id string | concept_name string | domain string | content_type string | text string | quality_score float64 | information_density string | complexity_level int64 | token_count int64 | prerequisites list | builds_to list | cross_domain_connections list | quality_assessment dict |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
8f07103f-4755-43b1-8480-57b65680798b | Exploiting online networks order | interdisciplinary | research_summary | Exploiting online networks in order to map and predict cross-linked social phenomena such as the commonality in consumption (Amazon), electoral behavior (Google), the spread of civil unrest (Twitter) or even the outbreak of diseases (Google and EMM) continues to be both an intricate and promising field of research.
Thus, it comes as little surprise that Gordana Apic, Matthew J. Betts and Robert B. Russell from the University of Heidelberg recently suggested an indicator for measuring geopolitical instability by applying the principle of association fallacy, primarily used in life sciences, to online encyclopedia Wikipedia’s entries whose impartiality is contested. In their brief research paper titled ‘Content Disputed in Wikipedia Reflect Geopolitical Instability‘, the authors accordingly argue that “quantifying the degree to which pages linked to a country are disputed by contributors” correlates with a country’s political stability. In other words: since instability is best represented by its underlying conflicts, the multitude and diversity of user-generated associations, namely: disputes, is believed to reveal some form of qualitative pattern that can be arranged as a stability ranking.
What may somewhat sound like a platitude and hasty induction at first glance, is elaborated more methodically by means of a so-called ‘Wikipedia Dispute Index’ (WDI) whose major benefit, as its inventors admit, is rather its simplicity than its objectivity. It is calculated as follows:
WDI = log (Fdispute/Fave)
Where Fdispute is the number of disputed pages linked to a country (D) divided by the total number of pages linking to the country (N), and where Fave is the average of Fdispute over all countries considered. Positive values thus denote countries with more disputes than average; negative values the opposite.
Applying this simple metric to a set of 138 countries/regions flagged as ‘neutral point of view’ (NPOV) dispute results in a quite foreseeable, but hardly impeccable projection of political instability with some of the ‘usual suspects’ (Middle East, Kosovo, BiH, North Korea etc.) coming to the fore. To better make sense of these findings, a weekly-updated and interactive visualization of the respective data sets is also offered, which, in my opinion, raises more questions than it answers. To substantiate this claim, a closer look at the model and the methodology is advisable:
- Only 138 of 497 countries/regions available at Wikipedia, according to the authors, provide “sufficient data to compute the indicator with confidence”, which means that – for the sake of the WDI – a country without significant squabbling is virtually non-existent. Obviously, the reverse argument (i.e. no dispute means perfect stability) cannot be valid though. Nonetheless, the statistical relevance of the findings must surely be questioned, all the more as the relevant values for Northern African and Middle Eastern countries remained stable over this year’s uprisings in the region.
- Another major, yet maybe necessary flaw of the research design is its exclusive reliance on the English-speaking version of Wikipedia. The problem here is twofold: 1. Is the sample used representative enough to draw broad conclusions (particularly on non-English speaking countries) and generalizations from relatively little evidence? And 2. Does this open the floodgates to a subtle selection bias which would distort the explanatory power of the indicator?
- “The evaluation of our ranking for the most cross-linked countries suggests that debates in Wikipedia correlate with regional instabilities all over the world,” Prof. Robert Russell of Heidelberg University’s Cluster of Excellence CellNetworks is quoted. Although it should go without saying, it cannot be stressed enough that correlation does not imply causation. The authors point this out when giving the example of a Swiss regional football team whose Wikipedia entry is disputed because of a Moldovese player. Simply put: the fervor of Swiss football fans can hardly account for the political stability of Moldova.
- At last, guilt by association is a derogatory concept (as opposed to honor by association). Yet, many NPOV disputes may not imply negative reservations of a contributor towards a specific country, but rather towards another contributor’s preoccupations. Those disputes are mostly mediated and – ideally – resolved, at least for the short term. Only 7.8% of the entries disputed in 2007 were still disputed in 2010, raising the question if – qualitatively speaking – they really make for a solid indicator on the long run.
So finally, while the WDI is certainly worth being discussed and developed further, John Godfrey Saxe’s classic poem of ‘The Six Blind Men and the Elephant’ remains as meaningful as ever:
And so these men of Indostan
Disputed loud and long,
Each in his own opinion
Exceeding stiff and strong,
Though each was partly in the right,
And all were in the wrong! | 0.65 | medium | 4 | 1,025 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.45,
"creativity": 0.4
} |
640e242a-ce08-4d48-a130-1c30db91a5d8 | Early Victorian Era (1837-1850) | interdisciplinary | historical_context | Early Victorian Era (1837-1850) & Modern Men's Formal Wear
“[T]here is no perfect suit and the history of tailored clothing is one of a constantly changing ideal of beauty and of masculine expression (and suppression).”
