text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
1.08k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
- a mild preparation of marijuana made from young leaves and stems of the Indian hemp plant, Cannabis sativa, drunk with milk or water as a fermented brew or smoked for its hallucinogenic effects. - a water pipe. Origin of bhang Examples from the Web for bhang Often enough they are almost overcome with the opium or bhang they have taken.Jones of the 64th F. S. (Frederick Sadleir) Brereton In India it is chiefly for the resin, "haschisch, churrus, bhang." Sometimes the leaves and stalks are dried in order to make the drug "bhang." On one occasion490 they secretly filled his pipe with hashish (Bhang).Bahaism and Its Claims Samuel Graham Wilson Bhang consists of the larger leaves and capsules of the plant on which an efflorescence of resinous matter has occurred. - a preparation of the leaves and flower tops of Indian hemp, which has psychoactive properties: much used in IndiaSee also cannabis Word Origin and History for bhang 1590s, from Hindi bhang "narcotic from hemp," from Sanskrit bhangah "hemp." Cognate with Russian penika, Polish pienka (from Russian) "hemp." The word first appears in Western Europe in Portuguese (1560s).
<urn:uuid:c68b58b5-901a-4901-9bad-474628bd3c65>
CC-MAIN-2018-34
https://www.dictionary.com/browse/bhang
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209884.38/warc/CC-MAIN-20180815043905-20180815063905-00126.warc.gz
en
0.93976
285
2.8125
3
Running head: UNIT I COURSE PROJECT 1 UNIT I COURSE PROJECT 4 Unit I Course Project Country Analysis: Research Proposal Apple Inc. The company is a global firm that designs, develops, and vends consumer electronics and computer software (Levy, n.d.). It also deals in online services such as IOS, Mac, Apple Store, iTunes, and Apple Music. The company’s headquarters is located in California. The company is popular for its marketing strategies for its goods and its series of personal computers. Apple Inc. was founded in 1976 by Steve Wozniak and Steve Jobs. The Corporate uses the logo of a bitten Apple which was inspired by Newton. Being a multinational Company, Apple is expanding its business operations across the world (Moffett, Stonehill, & Eiteman, 2015). For this assignment, I selected the United Kingdom as a nation for international expansion of Apple Company’s business operations. The United Kingdom’s Historical Outline The United Kingdom is popular for the role it played in advancing science and literature and in developing democracy in parliament. In the 20th century, the United Kingdom’s strengths were washed-out in the two world wars and the withdrawal of the Irish Republic from the union (Factbook, C. I. A. 2012). However, later on in the century, the United Kingdom was able to rebuild itself into a current successful European nation. As a founding member of the Commonwealth and the NATO and one of the perpetual members of the United Nations Security Council, the United Kingdom follows a global approach to foreign policy. Since 1973, the United Kingdom has been an active participant of the EU but outside the Monetary and Economic Union. However, the nation intends to leave the EU since it is frustrated by the huge migration into the country and the remote bureaucracy in Brussels. In respect to this, the UK’s citizens voted to leave the EU on 23rd June 2016. As a result, the United Kingdom is currently negotiating its withdrawal terms with the European Union. Other key events in the United Kingdom include its participation in World War I in 1914 when it entered hostilities against Germany (United Kingdom profile, 2012). During World War II in 1939, The United Kingdom declared war against Germany. However, in 1945, the United Kingdom surrendered the war. Also, a labor leader, Clement Atlee was elected in 1945. The United Kingdom is the third biggest economy In Europe after France and Germany. Its agriculture is highly mechanized and produces up to 60% of its food needs. Also, the United Kingdom is the leading fishing nation in Europe. The United Kingdom is a major source of multilateral and bilateral aids to third world nations. The nation also has large energy sources such as coal which adds to the nation’s economy. Size and Location The United Kingdom is located in the West of Europe and a sixth of the Ireland Island in the north. The UK is situated between the North Sea and the North Atlantic Ocean in Europe. Its geographic coordinates are 54 00 N, and 2 00 W. The United Kingdom covers a total area of 243, 610 square kilometers where land makes up to 243,930 square kilometers and water 1,680 square kilometers. Climate, Terrain, and Land Use The United Kingdom has a moderate temperature which is influenced by the prevailing southwest winds that blow over the North Atlantic Current. The nation’s terrain includes low lying mountains and rugged hills that level to rolling plains in the southeast and east of the country. Most of the land in the United States is used for agriculture which amounts to 71% of the total land while forests make up 11.9 % of the total land. The remaining 17.1 % is used for other land uses such as construction. The United Kingdom has a total population of 65,648,100 people. Most of this populace is distributed around London. The remaining population is distributed in clusters in areas such as Manchester, Liverpool, Edinburgh, Cardiff, and Belfast. Levy, S. Apple Inc. | American company. Retrieved from: https://www.britannica.com/topic/Apple-Inc Moffett, M. H., Stonehill, A. I., & Eiteman, D. K. (2015). Fundamentals of multinational finance (5th ed.). Boston, MA: Pearson Education. United Kingdom profile. (2012). Retrieved from: http://news.bbc.co.uk/2/hi/europe/country_profiles/1038820.stm Factbook, C. I. A. (2012). The World Factbook. Central Intelligence Agency.
<urn:uuid:4cb34a11-063e-4413-a9b7-86fd93e79bf6>
CC-MAIN-2019-26
https://assignmentwritingservice.gapessays.com/country-analysis-research-proposal-2/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998473.44/warc/CC-MAIN-20190617103006-20190617125006-00504.warc.gz
en
0.939502
961
3.015625
3
Aerobic exercise is the kind of exercise that has been consistently shown to trigger the growth of both brain cells and new connections between them, boosting cognitive functions. It has also been associated with lower risks of developing Alzheimer’s Disease. Is it the case that other types of physical exercise can also benefit the brain? Evidence is more limited, but a new study suggests that weight training may be a likely candidate to do so. The study involved 86 women between the ages of 70 and 80 who had probable Mild Cognitive Impairment (MCI). MCI is a condition where people have mostly memory problems which are not severe enough to interfere with daily life. It is often considered to be the very early stage of Alzheimer’s Disease. The women were divided into 3 groups: 1) a resistance training group, 2) an aerobic exercise group, and 3) a balance and tone training group. Each group exercised twice a week for six months. Participants’ cognitive skills were measured with tests assessing executive functions (such as attention and inhibition) and memory. The brains of 22 of the participants were also scanned using functional MRI. The results showed that resistance training improved both executive functions and memory performance. Brain scans demonstrated increased blood flow to areas of the brain associated with the improved performance (such as the occipital and frontal regions of the brain). In contrast to prior studies, there was no benefit of the aerobic training on cognitive performance (even though the cardiovascular performance of the participants in this group did improve). What is new? This study is one of the first randomized controlled trials comparing the efficacy of both resistance and aerobic training to improve cognitive functions. It confirms the results obtained a few years ago by the same team of researchers showing that 12 months of once- or twice-weekly strength training improved executive functions in healthy women ages 65- to 75 years old for up to 1 year after the training (Davis et al., 2010). The novelty of the study is to show that after a short period of time (6 months) the effects of strength training can benefit cognition, even in people who are already suffering from cognitive impairment. Headlines claiming that “Weight training prevents dementia” may be going a little too fast. The study shows that weight training may boost cognitive functions that are highly sensitive to the effect of age and disease (the so-called executive functions). The study does not show that risks of developing dementia decrease for participants in the weight training group. More research is needed before such a claim can be made. The absence of cognitive boost or brain change in the aerobic training group in this study is unclear at this time. Indeed, the evidence that aerobic exercise triggers neurogenesis and thus increases gray matter volume is numerous. Prior evidence has also shown that aerobic exercise can boost cognitive skills in healthy older adults as well in people with MCI. Of note, the large and rigorous 2010 meta-analysis conducted by the NIH concluded that aerobic exercise was a factor associated with decreased risks for both Alzheimer’s Disease and cognitive decline (Williams et al., 2010). So there does not seem to have any questions that aerobic exercise can impact brain health. Its effect may be smaller or larger depending on the intensity of the exercise, the age and the health and cognitive status of the participants though. More research is needed to answer these questions. In sum physical exercise is an important piece to solve the brain fitness puzzle. Aerobic exercise (in any form: hiking, swimming, dancing, fast walking, etc.) and possible weight training should be part of the daily habits of highly efficient brains. - Fitter bodies = fitter brains. True at all ages? - Exercise as a Treatment for ADHD - Exercise Improves the Cognition of Overweight Children - Davis, JC et al. (2010). Sustained Cognitive and Economic Benefits of Resistance Training Among Community- Dwelling Senior Women: A 1‑Year Follow-up Study of the Brain Power Study. Arch Intern Med., 170(22), 2036–2038. - Nagamatsu LS, et al “Resistance training promotes cognitive and functional brain plasticity in seniors with probable mild cognitive impairment” Arch Intern Med 2012; 172(8): 666–668. - Williams, J. W., Plassman, B. L., Burke, J., Holsinger, T., & Benjamin, S. (2010). Preventing Alzheimer’s Disease and Cognitive Decline. NIH Evidence Report: AHRQ Publication. — This article was written by Pascale Michelon, Ph.D. in Cognitive Psychology. Dr. Michelon was a Research Scientist at Washington University in Saint Louis were she conducted several projects related to visual processing and memory. She is now an Adjunct Faculty at Washington University, teaches Memory Workshops in the St Louis area and has recently published Max Your Memory.
<urn:uuid:395c096b-d705-4ccd-83ea-e68650287e2d>
CC-MAIN-2020-50
https://sharpbrains.com/blog/2012/05/01/aerobic-exercise-or-weight-training-to-boost-brain-function/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141177566.10/warc/CC-MAIN-20201124195123-20201124225123-00405.warc.gz
en
0.950255
998
3.125
3
If you've ever flubbed up while trying to communicate a message -- as most people have -- you understand just how important the different aspects of communication are. Communication is far more than just the words that come out of your mouth. It involves an intricate web of cues woven together to tell others what you really mean when you say something. Sharpen your communication and leadership skills by honing all of the elements of effective communication next time you convey a message. Some people are naturally more eloquent than others and seem to always have the right words to say in any given situation. If you're not blessed with the ability to speak off the cuff, you can improve upon this skill with practice. If you need to communicate an important message verbally, schedule a time to do it, and then practice what you intend to say by writing it down first. Make sure that you have effectively gotten your message across by asking the person with whom you're communicating to paraphrase what you've just told him. You can also greatly improve your word arsenal by becoming an avid reader. Body language is a powerful tool for communicating messages that includes all nonverbal cues used during communication, such as eye contact, posture, gestures and facial expressions. Body language can be far more powerful than spoken words. The two research studies most often cited on the impact of body language over verbal communication, both published in 1967 and led by Albert Mehrabian, concluded that body language accounts for 55 percent of communication. Ensure your message is communicated properly by making sure that your body and mouth are on the same page when you speak. Hone Your Tone The tone of your voice helps convey your attitude and emotions during communication. Tone includes vocal inflections and word choice, and when improperly used, can confuse your audience or end up sending an unintended message. For example, an apology offered with a snappy "I'm sorry" is very different from one that utilizes a warm, soft voice and conveys genuine emotion by explaining the reason for the apology. Be a Good Listener It may sound contradictory, but an important part of being an effective communicator is simultaneously being a great listener. Remember, communication is a two-way street that involves both relaying your own messages and understanding the messages of others. Become a good listener by focusing intently on the words some is communicating. Make eye contact and nod to indicate you understand, or ask questions once he is finished if there are things you are unclear about. Don't interrupt, and don't allow outside distractions to draw your attention away from your speaker.
<urn:uuid:d3718de2-691c-468b-bbb3-3708f15ca81c>
CC-MAIN-2017-17
http://www.livestrong.com/article/87870-elements-effective-oral-communication/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123172.42/warc/CC-MAIN-20170423031203-00405-ip-10-145-167-34.ec2.internal.warc.gz
en
0.948058
520
3.453125
3
1626—London, England: Francis Bacon says in his Sylva Sylvarum, “All instruments that have either return as trumpets or flexions as cornets, or are drawn up and put from as sackbuts, have a purling [murmuring] sound; but the recorder or flute, that have none of these inequalities, give a clear sound” (Bacon 50). 1626—Leipzig, Germany: Johann Hermann Schein, director of music at the Thomaskirche, publishes the collection Opella nova, ander Theil, geistlicher Concerten, which features numerous chamber motets in 4 or 5 parts that include trombone: “O Maria, gebenedeiet bist du” (“trombone o fagotto”), “Siehe, das ist mein Knecht” (“fagot o trombone”), “Also heilig ist der Tag” (1 trombone), “Uns ist ein Kind geboren” (1 trombone), “Selig sind, die da geistlich arm sind” (3 trombones), “Vater unser, der du bist im Himmel” (2 trombones), “Mach dich auf, werde Licht,” (3 trombones), and Nun ist das Heil und die Kraft (3 trombones) (Hadden 128; Collver 163). 1626—Leipzig, Germany: Johann Hermann Schein, Ich will schweigen, a funeral lament. 1626—Bologna, Italy: Camillo Cortellini’s collection of concerted masses, Messe concertante a otto voce, includes specific instructions on how instruments are to be used: “The Mass In Domino confido has the concerted Gloria, and where the text is in capital letters, the singer will sing the solo, and where the text is replaced by lines, the trombones or other similar instruments will play soli for the accompaniment of the parts. This can be done without organ if instruments are present…” (Guion, Missing Link). 1626—Venice, Italy: Rovetta specifies trombone in a collection of canzoni. Specifically, Canzon Seconda, a 3-voice work, calls for 2 violins or cornetts and trombone (Winkler 301; Selfridge-Field, Instrumentation). 1627—Bergamo, Italy: Payment records for Assumption Day celebrations at Santa Maria Maggiore show 2 trombones among the 13 instrumentalists (Roche, North Italian 142). 1627-1629—Dublin, Ireland: William Bedell serves as provost of Trinity College of Dublin. A contemporary biographer describes him as being “much dissatisfied with the pompous service at Christ’s church in Dublin, which was attended and celebrated with all manner of instrumental musicke, as organs, sackbuts, cornets, viols, &c, as if it had been at the dedication of Nebuchadnezar’s golden image in the plain of Dura…” (Boydell, Cathedral 140; Parrott, Grett and Solompne Singing). 1628—London, England: Records from the court of Charles I list 9 hoboies and sackbuts (De Lafontaine 66; Ashbee, Records III 32). Elsewhere the following are listed separately as Sagbuttes: John Snowesman, Richard Blagrave, Clement Lanier (Ashbee, Records III 139). 1628—Durham, England: Peter Smart, Prebendary of Durham Cathedral, expresses his puritan disgust with the use of instruments in church: “This makes me call to remembrance, a strange speech little better then blasphemy, uttered lately by a young man, in the presence of his Lord, and many learned men: ‘I had rather goe forty miles to a good service, then two miles to a Sermon.’ And what meant he by a good service? His meaning was manifest; where goodly Babylinish robes were worne, imbroydered with images. Where he might heare a delicate noise of singers, with Shakebuts, and Cornets, and Organs, and if it were possible, all kinde of Musicke, used at the dedication of Nabuchodonosors golden Image” (Smart Sermon 22). Smart brings a lawsuit against John Cosin, fellow-Prebendary and Bishop of Durham, complaining about Consin’s “Popish” activities. Among Smart’s specific complaints are the following: “Article 7: He has divided the morning service into two parts; the six o’clock service which used to be read only and not sung, he chants with organs, sackbuts and cornetts, which yield a hideous noise….Article 8: He enjoins all the people to stand up at the Nicene Creed…which he commands to be sung with organs, sackbuts and cornetts…” (Buttrey). The following year, Smart publishes “A Short Treatise of Altars, Altar-furniture, Altar-cringing, and Musick of all the Quire, Singing-men and Choristers,” wherein he asks, “Can such paltry toyes bring to our memory Christ and his blood-shedding? Crosses, Crucifixes, Tapers, Candlesticks…sumptuous Organs, with Sackbuts & Cornets piping so loud at the Communion table, that they may be heard halfe a mile from the Church?” (Smart Altar 19). 1628—Italy: Ottavio Maria Grandi calls for trombone in Sonata Decima Nona, a 5-voice work for violin and 4 trombones, and Sonata Vigesima, a 6-voice work for 3 violins and 3 trombones (Winkler 301). 1628-29—London, England: A payment record from the court of Charles I is made: “To Anthony Bassano, one of his Majesty’s Musitions for the wynd Instruments…for two setts of new hautboyes & Sackbutts & for new Cases to putt them in” (Ashbee, Records III 141). c. 1629—Venice, Italy: Veronese artist Fra Semplice da Verona includes a depiction of a cherub playing trombone in Infant Jesus and Musical Angels, an image framing a pre-existing Madonna in the Convento del Redentore. Other instruments being played include cornetto, viol, violin, and lute (see detail and full image below; public domain) (Portogruaro, plate 37). 1629—Palermo, Italy: Bartolomeo Mont’Albano specifies trombone in a collection of his works. Specifically both Sinfonia Settima Castelletti and Sinfonia Octava Fiumicello are 3-part works scored for 2 violins and trombone (Winkler 302; Selfridge-Field, Instrumentation). 1629—Pallanza, Italy: Gasparo Pietragrua calls for trombone in a collection of sonatas and canzoni. Specifially, Canzone La Nozente is a 2-part work scored for violin and violone or cornett and trombone (Winkler 302; Selfridge-Field, Instrumentation). 1629—Brescia, Italy: Pietro Lappi specifies trombone or cornett or violin in his 8-voice Canzon L’Anconitana (Winkler 301). 1629—Venice, Italy: Dario Castello, a member of the piffaro, calls extensively for trombone in a collection of sonatas. Specifically, Sonata Quinta is scored for soprano voice and trombone or violetta; Sonata Sesta is scored for soprano voice and trombone or violetta; Sonata Undecima is scored for 2 soprano voices and trombone or violetta; Sonata Duodecima is scored for 2 soprano voices and trombone or violetta; Sonata Decima Terza is scored for 2 soprano voices and 2 trombones or violette; and Sonata Decima Quarta is scored for 2 soprano voices and 2 trombones or violette (Winkler 301; Selfridge-Field, Instrumentation). 1629—Heinrich Schütz’s collection of works, Symphoniae Sacrae, utilizes trombone extensively, drawing on both the German church tower tradition and Italian polychoral methods. Noteworthy examples include “Fili mi, Absalon” (bass voice accompanied by 4 trombones and organ), “Attendite, popule meus” (bass voice accompanied by 4 trombones and organ), and “Veni, dilecte mi” (3 solo voices accompanied by 3 trombones) (Beulow 274; Whitwell, Catalog Baroque 144). 1629—Nuremberg, Germany: Numerous works from Biagio Marini’s instrumental collection, Sonate, sinfonie, canzoni, passemezzi…, specify trombone: Sonata octava (2 bassoons or bass trombones, bass continuo), Sonata nona (2 bassoons or bass trombones, continuo), Sinfonia terza (2 cornetts, trombone, basso continuo), Sinfonia quarta (2 cornetts, trombone, basso continuo), Canzon terza a 4 (4 trombones or violas), Canzone quarta a 4 (2 violins or cornetts, 2 trombones ad lib, basso continuo), Canzone sesta a 4 (2 cornetts, 2 trombones ad lib, basso continuo), Canzon septima (2 cornetts, basso ad lib, 3 trombones), Canzon octava (2 violins, 4 trombones), Canzon nona (2 violins, viola, 3 trombones), Canzone decima a 6 (2 violins or cornetts, 4 violas or trombones, basso continuo), and Sonata per l’Organo (violin or cornett, trombone ad lib, organ) (Collver 60; Selfridge-Field, Instrumentation; Winkler 301). 1629—Bergamo, Italy: Alessandro Grandi’s O beate Benedicte from the Motetti con sinfonie III is scored for soprano voice, tenor voice, trombone, and violin (Roche, North Italian 86). 1629—Venice, Italy: Carlo Milanuzzi’s Missa primi tone from his Messe a tre voce contrasts a group of 3 vocal soloists with a 4-part vocal choir and another choir of 2 violins and 2 trombones. The trombone lines are independent of the vocal lines (Schnoebelen, The Role of the Violin). c. 1630—Prague, Czech Republic: A decorative border in “Antiphonarii Praemonstratensis Sionei pars aestivalis” includes what appears to be a trombone (see below image; public domain). Special thanks to Bruce Dickey. c. 1630—Genoa, Italy: A trompe l’oeil balcony by Giovanni Bernardo Carlone and Giovanni Battista Carlone in the palace Villa Spinola alla Prioria di S. Agnese features a well-dressed trombone player among a small group of musicians (see detail and full image below; click to expand; public domain images) (Heck, Guitarists in the Balconies). c. 1630—Antwerp, Belgium: Minerva Visiting the Muses on Mount Helicon, a painting by Hans III Jordaens, includes a trombone and a viol resting on the ground in front of Minerva (see below image; public domain). c. 1630—Antwerp, Belgium: A painting on the lid of a harpsichord by Franz Francke (1581-1643) depicts Belshazzar’s feast. A trombone is pictured performing with string instruments and a keyboard (see below image; public domain) (Munich, Bayerisches Nationalmuseum. Cat. No. 174; Hirt, Stringed Keyboard Instruments 263). c. 1630—Italian artist Ortensio Crespi’s St. Cecilia includes one fairly clear depiction of a trombone at the foot of the painting, as well as what appear to be two additional partially-obscured trombones on the other side of the viol (see below image; public domain). c. 1630—Rome, Italy: An etching from the series Figure con instrumenti musicali e boscarecci by Giovanni Battista Bracelli features a trombone and a serpent (see below image; public domain) (Falletti 107). 1630—Bergamo, Italy: Alessandro Grandi utilitzes trombone extensively in the collection, Raccolta Terza di Leonardo Simonetti. For example, Sinfonia avanti il Gloria is written for cornetto, trombone, and continuo. Several other works in the collection call for trombone prominently as well (Collver 118). 1630—Bologna, Italy: The plague kills nearly a quarter of the city’s population, including Camillo Cortellini, trombonist and leader of the musici, the trombone and cornett subset of the town wind band (Guion, Missing Link). 1630s—Members of the violin family replace cornett and trombone as the favored instruments in Italian sacred music (Bonta Ensemble 38). 1630—Durham, England: A preacher expresses his disgust with the current use of music in worship services: “Our Durhamers have been so eager upon piping and singing, that instead of the Morning Prayer at 6 of the clock, which was wont to be read distinctly and plainly…they brought in a solemne Service, with singing and Organs, Sackbuts and Cornets, little whereof could be understood of the people, neither would they suffer the Sacrament to be administered without a continuall noise of Musick, both instrumentall and vocal, to the great disturbance of these holy actions” (Whitwell, Baroque 195). 1630—Venice, Italy: The Ospedale (or Hospital) di San Lazaro e dei Mendicanti, an orphanage and school, replaces an old trombone that has been in their possession, indicating the nuns there have probably played and taught the instrument for some time. Indeed, other sources indicate that trombone is one of the instruments taught at ospedali, and inventories from the Mendicanti from slightly later include multiple trombones (Baldauf-Berdes 130, 141, 171). 1630—Venice, Italy: Alessandro Grandi’s collection of large-scale church works, Raccolta terza, is published posthumously. It contains numerous works that use trombones prominently. For example, Nisi Dominus is scored for SATT soloist, SATB ripieno, and 3 trombones. The trombones play in both tuttis and solos (Roche, North Italian 127). In Messa concertata, trombones are featured among several different solo groupings (Roche, North Italian 143). 1630—Venice, Italy: Giovanni Croce’s Laudate pueri, which would have been written before his death in 1609, is published posthumously. The work features three 4-part choirs, at least one of which includes trombones (Kurtzman Monteverdi Vespers, 124). 1631—Braunschweig (Brunswick), Germany: The organ case at Martinikirche (St. Martin’s Church) features a pair of trombone-playing angels (see detail and wider detail below; special thanks to Raymond Faure). 1631—Venice, Italy: Monteverdi’s “Mass of Thanksgiving,” a solemn mass for the feast of S. Maria della Salute in thanksgiving for the delivery of Venice from the plague, includes trombones (Mansfield, Some Anomalies). 1632—Bologna, Italy: In the convent Santa Cristina, nuns accompany themselves, according to contemporary Mauro Ruggeri, “with various instruments, violins, trombones, harps, and such like” (Monson, Disembodied 52). 1632—London: Edward Kellie, Master of the Chapel Royal in Scotland, visits London and “…carryed home an organist and two men for playing on cornetts and sackbuts…most exquisite in their severall faculties” (Parrott, Grett and Solompne Singing; Whitwell, Baroque 194). 1632-33—Durham, England: Cathedral records show employment of 2 sackbut players, 2 cornett players, and 2 organists (Buttrey). 1633—Biecz, Poland: A carving in an ivory coin cabinet, made by Christoph Angermaier for Elizabeth, wife of Maximilian I of Bavaria, depicts a group of town musicians, including a trombonist (Town Musicians in Poland, Biecz Museum, Poland) (Lesure 14; Whitwell, Baroque 3; Buchner 106). See below image; public domain. 1633—Italy: Sienese priest Montebuoni-Buondelmonti is greatly impressed with the playing of Alberto Gregori, a trombonist employed at the Siena cathedral. He remarks that Gregori “needs only the mouthpiece to play anything for which other players need the entire instrument” (Onde con il bocchetto solamente ha fatto esperienza di tutto cio che fanno gl’altri con il trombone intero). Gregori also served as maestro di cappella at the Palazzo Pubblico and director of musical activities at the hospital church of the Santissima Annunziata (Reardon Agostino Agazzari 53). c. 1634—A print, possibly by French artist Jacques Callot, shows a solitary trombonist casually playing while sitting cross-legged on a chair (see below image; public domain). Notice the similarity to the Bracelli etching, above (c. 1630). 1634—Italy: A collection of Masses by Chinelli is scored for voices and trombones (Whitwell, Baroque 213). 1634—Canterbury, England: records show that the Canterbury Cathedral has substituted two corniters and two sackbutters for the deacon and subdeacon called for by authorities (Woodfill 149). 1634—England: James Shirley’s masque, The Triumph of Peace, includes several sackbuts; 6 musicians are listed under the heading “Hautboy and Sackbutts,” while another player, listed under “King’s Musicians for the Violins,” is described as “low tenor violin, hautboy and sackbut, also musician for the wind instruments, also a wait of the city of London” (Lefkowitz, The Longleat Papers). 1634-1635—Canterbury, England: Payment is made at the Canterbury Cathedral “for prickinge one service in both Sackbut bookes” (Bowers 445). c. 1635—Copenhagen, Denmark: A ceiling painting in the Rosenborg Castle depicts musicians of the court of Christian IV of Denmark (1577-1648), including 3 trombonsits (see 2 details and full image below; public domain) (Hindley plate 17). c. 1635—Naples, Italy: According to an inventory probably taken in the 1630s, the Conservatorio dei Poveri di Gesu Cristo owns 2 trombones, 3 cornetts, and violins of various sizes (Arnold, Instruments and Instrumental Teaching; Guion, Missing Link). 1635—England: The verse anthem “When the mountains were brought forth” by William Lawes is described in the Chapel Royal Anthem Book as “An Anthem with verses for Cornetts and Sagbutts” (Morehen 141; Woodfill 191). 1635—Oxford, England: An inventory of instruments located in the shop of John Gerard, who is probably a musical instrument dealer, includes a sackbut (Fleming, Some Points Arising from a Survey). 1635—Germany: An engraving of Johann Andreas Herbst, Kapellmeister in Darmstadt, Frankfurt, and Nuremberg, by Sebastian Fürck, features a depiction of a trombone in the outside border (middle right) (see below image; public domain) (Kinsky 167). 1635—England: Records for the King’s Music list Hautboys and Sackbuts together instead of separately. The group consists of 12 players (Woodfill 305). 1635-1642—Poland: The court ensemble at the chapel of Duke Wladyslaw Dominik Ostrogski-Zaslawski (d. 1656), which is comprised of some 12 to 17 vocalists and instrumentalists, includes multiple trombones (Przybyszewska-Jarminska, The History of Music in Poland: The Baroque, Part 1, p. 88). 1636—Poland: From at least this year, a chapel is maintained by Tomasz Zamoyski, the son of Grand Chancellor. Among the 11 musicians known to have worked at his residence, and probably at the collegiate church in Zamosc, are 2 trombonists, 2 organists, 2 violinists, a curtalist, a cornettist, and 3 singers (Przybyszewska-Jarminska, The History of Music in Poland: The Baroque, Part 1, p. 88). 1636—Paris, France: Mersenne writes, “If another method is not used to play the trombone [sacquebute]than to play the trumpet, it imitates the tone of the aforesaid trumpet, which is considered vicious and unsuited for concerts (Mersenne 272; Mersenne-Chapman 343). Speaking of the trombone’s technical abilities, he remarks, “Those who use it [the trombone] well perform diminutions of sixteen notes to the measure” (Mersenne 272; Mersenne-Chapman 343). Mersenne also observes, “Musicians have invented many instruments to mingle with voices, and to make up for the defect of those who perform the bass and treble, since singers who have low bass voices are very rare. That is why the bassoon is used, and the sackbut and the serpent, just as the cornet is used to supplement those of the treble which are not usually good.” Mersenne includes an engraving of a trombone (see facing image; public domain) (Mersenne-Chapman, 348). 1636—France: Mersenne, describing the shawm band, explains that it is used for large assemblies, such as ballets (though violins have replaced shawms there), weddings, village festivals, and other public celebrations. His musical example includes 2 treble shawms, 2 tenor shawms (or alt pommern), sackbut, and bass. 1636—France: Mersenne explains that in France, it is customary to create a bass trombone by simply adding a crook or tortil to the tenor trombone, lowering the pitch by a fourth (Bate 136). 1636—London, England: Charles Butler voices his opinion against using strings in church services in his Principles of Musick: “Becaus Entata [string instruments] ar often out of tun; (which soomtime happeneth in the mids of the Musik, when it is neither good to continue, nor to correct the fault) therefore, to avoid all offence (where the least shoolde not bee givn) in our Chyrch-solemnities onely the Winde-instruments (whose Notes ar constant) bee in use” (Parrott, Grett and Solompne Singing). 1636—Assisi, Italy: Giovanni Battista Buonamente uses trombones prominently in his collection, Sonate et canzoni a due, tre, quattro, cinque et a sei voci. Specific works include Canzon a 5 for 2 cornetts or violins, 3 trombones, and continuo; Sonata a 5 for violin, cornett, 3 trombones (“trombone contralto, trombone tenor, trombone basso”), and continuo; Sonata a 6 for violin, cornett, 3 trombones (“trombone contralto, trombone tenor, trombone basso”), theorbo, and continuo; Sonata a 6 for 2 cornetts or violins, 4 trombones, and continuo; and Canzon a 6 for 2 violins and 4 trombones (Collver 46; Winkler 302; Allsop 148). 1636—Württemberg, Germany: The court chapel inventory includes 2 trombones (Whitwell, Baroque 203). 1636—Biagio Marini, Canzon from Sonate, symphonie… for 4 trombones and continuo (Marini). 1636—Santo Domingo, Colombia: Juan Criollo, a Creole slave and professional musician from Santafé, becomes a trombonist at the Santo Domingo Convent. He calls himself sacabuche de chirimía (“sackbut player of a group of shawms”) (Bermúdez). 1636—San Francisco, Colombia: Juan Sacabuche, a slave and professional musician from Cartagena, becomes a trombonist at San Francisco Convent (Bermúdez). 1636—Seville, Spain: Organist, composer, and theorist Francisco Correa de Arauxo makes the following comment in his treatise, Facultad orgánica, in regard to a trombone-playing colleague: “There was in that holy church in Seville a trombone [sacabuche] player named Gregorio de Lozoya, a man remarkable in knowledge and especially in skill of embellishing on this instrument. One critic said of him that he had ruined [echado a perder] many trombone players of his time, because in imitating his embellishments they revealed faults that they hid [when] playing quietly; that is, plainly [unembellished]” (Lash 218-219; Jacobs, Francisco Correa 4). 1637—Italy: Francesco Fiamengo scores for 2 violins, viola, and trombone (or tiorba) in his Sonata Pastorale (Winkler 302). 1637—Bologna, Italy: A government document defines the city’s piffari (wind band) as an ensemble consisting of 4 cornetts and 4 trombones (Dickey, Cornett and Sackbut 113). 1637—Bergamo, Italy: Music for Assumptiontide at Santa Maria Maggiore includes trombone (Roche, Maggiore). 1637—Asolo, Italy: J. Ganassi calls for trombone in a collection of canzoni (Selfridge-Field, Instrumentation). Specifically, he scores for violin and trombone in Canzon Prima, Canzon Seconda, and Canzon Terza (Winkler 302). 1637—Leipzig, Germany: Tobias Michael, director of music at the Thomaskirche, publishes Musicalischer Seelen-Lust ander Theil. A collection of works for voice and a variety of instruments, it features numerous works that include trombone: “Wo der Herr nicht das Haus bauet” (2 trombones), “Wie lieblich sind auff den Bergen” (“trombone grosso”), “Gott schweige doch nicht also” (single trombone) (Hadden 130). 1637—England: Exeter requires “two new Shagbutts and two new Cornetts to be provided for the service of the Quire with all convenient speed” (Payne 146). 1637—Netherlands: A drawing by Cornelis Saftleven depicts a seated trombonist holding the instrument in what would appear to be a somewhat unorthodox manner (see below image; public domain) (Naylor 97). 1637-45—Ferdinand III reigns as emperor of Austria. An avid supporter of music, he is also an amateur composer himself who uses trombones in many of his compositions (Guion, Trombone 4). 1637-69—Vienna, Austria: Antonio Bertali (1605-1669) is employed at the Imperial Court, where he writes several sonatas that employ trombone (Wigness 3). 1638—Cracow, Poland: The chapel ensemble at St. Mary’s Church, founded by Cracovian burghers with a charter from King Wladyslaw IV, initially comprises 7 musicians: 3 trombonists, 3 violinists, and an organist (Przybyszewska-Jarminska, The History of Music in Poland: The Baroque, Part 1, p. 103). 1638—Dublin, Ireland: Records show that Two Sagbutts and two Cornetts are paid for their regular services at Christ Church Cathedral (Boydell, Cathedral 140; Boydell, Music at Christ Church, 70). Elsewhere in the same record, the same year, the terms Sakebutt and Sacke-but are used (Boydell, Music at Christ Church, 72, 83). 1638/44—Schleiz, Germany: A painting by Paul Keil on the left organ shutter in the Bergkirche includes an angel trombonist among several angel musicians (see below image; public domain) (Die bemalten 108-09). 1638—Dublin, Ireland: A petition is made by the dean for the payment of salaries due to the choir and the sackboots at the Christ Church Cathedral (Boydell, Cathedral 142). 1638—London, England: Records for household of King Charles I include “Warrant to swear Robert Strong a musician to his Majesty for the wind instruments, who is to wayte and serve upon the double sackbut and among the violins, in the room and absence of Robert Parker who through infirmities incident to old age is almost past service” (De Lafontaine 100). 1638—Orvieto, Italy: Molli calls for violino, liuto, and trombone in a collection of his works (Selfridge-Field, Instrumentation). In addition, he scores for 2 violins and trombone in Sinfonia La Liera and Sinfonia La Viviana, and he scores for 3 violins and trombone in Sinfonia L’Anguillona and Sinfonia La Ludovisia (Winkler 302). 1639—Spain: Juan Ricci’s painting, The Virgin of Montserrat, depicts a choir accompanied by cornett, 2 shawms, trombone, and curtall (see below image; click image to expand; public domain) (Museum of Montserrat, Barcelona, Spain) (Remnant West 203). 1639—Assisi, Italy: Repairs done on a trombone owned by San Francesco cathedral indicate the likely use of the instrument. The years later, in 1641, an inventory of the contents of the chambers of the maestro di cappella includes trombone (Allsop 88). 1639—Modena, Italy: Marco Uccellini calls for trombone in a collection of his works (Selfridge-Field, Instrumentation). Specifically, his Sonata Prima is scored for violin and trombone, and his Sonata Duodecima is scored for 3 violins and trombone or bassoon (Winkler 303). 1639—Stockholm, Sweden: An instrument that is possibly the oldest surviving contrabass trombone is manufactured by Georg Nikolaus Oller. The instrument is very long and does not utilize a double slide (Gregory 34). It is held in Musikmuseet, Stockholm (Herbert, Trombone 312). 1639—Flemish artist Adriaen van Stalbemt paints Midas Listening to Apollo, which includes a trombone among several other instruments resting on the ground (see below image; public domain). For several similar trombone images, see Pick That Thing Up and Play! 9 Trombone Paintings from 17th-Century Flanders. c. 1640—Spain: Alonso Cano’s The Virgin of Montserrat, a painting very similar to Ricci’s 1639 painting of the same name (see above) includes a depiction of what appears to be a child perfoming on trombone (see detail and full image below; public domain) (Usandizaga 61; Museum of Real Academia de Bellas Artes de San Fernando). Yet another 17th century painting of the same name, Francisco Chiwant’ito’s 1693 painting from Cuzco (Peru), also includes a child-trombonist in the foreground of the image (see 1693, below). c. 1640—Carmona, Spain: Juan de Castillo’s Inmaculada Concepción in Convento de la Trinidad includes a putto playing trombone (see middle-right of below image; public domain). c. 1640—Poland: Marcin Mielczewski’s Missa Cerviensiana calls for alto trombone, 2 tenor trombones, and bass trombone (Przybyszewska-Jarminska, Baroque part I, 543). c. 1640—Poland: Marcin Mielczewski’s Missa Sancta Anna calls for alto trombone and 2 tenor trombones (Przybyszewska-Jarminska, Baroque part I, 543). c. 1640—Poland: Marcin Mielczewski’s Missa triumphalis calls for alto trombone, 2 tenor trombones, and bass trombone (Przybyszewska-Jarminska, Baroque part I, 543). c. 1640—Poland: Marcin Mielczewski’s Vesperae Dominicales II calls for alto trombone as a substitute for alto voice, tenor trombone as a substitute for tenor voice, and bass trombone as a substitute for bass voice in 2 of 4 choirs (Przybyszewska-Jarminska, Baroque part I, 544). c. 1640—Genoa, Italy: Four different paintings in Basilica della Santissima Annunziata del Vastato feature angels playing trombone (see below 4 images; public domain) (photo credit: Catalina Vicens; see also Heck, Guitarists in the Balconies). c. 1640—England: Henry Loosemore (d. 1670) writes A Verse for y Organ A Sagbot Cornute & Violin (Collver 59). c. 1640—Antwerp, Belgium: Jan van Kessel’s Allegory of Hearing depicts a room with numerous instruments, including a trombone leaning against a stool (see detail below; public domain). The image is similar to a painting on which the artist collaborated with Hendrik van Balen and Jan Brueghel (see c. 1625, above). c. 1640—Caltagirone (Sicily), Italy: By this approximate date, the standard makeup of the capella, a group of musicians maintained by the city to perform in various churches as appropriate, is the following: maestro, SATB, violin, lute, cornett, trombone, and organ (Dixon, Review of Musica Sacra). c. 1640—Goslar, Germany: A painting at the church of St. Jakobi includes an angel playing trombone (see below image; public domain). c. 1640—Antwerp, Belgium: Flemish artist Thomas Willeboirts Bosschaert (1614-54) paints Amor Triumphant among Emblems of Art, Science, and War, which includes a trombone in the foreground (see below image, click to expand; public domain) (Wikimedia commons; Heinrich 507; National Museum, Stockholm). 1640—Italy: Sinfonia La Barbisona by Gregorius Urbanus is scored for 2 cornetts and trombone (Winkler 303). 1640—King’s Music (England) includes as many as 11 sackbut players. Many of them play other instruments as well. 1640—Italy: Gregorio Urbano writes Sacri armonici, which includes a work for trombone, 2 cornetts, and organ (Collver 70). 1640—Cracow, Poland: In a literary work by Aleksander Obodzinski entitled An Ancient Trove of Polish Monarchs, the author praises the musicians of Cracow, including trombonists: “Many players will you find—prominent and famous…regals and instruments, prestigious trombones [puzany] In Cracow perform many fair pavans of their own” (Przybyszewska-Jarminska, The History of Music in Poland: The Baroque, Part 1, p. 154). 1640—Prague, Czech Republic: A ceiling painting in the Pauline monastery in Prague depicts what appears to be a pure consort of 3 trombonists being led by a Kapellmeister (see facing image; public domain) (Volek plate 147). 1640-49—England: Inventories of Cambridge University Musicians list a Sackbutt, held by university musitian William Tawyer (d. 1640). 1641—London, England: As part of festivities connected to the entry into London of Charles I on his return from Scotland, “After dinner, the Lord Major, with his brethren the Aldermen and the 500 horse conducted his Majesty from the Guild Hall with 14 trumpets with Banners, in Scarlet Cloaks, Sac-buts, Cornets, and all instruments of musick usuall, with Bells ringing at 121 parish Churches, where there was no failings in expressions of love and loyalty by the people, as appear’d by their shouts and acclamations…” (Englands Comfort 005). c. 1641—Prosto di Piuro, Valchiavenna, Italy: A fresco in the vault of the presbytery of chiesa dell’Assunta painted by either Giovan Battista Recchi or his brother, Giovan Paolo Recchi, includes a trombonist among several angel musicians (see below image; public domain) (Pescarmona 77). 1641—Italy: Monteverdi’s “Gloria” that appears in his Selva morale specifies an instrumental ensemble of 4 viole da brazzo or 4 trombones, and 2 violins (Schnoebelen, The Role of the Violin). His setting of “Beatus vir” (Psalm 111) requires 3 viole da brazzo or trombones (Tim Carter, Music in Late 232). 1641—Johann Vierdanck (c.1605-1646) calls for trombone in several works contained in the collection Erster Theil newer Pavanen, Gagliarden, Balletten und Correnten. Highlights include 2 sonatas scored for cornett, 3 trombones, and continuo, as well as a sonata for 2 cornetts and 3 trombones (Collver 72). 1641—Bologna, Italy: Giacomo Predieri begins a long career as trombonist in Concerto Palatino, the city wind band, where he continues until 1694. According to Crowther, this ensemble performs at wide variety of ceremonial activities: “By the mid-seventeenth century the band’s duties were largely ceremonial. It played daily on the balcony of the Palazzo Comunale, and had a writ to play on the streets and in the city churches. Its home ground, however, was the Piazza Maggiore, ‘a space where the sacred and the profane could meet on equal terms for all civic religious ceremonies.’” Giacomo also serves as a singer at San Petronio (1636-1657) and vice maestro di cappella (1650-1657) (Guion, Missing Link; Crowther, Oratorio in Bologna 37). 1642—Hamburg, Germany: Kantor Thomas Selle, in his guidelines for instrumentalists, recommends that each of the 5 performers (minimum) be proficient on a number of instruments: 2 cornettists should also bring violins and recorders, an alto trombonist should also play violin and recorder, another trombonist should be capable of playing tenor trombone, bass trombone, tenor violin, and recorder, and a string bass player should also play bassoon, dulcian, and bass trombone (Buelow, Protestant 192). 1642—Modena, Italy: Marco Uccellini scores for trombone and violin in his 2-part Sonata Seconda La Bucefalsca (Winkler 303; Selfridge-Field, Instrumentation). 1642—Brussels, Belgium: Nicolas a Kempis writes Symphonia 2. XXI for 3 strings and trombone, Symphonia XXII for 4 strings and trombone, and Symphonia XXIII for 4 strings and 2 trombones (Winkler 303). 1643—London, England: A painting on an the case of an organ by Christian Smith depicts a trombonist (see below image; public domain) (Parrott, Grett and Solompne Singing). 1643—Nuremberg, Germany: A male chorus and 4 trombones perform a “funeral composition” at a pageant-concert given by Nuremberg civic musicians. According to Whitwell, among German civic musicians, “The most frequently used instruments, and the highest ranking in [their] hierarchy, were the cornetts and trombones” (Whitwell, Baroque 150). 1643—Johann Erasmus Kindermann publishes a collection of works that includes Symphonia in D-flat, Sonata, Sonata in D, Symphonia in D, Symphonia in F, and Rittornello in G, all for trombone, 2 cornetts, and basso continuo. Also included are Symphonia in E for 3 trombones, Intrada in C for 2 trombones and 3 cornetts, and Symphonia for 3 trombones and 2 cornetts (Whitwell, Catalog Baroque 132). 1643—Hamburg, Germany: Kantor Thomas Selle composes a St. John Passion that features prominent use of trombone (Buelow, Protestant 191). 1643—Berne, Niedersachsen, Germany: Renovations of the organ at St. Aegidius Church are completed by Harmen Kröger. It is probably at this time (or possibly at the 1714 renovation by Christian Vater) that a sculpture of a trombonist is added to the organ case (see below image; public domain) (Seggermann 29, 53). 1644—Rome, Italy: Trombones are among musicians in the Piazza Navona who perform to celebrate the accession of Innocent X to the papacy. 30 vocalists are accompanied by an ensemble of 6 trombones, 2 cornetti, four violins, a violone, and an organ (Spitzer 63). 1644—Florence, Italy: Il Volterrano (also known variously as Baldassare Franceschini and Franceschini Baldassare detto Volterrano) is commissioned to paint a lunette fresco in Florence’s Santissima Annunziata. He makes a red-chalk preparatory sketch for the painting (see below) that is quite similar to the final painting (see lower image, below). (For 2 even earlier preparatory sketches, see www.kimballtrombone.com/2010/the-evolution-of-a-trombone-painting.) The images feature angels playing violin, trombone, and lute (public domain images) (Strozzi 332; Falletti 76). 1644—London, England: Expressing a Puritan element within the Anglican church, Sir Edward Dering says, “One single groan in the Spirit, is worth the Diapson of all the Church-Musick in the world. Organs, Sackbuts, Recorders, Cornets, &c. and voices are mingled together, as if we would catch God Almighty with the fine ayre of an Anthem, whilst few present do or can understand” (Parrott, Grett and Solompne Singing). 1644—Paul Schäffer calls for 2 trombones in his Jauchzet dem Herrn alle Welt (Collver 162). c. 1645—Campione d’Italia, Italy: Isidoro Bianchi paints Gloria d’angeli, a fresco in the sanctuary of S. Maria dei Ghirli. The painting includes an angel playing what may be an awkwardly-rendered trombone, with a slide clearly visible but without the rear bow of the instrument extending behind the head (see detail and full image below; public domain) (Angelis 43). For a similar rendering by the same artist, see 1623, above. c. 1645—Denmark: Allegory of the Sense of Hearing, a painting attributed Karel van Mander III, includes a depiction of a trombone (see below image; public domain) (Rijksmuseum). 1645—Leipzig, Germany: The title page of Michel Christian’s Auf das Clavier-Instrument includes a depiction of a female trombonist performing with a diverse ensemble of other instrumentalists (see below image; public domain) (Kinsky 179). 1646—Andreas Hammerschmidt (c. 1611-1675) publishes the collection Vierdter Theil, which calls for trombone extensively. For example, Wer waltzet uns den Stein, Herr höre und sey mir gnädig, Laudate servi Domini, Verleih uns Friede genädiglich, and Alleluia lobet den Herren in seinem Heiligthumb all call for 3 trombones (Collver 119). 1646-47—Sassuolo, Italy: Artists Angelo Michele Colonna (sometimes known as Michelangelo Colonna) and Agostino Mitelli collaborate on a mural in the Palazzo Ducale di Sassuolo that depicts a trombone and 3 other instruments playing in a balcony (see first image below; public domain) (Southorn, front jacket; Sala della Guardia, Palazzo Ducale, Sassuolo). Another image by Colonna, a muse holding a trombone, decorates the ceiling of the same room, the salone (see second image below; public domain image) (Pirondini 251). Special thanks to Tassos Dimitriadis. 1647—Venice, Italy: Trombonist-composer Paul Hainlein, who is visiting from Germany, complains about the quality of trombonists in Venice: “I have no desire to study with what passes as a trombonist here, for I have heard much better players before. I don’t think that much attention is given to this instrument in all of Italy—even in Rome. I wouldn’t know at this time where a really good artist on this instrument could be found. I also have no desire to spend much money on this, because all I need is practice” (Samuel 15). 1647—Vienna, Austria: In his motet, Cantate gentes, Giovanni Valentini calls for 7-part choir, along with an instrumental ensemble of 3 cornetti, violetta, viola, 2 trombones, and organ. The ensemble plays an introductory sonata and interludes between the 4 verses of the motet. Valentini indicates optional substitutions for 3 of the parts: “Piffaro o Cornetto tertio,” “Alto Trombone o Violetta primo,” and “Viola o Trombone secondo” (Saunders, The Hapsburg Court of Ferdinand II). 1647—Soraya, Peru: The Church of Soraya (Aymaraes) lists in its inventory a trombone, a cornett, an organ, a set of shawms, two bajones, a consort of 7 recorders, and a bajonçillo (Baker, Imposing Harmony 200). 1647—Germany: Friedrich Behaim, patron of composer-trombonist Paul Hainlein’s studies in Italy, summarizes his answer to Hainlein’s letter (above): “It is most important now that he try by whatever means to learn the language and also look—even outside Venice—for a good trombone teacher. So that he will be more acceptable to the teacher, he should present him with a good trombone. He shall practice this instrument industriously and perfect himself on it, as well as on the violin and clavier, so that he will be able to bring back a good style, to instruct others, and to organize a good musical life here.” To this end, a trombone is actually purchased by his father and sent to the son, but no record exists that it is ever presented to a teacher (Samuel 16). 