. However, if the toes are left untreated for too long, the muscles within the toes can stiffen further and will then require invasive procedures in order to correct the deformity. Hammer Toes Causes Most often, wearing shoes that do not fit an individual well for too often can actually bring about the condition. Wearing shoes that are too narrow or too tight for the owner for long periods of time can eventually take its toll on the wearer’s feet. This is the same for women who favour wearing high-heeled shoes with narrow toe boxes. The constant amount of pressure the foot receives due to the force of gravity that causes the feet to naturally slide down and press upon the lowest point of the shoe so they are unable to receive enough space to stretch out; this can result in the eventual distortion of the toes. The deformity comes as a result of the shortening of muscles inside the toes because the toes become accustomed to bent positions, thus prompting the muscles to fail to extend any further and become curbed and tightened. At first toes can still be stretched if unsuitable footwear is not being worn, but if the habit is persistent, the toes will eventually become used to the position they are constantly in so the muscle fibers inside them will eventually harden and refuse to stretch. The incorrect position of the toes inside the shoes also causes the formation of calluses or corns on the surfaces of the toes that are constantly bent while a person is wearing the inappropriate footwear, due to the fact that these surfaces are constantly rubbing against the hard material of the interior of shoe, causing frequent friction. Hammer toe can also be caused by other medical conditions, such as osteoarthritis, rheumatoid arthritis, and stroke because these illnesses involve affectation of the nerves and muscles. Diabetes is also a causative factor for hammer toes due to the diabetic neuropathy that comes along in advanced cases of diabetes. Injury incurred to the toes can also bring about the condition, especially if it involves breaking the toes. Hammer toe can be hereditary in some cases. Some individuals can be genetically predisposed to developing the condition due to the natural structure of their bodies. Hammer Toes Treatment Hammer toes can be effectively corrected in various ways. Treatments can be non-invasive and simply involve physical therapy along with the sound advice that the patient must not wear any more shoes that restrict adequate space for the toes. Appropriate shoes for people with hammer toes – or simply for those who wish to avoid the condition as much as possible – should be at least half an inch longer than the patient’s longest toe. High-heeled shoes must also be avoided. The patient will be asked to practice some exercises for the toes to regain the normal movement and structure. These exercises usually involve stretching and strengthening the toes. The patient can try picking things up off the floor with the use of his or her toes alone, and he or she can also stretch the toes regularly by hand to ease them into straightening out. Another example of a physical exercise specifically for the toes involves crumpling a towel with the toes. The towel can lie underneath the feet and the patient can use the toes to scrunch up the towel while he is performing simple tasks such as watching TV or reading a book. Symptoms of hammer toe can be helped through cushions or corn pads to alleviate them. If the hammer toes were brought about by an underlying disease, the patient must ask for the doctor’s advice before performing any exercises without professional medical consent. It is also important for one who has hammer toes to remember that he must not try to treat or remove corns by himself. If open cuts result from attempts at removing these, infection can become possible. People who suffer from diabetes or conditions that lead to poor circulation in the areas of the feet should be especially cautious. Hammer Toes Surgery If the toes have become very inflexible and unresponsive to non-invasive methods, and if open sores have developed due to the constant friction the arched areas of the toes receive, patients can receive orthopaedic surgery to correct the deformity immediately. The operation is quick and is usually performed as an out-patient procedure. The doctor administers a local anesthetic into the foot region to numb the operating site. The patient can remain conscious will the procedure is being performed. Sedative can also be administered to help calm the patient down if he or she is much too anxious. The technique which the surgeon will be applying during the surgery will depend on how much flexibility the affected toes still retain. If some flexibility has still been preserved in the affected toes, the hammer toes can be corrected through making a small incision into the toe so the surgeon can manipulate the tendon that is forcing the toes into the curved position. If however the toes have become completely rigid, the surgeon may have to do more than realigning the tendons. Some pieces of bone may have to be removed so that the toe can straighten out. If the latter is the case, some pins are attached onto the patient’s foot afterwards to fix the bones into place while the injured tissue takes time to heal. After the procedure, the patient may have to deal with some swelling and stiffness while the recovery process is still ongoing. The patient should also expect that the toes which were corrected could look different after surgery, for example they could appear shorter or longer than before. The patient will be advised not to engage in too much physical activity that involves the feet for some time to give the injury from surgery time to heal.
<urn:uuid:65e65e9b-0a1c-4749-9ff1-cee08aa76909>
CC-MAIN-2018-34
https://medicalpoint.org/hammer-toes/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221212598.67/warc/CC-MAIN-20180817143416-20180817163416-00377.warc.gz
en
0.963338
1,365
3.109375
3
I get this question quite often, but I struggle explaining it, especially in a few simple words. Anyway, this is a very interesting topic because things are very complicated when it comes to UNIX vs Linux. There are business related things, licenses, policies, government influence etc. Due to Unix being an operating system and Linux being a kernel, they are different in nature and they have different purposes, they aren’t easily comparable. You can’t summarize the differences and what they are in a single sentence. But don’t worry. After this lesson of history and both of their features and purposes, you will get the “big picture” and everything will be nice and clear. You can jump to the end of the post, in the conclusion, if you want a quick read through. - Multix (the root, the start) - Unix (a different, “new and improved” version of Multix) - System V and BSD (different versions of Unix) - GNU (free software project, their software is used in many operating systems) - Linux (kernel, used in many Linux-based distros) - Conclusion – Unix vs Linux Let’s jump to the late 1960s. Personal computers at the time were designed to do single specific tasks. For example, there was a computer for calculating a monthly salary, or a computer to do word processing in a library etc. Each of them was running a program specifically designed for that particular hardware and the task it was meant to do. The programs that were written for one computer vendor (or manufacturer like IBM or Apple) cannot be executed on a computer developed by a different vendor. Those computers cannot handle the execution of multiple programs at a time, but only one. So if a user wanted to listen to some music while writing a document, that was impossible. To overcome those issues the Multics (also known as Multix) operating system was developed. Initially as a collaborative project between MIT, General Electrics and Bell Labs. This is the root, the OS that laid the fundamentals of every new one including Windows, MacOS, Android, Linux-based operating systems and many more. Multics (Multiplexed Information and Computing Service) is a time-sharing operating system. This means that many programs can share the hardware resources and switch on finite time intervals. In other words, the idea behind time-sharing operating systems is the mechanism that works as follows: - One program is using the hardware (CPU, RAM memory etc.) for some time, let say 20ns (nanoseconds), then it is stopped. - Now the hardware resources are available for another program for an equal amount of time, 20ns. Due to the very small intervals (very fast switching) there is an illusion that multiple programs are running concurrently. The very same principle is present in every modern operating system. In addition to time-sharing capabilities, Multics was designed with the idea of a modular hardware structure and software architecture. It is consistent with many small “building blocks”. Each block can be independently swapped with another one that does the same function but maybe in a different way. The final result is building a system that can grow by time and reusing the blocks instead of reimplementing them. So when there is a hardware change, only a few blocks are being updated, the rest are being reused. If the very same feature is required by multiple programs they can share a common implementation. For example, many programs can share the same implementation for transforming a word to lowercase thus saving time, effort, frustration among developers, and money. Those are the fundamentals of Multics. Besides all the goodness of Multics, Dennis Ritchie and Ken Thompson (at the time employed in Bell Labs) were not satisfied with all aspects of the project. Mostly by the size and the complexity introduced to achieve the goals. In their spare time they started working on a similar hobby project (actually reimplementation of Multics) named Unics (Uniplexed Information and Computing Service) also known as Unix. As you can see the name Unics is influenced by Multics with the only difference being swapping the word “multiplexed” with “uniplexed”. The reason for this swap is the technical disadvantages of the Unics project at the very beginning. It could not handle the execution of multiple programs simultaneously, only one single program at a time, so uniplexed was used. It is worth mentioning that the Unics project was intended only for internal use inside Bell Labs and it was developed without any organizational backing. Since we reached the birth of Unics, it’s time for a small recap: - Multics development started in the late 1960s - Multics goals are still valuable as of today. It’s time-sharing (multi-tasking) - Complaints about the size and complexity - In the early 1970s, Unics development begins but on a smaller scale to overcome the disadvantages of Multics. It is a hobby project of Dennis Ritchie and Ken Thompson. Let’s continue with more details about Unics and its development. Unics was initially written in assembly language. Because of this, most of the code was hardcoded for specific hardware and not easily portable to other computers. No better alternative was available at the time. Meanwhile, the C programming language is released (also by Dennis Ritchie and Ken Thompson). The intention of this programming language is to be used for writing portable programs. It is achieved by requiring a relatively simple compiler, efficiently mapping to machine instructions, requiring minimal run-time support etc. For non-technical people, this is truly amazing. At this moment in time, there is Unics, but it’s not portable, and there’s a new programming language that offers portability. Sounds like a wise idea – Unics to be rewritten in C. In the mid-1970s, Unics is being rewritten in C, introducing portability, but there was a legal issue preventing public release and wide use. From a business and legal perspective things are quite interesting. There is a giant telecommunication company named AT&T that owns the previously mentioned Bell Labs research center. Due to the nature of the business and how available the technology was at that time, AT&T was considered as a government controlled monopoly. To simplify things, prices of the telecommunication services are controlled by the government so they can not skyrocket high, but also AT&T cannot go to bankruptcy due to the guaranteed income stated by the government. The point is that Bell Labs have a stable source of income (founded by AT&T) and can afford to allocate resources to whatever task they want with little to no worry about the cost. Almost complete freedom which is quite good for a research center. Because of the monopoly issues and other legal stuff, AT&T was forbidden to enter into the computer market, only telecommunication services were allowed. All they could do was to license the source code of the Unics. It is worth mentioning that the source code is being distributed through other research centers and universities for further research, development, and collaboration, but under the corresponding license terms. Later, there is a separation between Bell Labs and AT&T. Since the government controlled monopoly is on AT&T, Bell Labs is free after the separation so no legal issues are present anymore. System V and BSD By the 1980s, AT&T released a commercial version of Unics named System 5 (known as System V). In meantime, while AT&T was working on System 5, at Berkeley University of California, the development of previously shared code from Bell Labs continues and very similar Unics operating system is being developed and released as BSD (Berkeley Software Distribution). It’s time for a recap: - Initial development of Unics is being done at Bell Labs - Unics source code is shared among universities and other researches - Separation of Bell Labs and AT&T - AT&T continues with the development of their own version of Unics named System 5 - At Berkeley University of California, development of the previously shared source code is continued and another operating system is released as BSD (Berkeley Software Distribution). So by the mid-80s, we already have two different Unics distros (System 5 and BSD) evolved by their own, but sharing a common predecessor. There is no such thing as “the real” or “the genuine” Unics operating system. Аs time passes there are even more variants of what was available at those two branches. - HP branches out developing an operating system named HP-UX (Hawelt Packard Unix). - Sun branches out with an operating system named Solaris. - IBM branches out and continues developing their version named AIX. It is worth mentioning that all of these branch outs are being done to provide some unique features in order for a given vendor to offer a better product on the market. For example, the networking stack is firstly available on the BSD branch, but later cross-ported to all other branches. Almost every nice feature was cross ported at some time to all other branches. To overcome the issues while cross porting features, and to optimize reusability at a higher level, the POSIX (Portable Operating System Interface X) is being introduced by the IEEE Computer Society in 1988. This is a standard that if followed by the vendors, compatibility between operating systems will be guaranteed, thus programs will be executable on other operating systems with no modifications being required. Although reusability is present to some degree, the addition of new features requires a lot of work, thus makes development slower and harder. This is due to the inheritance of the terms and conditions of the AT&T license under which the Unics source code was distributed. To eliminate all the legal issues about sharing the source code, people working on the BSD branch started replacing the original source file inherited from AT&T with their own implementation, but releasing it with the BSD license that is more liberal in terms of reusability, modifications, distribution etc. The idea is to release the Unics operating system without any restrictions. Today, this is known as free software. Free as in freedom to study, modify and distribute the modified version without any legal actions against the developer. This idea was not welcomed by AT&T, so there was a lawsuit. It turns out that there is no violation of any kind. The trend of replacing files continues and BSD version 4.4 (also known as BSD Lite) was released free from any source code originating from AT&T. One more recap: - Many branch outs - POSIX standard - It turns out that many features are being cross ported sooner or later - Hard to say what is the “root” or “genuine” Unics operating system anymore. Everything is being branched from the same predecessor and every feature cross ported thus everything is more or less a variation of the same OS. - Due to legal issues that come from the contents of the AT&T license, development was hard and redundancy was common. - BSD started removing all the files originating from AT&T and providing source files that are free for modification and redistribution. Now it is time to mention the GNU project. GNU (GNU’s Not Unix), a free software, mass collaboration project announced in 1983. Its aim is to provide users freedom and control in their use of their computers and electronic devices. Can you spot the similar idea with what people behind BSD are doing already? Both are somehow related to the term free software. but with a very big difference in how free software should be treated and that is obvious by comparing the GPL license (released by GNU) and BSD license. Basically, it comes down to: - The BSD License is less restrictive. It says do whatever you want with the source code. No restrictions of any kind. - The GPL License is more restrictive but in a good way. It puts emphasis on preventing the use of open source code (GPL licensed) in proprietary closed source applications. It states that if any GPL licensed source code is being used, the source of your code must be released under the same license too. Basically, with the GPL license, you can take whatever you want, but you must give back whatever you produce, thus raising the amount of available free software. - As a comparison, the BSD license does not state that whatever is being produced must be released as free software too. It can be released as proprietary closed source software without sharing any of the source code. In addition to the license, the GNU project is developing a lot of software that is required in order to have a fully functional operating system. Some of their tools are GNU C library, GNU Compiler Collection (GCC), GNOME desktop environment etc. All of which are currently used in popular Linux distros. Having all this in mind let’s talk about Linux by briefly explaining what it is. Linux is not an operating system like BSD. Linux is a Kernel. But what is the difference between a Kernel and an Operating System? - An operating system is a collection of many things working as a whole, fully functional, complete product. - A kernel is only a piece of the whole operating system. - In terms of the Linux kernel, it can be said that it is nothing more than a bunch of drivers. Even though there is a bit more, for this purpose, we will ignore the rest. Now, what are drivers? A Driver is a program that can handle the utilization of a specific piece of hardware. Let’s explain by examining a very common use case, connecting your smartphone to a Wi-Fi network. To be more precise, engineers will define this use case as: wireless communication of two devices, a smartphone, and a Wi-Fi router. For any kind of wireless transmission, there must be antennas. By this logic, we know that there are at least two of them, one on a smartphone (very tiny build in the phone under the case), and one on a Wi-Fi router (this one is big and visible). Antennas work by emitting or receiving radio waves. Each radio wave carries some information. The question that comes naturally is who is controlling what the antenna is emitting? It is the driver. A piece of software that handles the utilization of a piece of hardware. On top of this, there are many many more antennas in the area like television (terrestrial) antennas, neighbor’s Wi-Fi routers, laptops, walkie-talkies, taxi driver’s radio stations etc. So there are many signal collisions all interfering with each other. A driver’s obligation is to handle all that by filtering the signal received by the antenna. Also allowing multiple programs to share the same hardware like Skype and Viber to transmit simultaneously through the same antenna without merging the messages etc. - A Driver is a program that handles the utilization of a specific piece of hardware. - Linux is just a bunch of drivers (and something more that will be ignored for now) - Linux is a kernel. - A Kernel is a piece of an Operating System. I assume we are all clear by now so we can begin with the Linux history lesson. Its origins are in Finland in the 1990s, about 20 years later than Unics. Linus Torvalds at that time was a student and was influenced by the GNU license and Minix (Unics based operating system for education). He liked many things about Unics operating systems, but also disliked some of them. As a result, he started working on his own operating system utilizing many of the GNU tools already available. The end result is that Linus developed only a Kernel (the drivers). Sometimes the Linux-based operating systems are referred to as GNU-Linux operating systems because, without GNU tools, the Linux Kernel is useless in real life. It can be said that Linux, to some point, is just a reimplementation of what was available as the Unics operating system (BSD, System 5…) but with a license that puts more emphasis on keeping the software free by enforcing modifications to be contributed back, thus available for studying, modifications, and further distribution. The time-sharing capabilities that allow multitasking, the C programing language for providing portability, modular software design that allows swapping a single peace when needed and reusing the rest, and other stuff are inherited from Unics. Those are the fundamentals mentioned at the very beginning of this post. But not sharing any source code with Unix. It is worth mentioning that Linux was intended to be a small school project. Many computer scientists were interested in trying it out of curiosity. While Linux was still young, the lawsuit between BSD and AT&T was ongoing. Due to the uncertainty in BSD’s features, many companies that utilized BSD moved to Linux as a very similar alternative with more stable features. Linux was also one single source of code while the BSD source was distributed on many independent branches (BSD, Solaris, HP-UX, AIX etc.) From the perspective of a company, requiring an operating system for their product (Wi-Fi routers, cable TV boxes etc.) Linux was a better choice. Having a single branch guarantees that all the features merged in the one feature will be available right away. Having a single branch is simpler for maintenance too. On the BSD side, due to the independent development, those new features still required some sort of cross porting which sometimes breaks something else. This is the historical reason of why Linux gained great popularity even in the early stages of its development, while still not being on pair with BSD and lacking many features. Unics vs Unix, Multics vs Multix Did you notice that sometimes the term Unics is used instead of Unix? The fun fact is that the original name of the project is Unics, but somehow people started calling it Unix. There are many stories about why Unix becomes a popular name, but no one can tell for sure. Now the name Unix is accepted as the official name of the project. The very same is happening with Multics, with time everyone was calling it Multix even though it was not its official name. Conclusion – Unix vs Linux At this moment we know the history and the evolution of the operating systems, we do know why all these branch outs occurred, we do know how government policy can influence things. The whole story can be summarised as: - Unix was an operating system back in the 1960s and 1970s while being developed in Bell Labs. With all that branching mentioned above, and the cross porting features between branches, it is simply a chaotic situation and hard to say what is the genuine Unix anymore. - It can be said that the most genuine Unix operating systems are System 5 and BSD. - System 5 is developed by AT&T as a continuation of the work done at Bell Labs after their separation. - The most popular direct ancestor of Unix is the BSD project. It took all the source code from what was developed in Bell Labs, then replaced any source code released under a restrictive license and continued it as free distribution. - Other popular distributions of today are Free BSD, Open BSD, Net BSD, but many more are available. - Linux, on the other hand, does not share any code with Unix (from Bell Labs), it just follows the same principle of utilizing small building blocks to produce something of bigger value. This is mostly known as writing a small program that does one thing and does it well. Later, those programs are combined with mechanisms known as “pipes” and “redirection”, so the output of one program becomes the input to another program and as the data flows, something of bigger values is achieved as a final result. - In terms of Licenses, Unics has a very restrictive license policy when developed. Later, it’s forked under free licenses (BSD). Linux, on the other hand, is using the GPL license from the very beginning. - Both are following the POSIX standard so program compatibility is guaranteed. - Both are using the same shell for interfacing with the kernel. It is Bash by default. - BSD is distributed as a whole system. - Linux-based operating systems are made with the Linux Kernel in combination with GNU software and many other smaller utilities that fulfill each other to accomplish the goal. - Popular Linux Distributions: Ubuntu, Mint, CentOS, Debian, Fedora, Red Hat, Arch Linux, and many more. There are hundreds of distros nowadays, some of them even optimized for a specific purpose, like gaming or for old computers. Even though we stated that there is one single source – the Linux Kernel, there are many Linux Distributions (Linux based operating systems). This may be confusing for someone so I will explain this just in case: Every Linux distribution (distro) ships different versions of the Linux Kernel or the tools, or simply utilizing different building blocks. For example, Ubuntu is using SystemD as an init system, but Slackware is using SysV as the equivalent. There is nothing wrong with both, they do the same thing with some differences and there is a use case when one is better than the other, Another example is that there are users who prefer to always have the latest version of the software, they use rolling release Linux based operating systems like Arch Linux. Other may prefer a stable environment with no major changes in 5 or more years, Ubuntu LTS (Long Term Support) version is ideal for this use case, which is why is widely used in servers along with CentOS. As you can see there are even more similarities of both. Linux based operating systems are in the same “chaotic” situation too. There is no such thing as the real or the genuine Linux based operating system. There are many of them, but at least they do share the same source of the Linux Kernel, It is worth mentioning that programs written for Linux based operating systems or bash commands that are following the POSIX standards can be executed on any Unix based operating systems too. Thus all major software like Firefox, or the GNOME desktop environment is available everywhere without requiring any modifications. Another fun fact not mentioned before is that even the Mac OS (used in Apple computers) is considered as a BSD derivative. Not every release, but some of them are. As you can see, in reality, things are even more complicated and interesting. About the Author This article was submitted to us by a third-party writer. The views and opinions expressed in this article are those of the author and do not reflect the views and opinions of ThisHosting.Rocks. If you want to write for ThisHosting.Rocks, go here.