– Richard Martin
Curator, The Costume Institute, Metropolitan Museum of Art
“As a young man in the early years of the ninteenth [sic] century, the brilliant and elegant Disraeli would saunter about town wearing bottle-green velvet trousers, canary-colored waistcoats, and buckled shoes. But after mid century he dressed in a black broadcloth suit as befitted the leader of the Conservative Party of the House of Commons and the age.”
– Bruce BoyerDuring the Victorian Era, styles recognizable as "modern" men’s formal wear became firmly codified into a set of fashion rules and implicit regulations that are recognizable if not identical today. The early years of the Victorian Era, were a short time period in which fashion’s response to failed Revolution took the form of Romantic embellishment; moreover the backlash to Romanticism led to the inception of a more somber, recognizably “modern” look. [caption id="attachment_101" align="aligncenter" width="430"] Victoria holding a Privy Council meeting. Sir
David Wilkie. 1838 (Public Domain by age). Oil on canvas.[/caption] During the nineteenth century, black or dark clothing dominated menswear, even at the most formal occasions that previously had called for fine fabrics, colors, and embellishments. This about-face is generally credited to vague concepts such as the puritan ethic; or austerity, gravity, and reserve; or the male renunciation of or withdrawal from unimportant matters of frivolity, ostentation, and so on. Still, as Farid Chenoune points out, this change did not come about instantaneously. Instead, we must realize that “Making too much of the ‘puritanical’ aspect […], seeing it in terms of renunciation, impoverishment, and loss (indeed, mourning), probably overstates one aspect of a revolution that also heralded a sturdy, strong, masculine ideal stemming from rites and roots more complex and less one-sided than is generally acknowledged.”
1. From Artistic Romanticism to Bourgeois Sobriety [caption id="attachment_102" align="alignleft" width="239"] Painting of a typical sans-culotte[/caption] Among the rubble left by turbulent years of revolution in both France and England, new fashions that clearly aligned with new ideals began to take root. No longer did “fashion” automatically mean “whatever is worn at court” or “whatever the sovereign has declared acceptable.” Instead, many people separated themselves from the idea of aristocracy and gravitated toward a Romantic worldview in which expressive freedom and historical nostalgia reigned. The Romantics projected “contempt for the ‘grayish’ middle classes”; they rejected “bourgeoisie” ideals and called for greater artistic expression. Not lords and their lackeys, but rather writers and artists, were admired as fashion icons. In France, the people were inspired by the works and lives of artists such as Victor Hugo and Rubens; in England, Walter Scott received similar adoration and a similar type of following; in both countries, Byron served as Romantic ideal. Political ideology had failed—had failed miserably—and so the people turned to art instead. Rejecting classic styles such as dark-colored frock coats and modernized waist-length vests, the Romantics looked backwards to Elizabethan fantasy for sartorial inspiration. The doublet, left behind during the eighteenth century, made a short-lived return. The Romantics looked for artistic exaggeration not only in ideology but in their lives, particularly in their dress: as Léon de B. wrote to a friend in 1831: “‘The whole secret, the whole contour of a garment is in the thinness and narrowness of the waistband. Catechize your tailor on this. … Insist, order, threaten if necessary. My rule is wide shoulders, full and flowing skirts, very tight waist.’” Along a similar vein, it became “fashionable” to wear daggers and swords with one’s daily—and even evening—costume. French Romantics were inspired by the red vest that Gautier wore to the premiere of Victor Hugo’s Hernani, so much so that it became all the rage not just among fashionable elite but among schoolchildren. One mother in 1832 lamented her son’s desire for “‘a red vest, like most of his friends’”; moreover, this vest must “‘button or lace up at the back, hugging the chest tightly so that it curves like a breastplate, as he says. … He’d wear a corset, if he dared…. And would you believe that this little coxcomb wants his two vests made by a dressmaker?’” [caption id="attachment_103" align="aligncenter" width="299"] Portrait of Théophile Gautier: Originator of the red vest.[/caption] Ideal Romantic fashions were praised for their “character” and “local color”; clothes were described as “picturesque,” “archaic,” “fiery,” “frenzied,” “astounding,” “ineffable,” “monumental,” “cathedral,” “furiously gothic.” One didn’t just wear a doublet and carry a dagger; oh no, one wore “Milan armor” or “Venice justaucorps” with one’s “Toledo blade”: “language used for an extraordinary wardrobe straight out of some Romantic Babel.” Though notable for its dramatic nostalgia—and especially for its inspiration not by the court but by artists and their followers—Romanticism in men’s dress did not last long. Just as the Romantics’ political ideology failed to take hold, their fashionable popularity faded too: these “romantic, flamboyant” styles began shuffling off fashion’s stage as early as 1837. By the 1840s, men’s clothing had become darker and more practical again: the early Victorian era witnessed “the fading away of flamboyance and colour from men’s garments, not to be recovered until very modern times. It was considered ungentlemanly to wear anything striking.” What it witnessed, too, was the ultimate triumph of the bourgeoisie—not just in politics and in fashion, but in terms of the period’s overall sociopolitical atmosphere. As James Laver, former curator at London’s Victoria and Albert Museum, writes of the era, “The dominant figure in English life was now a respectable bourgeois, who had no desire to make himself conspicuous but wished merely to present a gentlemanly appearance.” This shouldn’t be surprising, of course, as we’ve discussed clothing’s use as private missive or public statement. Still, the perfection with which popular styles illustrated their era is particularly striking during these years.