1647—Venice, Italy: Trombonist-composer Paul Hainlein records in his diary that, while visiting in Venice, he hears in the Church of Saints Giovanni and Paolo an alto vocalist accompanied by 4 trombones, with another vocalist echoing from afar (Marcuse 811). 1647—Hainlein’s description of a Vespers service in San Francesco della Vigna says the orchestra includes 4 trombones. 1647—Antwerp, Belgium: Nicolaus a Kempis scores specifically for trombone in 3 works: Symphonia 1 for cornett, violin, and trombone, Symphonie 1 for trombone and 3 strings, and Symphonie 2 for trombone and 3 strings (Winkler 303). 1647—England: Popular playwright John Fletcher writes The Little French Lawyer. In the play, a group of women imprisoned in a dark cave are terrified by “A Horrid noise of Musique within….A strange Musick. Sackbut & Troop Music” (Ingram 90). 1648—Vienna, Austria: An engraving by Michael Frommer on title page from Currus Triumphalis by Andreas Rauch depicts 4 angels playing trombone among other angel musicians (see below image; public domain) (Naylor 217). 1648—Nuremberg, Germany: City payrolls show 3 trombones on salary. One of the 3 players is also an instrument maker (Samuel 9). 1648—Leipzig, Germany: Stephan Otto publishes his vocal collection, Kronen Krönlein. Several pieces in the collection specify trombones, including Sihe meine Freundin and O ihr lieben Hirten, both of which call for “trombone picciolo” and 2 trombones (Collver 142). Less than 30 years earlier, Praetorius had stated the following about trombone terminology used by Italians: “The word trombone is usually used for the tenor sackbut; bass sackbut, however, is called trombone majore and alto sackbut is trombone picciolo…” (Praetorius III Kite-Powell 132). And in the illustrations of his Sciagraphia of 1620, Praetorius clearly shows the alto trombone as a shorter instrument than the tenor trombone (Praetorius II, plate 8). 1648—Bergamo, Italy: Cazzati calls for trombone in a collection of sonatas and canzoni (Selfridge-Field, Instrumentation). 1648—Johann Rosenmüller scores for soprano voice, 2 violas or trombones, violone or trombone, and basso continuo in Lieber Herre Gott (Leonard, The Role of the Trombone…Mid- and Late Seventeenth Century). 1648—Johann Rosenmüller scores for alto voices, 3 violas or trombones, violone or trombone, and basso continuo in O admirabile commercium (Leonard, The Role of the Trombone…Mid- and Late Seventeenth Century). 1649—An engraving by Georg Daniel Heumann depicting the visit of the Field Marshall, who later became King Karl Gustav, to the Nuremberg Courthouse, includes several trombonists in the antiphonal ensembles. 1649—Nuremberg, Germany: Johann Andreas Herbst writes the cantata Danket dem Herrn, den er ist freundlich, which calls for 3 choirs: a choir of solo voices, a choir of violins, and a choir of trombones (Samuel 77). The same year, Herbst also writes Danck- und Lobgesang, which uses 4 trombones (Collver 122). 1649—Milan, Italy: Biagio Marini calls for trombone in a collection of his works (Selfridge-Field, Instrumentation). 1649—Emperor Ferdinand III composes Hymnus de Nativitate, a work for chorus and instruments that includes 2 trombones (Whitwell, Catalog Baroque 3). 1649—J. Hentzschel writes Canzon for 8 trombones or violdigamben and basso continuo (Whitwell, Catalog Baroque 130). 1649—Antwerp, Belgium: Nicolaus a Kempis writes several symphonias in which he scores specifically for trombone: Symphonia 1. XVIII for 2 violins and trombone; Symphonia 2. XIX for horn, violin, and trombone; Symphonia XXII for 2 violins, tenore viola or trombone, and basso viola; Symphonia 2. XXIII for 2 violins, tenore viola or trombone, and bass viola (Winkler 304). 1649—Vienna, Austria: Perro calls for trombone in his collection of sonatas (Selfridge-Field, Instrumentation). 1649—Vienna, Austria: Marco Antonio Ferro, lutenist at the court of Emperor Ferdinand III in Vienna, publishes his Sonata a due, tre, e quatro in Venice. The work, comprising 12 ensemble sonatas for strings, specifies alternative scorings, 3 of which include trombone: Sonata 5 for violin, tenore da gamba, viola da gamba or cornetto, trombone, and tiorba; Sonata 8 for 2 violins, violetta da braccio, viola da gamba or 2 cornetti, trombone, and fagotto; Sonata 11 for 2 violins, violetta da braccio, viola da gamba or 2 cornetti, trombone, and bassoon (Winkler 303; Apel, Italian Violin Music 147; Collver 49). 1649-1701—Nuremberg, Germany: Wolff Birckholtz manufactures what is possibly the earliest extant alto trombone. The instrument is held in Marienkirche, Gdansk (Herbert, Trombone 313). 1649-52—Poland: Lists of payments made to musicians at the royal chapel show 3 trombonists in the chapel’s ensemble of 36 adult musicians (Przybyszewska-Jarminska, The History of Music in Poland: The Baroque, Part 1, p. 72). c. 1650—Padre Giambattista d’Este, gia duca Alfonso III, a painting by Matteo Loves, includes what is probably a trombone (bottom-right of full image) among a number of other musical instruments. Judging by the size of the objects around it (lute, violin, music book, text book), the instrument appears to be of alto trombone size. There is some extra tubing on the back bow of the instrument (see detail and full image below; public domain) (Galleria Estense, Modena). c. 1650—Italy: Swiss-born artist Pier Francesco Mola includes a trombone at the foot of his painting, Young Musician Playing a Viola da Gamba. Although it is impossible determine with certainty, the instrument may be an alto trombone, given its size relative to the nearby instruments and music pages, in addition to its proportion relative to the musician (see detail and full image below; public domain) (Mola 161). c. 1650—Mexico City, Mexico: The Martyrdom of St. Lawrence, an oil painting by José Juárez, depicts a trombone-playing angel with several other angel-musicians (see detail and full image below; public domain) (Toussaint 227; Juárez 156). c. 1650—Poland: Bartlomiej Pekiel’s Missa Concertata La Lombardesca calls for an instrumental accompaniment of 2 violins and 3 trombones (labeled alto, tenore, and grosso) (Przybyszewska-Jarminska, Baroque part I, 261). c. 1650—Venice, Italy: A performance at the Basilica di SS. Giovanni e Paolo before and during High Mass and at Vespers for the Dominican Order’s Feast of the Holy Rosary consists of music composed and conducted by Giovanni Rovetta. Four antiphonal choirs include about 40 singers, 6 violinists, 4 trombonists, and an organist (Baldauf-Berdes 39). c. 1650—Artist Wenzel Hollar (known as Wenceslas Hollar in England) includes a trombone-playing putto in his print, Concert of Putti in the Clouds (see below image; public domain) (source: Wenceslas Hollar Digital Collection, University of Toronto, Pl. P500). c. 1650—Anonymous, 4 Sonatas for 5 trombones or bombardi (shawms) and basso continuo ad.lib. (Gorxheim: Parow’sche Musikalien, 1994). c. 1650—Vienna, Austria: Antonio Bertali writes 6 Sonate a 6, which call for “2 violini o cornetti e 3 viole o tromboni col basso per l’organo” (Bertali, 13 sonate manoscritte). c. 1650—Antonio Bertali, Missa Redemptoris: c. 1650—Instrumentälischer Bettlermantl (“An Instrumental Patchwork”), an anonymous musical compendium written in German and Latin, offers illustrations of 4 sizes of trombones with their respective slide positions (Campbell, Instrumentälischer). c. 1650—Netherlands: Cesar van Everdingen includes what appears to be a trombone among several instruments at the bottom of the image in his painting, Four Muses and Pegasus on Parnassus (see below detail; public domain) (Huis ten Bosch, The Hague). c. 1650—German artist Joachim von Sandrart draws an “angel concert” in red chalk that includes a trombone (see below image; public domain) (source: Deutsche Fotothek). 1650—Amsterdam, The Netherlands: Adriaen van Nieulandt’s painting, Allegory of the Peace under Stadholder William II, includes a trombone among a group of musicians that follow the chariot (see detail and full image below; public domain) (Rijksmuseum, Amsterdam). 1650—Hamburg, Germany: A service of thanksgiving for the peace includes a civic wind band of trombones, cornetts, and dulcians (Whitwell, Baroque 204). 1650—Nuremberg, Germany: Johann Andreas Herbst writes the cantata, Wenn wir in Höchsten Nöten sein, which calls for 4 trombones in one of 3 choirs (Samuel 93). 1650—Podkamien, Poland: A musician by the name of Dionizy Bilinski is active as a trombonist in the music ensemble at the Dominican monastery (Przybyszewska-Jarminska, The History of Music in Poland: The Baroque, Part 1, p. 107). 1650—Rome, Italy: Athanasius Kircher depicts and briefly describes the trombone in his Musurgia universalis. He labels the trombone Tuba ductilis, as opposed to the trumpet, labeled Tuba ordinaria (see below detail; public domain, source: wikimedia commons) (Guion, Missing Link). 1650—Florence, Italy: Severo Bonini’s Discorsi e Regole mentions trombones: “Many other wind instruments came from the pipe such as flutes (which were introduced into Italy by the Gauls) and transverse flutes (which were introduced by the Swiss). Later, the more artful and difficult cornetts and trombones [tromboni] were invented. The Saxons invented trombones, and in Nuremberg they fashion them perfectly” (Bonini 34). Speaking of funeral music, Bonini says, “Even today this practice is maintained, particularly in the Romagna, where they accompany [the dead] with mournful songs and the playing of trombones [tromboni]” (Bonini 79). 1650—Bologna, Italy: Reference is made to an instrumentalist named Giovanni Battista degli Antonii, who is admitted as a member of Concerto Palatino: “It was ordered that the Palatine Musicians should be called to play with the said G.B., flautist and trombonist” (Allsop, Secular Influences). 1650—Turin, Italy: Marriage festivities for Princess Adelaide of Savoy and Prince Ferdinand Maria of Bavaria include trombones. First, on the way to the Cathedral of San Giovanni for the service itself, “Swiss Guards and arquebusiers of Their Majesties…lent their presence to the retinue setting out for the cathedral from the great hall of the palace [along] with trumpets, trombones, oboes and drums.” After the wedding service there are “signals by trumpets and trombones to those present who, because of the huge crowd, couldn’t observe the nuptials.” Later, during a series of races in the palace courtyard, races alternate with musical performances by musicians in a gallery (see below image, an engraving by Tomasso Borgonio titled Gli Hercoli domatori; public domain): “From the other palace, above the gallery, among the various events alternating with the races was the reverberation of the sound of an ensemble of instruments; that is, trumpets which, animated by the virtue of such glorious love [of the newlyweds] became the voices of Fame; trombones, which, with harmonious notes echoed the praises of everyone, rousing more ardently by the hour the affections…” (Bowles 275-279; Tim Carter, North Italian 42). 1650-51—Rome, Italy: In the Church of Sant’Andrea della Valle, a large fresco by Mattia Preti depicting the crucifixion of St. Andrew, includes a trombone-playing angel (see detail and full image below; public domain).
<urn:uuid:442f9ceb-2ed1-4cf8-82ce-9251bc71e613>
CC-MAIN-2019-18
http://kimballtrombone.com/trombone-history-17th-century-1626-1650/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00016.warc.gz
en
0.876054
14,288
2.90625
3
Welcome to the Virus Encyclopedia of Panda Security. It allows to gain remote access to the affected computer. It downloads or drops other malware. It does not spread automatically using its own means. |First detected on:||April 6, 2006| |Detection updated on:||Aug. 25, 2006| Alanchum.D is a backdoor that allows hackers to gain remote access to the affected computer in order to carry out actions that compromise user confidentiality and impede the tasks performed on the computer. It affects productivity, preventing tasks from being carried out: - In the affected computer: downloads or drops other malware on the computer: TaskdirHide. Alanchum.D does not spread automatically using its own means. It needs an attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.
<urn:uuid:5de3b08c-0299-4bcb-bde8-a030a3d6974b>
CC-MAIN-2018-13
https://www.pandasecurity.com/homeusers/security-info/about-malware/encyclopedia/overview.aspx?idvirus=114030
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647660.83/warc/CC-MAIN-20180321141313-20180321161313-00758.warc.gz
en
0.736267
217
2.625
3
The water resources management, currently subject to increasing human pressure and climate change scenarios, take part of the environmental challenges we must pay more attention to. Recently several recommendations concerning the need for a new approach to the methods and procedures of water management have been issued, also by the European Environment Agency. This scenario places the research project SID&GRID (Simulation and Hydroinformatics Systems for Water Resources Management), currently in progress, whose main objective is to design and develop an open source framework for the GIS approach integration with the surface and groundwater hydro modeling, taking care also of the unsaturated zone, planning and management of shared use of water resorted by public agencies and private companies. Developing a DSS (Decision Support System) based on open source and free software, to be used as helpful instrument by regional public bodies devoted to the management of the water resources.
<urn:uuid:be1a7d79-8802-4927-b921-e7973f0454c9>
CC-MAIN-2019-04
https://kdd.isti.cnr.it/project/simulazione-e-sistemi-idroinformatici-la-gestione-delle-risorse-idriche
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657151.48/warc/CC-MAIN-20190116093643-20190116115643-00531.warc.gz
en
0.933933
181
2.53125
3
Search operators are a set of commands that can be used in almost every search engine, database, or online catalogue. The most popular operators are AND, OR, and NOT. Other operators include parentheses, truncation, and phrases. Use the following search operators to broaden or narrow your results. |AND||Use this word between concepts to narrow your results.||e.g. sensory AND perception| |OR||Use this word between related concepts.||e.g. habitat OR ecosystem| |NOT||Use this word to exclude terms from your search.||e.g. virus NOT corona| |Quotations||Use quotes to search for a multi-word concept.||e.g. "International Year of Indigenous Languages"| |*||Use the asterisk symbol to include alternate word endings.||e.g. cultur* will search for culture, cultural, and culturally| |?||Use a question mark to include variations in spelling in your search.||e.g. wom?n will search for woman, women| |( )||Use brackets to create separate groups of actions in your search.||e.g. "climate change" AND (ecosystem* OR habitat*) AND Ontario| Pictured below is an example of how all of the above search operators can be combined to refine a search that will help locate sources describing the experience of women participating in the Black Lives Matter movement in Canada. University of Toronto Libraries 130 St. George St.,Toronto, ON, M5S 1A5 About web accessibility. Tell us about a web accessibility problem. About online privacy and data collection. © University of Toronto. All rights reserved. Terms and conditions.
<urn:uuid:ed64877d-dc43-406a-9d73-ee0d4535b6d9>
CC-MAIN-2021-17
https://guides.library.utoronto.ca/c.php?g=718502&p=5153989&preview=19a070715788f8c5a30993882efc5438
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038060603.10/warc/CC-MAIN-20210411000036-20210411030036-00109.warc.gz
en
0.799114
358
3.0625
3
Person Centered Thinking Approach At D&S, our mission is to empower individuals to live a life of independence and self-determination. One of the ways we realize this goal is through Person Centered Thinking, an ongoing process that uses a variety of skills to discover what is important to an individual – such as activities, places, things, and people, and what is important for an individual to help them live a better life. From this specialized discovery process, a person-centered description of the individual is created. This then, leads to an action plan that builds on their strengths, talents, and skills and works toward realizing their goals while maintaining their health and safety.
<urn:uuid:5f8cba3f-780f-4f67-bb4a-1707f24ed29b>
CC-MAIN-2017-17
http://www.dscommunity.com/our-difference/person-centered-thinking-approach/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119225.38/warc/CC-MAIN-20170423031159-00159-ip-10-145-167-34.ec2.internal.warc.gz
en
0.957031
135
2.59375
3
I want to consider over the course of this post and the next the reasons why schools are choosing tablets to fulfil their 1-to-1 ambitions and suggest a slight tweak on how this by-now-familiar formula might be improved. Fundamentally, the reason is easily articulated; schools want to bring the undoubted benefits of a really powerful and functional computer to every one of their students, to be accessed whenever it is the most effective tool to support learning. It’s rarely more complicated than that, at its heart. Tablets are simply the best answer we currently have for distributing access to personalised computing. But beyond this broad and over-arching ambition, let’s take a look at why tablets specifically are chosen by school leaders for 1-to-1 projects above other form-factors; - “They’re light and we want our students to carry them to and from school, and around with them all day. They won’t do that with something large and heavy.” I agree with this, and it’s a critical consideration. If the students won’t bring it in, your project has failed. This was the repeated experience of 1-to-1 projects prior to 2009. - “Their batteries last all day on a single charge.” Well, yes and no. True, a tablet will give you several hours of undemanding static content browsing, but like any computer, the harder it has to work the quicker the battery drains. That said, their ad hoc pattern of use combined with a tablet’s ‘instant on’ nature means that if you start fully charged, you’ll be ok for the day. This is a big deal. - “They are more collaborative”. Easily passed around, less of a barrier than a perpendicular laptop screen and with many applications designed to foster collaboration, this is demonstrably true. - “They just work, all the time.” Depends on brand, in my experience. Generally tablet operating systems are designed with the ‘average’ living room consumer in mind and some have been built as closed worlds, so that the manufacturer can guarantee that things will always work well together. For a sector notoriously slow to embrace technology, keeping things simple is a good principle to build on. - “They’re intuitive to use”. Undeniable. Less time wasted learning how to use the computer means more time spent learning with it. A combination of swipe, pinch and prod will get most things done in tablet-land, a place so cut down and minimalist that the average toddler can go from neophyte to Genius Bar Employee of the Month in a couple of minutes. - “They do things a laptop can’t do”. Or, more accurately, they have a reliable, highly-functional and well-integrated toolset, converged into a single slab of glass and metal and supported by thousands of cheap, easily deployed and enormously creative applications. Laptop manufacturers would assert that all this is true of their product and they’re wrong in every important respect. So, with the above list in mind, what are the downsides? I’m going to ignore the obvious canards/ general gripes with technology of ‘handwriting will suffer’/ ‘they’re just for games’ / ‘children have too much screen time already’ and focus on the specific problems associated with tablets: - “That onscreen keyboard – you wouldn’t want to write your thesis on it!” I’ve lost count of the number of times I’ve heard this one (as if thesis writing was an integral part of the Year 8 curriculum). The serious point however is that some people (including – gasp – me) prefer a physical keyboard for extended text entry. And don’t start on about voice-to-text – I’m writing this on a train. However, research is emerging to show that children’s typing speed is actually positively affected by tablets (I’ll link to this once it’s published). It’s what you’re used to that matters, in seems. - “They’re only about consuming information”. To which one is tempted to reply “Yep, just like books!” However, in well-designed learning activities, the tablet is equally useful as a creative tool – just like (blank) books. I’ve seen publishable quality eBooks made over the course of a few hours by groups of children using a tablet’s ability to combine text, video, images and sound into a highly-professional end-product resulting in genuine pride and deep subject knowledge. These are the same children who would ordinarily have laboured for a term with Publisher to make a leaflet the village fete committee would think looked amateurish. For me, this is the tablet’s greatest affordance, brought about through the remarkable confluence of Items 3, 4, 5 and 6 above. - “Highly publicised, valuable portable tech equals home-time muggings.” Potentially, just not discernibly. This isn’t a risk unique to tablets (most crime experienced by teenagers is related to mobile phone theft, in fact) but just isn’t very common, for a range of reasons including the multitude of things which schools put in place to reduce the likelihood, which could form an entire blog post in itself. - “They can’t do all the things we need to do for [insert subject-specific activity of your choice]”. This is accurate; no single tool can. Tablets can carry out most computing functions and they are also a lot better than a fixed suite of beige boxes at… well, all the stuff in the first list above. The point is not to entirely replace and replicate specialised equipment but to supplement and to make new things possible, for everyone, all the time. A tablet will also never replace a school’s pillar drill or swimming pool – but it might help people use them more effectively. That said, some primary schools are experimenting with a ‘zero ICT room’ cold-turkey approach. In my experience, these lists cover the majority of tablets’ benefits and the answers to perceived problems with the form-factor. However, there remains one nagging aspect of 1-to-1 which deserves to be considered in more depth, and that’s whether all the positives in the first list are really what makes the difference at Key Stages 4 and 5. Pupils aged14-18 are engaged in very different activities from those in Y9 and below – with a very different set of final hurdles to overcome – and I wonder if the tablet is the best tool to support this, and whether the benefits of the form are quite so important for older students. I will be proposing one potential for a ‘best of both worlds’ mixed-estate solution in my next post.
<urn:uuid:db3362cd-1eff-4b6f-8082-fdc0f4742da8>
CC-MAIN-2017-09
http://domnorrish.com/?p=110
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.2/warc/CC-MAIN-20170219104611-00196-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957644
1,481
2.609375
3
Medieval and humanistic latin Literature (INT.) Learning outcomes of the course unit The course of Medieval and Humanistic Latin Literature provides specific and in-depth knowledge in the language and literature of the middle age. and of the following period of humanistic rebirth. Overall, the teaching aims to achieve the following training objectives, according to the Dublin Descriptors: Knowledge and understanding (knowledge and understanding) The teaching of medieval and humanistic Latin literature will allow students to acquire advanced content and methodological skills as well as critical understanding of literary texts in Latin. Knowledge and skills will be achieved through attendance at lectures, individual study and possible preparation of reports on specific subjects or in-depth bio-bibliographic cards. Ability to apply knowledge and understanding (applying knowledge and understanding Students must acquire the ability to face the reading of the work of the chosen author with the methodological tools provided during the lessons and to apply these skills to other literary contexts and texts. Making judgments (making judgments) At the end of the course the students, on the basis of the analytical knowledge of both theoretical and linguistic and literary systems, will be able to examine and critically interpret the philological, linguistic and literary texts and problems that reside in them, in order to formulate their own hypotheses and independent judgments on the contents and on the socio-cultural context of reference. At the end of the course the students will be able to clearly express, using a technical language, information, ideas, problems and solutions to specialists and non-specialist interlocutors. They will be able to formulate conclusions clearly and will also be able to explain the underlying rationale behind their conclusions. Learning skills (learning skills) The study of literature and the medieval and humanistic language helps to obtain methodological, analytical and critical knowledge and skills aimed not only at the completion of the final thesis at the end of the course of study, but also at the insertion in an appropriate manner in the world of work tout court and teaching in particular. Course contents summary The course is structured as follows: a) framing of medieval and humanistic Latin literature; B)Magical herbs, healing herbs. Ancient beliefs about the medieval "herbalist" and the care of the gardens, with particular reference to the gardens of the monastery of St. Gall and through the reading and the comment of the Hortulus of Walahafrido Strabone.; C) The Elegy and the Epigram in the humanistic age Edoardo D'Angelo, La letteratura latina medievale: una storia per generi, Roma 2009. 2) La letteratura italiana del Trecento e del Quattrocento: knowledge of Italian literature from Dante al Bembo. For the general part relating to the history of Italian literature, we recommend: Storia della letteratura italiana. Il Trecento, a cura di E. Malato, Roma, Salerno 1995 (cap. X Francesco Petrarca); Il Quattrocento, a cura di E. Malato, Roma, Salerno 1996 (capitoli: II parr. 1- 13, e 23-24; IV (parr. 1-10); V (parr. 1-3); VII (tutto). The teaching activities alternate lectures with in-depth seminars. Beyond a historical literary overview of the medieval age, the techniques of cultivation of medieval gardens will be illustrated, especially those annexed to the monasteries, in which the hortus was designed according to ancient principles, preferring some types of plants that were placed following a precise pattern . For this reason, we will refer to Walahfrido Strabone and his poem "De cultura hortorum", from which we will read passages concerning some of the richest plants of symbolism and also of healing and magical properties, according to the ancient beliefs of the Middle Ages. With regard to the Humanistic Latin Literature module, authors of elegies and epigrams will be examined (Pontano, Landino, Marullo) in which the imprint of the classics is strongly recognizable. Individual examinations will be requested of the students who will produce their own works on selected subjects or bio-bibliographic cards. The slides used to support the lessons will be uploaded to the Elly platform. The slides are considered an integral part of the teaching material. Assessment methods and criteria The student's work will be evaluated on the basis of: -Papers presented during classes, -Papers presented at the final exam, where general knowledge of medieval and humanistic literature wil be evaluated, so as the comprehension of the latin text (context, content and meanin) wil be tested. The assessment takes place through an oral test and the exhibition of the ongoing research or during the final exam, during which the general knowledge of medieval literature and the acquisition of content and methodological skills as well as the critical understanding of the Latin text will also be examined. proposed. The ability to apply these skills to other literary contexts and texts will also be verified. The final score will be calculated from the arithmetic average of the partial scores of the two courses. An assessment of insufficiency is determined by the lack of knowledge of the minimum contents of the course; from the incapacity to express themselves adequately to the topic; from the lack of autonomous preparation; from the inability to solve problems related to the retrieval of information and the decoding of texts; as well as the inability to make judgments in an autonomous way and to communicate contents, analyzes and judgments in a reasoned, competent and convincing way both to specialists and non-specialists. Sufficient evaluation (18-23 / 30) is determined by an acceptable level of performance by the student of the aforementioned evaluation indicators; the average scores (24-27 / 30) are awarded to the student who proves to have a level more than sufficient (24-25 / 30) or good (26-27 / 30) of the above evaluation indicators, the highest scores ( from 28/30 to 30/30 cum laude) are awarded based on the demonstration of a level from excellent to excellent of the above evaluation indicators
<urn:uuid:ee62a7be-d902-4272-b481-8c4ae3d86770>
CC-MAIN-2020-16
https://en.unipr.it/ugov/degreecourse/168762
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370525223.55/warc/CC-MAIN-20200404200523-20200404230523-00133.warc.gz
en
0.912518
1,278
3.140625
3
Supply chain management is the handling of the whole manufacturing flow of a great or service to take full advantage of top quality, distribution, client experience as well as earnings. What is supply chain management? Supply chain management is the handling of the entire production flow of a great or solution– starting from the raw parts all the way to delivering the end product to the consumer. A firm produces a network of providers (” web links” in the chain) that move the product along from the suppliers of raw materials to those organizations that deal straight with customers. Just how does supply chain management job? According to CIO ¹, there are five elements of traditional supply chain management systems:. Plan and also take care of all sources required to satisfy client demand for a business’s product and services. When the supply chain is developed, figure out metrics to determine whether the supply chain is efficient, effective, supplies worth to consumers as well as meets firm goals. Select vendors to supply the goods as well as services required to produce the item. After that, develop processes to check and take care of provider connections. Key processes consist of: getting, getting, managing inventory and also accrediting supplier repayments. Organize the activities needed to approve basic materials, manufacture the product, test for top quality, plan for shipping and also routine for distribution. Delivery as well as Logistics. Coordinate client orders, timetable distributions, send off lots, billing clients and receive repayments. Develop a network or process to repossess defective, excess or unwanted products. Why is supply chain management crucial? Efficient supply chain management systems reduce price, waste and also time in the manufacturing cycle. The market criterion has actually ended up being a just-in-time supply chain where retail sales instantly signify replenishment orders to producers. Retail shelves can after that be restocked practically as promptly as product is sold. One means to more enhance this procedure is to examine the information from supply chain partners to see where further enhancements can be made. By examining companion information, the CIO.com article ¹ identifies 3 scenarios where effective supply chain management boosts worth to the supply chain cycle:. Determining potential problems. When a customer orders more product than the maker can deliver, the customer can experience bad service. With information evaluation, producers might be able to anticipate the lack prior to the buyer is let down. Enhancing price dynamically. Seasonal items have a limited shelf life. At the end of the period, these items are normally scrapped or sold at deep price cuts. Airline companies, resorts as well as others with perishable “products” generally readjust costs dynamically to meet demand. By using analytic software program, comparable projecting methods can improve margins, even for hard goods. Improving the allowance of “readily available to promise” inventory. Analytical software program tools help to dynamically allocate sources and also routine work based upon the sales forecast, real orders and guaranteed shipment of resources. Makers can verify a product distribution day when the order is placed– significantly minimizing incorrectly-filled orders. Just how will your supply chain endure the age of interruption? Secret attributes of effective supply chain management. The supply chain is the most apparent “face” of business for consumers and also consumers. The much better and also extra efficient a business’s supply chain management is, the much better it safeguards its service track record and lasting sustainability. IDC’s Simon Ellis in The Path to a Thinking Supply Chain ² defines what is supply chain management by determining the 5 “Cs” of the efficient supply chain management of the future:. Attached: Being able to accessibility disorganized data from social media, structured data from the Web of Things (IoT) and also extra standard data sets offered via typical ERP and B2B integration devices. Collaborative: Improving collaboration with vendors significantly means using cloud-based business networks to allow multi-enterprise partnership as well as involvement. Cyber-aware: The supply chain must solidify its systems and secure them from cyber-intrusions as well as hacks, which should be an enterprise-wide worry. Cognitively made it possible for: The AI system becomes the contemporary supply chain’s control tower by looking at, coordinating and performing decisions as well as actions across the chain. A lot of the supply chain is automated as well as self-learning. Comprehensive: Analytics abilities need to be scaled with information in real time. Insights will be detailed and also quick. Latency is inappropriate in the supply chain of the future. Numerous supply chains have begun this procedure, with involvement in cloud-based commerce networks at an all-time high and major initiatives underway to reinforce analytics capacities. Development of supply chain management. While the other day’s supply chains were focused on the availability, movement and expense of physical assets, today’s supply chains have to do with the management of information, product and services bundled right into solutions. Modern supply chain management systems are about much more than just where and also when. Supply chain management affects services and product top quality, delivery, expenses, client experience and ultimately, profitability. As just recently as 2017, a normal supply chain accessed 50 times a lot more data than just 5 years previously. ¹ However, less than a quarter of this data is being evaluated. That indicates the worth of critical, time-sensitive data– such as info concerning climate, unexpected labor shortages, political unrest and also microbursts popular– can be lost. Modern supply chains benefit from huge amounts of data generated by the chain process and are curated by logical specialists and also data scientists. Future supply chain leaders as well as the Venture Source Planning (ERP) systems they manage will likely focus on maximizing the efficiency of this information– examining it in real time with very little latency. Supply chain consulting. With Supply chain Services, you can advance your supply chain processes right into smart process, to reach new degrees of responsiveness as well as development. Difficulty siloed processes to uncover efficiencies, allow your teams to execute and also supply, and also utilize arising modern technologies like AI as well as blockchain to unlock possibilities in every action of the value chain– from need preparing to purchase orchestration and also fulfilment. Supply chain consulting services. Supply chain management usage instances. Rack with boxes. Chemonics and IBM co-created a first-of-its-kind platform called Automatic Requisition Monitoring Management Details System (ARTMIS). The ARTMIS platform aids track shipments at every action of the supply chain. This has actually allowed Chemonics to take care of orders approximately 24 months out. Supply chain control tower. A supply chain control tower ought to offer end-to-end presence across the supply chain– specifically into unpredicted external occasions. The tracking of orders from beginning to fulfillment and also handling individuals, procedures and also information attached to the order as it relocates with its lifecycle. Clear visibility into inventory deals can favorably affect the entire procedure of ordering, saving and making use of stock– from resources to end up item. Digital data interchange. EDI is a standard style to exchange business information between two organizations digitally rather than utilizing paper files. Supply chain analytics. Analytics that can influence high quality, delivery, the client experience– and also inevitably, success. Supply chain optimization. Supply chain optimization makes the most effective use of modern technology and also sources like blockchain, AI and also IoT to boost performance as well as performance in a supply network. Blockchain supply chain. Boost trust throughout your supply chain network with business and technical know-how of IBM Blockchain. Business-to-business (B2B) assimilation is the automation of company procedures and also communication in between 2 or even more organizations. Managed data transfer. Handled file transfer (MFT) is a modern technology system that permits companies to reliably exchange electronic information between systems as well as individuals in a secure means to satisfy compliance needs. Order management software program lets you manage your entire gratification network with effective core abilities and next-level choices. Retail supply chain. Transform your container logistics by freeing it from conventional data systems, hands-on record handling and bad presence.
<urn:uuid:9da54370-99ab-4fdc-bd17-f9ce29e72306>
CC-MAIN-2022-33
https://procurementnation.com/what-is-supply-chain-management/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00625.warc.gz
en
0.94397
1,783
2.9375
3
- slide 1 of 5 The Art of Art Teaching the basic elements of art gives young students a head start in the area of appreciation. The comprehension of these elements will allow them to distinguish what art actually is and visualize it in the world around them. Even the most complicated of concepts can be broken down into simplistic form for the youngest of learners. - slide 2 of 5 The youngest of students are aware of color. From the clothes they wear each morning to the school bus to the color of the classroom walls, they are bombarded with an array of colors. Helping them understand how the colors relate to each other is achieved with a color wheel and water based paint. Begin with a basic color wheel. Create a circle and divide into six sections on large sheets of white construction paper. Give students a copy of the color wheel and access to red, blue and yellow paints. Draw the identical six division color wheel on the white board. Explain the primary colors. Include how they are the dominant colors which assist in the creation of all other colors. Color the whiteboard wheel on the board with red, blue and yellow. Instruct the students to do the same with their paint. Question the students about the color green. If all colors come from red, blue and yellow, which colors make green? When the answer is given, let the students mix the blue and the yellow paint together on their color wheel between the blue and yellow spaces. Continue with purple and orange until the basic wheel is complete. - slide 3 of 5 The textures of items in a young student's world are recognized early in life. The soft blanket they sleep with or the scratchy sweater that grandmother made them keeps them aware of the various feelings. They are aware of smooth surfaces such as tables and rough areas such as the gravel parking lot. Incorporate this previous knowledge into a lesson on the art element of texture. Discuss the concept of texture. Have the students feel different objects including their desk top, shirts, pants and books. Provide table salt, colored chalk, glue, crayons and paint for the students. Sprinkle a small amount of salt onto paper for each student and demonstrate rubbing with a piece of colored chalk. Let each student create colored salt. Set the salt aside and let the students paint and color a sheet of paper. Encourage them to make an abstract picture with the two mediums. Instruct the students to add the colored salt to their picture using glue for the crayon drawn section and sprinkling the salt into the paint. When the pictures dry, discuss the different textures created by the different mediums. The paint will be smooth where there is no salt and lumpy or rough where salt was added. The crayon area will not be as smooth as the paint. - slide 4 of 5 Shapes are the earliest form of geometry taught to young students. From early in life, students recognize the different shapes around them. Long before they know the proper names, they know what a square and a triangle are. Apply this previous knowledge to teach the art element of form. Discuss the proper names of triangles, squares and rectangles. Talk about the number of sides, and how each is made of straight lines. Divide the class into small groups of three or four students depending on the size of the class. Cut enough small triangles, rectangles and squares for each group to have at least four of each. Provide pencil, paper and crayons for the groups. Ask the students to create objects they know from the shapes. Some students will immediately recognize a rectangle plus a triangle make a house shape. Question the class for more answers. Allow the students to begin creating pictures by tracing combinations of the shapes onto paper. After an amount of time, allow the students to share their pictures. Discuss the forms used in the pictures. Non-sensical pictures are alright as long as the students use the shapes. Discuss any items in the pictures that do not fit into the form element. - slide 5 of 5 Design Your Home School: The Elements of Art http://www.teach-nology.com/worksheets/early_childhood/shapes/ Teachnology: Shapes: http://www.teach-nology.com/worksheets/early_childhood/shapes/
<urn:uuid:7e692403-b05a-451d-829a-2c0f850721e8>
CC-MAIN-2013-48
http://www.brighthubeducation.com/teaching-elementary-school/82526-introducing-elements-of-art-to-younger-students/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164705480/warc/CC-MAIN-20131204134505-00061-ip-10-33-133-15.ec2.internal.warc.gz
en
0.931643
885
4.625
5
Social justice movements seek the removal of racist Civil War era symbols from public spaces amid the rise of far-right white nationalism in US. Icons and statues are symbols. These symbols are materially connected, intertwined with economic logics and the struggles against these prevailing economic logics. On one hand, the production and circulation of symbols is an economic activity. On the other hand, symbols have material ramifications that are tied to relations of power in society, both reproducing existing social configurations as well as offering windows into the possibilities for social transformations. It essentially means that depending upon the transformations we see in any particular society, as power shifts, so does the nature of celebration or desecration of symbols. Symbols in this sense work to reproduce particular images to tell particular stories and therefore for those in positions of power, these symbols become critical resources that are mobilised to serve particular goals. For those at the margins of society, the struggle is often over securing access to the sites of symbol making as well as over removing material markers of oppression. The fundamental idea behind democracy is its openness to a wide range of symbols, which offer a window into the plurality of ideas. These symbols stand in as anchors to divergent thoughts and opinions and as markers of the possibilities of debates and differences in a society. Look at the recent context of desecration of the statue of Lenin in Tripura, the Ambedkar statue in Meerut, the defacement of the Periyar statue in Tamil Nadu and the Shyamaprasad Mukherjee statue in Kolkata. The latter had existed throughout the entire period of Left rule in Kolkata. Usually, when you have a space that actually is open to difference and is committed to democratic ideals, each of these statues, symbols and images have an opportunity to stand in as a discursive register. The question then remains: What are the limits to the public presence of symbols in democracies? What about those symbols that are in essence antithetical to ideals of democracy? This question needs to be contextualised in the ambits of the struggles for social justice and equality against the dominant images that legitimise erasure. Look for instance at the tensions over the removal of Confederate statues (markers of White supremacy and support for slavery) in the US. These tensions are reflective of struggles over power in perpetuating racist ideas, the opportunities for transformations in these racist logics that have for long served as dominant ideas of the US, and the deep histories of slavery and racism in the US. The emergence of movements for removal of statues of the leaders and members of the Ku Klux Klan and defenders of slavery is a transformative opportunity for interrogating and challenging the deeply racist rationalities that threaten human dignity and equal opportunity. Particularly amid the rise of far-right White nationalism in the US, social justice movements seek the removal of racist Civil War era symbols from public spaces. Similarly, consider the presence of statues of colonial figures in post-colonial contexts. These statues are reflective of a colonial past and a history that is fairly oppressive, with those particular icons being markers of oppression and attack on human freedom. The struggle for removal of these statues is a narrative anchor for making claims to ideas of justice, dignity, and equality of the margins. Usually, democracies leave enough room for these markers to be present as sites of contestation, conversation, and debate. However, for groups that have historically been oppressed, the struggle against these public symbols is one of crafting a different public narrative, one that challenges the violence of oppression. Similarly consider the emergence in public veneration of icons that were once marked as fundamentally antithetical to the spirit of Indian democracy. The presence of such a statue in a public space threatens the very ideas of pluralist democracy because they stand for the message of hate and foreclosure of democratic discursive space. The presence of these statues in public spaces threatens the very idea of democracy, marking who can and can't participate in democratic opportunities. Then the question we ought to ask is: What are the limits to icons, symbols and images in public spaces in a democracy, particularly in terms of the boundaries of how far these symbols and images go in perpetuating anti-democratic ideals? What democratic processes ought to be mobilised for addressing symbols that explicitly stand in for and perpetuate hate? The lack of critical habits of democracy makes room for all forms of politics of heuristics, often feeding on hatred and polarisation. Symbols and imagery become shortcuts to political movements as well as co-opt possibilities of democracy through the circulation of images of hate and bigotry. They appropriate images to cultivate their particular agendas under the guise of nationalism and patriotism. So icon-politics works in terms of perpetuation of authoritarian power when citizens do not critically interrogate power but rather are driven by heuristics and emotions. The absence of reason from public discourse complements the rise in icon-based politics. Globally, the degeneration of democratic habits in societies has been systematically accomplished through political economic transformations that on one hand have systematically privatised public resources and on the other hand, have erased opportunities for democratic public participation. The various sorts of strategies of authoritarian power and control we are witnessing globally are reflections of the democracy deficit catalysed by neoliberal policies that systematically target democracies and erase opportunities for voice even as they consolidate power in the hands of the global elite. It actually works to mobilise citizens, not as citizens, but as mobs that are driven by the seductions of collective heuristics rather than to actually reason, to participate in argument; and to participate in the everyday habits of democracy. What we then have is the habit of cult-making amid a global politics of dispossession led by the elite class. Examples are galore of cult-making through holograms, brands, images and the management of images as spectacle, with political party investments in gargantuan campaigns becoming the norm. Observe for instance the tremendous growth in the large-scale image-based promotional campaign industry facilitated by big data, which is antithetical to the very ideas of everyday engagement and reason grounded in processing information critically. Cult-making not only works in terms of promoting narrow sentiments of religious and nationalist feelings, but also in terms of promoting wholesale the neoliberal rationality driven by "trickle-down" heuristics. Symbols emerge as tools of persuasion without being critically interrogated, silencing opportunities for discourse, debate and dialogue. Active vigilance is a primary resource against undemocratic tendencies globally. The cultivation of the habits of democracy across a variety of institutions is a key challenge today as basic access to fundamental educational and communicative infrastructures is highly unequal across the globe. Political agendas of the ruling dispensations are worked into textbooks and into the very fabric of academic institutions. To challenge the hegemony of iconography, iconoclasm and related symbolisms in academia, media, and a wide variety of other communicative institutions, we have to begin by returning to cultivating and recognising the everyday habits of democracy in the grassroots. Critical thought, one that questions the workings of power in perpetuating injustice, inequality, and discursive erasure, is the antidote to the global rise of image politics.
<urn:uuid:483a05a3-0e23-4c81-acab-5a521d2c75fb>
CC-MAIN-2019-51
https://www.asianage.com/discourse/010418/erase-memories-perpetuate-hate.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540490743.16/warc/CC-MAIN-20191206173152-20191206201152-00149.warc.gz
en
0.944674
1,446
2.8125
3
Three gender-balanced groups of 16 school children (5-6 years, 8-9 years, 11-12 years) participated in individual pretests of vision, hearing, and time to walk across a 12-m wide urban street and back. Each child then completed 10 roadside trials requiring judgement of the threshold point at which they would no longer cross in front of traffic approaching from their right. The judgements were made from a site immediately in front of a parked car at a point 2 m from the kerb and 4 m from the centre of the road. Traffic speeds and distances were measured using a laser speed and distance detector. The results indicated that, overall, distance gap thresholds remained constant regardless of vehicle approach speeds. Analysis of the thresholds for distance gap judgements for the 4-m half-street crossing showed that some of the older children could be expected to make safe decisions, but this was not so for the 5-6- and 8-9-year-olds at vehicle approach speeds above 60 kph. Almost two-thirds of the children reported using distance to judge gaps, which proved the least adequate strategy in terms of proportion of resultant safe decisions. The findings are discussed in relation to developing effective child pedestrian safety strategies.