<urn:uuid:ba7e011e-bebc-45c3-b69d-6fa9af55b219>
CC-MAIN-2021-21
https://thishosting.rocks/unix-vs-linux/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991488.53/warc/CC-MAIN-20210515223209-20210516013209-00233.warc.gz
en
0.960535
4,770
3.140625
3
Should my derailleur(s) be replaced and which should I get? Derailleurs are the small mechanisms mounted to the frame that shift the chain between the chainrings (front derailleur) and cogs (rear derailleur) when you operate the shift levers. Unless you crash, drop or abuse your bicycle, derailleurs last a long time. In fact, they can last as long as your bike with only minor maintenance, such as occasional lubrication (any time they look dry or after riding in the rain). Rear derailleurs are more frequently damaged than fronts because they protrude from the bicycle. This means that if someone knocks over your bike, the derailleur or the part of the frame it's attached to, can get bent. When this happens, the derailleur will not shift properly. It will hesitate shifting onto the smallest cog and may overshift throwing the chain off the largest cog. Worse, if it's bent badly enough, on some bikes it might even get hooked on a spoke, pulled into the wheel and end up mangled. To ensure this never happens, always carefully inspect your bike anytime it falls over or anytime the rear derailleur isn't shifting correctly. To tell if it's been bent, stand behind the bike and see if an imaginary straight line bisecting the cogs will also bisect both derailleur pulleys. It should. If the derailleur looks canted inward, bring the bike in for us to have a look and realign the derailleur and/or frame with our special tools. Reasons you might want to install a new derailleur include upgrading to save a little weight or to try the latest technology. In order to provide a derailleur that will work with your drivetrain, we'd like to see your original derailleur so we can match its capacity. Or, if you no longer have the old derailleur, we need to know: What brand, model and type of drivetrain and shifters you have, such as Shimano (brand) LX (model) RapidFire 9-speed (type). The number of cogs. The number of teeth on your largest and smallest cassette cogs and chainrings (4 numbers in total, for example, a modern road bike could have 11 and 24 for the cogs and 39 and 53 for the chainrings). Front derailleurs are less often damaged than rears, though it is possible to bend them by getting baggy pants or shoelaces caught in them. Still, like rear derailleurs, you may wish to upgrade to save weight or improve shifting. We'll need to know several things, which we can determine by seeing the original derailleur. Or, check it and provide the following details: We need to know which type you have: On road bikes there are clamp-on types that feature clamps that wrap around the frame. And there are braze-on types that bolt to a special mount built into the frame. On mountain bikes (and some road/cross bikes) there are top-pull types, where the shift cable runs from above to the derailleur. And there are bottom-pull types, where the shift cable runs beneath and up from the bottom bracket (where the crankset is attached). For clamp-on front derailleurs, we need to know the clamp size, which must match the seat-tube diameter where the derailleur mounts. The common sizes are 28.6mm and 31.8mm for 1 1/8 or 1 1/4inch seat tubes respectively. Use a caliper to measure your frame or if you don't have one, gently close the jaws of an adjustable wrench until it just slips over the tube and then measure the distance between the jaws. The number of teeth on the large and small chainrings. For example, if you have a triple crankset with 22/32/42 chainrings, your large and small rings are 42 and 22. Usually these numbers are marked on the side of the chainrings. Or, you can simply count them. If you have any questions at all, just ask and we'll be happy to help!
<urn:uuid:f2a071b4-fea0-4ff5-8890-e2e695af1df6>
CC-MAIN-2016-44
http://thebicyclechain.com/faq/frequently-asked-questions-fq91/should-my-derailleurs-be-replaced-and-which-should-i-get-79.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719155.26/warc/CC-MAIN-20161020183839-00514-ip-10-171-6-4.ec2.internal.warc.gz
en
0.901157
871
2.65625
3
FDA issued drug safety communications about a serious adverse effect associated with the use of over-the-counter benzocaine gels, sprays, and liquids applied to the throat and gums to reduce pain. FDA issued drug safety communications about a serious adverse effect associated with the use of over-the-counter (OTC) benzocaine gels, sprays, and liquids applied to the throat and gums to reduce pain. In its communication to healthcare professionals, FDA is warning the public that the use of benzocaine is associated with methemoglobinemia, a rare but serious condition that results in the amount of oxygen carried through the blood stream being greatly reduced. In the most severe cases, methemoglobinemia can result in death. Methemoglobinemia has been reported with all strengths of benzocaine gels and liquids, including concentrations as low as 7.5%. The cases occurred mainly in children aged 2 years or younger who were treated with benzocaine gel for teething. FDA is particularly concerned about the use of OTC benzocaine products in children for relief of pain from teething because of the serious outcomes, including death, that may be associated with methemoglobinemia, as well as the difficulty parents or consumers may have in recognizing the signs and symptoms of methemoglobinemia when using these products at home. Benzocaine gels and liquids are sold OTC under different brand names such as Anbesol, Hurricaine, Orajel, Baby Orajel, Orabase, and store brands. Furthermore, symptoms of methemoglobinemia may not always be evident or attributed to the condition. Parents and caregivers should not use OTC benzocaine products on children under 2 years of age, except under the advice and supervision of a healthcare professional. If benzocaine products are used, it should be used sparingly and only when needed, but not more than 4 times a day. In addition, FDA continues to receive reports of methemoglobinemia associated with benzocaine sprays. These sprays are used during medical procedures to numb the mucous membranes of the mouth and throat. Benzocaine sprays are marketed under different brand names such as Hurricaine, Cetacaine, Exactacain, and Topex. In 2006, FDA issued a public health advisory warning about methemoglobinemia with the use of benzocaine sprays during medical procedures. Since then, FDA reportedly has received notice of 72 new cases of methemoglobinemia, including 3 resulting in death, associated with the use of benzocaine sprays, bringing the total to 319 cases. A review of the cases indicates that the development of methemoglobinemia after treatment with benzocaine sprays may not be related to the amount applied. Symptoms of methemoglobinemia may appear within minutes to 1 or 2 hours after using benzocaine. Benzocaine is also sold in a lozenge form. People who develop methemoglobinemia may experience pale, gray- or blue-colored skin, lips, and nail beds; shortness of breath, fatigue, confusion, headache, lightheadedness, and rapid heart rate. The signs and symptoms usually appear within minutes to hours of applying benzocaine and may occur with the first application of benzocaine or after additional use. “OTC gel and liquid medications containing benzocaine provide relief for children and adults who experience mouth pain. While FDA’s announcement notes very rare but serious instances of methemoglobinemia . . . these products are safe when used as directed for the large majority of consumers,” according to a statement prepared by the Consumer Healthcare Products Association, in Washington, D.C., for Drug Topics. “Due to these rare instances, FDA has recommended that the products not be used in children under 2 years of age except under the advice of a healthcare professional. We will continue to study this issue and remain committed to working with the agency to ensure the safe and effective use of these products.”
<urn:uuid:632e2bfe-ae23-431f-99e3-675f6be28f78>
CC-MAIN-2021-10
https://www.drugtopics.com/view/fda-warns-about-serious-adverse-effect-associated-use-benzocaine
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178374391.90/warc/CC-MAIN-20210306035529-20210306065529-00634.warc.gz
en
0.946909
864
2.75
3
What makes a nonfiction picture book come to life? I've been wondering about that for a while. One thing I do know (or think I know) is this: simplicity works. Take, for instance, one of my favorite nonfiction picture books of all time. "Birds have no teeth. No hands. No antlers, horns or spines. But birds have beaks. And beaks are enough." Thus begins Sneed B. Collard III's fascinating book "Beaks!" illustrated by Robin Brickman and published by Charlesbridge. It goes on to describe some of the fascinating uses of beaks, and shows why birds need no teeth, hands, antlers, horns or spines to do all that they need to. Sneed has also written other books along the same lines – "teeth" and "wings". They are all "just" lists. But what wonderful lists they are. Lists, which can so easily deteriorate into boring repetition in the hands of a less remarkable writer, are transformed into incredibly interesting work in his hands. You want to turn the pages and find out more, more, more. Why? Because his prose is evocative, clear, and crisp. Because each book is packed with wonderful information. They are like mini-encyclopedias in that they contain an amazing trove of knowledge; but the way the information is presented is anything but encyclopedic. And because the illustrations are superb – scientifically accurate eye-candy. Those are three reasons that I can think of that make the books as wonderful as they are. But surely, there are other reasons, too. For those of you who might already be planning ahead for father's day in June, here's an idea for an special father's day gift: "Animal Dads" – another elegant book and a wonderful "list" by Sneed B. Collard III. Sneed B. Collard is not the only successful nonfiction children's book author to use the "list" format successfully, of course. Visit any bookstore or library and look at nonfiction picture books on scientific topics, and you'll see that many of them are lists. As an oceanographer-turned author, my "training" was in science and mathematics. In those fields, we were always taught of the importance of a good question. So I'd like to throw out a question that I hope will be good enough to spur discussion: What transforms a nonfiction picture book written using the "list" form into a special, creative, exceptional and exciting work?
<urn:uuid:89d8b078-00b6-46d1-91a0-20685dd6a937>
CC-MAIN-2017-34
http://inkrethink.blogspot.com/2008/02/beak-for-science.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103270.12/warc/CC-MAIN-20170817111816-20170817131816-00161.warc.gz
en
0.966443
533
2.9375
3
May 25, 2012 In the 1920s, Wilhelm Ackermann demonstrated a computable function that was not primitive-recursive, settling an important argument in the run-up to the theory of computation. There are several versions of his function, of which the most common is defined over non-negative integers m and n. The function grows very rapidly, even for very small inputs; as an example, A(4,2) is an integer of about 20,000 digits. Pages: 1 2
<urn:uuid:6db8a4fe-426c-41a8-868b-7583683cdaee>
CC-MAIN-2016-30
https://programmingpraxis.com/2012/05/25/ackermanns-function/?like=1&source=post_flair&_wpnonce=309c070579
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469258944256.88/warc/CC-MAIN-20160723072904-00017-ip-10-185-27-174.ec2.internal.warc.gz
en
0.941554
104
3.015625
3
Researchers surveyed around 2,600 postmenopausal women with osteoporosis living in Europe, the Middle East, Latin America, Asia, and the Pacific Rim. They found that in non-equatorial countries, rates of osteoporosis reached as high as 90 percent in some areas. Since low levels of vitamin D are known to contribute to osteoporosis, the new findings are particularly worrisome. “This demonstrates that we must do more to educate our patients about the critical role of vitamin D in maintaining bone health, and find better ways to ensure that women with osteoporosis receive adequate vitamin D,” said Dr. Maire O’Connor, a specialist in public health attending the symposium. Both lack of information and inadequate intake of vitamin D are strong predictors of deficiency, according to the study. In addition to its impact on osteoporosis, vitamin D deficiency has also been linked to depression, prostate cancer, breast cancer, diabetes and obesity. The body produces vitamin D in response to exposure to ultraviolet radiation from natural sunlight. While supplementation can improve vitamin D levels, the most effective method is simply enjoying a little time in the sun. Even though vitamin D is freely available through sensible sunlight exposure, osteoporosis, breast cancer and prostate cancer continue to be almost universally treated with prescription drugs rather than through safer and less expensive vitamin D restoration efforts. Conventional medicine does not promote vitamin D because it cannot be patented and, therefore, cannot be profitably promoted and sold to patients.