2. Frock Coats and Evening Coats[caption id="attachment_104" align="aligncenter" width="285"] Jean Auguste Dominique Ingres; sketch of Lord Grantham (note ascot, tails, pantaloons, boots); 1816[/caption] The early response to Romantic exaggeration seems to be a complete reversal: away from nostalgic fantasy and right back to where fashion left off—that is, inspired by the unadorned yet perfectly polished styles of Beau Brummell: “for evening, the eminent Mr. Brummell donned a navy blue swallowtail coat, black breeches, white waistcoat and shirt, along with a white neck cloth and a 6-inch starched collar of his own invention. Near the end of his reign as the dandy definitive, all Londoners turned to somber clothes and haven’t looked back since.” In fact, Brummell is credited with individually setting the style for the first half of the nineteenth century. [caption id="attachment_105" align="aligncenter" width="362"] This gentleman wears a double-breasted frockcoat in dark blue over a buff waistcoat. His gray trousers have straps under his shoes. His slightly conical tall hat sits in the windowsill, Germany, c. 1815.[/caption] It’s true that Brummell’s simple, sober, yet polished aesthetic became commonplace—expected, even—during the early years of Queen Victoria’s reign. The pinched waists and padded shoulders, the flamboyant waistcoats, the decorative daggers of the short-lived Romantic period began their slide into (re-)obscurity after 1837. In their stead, the cut-away coat (another name for Brummell’s swallowtail coat, and a clear precursor of the tailcoats of today) became the fashion of choice for both day and evening wear—the only difference being that evening coats were always black and generally made of finer fabrics. (Many people—still following Brummell!—stuck to frock coats for day and swallowtail or cutaway coats for evening.) The anonymously published fashion guide of the 1840s, The Habits of Good Society, provides us with a clear picture of what the “well-dressed man” of the time was (or ought to be) wearing: […] the well-dressed man needed four kinds of coat: a morning coat, a frock coat, a dress coat, and an overcoat. He needed four of the first and one each of the others, the cost of the seven coats being £18 (i.e. little more than £2 each). In addition, he needed six pairs of morning and one of evening trousers, at a total cost of £9; and four morning waistcoats and one evening waistcoat, costing £4 in all. Another £10 was to be allowed for gloves, linen, hats, scarves and neckties, and £5 for boots. The well-dressed man of moderate means could therefore fit himself out for under £50 a year […] This seems a nominal sum—though keep in mind that £1 in 1840 was the equivalent of roughly £50 today, meaning that “the well-dressed man of moderate means” was expected to spend something like £2,500 on clothes every year! And, of course, dandies hadn’t disappeared with Brummell’s exile and Romanticism’s abandonment. They persisted into the 1840s, spending much more than this estimated £2,500 yearly sum. At this point, though, remaining dandies were considered “relics of a former, dissipated age.” Habits of Good Society exhorted gentlemen to wear sober colors: dark blue or black for town wear, with an exception granted for tweed in the country. Still, despite what looks like an overwhelming triumph of bourgeois sobriety over the color and costume of dandies and Romantics alike, there was a single loophole left open—or, rather, a buttonhole.
3. The Boutonniere
History does not say which inspired genius or fashion-conscious rebel it was who first decided to leave the top buttons of his frock coat unfastened. Whoever it was, his anonymous figure is owed a huge debt by fashionable society.
– Nicholas Foulkes, “The Great Age of the Boutonniere” Toward the end of the eighteenth century, men first began to leave the top buttons of their frock coats or evening coats undone. This allowed the coat’s collar and upper-front pieces to fall back in a sort of proto-lapel. And this inchoate lapel proved to be perhaps the unlikeliest of sources to allow a tiny piece of the Romantic spirit to live on—in the form of the boutonniere. Nicholas Foulkes probably puts it best in his essay on the boutonniere’s greatest years: Men’s clothing had now entered a far more sober phase where virtually all, latent peacock instincts had to be curtailed, save for the fortunate opportunity proffered by the emergent lapel and its as yet unused but still retained buttonhole. It proved to be the perfect backdrop for one last splash of color—the boutonniere—or buttonhole flower—which soon came into fashion, born on the spirit of the Romantic age and its worship of nature. Beginning in the 1830s and continuing on throughout the century, the boutonniere prevailed as the mark of a well-dressed man. According to Alan Flusser, “the wearing of a lapel flower was a symbol of gracious living, a tribute to the lady on your arm, as well as to your host or hostess.” For some, the buttonhole flower retained special meaning, symbolizing a love of nature and an endorsement of seemingly lost Romantic ideals; even “taking on a symbolic—almost quasi-religious—importance in certain circles.” Regardless of one’s political commitments or aspersions, the boutonniere allowed for a spark of color and individuality despite the overwhelming dark and homogenous nature of men’s formal wear during this time period.