<urn:uuid:4488ab76-1d2b-4f51-879e-0ec63ee938a4>
CC-MAIN-2023-23
https://pubmed.ncbi.nlm.nih.gov/9666241/?dopt=Abstract
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646652.16/warc/CC-MAIN-20230610233020-20230611023020-00306.warc.gz
en
0.973179
249
2.921875
3
What is pH balance? pH balance refers to the potential hydrogen level in a substance. In simpler terms, it measures the acidity and alkalinity of the skin. When the pH balance of our skin is disrupted, it can compromise the acid mantle, which is a thin layer of lipids that acts as a protective barrier. This can lead to a breakdown in the skin’s ability to defend against germs, toxins, and external factors. Additionally, an imbalanced pH can hinder the skin’s ability to retain moisture, resulting in dryness. Therefore, maintaining a balanced pH is crucial for achieving radiant and healthy skin. There are several signs that indicate an imbalance in pH levels: - Tightness of the skin after cleansing - Dry patches on the skin - Acne breakouts Various factors can trigger an imbalance in pH levels, including: - Diet: Consuming excessive amounts of acidic foods such as caffeine, sugar, and alcohol can negatively impact pH levels. - Cleansing with hot water - Using abrasive cloths or scrubbing the skin too vigorously - Using cleansers that contain alcohol To maintain a balanced pH, it is important to follow these steps: - Use a toner after cleansing, preferably one that does not contain alcohol. For example, our rose geranium or marigold toner. - Moisturize your skin after applying toner, using a product like our face & neck elixir, which contains Vitamin C. - Opt for a gentle cleanser instead of a bar soap. - Apply sunscreen daily to protect your skin from harmful UV rays. - If you need to use an acid-based product on your skin, do so sparingly. By following these guidelines, you can help ensure that your skin maintains a balanced pH, resulting in a healthier and more radiant complexion.
<urn:uuid:e3a63d07-6004-4b86-b7a1-add7d93104c8>
CC-MAIN-2024-10
https://hollybethorganics.com/organic-certfied/ph-balance-101/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.13/warc/CC-MAIN-20240222161802-20240222191802-00575.warc.gz
en
0.892217
385
3
3
Levalbuterol (By breathing) Treats or prevents bronchospasm. Xopenex, Xopenex HFA, Xopenex PediatricThere may be other brand names for this medicine. When This Medicine Should Not Be Used:This medicine is not right for everyone. Do not use it if you had an allergic reaction to levalbuterol or albuterol. How to Use This Medicine: - Your doctor will tell you how much medicine to use. Do not use more than directed. - Read and follow the patient instructions that come with this medicine. Talk to your doctor or pharmacist if you have any questions. - Do not swallow or inject the medicine. Only inhale the medicine. - Check the solution concentrate in the vial. It should be clear or colorless. Do not use it if is discolored. Mix the solution concentrate first with sterile normal saline before you take your dose using a nebulizer. - You will use this medicine with an inhaler device called a nebulizer. The nebulizer turns the medicine into a fine mist that you breathe in through your mouth and to your lungs. Your caregiver will show you how to use your nebulizer. Do not mix levalbuterol with other medicines in a nebulizer, unless told to do so by your doctor. - Aerosol inhaler: - You will use this medicine with a device called a metered-dose inhaler. The inhaler fits on the medicine canister and turns the medicine into a fine spray that you breathe in through your mouth and to your lungs. You may be told to use a spacer, which is a tube that is placed between the inhaler and your mouth. Your caregiver will show you how to use your inhaler and the spacer (if needed). - Shake the inhaler well just before each use. Avoid spraying this medicine into your eyes. - Remove the cap and look at the mouthpiece to make sure it is clean. - Prime the inhaler the first time you use it. Point the inhaler away from your face. Spray into the air 4 times. You also need to prime it when you do not use the inhaler for more than 3 days in a row. - To inhale this medicine, breathe out fully, trying to get as much air out of the lungs as possible. Put the mouthpiece just in front of your mouth with the canister upright. - Open your mouth and breathe in slowly and deeply (like yawning), and at the same time firmly press down on the top of the canister once. - Hold your breath for about 5 to 10 seconds, and then breathe out slowly. - If you are supposed to use more than one puff, wait 1 to 2 minutes before inhaling the second puff. Repeat these steps for the next puff, starting with shaking the inhaler. - Clean the inhaler with warm water and air dry it thoroughly. Do this at least once a week. - Missed dose: Take a dose as soon as you remember. If it is almost time for your next dose, wait until then and take a regular dose. Do not take extra medicine to make up for a missed dose. - Solution (for nebulizer): Keep the medicine in the foil pouch until you are ready to use it. Store the vials at room temperature, away from heat and direct light. The vials in the pouch must be used within 2 weeks after you open the foil pouch. - Solution concentrate (for nebulizer): Keep the medicine in the foil pouch at room temperature, away from heat and direct light, until you are ready to use it. Use the vial right away after you open the foil pouch. - Inhaler: Store the canister at room temperature, away from heat and direct light. Do not freeze. Do not keep this medicine inside a car where it could be exposed to extreme heat or cold. Do not poke holes in the canister or throw it into a fire, even if the canister is empty. - Inhaler: Throw away the canister after either 200 sprays have been used. Ask your pharmacist if you are not sure. Do not place the canister in water to see if the canister is full (float test). Drugs and Foods to Avoid: Ask your doctor or pharmacist before using any other medicine, including over-the-counter medicines, vitamins, and herbal products. - This medicine should not be used together with similar inhaled medicines, including albuterol, isoproterenol, metaproterenol, pirbuterol, or terbutaline. - Some medicines can affect how levalbuterol works. Tell your doctor if you are using any of the following: - Blood pressure medicine - Diuretic (water pill) - Medicine for depression (including an MAO inhibitor or TCA during treatment or within 2 weeks after the last dose) Warnings While Using This Medicine: - Tell your doctor if you are pregnant or breastfeeding, or if you have kidney disease, diabetes, heart disease, heart rhythm problems, high blood pressure, thyroid problems, or seizures. - This medicine may cause increased trouble breathing (paradoxical bronchospasm), which may be life-threatening. - If you use a corticosteroid medicine to control your asthma, keep using it as instructed by your doctor. - If any of your asthma medicines do not seem to be working as well as usual, call your doctor right away. Do not change your doses or stop using your medicines without asking your doctor. - Your doctor will check your progress and the effects of this medicine at regular visits. Keep all appointments. - Keep all medicine out of the reach of children. Never share your medicine with anyone. Possible Side Effects While Using This Medicine: Call your doctor right away if you notice any of these side effects: - Allergic reaction: Itching or hives, swelling in your face or hands, swelling or tingling in your mouth or throat, chest tightness, trouble breathing - Chest pain, fast, pounding, or uneven heartbeat - Dry mouth, increased thirst, muscle cramps, nausea, vomiting - Increased difficulty with breathing - Tremors or shaking If you notice these less serious side effects, talk with your doctor: - Dizziness, nervousness - Runny nose, sore throat If you notice other side effects that you think are caused by this medicine, tell your doctor Call your doctor for medical advice about side effects. You may report side effects to FDA at 1-800-FDA-1088 Last Updated: 11/6/2020
<urn:uuid:d1513a8e-e7cd-4f58-8010-7052de7033b9>
CC-MAIN-2020-50
https://ssl.adam.com/content.aspx?productid=45&pid=45&gid=0914&site=StLukesmedicalcenter.adam.com&login=STLK7926
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141181482.18/warc/CC-MAIN-20201125071137-20201125101137-00388.warc.gz
en
0.889677
1,411
2.53125
3
New Bern in Craven County, North Carolina — The American South (South Atlantic) New Bern Battlefield Park New Bern Battlefield Park 300 Battlefield Parkway, New Bern, NC 28562 Here you will find pristinely preserved Confederate defensive earthworks on the 27 acres owned by the New Bern Historical Society. A ferocious battle was fought here on 14 March 1862. Call 252-638-8558 to arrange for a private tour, if desired. Or, take the Self-guided Walking Tour that directs you to the 15 spots along prepared trails explaining the actions and movements of the combatants. Five miles north, in the city of New Bern, is a very significant collection of Civil War artifacts in the Attmore-Oliver House, built circa 1790-1800. It now serves as the headquarters of the New Bern Historical Society. Erected by New Bern Historical Society. Location. 35° 2.874′ N, 77° 0.946′ W. Marker is in New Bern, North Carolina, in Craven County. Marker can be reached from Battlefield Parkway south of Taberna Way. Touch for map. Marker is at or near this postal address: 300 Battlefield Parkway, New Bern NC 28562, United States of America. Other nearby markers. At least 8 other markers are within 4 miles of this marker, measured as the crow flies. Battle of New Bern (within shouting distance of this Battle of New Bern (approx. ¼ mile away); Fort Point (approx. 2.4 miles away); James City (approx. 2.7 miles away); Richard Dobbs Spaight (approx. 2.8 miles away); a different marker also named Battle of New Bern (approx. 4.1 miles away); USRC Diligence (approx. 4.1 miles away); U.S.C.G.C. Pamlico (approx. 4.1 miles away). Touch for a list and map of all markers in New Bern. Also see . . . New Bern Battlefield Park. New Bern Historical Society (Submitted on September 9, 2014.) Categories. • War, US Civil • Credits. This page was last revised on June 16, 2016. This page originally submitted on September 9, 2014, by Don Morfe of Baltimore, Maryland. This page has been viewed 420 times since then and 35 times this year. Photos: 1, 2, 3, 4, 5. submitted on September 9, 2014, by Don Morfe of Baltimore, Maryland. • Bernard Fisher was the editor who published this page.
<urn:uuid:fc958679-72dc-4b6e-8584-a198d7d6aa4e>
CC-MAIN-2018-34
https://www.hmdb.org/marker.asp?marker=77010
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210615.10/warc/CC-MAIN-20180816093631-20180816113631-00066.warc.gz
en
0.925907
542
2.6875
3
New Planet That Can Support Life Found Astronomers from the Carnegie Institution of Washington and the University of California, Santa Cruz have announced another habitable planet found in the universe. Image Credit: Time They announced it in Astrophysical Journal Letters and the planet is quite interesting compared to other planets found that may support life. The new planet, playfully called GJ667Cc, is about four and a half times the size of Earth and is found 22 light-years away. Because of the size of the planet scientists say that it's probably not a gas planet and is more like our Earth where it has rock and water. They also say that it's most likely around the same temperature as Earth. Since it's such a perfect candidate for life could this be where the UFOs and aliens are coming from? It is possible but since it's so very far away it would be a hard for them to get here without very superior technology that we couldn't comprehend. Image Credit: Alien UFO Research Since NASA launched Kepler scientists around the world have found almost 200 planets that could support life.
<urn:uuid:abaab955-882b-4763-9b5f-22c3b68ff0c1>
CC-MAIN-2015-27
http://ufodigest.com/article/new-planet-can-support-life-found
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097246.96/warc/CC-MAIN-20150627031817-00082-ip-10-179-60-89.ec2.internal.warc.gz
en
0.964926
222
2.75
3
Early Years Foundation Stage Tiny Teddies Day Nursery in Balsall Common use the Early Years Foundation Stage (EYFS) to plan a fun and stimulating environment for all the children according to their own individual needs and abilities, see "www.education.gov.uk(www.education.gov.uk)":http://www.education.gov.uk. Each child will have their own key person to bond with who will be responsible for their well-being and personal development. The key person will build close relationships with your child and work in partnership with you to ensure your child feels happy and secure in nursery. They will plan activities for each child in their key group to ensure they progress and develop as individuals. As well as their learning needs the key person will also ensure all their care needs are met. With babies this may be giving bottles, or weaning onto solid foods or potty training as they become toddlers. With the older children this may be encouraging independence in personal hygiene or developing social skills. The key person will be first point of contact for parents, and will answer any queries or direct them to the relevant manager if required.
<urn:uuid:f884ace8-3ae8-45f6-8f41-eee941ec6d21>
CC-MAIN-2019-09
http://www.tinyteddies.co.uk/our-nurseries/ballsall-common/early-years-foundation-stage.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247489425.55/warc/CC-MAIN-20190219061432-20190219083432-00155.warc.gz
en
0.957459
235
2.6875
3
Students want to work on songs. SONGS (the story goes) are the ultimate test of the singer’s ability and technique. I’d like to proffer an alternative view – one rarely discussed on message boards or forums: the over-reliance on repertoire as the means of training the singing voice. In academia, NASM guidelines require certain amounts and types of repertoire to be studied. Therefore, we get semesters of studying X amount of songs in X amounts of languages as validation of the singer’s technique. Voice teacher boards are replete with teachers begging others for repertoire. “I need a song for a singer that is (8, 16, 21) and is a (fill in the vocal category) that can’t (sing high, loud, fast, slow). Does anyone have any suggestions?” Rather than realizing the voice is limited by its faults, repertoire is chosen which disguises these faults, sometimes very elegantly. When a teacher’s pedagogy is geared toward the learning of repertoire to the exclusion of the technique and physical skills of singing, you can be sure that the singer is going use ‘band aids.’ ‘Band aids’ are short term solutions for an immediate problem, usually having to do with some element presented in a song. These band aids take hundreds of forms: squeezing the glutes, pressing out the lower inguinal area for a high note, vowel shaping in a certain way to gain resonance on a particularly challenging or dull note, lifting certain parts of the vocal mechanism to ‘tune’ the pitch. The list of band aids goes on and on. When these band aids no longer work, students merely seek out the assistance of other band aids. “A drowning man will grab anything that floats.” When those band aids fail, the student might even look for another teacher – one with a different repertoire of band aids. What we get as an audience is a voice that has been LITERALLY patched together – and SOUNDS it – from a plethora of band aid techniques. This is merely so the singer can ‘survive.’ Putting a band aid on a voice in need of major surgery is one one of the most common and tragic elements in vocal pedagogy today. Band aids are a poor substitute for a failing technique. Our current Zeitgeist does little to disabuse the security of these types of quick fixes. When hundreds of YouTube videos are offered for any number of ‘tips,’ or websites offer “5 simple steps to a better voice!” – we have reduced the experience of singing into ready-made McDonaldized answers. The alternative to the ‘repertoire centric’ approach is a less-popular, glamorous, or exciting road. It is also a rarer to find among teachers of today. This is the path of acquiring skill of function first – prior to the acquisition of a performance or audition repertoire. This way of working is not in vogue, precisely because it is not exciting nor flashy. Vocal skills are acquired through a slow process of work and an unlocking of the instrument over time. What good does it do a singer to know all about the intricacies of the melodies of Fauré, or the Lieder of Schubert if they sing so poorly? Who cares if a student knows the entirety of Winterreise but cannot sing it in a way that releases the MUSIC? Singing in Italian, French, German, or Spanish is not a guarantee that you will learn to sing better at all. It is very common for someone to be intensely MUSICAL, yet not be able to sing. However, a RELEASED and UNLOCKED voice becomes INHERENTLY musical. Music is released by the proper function of the instrument! So you see – it’s a backwards way of going about the work of voice training! Also, and this point is rarely understood: the unlocking of a voice allows it to sing MORE repertoire, rather than LESS. This last point is worth extensive consideration. So, what are teachers in academia to do? Perhaps a re-evaluation of the process needs to occur at the highest levels in our country? Those in power should be encouraged to understand the acquisition of vocal technique is simply not the same as learning to play the piano, violin, or flute. Those instruments are already BUILT. Perhaps students could take daily time with their teacher, coming in to merely vocalize for 10-15 minutes a day? A teacher could develop ‘vocal office hours’ where students come at their leisure to merely be exercised and vocally ‘worked out.’ This protocol would come closer to the training methods used in the schola cantorum, where singers worked daily with a master. It would also lessen the student’s need to practice extensively and would also prevent the voice from ‘backsliding’ in the 6 days between lessons, when a young singer may have NO idea of HOW to practice correctly. What good does practice do, if the practice is POOR? Also, the inclusion of vocalization material that is modest and moderate can become required in juries. Freed from the linguistic demands of classical music, the singer can sing on varying vowels on works of Concone, Panofka, Sieber, or any other thousands of collections available. These can function as gateways to repertoire for the student under development. Additionally, why not give students 8 bars of an aria or song, instead of the whole thing? Those desperate for a song can get the easiest portions, and feel a sense of accomplishment while building the voice? Then repertoire CAN service the building of the instrument. Of course, all of these changes would have to occur because of a shift in the ETHICS and VALUES of voice teaching. If you only see repertoire as the goal of vocal training, then a paradigm shift might be alarming. However, I’m reminded of a powerful part of Daniel Coyne’s book “The Talent Code,” which I am excerpting below. We need to re-evaluate our thinking about vocal training and what that means. Repertoire is merely ‘the game.’ If a vocal athlete is not able to play the game because their training is not complete, can there be any other result but a broken voice or a broken heart? Band aids are no substitute for the singer who truly wishes to SING from the heart. Some of the most fruitful imitation I saw took place at Spartak Tennis Club in Moscow, a freezing junkpile that has produced a volcano of talent: Anna Kournikova, Marat Safin, Anastasia Myskina, Elena Dementieva, Dinara Safina, Mikhail Youzhny, and Dmitry Tursunov. All in all, the club produced more top-twenty-ranked women than the United States did from 2005 to 2007, as well as half of the men’s team that won the 2006 Davis Cup, and it’s done all that with one indoor court. When I visited in December 2006, the club resembled a set for a Mad Max movie: shotgun shacks, diesel-shimmering puddles, and a surrounding forest filled with large, hungry, and disconcertingly speedy dogs. An abandoned eighteen-wheeler was parked out front. Walking up, I could see shapes moving behind clouded plastic windows, but I didn’t hear that distinctive thwacking of tennis racquets and balls. When I walked in, the reason became evident: they were swinging all right. But they weren’t using balls. At Spartak it’s called imitatsiya—rallying in slow motion with an imaginary ball. All Spartak’s players do it, from the five-year-olds to the pros. Their coach, a twinkly, weathered seventy-seven-year-old woman named Larisa Preobrazhenskaya, roamed the court like a garage mechanic tuning an oversize engine. She grasped arms and piloted small limbs slowly through the stroke. When they finally hit balls—one by one, in a line (there are no private lessons at Spartak), Preobrazhenskaya frequently stopped them in their tracks and had them go through the motion again slowly then once more. And again. And perhaps one more time. It looked like a ballet class: a choreography of slow, simple, precise motions with an emphasis on tekhnika—technique. Preobrazhenskaya enforced this approach with an iron decree: none of her students was permitted to play in a tournament for the first three years of their study. It’s a notion that I don’t imagine would fly with American parents, but none of the Russian parents questioned it for a second. “Technique is everything,” Preobrazhenskaya told me later, smacking a table with Khrushchev-like emphasis, causing me to jump and speedily reconsider my twinkly-grandma impression of her. “If you begin playing without technique, it is big mistake. Big, big mistake!” Coyle, Daniel. The Talent Code: Greatness Isn’t Born, It’s Grown. Random House, 2010.
<urn:uuid:05a2eb86-9256-4edc-9a9a-c3570e500033>
CC-MAIN-2018-47
https://petersenvoicestudio.com/2015/12/16/the-limitations-of-voice-building-through-repertoire/
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741324.15/warc/CC-MAIN-20181113153141-20181113175141-00115.warc.gz
en
0.953283
1,949
2.84375
3
Treatment of shale gas wastewater in the Marcellus : a comparative analysis This analysis focused primarily on three main treatment methods which were re-use, recycle, and disposal wells. The re-use treatment option is when wastewater is mixed with source water in order to meet fracturing water requirements. With this option, the hope is that the wastewater for re-use will require little or no treatment at all. The second treatment option is the recycle option. This option provides high quality water for re-use or discharge to the environment using a recycling technology. The credibility of this option is heavily dependent on its ability to recycle almost all of the wastewater with little or none left for disposal or treatment. The third option is well disposal. This entails disposing all of the wastewater into a deep formation. The software used for building the model is called @Risk. The model’s costs were estimates from recent research to capture the risks and uncertainties associated with wastewater disposal. The model revealed that re-use option remains the most cost effective treatment method to reduce overall water management cost in the Marcellus. The re-use option is most viable when a hydraulic fracturing schedule is continuous (no significant storage requirement) and infrastructure is available to transport wastewater from one fracturing operation to the other. The recycle option is the second most viable disposal option. This option is most effective when the hydraulic fracturing schedule is staggered in both time and distance because distilled water from recycling facilities can be easily discharged into the environment or stored. The most unfavorable option for wastewater management at the Marcellus is the well disposal option due to the high cost of trucking wastewater to disposal wells in neighboring states or counties. It also requires the highest usage of fresh water. A well disposal option can be favorable at the onset of a hydraulic fracturing schedule when there are low levels of infrastructure, hydraulic fracturing programs are not continuous or localized in proximity, and the volume of wastewater does not exceed the capacity for injection. In this case, disposal wells can be more favorable than recycle or re-use if they are in close proximity to drilling sites.
<urn:uuid:3ee7718a-50de-4998-85d1-989a5ba8f159>
CC-MAIN-2024-10
https://repositories.lib.utexas.edu/items/738f7365-c063-4db2-b153-fb2f6cacf403
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474569.64/warc/CC-MAIN-20240224212113-20240225002113-00265.warc.gz
en
0.925856
419
2.875
3
A student in Canada wore the same pair of jeans for 15 months straight as an experiment to see if he or the jeans suffered any ill effects. Image by Franz Pfluegl/Shutterstock It looks like they survived, but of course there's no word on what his dorm roommate suffered. Most people find they have to break in a new pair of jeans. Most people find that stretching the stiffness out takes about twenty minutes and getting them really soft takes about a month. The student, at the University of Alberta, decided to break them in for 200 days in a row without washing them. The student bought them for $167 dollars, which would make one inclined to break them in properly, in late 2009. Fifteen months later, he washed them, but only after having his Human Ecology professor swab them for bacteria build up. I'm assuming the teacher wore a double pair of gloves, because no special care was taken with these jeans. The student wore them almost every day, and sometimes slept in them When he spilled something on them, he wiped it off with a towel. To keep them from getting smelly, he triple bagged them put them in his freezer once a fortnight. When the Human Ecology teacher's swabs came back from the lab, they showed 'normal bacteria levels'. Then, the student wore the jeans for 13 days after washing them, and had them re-tested. The bacteria levels were much the same as they were for the fifteen month ripeness. The professor stressed that this was probably due to the protective powers of underwear, and that washing clothes was important, but had to admit that even at their worst, the jeans did not contain any E. coli or fecal matter. The student received a new pair of jeans for Christmas 2010, and wishes to test them by wearing them for 20-24 months and having them retested. We'd like to salute this student, for his bravery, his commitment, and his ability to go 15 months without pooping his pants. Congratulations, sir. Science owes you a great debt. Via dBune News.
<urn:uuid:b2e96311-9d1e-47cc-b2d0-1ad71b4e5b59>
CC-MAIN-2013-48
http://io9.com/5740063/student-wears-same-jeans-every-day-for-15-months-+-for-science?tag=clothes
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163932627/warc/CC-MAIN-20131204133212-00056-ip-10-33-133-15.ec2.internal.warc.gz
en
0.984747
427
2.796875
3
Urie Bronfenbrenner’s ecosystems educational theory affects how educators view children who are struggling in the classroom as well as demonstrate the environmental factors that affect a child’s development and learning. If we recall Bronfenbrenner’s ecosystems theory and apply that to a school: the microsystem would be students and objects with whom the student directly interacts in the classroom. Another microsystem within which the student exists is at home. The mesosystem incorporates the multiple microsystems and includes the interactions between those microsystems. Circumstances in each affect the other. The macrosystem includes the school policies and any cultural contexts and policies (e.g. Common Core) within which the student lives and of which he or she has no control. The other system that has effect on the child is chronosystem. This is the cumulative effect of the experiences of the child’s life. With all of these variables that affect a child’s development and learning, what can an educator do to provide students with the most opportunities for success? First, an educator must be aware of the fact that there are all of these potential reasons for student success or challenges. Next the educator must create a safe, nurturing environment in which students can feel comfortable enough to take risks in learning and feel support when they struggle.
<urn:uuid:dc30eced-3dd6-43a2-b7bb-9ada6ec79d1f>
CC-MAIN-2017-30
https://aelafleur.wordpress.com/2014/02/25/urie-bronfenbrenner-in-the-classroom/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424090.53/warc/CC-MAIN-20170722182647-20170722202647-00042.warc.gz
en
0.943587
273
3.875
4
CALGARY – The Alberta and federal governments have collected vast quantities of data on air and water quality in the oilsands, but have regularly failed to analyze, interpret and report on that data. A study released Monday criticized the Joint Oil Sands Monitoring initiative, a team effort by environmental agencies in Ottawa and Edmonton, because the partnership has yet to publish annual reports on the data it has collected. “The question is when do we start seeing a lot more effort to convert that data into information?” the lead author of the report and Clarkson University professor Philip Hopke said. Alberta and Ottawa teamed up to establish JOSM in 2012 in an effort to collect more data on the air, water, wildlife and biodiversity in and around Fort McMurray, the main hub for oilsands extraction in the province. Hopke’s study evaluated whether a joint effort has improved the scientific integrity of environmental monitoring in the oilsands compared with the separate provincial and federal monitoring in place before 2012. “I’d probably give them a solid ‘B,’” he told reporters in Edmonton. “There’s a lot (of data) out there and if you really knew what you were doing, you could pull a lot of useful information out, but for most ordinary people that would be extremely difficult to do at this stage,” Hopke said. Hopke, and a team of researchers from Canada, the U.S. and the European Union, provided a number of recommendations to JOSM on how to improve. He urged JOSM to publish reports on the data, to make the data more easily searchable for both academics and the general public and to develop a plan that outlines exactly what data is most important for the government to track. “It’s really hard to know if you’ve hit the target, if you don’t know what the target is,” he said.
<urn:uuid:715c906c-14c6-452f-9ff4-84ec659df774>
CC-MAIN-2017-13
http://business.financialpost.com/news/energy/not-enough-reporting-analysis-of-oilsands-environmental-data-scientists-say
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188891.62/warc/CC-MAIN-20170322212948-00155-ip-10-233-31-227.ec2.internal.warc.gz
en
0.94057
407
2.515625
3
In preparation for the 39th Annual Scientific Meeting on July, The National Academy of Science and Technology, Philippines (NAST PHL) had recently held the Mindanao Regional Scientific Meeting on March 13-14 at the SMX Convention Center in Davao City. Guided by the theme: "Attaining Sustainable Development Goals: Fisheries 20/20", the first of three regional scientific meetings focused on the Philippine fishing industry and the relevant factors and avenues that affected it. Sustainable Development Goals In 2015, the United Nations had set 17 goals to “end poverty, protect the planet, and ensure prosperity for all”. These goals, known collectively as the Sustainable Development Goals (SDG), are to be attained within a 15-year span: 1. No Poverty 2. Zero Hunger 3. Good Heath and Well-Being 4. Quality Education 5. Gender Equality 6. Clean Water and Sanitation 7. Affordable and Clean Energy 8. Decent Work and Economic Growth 9. Industry, Innovation and Infrastructure 10. Reduced Inequalities 11. Sustainable Cities and Communities 12. Responsible Consumption and Production 13. Climate Action 14. Life Below Water 15. Life on Land 16. Peace, Justice and Strong Institutions 17. Partnerships for the Goals Life below Water Seeing the significant link of the country's fishery resources to multiple SGDs, the NAST Agricultural Sciences Division focused on SDG 14, which brought forth the event's sessions: Sustainable Sardine Production focused on the institutionalization / strict implementation of the seasonal fishing ban to help fish population recover from the fishing activities of the fishing industries, and the development of more effective tools in identifying optimal fishing periods to maximize sustainability. The session on the Status of the Philippine Seaweed Industry saw figures on the current state of its production, import and export, and its standing on the local and international markets were presented. The conduct of additional research on the effects of climate change on the industry was one of the priorities during the session. The Fisheries Ecosystem session identified the need for a policy on the institutionalization of an ICT ecosystem for the fishery and aquatic resources in Mindanao, and the use of adaptive planning and management for the Agusan River Basin, with importance given to the Agusan Marsh. Highlighted during the Dialogue on Waste Management in the Sardine / Tuna Canning and Processing Industries was the need for research on using waste materials such as fish blood and oil for value-adding and / or conversion to other by-products. The session on Fishing Boats examined current boat and net designs, while warranting the need for the development of newer, more effective models that would increase vessel stability and speed, as well as net durability and lifespan. Finally, the Science Legislative Forum on Blue Economy emphasized a marine-based economic approach that integrates conservation and the practice of sustainable resource extraction and use. In conclusion, the session called for the support for the creation of a Department for Fisheries and Aquatic Resources, to better address the concerns of the marine sector.
<urn:uuid:4b1f91b1-2971-4fd0-8a27-bb4652081e86>
CC-MAIN-2021-39
https://region9.dost.gov.ph/news/638-philippine-fisheries-takes-first-leg-of-regional-scientific-meeting
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057424.99/warc/CC-MAIN-20210923135058-20210923165058-00658.warc.gz
en
0.910756
640
2.640625
3
Save $5.00 per 10-Pack (12% OFF) - Delivers in 1 to 2 weeks! There is probably no ancient culture that is more alluring to kids than Ancient Egypt; kids just seem to be naturally attracted to the glitz and glamour of this once-powerful civilization, which left behind such breathtaking monuments and priceless treasures. In this issue, Ancient Egypt, for kids, is unraveled in all its glory, with special attention paid to Egypt’s intricate religious system, which included dozens of gods and goddesses. Kids will learn that the glue that held Ancient Egypt together was its dynastic structure; their mighty kings sent their well-trained armies to claim new territories, encouraged the arts and sciences, and controlled the social order that kept their civilization flourishing for thousands of years. They’ll explore the many fields in which Egyptians left their mark – including medicine, agriculture, engineering, and, of course, architecture. All of the most incredible facts about the timeless pyramids can be found here; kids will be amazed to learn that it took 2.5 million blocks, 20 years, and 4,000 workers to build the Great Pyramid – and there are 29 others! One of the most memorable things about Ancient Egypt, for kids, has to be the bejeweled sarcophagi and well-preserved mummies they left behind, and no detail is spared in describing the artistic skill and precise embalming techniques that went into their creation.
<urn:uuid:b651b80b-603d-45d0-866c-a0081d8853ee>
CC-MAIN-2013-48
http://www.kidsdiscover.com/shop/issues/ancient-egypt-for-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163982738/warc/CC-MAIN-20131204133302-00013-ip-10-33-133-15.ec2.internal.warc.gz
en
0.954095
302
2.890625
3
What is good leather quality? Leather is a natural durable and flexible material created by tanning animal rawhides and skins. The most common raw material is cattle hide. It can be produced at manufacturing scales ranging from artisan to modern industrial scale. Leather is used to make a variety of articles, including footwear, automobile seats, clothing, bags, book bindings, fashion accessories, and furniture. It is produced in a wide variety of types and styles and decorated by a wide range of techniques. The earliest record of leather artifacts dates back to 2200 BC. What is good leather quality? It is easy to identify the vast differences in skin quality that exist from one species to another. Leather is not always equal in quality. Gender, age, nutrition, feeding and general care all affect an animal’s skin. Also there may be differences within a skin of one animal. Below we explain how some of these factors can affect skin quality. Differences in quality of cow leather (but also applies to other species): - Age: The quality of hides from older animals is generally poorer than that of younger animals. - Gender: Female hides have a denser fibre structure and a finer grain structure. - Gender specific activities: The stability of the skin’s fibre structure deteriorates the more often a male animal mates and, for a female, the number of times she gives birth. Castrated oxen tend to have a finer skin structure. - Nutrition: Fresh forage promotes better quality skin. - Animal husbandry: The skin of animals kept on open pastures has a superior texture. - Climate: A harsh and cold climate promotes a good skin quality. Leather is used for many different applications. As car leather, for shoes, for leather straps and belts, for leather suits or buttery soft leather gloves. Diverse demands are placed on leather, depending on its use. Furniture leather should be easy to maintain, while being soft and warm. Shoe leather should be robust, waterproofed, soft, heat-retaining and breathable. Car leather should be easy to maintain and should be impervious to heat, cold and wear. However it’s used, leather should be durable and easy to clean. It should not tear, bleach, smell unpleasant or contain pollutants. These are the essential “leather qualities” or “leather properties”. However, leather can’t be soft, robust and easy to clean and maintain all at the same time. Neither can it be paper thin and soft and also tear-proof. In particular, the sensitivity of especially high quality leather, such as the soft aniline leather of a luxury leather jacket, of exotic leather or of an expensive set of furniture is often misjudged. Because the object was so expensive customers therefore expect that it would be very easy to clean and maintain the leather. But quite the opposite is true. Valuable leathers are as sensitive as silk. With regular use the beauty diminishes rapidly, while incorrect cleaning can even ruin the material. Car leather is considered to be particularly robust. Most of the vehicle manufacturers require more than 40 quality criteria that must be fulfilled. Stringent wear tests must be passed. It must be resistant to suntan lotion and bug spray. Many chemicals are not allowed to be used and the leather emission level is tested. As a result, the leather is extremely durable, but no longer soft and warm to the touch. The tanner and the producer of a leather object therefore should establish their own, verifiable quality parameters, depending on the desired properties of leather. These parameters should take into account the animal species and the rawhide. Differences in the quality of the individual sections of a skin, including the possibility of skin damage when cutting, must also be considered. Only a limited quantity of skins can be worked upon at any given time during the manufacturing process of leather and all of them do not behave the same in each run. Often the tanner will need to make minor changes during the process, which can lead to deviations from one batch to another. Differences can be detected depending on the quality control limits set. Apart from the production quality, the longevity of leather depends on certain other factors too. An important element for long-lasting pleasure of a a leather object is the handling of it. If leather is regularly cleaned and maintained and not excessively overused and if the basic rules in dealing with leather are respected, you will prolong the enjoyment of this durable and robust material. Standards of quality leather There are countless national and international standards to determine the quality of leather. Also, the labelling of leather products is regulated by national and international standards. Additionally, many leather manufacturing and processing companies have extra internal standards and requirements. Overall, the standards set for the quality of leather are correct and necessary. But they are also filled with a lot of grey areas, loopholes and weaknesses. In Europe, confusing rules exist on labelling of split leather. In some cases, the type of leather must be declared and in some cases not. In Germany for instance, coated split leather is used in vehicles, without the obligation to inform the customer. An end user cannot differentiate between the two. When the surface of split leather is embossed with a grain structure it is virtually impossible to tell the difference. In such cases, the standards must do more to ensure transparency, so the customer knows exactly what type of leather they are getting. Standards are often referred to when seeking a verifiable solution or to reach verdicts in legal disputes. However, they are inconsistent, ambiguous and open to interpretation. They do not mention when one particular rule or standard should take priority over the other. An end consumer must be able to find out the quality of the material and be able to compare prices and qualities. The leather standards and norms must do more to protect the end consumer by ensuring dealers and manufacturers provide clear, transparent information.
<urn:uuid:bd03c42e-4d74-4021-b239-224c13ccf6f7>
CC-MAIN-2021-31
https://ciceroleather.com/what-is-good-leather-quality/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154085.58/warc/CC-MAIN-20210731074335-20210731104335-00370.warc.gz
en
0.932782
1,222
2.84375
3
RASP security is a server-oriented technology that is activated as soon as an application runtime begins. What it means is that it can be triggered by function calls, that are present in the source code of an app or an external coat on an app with a single command. But within the code base, most of the developers prefer to use trigger calls as it allows them to formulate a customized app based on the requirements of a business. When you follow this method, it becomes easy to detect the protection parameters and optimize unnecessary risks. RASP and comparison with WAF When you incorporate a traditional security measure, the WAF would be on top of the web applications. It is going to inspect only the incoming HTTP traffic, for abnormal usage patterns or attack payloads. This is only going to work in situations when the source of the attack is well-known. It is for this reason that firewall rules can be developed in WAF. But when it comes to the question of emerging threats, developers are not in a position to formulate rules for blocking them. With RASP security it is known to integrate into an app that detects the sources of threat and goes on to block them at the same time. But it is known to provide a completely different security paradigm in comparison to the traditional form of security approaches. What they go on to do is to protect an app where it blocks all suspicious traffic. RASP security and its benefits One of the major benefits of RASP security is that it works from the interiors of an application. No longer it is going to remain as an isolated network protection method like a firewall. Such a feature allows RASP to provide a conceptualized form of service, that is going to take the necessary information from the code base, data logic etc. - Penetration testing in an intelligent manner- With RASP security you may conduct an effective form of penetration testing to detect any form of vulnerabilities. Just like the case, it has been mentioned that the software would detect anomalies and respond. Even it is possible to re-program and test the different sections. - Know- how about a runtime attack- At a traditional level, the developers could not collect, runtime application security data and they had to rely on guesses or speculations. Things have gone on to change with the integration of RASP security software. It is going to empower the developers with increased visibility into application runtime security threats. This allows them to align the development with real-time events. - Incident response in a smarter manner- RASP technology sets the tone for faster incident response. With the active log-in features, developers get an idea about the performance of a real-time application. Once again this is going to further empower their monitoring capabilities, which allows them to design security needs. - extending support to compliance development- it is not only about providing security RASP contributes to the development of other applications. With real-time data and in-depth testing, developers can detect the prime source of attacks along with vulnerabilities. This is going to allow them to develop secure applications with fewer vulnerabilities every time. - Legal application protection- Coming to a legal application it is an asset for every organization. But with modern advancements protecting legal applications is not an easy task. Most of the legacy apps are formulated in an older format and it makes them difficult to render security against modern attacks. The use of RASP technology deals with this issue as the legacy app is wrapped with an additional set of security features where there is no longer a need to touch the code base. - An additional layer of protection- When you align it with the existing IPS and WAF security setups, RASP provides an additional layer of security that is known to improve security and reduces the scope of vulnerabilities. The moment you are using the firewall it protects the app from incoming threats and actively monitors the runtime. It is going to prevent any form of threat that tends to emerge in the app. - Cost-effective- It is a cost-effective module in comparison to the security that it goes on to provide. Even it turns out to be a low-maintenance form of technology that detects threats and makes a note related to the log-in details. So in a single package, you get the best of analytical, development and protection benefits. - Self-protection- The moment it is deployed RASP serves as an independent form of the security system. It goes on to detect threats and removes them with the minimum amount of human intervention. Hence it goes on to formulate a self- protection environment, where an application is going to protect itself, with precise threats and runtime data. The reasons why you should be considering implementing a RASP solution - It should be easily deployed and requires the least amount of maintenance. Otherwise when the landscape of threat changes it may become ineffective - There should be minimum impact on the performance of the application. Without it the security layer would end up losing its entire meaning. This is both at the traditional and unknown concept. - It needs to extend support for multiple frameworks along with languages - It needs to work seamlessly with other security tools - A RASP solution has to be accurate with the false positives, which means that it is not going to block any form of genuine traffic. - It should be autonomous, provide support for cloud based applications with all round the clock monitoring and prevent threats. To conclude Appsealing platforms are of the opinion that RASP solutions with WAF solutions may turn out to be a game changer for your business. More so if an organization needs a quick turnaround and need to respond threats quickly. The applications of RASP security can be mapped over to a RASP layer that has the ability to prevent attacks with a higher degree of accuracy.
<urn:uuid:4f644eb7-7c40-4425-849b-f9382e94dbe2>
CC-MAIN-2023-06
https://businesszag.com/the-working-of-runtime-application-security/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500017.27/warc/CC-MAIN-20230202101933-20230202131933-00187.warc.gz
en
0.950148
1,187
2.546875
3
More research is needed to better understand the association between a history of childhood abuse and incarceration, according to a McMaster University researcher. Claire Bodkin helped lead a study on the prevalence of childhood abuse among prisoners. “We need to know the health status of people in prison, in order to improve health care and other services within correctional facilities, and to develop strategies to prevent further criminal justice system involvement,” said Claire Bodkin, first author and a medical student of McMaster’s Michael G. DeGroote School of Medicine. Bodkin developed the research with Fiona Kouyoumdjian, who is an assistant professor in the department of family medicine. The McMaster team found that through research spanning 31 years, the abuse was all-encompassing (physical, sexual, and emotional) and included neglect. Based on these studies, the prevalence of a history of child abuse affected 65.7 per cent of women compared with 35.5 per cent of men. Sexual abuse was far more prevalent in women prisoners (50 per cent) than it was men (22 per cent). Neglect, meanwhile, affected 52 per cent of women and 42 per cent of men. “Prisons should incorporate trauma-informed approaches, to recognize that most people have a history of child abuse, and to prevent further trauma,” Bodkin said. “But at the end of the day, prisons are an inherently distressing environment. People in prison have minimal control over their daily activities or interactions, and are isolated from their coping mechanisms and support systems. A trauma informed approach only goes so far.” WATCH: OPP announce results of their child sex abuse strategy since 2006 The prevalence of childhood physical abuse was 48 per cent and the prevalence of childhood emotional abuse was 52 per cent, with no significant differences between men and women. “We have a health equity issue on our hands, and we need to talk about how to reduce rates of incarceration in the first place,” Bodkin said. “We need to ask why this population has such a high prevalence of exposure to childhood abuse, and how to ensure people have access to the health and social services they need in community.” Bodkin added that since most people who experience childhood abuse do not go on to be imprisoned themselves, research should also be done to explore what protects those people from doing so. Researchers on the paper were from the McMaster’s Michael G. DeGroote School of Medicine and its department of family medicine, the Dalla Lana School of Public Health at the University of Toronto, St. Michael’s Hospital, and the School of Population and Public Health at the University of British Columbia. - Liberal MP Han Dong secretly advised Chinese diplomat in 2021 to delay freeing Two Michaels: sources - Canada housing market: What to expect this spring as prices drop - Interested in booking a campsite in Alberta’s mountains? Parks Canada has some tips - Shake Shack to come to Canada in 2024 with first location set for Toronto
<urn:uuid:10d01692-4ef9-4f8b-b3aa-25cf3216b353>
CC-MAIN-2023-14
https://globalnews.ca/news/4983100/childhood-abuse-canadian-prisoners/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00177.warc.gz
en
0.959737
632
2.65625
3
- Ovaries. The best sign of regular ovulation is regular menstruation. If your periods are coming regularly--21 to 35 days apart--you are most likely ovulating. Longer or shorter periods could signify thyroid or pituitary dysfunction, which can be diagnosed through blood testing. Gynos can also evaluate the general state of your eggs, or "ovarian reserve," through specialized blood testing on day three of your period. - Fallopian tubes. Scarring of the tubes sometimes occurs with pelvic inflammatory disease, endometriosis, or pelvic surgery. Your doc can order a special X-ray of your tubes called a hysterosalpingogram (HSG) if she suspects tubal blockage. If a blockage is found, there are multiple procedures that can be performed to clear the path. - Uterus. Uterine anomalies like a septum, polyp or fibroids can impede a pregnancy's implantation. Often these anomalies don't cause any trouble, but if you have a history of super-heavy periods or several miscarriages, your gyno may order an HSG to check out the inner contours of your uterus. If something there is making mischief, it can be surgically removed. Do any of you worry about your fertility?