<urn:uuid:db3e1435-9692-4136-ad24-e781d193513b>
CC-MAIN-2021-39
https://www.naturalnews.com/z019496_medical_myths_nutritional_deficiencies.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057033.33/warc/CC-MAIN-20210920070754-20210920100754-00489.warc.gz
en
0.931259
311
3.671875
4
some knowledge about Industry valves 1. Starting and Stopping flow: Gate, Ball and Butterfly Valves are the most common form of shut-off valves, with ball and even butterfly valves rapidly becoming the primary choice due to the ease of automation and fast shut-off abilities, and in the case of ball valves the barest minimum of flow restrictions. Our DBV are often supplying butterfly valve and ball valve with high quality and reasonable price. 2. Regulating Flow: Regulating or throttling flow is most commonly done with the use of a globe valve, and to a much lesser extent an angle valve. The seat design forces the flow evenly around a disc or plug arrangement that enables a closer regulation of flow. Globe valves are often used for the control of steam. 3. Preventing Back Flow: This is the function of check valve, it prevents flow reversal in piping, a primary cause of water hammer. Check valves most commonly are swing checks, normally used with gates and ball valves, and lift check or spring checks, which are normally used with Globe and Control type valves Our DBV are specializing in metal to metal renewable seat butterfly valve, turnnion mounted ball valve and so on. If you are interested in our valves, do not hesitate to contact us: www.dbvvalve.com
<urn:uuid:966743a9-b68a-4c50-bc80-398421a33387>
CC-MAIN-2022-33
https://www.dbv-armaturen.com/industry-news/some-knowledge-about-industry-valves.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00639.warc.gz
en
0.927948
270
2.6875
3
A lump on your collarbone might be cause for concern. This long, thin bone interfaces your shoulder to your chest. It runs just underneath the skin’s surface and is commonly smooth. This makes any lump on collar bone simple to notice and feel. A lump on collar bone might be an indication of damage, disease, or an increasingly original condition. You may have a thought of what caused the irregularity, or it might have shown up out of the blue. Lump on Collar Bone Causes There are various reasons why a lump can show up on the collarbone. Peruse on to find out about these causes. It is the second most usual kind of bone malignancy. It assaults the connective tissues, called ligaments, which keep the bones from crushing against one another and furthermore shape parts of bodies like nose and ears.This carcinogenic lump can turn out at wherever, where there is a ligament. For this situation, for example, on the shoulder bone. Different side effects incorporate, irritation close to the protuberance, confined development and unbearable agony, particularly during the evening. A disease of the bone, likewise called osteomyelitis, may happen following damage, surgery, or situation of an intravenous (IV) line close to the collarbone.Even though it is uncommon, osteomyelitis of the collarbone can turn into a long haul or ceaseless issue for a few people whenever left untreated. Side effects can run from mellow to extreme and may include: - Redness, fever, and chills - Fluid seepage from the lump Youthful kids with osteomyelitis may likewise appear to be fractious or incessantly drained. It is an ailment caused by concoction awkwardness in mind. Which results in weakness, disposition swings, muscles firmness and agony, cerebral pains, lack of sleep alongside lumps in numerous parts of the body including collarbone. The protuberances are called lipomas, which are essentially non-dangerous irregularities, made up of the fat affidavit. These lumps don’t need as a rule require treatment, yet can be precisely evacuated on the off chance that they are getting greater or causing monstrous torment. A clavicle fracture can result in a little lump on the collarbone. A clavicle fracture is fundamentally a break in the long, neckline bone. It tends to be extremely difficult and may result in limited development of the arm or shoulder. A pounding or snapping sound may likewise happen while moving the arm. The treatment is wearing a mortar or sling from over the shoulder and arm and resting, until the point when the bone has recuperated totally. Thoracic Outlet Disorder Thoracic outlet disorder is a gathering of scatters that happen when veins Or nerves in the distance between your collarbone and your very first rib (thoracic outlet) are packed. This can cause torment in your shoulders and neck and deadness in your fingers. Primary reasons for thoracic outlet disorder incorporate physical injury from a fender bender, dreary wounds from occupation or sports-related exercises, certain anatomical imperfections, (for example, having an additional rib), and pregnancy. Now and then specialists can’t decide the reason for thoracic outlet disorder. Aneurysmal Bone Cyst Bones normally develop and change as your tyke gets more established. Be that as it may, all through a lengthy procedure, irregularities can at times happen. An aneurysmal bone blister (which is regularly truncated ABC) is one such variation from the norm. ABCs are blood-filled, sinewy sores that grow the bone and can cause agony, swelling, and cracks. They are benevolent pimples (non-destructive) that don’t spread. ABCs are most normal amid a tyke’s high school years. They can happen in practically any bone in the arms, legs, trunk or skull and additionally the vertebrae and knee. While it’s kind, it very well may be very dangerous, because it twists the bone and can cause cracks. ABC’s don’t spread yet can be very harming deep down and can return after they are expelled. With the medical procedure, these growths are exceptionally treatable, even though they do develop back now and again. 2 Basic Types of Aneurysmal Bone Cyst? - An aneurysmal bone cyst more often than not can be categorized as one of two classes: dynamic and forceful. - A functioning ABC is one that could twist the bone it’s developing in, however, stays contained in the bone, while a forceful ABC stretches out past the unresolved issue close-by delicate connective tissues. Seldom, will aggressive growths leave without treatment? The two types can cause torment and swelling and, in uncommon cases, cracks in the included bone. Aneurysmal bone pimples don’t for the most part leave alone. How to Treatment Lump on Collar Bone The most effective method to treat a lump on the collar bone treatment for a lump on the collar bone fluctuates dependent on the reason for the protuberance. Your specialist should analyze the lump to decide appropriate treatment. To Treat Neckline bone Wounds Wounds, cracks, or breaks of the collarbone will require a scope of medicines. These incorporate what tops off an already good thing, torment calming medicine, and utilizing an arm sling or prop to anchor the collarbone and help recuperate the damage. To Treat Swollen Lymph Hubs Swollen lymph hubs can be dealt with dependent on the reason for the condition. The condition might be the aftereffect of contamination, and you will be treated with prescriptions like anti-infection agents or antivirals for fourteen days. You may require progressively effective medicines if the swollen lymph hubs are the indication of an increasingly original well-being condition. To Treat blisters A blister on your collarbone may require almost no treatment. Once in a while growths can leave with no therapeutic intercession, and different occasions your specialist may prompt depleting it. To Treat Tumors A tumor will likely be treated on a case-by-case premise. It is expected your specialist will biopsy cancer to decide if it is generous or dangerous. This will direct your specialist on the best treatment choices.
<urn:uuid:32033eb6-bad3-44c8-b817-d0b7cc4d8d39>
CC-MAIN-2019-30
https://fitose.com/causes-of-lump-on-collar-bone/
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526446.61/warc/CC-MAIN-20190720045157-20190720071157-00183.warc.gz
en
0.90701
1,335
2.5625
3
57 years ago today, “The Flintstones” made their television debut. I loved them, and was far from alone. It ran in prime time for six seasons, and prior to “The Simpsons” it was the most successful animated series in television history. To this day, it is still tremendously popular and important part in American cultural history. Looking back, it also shows us how far we have come in promoting health and wellness to our young people on television. Like many shows of the era, for the first two seasons, “The Flintstones” was sponsored by a cigarette company, Winston. They regularly showed commercials for Winston, including one in which Wilma and Betty did all the chores. Fred and Barney decide that they felt bad about watching the women do all the work, so they venture to the backyard where they will not have to watch and can enjoy their smokes peacefully. The show also featured advertisements for Busch beer which showed Fred and Barney swigging on a few cold ones. “The Flintstones” were far from alone in pushing cigarettes on their viewers. “I Love Lucy” and many others also featured advertisements and episodes showing the stars smoking. The nightly news shows were also often sponsored by cigarette companies. Many times, endorsements for smoking were given by Doctors! In 1970, advertising smoking in television commercials was banned by the “Federal Public Health Cigarette Smoking Act.” It did not go into effect until January 2, 1971 as part of a compromise to allow cigarette advertisements during that year’s college football bowl games. The last ever commercial promoting smoking aired at 11:59 P.M. on January First. Even though the advertising was banned, characters on T.V. continued to smoke well into the 1990s. Due to a 2002 study which outlined the effect characters smoking had on the nation’s youth, and pressure from social activists, networks then began to phase out most characters that smoked. It is now very rare to see the protagonist in any T.V. show smoke, even though there are some exceptions. Most of the time when you see a smoker on television now, it is the person you are not supposed to like anyway. Why does this matter? Research shows that the more often young people are exposed to smoking in real life and television, the more likely they are to smoke themselves. Seeing the “cool” characters smoke on television made the habit more appealing to young people, and the cigarette companies were not shy about capitalizing on this. Smoking rates have dropped dramatically in the last few decades, and television deserves some of the credit. According to a report by the National Institute on Drug Abuse, smoking amongst teens has dropped to the lowest level since they began documenting it in 1975. Worldwide, smoking is actually on the rise. In America, it has dropped from 21 percent of adults in 1997 to just under 15 percent now. Health officials expect it to drop to 12 percent by 2020. There are plenty of other good reasons for the decline in cigarette use in America. Government seems to make laws nearly every year making it tougher on smokers. Laws like banning them on airplanes, with children in the car, in public places, and increasing taxes have all been effective. Just as important have been the educational programs aimed to sour kids on tobacco have multiplied both in and out of classrooms. It is hard to tell just how much the decline in the promotion of smoking in America is due to the responsible changes made by television, but it had to help. So to television, I say something it doesn’t hear much: “Thank you for a job well done.”
<urn:uuid:970416a6-a42c-45a5-a003-3b42951550c2>
CC-MAIN-2019-09
https://theunfinishedpyramid.com/2017/09/30/smoking-with-fred-flintstone/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247511174.69/warc/CC-MAIN-20190221213219-20190221235219-00312.warc.gz
en
0.984899
751
2.828125
3
Ekohistorijski aspekti proučavanja logora na Golom otoku 1949.-1956. Ecohistorial Aspects of Goli Otok Labor Camp 1949-1956 Subject(s): Regional Geography, Economic history, Political history, Political psychology, Economic development, WW II and following years (1940 - 1949), Post-War period (1950 - 1989), Penal Policy Published by: Društvo za hrvatsku ekonomsku povijest i ekohistoriju - Izdavačka kuća Meridijani Keywords: Naked island; Yugoslavia; Informbureau; Ecohistory; labor camp; political reeducation; Summary/Abstract: Goli otok (Barren Island) served as a site of a political prison and labour camp which was founded in 1949, at the peak of the Tito- Stalin political dispute. It was in function until 1956, when its operation as a political prison for Yugoslav pro- Cominformist dissidents was discontinued. During this period, at least 13 000 political prisoners were incarcerated on the island. Due to the covert nature of its workings between 1949 and 1956, it had been covered up and ignored as a topic during most of the Yugoslav period by the public and the historians alike. In 1980s, however, the narratives about Goli otok began to gradually reach the public. After the break up of the SFR Yugoslavia, a handful of historians who dealt with the topic of Goli otok mainly focused on the socio- political aspects of this political prison and labour camp’s past, drawing on a large body of former inmates’ testimonies about the harsh everyday life in the camp and the peculiar methods of its orchestration. However, the impact of Goli otok political prison and labour camp was not, of course, only limited to the Yugoslav socio- political climate and the individuals living in these times. Its influence is also noticeable on the very site of the labour camp- the island. Hard forced labour undertaken by thousands of political prisoners which included the construction of several workshops and small factories orientated towards the production and the distribution of various stone and wood products is but one of the factors which dramatically influenced the island’s environment. Human dwellings and accompanying industrial constructions erected on the island’s desert- like stone terrain, as well as the now afforested portions of once (literally) barren island are just some of the examples. In other words, the forced labour of the incarcerated thousands is inextricable from the impact on island’s environment, albeit the nominal purpose of this labour was ‘corrective’. This paper therefore aims to contribute to the study of Goli otok from the viewpoint of environmental history. The paper speaks to the works of the authors dealing with the environmental, carceral and labour history aspects in the study of USSR Gulag as one of the examples relatable to the Goli otok story. In so doing, the paper aims to contextualise Goli otok within a wider scholarly space, considering the geographical, ideological implications, as well as those of environmental and socio- political history. - Issue Year: 2016 - Issue No: 12 - Page Range: 186-196 - Page Count: 11 - Language: Croatian
<urn:uuid:475a1010-9b1e-4231-8fe9-4386221abfae>
CC-MAIN-2020-34
https://www.ceeol.com/search/article-detail?id=577228
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738746.41/warc/CC-MAIN-20200811090050-20200811120050-00506.warc.gz
en
0.94846
689
2.703125
3
Until now our doctors have lacked an effective way to predict who is at the greatest risk of neuropathy. Usually we find out too late — when irreversible nerve damage has already occurred. Diabetic neuropathy is the most common microvascular complication we have. More than half of all people with diabetes develop neuropathy. It is a complication in both type 1 and type 2 diabetes. In the past few years the U.S. Food and Drug Administration approved two drugs — Cymbalta and Lyrica — for managing the pain of diabetic neuropathy. These drug help many of us. But wouldn’t it be a lot better for us if we could prevent diabetic neuropathy? Now, maybe we can. It’s a standard and simple test of the level of blood fat that we have. The common blood test for triglycerides — a well-known heart risk factor — may also tell us if we are at risk for neuropathy. Researchers at the University of Michigan and Wayne State University analyzed data from 427 people with diabetes who suffered from neuropathy. Diabetes, a professional journal of the American Diabetes Association, will publish the study, “Elevated Triglycerides Correlate with Progression of Diabetic Neuropathy,” in its July issue. The abstract is online, and my friend Dr. Bill Quick kindly sent me the full text. The researchers found that elevated triglycerides correlated with the nerve fiber loss independent of disease duration, age, diabetes control, or other variables. High levels of triglycerides turned out to be more likely to lead to neuropathy than high blood glucose levels. “People can reduce blood triglyceride levels with the same measures that reduce cholesterol levels,” according to a University of Michigan Health System press release, “by avoiding harmful fats in the diet and exercising regularly.” Maybe. But that never worked for me. The normal level of triglycerides is below 150 mg/dl. My level was usually higher, up to 176 — until I started a very low-carbohydrate diet. Just two months later my level dropped to 47 and has stayed in that range ever since. My experience is typical. It is the consumption of high levels of carbohydrate that drive high triglyceride levels, says Dr. Michael Eades. “After years of low-carb dieting myself and of taking care of thousands of patients on low-carb diets, I can tell you one thing with pretty much certainty: Low-carb diets reduce triglyceride levels markedly,” he writes. “On a low-carb diet, these patients drop their triglyceride levels like a rock.” This leaves us with a clear choice. We can wait until we get neuropathy and treat it with one of the available drugs. Or we can prevent it by testing our triglyceride level. And if that level is too high we know what to do. This article is based on an earlier version of my article published by HealthCentral.
<urn:uuid:3e7d4fa0-faf7-469b-a21b-1e570f7587d4>
CC-MAIN-2016-30
http://www.mendosa.com/blog/?p=397
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826908.63/warc/CC-MAIN-20160723071026-00170-ip-10-185-27-174.ec2.internal.warc.gz
en
0.933771
613
3.125
3
January 18, 2013 Lap Band Surgery Found To Be Effective For Long-Term Weight Loss Connie K. Ho for redOrbit.com — Your Universe Online Researchers from the Center for Obesity Research and Education (CORE) at Monash University recently completed a landmark study which found that laparoscopic adjustable gastric banding, otherwise known as lap banding, could be an effective strategy for managing obesity in the long-term.The team of investigators tracked 3,227 patients treated in Australia during a 15-year period (approximately from 1994 to 2011). 78 percent of the participants in the study were female with an average age of 48 years. The follow-up of the study was recently featured in the Annals of Surgery, and revealed how a number of patients who had lap band surgery were able to keep off an average weight loss of 26 kilogram for over ten years after their surgery. In particular, 714 individuals had the surgery at least 10 years ago while 54 individuals had the treatment at least 15 years ago. "These results show that when you have a significant problem with obesity, a long-term solution is available," explained Paul O'Brien, a professor at Monash University, in a prepared statement. "This surgery is safe and effective, and it has lasting benefits. Substantial weight loss can change the lives of people who are obese — they can be healthier and live longer." The researchers believe that with weight loss, there is also better control of type 2 diabetes. "In obese patients with type 2 diabetes, weight loss after gastric banding can lead to effective control of blood sugar levels without the need for medication in about three-quarters of cases," noted O'Brien in the statement. The study participants had followed a set of rules related to eating, exercise, and activity set out by the researchers; during that study period, approximately one in 20 patients removed the lap band. "In treating a chronic disease such as obesity over a lifetime, it is likely that something will need to be corrected at some time in some patients," continued O'Brien in the statement. "The study shows a marked reduction of revisional procedures with the introduction of the new version of the Lap-Band 6 years ago. Importantly, those who had revisional surgery lost as much weight in the long term as those who did not need it." The researchers also compared the effects of different types of weight loss-surgeries, such as gastric banding that is normally completed in a day as opposed to higher risk procedures that necessitate longer hospital stays. They found that the weight loss results were similar for individuals who had gastric banding and gastric bypass. "Access to weight-loss surgery in Australia remains severely limited for many obese patients as relatively few cases are treated within the public health system. We are working hard to improve access," concluded O'Brien in the statement. "We have ample evidence that weight-loss surgery is effective, and it is unfair that half of eligible patients cannot be treated, particularly as it has been shown that gastric banding is a highly cost-effective health care measure. The stigma of obesity, and the assumption that it is the person's fault, entrenches discrimination against people who could benefit." Though this study shows the benefits of weight loss surgery, particularly lap band surgery, other groups have noted that operations such as gastric bypass surgery are not a quick fix for diabetes. For example, the National Alliance for Hispanic Health released a statement last year that cautioned the notion that gastric bypass surgery could reverse diabetes. They issued the statement in response to two controversial studies published in the New England Journal of Medicine, arguing that there was a lack of long-term evidence on the procedure. "To promote gastric bypass surgery as a quick fix for diabetes is unconscionable. The outsized media attention to these limited studies gives false hope to diabetics and could be dangerous to health," commented Jane L. Delgado, the president and CEO of the National Alliance for Hispanic Health, in a prepared statement. "The studies have no proof of long-term effect (more than five years), sample sizes are small, and they did not test for patients older than 60 years of age."
<urn:uuid:1d30ad11-33bf-4266-9672-5b2ce86b67b0>
CC-MAIN-2017-51
http://www.redorbit.com/news/health/1112766445/obesity-weight-loss-gastric-banding-type-2-diabetes-011813/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948539745.30/warc/CC-MAIN-20171214035620-20171214055620-00698.warc.gz
en
0.973853
866
2.703125
3
Ovarian Cancer Prevention Ovarian cancer cannot be prevented in most cases, but women can take steps to decrease risk of developing the disease. - Oral contraceptives: Women who have used birth control pills for more than five years reduce their risk by 50 percent, compared to women who have never taken oral contraceptives. - Removal of the fallopian tubes and ovaries: Studies show that removing the fallopian tubes and the ovaries in premenopausal women with the BRCA1 or BRCA2 genetic mutation can reduce risk of ovarian cancer by 85 to 95 percent and breast cancer by 50 percent. Ovarian Cancer Treatment Women with ovarian cancer should consult a gynecologic oncologist to determine their specific treatment needs. Treatment for ovarian cancer may include surgery, chemotherapy, radiation therapy, targeted therapy, hormone therapy, or a combination. For younger patients whose cancer has not spread, it may be possible to save the unaffected ovary and fallopian tube to preserve fertility.
<urn:uuid:30ce163d-15a5-45a0-ba14-5fdb27509477>
CC-MAIN-2024-10
https://www.texascenterforprotontherapy.com/cancers-treated/gynecologic/ovarian-cancer
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00360.warc.gz
en
0.932974
201
2.9375
3
An Overview of the Scientific Components Behind this Success, and a Free Implementation Guide for Those Who Want to Follow Happy New Year !!! I hope that your holiday season was filled with joy and family, and that your 2017 is your most successful year yet. Before the holiday break, we were very pleased to have the Martin County (KY) School District’s five-year School Climate Transformation Grant and its middle and high school sites highlighted in Education Week’s series on “Response-to-Intervention: The Next Generation.” We were instrumental in Martin County receiving this grant, and they are implementing Project ACHIEVE’s Positive Behavioral Support System (PBSS) as the cornerstone of their district- and school-wide discipline and classroom management approach. Education Week Summary In the piece (published on December 13, 2016), the following important points were made: - Many Martin County families are living in poverty (the district is in Eastern Kentucky’s coal country); many students have been exposed to alcohol and drug abuse; and many teachers need to respond to students’ “backgrounds of trauma” in order to focus on academics and instruction - School staff (teachers, mental health support staff, administrators) discuss--weekly--the information and data related to students’ academic and social, emotional, and behavioral progress; and the supports and interventions (when necessary) that help address students’ needs - Students, parents, and community and agency leaders are involved in and an integral part of the planning, discussions, and strategies that are implemented - District and school personnel have embraced the importance of teaching and reinforcing positive student behavior, rather than depending on zero tolerance, punishment, and suspensions (although this is an ongoing challenge) - The schools have recognized the need for multi-tiered services, supports, and strategies because some students need more strategic or intensive interventions relative to their academic and social, emotional, and behavioral needs - These services and supports are need-based. That is, students to do not have to receive a certain number of Tier I or II interventions to “qualify” to receive Tier III approaches, and functional assessment to determine the underlying reasons for students’ challenges begins in Tier I. - Thus, the multi-tiered (Tier I, II, and III) Project ACHIEVE (academic and behavior/Positive Behavioral Support) system was implemented simultaneously. (That is, the schools did not implement Tier I for a year or two, then Tier II for a year or two, and then Tier III.) - Finally, the system is working. Staff and students demonstrate their continuous support, they are internalizing and independently implementing the approaches, and the feedback and data are demonstrating progress and success The Scientific Components of “the System” While Martin County is implementing the scientific components of its school discipline system over a three-to-five-year period of time, the five scientific components that “anchor” its success have been present and growing from the beginning. Moreover, the six schools in this County District have recognized that these scientific components are interdependent, and that they eliminate the need for a number of separate programs that often overwhelm and side-track many other districts. These programs include those focusing on: - Cultural Competence - Character Education - Poverty Awareness - Trauma Sensitivity - Restorative Justice - Teasing and Bullying Programs Significantly, most of these programs (a) are not evidence-based; (b) are not rooted in cognitive-behavioral science; (c) do not focus on student self-management outcomes; and/or (d) are narrow in scope, rather than broad in impact. More often than not, while well-intended, these programs sound good in theory, but--in practice--they do not explicitly utilize all five of the scientific components needed for comprehensive success: - Positive Relationships and School/Classroom Climate - Positive Behavioral Expectations and Skills Instruction - Student Motivation and Accountability - Applications to All Settings and the Peer Group These components are briefly described below. Positive Relationships and School/Classroom Climate Effective schools work consciously, planfully, and on an on-going basis to develop, reinforce, and sustain positive and productive relationships so that their cross-school and in-classroom climates mirror these relationships. Critically, however, these relationships include the following: Students to Students, Students to Staff, Staff to Staff, Students to Parents, and Staff to Parents. But functionally, they involve training and reinforcement. For example, students need to learn the social and interactional skills that build positive relationships with others, and the peer group must “buy into” the process. Similarly, teachers need to recognize the importance of committing to effective communication, collaboration, and collegial consultation. But, they also need to have the skills to accomplish these. . . in good times and bad. Positive Behavioral Expectations and Skills Instruction Students--from preschool through high school--need to know the explicit social, emotional, and behavioral expectations in the classrooms and across the common areas of the school. These expectations need to be communicated as “what they need to do,” rather than “what they do not need to do.” Critically, teachers and administrators will have more success teaching students to (a) walk down the hallway, rather than not run; (b) raise your hand and wait to be called on, rather than don’t blurt out answers; (c) accept a consequence, rather than don’t roll your eyes, and give me attitude. In addition, these expectations need to be behaviorally specific--that is, we need to describe exactly what we want the students to do (e.g., in the hallways, bathrooms, cafeteria, and on the bus). It is not instructionally helpful to talk in constructs--telling students that they need to be “Respectful, Responsible, Polite, Safe, and Trustworthy.” This is because each of these constructs involve a wide range of behaviors, and it is the behaviors we need to teach so that students can fully demonstrate the global constructs that we want. Said a different way: You can’t teach a behavioral construct; we need to teach the behaviors that represent the construct. But we also must teach these social, emotional, and behavioral skills. . . the same way that we teach a football team, an orchestra, a drama club, or an academic task. We need to teach the skills and its steps, to demonstrate it, to give students opportunities to practice and receive feedback, and then to apply their new skills to “real-world” situations. This all means that we need to communicate our behavioral expectations to students, and then teach them. Functionally, this means that our schools need to consciously and explicitly set aside time for social skills instruction, and then embed the application of this instruction into their classrooms and group activities, and (for example) cooperative and project-based instruction. Student Motivation and Accountability For the skill instruction described above to “work,” students need to be held accountable for demonstrating positive and effective social, emotional, and behavioral skills. But to accomplish this, students need to be motivated (eventually, self-motivated) to perform these skills. Motivation is based on two component parts: Incentives and Consequences. But critically, these incentives and consequences must be meaningful and powerful to the students. Too often, schools create “motivational programs” for students that involve incentives and consequences that the students couldn’t care less about. Thus, it looks good “on paper,” but it holds no weight in actuality--from the students’ perspectives. At other times, schools forget that they need to recognize, engage, and activate the peer group in a motivational program. This is because, at times, the peer group actually is undermining the program by negatively reinforcing those members (on the playground, after school, on social media) who are “playing up to the adults” through their appropriate behavior. On a functional level, both incentives and consequences result in positive and prosocial behavior. The incentives motivate students toward the expected behaviors, and the consequences motivate students away from the inappropriate behaviors (and toward the expected ones). But critically, educators need to understand that you can only create motivating conditions. That is, we can’t force students to meet the behavioral expectations. When we force students to do anything, we are managing their behavior, not facilitating self-management. While we have to do some management to get to self-management. . . if we only manage students’ behavior, then they will not (know how to) self-manage when the adults are not present. Consistency is a process. It would be great if we could “download” it into all students and staff. . . or put it in their annual flu shots. . . but that’s not going to happen. Consistency needs to be “grown” experientially over time, and then sustained in an ongoing way. It is grown through effective strategic planning with explicit implementation plans, good communication and collaboration, sound implementation and evaluation, and consensus-building coupled with constructive feedback and change. It’s not easy. . . but it is necessary for school success. But relative to school discipline, classroom management, and student self-management, consistency must occur all four of the other elements of the blueprint. That is, in order to be successful, staff (and students) need to (a) demonstrate consistent prosocial relationships and interactions--resulting in consistently positive and productive school and classroom environments; (b) communicate consistent behavioral expectations, while consistently teaching them; (c) use consistent incentives and consequences, while holding student consistently accountable for their appropriate behavior; and then (d) apply all of these components consistently across all of the settings and peer groups in the school. Moreover, consistency occur when staff are consistent (a) with individual students, (b) across students, (c) within their grade levels or instructional teams, (d) across time, (e) across settings, and (f) across situations and circumstances. Critically, when staff are inconsistent, students feel that they are treated unfairly, they sometimes behave differently for different staff or in different settings, they can become manipulative--pitting one staff person against another, and they often emotionally react--some getting angry with the inconsistency, and others simply withdrawing because they feel powerless to change it. Said a different way: Inconsistency undercuts student accountability, and you don’t get the behavior (or it occurs inconsistently or differentially) that you want in class or across the school. Applications to All Settings and the Peer Group The last component of the school discipline blueprint focuses on the application of the previous four components to all of the settings and peer interactions in the school. Relative to the former, it is important to understand that the common areas of a school are more complex and dynamic than the classroom settings. Indeed, in the hallways, bathrooms, buses, cafeteria, and on the playground (or playing fields), there typically are more multi-aged or cross-grade students, more interactions, more space or fewer physical limitations, fewer staff and supervisors, and different social demands. As such, the positive social, emotional, and behavioral interactions that occur in the classroom often are taxed in the common school areas. Accordingly, students need to be taught how to demonstrate their interpersonal, social problem solving, conflict prevention and resolution, and emotional coping skills in each common school area. Moreover, the training needs to be tailored to the social demands and expectations of these settings. Relative to the latter area, and as above, it is important to understand that the peer group is often a more dominant social and emotional “force” than the adults in a school. As such, the school discipline blueprint is consciously applied (relative to climate, relationships, expectations, skill instruction, motivation, and accountability) to help prevent peer-to-peer teasing, taunting, bullying, harassment, hazing, and physical aggression. This is done by involving the different peer groups in a school in group “prevention and early response” training, and motivating them--across the entire school--to take the lead relative to prosocial interactions. Truly, the more the peer group can be trained, motivated, and reinforced to do “the heavy prosocial lifting,” the more successful the staff and the school will be relative to positive school climate and consistently safe schools. In the end, from a school and district perspective, these five interdependent and evidence-based school discipline components are exactly what the Martin County School District in rural Kentucky is using. And it’s working. Not perfectly. . . but surely, systematically, and systemically. So. . . Let’s Get to Work: A Free Planning Guide In order to help schools think about these components more deeply, and begin to apply them for themselves, I am offering the following: - Overview of my best-selling book: This 138-page Study Guide (a) summarizes the content of each chapter; (b) provides “study questions” and discussion templates if a school faculty want to read the book together as part of a “book study;” (c) includes a Three-Year School Discipline Implementation Fact Sheet along with an Action Plan with specific activities; and (d) gives case study examples and results from a number of schools across the country. In total, the chapters in the School Discipline book and Guide cover each component of the blueprint above. They are: Chapter 1: Designing School-wide Positive Behavioral Support Systems (PBSS) Chapter 2: School Readiness and the Steps for PBSS Implementation Chapter 3: The School Discipline/PBSS and Other Committees: Effective Team and Group Functioning Chapter 4: Behavioral Accountability, Student Motivation, and Staff Consistency Chapter 5: Teaching Social, Emotional, and Behavioral Skills Chapter 6: School Safety, and Crisis Prevention, Intervention, and Response Chapter 7: Teasing, Taunting, Bullying, Harassment, Hazing, and Physical Aggression Chapter 8: Functional Assessment and Why Students Become Behaviorally Challenging Chapter 9: Behavioral Interventions for Students with Strategic and Intensive Needs Chapter 10: Evaluating and Sustaining PBSS Outcomes To receive this Guide, all you have to do is e-mail me and request it: In addition, I am also always happy to provide any School Leader or Leadership Team with a free one-hour conference or Skype call to discuss how to begin implementing the blueprint described in this Blog, the Guide, and my book. As we begin the “last half” of the school year, we need to continue (or begin) preparing our students for academic success by also preparing them for social, emotional, and behavioral success. We have the scientific foundation and blueprint for success. We only have to invest our efforts in implementing the related strategies--like Martin County--surely, systematically, and systemically. Robert Collier once said: “Success is the sum of small efforts, repeated day in and day out.” I hope that the information presented today will inform your efforts, and motivate you to take the first of the many steps every school and district needs to be successful on behalf of all our students. If I can help you on your journey, give me a shout. I hope to hear from you soon.
<urn:uuid:bc4dab4b-4925-4517-8366-0ca8327a5942>
CC-MAIN-2019-26
http://projectachieve.info/news/post/38/education-week-series-on-rti-highlights-kentucky-appalachian-mountain-grant-sites-successful-project-achieve-school-discipline-program
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998509.15/warc/CC-MAIN-20190617143050-20190617165050-00452.warc.gz
en
0.942368
3,278
2.78125
3
The following is the Feb. 5, 2020 Congressional Research Service report, U.S. Role in the World: Background and Issues for Congress. From the report The U.S. role in the world refers to the overall character, purpose, or direction of U.S. participation in international affairs and the country’s overall relationship to the rest of the world. The U.S. role in the world can be viewed as establishing the overall context or framework for U.S. policymakers for developing, implementing, and measuring the success of U.S. policies and actions on specific international issues, and for foreign countries or other observers for interpreting and understanding U.S. actions on the world stage. While descriptions of the U.S. role in the world since the end of World War II vary in their specifics, it can be described in general terms as consisting of four key elements: global leadership; defense and promotion of the liberal international order; defense and promotion of freedom, democracy, and human rights; and prevention of the emergence of regional hegemons in Eurasia. The issue for Congress is whether the U.S. role in the world is changing, and if so, what implications this might have for the United States and the world. A change in the U.S. role could have significant and even profound effects on U.S. security, freedom, and prosperity. It could significantly affect U.S. policy in areas such as relations with allies and other countries, defense plans and programs, trade and international finance, foreign assistance, and human rights. Some observers, particularly critics of the Trump Administration, argue that under the Trump Administration, the United States is substantially changing the U.S. role in the world. Other observers, particularly supporters of the Trump Administration, while acknowledging that the Trump Administration has changed U.S. foreign policy in a number of areas compared to policies pursued by the Obama Administration, argue that under the Trump Administration, there has been less change and more continuity regarding the U.S. role in the world. Some observers who assess that the United States under the Trump Administration is substantially changing the U.S. role in the world—particularly critics of the Trump Administration, and also some who were critical of the Obama Administration—view the implications of that change as undesirable. They view the change as an unnecessary retreat from U.S. global leadership and a gratuitous discarding of long-held U.S. values, and judge it to be an unforced error of immense proportions—a needless and self-defeating squandering of something of great value to the United States that the United States had worked to build and maintain for 70 years. Other observers who assess that there has been a change in the U.S. role in the world in recent years—particularly supporters of the Trump Administration, but also some observers who were arguing even prior to the Trump Administration in favor of a more restrained U.S. role in the world—view the change in the U.S. role, or at least certain aspects of it, as helpful for responding to changed U.S. and global circumstances and for defending U.S. values and interests, particularly in terms of adjusting the U.S. role to one that is more realistic regarding what the United States can accomplish, enhancing deterrence of potential regional aggression by making potential U.S. actions less predictable to potential adversaries, reestablishing respect for national sovereignty as a guidepost for U.S. foreign policy and for organizing international affairs, and encouraging U.S. allies and security partners in Eurasia to do more to defend themselves. Congress’s decisions regarding the U.S. role in the world could have significant implications for numerous policies, plans, programs, and budgets, and for the role of Congress relative to that of the executive branch in U.S. foreign policymaking. Download the document here.
<urn:uuid:a4d741b4-797d-4335-a4fb-a045c8abb212>
CC-MAIN-2023-50
https://news.usni.org/2020/02/06/report-on-u-s-role-in-the-world?utm_source=USN%EF%BF%BD%EF%BF%BD%EF%BF%BD
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00730.warc.gz
en
0.942456
801
2.796875
3
As if dying honey bees in America weren’t bad enough, now another major pollinator, fruit bats, also known as flying foxes, are dropping dead in Australia. The largest of bats, the fruit bat is one of the most important to humans. They disperse the seeds and pollinate the flowers of many of the fruits and vegetables that we consume including bananas, peaches, dates, carob, avocados, jack fruit, plantains, mango, guava, cashews and figs, as well as rainforest flora and eucalyptus trees. According to an Agence France-Presse report, scorching temperatures resulting from climate change have caused the deaths of thousands of Australian bats. In January 2002, as many as 3500 bats, 6% of the fruit bats in nine colonies in New South Wales, died in just one day as temperatures rose over 42 degrees Celsius (107.5 F). British and Australian researchers, led by Justin Welbergen of Cambridge University, described what they observed among the bats behavior on that day in January in a paper published with the Proceedings of the Royal Society. First, the bats sought shade and began wing fanning in an attempt to cool off. Within a couple of hours the flying foxes were panting and drooling saliva. Finally, individual animals began falling from trees, dying within 10 – 20 minutes. The New South Wales Threatened Species Conservation Act has listed two of the species most affected by high temperatures as “vulnerable”; the black flying foxes, which lost up to 13 per cent of their population in New South Wales and Queensland during the heat waves and grey-headed flying foxes, which suffered 24,500 deaths and are thought to have a population of just 400,000 left in the world. Found to be most susceptible overall are females and young bats, with mortality rates of young bats as high as 50% in the effected colonies. This is likely to adversely affect the breeding of bats and, in turn, the species of plants and ecosystems that are reliant upon them for seeding and pollination. Concurrently, thousands of fruit bats are also dying from a paralysis tick epidemic in north Queensland, which may also be tied to climate related events. Last March, Cyclone Larry felled a great number of trees, causing the bats to feed on the wild tobacco which sprang up in place of the trees and grows at ground level, exposing them to the ticks. The bats habitats are also under threat from human expansion and they are sometimes killed by humans for being “pests”, with farmers complaining of bats eating their cultivated fruit. Scientists estimate that, in total, more than 30,000 Australian fruit bats have died from heat waves since 1994. Thousands more have died from other causes. This has potentially devastating impacts on agriculture and ecosystems in Australia and is another indication that climate change on the driest continent must be addressed immediately.