<urn:uuid:2d5bc83c-2a86-48b3-870f-ccc2941afe65>
CC-MAIN-2014-49
http://www.gynotalk.com/2009/02/how-you-know-if-youre-fertile.html?showComment=1264644406754
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931008720.43/warc/CC-MAIN-20141125155648-00159-ip-10-235-23-156.ec2.internal.warc.gz
en
0.901754
264
2.671875
3
The Tools of Quality Improvement Root Cause Analysis (RCA) When standards are not met, or an adverse event has occurred, it is necessary to conduct a root cause analysis, which means taking a look back at the sequence of events that led to the discrepancy error. The steps include: - Identify the processes involved and keep asking the question, “Why did this happen?” (5 times) - Analyze each step in the process using a process map or flow chart to show what happened and compare that to the established protocol or policy then keep asking why the protocol was not followed. - Once problem-solving has taken place, make the necessary change in the system using a Plan-Do-Study-Act (PDCA methodology) or similar methodology. Failure Mode Effects Analysis (FMEA) FEMA is a risk management technique that looks at current systems to identify an area/process that could potentially cause an adverse event. It is a proactive risk management activity that works by involving all stakeholders to: - Identify the patient care processes that make up the system - Identify the risk in each process - Ask, “What are we doing to reduce the risk?” and take action when gaps are identified. Proactive Interaction (RADAR) RADAR defines ways to interact with people so interactions remain interactions and do not escalate into incidents. We strive to be conscious about the process of threat assessment so we can maintain our safety and the safety of others and to be aware of how we may appear to be threatening to others. RADAR stands for: - Recognize: Use all of your senses. RADAR works by being aware of your surroundings. - Assess: Assess what is happening to everyone, starting with yourself and the environment. - Decide: Decide what to do after you have recognized and assessed. - Action: The decision comes to life. - Results: Evaluate the results. Did you achieve the goals of your action(s)? Plan-Do-Check-Act Cycle (PDCA) PCDA is a dynamic cycle that could be implemented for any process within the organization. It combines planning, implementing, controlling and continual improvement within the realization processes. - Plan: Recognize an opportunity and plan a change. - Do: (select an option for improvement, initiate improvement, and establish success measurements)Test the change. Carry out a small-scale study. - Check: (measure performance)Study. Review the test, analyze the results and identify what you’ve learned. - Act: (modify plan for improvement as necessary to meet established success measurements) Take action based on what you learned in the Check Step: If the change did not work, then go through the cycle again with a different plan. If you were successful, incorporate what you learned from the test into wider changes. Use what you’ve learned to plan new improvements, beginning the cycle again. For more information about our quality initiatives contact: Michael Redmond, senior vice president and COO (603) 547-3311, ext. 1479
<urn:uuid:b0c9c9cf-50f8-44c9-aa36-94488c487a5c>
CC-MAIN-2014-41
http://www.cmf.org/content.aspx?id=1536
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657131846.69/warc/CC-MAIN-20140914011211-00312-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.925076
652
2.96875
3
It is invisible, odorless and tasteless, but lead is nonetheless present in excessive amounts in the drinking water of 74 metropolitan area communities. By the time the state finishes an analysis of water samples from around Illinois, many other municipalities are likely to be found in violation of the federal standard for lead in public water supplies. The realization that something as basic as water carries a dose of a feared substance can be alarming, but some fairly simple measures will reduce the risk. To put the problem in perspective, here are some common questions and answers about lead in drinking water. Why is lead a threat? Although the human body excretes most of the lead that enters it, some accumulates in the blood, teeth and bones. It is the gradual accumulation of this residual lead that can cause health problems. Lead is mainly of concern because of its effect on fetuses, infants and children under 8. It can cause permanent neurological damage, including lowered intelligence, if it builds up in a child's blood. Studies have shown that children with elevated blood lead levels can have IQs as much as 10 percent lower than normal. In adults and children, lead poisoning can result in such health problems as anemia, high blood pressure and kidney ailments. If lead is dangerous, why haven't public water systems tested for it before now? They have. But last year, the U.S. Environmental Protection Agency lowered the allowable amount of lead in water and changed the way in which water suppliers had to test for lead. Now, public water systems are going through two rounds of testing to determine if they comply with the tighter standard. Previously, the federal government said no water system could contain more than 50 parts of lead per billion parts of water, measured from anywhere in their distribution lines. The standard was easy to meet. But the EPA dropped the standard to 15 parts per billion because medical studies have found that smaller amounts of ingested lead than previously suspected can cause slowed mental development in children. In recognition of the fact that lead gets into drinking water mainly from lead pipes within a building, water samples had to be taken at faucets. This new standard has proven much more difficult to meet. If a water system fails in testing, it must undertake a program of public education to alert customers to the excessive lead levels and then begin a water-treatment program to reduce lead readings. How does lead get into drinking water? Water dissolves small amounts of lead from the inside of lead pipes, especially when water stands in pipes for several hours, either in household plumbing or in the distribution lines that connect water mains to each building. Deteriorating lead solder on plumbing is the other major source. But not all plumbing is made from lead. In 1986, Congress banned almost all lead in plumbing solder and greatly restricted the lead content of faucets, pipes, and other plumbing. And older plumbing might be made of galvanized steel or copper. To tell if a pipe or solder is made from lead, scratch it with a sharp object. If it scratches easily and the mark looks silvery, the metal is most likely lead. How significant is drinking water as a source of lead? Of all the lead that the average child is exposed to, drinking water can account for as little as 7 percent and as much as 20 percent, according to government estimates. What are the other sources, and what is being done-or can be done-to control those sources? Since lead was widely used in the past, it is a persistent contaminant in the environment, but the good news is that our exposure to lead is declining because its use has been phased out in such things as gasoline, paint and solder on tin cans. In addition to drinking water, lead can be found in dust and dirt as a leftover from the days when gasoline was leaded. Leaded paint chips and dust are the biggest source of lead for most small children, who play in and even eat the chips. Although it may seem impossible, it's important to keep a toddler's face, hands and toys clean to reduce lead intake from this source. Also, studies have found that lead is more likely to build up in malnourished children than in youngsters who have a balanced diet. Lead-based glazes in ceramic dinnerware can leach lead into food, especially acidic products such as tomato sauce, which speeds up the release of lead. It's best not to store such foods in ceramic dishes, but eating off them is probably safe. (Many hardware and home-center stores carry lead-testing swabs that can be rubbed on suspect ceramic pieces to see if they are leaching lead.) These prohibitions and restrictions have paid off. The government reported last year that the levels of lead in the nation's atmosphere fell by 89 percent between 1982 and 1991. And the amount of lead that the average American ingests has fallen from 200 micrograms a day in 1972 to less than 25 micrograms today.
<urn:uuid:52a1b2f6-691f-4730-8fdb-d71b860245c4>
CC-MAIN-2014-41
http://articles.chicagotribune.com/1993-02-17/news/9303181127_1_drinking-water-public-water-lead
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657135080.9/warc/CC-MAIN-20140914011215-00343-ip-10-234-18-248.ec2.internal.warc.gz
en
0.974661
1,017
3.34375
3
Event-driven architecture seems to be the way of the future for integrations, specifically focusing on designs where low latency, real-time and stability are essential for success. So, what is Event-driven Architecture, and what do you need to know about it before you jump in and start using it? In this blog, we will explore the concepts and benefits of event-driven architecture. We will also provide examples of how event-driven architecture can be applied in real-world scenarios. What is Event-driven Architecture? Event-driven architecture (EDA) is a design approach focusing on creating systems that respond to specific events or triggers decoupled and asynchronously. In an event-driven system, components communicate by sending and receiving events rather than calling each other directly. Read on to find out how this type of architecture enables applications to be more scalable, flexible, and responsive to changes in their Why should you use Event-driven Architecture? A significant advantage of event-driven architecture is its ability to handle large amounts of data. In traditional architecture, components are tightly coupled and call each other directly. This means that if one component becomes overwhelmed with requests, it can affect the entire system’s performance. In an event-driven architecture, however, components are decoupled and communicated via events. This means that components can process events asynchronously, allowing the system to handle a large volume of data without affecting performance. Another advantage of event-driven architecture is its ability to integrate with different systems and technologies. In a traditional architecture, components are often tightly coupled with specific technologies, making it difficult to integrate with other systems. In an event-driven architecture, components communicate via events, which can be easily understood by any system that can receive and process events. This makes integrating different technologies and systems easy, allowing for greater flexibility. In addition to its ability to handle large amounts of data and integrate with different systems, event-driven architecture offers other benefits. For example, it can improve the scalability and resilience of a system. Because components in an event-driven system are decoupled and communicate via events, they can be scaled independently. This means that if one component becomes overwhelmed, it won’t affect the performance of the other components. In addition, because events are typically persisted in a message queue, they can be retried if they fail to be processed, improving the system’s overall resilience. Another advantage of event-driven architecture is its ability to support real-time data processing. In a traditional architecture, components are typically processed sequentially, making it challenging to support real-time data processing. In an event-driven architecture, however, events can be processed as soon as they are received, allowing for real-time data processing. This can be particularly useful for applications that require low latency, such as financial trading systems or eCommerce platforms. What components are used in Event-driven Architecture? The main components of event-driven architecture are the publisher, the event, and the subscriber. The publisher is the component that generates and sends events, the event is the message that is sent from the publisher to the subscriber, and the subscriber is the component that receives and responds to the event. In addition to these core components, event-driven architecture may also include other components, such as event brokers and event stores. An event broker sits between the publisher and the subscriber and is responsible for routing events from the publisher to the appropriate subscribers. An event store is a database or other storage system used to persist events for future processing or reference. How could you use Event-driven Architecture in the real world? A great example of how this can be applied in an eCommerce setting would be a Black Friday sale, where there’s a sudden spike in the number of orders being taken by the website, and potentially the back-end systems can’t keep up with the demand. Having the orders persisted in a message queue ensures the website can still take the orders. The back-end systems can pick up the orders from the message queue as their capacity allows until all events have been processed. This way, no orders are missed, and there is no need for one-off scaling of the existing systems. Another example of how event-driven architecture can be used in an eCommerce environment is the development of a real-time inventory management system. In this scenario, events are triggered whenever a customer purchases on the eCommerce website or app. When a customer completes a purchase, the system triggers an event that indicates that the purchased items need to be removed from the inventory. The inventory management system would then respond to this event by automatically updating the inventory levels in real-time, ensuring that the purchased items are no longer available. Using event-driven architecture in this way allows the inventory management system to be more responsive and efficient. It also enables the eCommerce website or app to provide more accurate information to customers about the availability of products, helping to prevent situations where a customer attempts to purchase an item that is no longer in stock. This can improve the customer experience and help avoid potential revenue losses due to out-of-stock items. Event-driven architecture offers many advantages over traditional architectures; it allows for handling large amounts of data, integrates easily with different systems and technologies, improves scalability and resilience, and supports real-time data processing. These benefits make event-driven architecture a valuable design approach for many systems. If you are interested in learning more about how event-driven architecture can benefit your organisation, please get in touch with us. Our experienced team can provide more information and assist you in implementing event-driven architecture in your systems. So contact us today to learn more and start taking advantage of the benefits of event-driven architecture. Solace is an event management and streaming platform that provides publisher and subscriber services using common protocols like JMS, MQTT, AMQP and REST. Solace also provides a variety of client libraries for different programming languages, such as Java, C, C#, and Python, which enable developers to easily integrate their applications with the Solace broker using the language of their choice.
<urn:uuid:89076c90-53f4-4d02-9073-cdd0178fe745>
CC-MAIN-2024-10
https://www.adaptiv.nz/the-advantages-of-event-driven-architecture/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474660.32/warc/CC-MAIN-20240226130305-20240226160305-00832.warc.gz
en
0.942913
1,259
2.8125
3
WHAT IS PHYSICS? Physics is the study of systems from the very small (sub-atomic particles) to the very large (the Universe itself!). In order to understand these systems, it is necessary to develop “models”. These may be mechanical, schematic, computations or mathematical. WHY STUDY PHYSICS? Studying Physics at this level puts you well on your way to understanding the Universe that we live in. Although there will always be unanswered questions, topic by topic this course delivers methods and explanations that build a fairly complete picture of our world. More than anything, Physics teaches you to solve problems. You will learn to analyse data and diagrams and extract the useful information and then apply your learning to find solutions. If you like solving puzzles; you will love Physics. As well as opening doors to a range of degree courses, the subject is highly prized in industry. Not only are the skills learned relevant in an array of professions but the practical, problem solving nature of the subject makes it excellent preparation for most working environments. IB PHYSICS COURSE Physics is an experimental science so you will complete a range of practical work over the course. This will go alongside the theory and solving problems in lessons. Many problems in Physics involve the use of maths so you need to be confident in rearranging equations, using indices, using trigonometric functions, working with angles and plotting graphs. The topics are: Core (SL and HL) Additional higher level (HL only) Topic 1 Measurements and uncertainties Topic 9 Wave phenomena Topic 2 Mechanics Topic 10 Fields Topic 3 Thermal physics Topic 11 Electromagnetic induction Topic 4 Waves Topic 12 Quantum and nuclear physics Topic 5 Electricity and magnetism Topic 6 Circular motion and gravitation Topic 7 Atomic, nuclear and particle physics Topic 8 Energy production Option D: Astrophysics (SL and HL) Students are usually assessed at regular intervals during the course with past examination questions. The final assessment comprises of 3 examination papers at the end of the course which are worth 80% of your final mark. There are a combination of multiple choice, short answer and extended response questions. The Internal Assessment (IA) is worth 20% of the final mark and should be approximately 10 hours of work. It will be a practical investigation that will explore in more detail a topic that you are interested in that is linked to the course. This is written up and submitted during the course. You will also complete the Group 4 Project where you will collaborate with other students.
<urn:uuid:9c8222e1-4d9c-4a4f-8005-9f5d6f4024c5>
CC-MAIN-2020-34
https://gkconsultants.org/ib-group-4-physics/?pcid=
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735882.86/warc/CC-MAIN-20200804191142-20200804221142-00182.warc.gz
en
0.919777
523
3.390625
3
Thu Nov 1st, 2012 at 07:05:51 AM EST The Imperial College, London, report that demolished fantasy forecasts for the UK of massive balancing needs supplied by use of Open Cycle Gas Turbines (OCGT), led to some discussion concerning the importance to the system of Combined Cycle Gas Turbines (CCGT). (See UK Wind Power "Debate" : Latest). Ernst & Young (commissioned by Spanish and Portuguese energy companies Acciona and EdP), have brought out a report throwing new light on the comparison between wind turbines and CCGTs, for the EU27 and for specific European countries. Wind technology was selected as the reference renewable energy source in this study and is compared here to Combined Cycle Gas Turbine (CCGT). This is based on the idea that natural gas is progressively becoming a significant source of electricity generation due to lower CO2 emissions compared to other fossil fuels and to its price competitiveness. The analysis presented in this report could be extended to other renewable or conventional energy sources. The present study provides insight on a number of costs and benefits of renewable energy policy measures, which are currently not systematically taken into account in the decision-making process: ► Job creation (direct and indirect) of policy measures in the renewable energy sector ► Contribution to the GDP and additional tax revenues ► Energy security ► Integration of wind capacities on the network ► Environmental externalities (CO2 emissions) ► Impact of wind power on electricity pool prices Several existing studies have analysed the respective Levelized Cost of Energy (LCOE) of these two technologies but did not include a comprehensive analysis of their additional economic costs or benefits. Value Creation of Renewable Energy Policies (pdf) In other words, comparisons based on the levelized cost, expressed in per MWh over the estimated lifetime of the capital investment, do not take into account positive and negative externalities that the report proposes to quantify. (Added to the Wind Power series.) Details and methodology can be found p.48 ff of the report. But this chart shows an overall synthesis of total costs and benefits for wind and CCGT across the EU27: This reads from the outer edges - wind on the left, CCGT on the right - in to the middle, where the total costs are shown in euros/MWh. The two outer columns represent the LCOE: the standard metric used for comparison, according to which wind levelized costs are higher than CCGT levelized costs. Two LCOE items are common to both wind and CCGT, capital expenditure (CAPEX) and operating expenditure (OPEX). (It is the size of the capital investment that raises wind's LCOE, compared to the low capital outlay involved for CCGT). In addition, CCGT has fuel costs (zero for wind) and the cost of CO2 emissions (zero for wind). In the next column moving in, are negative external costs that are added to the LCOEs. For wind, it is the cost of grid integration (not including connection to the grid, already included in CAPEX, see p.58 for details). For CCGT, security of fuel supply, or the "additional cost attributed to natural gas consumption due to the economic losses generated by price fluctuations" (see p.57). The third columns moving in show the contribution of each technology to GDP (details from p.50 on): - directly, via the expenditures necessary to building and operating the plant - indirectly, via the additional activity of suppliers selling goods and services to the companies building and operating the plant - through induced effects, via increased consumption from the additional income generated throughout the supply chain (Keynesian, that's K-e-y-n-e-s-i-a-n, multiplier) The contribution to GDP is subtracted from the subtotal costs of the two outer columns. And the result, in yellow, shows a considerably higher cost per MWh for CCGT than for wind - since capital and operating expenditure for wind make a higher contribution to domestic GDP creation (while fuel costs for CCGT mostly contribute to GDP in gas-producing countries outside the EU27). Along with estimating the contribution to domestic GDP, the report offers numbers for local job creation. These are presented under the same headings, Direct, Indirect, Induced, with the same logic as described above. For the EU27, this chart sums up the findings: Tax revenues for each technology are calculated, under the headings VAT, Corporate tax, Local taxes, Income tax, Social taxes. As there is no common EU tax system, these estimations were made for specific countries only (details p.54 ff.) The tax revenues mostly come from VAT and corporate taxes. Depending on domestic tax policy, social taxes can also be a significant source from employees and employers. More country studies Ernst & Young carried out the same cost and benefit analysis as for the EU27, for the above six EU countries seen separately: Germany, France, Spain, Portugal, Poland, the UK. This chart sums up the net costs calculated for each of these countries, compared to the total EU27: Merit Order Effect The merit order effect by which renewables reduce wholesale electricity prices is briefly considered (p.44 ff), citing evidence we have previously seen from Germany, but presenting new estimations for Spain based on data from the Comisión Nacional de Energía. From which it appears that wind power lowers prices, each year, by more than the cost of the subsidies allocated to wind (even though these rise in the aggregate as more wind capacity is built), resulting in net savings. For five of the six countries studied, as for the EU27 taken as a whole, the net costs of wind are lower than the net costs of CCGT. Wind also creates more local jobs and contributes more tax revenue to national and local authorities. Through the merit order effect, it reduces electricity spot prices to an extent that "buys back" subsidies, if not more. Case of the UK The UK stands out among the six countries considered, as also against the overall EU27 numbers. The net costs of CCGT are lower than those of wind, (though in roughly the same bracket). This results from the share of locally-produced fuel in total gas consumption: at 63% this is much higher than for the other countries considered, or for the overall EU27. Consequently, fuel purchases for CCGT contribute more to domestic GDP. In terms of job creation, "the UK's gas plant value chain is more effective in creating new jobs": Ernst & Young estimate job.years per million euros invested as 9 for UK CCGT, 8 for UK wind. Tax revenue generation is calculated as identical for the two technologies. No evidence is offered concerning the merit order effect on spot prices in the UK. Ernst & Young present (p.36 ff) further analysis on the influence of the load factor on net cost estimation. The load factor chosen for the wind estimation was 24%. However, UK wind net costs become cheaper than CCGT's with a wind load factor of >28%, or with a CCGT load factor of <48%. (By comparison, for the EU27, wind net costs are lower than CCGT's whatever the load factor of either technology). In addition, the report presents (p.39 ff) a stress test on the future evolution of the domestic gas share in the UK (the main variable influencing CCGT net costs). CCGT net costs rise above those of wind from 0.8% annual decrease in domestic gas share. A projection of that rate of decrease gives: with a decrease in the domestic share of UK by more than 0.8 point/ year, the Net cost of wind will become lower than the net cost of CCGT. This scenario, in which UK will have a domestic share of 37 % in 2040, can be considered as realistic. In other words, UK policy-makers would be ill advised to bet on gas against wind.
<urn:uuid:c2beb782-4100-4a15-928d-8383d6d14abf>
CC-MAIN-2018-09
http://www.eurotrib.com/story/2012/11/1/65817/6658
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815560.92/warc/CC-MAIN-20180224112708-20180224132708-00154.warc.gz
en
0.942483
1,662
2.8125
3
|Subscribe to receive updates about DiscoverFrance.net!| |Your full name "Without poets, without artists, men would soon weary of nature's monotony. The sublime idea men have of the universe would collapse with dizzying speed. The order which we find in nature, and which is only an effect of art, would at once vanish. Everything would break up in chaos. There would be no seasons, no civilization, no thought, no humanity; even life would give way, and the impotent void would reign everywhere." Guillaume Apollinaire (1880-1918), Italian-born French poet, critic. To say that the French revere their time spent soaking up arts and culture is an understatement. Particularly in Paris where an abundance of venues is concentrated within a few square miles it is common to find the French devoting their weekends to exploring the wealth of museums and cultural havens; many of the provincial areas are likewise blessed with impressive monuments to art and architecture. Not surprisingly, one can attribute both the people's pride in their heritage, as well as the sheer extent of France's artistic wealth, to a long, colorful and often tumultuous history. Much of the French thirst for cultural enrichment and education dates back to the Crusades, when books, artistic influences, mathematics, and philosophical thought were carried back to the Gallic people from distant, advanced civilizations. Though relatively few artifacts remain from earlier eras, art in ancient Gaul may be traced back through the Merovingian period (beginning in the late fifth century), to the Roman Empire (starting in the first century B.C.), the ancient Celts (fifth century B.C.), and even to the Cro-Magnons of Paleolithic times (10,000 to 32,000 years ago). During the past millenium, many of the icons and most prolific minds in philosophy, literature, poetry, theatre, painting, sculpture, architecture, and science can be credited to the French or, in some cases, expatriates living in France. Encouragement and support for artistic endeavor has been a hallmark of France's kings, emperors, and presidents to this day. In order to preserve such a rich cultural heritage, and to make it more widely available outside of Paris, a Ministry of Culture was established by the French government in 1959. In this chapter, we will discuss France's fascinating history of art painting, sculpture, and architecture while related topics such as literature, theatre and music may be accessed through the Table of Contents on other parts of this site. Author: Ian C. Mills © 1998-2002 All rights reserved PRE-HISTORIC, CELTIC & ROMAN PERIODS The earliest artistic remains in France date from the Paleolithic Period. By far the best known examples of prehistoric rock art are the cave paintings of Altamira, Font de Gaume, Lascaux, Les Combarelles, Niaux Cave, Les Trois Frères, and other sites in southern France and northern Spain, which were discovered during the late 19th and early 20th centuries. These paintings, associated with the remains of the Cro-Magnon peoples, have been widely reproduced in popular books and periodicals and have thus become familiar to the general public. Periods of Celtic culture from the late 5th century B.C. to the 1st century A.D., and of Roman occupation from the 1st century to the 5th century A.D., saw the building of towns and the creation of artifacts. MEROVINGIAN AND CAROLINGIAN PERIOD After the decline of the Roman Empire, France was left as it had been before the Roman conquest, divided among many small regional tribes. These became small kingdoms and duchies between the 2nd and the 5th century A.D. Christianity spread during this period, leading to the foundation of many abbeys and monastic communities in the 5th to the 7th century. Few artifacts survive from the Merovingian period, named for the dynasty of Frankish kings that began with Clovis (c.481). The most notable Merovingian survival is the baptistery of Saint Jean at Poitiers, dating from the 7th century. Merovingian churches, with floor plans based on the Roman basilica, had stone walls, timber roofs, prominent bell towers, and echoed classical motifs in their ornamentation. In the 8th century, under the authority of Charlemagne the first king to create a unified realm a great building campaign began. Carolingian churches were intricately decorated with pictorial murals, mosaics, goldwork, and tapestries. The richness of Carolingian church interiors was equaled by the illuminated manuscripts created at the monasteries of Reims, Tours, Metz, and Paris. The best preserved of Carolingian churches is the Chapel of Charlemagne (796-804) at Aachen (Aix-la-Chapelle), whose octagonal sanctuary reflects the influence on Carolingian art of the Early Christian, Byzantine, and Greco-Roman traditions. The Aachen chapel is modeled on the octagonal Byzantine church of San Vitale (526-47) in Ravenna. In larger Carolingian churches, built from the 8th to the 10th century, several important innovations were made, including the construction of an elaborate westwork, or entrance facade flanked by towers; an ambulatory, or semicircular aisle around the altar, allowing worshipers to circulate without disturbing services; and the use of the composite pier instead of a simple, massive column to support the upper walls and roof above the nave. NEXT: ROMANESQUE PERIOD Alden Rand Gordon Source: 1997 Grolier Multimedia Encyclopedia v.9.0.1
<urn:uuid:c5a45d81-c2df-4ca8-b971-5ff48460b870>
CC-MAIN-2016-26
http://www.discoverfrance.net/France/Art/DF_art.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00012-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949556
1,206
2.921875
3
Farming + Rural Life | 1920 | Silent | B/W Southern states of America, cotton picking Intertitle - "Land and People". Map of America indicating the old south. A line is drawn to indicate the equator and camera pans across the rest of the world. Intertitle - "A warm climate and fertile soil favoured plantation in the Old South". Map of the coastal plain, flood plain and Highlands indicated with an arrow. Aerial view of the area. Intertitle - "Home work was varied". Women roll out a large log and one begins to chop it with an axe, a girl cooks something over a fire. View of a large farmhouse surrounded by trees. A girl turns the wheel A woman knits, another beats a rag against a table. Intertitle - "Village life was quiet". Small village in the old South, typical film western kind of scene, people milling about, women look over a balcony, clock tower in the background. Intertitle - "Local schools were primitive". Inside a small school, children sit around with no desks. A girl approaches a teacher with a book. Intertitle - "Population was densest where the soil was most productive". A map showing distribution of population in 1860, white dots appear on the map to indicate population. Intertitle - "Products" Men working in the field sowing crops. Map showing the growing seasons on the plains. Intertitle - "The Old South needed cheap labour". The map shows the location of tobacco, sugar cane, rice and cotton. Men picking in the fields. "Timber" chopping wood, clearing forests, felling trees. Steam train carries the logs. Horse and cart takes logs, two men stand on the logs. They roll them onto the ground. "Communications". Men get on a horse and cart and wave at a small child as they leave. "The roads were poor". They are pulled along through bumpy roads and through water. "Large use was made of canals and rivers for transportation". A boat is pulled along a river by horses on the embankment. "Plantation Life - the planters lived in spacious homes". A large house with grand pillars and children running around the garden. A woman in an elegant dress walks through her garden. At the big house, Black people play music, sing and dance and clap their hands. A woman wears a headscarf and smokes a pipe. Intertitle - "The evenings were lively with music and dancing". Inside the big house, the white planters dance. To request more details on this film, please contact us quoting Film number 4634.
<urn:uuid:cc64c3d3-febc-4c8e-9469-6a3dc22cad0a>
CC-MAIN-2017-51
http://www.huntleyarchives.com/film/4634
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948512584.10/warc/CC-MAIN-20171211071340-20171211091340-00456.warc.gz
en
0.936893
545
3.125
3
The French–Italian Concordia research station in Antarctica is not your typical location for a medical practice, but working there has its perks. Physician Alexander Kumar and Erick Bondoux, two residents passing austral winter at Concordia, snapped this photo of the dramatic aurorae over the station on July 18. The outpost is so isolated that no one can come or go for months during the winter, during which time the 13 people there experience complete darkness for more than 100 consecutive days. Add to that an elevation of roughly 3,200 meters, and the conditions at Concordia station are, in a word, harsh. Enter Kumar, who, as a human spaceflight research M.D. for the European Space Agency, is charged with investigating "how far human physiology and psychology can be pushed towards a future manned mission to Mars," according to his Web site. In the meantime he and his crew members do get to enjoy the almost otherworldly aurora australis, or southern lights. Aurorae over Earth's poles are the product of charged particles streaming from the sun and colliding with atoms and molecules in the upper atmosphere. At most latitudes the planet's magnetic field repels those particles, but the thinner shielding over the poles allows protons and electrons to penetrate more deeply. The green glow photographed by Kumar and Bondoux emanates from oxygen atoms in the atmosphere returning to their lowest-energy state after being excited by charged solar particles.
<urn:uuid:d0e85e6f-8f9b-4042-b743-e75866fa4992>
CC-MAIN-2020-24
https://www.scientificamerican.com/gallery/southern-exposure-eerie-green-glow-captured-over-antarctic-base/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347405558.19/warc/CC-MAIN-20200529152159-20200529182159-00537.warc.gz
en
0.951332
295
3.21875
3
HSV : Type1 and Type2 - We’re gonna discuss regarding the varieties of herpes infection in this article. Well, there are two major types of herpes malady that may affect any person at any age. HSV (Herpes Simplex Virus) kind 1 is a kind of malady which commonly affects oral part such as lips, tongue & cheeks. Though the signs & symptoms commonly form on the lips & surrounding areas. The major reason of the development of HSV1 type is kissing. Applying contaminated lipstick, utensils, cleaning your face through contaminated towel and any varieties of contact to the herpes sickness can cause the emergence of herpes infection. The second variety of herpes is HSV2 type. HSV2 Type usually affects genital portion like anus, vagina, penis, buttock and urethra. These’re the extremely general area where genital herpes commonly produces indications and signs. Genital herpes can be also classified as sexually transmitted disease. Sexually transmitted disease generally emerges while having sex. Genital herpes is a hugely common viral skin malady as considering the actuality that in only America 776,000 persons get new cases of genital herpes sickness. This is also a truth that genital herpes mainly does not cause any kind of symptoms and indications though sometime it may produce numerous symptoms & indications. Herpes Signs And Symptoms - Experts have identified certain herpes signs and symptoms which a human being can get through herpes infection. It’s a reality about herpes sickness that numbers of people do not get herpes symptoms and indications. Though, this does not mean that if you’ve herpes sickness then you’ll not develop any sorts of symptoms & indications. Many people do receive severe indications that influence their day to day existence. The signs & indications can evolve any parts of your body though oral & genital portions are the extremely general body portions where the herpes signs commonly evolve. Most of the people usually evolve itching, burning and tingling sensation right before the occurrence of herpes outbreaks. After receiving outburst you will firstly evolve cold sore near the affected portion. Lips are the very general portion where the cold sore commonly develops. Painful blister, watery blister, muscle pain, fluid filled wounds & signs such as flu are the very general symptoms & signs of herpes sickness. Vaginal discharge, ache around the affected part, ulcer & scabs can be caused by the genital herpes. Some person may get symptoms and indications such as fever blister, fever, inflamed lymph nodes, nausea & painful urination. All the above mentioned signs can affect any person at any age. Effects of Oral Herpes Oral Herpes is an infection caused by the herpes simplex virus, is estimated to be present in 50 to 80 percent of the American adult population
<urn:uuid:7b660ebb-bcaa-451b-bf79-54053c752ca0>
CC-MAIN-2021-10
http://443277080573891549.weebly.com/blog/hsv-type1-and-type2-herpes-signs-and-symptoms
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178365454.63/warc/CC-MAIN-20210303042832-20210303072832-00356.warc.gz
en
0.904359
567
2.671875
3
Croatia’s President Kolinda Grabar-Kitarovic with Croatian diaspora in Canada holding the flag of WWII Nazi-Ustashi Independent State of Croatia Croatia’s president, the former deputy NATO secretary general for public diplomacy Kolinda Grabar-Kitarovic, decided to pay homage to Nazis of the Ustasha Nazi puppet regime of Croatia shot by Yugoslav partisans at the end of World War II. Grabar-Kitarovic’s tone deafness in choosing Victory in Europe week to honor dead Nazis shocked the Balkans and the rest of Europe. The Ustasha, along with their Slovenian and Serb loyalists to the Nazi puppet regime, were killed by the partisans under the command of anti-fascist guerrilla leader Josip Broz Tito. Most of the Ustasha were killed in the Austrian town of Bleiburg, as well as in the Slovenian towns of Macelj and Tezno. The Ustasha were attempting to flee among hordes of other refugees from Tito’s forces who were mopping up the last remaining pockets of Nazi resistance in Yugoslavia. The Ustasha actually sought the protection of British forces that were advancing from Austria toward the Yugoslav border. It was known to the Ustasha that the Serbian Chetnik guerrilla leader, the non-Communist, Draza Mihailovic, who had battled the Ustasha had maintained a special relationship with the British Special Operations Executive (SOE) intelligence and military officials while also cooperating with the Axis powers of Germany and Italy. However, the British had struck a deal with Tito’s partisans at the expense of the Chetniks and although they did not directly aid the Ustasha, they had no problem letting the Office of Strategic Services (OSS) and the Vatican help spirit out of Yugoslavia some of the top Ustasha officials in the infamous «Rat Line» operation coordinated with Croatian Catholic war criminal Monsignor Krunoslav Draganovic. British intelligence had, for some time, played an underhanded role in the Balkans. British intelligence had ties to the «Crna Ruka» (Black Hand) operation of which Gavrilo Princip, the assassin of Austrian Archduke Franz Ferdinand, was a member. Princip’s assassination of Ferdinand in 1914 helped trigger off World War I. At the same time, British intelligence was kick-starting another Black Hand group in Palestine, known as «al-Kaff al-Aswad» in Arabic, which began attacking Jewish settlers at the same time British Lord Balfour was promising Palestine to the Zionists as a future Jewish homeland. The British and their American allies, mostly through the auspices of NATO, continue to play dangerous intelligence games in the Balkans. A head of the WWII Independent State of Croatia – Ante Pavelić together with the Roman Catholic monks Many of the Ustasha leadership, including the Nazi puppet dictator Ante Pavelic, managed to escape the firing squads planned by Tito’s partisans and they fled to Argentina, courtesy of hastily-prepared Vatican passports authorized by Pope Pius XII. During the Cold War, Draganovic, Pavelic, and other Croatians served as exiled members of the Central Intelligence Agency’s Operation Gladio. From 1959 to 1962, Draganovic helped the CIA run Ustasha clandestine agents in Yugoslavia who passed on intelligence about the Tito government to the West. Grabar-Kitarovic laid wreaths at Ustasha memorials in the three towns where the Ustasha forces met their fates. The memorial in Bleiburg serves as a rallying point for neo-Nazis annually who come to pay tribute to the Nazi Ustasha killed by Tito’s forces. Grabar-Kitarovic was accompanied at the ceremonies by Croatian Prime Minster Zoran Milanović, a member of the Social Democratic Party and a former member of Croatia’s delegation to NATO in Brussels, and who, as is typical for a Soros loyalist, is a strong promoter of gender equality and human artificial insemination. Grabar-Kitarovic represents a phalanx of Nazi sympathizers and aspirant nations who serve in senior government positions throughout NATO countries in Eastern Europe, including the three Baltic States, Albania, Hungary, Poland, and Ukraine. NATO headquarters has always been rife with pro-Nazi senior officers on its staff, particularly those from Denmark, the Baltic nations, and Belgium. Rasmussen was the prime minister of Denmark before becoming NATO Secretary-General. Grabar-Kitarovic’s actions, during the period the world was commemorating the 70th anniversary of the defeat of the Nazis has led to condemnations from her own country, as well as others, including Russia and Serbia, that helped defeat Hitler and his allies. In April 2015, Grabar-Kitarovic failed to attend a commemoration at the Nazi concentration camp of Jasenovac where an estimated 83,000 people died at the hands of the Ustasha. The victims, although primarily Serbs, also included Roma (gypsies), Jews, and anti-Nazi Croatians in that order, mainly because the names of the many of the Roma killed were never registered. The CIA’s interest in using Yugoslav minority groups led by Nazi and neo-Nazi elements is illustrated in a SECRET limited copy document, dated October 1985, titled «Yugoslavia: Internal Security Capabilities». The document points out that Yugoslavia’s decentralized internal security forces after Tito’s death in 1980 provided some unique opportunities to make common cause with those seeking to foment «ethnic or interregional conflict» in the country. The CIA took comfort in the fact that in 1985, Yugoslavia’s state security network was «an array of regional and provincial organizations only loosely controlled by the federal government». In other words, Yugoslavia was a sitting duck for penetration by CIA-supported Nazi emigré groups, particularly the Croatians and Albanians. Ustasha leader Draganovic arranged for the Nazi «Butcher of Lyon,» Klaus Barbie, to escape to Argentina at the end of World War II. When Barbie asked Draganovic why he was helping him to escape, the Catholic prelate tipped his hand on future Western intelligence operations in the Balkans and Europe, replying, «We have to maintain a sort of moral reserve on which we can draw in the future». That «moral reserve» would later be used by the CIA inside Yugoslavia to incite ethnic tensions to bring down the Communist-led government. In fact, the CIA report appears to relish in the fact that Albanians in Kosovo were the first to rebel against the federal government in 1981, the year after Tito’s death. The CIA document also states that for any significant regional discontent to materialize, the Yugoslav People’s Army (YPA), «the national institution least affected by regional divisions,» would have to be dealt with by the external forces hoping to capitalize on Yugoslavia’s ethnic divisions. The 1981 Kosovo riots by Albanian nationalists apparently had the tacit support of the regional Kosovo communist leader and his two top security officials. They were removed from office by the federal government. A redacted paragraph providing more information on the Kosovo officials may include details of previous contact with them or their associates by the CIA station in Belgrade. The CIA report does state that Yugoslav Interior Minister Dobroslav Culafic stated that in 1984 and 1985, «16 underground organizations and groups with 362 members had been uncovered» in Kosovo. The former Interior Minister, Stane Dolanc, is quoted in the CIA report as stating that the Kosovo Communist leadership failed to apprise Belgrade on the extent of the Albanian nationalist problems in Kosovo. The CIA report also describes nascent nationalist uprisings in Croatia, Vojvodina, and Bosnia-Herzegovina. The CIA report mentions the Croatian “rebellion” of 1971, which saw a number of Croatian nationalists propose rights for the Croatian language and the idea of incorporating Herzegovina into the Yugoslav republic of Croatia. A neo-Ustashi Croat family today The Croatian nationalist rebellion of 1971, now dubbed by the Sorosites and one of their their virtual house organs, Wikipedia, as the “Croatian Spring,” was put down by force and among those jailed was the future first president of independent Croatia, communist-turned-nationalist Franjo Tudjman. The current president, Grabar-Kitarovic, is a member of Tudjman’s party, the Croatian Democratic Union, seen by many as the successors to the Nazi Ustasha fascists. From Croatia to Ukraine and Romania to Latvia, there is a resurgence of Nazism in Europe, brought on by decades of machinations by the CIA, National Endowment for Democracy, U.S. Agency for International Development (USAID), and Soros’s Open Society Institute. This resurgence could be referred to as the «Fourth Reich Lite». Zagreb 1941 – a capital of the Nazi-Ustashi Independent State of Croatia Originally published on 2015-05-19 Author: Wayne Madsen Source: Strategic Culture Foundation Origins of images: Facebook, Twitter, Wikimedia, Wikipedia, Flickr, Google, Imageinjection, Public Domain & Pinterest. Read our Disclaimer/Legal Statement! Donate to Support Us We would like to ask you to consider a small donation to help our team keep working. We accept no advertising and rely only on you, our readers, to keep us digging the truth on history, global politics and international relations. [wpedon id=”4696″ align=”left”] Ustashi Croat soldiers are killing Serb prisoner in Jasenovac death camp during WWIISave In his latest interview for Serbia’s National Public Service Radio, Srdja Trifkovic discusses the geopolitical significance of the Balkan Peninsula, through the centuries, in the context of today’s complex strategic equation in Southeastern Europe. Q: The Balkan Peninsula is an area where empires, cultures and religions have clashed for centuries. For starters, can we define the geostrategic significance of the Balkans, or at least to outline some of its permanent features? ST: Those permanent features are primarily geographic. The peninsula is the land bridge between Central Europe and the Middle East. At the same time, it is the point of encounter and ... A report on August 15th from Russian Television alleged that the Ukrainian government that the U.S. installed in February of this year was resorting to internationally banned white phosphorous firebombs in order to help destroy the million people who lived in the now Ukrainian separatist capital of Donetsk. It lands super-hot and starts fires and burns to death almost anyone it touches. The Ukrainian separatists are the residents in Ukraine’s southeast, where Viktor Yanukovych, the Ukrainian President, was elected overwhelmingly by the votes of the people in this region in 2010. They reject the government that Obama installed, and are therefore seeking independence from it. ... 50 years after the June 1967 Israeli conquest of all of Palestine, the US Alliance-backed, invasion-, occupation- , theft- , genocide-, lying- and race-based pariah state of Apartheid Israel still comprehensively violates all basic human rights of the Occupied Palestinians. The Zionist ethnic cleansing of 90% of Palestine means that the Two-State Solution is dead and demands comprehensive Boycotts, Divestment and Sanctions (BDS) against genocidally racist, nuclear terrorist Apartheid Israel and all its supporters. The World must demand an end to race-based Apartheid Israel after the example of post-Apartheid South Africa and its replacement by a unitary state in Palestine with ... Vladislav B. Sotirovic, “Who are the Albanians? The Illyrian Anthroponomy and the Ethnogenesis of the Albanians – A Challenge to Regional Security”, Serbian Studies: Journal of the North American Society for Serbian Studies, Vol. 26, 2012, № 1−2, ISSN 0742-3330, 2015, Slavica Publishers, Indiana University, Bloomington, USA, pp. 45−76Origins of images: Facebook, Twitter, Wikimedia, Wikipedia, Flickr, Google, Imageinjection & Pinterest.Read our Disclaimer/Legal Statement!Donate to Support UsWe would like to ask you to consider a small donation to help our team keep working. We accept no advertising and rely only on you, our readers, to keep us digging the truth on ... Friday, a Russian SU-27 did a barrel roll over a U.S. RC-135 over the Baltic, the second time in two weeks. Also in April, the U.S. destroyer Donald Cook, off Russia’s Baltic enclave of Kaliningrad, was twice buzzed by Russian planes. Vladimir Putin’s message: Keep your spy planes and ships a respectable distance away from us. Apparently, we have not received it. Friday, Deputy Secretary of Defense Robert Work announced that 4,000 NATO troops, including two U.S. battalions, will be moved into Poland and the Baltic States, right on Russia’s border. “The Russians have been doing a lot of snap exercises right up against ... History has repeatedly demonstrated the need to view with the greatest skepticism U.S. imperialism’s justifications for its endless wars and interventions. Need we mention the 1964 U.S.-manufactured Tonkin Bay incident, wherein a virtually non-existent Vietnamese navy was accused of attacking a U.S. destroyer? That false flag pretext was employed to launch the Vietnam War, during which four million Vietnamese were slaughtered in a 10-year U.S. conflagration verging on genocide. Or the more recent Iraq “weapons of mass destruction” lie that resulted in the U.S. murder of 1.5 million Iraqis? Even if the latest sarin gas accusations against Syrian President Bashar Assad should ... My choicest political adviser is God who told me to run for the Presidency Rev. Pat Robertson, quoted in the Church Times, March 1988. When all countries lived under absolutist governments the Churches enjoyed a much closer relationship with the State than they do in democratic societies. Some of most cruel rulers in history were happily accommodated by the Church. (Vlad the Impaler was a convert to Roman Catholicism). In recent centuries the Roman Church has always favoured authoritarian regimes that have allowed it privileges, while opposing liberal and democratic governments that have not. For example, in 1862 Pius IX concluded a ... For almost 2 decades, the US pursued a list of ‘enemy countries’ to confront, attack, weaken and overthrow. This imperial quest to overthrow ‘enemy countries’ operated at various levels of intensity, depending on two considerations: the level of priority and the degree of vulnerability for a ‘regime change’ operation. The criteria for determining an ‘enemy country’ and its place on the list of priority targets in the US quest for greater global dominance, as well as its vulnerability to a ‘successfully’ regime change will be the focus of this essay. We will conclude by discussing the realistic perspectives of future imperial ... While it is certainly true that the Jewish people have relatively deep roots in the land that is today known as Palestine and Israel, this area has been a crossroads since the origins of the human species. In fact the oldest known Homo sapiens fossil outside of Africa was recently found in modern-day Israel, dated at approximately 180,000 years old. Neanderthal bones have also been found in the Levant.In historical times the Palestine region or parts of it have been controlled by numerous different peoples and regional powers, including the Canaanites, Amorites, Ancient Egyptians, Israelites, Moabites, Ammonites, Philistines, Assyrians, Babylonians, ... How many people have been killed in the wars in Afghanistan, Iraq, Syria, Yemen and Somalia? On Nov. 18, a UN press briefing on the war in Yemen declared authoritatively that it had so far killed 5,700 people, including 830 women and children. But how precise are these figures, what are they based on, and what relation are they likely to bear to the true numbers of people killed?Throughout the U.S.-led war in Afghanistan, the media has cited UN updates comparing numbers of Afghans killed by “coalition forces” and the “Taliban.” Following the U.S. escalation of the war in 2009 and 2010, a report by McClatchy in ... Gavrilo Princip was first buried in secret in an unmarked grave at the Theresienstadt or Terezin prison following his death on April 28, 1918. His remains were exhumed and transferred to Sarajevo on July 7, 1920. This was Gavrilo Princip’s grave until 1939 when a Chapel was built to replace the grave. The other conspirators were also interred in this grave. Bogdan Zerajic’s remains were also reburied here. The assassination occurred on the Orthodox holiday, Vidovdan or St. Vitus’ Day, Sunday, on June 28, 1914. For this reason the conspirators were called the “Vidovdan Heroes” and the Chapel memorial was named “The ... For centuries, the strategic Balkan Peninsula has featured as a slice of Europe over which wars have been fought, treaties made and broken. It became a vital pawn in the carve-up of nations after World War i, had the boundaries of its ethnic enclaves confused under Tito’s regime, then its various nationalist feelings taken advantage of and played against each other in the latest push for its colonization by the EU. In this latest process, one nation has been demonized in the mind of the public: Serbia. In the words of British political economist Rodney Atkinson, “The grossest calumny in the continuing ... The reason why the U.S. Government must be prosecuted for its war-crimes against Iraq is that they are so horrific and there are so many of them, and international law crumbles until they become prosecuted and severely punished for what they did. We therefore now have internationally a lawless world (or “World Order”) in which “Might makes right,” and in which there is really no effective international law, at all. This is merely gangster “law,” ruling on an international level. It is what Hitler and his Axis of fascist imperialists had imposed upon the world until the Allies — U.S. ... The Imperial Anatomy of Al-Qaeda. The CIA’s Drug-Running Terrorists and the “Arc of Crisis” As the 9th anniversary of 9/11 nears, and the war on terror continues to be waged and grows in ferocity and geography, it seems all the more imperative to return to the events of that fateful September morning and re-examine the reasons for war and the nature of the stated culprit, Al-Qaeda. The events of 9/11 pervade the American and indeed the world imagination as an historical myth. The events of that day and those leading up to it remain largely unknown and little understood by the ... There have been at least two countries in Europe in recent history that undertook ‘anti-terrorist’ military operations against ‘separatists’, but got two very different reactions from the Western elite. The government of European country A launches what it calls an‘anti-terrorist’ military operation against ‘separatists’ in one part of the country. We see pictures on Western television of people’s homes being shelled and lots of people fleeing. The US and UK and other NATO powers fiercely condemn the actions of the government of country A and accuse it of carrying out ‘genocide’ and ’ethnic cleansing’ and say that there is an urgent ... Barack Obama is the first two-term American president to have presided over war every day of his tenure in office. He bequeaths to a Trump administration ongoing operations in Afghanistan, continuing drone strikes in northwest Pakistan, the consequences of the 2011 destruction of Libya, the instigation of civil war in Syria, US sponsorship of the brutal Saudi interventions in Yemen, and the civil conflicts in Ukraine, the Caucuses and across Africa. Obama’s blood-soaked legacy, however, is most graphic in Iraq. There is a bitter irony in this, given the fact that he was elected in 2008 largely on the basis of ... The EU and NATO are evil institutions. These two institutions are mechanisms created by Washington in order to destroy the sovereignty of European peoples. These two institutions give Washington control over the Western world and serve both as cover and enabler of Washington’s aggression. Without the EU and NATO, Washington could not force Europe and the UK into conflict with Russia, and Washington could not have destroyed seven Muslim countries in 15 years without being isolated as a hated war criminal government, no member of whom could have travelled abroad without being arrested and put on trial.Clearly, the presstitute media ... “Srebrenica” has become the symbol of evil, and specifically Serb evil. It is commonly described as “a horror without parallel in the history of Europe since the Second World War” in which there was a cold-blooded execution “of at least 8,000 Muslim men and boys.” The events in question took place in or near the Bosnian town of Srebrenica between July 10 and 19, 1995, as the Bosnian Serb army (BSA) occupied that town and fought with and killed many Bosnian Muslims, unknown numbers dying in the fighting and by executions. There is no question but that there were ... The president of Turkey, Recep Tayyip Erdogan, speaking at a conference entitled the “The Spirit of Turkey’s New Security,” referring to the Treaty of Lausanne, said:“The Turkish Republic is the last state that we founded with whatever was left over from all the self-sacrifices we were able to make... We are heirs of a nation that saw its territory expand to 22 million kilometers. Shortly before the Republic was founded, we had 3 million kilometers which kept diminishing until all we had left was 780,000 kilometers. Some may be offended at my mention of Lausanne. But why does it bother ... Watching the Ken Burns-Lynn Novick 18-hour series, “The Vietnam War,” is an emotional experience. Whether you served in the US military during the war or marched in the streets to end it, you cannot remain untouched by this documentary. The battle scenes are powerful, the stories of US veterans and Vietnamese soldiers who fought on both sides of the war compelling.The toll in human terms caused by the war is staggering. Nearly 58,000 Americans and 2 to 3 million Vietnamese, many of them civilians, were killed in the war. Untold numbers were wounded. Many US veterans of the war suffer ... Understanding Balkan Geopolitics Ukraine Atrocities: The Illegal Use of White Phosphorous Fire Bombs Against Donetsk Civilians End 50 Years of Genocidal Occupation & Human Rights Abuse by US-Backed Apartheid Israel Donald Trumpenstein: Self-Proclaimed “Cop of the World” Western Christianity and its Traditional Discrimination In Favour of the Right Wing Politics America’s Enemies, Who’s on the List? A Brief History of Palestine and Israel How Many People have been Killed in US Wars? Gavrilo Princip’s Grave: The Interwar Years, 1920-1939 The Demonizing of a Nation Why the U.S. Must Be Prosecuted for Its War Crimes Against Iraq Andrew Gavin Marshall: “The Imperial Anatomy of Al-Qaeda” US-NATO Operations in Kosovo and Ukraine: Compare and Contrast Mosul, Iraq and Obama’s Legacy of War The Brexit Vote: What does it Mean? Edward S. Herman: The Politics of the Srebrenica Massacre Appeasing the Butchers of Humanity The Vietnam War is not History for Victims of Agent Orange
<urn:uuid:e58406ef-980f-41e3-acb5-11b4a1ab21d5>
CC-MAIN-2020-50
http://global-politics.eu/croatian-leader-lauds-ustasha-nazis-fourth-reich-lite-rears-ugly-head-europe/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141182794.28/warc/CC-MAIN-20201125125427-20201125155427-00699.warc.gz
en
0.953593
5,090
2.59375
3
Can you remember life before the mobile phone? If you were born in the 1980s or later, then you probably can’t. If a far contrast to phones like the iPhone, that are so slim that they can bend in your pocket, early cell phones were giant oversized bricks. Definitely not pocket portable. But while so many people focus on the phone itself, the chargers were equally awkward. Over the years, cell phone chargers have evolved as much as the phones they charge. This infographic explores the evolution of cell phone chargers, from large black plastic bricks and mini chargers to solar and wearables. The Evolution of Cell Phone Chargers Cell Phone Chargers Have Come A Long Way It’s hard to believe that cell phone technology, evolved from the primitive two-way radio that was used in taxis and police cars. The very first primitive cell phone was used in 1946 by the Swedish police department. What Was Your First Cell Phone? What was your first cell phone? Please tell us in the comments below.