<urn:uuid:3c323042-e43c-4aa8-97d3-c861f6b22f5f>
CC-MAIN-2015-35
http://www.celsias.com/article/another-pollinator-falls-victim-to-climate-change/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644060413.1/warc/CC-MAIN-20150827025420-00279-ip-10-171-96-226.ec2.internal.warc.gz
en
0.968408
597
3.703125
4
Almost every month somewhere in the news you can read about a worker being injured or killed when a trench they were working in collapses. These injuries and fatalities are preventable with planning and proper execution of safety precautions. Last year throughout the country 8 workers were killed in excavations. Trench collapses can occur without warning, regardless of the depth. The vast majority of trenching fatalities occurs in trenches 5- to 15-feet deep. These depths invite taking chances, and often times it is the good, safe-looking material that turns out to be the unsuspecting killer. But trench cave-ins don’t have to happen. The following information can help you avoid these potentially deadly accidents. Make sure you know and follow the requirements: Pre- Excavation Requirements: • Coordinate with customer and other parties involved with the excavation. • Call Miss Dig to locate any public utilities in the area. • Follow site specific excavation procedures and forms. • Any utilities that need to be locked out coordinate that with the customer to make sure that all utilities are locked out in all locations so no utilities can be back fed • Review Scope and any as- built drawings for the area where the excavation is taking place. • Have a Pre- Job meeting to coordinate with other trades in the area • Have a competent person review Soil Classification by MiOSHA Standards. • Follow Ideal Contracting Pre- Excavation Checklist. • Inspect all equipment prior to use and document it on an Ideal Contracting Daily Equipment Checklist • Create a job specific Rescue Plan. • Make sure all proper equipment is all on site prior to any Excavation. • When Returning to the excavation make sure to have a competent person inspect the excavation for any new hazards that could be brought on changing weather conditions and other trades in the area.
<urn:uuid:c8b1551f-cf79-4a44-a190-09c035b7c930>
CC-MAIN-2022-27
https://idealcontracting.com/pre-excavation-safety/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103943339.53/warc/CC-MAIN-20220701155803-20220701185803-00187.warc.gz
en
0.921958
380
2.609375
3
|mixture of minerals with lazurite as the main constituent| Lapis lazuli artifacts, dated to 7570 BC, have been found at Bhirrana, which is the oldest site of Indus Valley Civilisation. Lapis was highly valued by the Indus Valley Civilisation (7570–1900 BC). Lapis beads have been found at Neolithic burials in Mehrgarh, the Caucasus, and as far away as Mauritania. It was used in the funeral mask of Tutankhamun (1341–1323 BC). By the end of the Middle Ages, lapis lazuli began to be exported to Europe, where it was ground into powder and made into ultramarine, the finest and most expensive of all blue pigments. Ultramarine was used by some of the most important artists of the Renaissance and Baroque, including Masaccio, Perugino, Titian and Vermeer, and was often reserved for the clothing of the central figures of their paintings, especially the Virgin Mary. Ultramarine has also been found in dental tartar of medieval nuns and scribes. Mines in northeast Afghanistan continue to be a major source of lapis lazuli. Important amounts are also produced from mines west of Lake Baikal in Russia, and in the Andes mountains in Chile which is the source that the Inca used to carve artifacts and jewelry. Smaller quantities are mined in Pakistan, Italy, Mongolia, the United States, and Canada. Lapis is the Latin word for "stone" and lazulī is the genitive form of the Medieval Latin lazulum, which is taken from the Arabic لازورد lāzaward, itself from the Persian لاجورد lājevard. It means "sky" or "heaven"; so this is a "sky stone" or "heaven stone". Historically, it was mined in Badakhshan region of upper Afghanistan, but also mined in Lājevard, Persia. Lazulum is etymologically related to the color blue and used as a root for the word for blue in several languages, including Spanish and Portuguese azul. Science and uses The most important mineral component of lapis lazuli is lazurite (25% to 40%), a blue feldspathoid silicate mineral with the formula (Na,Ca) 1–2. Most lapis lazuli also contains calcite (white), sodalite (blue), and pyrite (metallic yellow). Some samples of lapis lazuli contain augite, diopside, enstatite, mica, hauynite, hornblende, nosean, and sulfur-rich löllingite geyerite. The intense blue color is due to the presence of the trisulfur radical anion (S•− 3) in the crystal. An electronic excitation of one electron from the highest doubly filled molecular orbital (No. 24) into the lowest singly occupied orbital (No. 25) results in a very intense absorption line at λmax ~617 nm. Lapis lazuli is found in limestone in the Kokcha River valley of Badakhshan province in north-eastern Afghanistan, where the Sar-e-Sang mine deposits have been worked for more than 6,000 years. Afghanistan was the source of lapis for the ancient Egyptian and Mesopotamian civilizations, as well as the later Greeks and Romans. Ancient Egyptians obtained the material through trade with Mesopotamians, as part of Egypt–Mesopotamia relations. During the height of the Indus Valley Civilisation, approximately 2000 BC, the Harappan colony, now known as Shortugai, was established near the lapis mines. In addition to the Afghan deposits, lapis is also extracted in the Andes (near Ovalle, Chile); and to the west of Lake Baikal in Siberia, Russia, at the Tultui lazurite deposit. It is mined in smaller amounts in Angola, Argentina, Burma, Pakistan, Canada, Italy, India, and in the United States in California and Colorado. Uses and substitutes Lapis takes an excellent polish and can be made into jewellery, carvings, boxes, mosaics, ornaments, small statues, and vases. Interior items and finishing buildings can be also made with lapis. Two of the columns framing the iconostasis in Saint Isaac's Cathedral in Saint Petersburg are built with lapis. During the Renaissance, lapis was ground and processed to make the pigment ultramarine for use in frescoes and oil painting. Its usage as a pigment in oil paint largely ended during the early 19th century, when a chemically identical synthetic variety became available. Lapis lazuli is commercially synthesized or simulated by the Gilson process, which is used to make artificial ultramarine and hydrous zinc phosphates. It may also be substituted by spinel or sodalite, or by dyed jasper or howlite. History and art In the ancient world Lapis lazuli has been mined in Afghanistan and exported to the Mediterranean world and South Asia since the Neolithic age, along the ancient trade route between Afghanistan and the Indus Valley, dating to the 7th millennium BC. Quantities of these beads have also been found at 4th millennium BC settlements in Northern Mesopotamia, and at the Bronze Age site of Shahr-e Sukhteh in southeast Iran (3rd millennium BC). A dagger with a lapis handle, a bowl inlaid with lapis, amulets, beads, and inlays representing eyebrows and beards, were found in the Royal Tombs of the Sumerian city-state of Ur from the 3rd Millennium BC. Stone also known as Lazika Stone. Lapis was also used in ancient Mesopotamia by the Akkadians, Assyrians, and Babylonians for seals and jewelry. It is mentioned several times in the Mesopotamian poem, the Epic of Gilgamesh (17th–18th Century BC), one of the oldest known works of literature. The Statue of Ebih-Il, a 3rd millennium BC statue found in the ancient city-state of Mari in modern-day Syria, now in the Louvre, uses lapis lazuli inlays for the irises of the eyes. In ancient Egypt, lapis lazuli was a favorite stone for amulets and ornaments such as scarabs. Lapis jewellery has been found at excavations of the Predynastic Egyptian site Naqada (3300–3100 BC). At Karnak, the relief carvings of Thutmose III (1479-1429 BC) show fragments and barrel-shaped pieces of lapis lazuli being delivered to him as tribute. Powdered lapis was used as eyeshadow by Cleopatra. Pliny the Elder wrote that lapis lazuli is “opaque and sprinkled with specks of gold”. Because the stone combines the blue of the heavens and golden glitter of the sun, it was emblematic of success in the old Jewish tradition. In the early Christian tradition lapis lazuli was regarded as the stone of Virgin Mary. In late classical times and as late as the Middle Ages, lapis lazuli was often called sapphire (sapphirus in Latin, sappir in Hebrew), though it had little to do with the stone today known as the blue corundum variety sapphire. In his book on stones, the Greek scientist Theophrastus described "the sapphirus, which is speckled with gold," a description which matches lapis lazuli. There are many references to sapphires in the Old Testament, but most scholars agree that, since sapphire was not known before the Roman Empire, they most likely are references to lapis lazuli. For instance, Exodus 24:10: "And they saw the God of Israel, and there was under his feet as it were a paved work of a sapphire stone..." (KJV). The words used in the Latin Vulgate Bible in this citation are "quasi opus lapidis sapphirini", the terms for lapis lazuli. Modern translations of the Bible, such as the New Living Translation Second Edition, refer to lapis lazuli in most instances instead of sapphire. Sumerian necklace beads; 2600–2500 BC; gold and lapis lazuli; length: 54 cm; Metropolitan Museum of Art (New York City) Sumerian necklace; 2600–2500 BC; gold and lapis lazuli; length: 22.5 cm; from the Royal Cemetery at Ur (Iraq); Metropolitan Museum of Art Ancient Egyptian scarab finger ring; 1850–1750 BC; lapis lazuli scarab set in gold plate and on a gold wire ring lapis-lazuli; diameter: 2.5 cm, the scarab: 1.8 cm; Metropolitan Museum of Art Ancient Egyptian plaque with an Eye of Horus; 664–332 BC; lapis lazuli; length: 1.8 cm, width: 1.6 cm; Metropolitan Museum of Art - Dvārakā–Kamboja route - Lapis armenus – Variety of precious stone, resembling lapis lazuli, except that it is softer, and instead of veins of pyrite, is intermixed with green - Sar-i Sang - Shades of blue – Variety of the color blue - David Bomford and Ashok Roy, A Closer Look- Colour (2009), National Gallery Company, London, (ISBN 978-1-85709-442-8) - Moorey, Peter Roger (1999). Ancient Mesopotamian Materials and Industries: the Archaeological Evidence. Eisenbrauns. pp. 86–87. ISBN 978-1-57506-042-2. - "Excavation Bhirrana | ASI Nagpur". excnagasi.in. Retrieved 2020-08-21. - Sarkar, Anindya; Mukherjee, Arati Deshpande; Bera, M. K.; Das, B.; Juyal, Navin; Morthekai, P.; Deshpande, R. D.; Shinde, V. S.; Rao, L. S. (2016-05-25). "Oxygen isotope in archaeological bioapatites from India: Implications to climate change and decline of Bronze Age Harappan civilization". Scientific Reports. 6 (1): 26555. Bibcode:2016NatSR...626555S. doi:10.1038/srep26555. ISSN 2045-2322. PMC 4879637. PMID 27222033. S2CID 4425978. - DIKSHIT, K.N. (2012). "The Rise of Indian Civilization: Recent Archaeological Evidence from the Plains of 'Lost' River Saraswati and Radio-Metric Dates". Bulletin of the Deccan College Research Institute. 72/73: 1–42. ISSN 0045-9801. JSTOR 43610686. - Bowersox & Chamberlin 1995 - Alessandro Bongioanni & Maria Croce - Zhang, Sarah (January 9, 2019). "Why a Medieval Woman Had Lapis Lazuli Hidden in Her Teeth". The Atlantic. Retrieved May 9, 2020. - "Lapis Lazuli". www.gemstone.org. International Colored Gemstone Association. - Senning, Alexander (2007). "lapis lazuli (lazurite)". Elsevier's Dictionary of Chemoetymology. Amsterdam: Elsevier. p. 224. ISBN 978-0-444-52239-9. - Weekley, Ernest (1967). "azure". An Etymological Dictionary of Modern English. New York: Dover Publications. p. 97. - "Lapis lazuli: Mineral information, data and localities". www.mindat.org. - "Lazurite: Mineral information, data and localities". www.mindat.org. - Boros, E.; Earle, M. J.; Gilea, M. A.; Metlen, A.; Mudring, A.-V.; Rieger, F.; Robertson, A. J.; Seddon, K. R.; Tomaszowska, A. A.; Trusov, L.; Vyle, J. S. (2010). "On the dissolution of non-metallic solid elements (sulfur, selenium, tellurium and phosphorus) in ionic liquids". Chem. Comm. 46 (5): 716–718. doi:10.1039/b910469k. PMID 20087497. - H. S. Rzepa, "Lapis lazuli: the Colour of Ultramarine." Accessed: 2011-03-06. (Archived by WebCite® at https://www.webcitation.org/5wyiNxh3B?url=http://www.ch.imperial.ac.uk/rzepa/blog/?p=3604) - Oldershaw 2003 - Read, Peter (2005). Gemmology, Elsevier, p. 185. ISBN 0-7506-6449-5. - Lapis lazuli, Gemstone Buzz. - Moorey, Peter Roger (1999). Ancient mesopotamian materials and industries: the archaeological evidence. Eisenbrauns. pp. 86–87. ISBN 978-1-57506-042-2. - Monthly, Jewellery (2015-04-02). "A complete guide to Gemstones". Jewellery & Watch Magazine | Jewellery news, jewellery fashion and trends, jewellery designer reviews, jewellery education, opinions | Wrist watch reviews. Retrieved 2017-08-28. - Claire, Iselin. "Ebih-Il, the Superintendent of Mari". Musée du Louvre. Retrieved 10 October 2012. - Moment of Science site, Indiana Public Media - Alcestis Papademetriou, Mycenae, John S. Latsis Public Benefit Foundation, 2015, p. 32. - Schumann, Walter (2006) . "Sapphire". Gemstones of the World. trans. Annette Englander & Daniel Shea (Newly revised & expanded 3rd ed.). New York: Sterling. p. 102. In antiquity and as late as the Middle Ages, the name sapphire was understood to mean what is today described as lapis lazuli. - Theophrastus, On Stones (De Lapidibus) – IV-23, translated by D.E. Eichholtz, Oxford University Press, 1965. - Pearlie Braswell-Tripp (2013), Real Diamonds and Precious Stones of the Bible ISBN 978-1-4797-9644-1 - "In His Image Devotional Bible" ISBN 978-1-4143-3763-0 - Bakhtiar, Lailee McNair, Afghanistan's Blue Treasure Lapis Lazuli, Front Porch Publishing, 2011, ISBN 978-0615573700 - Bariand, Pierre, "Lapis Lazuli", Mineral Digest, Vol 4 Winter 1972. - Bowersox, Gary W.; Chamberlin, Bonita E. (1995). Gemstones of Afghanistan. Tucson, AZ: Geoscience Press. - Herrmann, Georgina, "Lapis Lazuli: The Early Phases of Its Trade", Oxford University Dissertation, 1966. - Korzhinskij, D. S., "Gisements bimetasomatiques de philogophite et de lazurite de l'Archen du pribajkale", Traduction par Mr. Jean Sagarzky-B.R.G.M., 1944. - Lapparent A. F., Bariand, P. et Blaise, J., "Une visite au gisement de lapis lazuli de Sar-e-Sang du Hindu Kouch, Afghanistan," C.R. Somm.S.G.P.p. 30, 1964. - Oldershaw, Cally (2003). Firefly Guide to Gems. Toronto: Firefly Books.. - Wise, Richard W., Secrets of the Gem Trade: The Connoisseur's Guide to Precious Gemstones, 2016 ISBN 9780972822329 - Wyart J. Bariand P, Filippi J., "Le Lapis Lazuli de Sar-e-SAng", Revue de Geographie Physique et de Geologie Dynamique (2) Vol. XIV Pasc. 4 pp. 443–448, Paris, 1972. - Lapis lazuli at Gemstone.org - Documentation from online course produced by University of California at Berkeley - Lapislazuli: Occurrence, Mining and Market Potential of a blue Mineral Pigment - . . 1914. - "Why a Medieval Woman Had Lapis Lazuli Hidden in Her Teeth", The Atlantic, January 2019 - Lapis Lazuli birthstone virtues and story at birthstone.guide
<urn:uuid:2d271f38-77b4-453b-87ed-c0221de3f4b3>
CC-MAIN-2022-49
https://www.wikinone.com/Lapis_lazuli.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710710.91/warc/CC-MAIN-20221129164449-20221129194449-00165.warc.gz
en
0.83445
3,790
3.5
4
With the latest DC Comic character release, Batman v Superman: Dawn of Justice, we naturally want to go back and analyze the history of these superheroes. As a company sensitive and attuned to sound, Superman’s heightened sense of hearing struck a chord with us. So we rewound to 2013’s film, Man of Steel, to learn of Superman’s (played by actor Henry Cavill) character. Before Superman knew he was super, he was just Clark Kent. A boy living on a farm and attending school. It’s in one of his classrooms where we get to see him experience one of his super skills. All of a sudden, he hears everything. Fingers tapping. The clock. His teacher talking. The noises combined are overwhelming and he needs to leave the room. While we don’t know anyone with x-ray vision and Clark Kent didn’t have Autism, it’s scenes like that that give us a glimpse into a day in the life with someone who has a spectrum disorder. Sensory overload comes in many forms. Too much touch. Too much light. Too much sound. The latter is sometimes the most overwhelming because we don’t realize how many places around us carry sound. Soon we are surrounded with a cacophony of sound. Sometimes we think if we turn off the TV and the music, we are turning off all outlets and channels of noise disturbance. But there are hundreds of other noises in existence that can cause a child, teen or adult with autism to experience sensory overload. WHAT IS AUTISM? Autistic people see, hear and feel the world in a different way from other people. A developmental disorder, it delays the milestones typical children hit with ease. There is a wide spectrum of people and no two persons on the spectrum are the same. One Mother shares, when talking about her son, “He has the sensory processing disorder. Eye contact is a big struggle for him. Being in a restaurant is a challenge because of the sound/smells/lighting/even the texture of foods.” WHAT IS SENSORY OVERLOAD? Sensory overload, also referred to as overstimulation, occurs when one or more of the body’s senses experiences over-stimulation from the environment. When it comes to an overdose of noise, this can happen anywhere. School – as we saw with Clark Kent and many autistic children experience on a daily basis. It happens at shopping centers, fairs, movie theaters, large crowds, mass media and technology like video games and TV. Over the years, one mother discovered her son, G’s, biggest obstacle was often the grocery store. He would run away and couldn’t hear [her] calling for him to stop because he had reached maximum sensory overload and words were just not recognizable to him only loud sounds. When it came time to eat or sleep, it had to be very quiet with NO stimulation. And if G wasn’t carefully and immediately removed from a sensory overload environment, he could unintentionally harm himself. HOW CAN YOU HELP? Some autistic individuals have learning disabilities and other conditions. As a result, people need different levels of support. Autistic people may also experience over- or under-sensitivity to sounds, touch, tastes, smells, light or colors. Today, we are exploring over-sensitivity to sound. When someone like G is experiencing a sensory overload situation, they are trapped and it becomes harder to express their emotions; to find a way out of all the noise and confusion. Learning their method of communication will help not only in reactive circumstances, but to be proactive when someone with autism begins to show signs they are uncomfortable. Encourage them; when an individual, especially a child, with autism reacts negatively to overstimulation, they are just as frustrated as you are, if not more so. As always, encourage positive behavior to build up their self-esteem and help them find their safe zone away from the chaotic sounds. View this post on Instagram April is World Austim Month and the theme for 2020 is the Year of Kindness. Creating designated “quiet” spaces in your home can help loved ones cope with sensory overload during self-isolation. #AutismAwareness? .? .? .? #WorldAutismMonth #YearofKindness #Autism #AutismAcceptance #AutismLife #AutismFamily #AutismLove #AutismParents #AutismKids #AutismTeacher Whether it’s a place they can plug in their own music or a reading nook, give them a sense of independence where they can control sound and their senses. HOW CAN THE COW HELP? Autism Awareness and the sense of hearing are passions of ours. To combat this, soundproofing a space can create a safe and comfortable place. A place to call their own. Find out what we use and how we do it here soundproofcow.com or call one of our sound solutions experts to start helping your loved one feel more secure today. Tell them you heard it from the herd.
<urn:uuid:2f610551-0e72-4ad1-b834-898dbb9e24e6>
CC-MAIN-2020-40
https://www.soundproofcow.com/autism-awareness-sensory-overload/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400187354.1/warc/CC-MAIN-20200918061627-20200918091627-00178.warc.gz
en
0.956794
1,055
2.9375
3
The Right Kind of Lessons May 9, 2013 Wednesday was beautiful. The air was cold, the skies were blue, and the sea was calm. Most importantly: no fog. Sei whales seemed to be popping up everywhere. Then I saw it. The classic “V” shaped blow, a North Atlantic right whale. Not our first one of the trip, but the first in a few days. I sighted the blow at about 345° off the bow of the ship, and she was swimming toward us. The frenzy began. Our chief scientist, Allison Henry, grabbed the Canon Digital Camera with the 500 mm fixed zoom lens and began capturing images of the right whale. Remarkably, she could (unofficially) identify the whale through the lens of the camera. It was a female named Columbine. She was not alone. Columbine had a calf with her! The calf swam very close to its mother and seemed to be rolling over on its back, flapping its flippers in the air. The whales don’t seem to be bothered by our large ship being near them. The small boats were not launched in pursuit of Columbine for two reasons. Allison knew that both animals had already been biopsy sampled, so no need to repeat that process. Also, it is not wise to tag and follow a whale that is raising a calf. Allison contributes photos collected in the field to The North Atlantic Right Whale Catalogue that is maintained by the New England Aquarium. The aquarium maintains a searchable public database of right whale photos, sightings, and body descriptions. There is also a quick whale identification activity to practice photo identification of right whales. I was dazzled by the flips and turns of Columbine’s calf. Giving a whale an official name is a complicated process that is the responsibility of The New England Aquarium and The North Atlantic Right Whale Consortium. However, I would like to unofficially name this baby “Arrow”. As we commemorate the 40th anniversary of the Endangered Species Act, take a look at NOAA’s research on one of the nation’s most critically endangered marine species: the North Atlantic right whale. This past May, Teacher at Sea Angela Greene joined NOAA scientists on the NOAA Ship Gordon Gunter for the North Atlantic right whale survey. Greene tells us more about what she learned and what she’s sharing with her students at Tecumseh Middle School in New Carlisle, Why is it important to study right whales? What did you learn about how whale research at sea? Scientists input raw data into a laptop as it is being collected. The laptop is actually connected to the ship’s Global Positioning System (GPS). Coupling the data reported by the observer using the "Big Eyes" with GPS data provides an exact location and time of a whale sighting. This enables the scientist to record the exact position on the planet where a North Atlantic right whale is located. Other data indicate the whale’s behavior at that location, helping the scientists determine mating territories, feeding grounds, and social locations. What were some of the biggest challenges you faced on your cruise? How have you integrated what you learned into your class lessons? One of the most valuable concepts I took away from my experience was seeing the relentless drive of a scientist collecting field data. When I sense passion and rugged determination in my studentsas they collect field data, or even as they finish a simple lab, then I know I have successfully integrated what I learned as a result of being a NOAA Teacher at Sea.
<urn:uuid:749c4eaf-f3d0-430a-b30d-e6bffd177d48>
CC-MAIN-2014-10
http://www.nmfs.noaa.gov/stories/2013/12/12_13_2013tas_right_whale_survey.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999650424/warc/CC-MAIN-20140305060730-00099-ip-10-183-142-35.ec2.internal.warc.gz
en
0.96352
741
3.265625
3
Purpose – The purpose of this paper is to acquaint a wide audience of readers with some of the unique remote sensing and navigation capabilities of animals. Design/methodology/approach – Biomimetic comparison of remote sensors evolved by animals and sensors designed by man. The study and comparison includes thermal infrared sensors used by snakes, echolocation used by bats and dolphins, and navigation methods used by birds. Countermeasures used by prey to avoid capture are also considered. Findings – Some animals have remote sensing and navigation capabilities that are considerably more efficient than those provided by the human body or designed by man. Practical implications – Sensor designers may be encouraged to use the biometic approach in the design of new sensors. Social implications – The paper provides a better understanding of animal behaviour, especially their unique abilities to remotely sense, echolocate and navigate with high accuracy over considerable distances. Originality/value – The paper presents a comparison of remote sensors used by animals with those developed by humans. Remote sensor designers can learn to improve their sensor designs by studying animal sensors within a biomimetic framework. Sensor Review – Emerald Publishing Published: Jan 18, 2013 Keywords: Animals; Birds; Reptiles; Remote sensing; Animal sensors; Snake infrared sensors; Bat echolocation; Dolphin echolocation; Bird navigation; Biomimetics It’s your single place to instantly discover and read the research that matters to you. Enjoy affordable access to over 18 million articles from more than 15,000 peer-reviewed journals. All for just $49/month Query the DeepDyve database, plus search all of PubMed and Google Scholar seamlessly Save any article or search result from DeepDyve, PubMed, and Google Scholar... all in one place. Get unlimited, online access to over 18 million full-text articles from more than 15,000 scientific journals. Read from thousands of the leading scholarly journals from SpringerNature, Wiley-Blackwell, Oxford University Press and more. All the latest content is available, no embargo periods. “Hi guys, I cannot tell you how much I love this resource. Incredible. I really believe you've hit the nail on the head with this site in regards to solving the research-purchase issue.”Daniel C. “Whoa! It’s like Spotify but for academic articles.”@Phil_Robichaud “I must say, @deepdyve is a fabulous solution to the independent researcher's problem of #access to #information.”@deepthiw “My last article couldn't be possible without the platform @deepdyve that makes journal papers cheaper.”@JoseServera
<urn:uuid:cb456a7c-5ef7-4b39-8821-0483c91f4412>
CC-MAIN-2020-45
https://www.deepdyve.com/lp/emerald-publishing/remote-sensing-and-navigation-in-the-animal-world-an-overview-KiUeHoufHb?key=emerald
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894203.73/warc/CC-MAIN-20201027140911-20201027170911-00298.warc.gz
en
0.8927
567
2.796875
3
|Energy as it relates to Poverty Alleviation and Environmental Protection (UNDP, 1998, 36 p.)| Poverty has received scant attention from an energy perspective. This is most remarkable given that energy is central to the satisfaction of basic nutrition and health needs, and that energy services constitute a sizeable share of total household expenditure among the poorest households in developing countries. Energy is not an end in itself, but rather a means to achieve the goal of sustainable human development. Although low energy consumption is not a cause of poverty, the lack of available energy services correlates closely with many poverty indicators. Nearly 2 billion people - about a third of humanity - continue to rely on biomass fuels and traditional technologies for cooking and heating, and about 1.5-2 billion people have no access to electricity. Current approaches to energy are not sustainable and will, in fact, make energy a barrier to socio-economic development, especially for people living in poverty. What is needed now is a major reorientation toward sustainable energy technologies, including renewable energy, energy efficiency, and cleaner conventional fuels. The availability of new energy technologies offers the prospect of low-cost, localized solutions to national energy concerns. This paper examines the importance of energy in addressing poverty eradication and environmental regeneration in light of key elements of the debate, current experiences and appropriate policy instruments. The authors explore energy's relationship to various facets of the poverty-environment nexus, including health issues, economic concerns, social welfare issues, and environmental degradation, and suggest a series of concrete policy measures designed to promote energy services that will lead to poverty eradication and environmental regeneration. Their persuasive argument for sustainable energy is enhanced by a series of examples illustrating strategies that have been successful in improving energy services for people living in poverty. United Nations Development Programme and European Commission
<urn:uuid:9c378f81-1aac-4b9e-b84a-cc91cf9f8e3a>
CC-MAIN-2021-49
http://www.nzdl.org/cgi-bin/library?e=d-00000-00---off-0cdl--00-0----0-10-0---0---0direct-10---4-------0-1l--11-en-50---20-about---00-0-1-00-0-0-11----0-0-&a=d&c=cdl&cl=CL1.176&d=HASH03d88cc378423e2ffcfcdb.3
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358153.33/warc/CC-MAIN-20211127073536-20211127103536-00443.warc.gz
en
0.937083
362
3.109375
3
Simple Definition of proselytize : to try to persuade people to join a religion, cause, or group Full Definition of proselytize 1 : to induce someone to convert to one's faith 2 : to recruit someone to join one's party, institution, or cause : to recruit or convert especially to a new faith, institution, or cause proselytizationplay \ˌprä-s(ə-)lə-tə-ˈzā-shən, ˌprä-sə-ˌlī-tə-\ noun proselytizerplay \ˈprä-s(ə-)lə-ˌtī-zər\ noun Examples of proselytize in a sentence They are a sport-shirted, discomforted lot, pacing, puffing feverishly on cigarettes, perspiring freely and proselytizing furiously. —Nicholas Dawidoff, Sports Illustrated, 19 Aug. 1991 Mormons are urged to use their social contacts with Gentiles to proselytize, by doing such favors as babysitting, running errands, and lending lawnmowers. —Malise Ruthven, Wilson Quarterly, Spring 1991 His prodigious correspondence with twenty-five hundred scientists, politicians, and men of letters … proselytized for his new science of statistics. —Daniel J. Boorstin, The Discoverers, 1983 He uses his position to proselytize for the causes that he supports. <the efforts of early missionaries to proselytize the Native Americans of Minnesota were largely unproductive> Did You Know? Proselytize comes from the noun proselyte (meaning "a new convert"), which comes from the Late Latin noun proselytus. Proselytus means "stranger" or "alien resident," and comes from a similar Greek word (prosēlytos). When proselytize entered English in the 17th century, it had a distinctly religious connotation and meant simply "to recruit religious converts." This meaning is still common, but today one can also proselytize in a broader sense - recruiting converts to one's political party or pet cause, for example. Origin and Etymology of proselytize First Known Use: 1679 Rhymes with proselytize accessorize, acclimatize, actualize, aerobicize, aestheticize, Africanize, allegorize, alphabetize, analogize, anatomize, anesthetize, animalize, annualize, antagonize, anthologize, anticlockwise, apologize, apostatize, apostrophize, arabicize, aromatize, automatize, bureaucratize, cannibalize, capitalize, categorize, catheterize, catholicize, characterize, collectivize, commercialize, commoditize, communalize, computerize, conservatize, containerize, contrariwise, conveyorize, cosmeticize, counterclockwise, criminalize, cross-fertilize, cut down to size, decentralize, decolonize, de-emphasize, de-energize, defeminize, deformalize, deglamorize, dehumanize, deionize, demagnetize, demobilize, democratize, demoralize, denationalize, deodorize, depersonalize, depolarize, depressurize, desensitize, destabilize, destigmatize, detribalize, devitalize, diabolize, digitalize, disenfranchise, disorganize, economize, emblematize, emotionalize, epitomize, epoxidize, eroticize, eternalize, evangelize, extemporize, externalize, familiarize, fanaticize, fictionalize, floor exercise, fool's paradise, formularize, free enterprise, gelatinize, generalize, geologize, Hispanicize, historicize, homogenize, hospitalize, hypothesize, idealize, illegalize, immobilize, immortalize, impersonalize, Indianize, indigenize, infantilize, initialize, internalize, italicize, legitimize, liberalize, literalize, lobotomize, lysogenize, macadamize, marginalize, metabolize, metastasize, militarize, mineralize, monopolize, mythologize, nationalize, naturalize, parenthesize, philosophize, poeticize, politicize, popularize, prioritize, radicalize, reorganize, revitalize, ritualize, romanticize, secularize, self-fertilize, sensualize, sexualize, sovietize, subjectivize, suburbanize, subvocalize, systematize, temporalize, theologize, traditionalize, trivialize, ventriloquize, visualize Seen and Heard What made you want to look up proselytize? Please tell us where you read or heard it (including the quote, if possible).
<urn:uuid:78b0eded-a71e-4118-bef3-7a87bbafaa10>
CC-MAIN-2016-30
http://www.merriam-webster.com/dictionary/proselytize
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257822172.7/warc/CC-MAIN-20160723071022-00117-ip-10-185-27-174.ec2.internal.warc.gz
en
0.788445
1,072
2.59375
3
It’s the 5th December1944 and SS-Obersturmbannführer (lieutenant Colonel) Otto Skorzeny desperately tries to gather men and equipment for the offensive due to start just a few days later. Skorzeny was famous for his daring rescue of Mussolini and perhaps more so his special commando units employed in operation ‘Greif’ part of the ‘Wacht em Rhein’ counter offensive, later known as the ‘Battle of the bulge’ Lacking real American equipment the resourceful German units turned to camouflage. By painting & welding on extra plates, they put together 5 panthers designed to have the general similarity to the American M10. These Panthers were designated B5-10 and sent to join Kampfgruppe X (one of the 3 Kampfgruppe’s X,Y,Z that made up Otto Skorzeny Panzer Brigade 150, Y received five Stug III G’s with Saukopf mantlets painted as vehicles belonging to the US army 81st Tank Battalion) at their muster point near Münstereifel on the 14th. This Ertzats Panther (M10) is perfect for representing Kampfgruppe X’s drive toward the Ambléve at Malmédy!
<urn:uuid:6946392f-398c-430e-bce0-ec41774e2702>
CC-MAIN-2021-39
https://grimdice.co.uk/products/9fc9de00-5ff3-11ea-8598-69349bb1d17a
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056711.62/warc/CC-MAIN-20210919035453-20210919065453-00149.warc.gz
en
0.958425
282
2.546875
3
Corporation is a type of business which is formally registered as a public owned company it is recognized as a sperate entity from its owners. The three main disadvantages of sole proprietorships and partnerships are: The popularity of corporations is due to following advantages: - The liability of the owners towards the creditors is limited to their investment in the company. This means that in case of liquidation of the company, if the company's assets are insufficient to meet the liability, nothing is required to be contributed by the owners. Only the owners' contribution is at stake rather than their personal assets. - The corporation is considered a legal person with perpetual existence. It exists until it is liquidated and death or change in ownership has no effect on the corporation. - Additional capital can be raised easily through stock markets, etc. - The ownership is represented by the number of share certificates held by a person, and this makes the transfer of ownership very easy. Following are the disadvantages of a coporation: - Establishing a corporation is a complex process and requires registration with the central regulatory authority and listing on a stock exchange which required fulfillment of certain requirements related to the amount of capital, number of directors, etc. - Normally the corporations have a large number of shareholders; they delegate the governance function to a body of persons called board of directors. The board of directors hires management to look after the day to day affairs of the corporation. The management is an agent and the owners are principal. It is quite possible that the management may act to further their own interests rather than the interest of the owners of the corporation. When this happens it is called an agency problem. - In case of corporations there is double taxation. First of all the corporate income is taxed at a flat rate and then the dividends paid to the shareholders is taxed. Written by Obaidullah Jan, ACA, CFA
<urn:uuid:a54cff1d-5b17-4f00-882f-c15253b4c331>
CC-MAIN-2014-42
http://accountingexplained.com/misc/forms-of-business/corporation
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637905590.45/warc/CC-MAIN-20141030025825-00204-ip-10-16-133-185.ec2.internal.warc.gz
en
0.967984
386
3.265625
3
Diseases and Conditions Dyshidrosis, also known as dyshidrotic eczema or pompholyx, is a skin condition in which very small, fluid-filled blisters appear on the palms of your hands and the sides of your fingers. The soles of your feet also can be affected. The blisters that occur in dyshidrosis generally last around three weeks and cause intense itching. Once the blisters of dyshidrosis dry, your skin may appear scaly. The blisters typically recur, sometimes before your skin heals completely from the previous blisters. Treatment for dyshidrosis most often includes creams or ointments that you rub on the affected skin. In severe cases, your doctor may suggest corticosteroid pills, such as prednisone, or injections.