<urn:uuid:5ef827d3-2726-43cc-9a45-a60b9e74dd9f>
CC-MAIN-2020-10
https://methodshop.com/2014/10/evolution-cellphone-chargers.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145897.19/warc/CC-MAIN-20200224040929-20200224070929-00287.warc.gz
en
0.967529
211
2.828125
3
Jules Evens weaves history, science, and personal anecdote into an absorbing chronicle of one of the most biologically diverse places in North America. His account of this enchanted "island in time," separated by tectonics from the rest of the continent, provides a comprehensive overview of the Point Reyes Peninsula, exploring its dynamic character and its haunting appeal. Evens thoroughly investigates the climate, geology, and flora and fauna of Point Reyes, giving special attention to its most characteristic species and their ecological relationships. He delves into the past as well, evoking images of salmon-swollen creeks, herds of elk, and canyons echoing with the cries of cougars to enliven our imagination and set the stage as he traces the changes that have occurred at Point Reyes since the first Spanish explorers visited its shores in the late 1500s. Extensively illustrated with color photographs, original illustrations, and maps, the book also includes species lists for the reptiles, amphibians, birds, mammals, common invertebrates, fish, and plants found on the peninsula today, making it an essential companion for anyone who plans to visit one of California's most unique natural areas.
<urn:uuid:213eac26-3f5a-41a0-b13a-98a5c3652907>
CC-MAIN-2018-05
https://dbrl.bibliocommons.com/item/show/375948018
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886397.2/warc/CC-MAIN-20180116090056-20180116110056-00420.warc.gz
en
0.945325
242
2.71875
3
COLOSSAL constellations of man made satellites could soon take over the night sky and ruin stargazing for everyone, according to concerned astronomers. Elon Musk launched 60 of his Starlink satellites last week and they've already been recorded in the night sky looking very bright and visible. Last Thursday, SpaceX fired dozens of satellites into Space that will one day beam hyper-fast internet to people across the globe. These satellites are the first of an intended 12,000 that Musk is preparing to send into orbit. Many people have since spotted the satellites in the night sky and were shocked by how bright there are. When spotted flying above the Netherlands, a Dutch UFO website was inundated with more than 150 reports from people thinking that they were looking at UFOs. It is thought that the satellites look so bright at the moment because they have not yet reached their intended orbit height of 340 miles above Earth. They should reach this height in the coming month and only then will astronomers be able to work out the true impact they will have on star constellation visibility. The Guardian reported that Cees Bassa, an astronomer at the Netherlands Institute for Radio Astronomy, said: "I saw that train and it was certainly very spectacular. With that comes the realisation that if several thousands of these are launched it will change what the night sky looks like." The Starlink satellites are also visible in the night Sky above the UK, given the right conditions. Musk has responded to concerns on Twitter and said that the satellites will be in darkness when the stars are visible. However, Bassa has estimated that once the first 1,584 satellites are launched, at least 15 will be visible for three to four hours after sunset and before sunrise. If these calculations are correct the the satellites will be visible all night in the summer time. What is Starlink? Here's what you need to know about Elon Musk's satellites... - Starlink is a satellite project led by billionaire SpaceX CEO Elon Musk - Musk intends to put 12,000 satellites into the Earth's orbit so they can provide cheap WiFi to the whole world - SpaceX also intends to sell satellites for military, scientific and exploratory purposes - 60 of the Starlink satellites have been sent up to Space so far - The satellites are being launched on top of unmanned Falcon 9 rockets - How they will affect the night sky is causing concern as they look brighter than expected - It will take at least 12 trips to take all of the satellites into Space and they will be staggered at different heights above the Earth TOP STORIES IN SCIENCE In other news, Amazon is planning to launch 3,236 satellites so they can provide fast internet to “un-served and un-derserved communities around the world.” Some scientists are worried that too many satellites could trap humanity on Earth. And, satellites aren't Musk's only current focus – he recently revealed his creepy Neuralink project that will make you a genius by wiring your brain to a computer chip is ‘coming soon’. What do you think of Musk's satellite project? Let us know in the comments...
<urn:uuid:f9ed3d7e-6766-4ed1-a482-c7cd7868b78d>
CC-MAIN-2019-30
https://www.thesun.co.uk/tech/9174346/elon-musks-starlink-satellites-ruin-stars/
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525483.64/warc/CC-MAIN-20190718022001-20190718044001-00387.warc.gz
en
0.947706
648
2.625
3
I recently updated my book, Teach and Learn: Reflections on Communicative Language Teaching, and made it available on Kindle and as an inexpensive paperback. To enjoy a read, please click here. Please click to download a PDF of my book Teach and Learn: Reflections on Communicative Language Teaching. The two most basic language skills, listening and speaking, sound exactly alike when we describe them as oral and aural skills. “Aural” language, of course, refers to language as we hear it. “Oral” language is what we say. These two words are “homophones” – words spelled differently that sound alike. There is no good reason why they should be homophones, but they are. Perhaps that accident of spelling can serve as a reminder that, while these two skills cannot be separated, they need to be developed in different ways. Teaching Basic Skills: According to a hoary adage, “We are given two ears and one mouth so we can listen twice as much as we talk.” This is a maxim to remember when we plan our lessons – especially when we are dealing with a classroom of new learners. Logically, listening should be the first skill you teach. In practice, however, most teachers get their students talking on the first day of class, and many make speech the major focus of their lessons. They tend to downplay the skill of listening, as do most foreign language textbooks. Yet listening is probably the more important skill involved in foreign language learning, as it certainly is in the acquisition of one’s native tongue. Stephen Krashen and other thinkers have stressed that we acquire language best by using it in communicative ways. He was also one of the first to stress that language acquisition and language learning are not the same. Language learning (in the sense of making conscious discoveries about grammar, for instance) involves different mental processes, and those processes play distinctly secondary roles to those we use when we acquire language naturally. Language develops, he says, through exposure to and use of “comprehensible input” – target language the learner can understand and assimilate. All of this is textbook Krashen. One reasonable conclusion from these observations is that language learners should understand what they are listening to before they begin to speak. Especially at the initial phase of language acquisition, teachers should avoid oral practice to some degree. Instead, they should have their students concentrate on comprehending what they hear. This idea parallels the experience of young children, who spend almost two years in linguistic silence before they begin to speak. To use listening-focused learning, a communicative language teacher needs to incorporate active listening into their classes. This is done with activities in which the learners demonstrate that they understand, and receive gentle correction when they err. More advanced students must be explicitly taught to recognize reduced language forms heard in colloquial speech – as in “Whaddaya say?” Also, of course, part of aural comprehension is learning to decipher nonverbal clues. Pure listening is rarely a good strategy for sustained language acquisition. Even if students are still in their silent period – a common phase for beginners, in which they speak very little if at all, – teachers should encourage active participation from them. This is the only way to confirm that they have understood. Participation can mean as little as a nod or a headshake, for example, or the words “yes” and “no” in English or their native language. Listening without speaking is important for foreign language learners, especially when their language learning has just begun, but at some level that listening should be participatory. Listening activities do not always involve some other skill, but they generally do; the best classroom activities cross skill boundaries. Since the most typical pairing for a listening activity is to combine it with speech practice, a focus on listening can actually promote the effective development of speaking skills. To see how, let's turn to the activation of speech. Focus on Conversation: Speaking activities best occur in classrooms in which learners feel comfortable and confident, free to take risks, and have plenty of opportunities to speak. While there are countless kinds of activities teachers use to develop speaking skills, they most commonly promote conversational speech. This, of course, requires the use of both listening and speaking skills. Conversational language has four characteristics. It is interactive, in the sense that we talk back and forth in short bursts. Often, we do not even use complete sentences – “nice day, eh?” Conversation also has narrow time limits. We have to listen and respond without the luxury of thinking much about what we want to say. Conversation is also repetitive, in the sense that we tend to use a relatively small amount of vocabulary and a relatively small repertory of language structures.. And finally, of course, it is error-prone. Because of time limits, we may use the wrong word, pronounce something wrong or mangle structure. While we may hear the mistake and back up and correct ourselves, often we don’t. Bearing in mind the earlier comments about listening, these characteristics of conversation illustrate an important difference between listening activities and speaking activities. Because listening is a learner’s primary source of comprehensible input, aural activities depend heavily on accuracy. To understand, learners must listen carefully, and their comprehension must be good. In many listening activities, we play a short recording of speech repeatedly until we think our learners understand it. By contrast, learners shift heavily in the direction of fluency during conversation practice, which combines both listening and speaking skills. At this portion of the language class, the teacher kisses student accuracy goodbye. During speaking activities, the focus is on interactive, time-limited, repetitive and error-prone conversation. As is often the case in the language classroom, as we move from skill to skill, or from language study to language activation, we willingly compromise accuracy in the interest of fluency. The How and Why of Language: Language originated with the two linguistic skills we have just reviewed – listening and speaking. But why? What is the purpose of language? And how did it evolve to play this role in our lives? Whether we hear it or voice it, the purpose of language is to do the things that speech can do. In no way is it abstract. Like an axe, language is a tool with which we do things. According to linguistic philosopher J.R. Searle, we use language to perform five kinds of “speech act”. These are commissive, declarative, directive, expressive and representative. Commissive speech commits the speaker to do something – for example, “I promise to bring it tomorrow,” or “Watch out or I will report you.” Declarations change the state of things – “I now pronounce you husband and wife,” or “You’re fired!” Directive speech gets the listener to do something – “Please come in,” “Watch out!” or “Why don’t you take your medicine?” Expressive language explains feelings and attitudes: “Those roses are beautiful,” or “I hate broccoli.” Finally, representative speech describes states or events – “Rice is an important Thai export,” or “The United States is at war again.” All of our speech seems to do one or more of these five things. Language is such an important part of our lives that we use it to meet virtually all of our daily needs. Consider psychologist Abraham Maslow’s famous hierarchy of needs, which is often illustrated as a pyramid. In Maslow’s model, we can only move to a higher level of need after we have scrambled up the lower levels. In his view, people have five kinds of need. Our most basic needs are physiological – food and water, for example. The next level up is the need for safety and security, which we achieve, for example, by dealing with emergencies. Tier 3 involves needs for love, affection and belongingness. The need for esteem – self-respect and respect from others – comes next, but the highest level in this hierarchy is the need for self-actualization. According to Maslow, in this last level “A musician must make music, an artist must paint, and a poet must write.” The point of this discussion is that we meet virtually all those needs through speech acts. The gradual evolution of language has profoundly affected the nature of our species. As Stephen Pinker observes, Human practical intelligence may have evolved with language (which allows know-how to be shared at low cost) and with social cognition (which allows people to cooperate without being cheated), yielding a species that literally lives by the power of ideas.It is impossible to overstate the value or complexity of language. It is perhaps the most fundamental feature of our lives.
<urn:uuid:c4eba51b-f275-451d-b77b-bc25d022036d>
CC-MAIN-2023-50
https://languageinstinct.blogspot.com/2006/10/aural-and-oral-skills.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100146.5/warc/CC-MAIN-20231129204528-20231129234528-00637.warc.gz
en
0.960438
1,854
3.65625
4
Vincent's Word Studies, by Marvin R. Vincent, , at sacred-texts.com Is betrayed (παραδίδοται) The present tense expresses here something which, though future, is as good as present, because already determined, or because it must ensue in virtue of an unalterable law. Thus the passover is (γίνεται): it must come round at the fixed season. The Son of Man is betrayed according to the divine decree. Compare Mat 26:24. But the word never means palace in the New Testament. It is the court, the open court or hall, forming the centre of an oriental building, and often used as a meeting-place. Rev., court. Wyc., hall. An alabaster box (ἀλάβαστρον) Rev., cruse; flask in margin. Lit., an alabaster, just as we call a drinking-vessel made of glass a glass. Luther renders glass. It was a kind of cruet, having a cylindrical form at the top. Pliny compares these vessels to a closed rosebud, and says that ointments are best preserved in them. To what purpose is this waste? Wyc., Whereto this loss? Tynd., What needed this waste? See on Joh 12:3. When Jesus understood it (γνοὺς δὲ ὁ Ἰησοῦς) The A. V. implies that some time elapsed before Jesus was aware of the disciples' complaint. But the statement is that Jesus perceived it at once. Rev., rightly, Jesus perceiving it. Good work (καλὸν) Lit., beautiful, but in a moral sense: an excellent, morally beautiful deed. What will ye give? (τί θέλετέ μοι δοῦναι?) Rather, What are ye willing to give me? It brings out the chaffering aspect of the transaction. So Rev. They covenanted with him for (ἔστησαν αὐτῷ) But the meaning is, they weighed unto him; or, very literally, they placed for him (in the balance). Although coined shekels were in circulation, weighing appears to have been practised, especially when considerable sums were paid out of the temple-treasury. Thirty pieces of silver (τριάκοντα ἀργύρια) Matthew refers to Zac 11:12. These pieces were shekels of the sanctuary, of standard weight, and therefore heavier than the ordinary shekel. See on Mat 17:24. Reckoning the Jerusalem shekel at seventy-two cents, the sum would be twenty-one dollars and sixty cents. This was the price which, by the Mosaic law, a man was condemned to pay if his ox should gore a servant (Exo 21:32). Our Lord, the sacrifice for men, was paid for out of the temple-money, destined for the purchase of sacrifices. He who "took on him the form of a servant" was sold at the legal price of a slave. Such a man (τὸν δεῖνα) The indefiniteness is the Evangelist's, not our Lord's. He, doubtless, described the per- son and where to find him. He sat down (ἀνέκειτο) But this rendering misses the force of the imperfect tense, which denotes something in progress. The Evangelist says he was sitting or reclining, introducing us to something which has been going on for some time. Began to say (ἤρξεντο) Denoting the commencement of a series of questions; one after the other (every one) saying, Is it I? Is it I? (μήτι ἐγώ εἰμι) The form of the negative expects a negative answer. "Surely I am not the one." The dish (τρυβλίῳ) Wyc., platter. A dish containing a broth made with nuts, raisins, dates, figs, etc., into which' pieces of bread were dipped. Which betrayed (ὁ παραδιδοὺς) The article with the participle has the force of an epithet: The betrayer. From διατίθημι, to distribute; dispose of. Hence of the disposition of one's property. On the idea of disposing or arranging is based that of settlement or agreement, and thence of a covenant. The Hebrew word of which this is a translation is primarily covenant, from a verb meaning to cut. Hence the phrase, to make a covenant, in connection with dividing the victims slain in ratification of covenants (Gen 15:9-18). Covenant is the general Old Testament sense of the word (Kg1 20:34; Isa 28:15; Sa1 18:3); and so in the New Testament. Compare Mar 14:24; Luk 1:72; Luk 22:20; Act 3:25; Act 7:8. Bishop Lightfoot, on Gal 3:15, observes that the word is never found in the New Testament in any other sense than that of covenant, with the exception of Heb 9:15-17, where it is testament. We cannot admit this exception, since we regard that passage as one of the best illustrations of the sense of covenant. See on Heb 9:15-17. Render here as Rev., covenant. Is shed (ἐκχυννόμενον) The present participle, is being shed. Christ's thought goes forward to the consummation. Another adjective, νεόν, is employed to denote new wine in the sense of freshly-made (Mat 9:17; Mar 2:22; Luk 5:37, Luk 5:38, Luk 5:39). The difference is between newness regarded in point of time or of quality. The young, for instance, who have lately sprung up, are νείοι, or νεώτεροι (Luk 15:12, Luk 15:13). The new garment (Luk 5:36) is contrasted as to quality with a worn and threadbare one. Hence καινοῦ. So a new heaven (Pe2 3:13) is καινὸς, contrasted with that which shows signs of dissolution. The tomb in which the body of Jesus was laid was καινὸν (Mat 27:60); in which no other body had lain, making it ceremonially unclean; not recently hewn. Trench ("Synonyms") cites a passage from Polybius, relating a stratagem by which a town was nearly taken, and saying "we are still new (καινοί) and young (νέοι) in regard of such deceits." Here καινοί expresses the inexperience of the men; νέοι, their youth. Still, the distinction cannot be pressed in all cases. Thus, Co1 5:7, "Purge out the old leaven that ye may be a new (νέον) lump;" and Col 3:10, "Put on the new (νέον) man," plainly carry the sense of quality. In our Lord's expression, "drink it new," the idea of quality is dominant. All the elements of festivity in the heavenly kingdom will be of a new and higher quality. In the New Testament, besides the two cases just cited, νέος is applied to wine, to the young, and once to a covenant. Sung a hymn Very probably the second part of the Jewish Hallel or Hallelujah, embracing Psalms 115, 116, Psa 117:1-2, 118. They went out In the original institution of the Passover it was enjoined that no one should go out of his house until morning (Exo 12:22). Evidently this had ceased to be regarded as obligatory. I will go before you The thought links itself with what Christ had just said about the shepherd and the sheep. Compare Joh 10:4. I will go before you, as a shepherd before his flock. Before the cock crow A little more graphic if the article is omitted, as in the Greek. Before a single cock shall be heard, early in the night, thou shalt deny me. Dr. Thomson ("Land and Book") says that the barn-door fowls "swarm round every door, share in the food of their possessors, are at home among the children in every room, roost overhead at night, and with their ceaseless crowing are the town-clock and the morning-bell to call up sleepers at early dawn." Though I should die (κἂν δέῃ με ἀποθανεῖν) The A. V. misses the force of δέῃ: "Though it should be necessary for me to die." Wyc., "If it shall behove me to die." Rev., excellently, "Even if I must die." Meaning oil-press. Beyond the brook Kedron, and distant about three-quarters of a mile from the walls of Jerusalem. Dean Stanley says of the olive-trees there: "In spite of all the doubts that can be raised against their antiquity, the eight aged olive-trees, if only by their manifest difference from all others on the mountain, have always struck the most indifferent observers. They will remain, so long as their already protracted life is spared, the most venerable of their race on the surface of the earth. Their gnarled trunks and scanty foliage will always be regarded as the most affecting of the sacred memorials in or about Jerusalem; the most nearly approaching to the everlasting hills themselves in the force with which they carry us back to the events of the gospel history" ("Sinai and Palestine"). It is hardly possible to convey the exact force of the Greek οὕτως, thus or so. The idea is, "are ye thus unable, or so utterly unable to watch?" The hour is at hand He probably heard the tramp and saw the lanterns of Judas and his band. One of the twelve Repeated in all three evangelists, in the narratives both of the betrayal and of the arrest. By the time Matthew's Gospel was written, the phrase had become a stereotyped designation of the traitor, like he that betrayed him. A great multitude The Sanhedrin had neither soldiery nor a regularly-armed band at command. In Joh 18:3, Judas receives a cohort of soldiers and officers from the chief priests and Pharisees. Part of the band would consist of this regularly-armed cohort, and the rest of a crowd armed with cudgels, and embracing some of the servants of conspicuous men in the Sanhedrin. Kissed him (κατεφίλησεν) The compound verb has the force of an emphatic, ostentatious salute. Meyer says embraced and kissed. The same word is used of the tender caressing of the Lord's feet by the woman in the Pharisee's house (Luk 7:38), of the father's embrace of the returned prodigal (Luk 15:20), and of the farewell of the Ephesian elders to Paul (Act 20:37). Wherefore art thou come ? (ἐφ' o pa/rei) The interrogation of the A. V. is wrong. The expression is elliptical and condensed. Literally it is, that for which thou art here; and the mind is to supply do or be about. The Lord spurns the traitor's embrace, and says, in effect, "Enough of this hypocritical fawning. Do what you are here to do." So Rev., Do that for which thou art come. The servant (τὸν δοῦλον) The article marks the special servant; the body-servant. A diminutive in form but not in sense; according to a Greek popular usage which expressed parts of the body by diminutives; as ῥίνια, the nostrils; ὀμμάτιον, the eye; σαρκίον, the body. Peter aimed his blow at the servant's head, but missed. Put up again Peter was still brandishing his sword. Twelve legions of angels Compare the story of Elisha at Dothan (Kg2 6:17). A thief (λῃστὴν) Better Rev., a robber. See Joh 10:1, Joh 10:8; and Luk 23:39-43. It is more than a petty stealer; rather one with associates, who would require an armed band to apprehend him. Hence the propriety of the reference to swords and staves. I sat (ἐκαθεζόμην) The imperfect tense, denoting something habitual. I was accustomed to sit. I adjure thee I call upon thee to swear. The high-priest put Christ upon oath. In order that; signifying the design with which he adjured the Lord. Thou hast said An affirmation. You have spoken the truth. What thou hast asked me is the fact. Compare Mat 26:25. However. Apart from my affirmation, you shall see for yourself. Guilty of death (ἔνοχος θανάτου) Rev., worthy of death. See on Mat 23:18. ἐν, in, ἔχω, to hold. The idea is, literally, holden of death; in bonds to death. With the fist. Smote with the palms of their hands All expressed by one word, ἐράπισαν, from ῥαπίς, a rod, and meaning to smite with rods, not with the palms. The same word is employed in Mat 5:39. It came to mean generally to strike. A damsel (μία παιδίσκη) Lit., one damsel, because the writer has in mind a second one (Mat 26:71). Through fear of being further questioned. As if he did not know Jesus' name. To curse (καταθεματίζειν) A new development of profanity. Hitherto he had merely sworn. Now he adds imprecation; invoking curses on himself if the case be not as he says.
<urn:uuid:f217dfe4-2470-4397-b679-31ec549eb631>
CC-MAIN-2018-09
http://sacred-texts.com/bib/cmt/vws/mat026.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813109.36/warc/CC-MAIN-20180220204917-20180220224917-00467.warc.gz
en
0.928362
3,297
2.953125
3
The agricultural use of genetically modified (GM) plants has been a subject of disagreement, debate and bitter conflict around the globe. Sectors of Australian science experienced this recently when field trials of GM wheat were destroyed by protesters. Why should Australia consider producing GM wheat? Is it a viable solution to the problems it seeks to address? Why is Australia the place to grow GM wheat? According to the Food and Agriculture Organization of the United Nations (FAOSTAT), Australia is the ninth-largest wheat producer in the world, in quantity and in value. Interestingly, the eight countries ranked above Australia not only produce more wheat, they also produce more wheat per hectare. On average, Australia manages only about half of the yield efficiency of the nine major producers. Of the top 20 wheat producing countries – including Afghanistan – only Kazakhstan has a lower yield efficiency than Australia. None of these countries grows GM wheat. Clearly it seems that Australia is not an ideal place to grow wheat. That said, Australia is big and flat and therefore easy to mechanise for wheat planting and harvesting. If the genetic makeup (or genotype) of wheat could be changed so the dry and hot conditions of Australia were to its liking, Australia mightn’t only become a good place to grow wheat, it might even become good at growing it. GM wheat is still in trial stage in Australia. According to the Office of the Gene Technology Regulator, there have been 11 GM wheat products brought to field trial stage since 2005. Many of these experimental cultivars are being tested for their “enhanced abiotic stress tolerance”. In other words, they are being tested for their ability to grow better under conditions such as too little water or too much heat. How have they performed? It might be too early to tell. But over the decades of trialling similar traits, there are no commercially viable abiotic-stress tolerant GM crops, despite well over a thousand approvals for trials in the US alone. What will make the Australian GM trials different from those already conducted, and failing, elsewhere? Will GM wheat raise Australia’s productivity? Will it raise it faster and more sustainably than alternatives? Is Australia concentrating on the most important things? One of the most important conclusions to come out of the International Assessment of Agricultural Knowledge, Science and Technology for Development (IAASTD), was that the goals of breeders – including those who use genetic engineering – take disproportionate resources from the science of the environment. In other words, while money is being spent on genetic engineering, it’s not being spent on the environmental science that could make it unnecessary. This means that unless current breeder priorities shift, at some point the soil will be just too dry, too depleted and too toxic for these plants to grow and provide healthy food, no matter what genes are put into them. To feed the world, funding needs to focus not just on developing new and better agricultural crops, but also on the science and practice of restoring the environmental conditions necessary for crop productivity. The recently destroyed field trials of GM wheat were not, however, trials with abiotic stress tolerant wheat. They were trials with wheat modified to have an altered starch composition. The idea was that these GM cultivars may contribute to healthier bowels by offering the potential of a white flour with enhanced fibre. If the cause of bowel disease were simply the consumption of wheat, this advance would be truly welcome. But people have eaten wheat for thousands of years and the diseases of the bowel are a phenomenon of scale only in recent decades, and mainly in wealthy countries. The problem is arguably not the wheat, but rather the modern diet based on highly processed foods and lacking in whole grains, fresh fruit and vegetables. People need to change their diets, not their wheat. Nevertheless, the wheat could be considered “innovative” if it is marketed as healthier and attracts a price premium. Unfortunately, real solutions to the problem may not be as easy to sell for monetary profit; although we would all profit from them nonetheless. What does Australia put at risk? There is no guarantee that consumers and governments around the world will be as easily sold on the idea that eating GM wheat will cure bowel woes. Beyond not being willing to pay a price premium for the product, there may be outright market rejection or price penalties in export markets. This has indeed been the case with other GM crops. Australia’s non-GM products bring a high price. They may lose this marketing edge if they are contaminated by GM products through either pollen or seed flow. Failures to maintain GM crop segregation have caused disruption in many countries, including New Zealand, Canada and the USA. As the contamination of the US rice supply by a non-commercial research line illustrated, even small scale production can cause extensive financial damage. Given the potential for contamination, Australia could look forward to much more litigation as a result of introducing GM wheat. Consider the Western Australian organic wheat and oat farmer who lost his organic certification when his farm was contaminated by GM canola. He is now suing the GM farmer for compensation. Indeed, nearly 300,000 organic farmers in the US are also taking legal action against Monsanto over the company’s failure to contain its GM crops. Attempting to plaster over the complex contextual causes of yield limitations and bowel disease by engineering plants takes resources away from lasting and sustainable solutions and creates new problems. How should Australia prioritise its spending in science and innovation? What do we want from our agricultural sector? What incentives will help us to achieve its goals? Answers should be sought in a broad-based and deliberative manner that allows discussions to focus not just on questions of risk and regulation but also on problem formulation and options assessment. Without this, the future will only involve further protest, more litigation and continued environmental degradation.
<urn:uuid:b7c41608-d94e-4462-86b2-7a0a8a7f2a46>
CC-MAIN-2018-30
http://theconversation.com/why-would-australia-want-to-grow-genetically-modified-wheat-3755
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592875.98/warc/CC-MAIN-20180722002753-20180722022753-00592.warc.gz
en
0.961605
1,202
2.875
3
Twenty-five years ago, the Mandelbrot set was published on the cover of Scientific American, in connection with an A. K. Dewdney Computer Recreations column. A few days ago, the original Mandelbrot set column was re-released. The Mandelbrot set became a rite of passage for anyone programming mathematical images. For me, I was making images on a Mac Plus, and sent some of them out in a zine I was running at the time. As a result, Piers Anthony asked me to help get fractal images and facts for his Mode series. In the course of this, Piers and I asked for and received permission to use the Mandelbrot set from Benoît himself. “You probably don’t need my permission, but I’m happy to grant it to you.” Benoît Mandelbrot died on October 14, 2010, at the age of 85. He is being remembered worldwide: The New York Times, Nature, Wired, Popular Science, BBC News, PCWorld, and many other places. In his seminal account, The Fractal Geometry of Nature (1982), Mandelbrot generalized the concept of dimension to include fractional values, which could be used to describe irregular geometric shapes such as coastlines, clouds, and charts of stock prices. Fractal geometry is still not accepted as a rigorous subject by some mathematicians, who regard some of its constructs as “pathological”. By his own account, Mandelbrot traced the origin of his concept of fractals to a question he first encountered as a student: How long is the coastline of Britain? He was surprised to discover that this depends on the scale and resolution of the map one is looking at. One map may show a fairly smooth representation of the coastline, but zooming in to a finer scale will reveal jagged edges that add up to a longer coastline. And zooming in further leads to an even longer coastline. In the 1950s, Mandelbrot proposed a new way to quantify the boundary curve of such irregular objects. He defined the fractal dimension, where N(ε) is the number of self-similar pieces of size ε needed to approximate the whole structure. (This is closely analogous to the Hausdorff dimension for metric spaces.) The consensus result for the fractal dimension of the British coastline is around 1.26, which can be interpreted as about one-fourth of the way between a one- and a two-dimensional boundary. Many of us at Wolfram Research have written about fractals. The Wolfram Demonstrations Project has 170 fractal Demonstrations at the moment. Michael Trott has detailed many fractals in his Mathematica GuideBooks. For example, below is a fractal based on Gaussian maps. Here’s Stephen Wolfram, from A New Kind of Science, page 934: “The Mandelbrot set introduced by Benoît Mandelbrot in 1979 is defined as the set of values of c for which such Julia sets are connected. This turns out to be equivalent to the set of values of c for which starting at z = 0 the inverse mapping z -> z2 + c leads only to bounded values of z. The Mandelbrot set turns out to have many intricate features which have been widely reproduced for their aesthetic value, as well as studied by mathematicians. The first picture below shows the overall form of the set; subsequent pictures show successive magnifications of the regions indicated. All parts of the Mandelbrot set are known to be connected. The whole set is not self-similar. However, as seen in the third and fourth pictures, within the set are isolated small copies of the whole set. In addition, as seen in the last picture, near most values of c the boundary of the Mandelbrot set looks very much like the Julia set for that value of c.” S. M. Blinder’s Demonstration, “Magnified Views of the Mandelbrot Set”, taken from the computer-generated images published by Peitgen and Richter, shows the complex fractal structure of the boundary as the picture is magnified: Seems like just a few days ago that I wrote blog posts with fractal mazes and cool points on the complex plane. For years, I’ve never failed to be amazed by the beauty of these worlds. They were a surprise for Benoît himself—he thought some of his initial printouts might be an error. To get a sense of the vastness, a great video is “Trip to e214”. Magnifying an electron to the size of the universe needs a magnification of 1042. This video magnifies the target mandelbulb 10214 times. Benoît, thanks so much for giving me that permission all those years ago. You were the first famous mathematician I corresponded with. It meant a lot to me.
<urn:uuid:95aa25be-b615-4f42-88e1-d8611b72fbdf>
CC-MAIN-2023-14
https://blog.wolfram.com/2010/10/21/benoit-mandelbrot/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00305.warc.gz
en
0.963424
1,055
2.8125
3
Forests for Food Security and Nutrition "The right to adequate food is realized when every man, woman and child, alone or in community with others, has physical and economic access at all times to adequate food or means for its procurement.” (Committee on Economic, Social and Cultural Rights, 1999) The right to food is gradually being established as a priority on the international agenda, but when it comes to the realization of this human right, there is still a need to understand what "right to food" means and how it can be implemented in practice, notably for policy design and programmes. In the case of forest resources, for example, the crucial role of non-wood forest products (NWFPs) for forest‐dependent people is often underestimated and inappropriate policies and institutional obstacles hinder increasing the contribution of NWFPs to national economies and household food and nutrition security. Recognizing and securing tenure rights of forest-dependent people, including indigenous peoples, and securing equitable access to resources is a fundamental element for securing livelihoods for these communities. The Voluntary Guidelines on the Responsible Governance of Tenure of Land, Fisheries and Forests in the Context of National Food Security are a key instrument for supporting the progressive realization of the right to adequate food in the context of national food security.
<urn:uuid:d26833f6-f474-4255-9e1a-787295c83ed9>
CC-MAIN-2016-26
http://www.fao.org/forestry/food-security/83800/en/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00036-ip-10-164-35-72.ec2.internal.warc.gz
en
0.937593
265
3.5
4
There are different reasons to control the amount of solar energy and sunlight that can affect the inside of a building. For example, in hot and sunny climates, excess solar gain can cause high energy consumption to cool. In cold and temperate climates, on the contrary, the winter sun, which enters through the windows facing south, will contribute positively to the free solar heating of our building. However, it must be taken into account that another of the characteristics that the sun’s rays bring, the lighting, must also be controlled to allow us a correct and continuous natural lighting. For all this it is necessary to make a correct design of the building, with elements of solar control and shading, thus being able to drastically reduce the energy consumption needs of our buildings and at the same time improve the quality of natural lighting. Remember that here at Sure Shade you can finally enjoy top quality external cover that will help you keep your house cool and comfortable for these hotter days as well as protecting yourself of excessive UV rays. To obtain solar control and shading there are several options: Fixed sun protection. Are those elements included in the architectural design of the building, and that cannot be manipulated: a good orientation of the building; design of protective eaves or overhangs; use of reflective surfaces; solar control glasses; Introduction to the project of gardening of deciduous trees, which in summer create us shade, and in winter they let us pass the solar rays. Fixed lattices, vinyl, or shadows of nearby buildings are other possible elements. Mobile sun protection. Elements manipulable by the human being and that can adapt to seasonal situations: - External devices such as blinds, or slats, mosquito nets, awnings, Majorcans, adjustable louvers, pergolas, etc. - Internal lighting control devices, such as Venetian blinds, curtains, blinds, Japanese panels, etc. The type of sun protection ideal for a project depends on several factors: the latitude of the building situation, the orientation of the holes, the type of contact with the exterior that is desired, and the type of use that will be made of the stay Other properties to consider are its mechanical strength, cost, maintenance, or the possibilities of opening the windows. The position of the sunscreen will always be more effective if it is installed outside the window; however, when installed outdoors it must be weather resistant, and is more difficult to clean and maintain. Aluminium carpentry contributes very actively in the exterior architectural design of buildings, to adapt to different forms of solar radiation, orientations, and climates. Thus, the high resistance of aluminium, provided by the condition of metallic element, allows the windows and doors to be narrower and facilitates more solar energy and lighting in our buildings. In this case, aluminium is a solidary material, giving greater prominence to glass, although it discreetly contributes to the hollow its narrowness, resistance, aesthetics and presence. But also, there are highly effective aluminium systems for sun protection such as Mallorcan, lattice or lamas. Apart from shading and solar control, these regulation systems help us to increase the insulation properties of a window, ensure the privacy of the occupants and protection against intruders, prevent the discoloration of interior fabrics and furniture, decorate the Gaps and buildings. Natural lighting in architecture is a priority Solar space collaborates with public organizations, engineering and groups of participating architects of a sustainable architecture, that pays special attention to natural light. These areas help architecture, engineering, public organizations and companies to optimise the use of natural light in their buildings and projects. Our team of architects and engineers will work with you to maximise the natural lighting in your buildings and achieve the most pleasant and sustainable spaces. If a specialist is hired to design a house, structure, artificial lighting or landscaping, you also have to do it to get the most out of a free, inexhaustible light source that brings well-being to the user. An optimal lighting result requires a correct combination of artificial lighting and natural lighting. You have to achieve the desired level of lighting, taking full advantage of natural light, controlling artificial light and keeping the caloric intake of both to a minimum. Heat is no longer a problem We must eliminate the idea that the sun implies heat and think that bioclimatic technology allows to illuminate efficiently without generating appreciable heat. A good sample are light tubes, whose patented domes have technologically efficient meshes that maintain the necessary lighting levels in winter, when the angle of incidence of the solar rays is minimal, and avoid excess heat from the conduit of light in summer. The sun studies are computer simulations in 3D in which the effect of the sun on a building throughout the day and the seasons is studied. Natural light calculations We calculate the amount of natural light a space will have. We advise you with effective solutions to optimise it and thus acquire optimal and comfortable lighting levels. The tools that should be used must be professional, simple, but very useful calculation application found on our website. Passive solar architecture The passive solar architecture takes advantage of the solar energy that is captured through windows or walls to maintain thermal comfort conditions inside the homes. Passive solar architecture is understood as the one that takes advantage of the solar energy that is captured through windows or walls to maintain well-being conditions inside buildings and minimize the use of expensive and polluting air conditioning systems. Aspects such as the orientation of the building, the morphology, the materials they use as well as the location on the ground are taken care of. To achieve optimum use of the incident sun throughout the day, the windows open on a wall facing the equator. That is why large windows are usually seen with this orientation in the buildings whose design is governed according to the criteria of Passive solar architecture. In the rest of the facades of the building there are few windows and small to prevent heat from being lost through them. Thanks to our top blinds at Sure Shade you can keep your house safe and enjoy top quality external cover that will help you keep your house cool and comfortable for these hotter days as well as protecting yourself of excessive UV rays.
<urn:uuid:2e5b6e84-2d77-4b22-9078-3fee08f73783>
CC-MAIN-2022-21
https://ourguides.com.au/aluminium-sunlight-and-their-effect-in-buildings/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662515501.4/warc/CC-MAIN-20220517031843-20220517061843-00513.warc.gz
en
0.934111
1,272
2.921875
3
As digital technology ushers in a fourth industrial revolution, what does it mean for the workforce? Will we all be working with robots? Smart manufacturing is being dubbed ‘the fourth industrial revolution’, or Industry 4.0. Why? Because it will transform the way manufacturing is structured and the jobs that make it happen. Picture the assembly floor of a car factory staffed entirely by machines. And picture again these machines interacting with human workers – Cobots or collaborative robots, talking to the cars they’re making, and seeming to apply intelligent decisions as to which assembly station they go to next. Bespoke components are being printed to orders fed in by a computer that’s taking instructions from a design department 5,000 miles away, which in turn is being informed by a depository of data gathered from end users worldwide. It’s all happening with seamless efficiency. Productivity is up, quality is impeccable and the customer is more satisfied than ever before (…) This somewhat Utopian vision is what Industry 4.0 will look like and, to a certain extent, it’s happening already. At Siemens’ Amberg Electronics Factory, the products control their own assembly and all processes along the value chain are integrated via IT, thus enabling increased productivity to one product per second throughout the working year, failure rate reduction to almost zero and costs cutting. By retraining its employees, Siemens has simply redeployed its Amberg workforce into positions of control rather than assembly. So what sort of jobs will the manufacturing workforce be doing in 10 or 20 years’ time? Thilo Stieber, Luca Benporath and Davide Criscione, all believe that in order to answer that question you must first understand the context of the revolution (…) Download the full story below.
<urn:uuid:e221d1c5-e8ea-4676-835c-c729136ed30b>
CC-MAIN-2021-17
https://atos.net/en/blog/i-cobot
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039490226.78/warc/CC-MAIN-20210420183658-20210420213658-00247.warc.gz
en
0.943651
373
2.546875
3
Keeping pseudomonas under control Published: 06 July, 2016 Steven Booth of Guardian Water Treatment discusses the problem of pseudomonas and a best-practice approach to tackling it. Poor water hygiene is commonly talked about in terms of legionella and the risk it poses to human health. Apart from causing illness in people, bacteria-filled water also creates corrosion and system fouling, compromising the efficient running and lifespan of closed-circuit water systems in particular. While legionella is still present in these waters, the main ‘fouling’ culprit is pseudomonas. Pseudomonas poses a particular risk to the efficient running of closed-circuit water systems. While less well-known than legionella, if left untreated and not considered at the construction stage, pseudomonas can pave the way for fouled systems that can be hard to rectify once the bacteria has taken hold. Any stagnant or slow-flowing water will give pseudomonas the perfect conditions to grow and multiply, leading to biofilm formation and other problems such as corrosion and the rise of sulphate-reducing bacteria. These bacteria metabolise naturally occurring sulphate in the water to produce sulphide under clumps of bacteria, depolarising the metal surface, resulting in localised pitting corrosion and eventual perforation. In general, bacterial build-up in the water, especially in stagnant areas, can create a microbial biofilm layer on pipe and heat-exchanger surfaces, causing a reduction in efficiency and flow restrictions. One of the key exacerbators of pseudomonas build-up in large commercial projects is dead legs in the water system. The risk of bacterial growth in dead legs is well documented for heating and cold-water systems, but the same problem also occurs in closed systems or if certain areas of the system are not circulated regularly. Often included to make way for future expansion, these potentially vast areas of stationary water present the ideal conditions for bacteria to grow. Once bacterial growth is present on a grand scale it can be very difficult to get back under control. While removing ‘dead legs’ altogether may not be practical, we suggest that designers include a bypass or flow around the dead end to combat the problem and implement a valve-exercising regime to create full circulation. Pre-commissioning cleaning is a standard requirement of all new closed water installations under the latest BSRIA guidelines. This approach is far easier and more cost effective than cleaning up existing systems that have been left to the mercy of bacteria. Remediation cleaning is possible, but it will never render a system ‘as new’. There is a range of pre-commissioning cleaning techniques. • System dynamic flushing removes debris from the system to reduce the potential for blockages by maximising flow rates through main risers and sub branches. • A full biocide wash to remove bio-films and bacteria from the system. • Chemical cleaning. Following commissioning, movement of the pipe-work due to thermal expansion or contraction may cause contaminants, such as iron oxide (rust), to be released into the fluid stream. Chemical cleaning loosens surface deposits so they can be removed from the system to create a stable surface within the pipework, which if maintained by an ongoing water-treatment regime will inhibit further corrosion. • System inhibiting. On completion of the chemical clean, the system is dosed with a suitable corrosion inhibitor and biocide to ensure ongoing protection from water, metal corrosion and bio-fouling. • Back flushing. All terminal units should have been isolated during the pre-flushing procedures. The purpose of back-flushing is to remove any small debris that has collected within these terminals. To maintain water system cleanliness, there are non-chemical alternatives to chemical dosing, which will also reduce maintenance requirements. Photo-catalytic water purifiers greatly reduce bacterial levels in the water, using a specific frequency of light and photo-catalytic surfaces to create free radicals that break down harmful micro-organisms and other pollutants in water. The radicals are short lived and exist for only a few milliseconds, which means they have no possibility of leaving the reaction chamber. Our own trials of the Wallenius AOT (anti-oxidation technology photo-catalytic water purifier — pictured), can produce a log 5 reduction (100 000 times) in legionella bacteria levels in the water passing through it, killing 99.999% of micro-organisms, including pseudomonas. We have several example projects where we have eliminated 100% of detectable pseudomonas that have entered a system from the mains water. It’s a much repeated phrase, but one that rings true time and time again: prevention is better than cure, and to ensure the on-going hygiene of closed circuit water systems the right steps must be taken during its construction. Preventing biofilm from forming in the first place is essential; once biofilms start to form, the bacteria that reside within them can be thousands of times more resistant to biocides than those found free floating in the water, so stopping this film will pay dividends to the building owners and facilities managers responsible for maintaining these systems. Steven Booth is associate director with Guardian Water Treatment. - 23 March, 2017Pump Industry Awards - 29 March, 2017, 9:30Data centre design and energy effiicency - 31 March, 2017Annual awards of the Commissioning Specialists' Association - closing date for entries - 11 May, 2017BCIA Awards 2017 - 17 - 18 May, 2017PHEX+ - 23 - 24 May, 2017Edie Live - 15 June, 2017 - 23:55CSA Awards - 12 - 14 September, 2017The Energy Event - 22 - 23 November, 2017EMEX - 23 - 25 January, 2018HVAC & Refrigeration Show
<urn:uuid:bd34c9cb-0f97-44ac-88f9-b63b4198fa22>
CC-MAIN-2017-13
http://modbs.co.uk/news/fullstory.php/aid/16017/Keeping_pseudomonas__under_control.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188773.10/warc/CC-MAIN-20170322212948-00450-ip-10-233-31-227.ec2.internal.warc.gz
en
0.91783
1,217
2.96875
3
Visitors to Caister-on-Sea today would probably be surprised to learn of the ancient military history of this peaceful and tranquil seaside town. Whereas modern day Caister is known for sea, sand and (occasionally) sun, ancient Caister was synonymous with its military fortifications. Indeed, the name ‘Caister’ itself is actually derived from the latin term for fortress, ‘castra’. The fortress at Caister-on-Sea was built by the Romans in around the 3rd century AD to protect against the frequent incursions of Saxon raiders, and was one of a series of such fortifications erected in the south-east of England, known as the ‘Saxon Shore’. A Time of Crisis The era in which the fortress at Caister was built was a time of severe crisis for the Roman Empire. The halcyon days of the Caesars were long gone, and the empire had been weakened by internal strife, and increasing external threats in the form of ‘barbarians’ from Northern Europe. Under these increasing pressures, the Romans undertook new measures to protect its sprawling borders, which ranged from Western Europe to the Middle East. In Britain, fortifications were built in the north in the form of the Hadrianic and Antonine Walls, while in the south-east, a series of sea-side forts were constructed to defend the Empire against the growing threat of seafaring barbarians. The Saxon Shore The series of fortresses that became known as the Saxon Shore were heavily defended military installations, capable of housing thousands of Roman soldiers. The most distinctive feature of the Saxon Shore forts was their heavily fortified defences, comprised of massive stone walls and surrounded by ditches. The term ‘Saxon Shore’ is derived from a contemporary Roman document, the Notitia Dignitatum, which lists nine sea forts under the command of an individual who bore the title of COMES LITORIS SAXONICI PER BRITANNIAM, which translates to ‘Officer of the Saxon Shore of Britain’. The existence of the Saxon Shore forts provides a fascinating insight into a turbulent period in British and world history, and helps us to understand the crucial role that the south-east of England played in the defence of the borders of the Roman Empire. The Roman Fort in Caister The Roman fort at Caister, which gives the town its name, and which is part of the wider network of ‘Saxon Shore’ defences, was built sometime between the years 225AD and 285AD. The fort was originally situated on an island in the confluence of the rivers Waveney, Yare, Ant, and Bure. Over hundreds of years the estuary gradually became silted up, leaving the Saxon Shore fort at Caister stranded firmly inland. The fort played host to a garrison of perhaps as many as 1,000 Roman soldiers, members of both the infantry and navy, ready to defend the empire at a moment’s notice. The main threat to the soldiers stationed at Caister would have been the Germanic tribes who began to invade, plunder and destroy Roman held territory with increasing confidence as the power of the great empire faded. Eventually Rome became incapable of defending its borders, and abandoned its many imperial outposts, Britain among them, around the 5th century AD. The sea fort they left behind appears to have been abandoned completely, before being re-occupied, over 100 years later, by the Saxons, the descendants of the very tribes the fort had been built to repel. Gradually, the fort was abandoned altogether as it failed to serve any purpose for the Saxon, and later Norman community of Caister. The fort stood, in some form, until the 18th century, when it was demolished completely. Thus the Roman fort of Caister-on-Sea remained buried until the archaeological excavation of 1951, which unearthed the remains of the fort, and allowed us rediscover the ancient military history of Caister-on-Sea and the Saxon Shore. For more information on the Roman fort at Caister and the history of the Saxon Shore please see: [Photo Credit: little minx 1]
<urn:uuid:7442f095-7b1c-49e9-bdd2-5fc36f896718>
CC-MAIN-2020-50
https://www.easternbeach.co.uk/blog/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176864.5/warc/CC-MAIN-20201124140942-20201124170942-00382.warc.gz
en
0.971874
880
3.640625
4
Our School’s badge was originally designed by the Headteacher Mr L Hall who retired in 1970/71 from what was then Deyes Lane County Secondary School. There are three main features of the badge: - The ballista or trébuchet was the heraldic device of the Maghull family. (Spelling of surname varies considerably). It is understood to have been awarded to the family in recognition of service during the Hundred Years’ War. We believe that Mr Hall chose this as a local symbol and also to signify “aiming high” and overcoming difficulty. - The leaping chamois is a creature swift and sure of foot and symbolises rapid but secure progress. - The interlocking design signifies that the school is co-educational.