<urn:uuid:37bd9a66-8da4-42b4-9e4a-b5044477ef11>
CC-MAIN-2018-26
https://www.mymosaiclifecare.org/health-library/diseases-and-conditions/d/dyshidrosis/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861981.50/warc/CC-MAIN-20180619080121-20180619100121-00384.warc.gz
en
0.934575
170
2.84375
3
Put your fangs up Believe it or not, the fang blenny defends itself from attackers with a venomous bite that leaves them disabled. Scientists have just discovered a huge secret that resides in the tiny fish. The venom, which is often compared to heroin, works like modern opioids, the same that are found in prescribed painkillers. The bite causes dizziness because it acts on their opioid receptors. The venom inhibits pain instead of causing it. Usually, defensive fish venom causes excruciating pain. It’s why scientists are dubbing the morphine-like sting entirely novel. You can find the fang blenny vampire teeth on the lower jaw. Ouch Other predatory sea creatures stray far away with fishes that are infected with the venom. They are petrified of being harmed, proving how powerful that one little bite is. The miniature aggressor uses its teeth to find only the best real estate on their section of the coral reef. Napoleon complex much? What’s their importance? Ultimately, scientists would like to synthesize the venom of the fang blenny, for pain-killers. Why you ask? Simple, opioids carry a negative association. It usually leads to addiction and risks of overdose. Imagine doing away with the side effects. Where is the fang blenny? The fang blenny can be found in the Great Barrier Reef or even in your very own fish tank. As bottom-feeders, they like to live off reefs and are, unfortunately, under threat because of climate change. A study conducted at the University of Queensland found that rats injected with the venom had a significant blood pressure decrease. It was a drastic 37 percent. Associate Professor Bryan Fry says the study should encourage others to protect nature. If the Great Barrier Reef is lost, the world could lose the possibility of creating the next amazing pain-killing drug. - Not all fang blennies are venomous - They can only grow 10 centimeters - Popular aquarium fish - Poison-fang blennies - Sabre-tooth blennies - Their diet consist of algal filaments, fish eggs, bryozoan stalks, and coral mucus The small vampire fish will be making a big change!
<urn:uuid:f1fb700f-1328-4905-b8e8-a6d9714b0442>
CC-MAIN-2018-05
http://www.ripleys.com/weird-news/fang-blenny/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887054.15/warc/CC-MAIN-20180118012249-20180118032249-00348.warc.gz
en
0.921244
466
3.34375
3
Little known facts about February February is the shortest month of the year, but many people have no idea why that is. February is the only month to have fewer than 30 days, but there is no scientific reason behind that distinction, though there have been various changes to the calendar throughout the centuries, and eventually February became what it is today. Julius Caesar was responsible for tackling calendar problems when he was in power. He wished to make the calendar solar-based, like the one Egyptians used, instead of the older lunar-based calendar. This led to the creation of the Julian calendar. Ten days were added to the calendar year in various months, and February was increased every four years (leap year) to 29 days to coordinate the calendar year to the solar cycle of roughly 365.2425 days. February remains the shortest month of the year. Through the years there has been no widespread attempt to reorganize the calendar once more to even out the months and give extra time to February. As a result of the shorter number of days, February has some unique attributes. In common years, February can pass without a single full moon. The next time this will happen is in 2018. Once every six years, February is the only month that has four, full seven-day weeks. February starts on the same day of the week as March and November in common years, and on the same day of the week as August on leap years. February ends on the same day of the week as October every year. In leap years, it is the only month that begins and ends on the same weekday. People born on a leap year technically celebrate their birthday only once every four years, but most observe it on the 28th. Celebrities born on February 29 include Tony Robbins, Antonio Sabato, Jr., Mervyn Warren, and Dennis Farina. Despite its status as the shortest month, February is packed with many events, including Valentine’s Day and Groundhog’s Day. Americans celebrate the birth of two presidents in February, as well as Black History Month. Mexicans celebrate Flag Day in February, while residents of St. Lucia celebrate their Independence Day. February is also a time for families, especially in Canada, where Family Day is celebrated on the third Monday of the month in many provinces. February is also an important month for sports fans, as two teams will face each other in the Super Bowl on the first Sunday of February. No one really knows for certain why February was relegated to the shortest month. However, with so much trivia and special events surrounding the month, it is still a special time of year.
<urn:uuid:833fd2d9-1a24-45c4-994d-c4f5425a5000>
CC-MAIN-2014-49
http://www.pioneertribune.com/news/2014-02-20/Lifestyles/Little_known_facts_about_February.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009271.61/warc/CC-MAIN-20141125155649-00058-ip-10-235-23-156.ec2.internal.warc.gz
en
0.985141
537
2.96875
3
The ability to create VLANs and establish multiple networks on a switch is useless if you cannot allow the separate VLANs to communicate with each other. For separate VLANs to communicate you need to have routing, you accomplish this by adding a router or a layer 3 switch to the network. The Cisco CCNA curriculum expects you to know how to configure inter-vlan routing using a router connected to a switch through a trunked link. Configuring Layer 3 switching is a CCNP topic and not expected in the CCNA. To configure a router for inter-vlan routing the router’s ethernet port needs to be converted to a trunked link. As a trunk, multiple VLANs (networks) can travel across the one ethernet port. To do this the ethernet port needs to use sub-interfaces in order to become the gateway for multiple networks. The sub-interfaces also need to have the 802.1Q trunking protocol enabled and the VLAN ID or number specified in the configuration. When multiple VLANs (networks) can communicate with the router over one trunked link the configuration is called “Router on a Stick.” In the video tutorials, below I cover the entire process of configuring VLANs, switchports and a trunk on a switch, and inter-vlan routing on a router, using Cisco’s Packet Tracer program to simulate a real network environment. In part 1, I discuss the need for VLANs and Inter-VLAN routing in a network If you want to follow along in Packet Tracer with the parts 2 & 3. Click here to download the start file: inter-vlan-routing-start.zip In part 2, I lay out the “Router on a Stick” topology and begin configuring the switch for VLANs In part 3, I configure sub-interfaces, 802.1Q encapsulation with VLAN IDs, and the native VLAN on the router In this video, I setup inter-VLAN routing by configuring the switch VLANs, switchports, and trunk, then I configure the router the subinterfaces on the router with IP addresses and the 802.1Q protocol. VLANs – A switches is used to set up a local area network (LAN). A VLAN stands for a virtual local area network. By default, all of the ports on a Cisco switch are part of the same default VLAN (VLAN1) and therefore the same network. A VLAN is a network and a network is a broadcast domain. If you configure various switch ports for separate VLANs, then the devices on those ports will belong to separate VLANs and therefore, will be segmented into separate broadcast domains and networks. This is effectively like dividing a switch into multiple switches. This is cost effective, because instead of having multiple switches, each for a different network, you can have one switch configured for multiple VLANs and you can assign the ports on that switch to belong to whatever VLAN you need the host to belong to. Data VLAN – A data VLAN carries only user data not management data, control data or voice data. Default VLAN – On a Cisco switch the default VLAN is VLAN1. This means that by default, when a Cisco switch boots up for the first time all the ports are automatically assigned to the default VLAN, VLAN1. You cannot delete or rename VLAN1 but you can assign the ports on the switch to a different VLAN. It is considered best practice to make all of the user ports on the switch belong to a different default VLAN, one other than VLAN1. In this way, control data such as CDP and STP (spanning tree protocol) which are by default carried on VLAN1 would be on a separate VLAN from user data. Native VLAN – The native VLAN, if not explicitly configured, will default to the default VLAN, (VLAN1). The Native VLAN is configured for an 802.1Q Trunk port. 802.1Q trunks carry traffic from multiple VLANs by tagging the traffic with VLAN identifiers (Tagged Traffic) which identifies which packets are associated with which VLANs, and they can also carry non VLAN traffic from legacy switches or non 802.1Q compliant switches (Untagged Traffic). The switch will place untagged traffic on the Native VLAN by using a PVID identifier. Native VLAN traffic is not tagged by the switch. It is a best practice to configure the Native VLAN to be different than VLAN1 and to configure it on both ends of the trunk. Management VLAN – The management VLAN is any VLAN you configure to allow a host to connect to the switch and remotely manage it. The management VLAN will need to be configured with an IP address and subnet mask to allow a manager to connect to the switch by either a web interface (HTTP), Telnet, SSH, or SNMP. Trunks – If you have a switch that has ports variously configured on four different VLANs, then that switch has four different networks on it. When you connect that switch to a router or to another switch you will need four ethernet connections or links, one for each VLAN/network. A more cost effective way to connect a switch with multiple VLANs to a router or switch would be to configure a Trunk. A Trunk is a special kind of port configuration which allows multiple VLANs to travel over one link. This way multiple networks can travel over one trunk instead of wasting valuable ports to connect from switch to switch or switch to router. A Cisco trunk by default uses the 802.1Q protocol. The 802.1Q protocol places and strips VLAN tags on packets to identify which VLAN they belong to. switch#show interfaces trunk switch(config)#vlan <vlan number> switch(config-vlan)#name <vlan name> switch(config-if)#switchport mode access switch(config-if)#switchport access vlan <1-4096> switch(config-if)#switchport mode trunk switch(config-if)#switchport trunk allowed vlan <1-1005> switch(config-if)#switchport trunk native vlan <1-1005> In the video tutorials below I demonstrate how to configure VLANs and Trunks on a Cisco switch using Packet Tracer.
<urn:uuid:0b9b36c7-2dd5-45c6-b13b-669692c66b91>
CC-MAIN-2022-05
http://danscourses.com/category/trunk/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304515.74/warc/CC-MAIN-20220124054039-20220124084039-00533.warc.gz
en
0.832395
1,394
3.15625
3
17 Nov The Emotional Starting Point: Access To Health Care When you read about the barriers to health care access, the usual suspects are: Lack of access to a health care provider, lack of insurance, and financial burden of health care cost. Other research also points to social and cultural elements like language and health literacy. However, very little research explores the emotional dimensions that impact access to health care. Our analytical thinking has brought about unforeseen advances in science, health and technology. And yet, our intellectual prowess has not successfully cracked the systemic social problems we face in our society. The success of the scientific approach reinforces the story that we human beings are thinking creatures that feel. Yet, as neuroscience (Jill Bolte Taylor – My Stroke of Insight) and behavioral economics (Dan Ariely – Irrationally Yours) show us, we are feeling, irrational creatures that think. A helpful metaphor to help us see the relationship between our thinking and feeling aspects is to imagine a person riding an elephant, where the rider represents the thinking element and the elephant stands in for our emotional states (This metaphor was originally, described by Jonathan Haidt’s, a professor at NYU, and then expanded upon by Chip and Dan Heath in their insightful book Switch: How to Change When Change is Hard ). Behavioral change requires engaging both the rider (thinking) and the elephant (emotions). And yet, most solutions to solving access to health care seem to be speaking only to the rider. While it is important to direct the rider, we must motivate the elephant. Hope, fear, pride, shame, anger, and others, are emotions that can impact whether we seek help, what kind of help we seek, and how we communicate our health care needs. We need to engage emotions if we want to support people in accessing health care. Knowing where the services are, and how to get insurance work only if we are able to engage people at the emotional level; this is especially true for communities that historically have been disenfranchised. That is why we are seeing great success in the role of “promotoras," like the ones being used in Latino Health Access, and the role of patient navigators. These “promotoras” and other patient navigators help build trust and engage the emotional elements that prevent people from accessing services. By starting with the emotions and building empathy, we are able to “…engage how culture, racism, and history influence initiatives and their evaluation.” - Nayeli Y Chavez-Dueñas & Hector Y. Adames. In her book, Meaningful: The story of ideas that fly, Bernadette Jiwa, re-imagines Maslow’s Hierarchy of needs from the perspective as to what customers would want from a product and services. At the base of the pyramid you find things like “Product, service, platform, access” (My italics). In the next level up you have “functionality, equality, experience”, that is followed by “Relevance, responsiveness”, and at the very top you have “Empathy”. When we think about access to health care, we need to think about the barriers in terms of infrastructure and cost, and we must also listen to the emotions embedded in the stories we listen for the people we want to help access health care. Methodologies like human-centered design and social labs also have a lot to offer to this emotional dimension. Human-centered design starts with the emotions. The needs of the user emerge as we listen empathically to them. The emotions that come out of this process are noted and seen as gold nuggets rich with valuable information. The emotions are not some afterthought, but rather a starting point. There are of course other considerations, like usability and viability, but the design process starts with empathic listening and emotions. Social labs, a new approach that looks to tackle complex challenges over time with diverse stakeholders, takes a systemic, experimental approach to testing solutions that emerge. This approach is being used to help change the user experience when visiting a doctor in Flip the Clinic; however, there is a great opportunity to use this approach in prevention and increasing access to health care. So how might we support each other in keeping in mind the emotional elements that prevent access to health care? How might we support each other in listening for the powerful insights that can emerge when we pay attention to our emotions and the emotions of others? What emotions does this piece raise for you and what meaning do you make of it?
<urn:uuid:ef25fec5-4e96-41ef-b582-eb9f4b3f6353>
CC-MAIN-2020-16
https://blog.centerforinnovation.mayo.edu/2015/11/17/the-emotional-starting-point-access-to-health-care/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506959.34/warc/CC-MAIN-20200402111815-20200402141815-00370.warc.gz
en
0.950355
934
2.859375
3
Often, youth are on their own for short periods of time, perhaps after school, before parents come home from work or at shopping complexes such as the local mall. Stay Safe! is a new course designed for youth aged 9 to 13 years, in order to provide skills and knowledge to increase their confidence in staying safe on their own or within their community. The program offers age-appropriate first aid knowledge and skills to reduce injury to self or others, should an emergency occur. Red Cross First Aid Instructor with extensive medical background Minimum 9 years of age (or completion of Grade 3); for tweens up to age 13. - The importance of responsibility and respect while being accountable for yourself - The importance of setting and following safety rules when on your own - How to stay safe at home and within the community - How to prepare for, recognize and respond to unexpected situations (e.g., inclement weather, strangers, and unanticipated visits) - Basic first aid skills Stay Safe! Workbook To bring: Nut free snack, lunch and water bottle.
<urn:uuid:c74bff3a-dee0-4e5e-a13f-335f1a7c32f8>
CC-MAIN-2018-43
https://nationalcapitalfirstaid.com/product/stay-safe/
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509996.54/warc/CC-MAIN-20181016030831-20181016052331-00360.warc.gz
en
0.948931
219
3.296875
3
It is hard to overstate the importance of the Supreme Court’s forthcoming decision in United States v. Windsor. At issue is the part of the Defense of Marriage Act that defines “spouse,” and “marriage,” for all federal purposes, to exclude same-sex couples. According to the solicitor general, there are 1,138 federal laws and programs affected by this definition. As a result of DOMA, same-sex couples legally married under their own state’s laws are nonetheless denied benefits otherwise afforded to married couples under federal employment laws, Social Security laws, tax laws, immigration laws and myriad other programs. It is a simple as this: As long as DOMA is in effect, no gay couple anywhere in this country is truly married. If a gay couple is deemed not to be married for more than 1,000 purposes governed by federal law, it’s hard to say that anything approaching marriage equality exists anywhere in the country, no matter how many states allow same-sex couples to marry. I wrote earlier that when DOMA was enacted in 1996, “no one thought it was conceivable that the Supreme Court would declare it unconstitutional. “ Emily, you responded with a smattering of counterexamples, but, as you recognize, even those few statements were at most expressions of a desire that the courts should strike down DOMA, not predictions that such a result was at all likely at the time. At a recent forum, a student asked me if anyone if the Clinton Justice Department argued at the time Congress considered DOMA that the proposed legislation was unconstitutional. The short answer is no. (I was at that time head of the Office of Legal Counsel in the Justice Department.) As is usually the case, DoJ submitted to Congress a statement that included a reference to the act’s constitutionality. That particular comment, however, was carefully worded to avoid opining that the Justice Department itself believed DOMA was constitutional, stating merely “The Department of Justice believes that H.R. 3396 would be sustained as constitutional if challenged in Court.” And, of course, that was a correct expectation under what was then the controlling 1986 precedent of Bowers v. Hardwick, which held that states were constitutionally free to make homosexual intimacy a felony. As long as states could criminalize homosexual conduct, it necessarily followed that they could decline to allow same-sex couples to marry. Lawrence v. Texas changed everything. Decided in 2003, Lawrence overruled Bowers and fundamentally altered the landscape for governmental incursions on individual liberty of gays and lesbians. In his concurring opinion in Bowers, Chief Justice Warren Burger had written, "To hold that the act of homosexual sodomy is somehow protected as a fundamental right would be to cast aside millennia of moral teaching." Lawrence, however, repudiated the notion that moral disapproval alone could justify a government restriction on liberty. So now, 17 years after DOMA was enacted, the belief is widespread that the court is on the verge of holding DOMA unconstitutional. Indeed, Solicitor General Donald Verrilli Jr. (correctly in my view) even declined to defend it the Supreme Court. (A group of House Republicans retained its own lawyer, Paul Clement, to argue in defense of DOMA .) The solicitor general had to address first whether the courts should now view with “heightened scrutiny” the government’s rationale for laws discriminating on the basis of sexual orientation. To argue against judicial scrutiny, the SG would have had to tell the court either that there has been no meaningful discrimination against people who are gay, or that discrimination on the basis for sexual orientation is reasonable because being gay affects a person’s ability to contribute to society. President Obama does not believe either of those propositions and his Justice Department properly decided not to urge them on the court. Once it is determined that judges should view laws that discriminate based on sexual preference with heightened scrutiny—in other words, that they should approach them more skeptically—it becomes extremely difficult to defend DOMA. With Lawrence having taken moral disapproval off the table, the task becomes nearly impossible, even for the skillful lawyers arguing the anti-gay marriage cases. (Their burden reminded me of that facing the French intellectual who undertook to write a 300-page novel without using the letter “e”. He did it, sort of, but I’m sure it wasn’t any good.) The assumption that the Supreme Court may be poised to strike down DOMA is based not only on the shift from Bowers to Lawrence, but by changes in the larger culture. When DOMA was enacted, not one single-sex couple had ever been married in America. Now such marriages seem commonplace. At work is the enormous effect of what the late law Professor Charles L. Black, Jr. called the “normative power of the actual.” Another major case pending is Shelby County v. Holder, in which the court is considering whether to declare unconstitutional a key provision of the Voting Rights Act, called Section 5, which requires the Old South, and some other scattered cities and towns, to get approval from a federal court or the Justice Department before they can make any changes in their election laws. Are you a hypocrite if you applaud the court if it invalidates the Defense of Marriage Act and then complain if it does the same to the Voting Rights Act? I don’t believe so. DOMA should be invalidated not out of respect for state autonomy, but because it imposes a thousand legal disadvantages on married couples who are gay without any legitimate justification for this deprivation of individual rights. Section 5 of the Voting Rights Act admittedly intrudes on state autonomy, but it does so pursuant to a constitutional amendment that was intended to empower Congress to do just that. The 15th Amendment proclaimed after the Civil War that “the right to vote shall not be denied or abridged … by any State on account of race” and provides that “The Congress shall have power to enforce this article by appropriate legislation.” Whether Section 5 is still necessary, and whether the formula for determining which states and localities it covers is sufficiently up-to-date, are difficult policy questions. But, to use the words of the great Chief Justice John Marshall in 1819, in McCulloch v. Maryland, if this be a “doubtful question, “it is one in “which the great principles of liberty are not concerned, but the respective powers of those who are equally the representatives of the people, are to be adjusted.” Such a question is one that should be resolved by the only institution of the federal government expressly mentioned in the 15th Amendment: Congress.
<urn:uuid:86fc12e7-df52-44c8-8724-9bdf75a6b91d>
CC-MAIN-2016-07
http://www.slate.com/articles/news_and_politics/the_breakfast_table/features/2013/supreme_court_2013/doma_and_the_voting_rights_act_the_supreme_court_can_strike_down_one_and.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701168076.20/warc/CC-MAIN-20160205193928-00227-ip-10-236-182-209.ec2.internal.warc.gz
en
0.966425
1,384
2.609375
3
On August 15, the citizens of South Korea celebrate the National Liberation Day of Korea, a day that commemorates the independence of Korea from Japan. The day is marked with high spirits as citizens take to the streets, decorate buildings and spaces with the Korean flag, hold ceremonies both publicly and privately, and remember the fight under an oppressive rule. The word for word for the day of independence in Korean is 광복절, or Gwangbokjeol, which translates to “the restoration of light day.” A beautifully accurate word, August 15, 1945, signaled the end of a long reign of darkness for Korea. Japan and Korea have had tension for centuries now, their relationship characterized by menace and political schemes. The Empire of Japan annexed Korea in 1910 and imposed strict regulations on the nation until 1945 when Japan surrendered to Allied forces at the end of World War II. During this time, the people of Korea experienced a total erasure of their culture. With years upon years of turmoil between the nations building up, Japan believed that the only way to exert full control over Korea was to rid the country of its culture, replacing it with Japanese traditions and customs. There were a couple of different ways that Japan enforced policies for Koreans to uphold the Japanese way of life: The cultural genocide didn’t stop with school, the arts, and the military either. Other efforts to force assimilation included enforcing Japanese names, destroying historical Korean palaces, and forcing worship of Japanese deities. The icing on the cake might have been how the oppressive government preserved some Korean cultural monuments as propaganda to show other nations the peace that they’ve kept between the two nations. Any organized rebellions, protests, and uprisings against these oppressive measures were instantly quelled by Japanese authorities. One major event of rebellion was Samil Day, which occurred on March 1, 1919 (more on that below). Since this first important movement towards independence, more than 1,500 protests broke out, but it wouldn’t be until the end of World War II that Japanese domination in Korea would cease. To this day, South Korea still endures the consequences of Japan’s ruthless occupation. Questions of whether or not to persecute those that had supported Japanese laws still plague Korea. In fact, these horrific policies of assimilation and cultural genocide that occurred in Korea are felt so presently that current events are wrapped up in the conflicts as well. During the 2018 Olympic Games, South Koreans justly demanded an apology from a commentator who stated that Korea’s transformation into a “global powerhouse” was due to Japanese intervention. Regardless of how tense relations may be, what remains is that the resilient people of Korea not only remember the dark days of Japanese occupation with solemnity, but also as a moment of great hope every year on August 15. South Korea celebrates the day mainly with flags, activities, and an official ceremony. The national flag of South Korea is hung all over the country — on streetlights, public buildings, homes, and community spaces. Usually, there are flags from different countries around the world adorning the roads around the Jamsil area of Seoul, but these are taken down and replaced by the South Korean flag in anticipation of the day of independence. While some firework displays are held on Gwangbokjeol, a big show is mostly featured on National Foundation Day in October (more below). The official ceremony by the South Korean government is the principal event of independence day on August 15. This ceremony features a song about the hardships and hope during the 40 years of Japanese occupation. South Korea also has a few other holidays around national pride and important events of the nation that are similar to its day of independence. We’ll go over the other two, Samil Day and National Foundation Day, below for clarity: South Korea celebrates Samil Day on March 1st, which remembers the pivotal uprising in 1919 that called for independence from Japan. On that day, the people of Korea issued a proclamation, and over a thousand demonstrations occurred in various different cities across the country. The protests were met with brutal consequences from Japanese forces and the day aims to honor those lives lost during this historical event. In contrast to the National Liberation Day of Korea, National Foundation Day in South Korea celebrates the beginnings of Korean history and focuses on Korea’s creation myth. According to the creation myth, the God-king Dangun established the first Korean kingdom in 2333 BC. This holiday features a fantastic fireworks display throughout all of South Korea, the more popular of which is in the Yeouido Han River Park in Seoul. Subscribe to our Newsletter Weekly travel insights and ideas delivered to your inbox
<urn:uuid:dee2c088-5016-4167-85a5-900aca806b9f>
CC-MAIN-2023-40
https://www.contexttravel.com/stories/articles/japanese-occupation-of-korea-national-liberation-day
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00506.warc.gz
en
0.959147
973
4.15625
4
The correct use of myriad and plethora Most people agree that a myriad is a lot, but there’s less agreement about how to use myriad correctly. On this week’s edition of That’s What They Say, Host Rina Miller and University of Michigan English Professor Anne Curzan examine three words that mean a lot—myriad, plethora and ton. When choosing between myriad possibilities and a myriad of possibilities, which phrase is correct? “Myriad of is older than myriad with the noun,” Curzan explains. “Myriad comes into English in the 16th century when the word originally means 10,000, a specific number.” The word changed from referring to 10,000 of something, to meaning a countless number of something. When myriad first appeared in English, it was always plural and followed by of, such as many myriads of men. Then, in 1609, the singular form of myriad was first used, followed again by of. This allowed for phrases like a myriad of bubbles. Finally, in the 18th century, the noun was first dropped from the phrase. At that time, the saying myriad beauties was then considered correct. Today, both phrases are used. Although myriad of is a bit more common than myriad followed by a noun, either expression can be used. How about plethora, another word that means a lot? When plethora was introduced to the English language, it meant an overabundance of things. First plethora referred to an overabundance of the humors or of blood, then it signified a dangerous or unwanted excess. Today, plethora is not only used negatively. If you are happy to have options, you may say you have a plethora of choices. Although this may be ahistorical, it is not necessarily incorrect. The word ton is similar. Ton technically specifies 2,000 pounds, but it is now used as another synonym for a lot. How do you use these words? Let us know by leaving a plethora of comments on our website or our Facebook page. -Clare Toeniskoetter, Michigan Radio Newsroom
<urn:uuid:de7a6e87-011e-46e2-9117-7fb539a43101>
CC-MAIN-2016-18
http://michiganradio.org/post/correct-use-myriad-and-plethora
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860121423.81/warc/CC-MAIN-20160428161521-00089-ip-10-239-7-51.ec2.internal.warc.gz
en
0.947588
444
3.4375
3
When conducting a study to determine the agreement between two methods of measurement, it is important to determine an appropriate sample size in order to ensure accurate and reliable results. While determining the sample size may seem like a daunting task, the process can be broken down into a few simple steps. Step 1: Determine the Level of Agreement The level of agreement refers to the level of similarity between the results obtained from the two methods of measurement. In order to determine an appropriate sample size, it is important to first determine the level of agreement that is considered significant. This is typically determined by the researchers based on the context of the study. Step 2: Determine the Error Rate The error rate refers to the likelihood that the results obtained from the two methods of measurement will differ even when there is no actual difference between the two. In order to determine an appropriate sample size, it is important to first determine the expected error rate. This can be based on previous research in the field or can be estimated based on the context of the study. Step 3: Use a Sample Size Calculator Once the level of agreement and error rate have been determined, a sample size calculator can be used to determine an appropriate sample size. There are a number of sample size calculators available online that are specifically designed for studies of agreement between two methods of measurement. Step 4: Consider Other Factors While the sample size calculator will provide a recommended sample size based on the level of agreement and error rate, it is important to also consider other factors when determining the final sample size. This can include factors such as the complexity of the measurement methods, the availability of participants, and the resources available for conducting the study. In conclusion, determining an appropriate sample size for a study of agreement between two methods of measurement requires careful consideration of the level of agreement, error rate, and other factors. By following these steps, researchers can ensure that their study is properly designed to provide accurate and reliable results.
<urn:uuid:f6706bbf-9c45-42b7-8889-afcea6981669>
CC-MAIN-2024-10
https://shadhas-jewelry-stones.com/index.php/2023/09/22/how-can-i-decide-the-sample-size-for-a-study-of-agreement-between-two-methods-of-measurement/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475311.93/warc/CC-MAIN-20240301125520-20240301155520-00273.warc.gz
en
0.944842
397
3.46875
3
Some women experience menstrual cycle problems when they first start to menstruate or develop these problems later on in life. While for some women, painful periods, heavier than normal bleeding, or irregular menstrual cycles could be normal, for others these symptoms could be the warning that something is wrong. What constitutes menstrual cycle problems may vary greatly from woman to woman. While some women menstrual for only three days each cycle, others may have a 7 day period. While some women have a 25 day cycle others may have a much longer one. The point is that they may be normal for each of these women, a menstrual cycle problem can be said to exist when there is any change noticed and so it is important to keep track of one’s own cycle. Common menstrual cycle problems that women experience are: Premenstrual Stress (PMS) These are a group of symptoms that may be felt up to 14 days before the period, ranging from anxiety and depression to tiredness, bloating, joint pain and even hot flashes. For most women the symptoms may be mild but in many cases intervention may be required. Lighter or missing period If you don’t get a period, firstly rule out a pregnancy, which is the most common cause of missing a period for women in their 20’s and 30’s. For women in their 30’s it could also be premature ovarian failure that causes one to miss a period. There could be underlying problems such as a pituitary gland disorder, a hypothalamus disorder, polycystic ovarian syndrome or hormonal balances that may cause periods to become lighter or cause an absence of periods. Extreme caloric restriction, eating disorders or over exercising can also cause this menstrual problem. Sometimes beginning on certain hormone based contraceptives can also make a period light. A heavier than normal period A heavier than normal monthly flow could also be problematic and could be caused by uterine fibroids, an ectopic pregnancy, a miscarriage, certain medications (or change in contraception), cancer in the reproductive organs, disorders relating to blood clotting, and so on. Bleeding between periods This is one of the menstrual cycle problems that should not be ignored. There could be serious underlying causes for this such as cancer or an ectopic pregnancy or a miscarriage. In some cases it could be due to an infection in the pelvic region or infection of the reproductive organs. It could also happen due to soreness or inflammation in the pelvic region. However in some cases it could be caused by something as simple as forgetting to take one’s birth control pill as well rather than any problem of the menstrual cycle. Slightly or moderately painful periods are common – when a woman has her period, the uterus contracts to shed its lining and this causes the painful cramping characteristic of a period. However excessive pain that is accompanied by other symptoms such as headache, nausea, diarrhea and so on, could mean other problems such as fibroids, endometriosis, and so on and should be treated as one of the menstrual cycle problems not to be ignored.
<urn:uuid:1d513edb-96ae-4bc7-9415-18c9f3bb3f34>
CC-MAIN-2023-06
https://www.womenhealthzone.com/womens-reproductive-health/menstrual-cycle/common-menstrual-cycle-problems/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499468.22/warc/CC-MAIN-20230127231443-20230128021443-00776.warc.gz
en
0.945899
640
3.1875
3
What do you tell yourself (and what people tell you) when you’re anxious, sad, or nervous? “Just breathe”. It’s like a mantra, something you keep repeating to yourself until you get a grip and calm down, but there is much more than “buying time” with this. We usually don’t pay too much attention to breathing, even though it’s something we do every day and keeps us alive. Even though it’s a basic activity, breathing can be done in a number of ways, and some of these might help you cope with stress. Improve your memory Scientists have discovered that your breathing rhythm creates electrical activity in the brain, which, in turn, affects how well you remember things. You remember things differently when you inhale and exhale, as well as when you breathe through your mouth or your nose. It seems that we remember objects and faces better when we see them while inhaling, but the effect is lost when we breathe in through the mouth. So next time you stress over not being able to remember something, try to put it to memory while inhaling deeply through your nose, and you’ll commit it to memory faster. Help with anxiety That breathing rhythm and techniques greatly affect our brain is not a speculation, and it can also have a positive impact on people who struggle with anxiety. When we control our breathing, we stimulate the vagus nerve that runs from the very base of our brain all the way to our abdomen, thus triggering the parasympathetic nervous system. As a result, our heart rates become lower, and our nervous system stops being overstimulated. One of the roles of the vagus nerve is to increase our focus and calmness by releasing a neurotransmitter called acetylcholine, and the more of it we have, the less anxiety we get to experience. Lower stress levels Our brains have been programmed to always be alert and to warn us of any threats and dangers in our surroundings, and sometimes our brains are just too good at this. If our brain recognizes a lot of things as potential threats (be it physical or physiological), we feel like we’re constantly waiting for something very bad to happen. Instead of giving in and allowing our stress levels to induce a panic attack, we can use different breathing techniques to calm down. We control our breathing, thus signaling our brain that there’s no immediate threat, and in turn, we make it stronger. This means that when a truly stressful situation occurs, our brain and body will not react as harshly, and we will be able to stay in control. Allow you to fall asleep faster If you find yourself awake in your bed, frustrated by the lack of sleep, breathing exercises can help. Take deep breaths through your nose while counting to four, hold your breath while counting to seven, and exhale through your mouth fully while counting to eight. If you have trouble breathing through your nose, you should consider getting rhinoplasty surgery to ensure you can take deep breaths without problem in the future. This simple breathing exercise calms your nervous system and prepares your body for sleep, and the more you practice it, the less time you’ll need to fall asleep. Restores your full lung capacity With healthy lungs, there is nothing easier and more natural than breathing. About 80% of the work is done by your diaphragm, and our lungs resemble a screen door with spring because they open and shut on their own. Sadly, they become less so with time, and sometimes the air gets trapped inside our lungs, builds up, and leaves less room for the diaphragm to work properly. If you do different breathing exercises regularly, it will help rid the lungs of that accumulated and stale air, increase your oxygen levels, and your diaphragm will be able to do its job. Help regulate your blood pressure When breathing slowly, we allow our bodies to become more sensitive. We become more sensitive to the change in pressure, or better yet, the mechanism that helps regulate blood pressure through our heart rate does. When we take control and force ourselves to slow down our breathing, we end up with much lower blood pressure and heart rate. As a result, the risk of stroke and cerebral aneurysm becomes significantly lower, and our hearts will be much healthier. It’s been scientifically proven that breathing exercises will help you lower your stress and anxiety levels, but in order for it to work, you should first practice. In addition to supplying your body with oxygen, you will also positively influence your emotions, so take time to learn how to breathe properly.
<urn:uuid:8d883729-c9d5-4d7e-8eba-83f5f34789c7>
CC-MAIN-2021-17
https://www.scrapality.com/2019/09/6-ways-breathing-exercises-can-reduce-stress-levels.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072175.30/warc/CC-MAIN-20210413062409-20210413092409-00204.warc.gz
en
0.952934
960
3
3