<urn:uuid:150f5045-2e54-4ee9-82a5-e038c40c8d57>
CC-MAIN-2019-09
https://www.deyeshigh.co.uk/our-school/school-history/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247508363.74/warc/CC-MAIN-20190221193026-20190221215026-00574.warc.gz
en
0.975236
162
2.609375
3
Waters, Alan (2006) Thinking and Language Learning. ELT Journal, 60 (4). pp. 319-327.Full text not available from this repository. The importance of thinking for language learning has been recognized for some time. ELT activities which encourage active mental processing have become increasingly common. However, there is evidence that the use of such activities has still not become widespread in a number of ELT situations. One reason for this may be lack of awareness about how levels of thinking can be conceptualized in ELT activities. This paper therefore attempts to clarify the types of thinking that ELT activities can promote, and how they can be integrated in a basic learning cycle. In particular, it focuses on the possibility (and importance) of providing learners who have only a limited knowledge of English with activities that nevertheless involve creative thinking. The ideas are illustrated via a series of sample activities. |Journal or Publication Title:||ELT Journal| |Subjects:||P Language and Literature > P Philology. Linguistics| |Departments:||Faculty of Arts & Social Sciences > Linguistics & English Language| |Deposited By:||Dr Alan Waters| |Deposited On:||26 Feb 2008 14:05| |Last Modified:||28 Oct 2016 01:13| Actions (login required)
<urn:uuid:cf12e299-5b3b-4b8f-bbb5-540a225a95bb>
CC-MAIN-2016-44
http://eprints.lancs.ac.uk/1889/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722951.82/warc/CC-MAIN-20161020183842-00273-ip-10-171-6-4.ec2.internal.warc.gz
en
0.881922
279
2.859375
3
Daytime Station Support Program Membership Campaign Program Summer of Service Program Not quite 10 months after Haiti's devastating 2010 earthquake, a more insidious disaster struck: cholera. Haiti hadn't seen cholera for at least a century. Then suddenly, the first cases appeared in the central highlands near a camp for United Nations peacekeeping forces. Since then the disease has struck 1 out of every 16 Haitians — nearly 640,000 people. It has killed 8,000. The disease struck with explosive force. Within two days of the first cases, a hospital 60 miles away was admitting a new cholera patient every 3 1/2 minutes. "Part of the reason we think the outbreak grew so quickly was the Haitian population had no immunity to cholera," says Daniele Lantagne, an environmental engineer at Tufts University. "Something like when the Europeans brought smallpox to the Americas, and it burned through the native populations." Lantagne says comparison of the Haitian cholera strain with one circulating in Nepal around the same time shows the two differed in only 1 out of 4 million genetic elements. "That's considered an exact match, that they're the same strain of cholera," she tells Shots. Most scientists now think Nepalese soldiers unwittingly brought cholera to Haiti when they joined a U.N. peacekeeping force there in 2010. The outbreak started just downstream from their camp. Sewage from the camp spilled into a nearby river. Lantagne was one of four scientists appointed by the U.N. to look into the matter. Their report, issued in May 2011, implicated the U.N. camp as a likely origin, but it concluded that the outbreak was caused by "a confluence of circumstances." She tells Shots that the report would come out different today. "If we had had the additional scientific evidence that's available now, we definitely would have written the report in 2011 differently, to state the most likely source of introduction was someone associated with the peacekeeping camp," Lantagne says. That's important because the U.N. insists that whatever way cholera got to Haiti, terrible sanitary conditions and lack of clean water were responsible for its remarkably fast spread. But lawyer Brian Concannon doesn't buy that. "It's like lighting a fire in a dry field on a windy day and then blaming the wind or the drought for the fire," says Concannon, who directs a Boston-based group called the Institute for Justice and Democracy in Haiti. More than a year ago, the group filed a legal claim against the U.N. demanding that it accept responsibility. Concannon says the U.N. is supposed to set up a formal mechanism within the Status of Forces Agreements that govern every peacekeeping operation to deal with claims of harm — from traffic accidents and alleged rapes involving peacekeeping soldiers to larger allegations — but it has never done so. Since the U.N. has not responded to its claim, Concannon's group is pondering whether to sue the agency in a court in the United States, Europe or Haiti. For its part, the U.N. hasn't admitted anything. But in December, Secretary-General Ban Ki-moon announced a plan to rid Haiti and the neighboring Dominican Republic of cholera. Concannon says that's ambitious — but feasible. "Cholera can certainly be eliminated from Haiti," he tells Shots. "It's been eliminated from the United States, from England, from many countries in South America," he says. "This is basically 19th century technology that needs to be installed in Haiti." The Haitian government is expected to release a detailed blueprint for the first two years of the effort sometime this month. The entire project is expected to cost $2.2 billion and take at least 10 years. But so far, the U.N. has identified only 10 percent of the money, most of it redeployed from earlier pledges. Concannon worries the rest may never be found. Dr. Jon Andrus acknowledges it's getting harder to raise money for Haiti, as the earthquake fades into history. He's the deputy director of the Pan American Health Organization, an arm of the U.N. Paying for cholera elimination in Hispaniola is the challenge, Andrus tells Shots. "It's a big challenge," he says. "The question is: Can it be done? I believe it can. So we're ramping up efforts to do that." But even if the money can be found, it's going to take years to bring clean water and sewage treatment to a sizable proportion of Haiti's 10 million people. Meanwhile, Haitians will still get cholera and many more will die. One stopgap under discussion is to vaccinate Haitians at highest risk of cholera, such as the 266,000 babies born every year, and those in remote areas who can't get to clinics rapidly. Andrus, who has a background in vaccination programs, thinks that's a good idea. "Haiti has done some great things with vaccination," he says. "They've eliminated measles, rubella and polio, and you can't say that in many countries in Europe. We believe they can do it." Cholera vaccination is 60 to 70 percent effective and lasts about two years. And of course, it also will take money. If enough cholera vaccines become available, one recent study suggests that vaccinating around half the population would provide enough "herd immunity" to make cholera transmission much less likely. But, so far, the U.N. says nothing has been decided about launching a cholera vaccination program of any sort in Haiti.
<urn:uuid:be97c899-e88d-47bc-84d5-f2c1e7667b26>
CC-MAIN-2015-18
http://wamu.org/programs/weekend_edition_saturday/13/01/12/after_bringing_cholera_to_haiti_un_plans_to_get_rid_of_it?width=605&height=485&inline=true
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430454576828.73/warc/CC-MAIN-20150501042936-00076-ip-10-235-10-82.ec2.internal.warc.gz
en
0.970907
1,198
3.265625
3
Compiled and edited by Charles J. Kappler. Washington : Government Printing Office, 1941. Treaty made and concluded on the 7th day of August one thousand eight hundred and fifty five between Garland Hurt Indian Agent for the Territory of Utah for and in behalf of the President and Senate of the United States of the one part and the Chiefs, head men, and warriors of the Sho-sho-nee Nation of Indians (commonly called Snake Diggers) occupying the northern, and middle portion of the Valley of the Humboldt River of the other part We the Chiefs and head men of the Sho-sho-nee Nation do hereby declare that all former disputes and feelings of hostility between our people and the people of the United States are this day amicably adjusted and settled. We guarantee to the people of the United States perfect safety to life and property at all times when peacefully sojourning in, or traveling through our country. We give the right of way through our country to the people of the United States, that said people may pass and repass without harm to themselves or property. We will treat all persons claiming to be citizens of the United States who may settle in our country as brothers and friends, and not as enemies. We acknowledge the supremacy of the laws of the United States and that all persons who may hereafter commit crimes within the limits of our country shall be accounted answerable to said laws. We will use all diligence when called to aid the officers and people of the United States in arresting and bringing to justice, all persons who may have committed crimes within the limits of our country irrespective of the tribes or nations to which the offenders may belong. And the said Garland Hurt for, and in behalf of the President and Senate of the United States, pledges hereby the friendship and good will of the people of the said States to the Chiefs and people of the said Sho-sho-nee Nation. For, and in consideration of the faithful observance of all the obligations above stipulated on the part of the Chiefs and people of the said Sho-sho-nee Nation of Indians, the President of the United States will give to the Chief and people of said nation, through his proper agent, the sum of three thousand dollars in presents (such as provisions, clothing and farming implements &c) to be delivered to them at some convenient point within the limits of their country, on or before the 30th day of September 1857: Provided however that if any part of the above treaty shall be violated by any of the Chiefs or people of the said Sho-sho-nee Nation the above obligations on the part of the President of the United States shall be void, or held at his discretion until such time as ample atonement shall have been made for such violation: Provided further, that if the President and Senate of the United States shall refuse to ratify this treaty, the same shall be void. In witness whereof the said Garland Hurt and the aforesaid Chiefs and head men have hereunto subscribed their names and affixed the seals. GARLAND HURT [SEAL] NIM-OH-TEE-CAH (his x mark) (Man Eater) [SEAL] SHO-COP-IT-SEE (his x mark) (Old Man) [SEAL] PAN-TOW-GUAN (his x mark) (Diving Mink) [SEAL] TOW-(JUAN-DAVAT-SEE (his x mark) (Young Ground Hog) [SEAL] SHO-COP-IT-SEE JUNIOR (his x mark)[SEAL] POW-WAN-TAH-WAH (his x mark) (Strong Smoker) [SEAL] JAN-OUP-PAH (his x mark) (Chinning Man) [SEAL] INK-AH-BIT (his x mark) (Head Man) [SEAL] KO-TOO-BOT-SEE (his x mark) [SEAL] WOT-SOW-WIT-SEE-MOT-TOW (his x mark) (The four Shians) [SEAL] Signed in presence of A. P. Hawes, Interpreter. C. L. CRAIG, VAN EPPS HUGNUIN,
<urn:uuid:8bedf06e-faca-4595-bfb0-0a43dc92ce6a>
CC-MAIN-2017-30
http://digital.library.okstate.edu/Kappler/Vol5/html_files/v5p0685.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549429485.0/warc/CC-MAIN-20170727202516-20170727222516-00060.warc.gz
en
0.926203
913
2.53125
3
The following is an excerpt from an assignment I wrote about the future use of social media in classrooms: Social media offers its own framework of processing information. Using Twitter as an example, each component of a tweet carries with it a packet of additional information. The timestamp: When was the tweet posted? Was it intentionally posted during a typical “high-traffic time?” or was it a throwaway thought late at night? If it was a tweet about another person or an event, how close to the event was the timestamp? What does that indicate about the proximity of the individual – are they live-tweeting the event, or do they have privileged access to a source? The hashtag: is it designed to categorize the tweet, and relate it to those of a similar topic (#NHLfinals)? Is it designed to be a rallying point to draw people in to create a conversation (#Ferguson, #NotYourAsianSidekick)? Is it used to add humour to the tweet, or to add a second layer of communication? RTs and Favourites: how many did it receive, and by whom? If a sports writer has an article retweeted by its subject, is that an endorsement, or an ironic gesture? Or follower hierarchy: if someone with a significantly greater follower count is starting a conversation with someone who has less, what does that mean? Why? These nuances are absolutely familiar to youth who use social media, if not so explicitly discussed. A tweet of 140 characters or a Facebook post can contain all sorts of details about a person’s relationship to a situation, their opinion, or clues regarding their future actions. Assignments can be created which utilize skills that students have not only developed, but which will have continuing relevance in the next 30 or 40 years. At my last practicum, one of my peers asked students to create a Twitter newsfeed for the events leading up to and including the Red River Rebellion with chronological accuracy, using the various elements of Twitter to convey their knowledge. How would students convey the concealed bellicosity of Sir John A. MacDonald? Or the mediation of Joseph Ritchot? These sorts of assignments should not replace “extensive writing” skills, but nor should they be scorned as fluff: refined manipulation of social media’s subtle details has become a legitimate, necessary skill in many professions.
<urn:uuid:42a88dd8-6212-4550-9d0e-6508791b2576>
CC-MAIN-2017-30
https://curiouswinnipeg.wordpress.com/2014/08/20/saying-a-lot-briefly-the-intricacies-of-social-media/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423839.97/warc/CC-MAIN-20170722002507-20170722022507-00324.warc.gz
en
0.95924
485
2.828125
3
There's a reason doctors and scientists are concerned about antibiotic resistance: 23,000 people die each year after picking up an infection of antibiotic-resistant bacteria, as science reporter Maryn McKenna recently pointed out. But researchers are still learning exactly how this resistance is acquired, and one study, which just came out in Nature Communications, found that bacteria colonized in relative isolation—"lonely bacteria"—are more likely to develop resistance to an antibiotic than those that grow in a large colony. Specifically, the researchers exposed E. coli grown in both large and small colonies to Rifampicin, a drug used to treat tuberculosis. They measured the rate of mutation in those colonies. "We discovered that the rate at which E. coli mutates depends upon how many ‘friends’ it has around," the researchers said in a statement. "It seems that more lonely organisms are more likely to mutate.” Mutations are how bacteria develop novel ways to bypass the deadly effects of drugs, and more frequent mutations create more chances to develop resistance. Researchers know the mechanism that makes bacteria mutate has something to do with signaling molecules, which communicate messages—such as whether or not to mutate—to other bacteria. If researchers could figure out a way to hack that system, they might be able prevent those signaling molecules' message from getting through, or from even being produced in the first place.
<urn:uuid:39a60363-a8df-4ff0-a5c9-c482c8b7a7cc>
CC-MAIN-2016-30
http://www.smithsonianmag.com/smart-news/bacteria-all-their-lonesome-are-more-likely-evolve-drug-resistance-big-colonies-180951312/
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257832385.29/warc/CC-MAIN-20160723071032-00024-ip-10-185-27-174.ec2.internal.warc.gz
en
0.958438
284
3.90625
4
If the problems and potential of environmental licensing are not taken seriously in this year’s policy debates and electoral campaigns, future development and economic recovery could trigger environmental degradation far more serious than any single mega-dam project, write Mark S. Langevin and Olivia Smith (both George Washington University). Since the Belo Monte debacle and with increasing private-sector interest in alternative renewables, Brazil’s energy authorities have begun to openly discount the future construction of mega-dam projects. While mega-dams might deliver cheap electricity, their viability is questionable under the “triple bottom line” of economic efficiency, social inclusion, and environmental sustainability. Many have celebrated this change of approach, but environmental licensing in Brazil still creates many critical policy challenges for advocates of sustainable development. The costs of environmental licensing and hydroelectricity In the 1980s Brazil instituted the National Environmental Policy, establishing the environmental-licensing mandate for activities that impact on use of natural resources. The social and environmental costs associated with the licensing of large hydroelectricity projects rose from 6 percent of total project costs in the 1990s to 20 percent by 2010. Mounting licensing costs are largely associated with construction of supporting infrastructure and relocation of adjacent populations, as well as the creation of the dam reservoir. Together, these outlays represent 88 percent of the overall social and environmental costs of licensing. The cost of clearing out reservoirs for mega-dams shot up from 12 percent in the 1990s to over 44 percent of all land- and water-related expenditures. Road construction rose from 25 percent of all relocation costs in the 1990s to 38, whereas population relocation expenses increased from 27 to 36 per cent. Improved enforcement of environmental and social safeguards and the rising cost of environmental-licensing compliance can add up to 8 percent of project costs. In short, licensing of hydroelectricity projects is not cheap. Crucially, however, only hydroelectric projects require the detailed cost accounting associated with environmental licensing. Thermoelectric and alternative renewable sources are not required to disclose such outlays to regulators or investors. Despite the added burden, hydroelectricity remains approximately 20 percent cheaper than the fossil-fueled thermoelectric plants on which Brazil relies to balance its expanding solar and wind generation sources. The “triple bottom-line” requires full transparency of all project costs and the modernisation of the country’s environmental-licensing process for all forms of electricity generation. Investors, policymakers, consumers, and citizens should understand not only the costs, but also the benefits of each individual project. This imperative becomes all the more important with the government’s intention to privatise Eletrobras. The state of environmental licensing in Brazil Brazilian environmental licensing suffers from institutional flaws that make the process more expensive for hydroelectricity and less effective for all energy projects. Even ABEMA, which represents Brazil’s state-level environmental-protection agencies, finds that it “has become a bureaucratic administrative process” with poor outcomes. Environmental licensing in Brazil does not focus resources on impact assessments and mitigation strategies. Rather, the administrative process is centred on project approval and rapid implementation. The Organisation for Economic Cooperation and Development has noted that “potential environmental impact tends to be underestimated or played down, and project proponents rarely propose adequate measures to mitigate the impact or monitoring programmes”. Problems with the environmental-licensing process are also compounded by a significant lack of human resources at every relevant level of government. The number of IBAMA inspectors has fallen in recent years, degrading the federal government’s capacity to coordinate and supervise the process. But particularly grave is the understaffing of the federal agency for Brazilian indigenous peoples (FUNAI), since these groups are often negatively affected by dam projects. Overcoming these challenges would require “capacity building, including greater staffing and professional development, to ensure effective and efficient licensing of all energy infrastructure projects”. For example, most Brazilian states and municipalities with direct regulatory supervision of energy projects do not have the managerial capacity to effectively regulate and support environmental licensing of large projects. Local government authorities may also be “excessively eager to sacrifice local or even regional environmental quality by approving environmentally harmful investments and activities” that create jobs and bolster the local economy. Federal supervision and support, including coordination with local agencies, could be critical to strengthening organisational capacity in assessing impacts and designing mitigation strategies alongside project managers and construction contractors. Finding the right Terms of Reference, and sooner rather than later This challenge is clear from frequent delays in issuing the terms of reference (ToR) that frame the environmental-licensing process for each project. The ToR details the scope and content of an environmental impact assessment, which is the first step in the licensing process. ToRs should provide a list of potential environmental and social impacts that require prevention or mitigation efforts. In practice, state level agencies often adapt generic ToR templates rather than developing content specific to each project. For example, in the state of Minas Gerais, hydropower ToRs replicate a standard template, known as the “simplified environmental licensing” process, that is provided by the state environmental protection agency. Such ToRs are often deficient and lead to poor environmental impact assessments and further project delays. Moreover, since project contractors farm out these kinds of studies, there is an inherent interest in omitting potentially costly environmental issues. IBAMA, the federal government’s environmental protection agency, believes that licensing would be sped up if proponents took environmental studies more seriously and ensured their quality from the outset. The World Bank, meanwhile, has estimated that the length of the arduous ToR-issuing process could be streamlined down from one year to as little as three months. On this front, the federal government recently piloted the Integrated Environmental Assessment, which provides a ToR template for all projects in one area or river basin. This instrument may streamline the process, but a basin-wide assessment will necessarily be less thorough on the specific environmental and social impacts of individual dams. Environmental licensing and Brazil’s 2018 elections Last year Federal Deputy Mauro Pereira (PMDB) and the Brazilian congress attempted to pass environmental-licensing legislation to reduce judicial uncertainty and provide all jurisdictions with a legal framework for carrying out this regulatory process. The proposed legislation emphasises “flexibility” at all levels of government and exempts agricultural activities from the usual requirements. IBAMA openly criticised Pereira’s legislation, claiming that it would weaken licensing, not strengthen it. Opponents also claimed that “flexibility” would create a race to the bottom as state and local jurisdictions prioritised investment in power generation and extractive industries over environmental protection. Brazil will not build any mega-dams during this election year, but it is uncertain whether the national congress will revisit this critical issue before the country elects a new president in October. The only credible environmentalist with any chance of winning the presidential election, Marina Silva (Rede), criticised both the current government of President Michel Temer (PMDB) and the former administration of Dilma Rousseff (PT) for their approach to environmental protection. She is currently polling in third place. Even were she to win, it is far from certain that a new government could enact reforms to both strengthen and streamline the environmental-licensing process. Recent steps away from mega-dam projects lessen the urgency, but Brazil still needs to make sure that environmental licensing is taken seriously in this year’s policy debates and electoral campaigns. If it is not taken seriously, the effects of economic recovery and development could trigger environmental degradation far more serious than that of any single mega-dam project. • The views expressed here are of the authors and do not reflect the position of the Centre or of the LSE • Please read our Comments Policy before commenting
<urn:uuid:46186c61-91af-4d63-bcab-9e5b514be685>
CC-MAIN-2020-34
https://blogs.lse.ac.uk/latamcaribbean/2018/03/08/when-the-mega-dam-breaks-shaping-the-future-of-environmental-licensing-in-brazil/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735833.83/warc/CC-MAIN-20200803195435-20200803225435-00254.warc.gz
en
0.929611
1,633
3.1875
3
Types of Bradycardia There are several types of slow heart rates (bradycardias or bradyarrhythmias). Each type carries a specific risk of complications and treatment options. Some of the types are described here. When a person has sinus bradycardia, the heart rate is less than 60 beats per minute. This slow heart rate might be normal. This type of slow heart rate is often seen in healthy, athletic people. - Risk of complications?This type is not likely to cause complications, unless the heart rate is very slow (less than 40 beats per minute). - Treatment. It rarely requires treatment unless it causes symptoms. Then, a pacemaker may be implanted if there is no cause that can be easily treated. Sinus pause (also called sinus arrest) During a sinus pause, the heart may miss one or more beats because its natural pacemaker fails to activate the electrical system throughout the rest of the heart. - Risk of complications?Yes, depending on the cause. - Treatment.If this occurs often or over an extended period of time, a person may have symptoms now and then and need a pacemaker. If there is an cause that is identified, that condition may be treated first. Sick sinus syndrome Sick sinus syndrome happens when the normal pacemaker of the heart (the sinus node) does not work properly. Various irregular heart rates (arrhythmias) or combinations of arrhythmias can happen. People with this syndrome can have slow arrhythmias or a combination of fast and slow arrhythmias. For more information, see Sick Sinus Syndrome. In tachy-brady syndrome, also called tachycardia-bradycardia syndrome, the heart sometimes beats too quickly (tachy) and sometimes beats too slowly (brady). This abnormal heart rhythm problem is often seen in people who have been diagnosed with atrial fibrillation. It can occur when the heart's natural pacemaker is damaged. - Risk of complications? Yes. You may have symptoms such as palpitations and lightheadedness. You might pass out. You might have a higher risk of stroke. - Treatment.Treatment may include a pacemaker to prevent the heart from beating too slowly. Medicines might be used to prevent the heart from beating too fast. Blood-thinning medicines might be used to help prevent a stroke. Heart block refers to an abnormality in the way electricity passes through the normal electrical pathways of the heart. The abnormality "blocks" the electrical impulse from continuing through the normal pathways and usually results in a slower heart rate. For more information, see Heart Block. Other Works Consulted - Olgin JE, Zipes DP (2015). Specific arrhythmias: Diagnosis and treatment. In DL Mann et al., eds., Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine, 10th ed., vol. 1, pp. 748–797. Philadelphia: Saunders. - Vijayaraman P, Ellenbogen KA (2011). Bradyarrhythmias and pacemakers. In V Fuster et al., eds., Hurst's The Heart, 13th ed., pp. 1025–1057. New York: McGraw-Hill Medical.
<urn:uuid:2a76c64f-340b-43c6-86d3-e80d76fe83d8>
CC-MAIN-2022-05
https://www.medicalrecords.com/health-a-to-z/types-of-bradycardia-special
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300624.10/warc/CC-MAIN-20220117212242-20220118002242-00198.warc.gz
en
0.859725
714
3.25
3
There are some verbs we never seem to use.It’s like when I tell my students not to use the verb “say” all the time when they are writing essays and they invariably stare at me probably thinking : What the hell does she want us to use instead? As if I didn’t know that, deep inside their brains , the verbs “claim” or “state” are there to use as substitutes for the mighty “say”. So let’s widen our vocabulary by revising the meaning of some of the verbs used in this song. I hope that ,in the early future , you use some of them . Let’s listen to this beautiful song by the country music group Lady Antebellum and focus on some verbs and expressions -to scatter:to cause to separate and go in different directions scattering confetti from the upper windows –to wonder:to feel curiosity or be in doubt I wondered what happened -To cross one’s mind:to be a sudden or passing thought; be thought of by She looked so well it never crossed my mind that she was ill. To guess: to think; to suppose; to believe; to imagine I guess I can get there in time.
<urn:uuid:5ed27f3c-d365-45ff-9994-e9733b2901a3>
CC-MAIN-2019-26
https://www.cristinacabal.com/?p=1525
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998462.80/warc/CC-MAIN-20190617083027-20190617105027-00062.warc.gz
en
0.949576
265
3.078125
3
Harnessing the Power of Human Behavioural Design in Health and Safety As professionals in health and safety, we constantly strive to create safer work environments for our employees. One powerful tool that can significantly enhance our efforts is human behavioural design. Let’s explore how incorporating this approach can revolutionise health and safety practices: Understanding Human Behaviour: The Key to Effective Safety Measures When it comes to health and safety, understanding human behavior is crucial. Human behavioural design acknowledges that people’s actions and decisions are influenced by a variety of factors, including cognitive biases, social norms, and environmental cues. By delving into the psychology behind why people behave the way they do, we can design safety measures that align with human nature, making them more effective in driving desired behaviors and reducing the risk of accidents. Applying Behavioural Insights: Enhancing Safety Practices Human behavioural design allows us to leverage behavioral insights to enhance our safety practices. Here are a few ways we can apply this approach: Nudging for Safety: By subtly influencing behavior through positive reinforcement and gentle reminders, we can encourage employees to make safer choices. Simple cues such as signs, visual prompts, or feedback mechanisms can have a significant impact on shaping safety-related behaviours. Social Norms and Peer Influence: Humans are inherently social beings, and we often look to others for cues on how to behave. Incorporating social norms and leveraging peer influence can motivate individuals to adopt safe practices. Highlighting positive role models, sharing success stories, or implementing team-based safety initiatives can foster a collective commitment to safety. Gamification and Incentives: Applying game elements and incentives can make safety practices more engaging and enjoyable. By introducing friendly competitions, rewards programs, or recognition systems, we tap into people’s natural desire for achievement and create a positive safety culture. Transforming Safety Culture: Empowering Employees Human behavioural design not only enhances safety practices but also empowers employees to actively participate in creating a safer work environment. When individuals understand the rationale behind safety measures and feel involved in the decision-making process, they become more motivated and accountable. By fostering a culture of open communication, continuous learning, and collaboration, we empower employees to provide valuable insights, identify potential hazards, and contribute to innovative safety solutions. The Future of Health and Safety: Embracing Behavioural Design As we strive to create safer workplaces, incorporating human behavioural design into our health and safety practices is a game-changer. By understanding and harnessing the power of human behavior, we can design interventions that are not only effective but also resonate with our workforce, driving a positive shift in safety culture. Let’s embrace the potential of human behavioural design and make health and safety an integral part of our organisational DNA.
<urn:uuid:5de8dfbc-0975-4df3-b9bd-a798b67a3fe3>
CC-MAIN-2023-50
https://engagesolutions.co.nz/humanbehaviour/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00485.warc.gz
en
0.904116
573
3.328125
3
A toolpath is the intended trajectory that the tip of the endmill will follow, to remove material and produce the desired geometry of the workpiece. For a specific object geometry/feature defined in the CAD tool, the CAM tool will generate toolpaths as sets of lines and curves defined in X/Y/Z space, and the post-processor will then generate the corresponding G-code instructions for the selected machine. "2D" toolpaths correspond to cutting a 2D feature in the design, moving only two axes of the machine at a time (typically, stepping down along Z only, then moving only in the XY plane, before proceeding with a deeper Z). Since X, Y, and Z are moved (albeit not simultaneously), this is sometimes called "2.5D". "3D" toolpaths correspond to cutting a 3D feature, and potentially moving the three axes of the machine simultaneously. Let's take the simplest example of a 50x50mm square shape in a CAD tool, placed in the center of a 100x100x10mm stock material, with the zero point defined in the lower-left corner, and using a 6mm endmill (~1/4") : Various types of toolpaths can be created based on this reference shape. In a pocket toolpath the endmill is moved within the boundaries of the shape, to remove all material from the top surface down to a given depth: Extremely simple, but it already illustrates a few interesting general parameters that will apply to any toolpath: the zero (X0/Y0/Z0) point: in this example, it is positioned in the lower-left corner of the top of the stock. since the toolpath defines the trajectory of the tip of the endmill, an endmill positioned at the zero point touches the stock surface, so the very first action is to raise the endmill up to the retract height (Z offset above Z0), to avoid scraping the surface when moving to the cutting area. the red lines illustrate rapid moves ("rapids"). The first move is from the zero point (+ retract height), to the point where the endmill will start plunging into the material (vertical green line) The example above illustrates a straight plunge, since this is what Carbide Create generates, but plunging vertically is a bit hard on the endmill, so there are other approaches to ensure a smoother entry into the material. Below are examples of linear ramping and helix ramping (using Fusion360 CAM preview) : Since the pocket depth may exceed what be can cut in a single pass by the endmill, it is often necessary to take several passes, removing a given depth of cut (DOC) a.k.a. depth per pass, until the full pocket depth is reached: On the following snapshot, a few circles of the same diameter as the endmill were added for the purpose of illustrating two things: the stepover (a.k.a. width of cut, a.k.a. radial width of cut) parameter of the toolpath controls how close to each other successive loops of the toolpaths are, in this case the stepover was chosen to be 50% of the endmill diameter for simplicity. Check out the Feeds & speeds section for recommended stepover values, and how this affects chip thinning and ultimately the optimal feeds and speeds. in corners two things happen: the cutter engagement temporarily increases (see tool engagement in the Feeds & speeds section). Nothing to be concerned about in many cases, but this limits the feeds and speeds to being more conservative than they could be. This is where advanced toolpaths help, e.g. adaptive clearing, more on this later. obviously, the round endmill cannot reach all the way into the corners, so some material is left and all corners end up rounded to the diameter of the endmill. One way to mitigate this is to use a smaller endmill, but cutting a large pocket using a very small endmill would take forever, so a better alternative is first cut the pocket normally with a large endmill, then run a second toolpath will a smaller endmill, that will only work locally in the corners. In advanced CAM tools, this is easy using the "rest machining" option described later below, where the CAM is smart enough to figure out how much material is left and where and to produce a second toolpath with a smaller tool that will only cut there. At the time of writing Carbide Create does not support rest machining, but you could fake it by manually creating additional geometry. In the example below, a 4.5x4.5mm square was added in one corner, with an associated pocket toolpath using a 1/16" endmill. The corner will still not be perfectly square, but its radius will be 4 times smaller, so it will look much closer to square. Even though this "concentric squares" toolpath is by far the most common, other patterns exist. Below is an example of the same pocket using a "zigzag" or "raster" pattern toolpath in Vectric VCarve : And then there is the matter of the DOC and WOC. As covered in the Feeds & speeds section, you can either go for a low DOC and high WOC, or high DOC and low WOC. To illustrate the former, considering the 6mm endmill used in this example and assuming we want to cut a 6mm (0.25") deep pocket, we may want to choose a DOC of 2mm (33% of endmill diameter) and WOC of 3mm (50% stepover), which would result in three passes: If we wanted instead to go for a high DOC (say full pocket depth, i.e. 100% of endmill diameter in this case) and a low WOC (say 20%), we would also need to take care of the initial clearing down to full depth, because just plunging to full depth and starting to cut the pocket would initially involve a slotting cut (100% stepover) at full depth...which for some materials may be too much to take for the Shapeoko. If your CAM tool allows, you can just use the option of helical ramping down to the full depth of the pocket, as in this Fusion360 example: This allows reaching full depth without ever engaging the tool completely, and then the pocket toolpath at full DOC and low WOC (20% of tool diameter in the example below) can proceed: In Carbide Create, you could emulate this by creating two toolpaths: a first one using regular low DOC/50%-stepover pocketing, down to full depth, on a small area: this would clear the way for a second toolpath doing a single pass at full depth, and 20% stepover: Contour (a.k.a. Profile) toolpaths just follow the...contour of a shape, with the option to have the endmill positioned either on the outside or on the inside of the shape, or right on it: outside contours are usually associated with cutting the shape out of the stock material: inside contours are usually associated to creating a <shape>d-hole in a piece: no-offset contours can be used for example for engraving the shape on the surface of the piece with a pointy bit. So, contour toolpaths are extremely simple, but there is a small catch: they produce slotting cuts: In this situation, half of the endmill circumference is engaged in the material at all times, refer to the slotting paragraph in Feeds & speeds section for details. The bottomline is that since this is a worst case scenario for the cutter, the feeds & speeds and DOC need to be dialed back quite a bit to avoid chatter or excessive tool deflection. Sometimes this is no big deal and you can just proceed with the reduced DOC and be fine. In other situations (e.g. cutting plastics or metal), deep slotting can be difficult and a solution can be to avoid it altogether when possible, for example by cutting the profile as a pocket instead of a slot. This usually requires creating additional geometry around the piece, and creating a pocket toolpath to cut material in-between the original shape and the added geometry: The orange square is the original shape The black square is the extra geometry, created to be larger than the original square by a value of the endmill diameter plus a small margin. Selecting the two squares, Carbide Create produces the pocket toolpath shown in blue The tool first goes around the inside of the outer square: no benefit there, this results in slotting. But then the tool proceeds to follow the second/inner blue path, around the outside of the original square, and this is where pocketing helps: the tool now just has to remove the thin remaining layer of material, and has some clearance against the opposite wall, so this is like a cutting pass with a very small stepover: this is perfect to minimize forces, and act as a finishing pass. Regular pocket and profile toolpaths share a common problem that is not immediately apparent: they involve large tool engagement angles in the material (constantly when slotting, and temporarily in the corners when pocketing, see Feeds & speeds section), which in turn limits how deep/fast one can cut. Adaptive clearing (which is Fusion360's name for their trochoïdal milling family of toolpaths) is another approach that generates toolpaths that have a constant (and relatively low) tool engagement value throughout the cut. When going straight, this is the same as using a very small stepover. When cutting corners, this means taking many small scoops of material, instead of going straight and taking a sharp 90° turn. While a pocketing operation using a stepover of 60% would look like this (notice the ~180° tool engagement in the corner): an adaptive clearing toolpath on the same geometry with radial width of cut of 60% would look like this (notice how the tool is turning before the corner, keeping tool engagement to ~90°): Coming back to the profile cut example discussed earlier, adaptive clearing can be leveraged to avoid slotting. Using extra geometry around the original shape and creating a 2D adaptive clearing toolpath results in something like this: After it plunges to the depth of cut (possibly using helical ramping), the endmill is moved in small spiral movements between the inner geometry and the outer geometry: at any given time, the endmill engagement into the material is constant (and small): Since the cutter engagement is low, one can use much more agressive feeds and speeds (but of course, it takes longer to do all these spiral movements rather than going in a straight vertical line, so whether or not this results in a longer or shorter job time depends on the situation) For the same reason, the DOC can also be increased very significantly i.e., adopting the "high DOC, low WOC" approach. V-carving is a specific toolpath strategy dedicated to using V-bits to cut the inside of shapes, resulting in a cut depth that depends on how far apart the sides of the shape are. Let's take the example of a simple chevron shape, to be cut with a 60degree V-bit: the toolpath (pink) is where the tip of the V-bit will be if we look at a vertical cross-section where the blue line is, the V-bit will be like this: while at the level of the green line, the cross-section would look something like this: Here's a preview of this toolpath, the width of the cut is controlled by how deep the V-bit is driven: A typical use is to carve the inside of text characters: Carving the outside of characters within a predefined boundary is another popular option, and when combined with the ability of some CAM tools to limit the V-carve depth to a predefined max value, it can produce interesting 3D-like results: For every toolpath there are two conflicting needs: minimizing the total runtime, and getting the best finish quality and dimensional accuracy of the workpiece. Instead of settling for a middle ground that accommodates both constraints, a very common approach is to create two different toolpaths: the first (roughing) toolpath will be optimized to go fast, maximising material removal rate, but will be programmed to leave a little bit of material around the selected geometry. Even of the tool deflects, vibrates, or more generally produces a poor surface finish, this will be taken care of by the next toolpath. the second (finishing) toolpath will be optimized for getting a good surface finish and accuracy: it can be set to go slower, but even if it isn't, the simple fact that it will have very little material left to cut will reduce the efforts on the tool, and produce a cleaner result. How roughing/finishing is setup depends on the CAD/CAM tool being used: Carbide Create does not support (at the time of writing) any roughing/finishing option explicitly, but one can still manually create additional geometry in the design to do it, as explained above in the alternatives to slotting. Vectric V-Carve has explicit options in its toolpath parameters to create an "allowance offset", basically a margin that will be kept when cutting. One can therefore select a geometry and: create a first toolpath with an allowance offset (of say 0.01") create a second toolpath with an allowance offset of 0. for profile toolpaths, this is even simpler: there is a "Do Separate Last Pass" option with an allowance offset value, to tell VCarve to use the allowance value for successive passes down the material, but for the last (deepest) pass, discard the allowance: this will result in the endmill taking a single full-depth pass all around the geometry at the end, shaving off the material to get to the final dimensions and finish quality. Fusion360 has a "Stock to leave" option in the toolpaths, which works similarly: create a first toolpath with stock to leave at a small value. Both the radial ("vertical") and axial ("horizontal") stock to leave values can be specified. Here is an example using 0.5mm radial and axial stock to leave in an outside profile toolpath: notice how at the end of this toolpath, there is a small amount of extra stock remaining around the center back square: create a second toolpath, identical to the first one except setting radial and axial stock to leave to 0: this will shave off the extra material, to reveal the final walls of the workpiece (in blue) as well as remove the remaining 0.5mm at the bottom: A very common scenario is to first use a large tool to remove a lot of material quickly, and then switch to a smaller tool to cut finer details. CAM tools that support REST machining can optimize toolpaths such that the tool only works in the areas where material was not already removed by the previous toolpaths. Consider the case where a large pocket must be cut, but the pocket has tight corners radius: a large endmill will be more efficient at removing material quickly, but will not be able to reach into the tight corner a small endmill will be able to reach the corner, but would be very inefficient at cutting the whole pocket In the example below a 6mm (0.24") square endmill is first used, with aggressive feeds and speeds to clear out a lot of pockets quickly, and with some stock to leave: A second toolpath using an 1/8" endmill and REST machining option, with no stock to leave, takes care of cutting (only) the tight corners as well as removing the remaining stock on the pocket walls (i.e. finishing) The power of REST machining lies in the fact that both toolpaths refer to the same geometry (the pocket outlines), there is no need to manually create any additional geometry or contraints to restrict the second toolpath to working on the walls and corners only. Consider the case of a profile cut, where the tool plunges straight down at a point somewhere along the profile. During the plunge, the forces on the endmill are mostly vertical, the tool will not deflect. But once the endmill has reached the DOC and starts moving around the profile, lateral forces on the endmill will cause deflection, and the actual cutting path will deviate from the intended path by a tiny amount (greatly exaggerated on the sketch below). The resulting profile cut may then end up having a (small but) visible notch at the point where the endmill plunged into the material: One way to avoid this is to use a roughing pass with stock to leave: the deflection effect will still happen, but it will happen away from the contour, and a finishing pass (with very little deflection) will then come and shave off this small variation. Another way to deal with such problems is to use lead-in (respectively lead-out) options if the CAM tool supports it: the toolpath with make the endmill plunge away from the profile, and then lead into (respectively out of) the profile edge: At the time of writing, this feature is not supported in Carbide Create, but one can fallback to manually adding geometry around the piece to achieve similar results. The standard version of Carbide Create does not support them, and the topic is too wide and too specific to be covered here properly, but here is a simple example of milling a donut shape: Many of the concepts of 2D toolpaths apply, but the notion of roughing + finishing will be paramount for 3D, to get both a reasonable job time and a smooth finish. For drilling a hole, a first option is to use an endmill smaller than the hole, and use a circular pocket toolpath. It works fine, but turns out to be inconvenient: if a job that could otherwise be done completely with e.g. a 1/4" endmill needs 1/4" holes, a 1/8" endmill will be required just to mill the hole pockets. small endmills usually have a short length of cut and shank, so cutting a deep 1/8" hole with a 1/16" endmill could turn out to be impossible. A useful alternative is to use specific drilling toolpaths, that just plunge the endmill vertically, so it becomes possible to do a 1/4" hole with a 1/4" endmill. However, an endmill is very bad at drilling, it is just not designed for this, so the plunge rate should be limited, and the "peck-drilling" option used: the tool will cut a small DOC, retract to clear out the chips, and then plunge again, repeatedly until the full depth has been cut. A more efficient alternative is of course to use an actual drill bit instead of an endmill, but...it implies an additional tool change. Pretty much all CAM tools embed a toolpath visualization feature, however what they display is the toolpath defined in the design, and this is not guaranteed to be 100% what the machine will execute, because of the post-processor step: the generated G-code might be subtly different depending on the selected options. One way to double-check is to visualize the toolpath from the generated G-code file itself. There are a number of offline and online G-code viewers (CAMotics is a popular open source desktop app, and there are many online G-code viewers too): It's easy to understand that the order in which the toolpaths are run (usually) matters, but also quite easy to overlook a wrong ordering when a project involves many toolpaths. On the Shapeoko, toolpaths using different tools will be in different G-code files (since there is no automatic tool changer), so the likelihood of manually executing the files in the wrong order is small. But multiple toolpaths using the same tool will usually be included into a single file, and the ordering will be as declared in the CAM tool, so a user error is more likely!
<urn:uuid:d648bea1-ff0e-4c64-b9e4-b29f3b07aa16>
CC-MAIN-2020-10
https://shapeokoenthusiasts.gitbook.io/shapeoko-cnc-a-to-z/toolpath-basics
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146341.16/warc/CC-MAIN-20200226084902-20200226114902-00165.warc.gz
en
0.929169
4,269
3.125
3
Sound engineering and laboratory practices require that the instrumentation used to make critical strain measurements be periodically calibrated to verify that it is within the manufacturer’s original specifications. Additionally, each type of strain indicator exhibits some degree of nonlinearity, especially for large strains during quarter-bridge operation. Since this is the most common stress analysis application of strain gages, it is important that the strain indicator be calibrated in this mode. Instrumentation span should also be checked at a number of points before each important test to avoid inaccurate data. The Model 1550A calibrator is a Wheatstone bridge and generates a true change of resistance in one or two arms of the bridge. It simulates the actual behavior of a strain gage in both positive and negative strain. The ‘star network’ used in certain other commercial calibrators provides a substantially lower cost instrument design, because component specifications are less critical, and fewer components are required. However, the ‘star network’ cannot simulate quarter- bridge strain gage behavior, and cannot simulate positive strain. Another serious problem with this circuit is that the bridge input and output resistances change in an abnormal manner, leading to inaccuracies in calibration under some conditions. A calibrator based on the Wheatstone bridge principle requires stable components. A total of 66 ultra-stable precision resistors are used in the Model 1550A calibrator to provide the stability, repeatability, accuracy and incremental steps required in a laboratory standards instrument.
<urn:uuid:d244ecd8-d768-43ae-9e25-6a5f73964fb2>
CC-MAIN-2022-27
https://intertechnology.com/products/Vishay-Model-1550B-Strain-Indicator-Calibrator-p46117726
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103034170.1/warc/CC-MAIN-20220625034751-20220625064751-00172.warc.gz
en
0.904133
296
3.078125
3
Chickpea, Garbanzo, Gram, Bengal Gram, Cece, Homos, Chana Chickpea’s origin is possibly western Asian, specifically southeast Turkey. Chickpea is the second most important pulse crop in the world. The immature green pods and tender shoots are used as vegetables. The greatest usage, however, is as a pulse prepared as dahl or flour. It is adapted to cool to moderate temperatures (8-22o C/46-72o F) for growth but tolerates a lot of heat during fruiting and ripening period. It is grown as a cool season annual in a broad belt through the Mediterranean region to the sub-tropical and tropical regions of Asia, Europe, Central & South America. The Chickpea grows in a variety of soils but does not tolerate wet or saline soils very well. Very heavy soils may cause problems in emergence of seedlings. It grows as a herbaceous annual branching close to the ground. Some varieties are semi-erect with a main stem and only a few branches while others are semi-spreading types with profuse branching. Under good cultivation the plant grows up to 20-45 cm (10-18 in) in height. Seeds are borne in short pubescent pods, 1-2 seeds per pod. Small black seeded types are associated with earliness and tolerance to adverse soil conditions while white seeded types appear to be higher yielding under favorable conditions. There is evidence that Chickpeas help release phosphorus into the soil. Plant at beginning of cooler growing period when moisture is expected to be adequate. Seeds are sown about 25 cm (10 in) apart and harvested 4-6 months after sowing. Plants are not strongly competitive with weeds. Generally one weeding, 45 days after emergence, is enough to keep weeds under control. Prolonged contact with the fluid exuded from the hairs on the plant may cause disintegration of garments, especially shoes. Harvesting and Seed Production Before harvesting, plants should be well dried either in the field or pulled out and dried in the sun. Threshing is accomplished by hand flailing taking care not to crack or split the seeds. Pests and Diseases Chickpeas are not generally susceptible to many pests and diseases. Watch for cutworms, the red gram plume moth, and the bollworm. May be sensitive to root-knot nematodes. Cooking and Nutrition Chickpeas are eaten fresh or the dried seeds are used as a pulse. Can be fermented into tempeh. Dried seeds can be ground and used as a coffee substitute. A strong acid dew forms on the plant overnight that is gathered and made into vinegar or cooling drinks. Young leaves, tender shoots, and green pods are eaten as a green vegetable. Dried seeds are about 60% carbohydrates and 23% protein. The seeds have very good digestibility.
<urn:uuid:ad2218d1-212d-46bd-90e6-0b0ef15f0f3d>
CC-MAIN-2018-30
https://www.echocommunity.org/en/resources/e4b914ba-a4c9-426a-8e0f-f0b63671c00a
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593378.85/warc/CC-MAIN-20180722155052-20180722175052-00114.warc.gz
en
0.942014
602
3.328125
3
Built in 1813 and designed by Boston architect Alexander Parris (and, like the Capitol, much expanded since the Confederate years) Virginia's governor's mansion served during the Civil War years as home of two governors, John Letcher and William Smith. It was here that the body of Stonewall Jackson was brought for public viewing after he was killed in Chancellorsville in May 1863. The following day his funeral was held in the Capitol. On April 4, 1865, immediately after the fall of Richmond, Lincoln visited the mansion. Today, this is the nation's oldest governor's mansion still occupied by any state's chief executive.
<urn:uuid:726a614f-92fe-494e-8a76-8b9a13ee0e61>
CC-MAIN-2015-35
http://www.styleweekly.com/richmond/the-governors-mansion/Content?oid=1477676
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644060413.1/warc/CC-MAIN-20150827025420-00043-ip-10-171-96-226.ec2.internal.warc.gz
en
0.986771
129
3.140625
3
This tale about the gifts of corn and buffalo to the Cheyenne is related to the legend about Arrow Boy. In the Cheyenne manner, a storyteller will say, "Let's tie another story to the end of this one," and go on from there. North, as it is spoken of at the beginning of both tales, is a nostalgic reference to the Cheyenne hunting grounds in north-central America, from which they were driven by invading tribes, probably the Ojibway. When the Cheyenne were still in the north, they camped in a large circle at whose entrance a deep, rapid spring flowed from a hillside. The spring provided the camp with water, but food was harder to find. The buffalo had disappeared, and many people went hungry. One bright day some men were playing the game of ring and javelin in the center of the camp circle. They used a red and black hoop and four long sticks, two red and two black, which they threw at the hoop as it rolled along. In order to win, a player had to throw his stick through the hoop while it was still moving. A large audience had already gathered when a young man came from the south side of the camp circle to join them. He wore a buffalo robe with the hair turned outward. His body was paintd yellow, and a yellow painte eagle breach-feather was fastened to his head. Soon another young man dressed exactly like the first came from the north side of the circle to watch the game. They were unacquainted, but when the two caught sight of each other they moved through the crowd to talk. "My friend," said the man from the south side, "you're imitating my dress. Why are you doing it?" The other man said, "It's you who are imitating me. Why?" In their explanations, both men told the same story. They had entered the spring that flowed out from the hillside, and there they were instructed how to dress. By now the crowd had stopped watching the game and gathered around to listen, and the young men told the people that they would go into the spring again and come out soon. As the crowd watched, the two approached the spring. The man from the south covered his head with this buffalo robe and entered. The other did the same thing. The young men splashed through the water and soon found themselves in a large cave. Near he entrance sat an old woman cooking some buffalo meat and corn in two separate earthen pots. She welcomed them: "Grandchildren, you have come. Her, sit beside me." They sady down, one on each side of her, and told her that the people were hungry and that they had come to her for food. She gave them corn from one pot and meat from the other. They ate until they had had enough, and when they were through the pots were still full. Then she told them to look toward the south, and they saw tht the land in that direction was covered with buffalo. She told them to look to the west, and they saw all kinds of animals, large and small, including ponies, through they knew nothing of ponies in those days. She told them to loook toward the north, and they saw corn growing everywhere. The old woman said to them, "All this that you have seen shall be yours in the future. Tonight I cause the buffalo to be restored to you. When you leave this place, the buffalo will follow you, and your people will see them coming before sunset. Take this uncooked corn in your robes, and plant it every spring in low, moist ground. After it matures, you can feed upon it. Take also this meat and corn that I have cooked," she said, and when you have returned to your people, ask them to sit down to eat in the following order: First, all males from the youngest to the oldest, with the exception of one orphan boy; second, all females, from the oldeest to the youngest, with the exception of one orphan girl. When all are through eating, the rest of the food in the pots is to be eaten by the orphan boy and the orphan girl." The two men obeyed the old woman. When they passed out of the spring, they saw that their entire bodies had turned red. They went to their people who ate as directed of the corn and meat. Ther was enough for all, and the contents of the pots remained full until they were passed to the orphan children, who ate all the rest of the food. Toward sunset the people went to their lodges and began watching the spring closely, and in a short time they saw a buffalo leap out. The creature jumped and played and rolled, then returned to the spring. In a little while another buffalo jumped out, then another and another and finally they came so fast that the Cheyenne were no longer able to count them. The buffalo continuned to emerge all night, and the following day the whole country out in the distance was covered with buffalo. The buffalo scented the great camp. The next day the Cheyenne surrounded them, for thought eh men hunted on foot, they ran very fast. For a time the people had an abundance of buffalo meat. In the spring they moved their camp to low, swampy land, where they planted the corn they had received from the medicine stream. It grew rapidly and every grain they planted brought forth strong stalks bearing two to four ears of corn. The people planted corn every year after this. One spring after planting corn, the Cheyenne went on a buffalo hunt. When they had enough meat to last for a long time, they returned to their fields. To there surprise, they found that the corn had been stolen by some neighboring tribe. Nothing but stalks remained--not even a kernel for seed. thought the theft had occurred about a moon before, the Cheyenne trailed the enemy's footprints for several days. hey even fought with two or three tribes, but never succeeded in tracing the robbers or recovering the stolen crop. It was a long time before the Cheyenne planted any more corn. The loss of corn described here may symbolize how the Cheyenne abandonded planting for buffalo hunting in the last half of the eighteenth century. The "wings" given the Plains tribes by the arrival of guns and horses at this time not only allowed the to move from being gatherers to being hunters (the reerse of the more common cultural evolution) but opened up the possibility of a more elaborate--and transportable--material culture--hence the term, golden age of the Plains Indians. Back to Native American Indian Stories Page Back to Main Page
<urn:uuid:e306d00b-fcb9-4bad-bfed-e7e7370a84ec>
CC-MAIN-2019-26
http://www.angelfire.com/ca/Indian/OldWomanSpring.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998755.95/warc/CC-MAIN-20190618143417-20190618165417-00061.warc.gz
en
0.988033
1,391
2.828125
3
One of the founders of sociology, Emile Durkheim gathered data from across Europe in the late nineteenth century to study the factors that affect the suicide rate. His findings revealed that people who had fewer social constraints, bonds and obligations were more likely to kill themselves. Essentially, freedom can be hazardous to your well being. (Hear that Wallace?) Durkheim found that people living alone were more likely to kill themselves; married people, less so; married people with children, still less. He concluded that people need obligations and constraints to provide structure and meaning to their lives. Many years of further study have confirmed Durkheim's diagnosis. If you want to predict how happy someone is, or how long that person will live (genes and personality aside), find out about their social relationships. Having strong social relationships strengthens the immune system, extends life, speeds recovery from surgery and reduces the risks of depression and anxiety disorders. OK, it is a tad more complex than this, but essentially true:- 'a very happy individual is likely to be a happily married optimistic extrovert, having an active social life with a network of good social support, who feels fulfilled at work, is religious, enjoys active recreational pursuits, exercises regularly and feels they are in good health. He or she is also likely to have their basic needs met and live in a democratic country which respects civil rights and freedom of speech.' Giving support and caring for others is also important to happiness. 'We need to interact and intertwine with others; we need the give and the take; we need to belong.' (Baumeister and Leary, 1995) Think hard before you break the bonds that may be extending your life and bringing you happiness, for example leaving homes, relationships, jobs and cities, in search of personal and professional fulfilment. Such an ideology of extreme personal freedom can be bringing on unhappiness. Seneca got it right when he said, "No man can live happily who has regard to himself alone and transforms everything into a question of his own utility'. (Some Sunday night thoughts with the help of The Happiness Hypothesis by Jonathan Haidt.)
<urn:uuid:88cee175-dec6-4dff-b44d-38147a695178>
CC-MAIN-2018-30
http://jamesdyasdavidson.blogspot.com/2013/03/
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590329.62/warc/CC-MAIN-20180718213135-20180718233135-00479.warc.gz
en
0.964316
440
2.78125
3
Toxic Ship Paint Additive to Be Banned An International Maritime Organization (IMO) treaty banning tributyltin (TBT) from ship paint is expected to be passed soon. An Environmental Protection Agency (EPA) fact sheet on TBT describes the chemical as “extremely toxic to aquatic life and . . . an endocrine-disrupting chemical that causes severe reproductive effects in aquatic organisms.” TBT was a common anti-fouling agent used in ship paint until relatively recently. Barnacles, algae, and other marine plants and animals encrusting the surface of a ship is known as “fouling” (or “bio-fouling”) and costs more than $10 billion a year. The speed of a vessel encrusted with marine organisms can be reduced by up to 10 percent, while its fuel consumption can increase up to 40 percent, raising its carbon emissions. Barnacles, algae and other organisms can also damage or corrode a ship’s hull. Many cruise lines and others in the marine industry have already ceased using paint with TBT, but nevertheless, a year after its ratification, the IMO treaty will ban all TBT use on vessels in countries who sign the treaty and on vessels entering those countries’ waters. However, an older ship with TBT on its hull will be allowed if a sealant that makes the toxin inert has been applied to the surface. Any vessel that is discovered violating the treaty will be blacklisted and barred by any other country that has signed the treaty. Apparently the treaty also outlines procedures for testing and reducing other biocides used on ships’ hulls. Detractors of the treaty claim that it is difficult to create new anti-fouling coatings that do not harm the environment. Currently, paint infused with tin or copper-based compounds is often used on ships to deter fouling instead of a biocide-infused paint. However, these compounds also accumulate in the environment and worries over their ecological effect are increasing. A possible alternative to biocides, tin, and copper was announced at the EuroNanoForum in Dusseldorf in June of this year: nanotechnology. The new nanotechnology ship coating does not have the same environmental impact because it deters organisms from attaching instead of killing them once they have attached. Tiny cylinders of carbon, carbon nanotubes, are mixed with silicone paint to disturb the paint surface on the molecular level. This impairs a marine organism’s glue molecules, resulting in the organism falling away when the vessel moves. If the IMO TBT treaty is ratified, as many assume it shortly will be, this type of ship coating may soon be in common use.
<urn:uuid:80a6ad47-d499-414d-8e16-cb9e68f0a52d>
CC-MAIN-2022-27
https://www.maritime-executive.com/article/2007-09-07toxic-ship-paint-additive-to-be-banned
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103271864.14/warc/CC-MAIN-20220626192142-20220626222142-00171.warc.gz
en
0.958086
567
2.859375
3
Have a qualified person check the temperature. Most manufacturers recommend setting it between 49-60°C (140°F). Any higher is probably wasteful and may produce water that is too hot at the tap. Fix Leaky Taps A tap dripping at one drop per second wastes 800 litres of water per month. In most cases, a worn out washer is the culprit. New washers are relatively cheap, and they can be replaced in minutes with a simple wrench and screwdriver. Use Faucet Aerators Install faucet aerators on your sink faucets to lower water flow. Aerators mix air into the water flow and reduce water consumption by 25 – 50% per tap. Check to see whether aerators can be threaded onto your taps. Insulate Hot Water Pipes Insulate at least the first three feet of pipe leading to and from the hot water tank with tape wrap or snap-on foam pipe tubing. Both are easy do-it-yourself jobs. With both types, the insulation should be a minimum of 13 mm thick to be effective. Plastic pipes shouldn’t be wrapped – the extra warmth might soften them. Wash Your Clothes for Less Use cold water washing wherever possible. And always set your washer to rinse with cold water. Cold water rinsing can save you enough energy for about 220 showers per year. When you do use hot water washing, be sure to set the water level to match the load. Remove and clean the washer’s agitator once a month. Clean the filters of both water hose inlets on the back of the machine once a year. Looking for a New Washing Machine? It pays to read the EnerGuide label and comparison shop for the most energy efficient model. Remember, the lower the kWh rating, the better the efficiency. Appliances last for many years, and the “second price tag”, the cost of running the appliance, can add up to more than the initial purchase price. So use the EnerGuide label to help you shop smart.
<urn:uuid:c28b0026-bab8-4f36-bf1c-fa00fec8d91a>
CC-MAIN-2020-16
https://www.nevlec.com/residential/efficiency-conservation-tips/hot-water-heating-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00512.warc.gz
en
0.887816
429
2.625
3
| Previous Page | Next Page | Index Type: 5th rate ; Armament 36 Taken : 12 Oct 1798 ; Disposal date or year : 1813 1798 French frigate Embuscade captured. 1798 purchased into the navy as Ambuscade. 1804 Ambuscade renamed Seine. 30 Apr 1805 captured the French privateer Perseverante on the Jamaica station. 27 May 1805 ship's boats : capture the armed schooner Concepcion ; mid June destroyed a Spanish sloop and captured a second Concepcion, a large felucca. 4-8 Jul 1806 Northumberland, Elephant, Canada, Agamemnon, Ethalion, Seine, Galatea, Circe, whilst protecting a large convoy bound to England, chased a French squadron under M. Willaumez through the Channel between St.-Thomas and Passage island. 26 Dec 1807 captured the French privateer Sybille on the Home station. 25 Oct 1809 captured the French privateer Rodeur. 13 Feb 1810 ships' boats captured a number of armed boats and destroyed three grounded chasse-marées. Deal 16 Jan 1811 arrived from Plymouth with a convoy that has gone for the River. Portsmouth 10 Jun 1811 departed on a cruise. Deal 4 Jul 1811 arrived from the westward. Deal 12 Jul 1811 arrived from the Nore. Deal 28 Jul 1811 departed for the Nore. Deal 11 Aug 1811 departed for Portsmouth. Portsmouth 18 Aug 1811 departed for Halifax. Plymouth 20 Aug 1811 arrived with a convoy for Quebec and Halifax. Plymouth 21 Aug 1811 Put in with a convoy, due to unfavourable winds. Plymouth 25 Aug 1811 departed with a convoy for Quebec, &c. Deal 15 Dec 1811 arrived from the Texel. Portsmouth 24 Dec 1811 arrived from Quebec. Portsmouth 1 Jan 1812 departed for the river to be paid off. Deal 2 Jan 1812 arrived from Portsmouth, bound for the Nore.
<urn:uuid:809d9efc-5ab2-44ec-b2ab-fe54488e8368>
CC-MAIN-2017-04
http://www.pbenyon.plus.com/18-1900/S/04199.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00366-ip-10-171-10-70.ec2.internal.warc.gz
en
0.881415
450
2.53125
3
Because citrus trees do not tolerate frost, they make a good choice for growing in the sunny Arizona climate. Be prepared for the thorns, as Arizona citrus trees typically sprout ominous sharp stickers. The Arizona Master Gardener Program warns against pruning, advising instead to remove dead, wayward or crossing branches. The ideal time for planting is September. Dig a hole for planting the tree, making it just deep enough to fit the root ball and three or four times wider. Maintain the original soil line as the tree's container. Toss away any rocks from the removed soil, which will be used to refill the hole when planting the tree. Gently remove the citrus tree from its container. Some soil will fall away. Set the tree in the center of the hole and backfill the hole with the soil you removed, holding the tree in place. Water thoroughly, but do not fertilize until after the first year. Create a water basin around the tree for irrigation and apply 3 to 4 inches of mulch on the root area. Paint the tree trunk with white, water-based latex pain to prevent sun damage.
<urn:uuid:b6dbc07a-0c02-45fa-a3ed-60530d7154d2>
CC-MAIN-2017-39
http://www.gardenguides.com/110767-grow-citrus-trees-arizona.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690228.57/warc/CC-MAIN-20170924224054-20170925004054-00287.warc.gz
en
0.878266
234
2.703125
3
Volume of a Cylinder A Cylinder is a three dimensional solid with a circular or oval cross-section and 2 parallel lines in between. The solid shape of the cylinder can hold liquid or solid substance that determines its volume. The questions related to the volume of cylinder are asked in several competitive examinations. To solve them, you must have a stronghold on the basic concepts related to Volume of a cylinder. What is the volume of the cylinder and how can you determine it? What is the difference between the volume and surface area of a cylinder? Here is the formula to determine the volume of a cylinder and the examples that will help you understand it in a better way. Volume of a Cylinder: Definition The Volume of a cylinder is the amount or space that the cylinder can occupy in itself. In order to find the volume of a cylinder, you must know the radius and height of a cylinder. Most of the cylinders we observe in our daily life are right circular cylinders. For example, a tin, round pillars, tube lights, water pipes etc Volume of a Cylinder: Formula A cylinder has got a top and a base which are congruent and parallel to each other. Its lateral surface is also perpendicular to the base. In order to calculate the volume of a cylinder, let us take a cylinder with a radius of the base as ‘r’ and the height as ‘h’. Thus, Cylinder Volume is given by the product of the area of based and the height of a cylinder. Volume of cylinder = area of base × height Volume of cylinder = Πr² x h Hence, the volume of the cylinder can be determined by the formula Πr²h cubic units. Volume of a Hollow Cylinder A hollow cylinder is characterized by a cylinder that is hollow from inside and contains a vacuum. The example of a hollow cylinder is a water pipe that is used to carry out water from one point to another. A hollow cylinder will have 2 radii- one outer radius and one inner radius. How to find the volume of a hollow cylinder? Let’s take a look: From the figure given above, a hollow cylinder is given with inner and outer radius as ‘r’ and ‘R’ respectively with the height ‘h’. The volume of a hollow cylinder can be given by the formula; V = Πh (R² – r²) where π can be taken as 22/7 or 3.14. Difference between Volume and capacity Many of you might wonder the difference between two similar words namely Volume and capacity. There is not much difference between these two words. The main definition can be provided by: (a) Volume refers to the amount of space occupied by a solid object. (b) Capacity refers to the quantity that a container holds. Note: If a water tin holds 100 cm³ of water then the capacity of the water tin is 100 cm³. Capacity is also measured in terms of liters. The relation between liter and cm³ useful to solve various questions is: - 1 mL = 1 cm³ - 1 L = 1000 cm³ - 1 m³ = 1000000 cm³ = 1000 L Difference between Volume and Surface Area of Cylinder The surface area of the cylinder is the total area occupied by the surface of the cylinder whereas the Volume determines the total amount the cylinder can occupy in itself. We already know the formula of the volume of the cylinder. The total surface area of the cylinder is determined by the formula: A = 2πr2 + 2πrh Volume of Cylinder: Examples Example 1: Find the height of a cuboid whose volume is 275 cm³ and the base area is 25 cm². The volume of cylinder = area of base × height Height of the Cylinder = Volume of Cylinder/ Area of base Height = 275/25 = 11 cm Example 2: A rectangular paper of width 14 cm is rolled along its width and a cylinder of radius 20 cm is formed. Find the volume of the cylinder. Solution: A cylinder is formed by rolling a rectangle about its width. Hence the width of the paper becomes height and radius of the cylinder is 20 cm. Height of the cylinder = h = 14 cm Radius = r = 20 cm Volume of Cylinder = Πr² x h Volume = 22/7 x 20 x 20 x 14 = 17600 cm³ You can check more study notes for maths by clicking on the link given below: You may also like to read: - What is PM Garib Kalyan Yojana? Know The Details - Finance Minister Nirmala Sitharaman Addressed The Press: Check Highlights - List Of Lockdown States In India Due To Coronavirus - List Of Government Exams Postponed Due To Coronavirus - Coronavirus Questions: Know Everything About Coronavirus - First Made-in-India COVID-19 Test Kit by Mylab Gets Commercial Approval
<urn:uuid:82531165-e2d0-4569-897f-5ef1f0cafdd7>
CC-MAIN-2021-25
https://www.sscadda.com/volume-of-cylinder
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487641593.43/warc/CC-MAIN-20210618200114-20210618230114-00409.warc.gz
en
0.918078
1,076
4.5
4
History 250 DE | Welcome to The Vietnam War Please scroll down to see details of this class Controversy and questions still surround many aspects of the Vietnam War- Americas longest war. Why did we go? Why did we fail to achieve our objectives? Could we have won? These are but a few of the questions remaining from the Vietnam era. There may be no certain answers to these and other important questions, but we can strive to make informed judgments and perhaps ask even better questions. That is our task. We will explore the following themes: 1) the origins of Vietnamese nationalism 2) the roots of the Cold War and evolution of US policy in Southeast Asia 3) the role of women in the Vietnam war 4) US strategy and tactics 5) the dynamic relationship between the homefront and the front lines 6) the issues for veterans 7) the legacies of the war. To get started in this class click on Unit 1 below. Then for each succeeding week click on the unit below for that unit's assignments. This class is taught though Blackboard as is available here for your information. The references to the Navigation Bar are only available if you are signed into Blackboard as a student in this class. Please call me at 253-833-9111 ext. 4379 or email me at firstname.lastname@example.org if you have any questions or concerns. © Bruce E. Haulman 2007
<urn:uuid:7ee0aedb-b537-4cc4-9207-8860674a46bb>
CC-MAIN-2020-10
http://www.instruction.greenriver.edu/Haulman/History250DE/H250DLVietnam.htm
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145538.32/warc/CC-MAIN-20200221203000-20200221233000-00308.warc.gz
en
0.912471
298
3.296875
3
Many a times certain keys on the keyboard may stop working and it becomes difficult for you to type. In such cases the only alternative is to buy a new keyboard. There is an alternative though if you do not want to spend money on buying a new keyboard. To make use of this alternative you will have to turn the Num Lock to on and use the Alt key to type in the characters you want to. For example when you can press and hold the Alt Key and type in 65 on the numeric keypad it will output the character "A". In this case the number 65 is the ASCII (American Standard Code for Information Interchange) equivalent of the character "A". In case you want to type in "a" you will have to use hold down the Alt Key and type in 92 on the numeric pad. You can output any type of characters using this trick. This is specifically helpful when are stuck with broken or unusable keys and you may want to delay buying a new keyboard. Would this be helpful to you if your keys don’t work. Do let me know through your valuable comments. If you have a question that you want answered feel free to contact us and we will definitely try to help you out. Image under CC license from Flickr.
<urn:uuid:8d23232d-ada1-4abe-9d37-a1013c375bef>
CC-MAIN-2013-48
http://techie-buzz.com/tips-and-tricks/useful-shortcuts-when-your-key-board-keys-stop-working.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052593/warc/CC-MAIN-20131204131732-00034-ip-10-33-133-15.ec2.internal.warc.gz
en
0.924033
259
2.625
3
2. Ada Lovelace Ada Lovelace is considered to be the very first computer programmer. She is often regarded as the first computer programmer. Ada Lovelace become first programmer of 'Analytical engine', the very first computer created and designed by Charles Babbage. That's why, she is considered the world's first programmer. Alan Turing was a mathematician, logician and computer scientist. Tim Berners - Lee invented the internet. Steve Wozniak co-founded Apple with Steve Jobs.
<urn:uuid:2164ee69-3740-4a14-827e-217cb883caf4>
CC-MAIN-2021-39
https://getvoice.org/1181/which-of-these-is-considered-to-the-very-first-computer-programmer
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057558.23/warc/CC-MAIN-20210924140738-20210924170738-00169.warc.gz
en
0.944858
111
3.078125
3
The COVID-19 Pandemic & Managing Your Mental Health More than a year into the COVID-19 pandemic, many people have grown weary and discouraged. Even with the promise of vaccines, the weight of the virus is still a heavy burden. In addition to the physical toll that COVID continues to inflict, medical professionals are also concerned about a mental health crisis they say has been underway for months and could have long-lasting effects. The Centers for Disease Control and Prevention (CDC) reported in August 2020 that symptoms of depression had increased four-fold. In a group of adults surveyed, their symptoms of anxiety have tripled compared to the previous year. Mental health resources are stretched thin due to the increased demand, in addition to the reassignment of some behavioral health care workers and facilities to address COVID-related needs. Many people’s lives have been turned upside down due to illness, job loss, work changes, additional childcare responsibilities, and lack of physical contact. These disruptions can result in increased stress, fear, and worry, affecting every aspect of life. If you are suffering psychologically during this difficult time, be assured you are not alone and know there is help available. Symptoms of COVID-Related Stress An important first step in managing mental health issues is to recognize symptoms. Common symptoms of COVID-related stress and anxiety, according to the CDC, include the following: - Difficulty sleeping or experiencing nightmares - Changes in appetite, energy, interests, or desires - Difficulty concentrating or making decisions - Physical symptoms such as headaches, stomach problems, body pains, or skin rashes - Worsening of chronic health problems - Worsening of mental health conditions or a mental health condition relapse - Increased use of tobacco, alcohol, or other substances If you are experiencing any of these symptoms or know someone who is, there are things you can do to relieve stress and manage everyday tasks and responsibilities better. Talk with your Human Resources department, or benefits administrator, they will be able to provide you with information on mental health benefits through your insurance or your employee assistance program (EAP). Healthy Ways to Cope with COVID Stress While we cannot make the coronavirus disappear, we can continue to do our part in slowing the spread. We can slow the spread by wearing masks, social distancing, limiting close contact to the people we live with, and practicing good hygiene. There are coping methods to help deal with ongoing COVID-related stress and anxiety. The CDC suggests the following ways to help manage your COVID stress. Take screen breaks. Constant monitoring of pandemic news can be upsetting. Avoid the temptation to spend hours monitoring the news, checking in just a couple of times a day instead. Limit time spent on social media, as well. Get enough exercise. Chronic stress can make you feel tired and lethargic, but as hard as it might be to get going, exercising of any kind can renew your energy. When weather permits, try to get outside for at least a few minutes. Take a walk down the street or around the block, enjoying the fresh air as you go. If you’re stuck inside, practice stretching, gentle chair yoga, jogging in place, stair climbing, or simply walking in your home. Just be careful not to overdo it and practice safely. Pay attention to what you eat. Certain foods, including fatty fish like salmon, trout, or sardines; eggs; yogurt; and green tea, are thought to help manage stress and anxiety. Get enough sleep. Stress can wreak havoc on our sleeping patterns. Ways to improve your sleep would be to enjoy a relaxing activity before bed, keep your bedroom quiet and at a comfortable temperature, and remove electronics from your space. Going to bed and getting up at the same time each day can also improve sleep habits. Stay away from substances. Resist the temptation to use alcohol, tobacco, or other substances to cope with stress. A cup of herbal tea or a brisk walk may help you resist the urge to drink or smoke. If you are concerned about your substance use, there are resources available to help you. Talk to your primary care provider or contact the Substance Abuse and Mental Health Services Administration hotline at 1-800-662-HELP. Continue with your health care. Don’t skip routine preventative measures like cancer screenings or getting a flu shot unless your doctor advises differently. Stay connected with others. While it’s difficult to be separated from loved ones, try to connect by phone, mail, or virtually with friends and relatives. If you are part of a faith community, ask what resources may be available. If you feel you need help managing stress or depression, reach out to your primary care physician, who is there to help you. The Long-Term Effect According to researchers, mental health issues caused by the pandemic could be long-lasting. Ongoing stress and anxiety can lead to severe depression. People who contracted the virus, lost a friend or family member, or were regularly exposed to it are at increased risk for post-traumatic stress disorder (PTSD). Health care providers are among those who may be more likely to suffer from PTSD. According to the American Psychiatric Association, it can result in long-lasting problems such as flashbacks, nightmares, and feelings of anger, sadness, or fear. There also is the concern that people who turned to alcohol or other substances to self-medicate during the pandemic will struggle with long-term addiction as a result. It is unknown how the pandemic will affect children and teens who were displaced from their schools and missed important life events. Experts say feelings of sadness, loss, and anger are common and could lead to depression. Those who lost jobs also may be prone to resulting mental health issues. It often seems like life will never be the same. Most experts are optimistic that as more people get vaccinated, and warmer weather allows us to be outside again, there will be fewer and fewer COVID cases. While you might feel discouraged, it is important to try to remain optimistic and hopeful. Think of something you are looking forward to, such as a birthday, visit with a friend, or simply watching flowers coming up as spring approaches. Remember that longer, warmer days are ahead, and the pandemic will not last forever. Scientific American. “A Step to Ease the Pandemic Mental Health Crisis.” Accessed at https://www.scientificamerican.com/article/a-step-to-ease-the-pandemic-mental-health-crisis. Centers for Disease Control and Prevention. “Coping with Stress.” Accessed at https://www.cdc.gov/coronavirus/2019-ncov/daily-life-coping/managing-stress-anxiety.html. Business Insider. “13 potential long-term health effects the coronavirus pandemic could have on mental health.” Accessed at https://www.businessinsider.com/potential-mental-health-effects-of-coronavirus-pandemic-2020-6#people-can-practice-positive-coping-mechanisms-now-to-help-with-their-mental-health-in-the-future-15. Download the Free Resource Access a printer-friendly version of the resource to reference later.
<urn:uuid:51940dce-e6fe-4941-a958-c12982935531>
CC-MAIN-2021-31
https://connectcare3.com/resources/the-covid-19-pandemic-managing-your-mental-health/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154127.53/warc/CC-MAIN-20210731234924-20210801024924-00687.warc.gz
en
0.945119
1,544
2.765625
3
Public Health Wales has launched a new symptoms checker tool to help parents spot the signs of Strep A. It is hoped it will help parents decide when to treat their child at home and when it is appropriate to seek medical advice. It follows an escalation in the number of calls to NHS 111 Wales last weekend. There were over 18 thousand calls – more than double the calls received on the same weekend last year. A significant proportion of these were from parents of children aged 12 years old and under and from those concerned about sore throats and throat problems. The new symptoms checker takes the form of a traffic light showing parents when it is safe to treat a child at home and at what stage they should consider calling NHS 111 Wales or their GP. It’s hoped it will help parents to feel more confident about when they need to seek medical help. Public Health Wales is reminding parents that cases of invasive group A streptococcal infection (iGAS) remain rare in Wales, and that children have a very low risk of contracting the disease. As of today, Public Health Wales have been notified of fewer than five deaths in children under the age of 15 in whom iGAS was detected since 1 September 2022. Due to the risk of identification, Public Health Wales will not confirm numbers of deaths lower than five. Cold and flu like symptoms are very common at this time of year, especially in children. If a child has a sore throat or a headache, most will have a common seasonal virus, and there is no need to contact the doctor – simply treat them at home by keeping the child hydrated, and with paracetamol. If a child develops a fever, nausea or vomiting, or fine pink-red rash that feels like sandpaper to touch, it may be a sign of scarlet fever. In this case, contact your GP or NHS 111 Wales for advice. Scarlet fever is usually a mild illness from which most children will recover without complications, especially if the condition is properly treated with antibiotics. Dr Graham Brown, Consultant in Communicable Disease Control for Public Health Wales, said: “We understand that parents are likely to be worried by reports they are seeing related to rising cases of scarlet fever and we want to reassure them that it is still usually a mild illness from which most children will recover without complications, especially if the condition is properly treated with antibiotics. In very rare cases, group A streptococcal infection can cause iGAS, a rare complication which usually affects fewer than 20 children in Wales each year. Although iGAS is a worrying condition, the majority of these children will recover with proper treatment. The best thing that parents can do to protect their children is to use the traffic light symptom checker tool and follow the appropriate advice. It’s also important that parents ensure their child gets their flu vaccine this year because catching flu can increase the chances of becoming severely unwell with secondary infections like Strep A.” Liam Williams, Executive Director of Quality and Nursing for the Welsh Ambulance Service, which provides the NHS 111 Wales service, added: “Our NHS 111 Wales service has just seen its busiest weekend ever with a huge number of calls from parents and carers worried about Strep A. “Unfortunately, it has meant that many people had to wait a long time for their call to be answered, or for a clinical call back, and we would like to apologise to everyone who had to experience this and who were concerned. “It is understandable parents are cautious when their child is unwell. Children typically experience a wide range of minor infections in wintertime and most of these can be safely dealt with at home by parents and carers. “If parents or carers are worried about Strep A, the best thing that they can do is to provide the care they would usually provide for a child with cold and flu like symptoms, and to familiarise themselves with the symptoms of scarlet fever and iGAS as a precaution.
<urn:uuid:197803b6-8da1-45a2-842e-1033b8be84a8>
CC-MAIN-2023-50
https://www.abergavennychronicle.com/news/all-you-need-to-know-about-recognising-the-signs-of-strep-a-583006
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.42/warc/CC-MAIN-20231203161435-20231203191435-00298.warc.gz
en
0.971838
823
2.546875
3
The U.S. Department of Transportation released September 1, the open data platform U.S. National Transit Map. It leverages a geospatial database containing information from nearly 270 transit agencies. Anthony Foxx, the Secretary of Transportation, blogged - “Measuring connectivity starts with having good data about where America’s transit connects – where transit stops are, how frequent transit service is, and where transit routes go.” The maps identify participating transit agencies and provide open, machine-readable data about transit stops, routes, and schedules according to the press release. Additional subject areas you can research include airlines and airports, congestion, connectivity, economics and finance, freight data and statistics, general, and geospatial information which includes the geospatial portal, mapping applications, and reference maps. The U.S. Department of Transportation is not only leveraging geospatial data for the building of the infrastructure but also in communicating its vision, charting its progress and by making the data freely available for other agencies and private organizations to utilize. What are some unusual ways you are using your spatial data? Add your comments below.
<urn:uuid:2a1c8af1-7d7b-44c9-a806-7c297cd42492>
CC-MAIN-2017-34
http://www.intermap.com/the-spatialist/2016/09/us-national-transit-map-geospatial-database
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117519.92/warc/CC-MAIN-20170823035753-20170823055753-00651.warc.gz
en
0.907966
232
2.875
3
Johannes Baader was born in Stuttgart on 21 June 1875. Between 1892 and 1895, he was apprenticed in masonry while he studied architecture at Stuttgart's Staatliche Baugewerbeschule. In 1903 he became an architect in the Vereinigung bildender Künstler für monumentalen Grabmalsbau in Dresden. In 1905 Baader moved to Berlin, where he met Raoul Hausmann. Declared unfit for military service, he dedicated his energies to what he called "spiritual architecture", utopian designs of monumental, metaphysical, and messianic dimensions, and contributed to the journals Das Blaubuch, Die freie Straße, and Der Dada in 1917. As self-proclaimed Oberdada Baader's Dada tactics were mainly in the form of spectacular manifestos and public performances, often in collaboration with Raoul Hausmann. In the autumn of 1917 Baader and Hausmann founded a Christus GmbH to protect war deserters, thus associating conscientious objection with Christian Martyrdom. Similarly, on 17 November 1918, Baader staged a performance in the Berlin cathedral called Christus ist euch Wurst. This action provoked a public scandal, and Baader was arrested for blasphemy. Hausmann, in turn, wrote a letter to Berlin's Minister of Culture arguing for Baader's right to free speech. In March 1919 Baader and Hausmann announced the Dadaist Republik Nikolassee to start on 1 April 1919 under the auspices of the Central Committee of the Dada Movement. On 12 March 1919 Baader and Hausmann staged a 'Propaganda Evening' in Café Austria, where they founded the Antinationaler Rat der unbezahlten Arbeiter (ARUDA) and Club der Blauen Milchstraße. Baader announced the death and the resurrection of the Oberdada on April 1 (starting year 1 in a new era), and as such, participated in the 'Erste Berliner Dada-Ausstellung' in the Graphisches Kabinett of I.B. Neumann. Baader was a participant in the discourse of postwar Weimar Germany in a dadaist fashion, putting out his Buch des Weltfriedens, a reaction to the Treaty of Versailles, on 28 June 1919, which became known as Handbuch des Oberdada (HADO). Similarly, on 16 July, Baader threw flyers into the meeting of the Weimar National Assembly printed with the slogan 'Dadaists against Weimar' and three days later proclaimed the socialist politician Philip Scheidemann as 'Ehrendada' in a streetcar. On 11 November, exactly a year after the Kaiser abdicated, Baader printed a calling card that announced him to be president of the Earth and Universe. Johannes Baader died on 14 January 1955 in Adldorf, Bayern. More extensive is Sabine T. Kriebel, 'Johannes Baader', published in Leah Dickerman (ed.), Dada. Zurich, Berlin, Hannover, Cologne, New York, Paris (National Gallery of Art : Washington DC 2005) 462-463 and online available at Dada biographies: Johannes Baader, an exhibition at the National Gallery of Art. The article is translated in French and published in Dada / Catalogue publié sous la direction de Laurent Le Bon ... (Éditions du centre Pompidou : Paris 2005) 124. Double portrait of Johannes Baader and Raoul Hausmann, 1919. Photograph after lost original [Musée d'art moderne, Centre Georges Pompidou, Paris].
<urn:uuid:bd2ba382-8427-4ece-9d3e-5551e909d320>
CC-MAIN-2017-04
http://www.dada-companion.com/baader/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281492.97/warc/CC-MAIN-20170116095121-00145-ip-10-171-10-70.ec2.internal.warc.gz
en
0.849328
787
2.65625
3
Olives have played a small but integral part in world history, yet nobody ever really notices this. Think about it, winners at the first Olympics were given an olive wreath to wear on their heads, we extend an olive branch as a sign of peace, and even Popeye's lanky girlfriend was named Olive Oil. The signs are clear, if olives are good enough for athletic glory, peace, and a belligerent sailor, they're good enough for all of us. The Adriatic coast has a centuries old tradition of olive harvesting and processing to reap the benefits of olive oil. From the northern coast to Dubrovnik and all the islands included, olive trees dot the landscape throughout the Croatian Adriatic. Olive oil today is still as important a part of the diet in Dalmatia as it always was. And in spite of some minor technological advances the process is more or less the same.
<urn:uuid:b1345b7d-deac-4652-92fd-eb570733a9af>
CC-MAIN-2016-44
https://www.inyourpocket.com/zadar/Olive-oil_56018f
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722653.96/warc/CC-MAIN-20161020183842-00411-ip-10-171-6-4.ec2.internal.warc.gz
en
0.976934
185
2.640625
3
Table of Contents Hide If you suffer from a loud noise phobia, you need to identify the cause and determine what triggers your distress. Here are some tips to help you identify loud noises in your life. First, try to isolate the noise. Once you find the source, label the noise as safe and then listen until the distress subsides. This way, you’ll be able to experience the actual sensations without labeling them as dangerous. You can also consult a psychotherapist to learn how to analyze real sensations. They will be able to help you identify the feelings that trigger your anxiety and anger. Symptoms of phonophobia Phonophobia is a condition in which an individual actively fears loud noises. They may experience an extreme fear response to sudden loud noises such as the bursting of a balloon or a loud song. They may also avoid social activities and may develop depressive symptoms. If you think you may be experiencing the symptoms of phonophobia, you may want to seek treatment. Phonophobia may be triggered by external factors, such as a long history of childhood trauma or a traumatic event. Although a loud noise might seem harmless to other children, it can cause severe symptoms for autistic children. Treatment may include exposure therapy or cognitive behavioural therapy. Medications may also be prescribed to ease symptoms and decrease anxiety. While there is no cure for phonophobia, the symptoms can be controlled with medication and therapy. Symptoms of hyperacusis Hyperacusis is a condition that occurs when your ears become hypersensitive to loud noises. It is a common symptom of a variety of illnesses, including post-traumatic stress disorder and depression. It can also result from TMJ disorders, Meniere’s disease, and autism spectrum disorders. People with this condition report feeling disassociated from reality and experiencing severe confusion. However, there is currently no definitive cause of hyperacusis. Some people with this disorder experience pain every time they hear a loud noise. They may even experience panic attacks when they hear certain sounds. The pain can be intense and last for several days. Some people experience a dull headache while others experience sharp stabs of pain. Either way, this condition can significantly affect your quality of life. Symptoms of misophonia Misophonia is a neurological disorder that affects a person’s emotional reaction to a specific sound. People with misophonia often have to avoid specific situations and may even wear earphones to block out the noise. Others may mimic the noise to reduce the emotional impact. Although misophonia is an extremely debilitating disorder, it can be managed with the help of a therapist and appropriate accommodations. The condition can manifest itself in early childhood or adolescence. The symptoms of misophonia may be obvious and unnoticeable to others, but a person with the disorder will find it hard to cope with the distress caused by loud sounds. In some cases, a person may even be unable to control the intensity of their reaction. Identifying if it is an anxiety reaction or anger or disgust Identifying if loud noises are a source of anxiety or anger or disgust begins by observing your own feelings. You may be surprised to find that the same sounds can provoke very different reactions in you. Listening to the sounds for an extended period of time is one way to identify which type of emotion you are experiencing.
<urn:uuid:c6aed4cd-8891-4ec6-94c0-f5f136db8ab0>
CC-MAIN-2023-06
https://onlysilent.com/why-do-i-cry-when-i-hear-loud-noises/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500017.27/warc/CC-MAIN-20230202101933-20230202131933-00812.warc.gz
en
0.94287
678
2.96875
3
Includes bibliographical references (p. -147) and index Historical context and intellectual biography -- What is the School of Salamanca? -- The political and intellectual context of the School of Salamanca -- The decline of scholasticism -- Some key authors of the School of Salamanca -- Francisco de Vitoria -- Domingo de Soto -- Martin de Azpilcueta -- Diego de Covarrubias y Leya -- Tomas de Mercado -- Bartolome de las Casas -- Luis de Molina -- Juan de Mariana -- Francisco Suarez -- Critical exposition -- Philosophical and political foundations of the school -- Thomism and natural law -- The European revival of Thomism and the Salamanca School -- Theological political disputes -- Applied political thought -- Individual rights and the common good -- The state and the limits of political power -- Legitimate resistance and tyrannicide -- Church and state -- International law and developments in just war theory -- The ethical and juridical framework of the market -- Private property and trade -- Just price and the subjective theory of value -- Usury and interest -- Theories of banking -- Monetary theory and inflation -- Taxation and public finance -- Reception and influence of the work -- The Salamanca School and the new world -- A revolutionary sermon in Hispaniola -- The social experiments of Bartolome de las Casas -- Just titles and the disputation between Las Casas and Sepulveda -- Assessing the legacy of Las Casas and the controversies over the new world -- Theological, political impact, and influence on subsequent authors -- Relevance of the work today -- Political philosophy, law, and history -- Political economy and the ethical foundations of the market -- Contemporary C0atholic social thought -- International relations and war. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries
<urn:uuid:c94af5d9-a00c-4588-acd7-fd9329692d70>
CC-MAIN-2023-40
http://katalog.osu.cz/publish/00172/OSU01_001720533.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510697.51/warc/CC-MAIN-20230930145921-20230930175921-00105.warc.gz
en
0.686377
390
2.828125
3
What voters are wearing: A battle over dress codes Elections now have a code of dress, too. The narrative is that polling places should be free from politicking in order for electors to cast their votes in peace so in order to encourage voters to vote without interruption, most states in the US now prohibit campaigning within a certain distance from a polling place. That could include wearing or showing something with a political message. For example, a Palestine T-shirts advocating for peace would not be acceptable wear at polling stations on election day in some jurisdictions. "Electioneering" is known to be showing or expressing facts for or against some candidate — another term for voting." You won't be the first if you want to campaign for the right to wear what you want and express your individual liberty of thought and action at the polls. In June 2018, at a polling place on Election Day, the US Supreme Court ruled against a Minnesota statute that banned wearing political clothes. In defence of the Tea Party, the republican cause, a group of people sued after being forced to cover up as they went to a polling place carrying T-shirts and pins. "Richard Hasen, a political science professor at the University of California , said that the rules are unique to each jurisdiction, and they are enforced by poll workers. He also said that it would be important to decide on a case by - case basis whether one should wear and what other laws could breach the First Amendment." Many states have gone a step further by regulating clothing that promotes a political candidate! California, Delaware, Kansas, Montana, New Jersey, New York, Tennessee, South Carolina, Texas and Vermont are among them. If you wear your red "Make America Great Again" hat or your "Ridin' with Biden" tee shirt to the polls, you could be asked to remove it or turn your shirt inside out. Laws on electioneering differ by state at polling stations. For example, Texas law specifies that "an person must not wear a badge, insignia, symbol, or any similar communicative device referring to a candidate, measure, or political party appearing on the ballot in the polling place." Also it is against the rules to wear a political dress within 100 feet of a polling place in California and Texas. It's 50 foot in Delaware. However, at the elections, not all states have outlawed political dress. In Iowa, electors can wear political clothes — but they must leave the polling station as soon as they cast their ballots. "Campaigning or electioneering of any kind is also illegal in a polling place; loitering in a polling place is considered electioneering while wearing political items," says the Iowa election website. However, for comments such as "Black Lives Matter" that don't convey an opinion on a single candidate or faction, state regulations on wearing clothes are less evident. For example, a election worker was fired last week in Tennessee for driving away residents wearing Black Lives Matter t-shirts. Tennessee is one of the states where, at a polling station, clothing endorsing a nominee or a group is not permitted. While it is potentially a little bit of a grey field, political slogans are tolerated. On the flip side, a message connected to a ballot measure, or considered democratic could be prohibited. For instance, some states might ban i.e. a # MeToo T-shirt. "Casting a vote is a weighty civic act, akin to a jury's return of a verdict, or a representative's vote on a piece of legislation," wrote Chief Justice John Roberts. But even more so with the updated dress code. So if you're not mailing an absentee ballot, be careful of what you're wearing when you register. Just to be clear the other nine states where clothes supporting a party or a politician are banned at the polling booth are California, Delaware, Kansas, Montana, New Jersey, New York, South Carolina, Texas, and Vermont. However, it has also been said that anyone who insists on wearing political gear might not be turned away!
<urn:uuid:b3f8cbb4-f3d5-4087-95c1-740cab49ca2c>
CC-MAIN-2021-31
https://societal.store/blogs/news/what-voters-are-wearing-a-battle-over-dress-codes
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154466.61/warc/CC-MAIN-20210803155731-20210803185731-00694.warc.gz
en
0.966509
825
2.515625
3
Developments at MIT by professor Vivek Goyal may lead to very inexpensive and ubiquitous 3D scanning equipment, perhaps even embedded in your mobile phone. A dream for many 3D printer owners is the ability to capture 3D shapes efficiently. Today one must use very expensive 3D scanners or be satisfied with rudimentary solutions such as jury-rigged Microsoft Kinects. But Goyal's work may change things. The problem is to collect distance information for each and every pixel in an image, from which a 3D model can be constructed. Typical solutions of today involve multiple or moving lasers that time light pulses to calculate distances. The MIT team discovered a way to use a single light detector that reduces the number of light pulses by 95%. Adding in some additional mathematics permits resolution of as little as 2mm. Now, imagine a world where one could quickly capture 3D models just by pointing your mobile phone at a stationary object. An app could quickly send that model off to a 3D print service or perhaps your home 3D printer, thus reproducing the object by the time you get home!
<urn:uuid:9bdb5f00-584e-4bb8-9f61-0901fa699d78>
CC-MAIN-2019-18
https://www.fabbaloo.com/blog/2012/1/16/true-3d-scanners-for-phones.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530505.30/warc/CC-MAIN-20190421080255-20190421102255-00543.warc.gz
en
0.958667
221
3.203125
3
Article written by Soccer kits 2014, buy soccer accessories online Futsal is ideal for developing a player’s technical and tactical skills. Soccer is a very complex game. If we analyze every single game of its entire recorded history, we will not find two absolutely identical situations. Futsal is a totally fluid game with very few preplanned situations, which means a player has to improvise in order to meet constantly changing circumstances. Futsal is the ideal medium to develop soccer intelligence. Futsal emphasizes skill rather than crude physical power. The smaller and heavier ball is a great instrument in promoting individual technical development. The number of ball touches a player gets is much greater than in conventional soccer, allowing the player to develop faster and more refined foot skills. One touch receiving and passing are used in wall passes and rotations and these certainly translate into success in the classic outdoor game. The small numbers of players in a Futsal team makes it crucial for all players to defend and attack. There are not predefined positions which players stick to and get to develop typical defensive or attacking player mentalities. This helps players become familiar with all positions in accordance with modern soccer requirements and creates the opportunity to solve lots of tactical problems under more pressure. Players learn not to relax and coast because the game is in constant transition with teams winning and losing the ball all the time. Speed of play Modern soccer is characterized by its fast pace. In Futsal, because of the tight space, the ball has to move faster between players’ feet, helping players develop individual and team speed of play. This in turn forces players to make quicker technical and tactical decisions and gives them more confidence which they can apply to the outdoor game. Futsal is fast paced and exciting, with players moving all the time instead of sitting back and waiting for the ball. With the pitch being so small there are often high scores with many different players getting the chance to score goals. Goalkeepers have to be active participants and not be glued to their goal line. They learn to move with the ball, to keep in line with the ball and play particular attention to angles. they also learn how to actively participate in an attack as a fifth player.
<urn:uuid:d13b43a6-d445-49bc-8fe8-2899e92ad439>
CC-MAIN-2020-24
http://holisticsoccer.com/how-does-futsal-promote-better-skills/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347399820.9/warc/CC-MAIN-20200528135528-20200528165528-00325.warc.gz
en
0.971817
456
2.609375
3
How to Go Organic in Composting What is this? It should not be alien to you at all. You may have been using such since you were a child. You may just have not realized it yet. But it's true, even a child can carry out on the methods of making a compost. But of course, for a child, the process will be the easier one. If you are not aware of the benefits of what you are doing, you will not really take it seriously, right? For a child, it may be a simple process of gathering the dried leaves, clipping of grasses, branches and twigs of trees, some animal manures, peelings of vegetables and fruits and other kitchen waste and sweeping them all into a pile. They just leave it there. Have you done the same when you were a child? You probably did. You may have had put all the materials that you thought to be waste on your backyard and let them decompose on their own. You may also no longer have any idea what has happened to the end product. If you own a garden, your parents might have used that as a fertilizer. But if you don't, those may have been gathered to a container and were dumped. But now that you are all grown up, you have a better view of what this process entails and how can you utilize the products of this method. The end result is actually being widely used as fertilizer for organic gardening. This is not synthetic. This contains no chemicals. This way, it will really help make healthy soil that will likewise produce healthy plants. In organic gardening, it is a must to be vigilant. You have to attend to the needs of your plants. You've got to know every detail about everything on your garden. You have to keep everything in perfect balance. For example, in controlling pests, you can pick them manually or you can add up other insects or animals that will feed on them. The success of organic gardening heavily relies on the soil. And the best way to maintain the soil of your garden is by feeding the soil. What does this mean? Just like you, it never should get hungry. This is where you are going to use the end result of your compost. You must integrate it with the soil to be able to maintain its structure as well as its health. Aside from the compost, you must water the soil. The amount will depend on the type of soil that you are using on your garden. So this is where your knowledge about everything in your garden will be really helpful. The soil is the base of the beds of your plants. This is where your plants will rely for strength and health. So it is extremely important to attend to the needs of the soil. And this is where composting will be of great help. You should master the craft to be able to benefit from it especially if you want to venture into organic gardening. Composting ARTICLESHow To Succeed With Your Composting Venture To Compost Or Not To Compost The Big Deal On Industrial Composting Techniques Making Your Uwn Compost Bin Teach Composting To Kids The Pros Of Worm Composting The Greens And Browns Of Composting Making Compost: Getting Your Hands Dirty Avoiding Composting Dangers The Dirt Paybacks: Advantages Of Composting Getting The Most Out Of Your Compost Compost Smells: This And Other Composting Myths How To Go Organic In Composting Common Materials For Composting From Your Own Home The Low-Down On Home Based Composting Processes Evaluating Commercially Available Composting Heaps Getting To Know Your Composting Equipment Dynamic Composting Tips And Tricks What Makes Composting Worthwhile? Helping Nature By Composting Wriggly Friends Help Make Compost Top Reasons For Composting Basic Guide To Composting Steps To Composting
<urn:uuid:0e8776a2-df62-41bd-b1bb-ec45ccd6a740>
CC-MAIN-2018-26
http://www.richardpresents.com/composting/how-to-go-organic-in-composting.php
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866965.84/warc/CC-MAIN-20180624141349-20180624161349-00232.warc.gz
en
0.947148
828
2.765625
3
Ductile iron pipes are widely used to carry various types of fluids. The pipelines require regular maintenance and upkeep. Solutions are sought to track and keep records of underground pipelines. Ductile iron pipes are widely used to carry various types of fluids. One of their main uses is to carry potable water to the households. The typical water flow rate (potable) is 2 – 3 m/s. The quality of the pipes is of paramount importance as any defects in these pipes can lead to contamination of water. Ducticle iron pipes are also used to transport sewage water and pipe damage will contaminate the soil. The pipelines require maintenance on a need basis. They also require replacement when the end of their useable life span approaches and/or whenever there is a requirement of increasing the fluid carrying capacity. The water supply schemes are designed for a life of 30 years. However, DI pipes usually have much higher life. Most of the times, the details of these pipes, in terms of, laying designs, date of laying and their specifications are not available as they are underground. In addition, at present, there are no means to retrieve this information on the site. In absence of required information, digging is carried out at several places to search for the (correct) pipes as there are other utilities buried in the vicinity of pipe network. Sometimes, the information about the changes made to each section of pipeline, is not available, which leads to a lot of delays in projects. This results in loss of water being transported, loss of revenue, wasted manpower and potential increase in the risk of the pollution of the larger manifolds. Also, due to rapid urbanization, lot of developmental activities are carried out like widening of roads, laying of cables for telecommunication etc does take place and there is no information about the layout of the pipelines. Thus, the digging may result in damaging of water pipes when such activities are carried out. A solution is, therefore, sought to mitigate the above set of problems. The solution must meet the following requirements: - Maintain a record of all the relevant information of each pipe such as - ​its specifications - date of manufacturing - date of supply - order number - contractor information - It should have the facility to record the location of pipes and any changes/replacements made - It should enable tracing (locating) pipes, especially the old pipes, underground. - Permit recording, modification and retrieval of the above information, at any location and at any time - It should display a map of the pipeline based on the location - Economical and easily scalable - Simple to use While developing the solution, the following points must be considered and addressed: - These pipes are centrifugally casted Ductile Iron Pipes. If a tracking device is to be attached/embedded in the pipes, then it should NOT necessitate any (major) modifications to the existing manufacturing setup. - These pipes have the life of more than 30 years, therefore any device installed, for tracking purpose, on/along the pipeline at the time of laying the should remain intact for the entire life span of the pipes. - Most of the pipes (~80%) are laid within 3 m below the surface. The rest of the pipes are laid as deep as 6-10 m below the surface depending upon the topography. The minimum depth at which pipes are laid is at a minimum of 1 m. The solution, therefore, should have an ability to trace these pipes in this condition, at all times. - Different lengths of pipes viz., 4m, 5.0m and 5.5m, are supplied. The pipes could be shorter as well. Awards:- INR 5,00,000
<urn:uuid:67bcd54d-6028-4bba-8699-ee9784d49255>
CC-MAIN-2022-05
https://givemechallenge.com/tracking-of-underground-ductile-iron-pipelines-competition/46581/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300658.84/warc/CC-MAIN-20220118002226-20220118032226-00327.warc.gz
en
0.942514
785
3.15625
3
Bipolar Psychosis:Table of Contents What is bipolar psychosis? Take an in-depth look at psychosis in bipolar disorder, why it's so scary, and treatment of bipolar psychosis. Part 1: What is Bipolar Psychosis? - A Technical Definition of Psychosis - Psychosis Test: Am I Psychotic? - Psychosis Symptoms: What are Hallucinations and Delusions? - Psychosis and Mood Swing Complications - The Progression of Psychosis in Bipolar Disorder Part II: A Deeper Understanding of Bipolar Psychosis - Types of Mania - What is the Difference Between Full-blown Mania and Full-blown Psychotic Mania? - Bipolar Depression with Psychosis - Suicide and Bipolar Psychosis - Why Can Psychosis Be So Mean and Scary? Part III: Medications for Bipolar Psychosis - Causes of Psychosis: Psychosis and the Brain - Medications Used to Treat Bipolar Psychosis - Antipsychotic Medication Side Effects - A Final Note About Bipolar Psychosis For comprehensive information on treatment of bipolar disorder, read The Gold Standard for Treating Bipolar Disorder (table of contents here). This section covers bipolar medications, alternative and complementary treatments for bipolar disorder and answers important questions about the challenges of living with bipolar disorder. Includes video interviews with Julie Fast on personal aspects of living with bipolar disorder. Fast, J. (2010, September 15). Bipolar Psychosis:Table of Contents, HealthyPlace. Retrieved on 2020, May 25 from https://www.healthyplace.com/bipolar-disorder/psychosis/bipolar-psychosis-toc
<urn:uuid:43b7f6f4-5dd5-4c9a-99ee-36e2580cc823>
CC-MAIN-2020-24
https://www.healthyplace.com/bipolar-disorder/psychosis/bipolar-psychosis-toc
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347388012.14/warc/CC-MAIN-20200525063708-20200525093708-00010.warc.gz
en
0.769061
346
2.78125
3
Tidy Circles (AutoLISP Solutions AutoCAD Tutorial)1 May, 2007 By: Tony Hotchkiss Programs trim all entities outside of a circle and convert circles to polylines. Naveen Rayalla e-mailed a request to delete all entities touching and outside of a circle in AutoCAD. To trim all entities outside of a circle using the regular AutoCAD Trim command, the user first selects the Trim tool, selects the circle as a cutting edge or boundary and then makes a series of fences or selects individual entities, depending on how many entities are to be trimmed. When there are many entities, such as those shown below, the process can be time consuming. A drawing ready to be trimmed. Our AutoLISP Solution is a CIRC-TRIM.LSP, a routine that trims everything outside of a circle when the user simply selects the circle. Because the solution is rather short, I have included a bonus AutoLISP Solution to convert circles to polylines. In my job as professor of technology at Buffalo State College, I use the VALCAM CAD-CAM system that I wrote in AutoLISP to work inside AutoCAD. The CNC code generator uses polylines for machining, so the students convert all of the entities to be machined into polylines. AutoCAD doesn't convert circles into polylines, and it's tedious to draw arcs instead of circles and then convert those to polylines. The solution CIR-TO-PLINE.LSP does the job automatically for any selected circles. Get the Code Download the CIRC-TRIM.LSP and CIR-TO-PLINE.LSP files from Cadalyst's CAD Tips site and save them in AutoCAD's Support directory. Use the Appload facility by selecting Tools/Load Application, and then select CIRC-TRIM.LSP for trimming outside of a circle and CIR-TO-PLINE.LSP to convert circles to polylines. How to Use the CIRC-TRIM.LSP Code To start the program, enter CT and you see the prompt Select the circle. The figure below shows a circle being selected. A typical result is shown in the next figures (2 and 3) in which the entities outside of the circle have been trimmed with no further user interaction. A circle is selected. A typical result showing entities after trimming. How to Use CIR-TO-PLINE.LSP To start the program, enter CTP and you see the prompt Select the circle(s) to be modified. After you select any number of circles by any selection method, the circles are automatically converted to polylines and the polylines are placed on the same layer as the selected circles. The drawing won't change in appearance, but you can verify that the objects are polylines by using the AutoCAD List command. CIRC-TRIM.LSP starts with my usual error handler and system variable-management functions. If an error occurs during the program for any reason, such as a cancellation by the user, any system variables that have been changed are reset to their previous values by calling the RESETTING function. The main function is CIRC-TRIM that begins with some standard code to initialize the program to recognize Visual LISP functions and sets global variables for the current drawing, model space and utility functions. There are only two lines of code that follow the initialization: (vla-GetEntity *utility* 'Cirobject 'PickedPoint "\nSelect the circle") (do-trim Cirobject PickedPoint) The GetEntity method creates the selected object name Cirobject as well as the picked point, and these two objects form the arguments passed to the DO-TRIM function, shown here: (defun do-trim (Cirobj PickPoint) (setq cenptobj (vla-get-Center Cirobj) radinc (/ (vla-get-Radius Cirobj) num) rad (+ (vla-get-Radius Cirobj) radinc) cen (vlax-safearray->list (vlax-variant-value cenptobj)) anginc (/ pi (/ num 2)) p0 (vlax-safearray->list PickPoint) ) ;_ end of setq (setq p1 (polar cen ang rad) ang (+ ang anginc) p2 (polar cen ang rad) ) ;_ end of setq (vl-cmdf "TRIM" p0 "" "F" p1 p2 "" "") ) ;_ end of repeat ) ;_ end of do-trim The DO-TRIM function works by trimming objects just outside of the selected circle using a repeat loop to make a sequence of calls to the Trim command. A number of segments (num = 100) is used to successively trim using a fence between two points that are incremented around the outside of the selected circle. I chose 100 steps to get a good combination of accuracy and speed of execution. Any objects that are entirely outside of the circles aren't affected by the trimming as is the case with the AutoCAD Trim command. You may choose to delete (erase) any unwanted entities. CIR-TO-PLINE also starts with the error handler and other system variable managers. The main function CIRC->PLINE uses the SelectOnScreen method to give the greatest flexibility in selecting objects. A repeat loop then calls DO-MOD for each of the circles selected. It checks to make sure that the object is a circle before any conversion takes place. DO-MOD calls the CONVERT function, shown here: (defun convert (pt1 pt2 lyrname) (setq xylist nil) (setq plst (list pt1 pt2 pt1)) (mapcar '(lambda (xy) (setq xylist (append xylist (list (car xy) (cadr xy)))) ) ;_ end of lambda ) ;_ end of mapcar (setq polyobj (make-LWpolyline xylist)) ; polyline object (vla-SetBulge polyobj 0 1) (vla-SetBulge polyobj 1 1) (vla-put-Layer polyobj lyrname) ) ;_ end of convert CONVERT uses two points on the diagonal of the circle to create a list of three points, repeating the first point so that the resulting polyline is effectively closed. After the polyline is added by a call to MAKE-LWPOLYLINE, the SetBulge method is applied with a bulge of 1 denoting 180 degrees included angle. Finally the newly added polyline is put on the same layer as the circle from which it was made. The circle is then deleted, leaving the polyline in its place. I have used the function MAKE-LWPOLYLINE in other routines (including the Spurgear routine), so I was able to reuse the code here as follows: (defun make-LWpolyline (ptlst) (setq arr (vlax-make-safearray 5 (cons 0 (- (length ptlst) 1)))) (vlax-safearray-fill arr ptlst) (setq invpline (vla-AddLightweightPolyline ) ;_ end of vla-AddLightweightPolyline ) ;_ end of setq ) ;_ end of make-LWpolyline MAKE-LWPOLYLINE uses the AddLightweightPolyline method as shown after converting a list of 2D points to a variant containing an array. As always, I look forward to receiving your comments and requests for AutoLISP Solutions. Contact me using the links below. Autodesk Technical Evangelist Lynn Allen guides you through a different AutoCAD feature in every edition of her popular "Circles and Lines" tutorial series. For even more AutoCAD how-to, check out Lynn's quick tips in the Cadalyst Video Gallery. Subscribe to Cadalyst's Tips & Tricks Tuesdays free e-newsletter and we'll notify you every time a new video tip is available. All exclusively from Cadalyst! Autodesk University 2013 Photos 17 Dec, 2013 L&T Komatsu India: Tunnelling with PTC Creo 12 Dec, 2013 Revit 2014 Update Release 1 Now Available For Download - Crash Reductions or Enhancements? 19 Jul, 2013 How to Replace the Viewport Compass with your Company Logo 5 Jul, 2013 Maker Galaxy E03: Tom Wujec 12 Dec, 2013
<urn:uuid:9cd8bb34-fdbf-4169-a2a5-991fc5106a31>
CC-MAIN-2013-48
http://www.cadalyst.com/cad/autocad/tidy-circles-autolisp-solutions-autocad-tutorial-11007
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164920374/warc/CC-MAIN-20131204134840-00084-ip-10-33-133-15.ec2.internal.warc.gz
en
0.84944
1,869
2.5625
3
Children's moral development happens in stages; however, it doesn't happen without adult involvement. From birth, a child begins on the moral journey; however, most of their time in this first stage is spent getting their needs met by adults who are bonding with these tiny new people. When things go right, children develop trust in the world, and believe they are the center of that world. If a baby learns to trust, he or she is able to move beyond the first stage. Beginning at about 1 1/2 years, children begin to realize the world is bigger, and others have needs also. The world has rules, and as frustrating as that may be, even they must begin to conform. Toddlers don't really understand right from wrong behavior. They conform because they are told to, which is in conflict with the desire to always get their needs met. Toddlers still don't have the ability to empathize with others, thus they don't understand their actions have power and behaviors (such as hitting) hurts others. They only know that hitting is punished, and when they refrain it is because it's what adults expect. About the time a child turns 3, he or she begins to be able to verbalize what "our family does." We eat dinner together; we went to Grandma's house; and we take care of our dog. This extends to more internal statements as, "In our family, we recycle," or "In our family, we don't say those words." This begins the formation of rules of conduct that will translate into an internal moral code. Once these concepts become a part of the child's self, they are able to direct their behaviors to match these inner rules, with frequent reinforcement from family. This must be matched with behaviors they witness. In other words, in order for this code to make sense to a child, a family that talks about safety must exhibit behaviors that are safe. A family that says it cares for others will show that through its actions. Children are sure to struggle when actions don't match words. Parenting is a tough job. The Every Child Promise is dedicated to helping families find resources in their quest to be the best parents they can be. For information, visit www.everychildpromise.org. Dana Carroll is Springfield's child advocate. You can email her at firstname.lastname@example.org.
<urn:uuid:c39cfe08-0e01-4fa4-b338-91eb2d73933b>
CC-MAIN-2015-40
http://www.news-leader.com/story/news/local/ozarks/2014/08/08/family-rules-help-build-childs-moral-character/13803551/?from=global&sessionKey=&autologin=
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737935954.77/warc/CC-MAIN-20151001221855-00231-ip-10-137-6-227.ec2.internal.warc.gz
en
0.978169
492
3.5
4
view a plan Here’s a Music lesson on the speeds of Notes called “Musical Speed Math” 3, 4, 5 Title – Musical Speed Math By – Rosemary Shaw Subject – Music Grade Level – 3-5 This is a game which my students LOVE to play after we have learned the major notes/rests and their values (whole, half, dotted half, quarter). Divide the class into two teams and give each player on a team a “player number”. If the number is uneven, there is always one student who is eager to take on an extra number. Call the first pair (“Number 1 students”) to the blackboard. Have them stand a few feet away with their backs to the board, picking up chalk ahead of time. Write a two note addition problem (in duplicate) on the board behind the students. When you say “GO!” they must turn around and solve the problem as fast as they can. Teacher should have Team 1 and Team 2 tally boxes on the board. Proceed through all pairs of players on the team. This time, have the problem be one note and one rest. CHALLENGE: Add three or more notes and rests together E-Mail Rosemary !
<urn:uuid:25051b2a-363c-4774-a0da-c09e821c8374>
CC-MAIN-2015-11
http://lessonplanspage.com/musicmusicalspeedmathgame35-htm/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936469077.97/warc/CC-MAIN-20150226074109-00043-ip-10-28-5-156.ec2.internal.warc.gz
en
0.939102
274
3.953125
4
WHO has identified four key actions countries can take to prevent viral hepatitis B and C among people who inject drugs. Of the estimated 16 million people who inject drugs worldwide, it is estimated that 10 million are infected with hepatitis C. An additional 1.2 million are infected with hepatitis B. Risk from shared syringes and needles Many drug users are unable to obtain sterile syringes: in some countries it is illegal to distribute or possess syringes for non-medical purposes. The risk of contracting hepatitis and HIV infection occurs when people share syringes and needles. Used injection equipment retains traces of blood. If that blood contains HIV, hepatitis or another type of virus, the next person using the syringe could be infected. Reducing the risk of HIV and hepatitis infections A number of countries have established programmes to reduce HIV infections among people who inject drugs. “Most of the interventions that prevent HIV transmission between people who inject drugs are virtually the same as those for preventing viral hepatitis B and C,” says Dr Gottfried Hirnschall, Director of the WHO Department for HIV/AIDS. “So it makes sense to reduce the risk of both infections by linking viral hepatitis prevention with HIV prevention, care and treatment.” Hepatitis is an inflammation of the liver. Together, hepatitis B and C are the most common cause of cirrhosis and cancer of the liver. Viral hepatitis progresses faster among people living with HIV because their immune systems are weaker, and causes more severe liver-related health problems than it does among people without HIV infection. - Implementing and scaling up HIV prevention programmes such as clean needle and syringe programmes and opioid substitution therapy (treatment of opioid dependence with methadone or buprenophine). - Offering people who inject drugs the rapid hepatitis B vaccination regimen (completed in 3 weeks instead of 6 months), along with incentives to increase uptake and completion of the vaccine schedule. More than 175 countries now include a cheap, safe and effective vaccine against hepatitis B in their national infant immunization schedules. WHO has already recommended countries provide catch-up vaccination for people at increased risk of hepatitis infection, including injection drug users, but this does still not occur systematically at present. There is no vaccine against hepatitis C. - Using “low dead space” syringes that retain less blood after use reduces the survival of HIV and hepatitis C in the blood that remains in the syringe. This potentially reduces the risk of transmission if injecting equipment is shared. - Involving drug users in hepatitis prevention programmes to maximize their impact. Public health approach “Countries that have adopted a public health approach to injecting drug use and HIV have been the most successful in turning round their HIV epidemics. We need to do the same for hepatitis,” says Dr Ying-Ru Lo of the HIV Department at WHO. The new evidence-based guidelines are designed for use by national public health officials, managers of HIV, drug dependence and harm reduction programmes, civil society and health workers in low- and middle-income countries. They are intended to be tailored and implemented according to local situations and needs. Keep up-to-date with drug policy developments by subscribing to the IDPC Monthly Alert.
<urn:uuid:4dd0cabf-72e7-47fe-b68e-317bb817a18d>
CC-MAIN-2016-50
http://idpc.net/publications/2012/07/who-guidance-on-prevention-of-viral-hepatitis-b-and-c-among-people-who-inject-drugs
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543170.25/warc/CC-MAIN-20161202170903-00499-ip-10-31-129-80.ec2.internal.warc.gz
en
0.929216
666
3.65625
4
Advances in neuroscience are giving us new insights into the brain like never before. Beyond simply researching the brain, neuroscience is beginning to apply itself many different fields. A new area of research, neuromarketing, applies principles of neuroscience to better understand how a consumer perceives advertisements and products. Using brain imaging and other techniques, neuroscientists can see in real time your brain reacts to an advertisement. What Can We Find Out From Neuroscience? Neuroscientists know how people form memories, and use this to help advertisers figure out what factors of an ad will make a person retain the most information from it. The brain has a specific process for forming memories, in which various parts of the brain are activated, and by creating an ad that activates the most areas involved in memory, you can create an ad people are more likely to remember. They can also measure how emotionally engaged a person is, or discern what captures the attention of someone. Specific areas of the brain are activated when we feel different emotions, and by closely watching them in real time, neuroscientists can tell exactly what a person is feeling as they watch an ad. Neuroscience can effectively allow advertisers to know their consumer more than ever, in ways that no survey could replicate. How to Market–According to Neuroscience. CONTENT: Connect Viewers to your content. Content is important in an ad. Viewers need to feel connected to what you are producing, and need to be able to envision themselves using it. One way to make viewers feel connected is to make a statement about the benefits of your product or the action you want them to complete. This makes the viewer more likely to envision themselves doing or using it, and therefore more likely to connect themselves to the action. For example, in a recent study with the UN World Food Programme, the organization wanted to create an ad to have people help their cause of ending world hunger. When the ad included a statement about what the benefit the viewer’s actions would have, the view was more likely to feel the impact they could make, and their intent to do the action increased. CONTEXT: Where your ad takes place, matters. When and where your ad takes place matters. The device viewers consume it on, the time, the show or video they see it with–it all needs to be considered. Viewers can be more likely to interact with an add if its context makes it so. Studies have shown viewers who are more engaged in what they are watching, are also more engaged in ads which happen during them. For example, airing an ad during a drama or sports game, where viewers are deeply involved, they may be more likely to remember it. What is happening around your ad may also influence the impression the viewer gets. So you need to understand what impact the environment of your ad may have on your ad’s message. Neuromarketing in the future So is neuromarketing the advertising of the future? Big companies like Starbucks are already turning to neuromarketing to help optimize their advertising. The direct insight into the mind gives companies a very specific knowledge of their consumers, and knowing consumers at a subconscious level will be a competitive advantage for all marketing firms. To read more Sophia in English, click here.
<urn:uuid:6e53bcbb-4839-4086-aed5-3b7107be7b37>
CC-MAIN-2021-17
https://www.sophiadigital.es/sophia-in-english-what-neuroscience-says-about-marketing/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038916163.70/warc/CC-MAIN-20210419173508-20210419203508-00311.warc.gz
en
0.956095
672
3.015625
3
What are Biosimilars? As most know, biologics are a medical product whose active drug substance is made by a living organism or derived from a living organism by means of recombinant DNA or controlled gene expression methods. Biologic drugs have revolutionized the treatment of many diseases including cancer, AIDS and rheumatoid arthritis. Biosimilars are a follow up to biologic drugs. Patents for biologics are expiring, creating a market for biosimilars in Canada and around the world. Biosimilars are also referred to as subsequent entry biologics (SEBs) in Canada. You will hear some referred to these products as ‘generic biologics’ however biosimilars are larger molecules than chemical generic products and therefore cannot be considered to be true ‘generics’ that can be approved without clinical trials. Biosimilars or SEB’s are considered a copy of the biologic medical product that is similar but not the same to the original medicine. This is a new twist on the evolving pharmacy landscape. While biosimilars will provide some savings over the comparable biologic drug, it is not expected that it will create the same savings that generic substitution drugs did in the synthetic based drugs arena. If you want more information on this topic, please contact your JDB Group representative or view the following resources: “An Introduction to Biologics and Biosimilars.” Amgen. 2011. “Shaping the Biosimilars Opportunity.” IMS Health. 2011
<urn:uuid:733d88b7-a095-471f-9b78-89500c2d1fee>
CC-MAIN-2021-31
https://www.jdbgroup.ca/biosimilars/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150000.59/warc/CC-MAIN-20210723175111-20210723205111-00192.warc.gz
en
0.935096
326
2.671875
3
Actinopterygii (ray-finned fishes) > Scorpaeniformes (Scorpionfishes and flatheads) > Tetrarogidae Etymology: Ablabys: Greek, ablabie, -es, ablaboos = harmless (Ref. 45335). Environment / Climate / Range Marine; reef-associated; depth range 1 - 78 m (Ref. 11897). Tropical; 38°N - 31°S, 90°E - 179°E Size / Weight / Age Maturity: Lm ?  range ? - ? cm Max length : 15.0 cm TL male/unsexed; (Ref. 48635) Eastern Indian Ocean and Western Pacific: Andaman Sea to Fiji, north to Japan, south to Australia. Replaced by Ablabys binotatus in the western Indian Ocean (Ref. 9710). Inhabits shallow, subtidal areas with sand rubble and weed (Ref. 9710). A strongly compressed fish that can be seen rocking back and forth on the bottom in response to surge. Easily caught with small hand nets. Nocturnal (Ref. 48635). Solitary or in pairs (Ref 90102). Life cycle and mating behavior Maturity | Reproduction | Spawning | Eggs | Fecundity | Larvae Randall, J.E., G.R. Allen and R.C. Steene, 1990. Fishes of the Great Barrier Reef and Coral Sea. University of Hawaii Press, Honolulu, Hawaii. 506 p. (Ref. 2334) IUCN Red List Status (Ref. 96402) CITES (Ref. 94142) Threat to humans Common namesSynonymsMetabolismPredatorsEcotoxicologyReproductionMaturitySpawningFecundityEggsEgg development ReferencesAquacultureAquaculture profileStrainsGeneticsAllele frequenciesHeritabilityDiseasesProcessingMass conversion Estimates of some properties based on models Phylogenetic diversity index (Ref. 82805 = 0.6250 [Uniqueness, from 0.5 = low to 2.0 = high]. Bayesian length-weight: a=0.01995 (0.00906 - 0.04395), b=3.01 (2.83 - 3.19), based on all LWR estimates for this body shape (Ref. 93245 Trophic Level (Ref. 69278 ): 3.2 ±0.3 se; Based on size and trophs of closest relatives Resilience (Ref. 69278 ): Medium, minimum population doubling time 1.4 - 4.4 years (Preliminary K or Fecundity.). Vulnerability (Ref. 59153 ): Moderate vulnerability (35 of 100) .
<urn:uuid:055c885f-06e0-41cd-a697-e9795479629f>
CC-MAIN-2016-07
http://www.fishbase.us/summary/Ablabys-taenianotus.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701151880.99/warc/CC-MAIN-20160205193911-00133-ip-10-236-182-209.ec2.internal.warc.gz
en
0.686624
605
2.8125
3
Contagiousness or strep throat includes infectiousness, transmission, and contagion methods and vectors. The illness is spread by direct, close contact with another person via respiratory droplets, coughing, or sneezing. It is not known how early contagion begins before symptoms appear or how long it might linger after the symptoms. Casual contact rarely results in transmission. To avoid getting strep throat, it is a good idea to avoid contact with anyone who has a strep infection.The strep infection causes the throat pharynx and the tonsils or adenoids to become irritated, inflamed, and painful. Sore throats are most commonly caused by viral infections or other irritants such as smoke, allergies, dry air, or a throat injury, and not by a strep infection. The more cold symptoms you have, the less likely it is that your sore throat is a strep infection. In some cases a skin rash develops and spreads over the neck and chest and eventually over the whole body. Complications can occur when the infection spreads to other parts of the body and causes other infections such as an ear or sinus infection, or an abscess on the tonsils peritonsillar abscess. It is not clear whether treating the infection with antibiotics reduces your risk of developing inflammation of the kidneys acute glomerulonephritis. If symptoms of strep throat are present, it is important to be tested for strep infection. Surgical removal of the tonsils is much less common today thanks to the present ability to rapidly and accurately diagnose strep infection, and thanks to the excellent antibiotics currently available. Scarlet fever, a rare form of strep, is characterized by a sore throat, fatigue and a red rash on the body that feels like sandpaper. Your doctor will do a physical exam, ask you about your symptoms and past health, and do a rapid strep test to diagnose strep throat. If the rapid strep test says that you don't have strep the test is negative, but your symptoms suggest that you do, your doctor may want to do a throat culture to be sure. This is because rapid strep tests are not always accurate. If the rapid strep test is positive and says you do have strep, there's no need to do the throat culture. Although some people are quick to think that any painful throat is strep, sore throats are usually caused by a viral infection and not strep bacteria. Antibiotics shorten the time you are able to spread the disease to others and lower the risk of spreading the infection to other parts of your body. Strep infections can occur at any age even if a person has had a tonsilectomy. Contagiousness or strep throat includes infectiouness, transmission, and contagion methods and vectors. The illness is spread by direct, close contact with another person via respiratory droplets, coughing, or sneezing.
<urn:uuid:8b365f86-e623-4f84-b627-532fc96cacf1>
CC-MAIN-2014-49
http://www.life123.com/health/ailments/strep-throat/is-my-strep-throat-contagious-2.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400381177.56/warc/CC-MAIN-20141119123301-00094-ip-10-235-23-156.ec2.internal.warc.gz
en
0.952575
601
3.296875
3
Carp, Bighead (Aristichthys Nobilis) Bighead carp has Chinese origins and is widespread throughout Asia reaching as far afield as Europe and the USA. The Bighead Carp is native to the large river systems and flood plains of Eastern Asia with its range extending from Southern China to the Amur River which borders both Southern Russia and China. This highly distinctive member of the Cyprinidae (carps) family of fishes is easily distinguishable by its extremely large scaleless head and streamlined body which is adorned with a covering of minute scales. The Bighead Carp displays a marbled almost mottled brown to grey-green colouration throughout its body which is covered with blotches and has a huge cavernous mouth with a protruding lower jaw. Bighead Carp are equipped with large slightly under slung eyes which further accentuate the strange and ugly appearance of this Asian monster carp species. This Asian carp species feeds predominantly on zooplankton, detritus and other vegetable/ plant matter and is classed as a filter feeder. Bighead Carp have been legally introduced into various other countries most notably the USA to assist with the removal and consumption of undesirable plankton in water treatment plants and aquaculture facilities. Unfortunately, Bighead Carp have escaped into nearby rivers during flooding and have now become an established and highly invasive species threatening native freshwater fish populations in various river systems in the US. The Bighead Carp is present in various commercial fishing lakes, ponds and rivers in Thailand where it is regularly caught at weights to 25-30 lb. Bighead Carp are often caught on cereal based groundbaits whilst carp fishing in Thailand for Giant Siamese Carp and other Asian carp species. Although not famed for its hard fighting qualities when caught on standard carp fishing techniques in Thailand, the Bighead Carp is a challenging carp species to target and can be a very satisfying capture for carp fishing enthusiasts fishing in Thailand
<urn:uuid:467e569e-c5f7-4608-a440-78cbf93e6988>
CC-MAIN-2019-47
https://www.fishsiam.com/species/carp-bighead/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668644.10/warc/CC-MAIN-20191115120854-20191115144854-00402.warc.gz
en
0.958811
410
2.8125
3
As containers have become more important to businesses across the globe, it was necessary to create a system that would allow containers to scale out to meet the needs of enterprise-level deployments. That’s where Kubernetes comes into play. Unlike Docker, Kubernetes is a very robust ecosystem. Instead of deploying a single container, Kubernetes enables you to deploy multiple containers to multiple hosts, making it ideal for larger deployments and load balancing. This smart person’s guide is an easy way to get up to speed on Kubernetes. We’ll update this guide periodically when news about Kubernetes is released. - What is Kubernetes? Kubernetes is an open source project that enables the management of large-scale container deployment. - Why does Kubernetes matter? Containerized applications are one of the hottest technologies on the market today. If you’re looking to roll out large-scale, highly-available, load-balanced clusters of containers, Kubernetes might be the right tool for you. - Who does Kubernetes affect? Kubernetes affects companies that want to roll out massive containerized applications, as well as clients, customers, consumers…anyone that would benefit from highly-available services. Kubernetes also helps developers build distributed applications and makes it much easier for IT operators to manage scalable infrastructure for applications. - When is Kubernetes happening? Kubernetes was first announced in mid-2014 and was first released on July 21, 2015. - How do I start using Kubernetes? Install the system on a supported platform such as Red Hat, SUSE, CentOS, Fedora Server, Ubuntu Server, etc., and you’ll have access to kubernetes, kubernetes-client, kubernetes-master, kubernetes-node, and more. SEE: Special report: Riding the DevOps revolution (free PDF) (TechRepublic) What is Kubernetes? Kubernetes is an open source system that allows you to run docker and other containers across multiple hosts, effectively offering the co-location of containers, service discovery, and replication control. It was originally called K8s and was designed by Google and donated to the Cloud Native Computing Foundation. The primary functions of Kubernetes are: - schedule, start, manage, and scale containers across multiple hosts; and - add a higher-level API to define how containers are logically grouped to define container pools and handle load balancing. Its features include the following. - Deploy containers and manage rollout control: With this complex system you can describe your containers and define how many you want in a single deployment. Kubernetes will not only manage the running of those containers (even across multiple hosts), but it will also handle deploying changes (e.g., updating images, changing variables, etc.) to your containers. - Resource Bin packing allows you to declare minimum and maximum computer resources (CPU and memory) for all containers. - Built-in service discovery: Automatic exposure of containers to the internet or other containers in the Kubernetes cluster. - Autoscaling: Kubernetes automatically load balances traffic across matching containers. - Heterogeneous clusters: Kubernetes allows you to build a cluster with a mixture of virtual machines, on-premises servers, or bare metal in your company data center. - Persistent storage support is available to Kubernetes, with support for Amazon Web Services EBS, Google Cloud Platform persistent disks, and more. Vendors, including Red Hat, Dell EMC, and NetApp, provide persistent storage for Kubernetes. - High availability, such as multi-master and cluster federation, allowing the linking of clusters together for load balancing. Kubernetes allows you to easily: - deploy containerized applications quickly and predictably; - scale containerized applications on the fly; - seamlessly roll out new features to your containerized applications; and - optimize your hardware specifically for your containerized applications. Kubernetes, at its minimum, can schedule and run containerized applications on clusters of physical machines or virtual machines or a combination of physical and virtual machines; this allows developers to leave behind the traditional method of working with physical and virtual machines. Although this can be achieved with the simpler Docker Swarm, Kubernetes allows the deployment of much larger clusters, which can include docker containers. In other words, create your docker containers and then deploy them over a massive, load balanced cluster with Kubernetes. Kubernetes consists of the following components. - Pods: Containers are placed into pods to be managed by Kubernetes. - Labels and selectors: Key-value pairs used to identify and group resources within Kubernetes. - Controllers: A reconciliation loop that drives actual cluster state toward the desired cluster state. - Services: A way to identify elements used by applications (name-resolution, caching, etc.). - Kubernetes control plane: Main controlling unit of the cluster that manages workload and directs communication across the system. - etcd: Persistent, lightweight, distributed key-value data store. - API server: Serves the Kubernetes API using JSON over HTTP. - Scheduler: Pluggable component that selects which node a pod should run on based on resource availability. - Controller manager: The process that runs the Kubernetes controllers such as DaemonSet and Replication. - Kublet: Responsible for the running state of each node (starting, stopping, and maintaining application containers). - Kube-proxy: The implementation of a network proxy and load balancer that supports the service abstraction. - cAdvisor: An agent that monitors and gathers resource usage. Why does Kubernetes matter? Containers are a powerful and flexible way to safely and reliably deploy applications and microservices to extend and expand your company’s services. When the need grows beyond a standard Docker deployment or you need to deploy/manage multiple containerized applications from different systems (such as Docker), you need a way to deploy and control such systems. With the help of Docker Swarm, you can deploy containerized applications over a cluster, but you’re limited to Docker-only containers and to only using the architecture security, registry of Docker, Inc. With Kubernetes, those containers can come from a number of sources (Docker, Windows Server Containers, etc.), making Kubernetes incredibly flexible and significantly more complex. Who does Kubernetes affect? Kubernetes affects any company that needs to deploy massive rollouts of containerized applications and services; this means anyone involved with the deployment should be familiar with the Kubernetes tools and Docker. And considering Kubernetes is a rather complex system, administrators will need to do a fair amount of homework in order to successfully implement the technology. The effect of Kubernetes goes well beyond those that administer the system—customers, clients, staff, and consumers…no one is immune to the effect of containerized applications. When we’re talking about business and enterprise-level deployments, Kubernetes takes center stage. Developers are also affected by Kubernetes. As of April 7, 2017 Kubernetes had 1,137 contributors from across varying industries, with over 31 branches and 46,332 commits on GitHub. Kubernetes also has more developers working on it than Docker Swarm, Mesos, and Cloud Foundry Diego combined. When is Kubernetes happening? Kubernetes was created by Joe Beda, Brendan Burns, and Craig McLuckie, who were soon joined by other Google engineers, and was first announced by Google in mid-2014. The original name for Kubernetes was Seven Of Nine (from Star Trek Borg fame). Once the Google lawyers swayed the original developers away from the original name, they agreed upon the name Kubernetes. Kubernetes v1.0 was released July 21, 2015 and very quickly wound up in the top 0.01% in stars and number 1 in terms of activity on GitHub. That translates to significant development on the project. How do I start using Kubernetes? Kubernetes can be deployed on numerous platforms, including: For a full list of vendors/platforms supporting Kubernetes deployment, check out this spreadsheet. You will need to set up: - Kubernetes Master: This is where you direct API calls to services that control the activities of the pods, replications controllers, services, nodes, and other components of the cluster. - Kubernetes Node(s): This system provides the run-time environments for the containers. The Master and Node can be on the same system, but traditionally they will be separated. You will also need your containers. The most widely used containers deployed by Kubernetes are from Docker, which makes sense considering docker containers are the most widely used on the planet. Kubernetes must be installed on the Master and all hosts. If you’re working with Red Hat, you can install Kubernetes with the command: yum install docker kubernetes-client kubernetes-node etcd Once Kubernetes is installed, follow these steps. - Configure the Kubernetes service on the Master and each Node. - Configure the kubelet and start the kubelet and proxy. - Configure flannel to overlay the docker network in /etc/sysconfig/flanneld. - Start the appropriate services on the node(s). - Configure kubectl. - Check to make sure the cluster can see the node.
<urn:uuid:99dd1c0b-a9b9-484e-b9d2-77bae29487c7>
CC-MAIN-2018-43
http://technewsexpert.com/kubernetes-the-smart-persons-guide/
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516117.80/warc/CC-MAIN-20181023065305-20181023090805-00193.warc.gz
en
0.876001
2,070
2.640625
3