4. The Rise of the Overcoat[caption id="attachment_106" align="alignleft" width="288"] Note: overcoats, top hats, and trousers[/caption] In addition to the boutonniere, one of the largest emergent fashions of the early Victorian Era was the overcoat. Its first descendants can be traced back to 1835. As a “warm covering designed to protect the wearer from inclement weather,” it continued to gain popularity and new adherents right up until the First World War. This was, to say the least, “a fashion which provoked wariness among tailors.” And perhaps rightly so: the overcoat did not hug the waist; it had no horizontal seams or underarm pleats; it fell “straight like a sack.” It was, perhaps, the first sign of things to come: that is, ready-made clothing without the need for precise, individual tailoring. Tailors, of course, were not about to take this new fashion lying down. In 1839, the French fashion and tailoring magazine, La Fashion, decried the overcoat:
‘today’s stylish men borrowed, several years ago, the OVERCOAT from Dieppe sailors. This coarse garment whose simple weightiness and barely-sketched shape gave those who donned it against rough weather or to go herring fishing, such a massive bulk that the learned folk of Honfleur and Saint-Valéry will tell anyone willing to listen that paltoquet [‘lout’] means nothing other than paletot-wearer!’To many tailors’ distress, however, the overcoat’s popularity continued to grow on both sides of the English Channel. By the 1840s, multiple variations and styles were developed: there was the aforementioned Paletot—originating in France before making its way to England—which fell straight down from the shoulders with no identifiable waist or tailoring of any kind. There was the chesterfield: a longer coat with a slight waist popular in England (in fact, still popular today!). There was the Pilot Coat, the Curricle Coat, and the “Twine” (a linguistically confused term referring to the French adoption of the English variation of the originally French paletot!). Darker, more conservative styles, as well as the prospect on the horizon of ready-made clothes, are perhaps this early Victorian Era’s most notable developments in men’s fashion. If you read on, it will become increasingly apparent how styles brought about by sociopolitical backlash have influenced men’s formal wear—in style, in regulation, in tailoring and creation—right up until the present day. From the Preface to Farid Chenoune’s History of Men’s Fashion. Boyer, G. Bruce. (1985). Elegance: A Guide to Quality in Menswear. New York: W.W. Norton & Co. 106. Chenoune, 19. Though this movement began in the early 1830s and faded away during the early years of Victoria’s reign, I’ll describe it here because the backlash against its affected melodrama paved the way for the progression of fashion toward the end of the first half of the nineteenth century. Chenoune, 50. Ibid. Laver, J. (2002). Costume and Fashion: A Concise History, 4th edition. New York: Thames & Hudson. 168. Chenoune, 50. Quoted in Chenoune, 54. Ibid. Chenoune, 54. Laver, 168. Ibid., 169-70. Ibid., 169. Foulkes, N. (2000). “The Great Age of the Boutonniere,” in Angeloni, U. (ed.) The Boutonniere: Style in One’s Lapel. New York: Universe, 26-39. p. 27. Flusser, A. (2002). Dressing the Man: Mastering the Art of Permanent Fashion. New York: Harper Collins. (p. 234, emphasis added.) Foulkes, 27. Laver, 168. Quoted in Laver, 169. Laver, 169. Ibid. Foulkes, 27. Ibid. Ibid., 28. Flusser (2002), 231. Foulkes, 28. Chenoune, 65. Ibid. Quoted in Chenoune, 65. | 0.75 | medium | 6 | 3,849 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.65,
"creativity": 0.45
} |
e40421e5-86e6-4ef2-b294-f2efe5daf8a6 | Focus OPIC Ex-Im Bank's | social_studies | historical_context | Focus on OPIC and Ex-Im Bank's Use of Financial Instruments...
WRI’s “Climate Finance” series tackles a broad range of issues relevant to public contributors, intermediaries, and recipients of climate finance—that is, financial flows to developing countries to mitigate greenhouse gas emissions and adapt to climate change impacts. A subset of this series,...
Five-country comparison on solar photovoltaic and on-shore wind energy policies and progress.
This article first appeared in Project Syndicate
Water is never far from the news these days. This summer, northern India experienced one of its heaviest monsoon seasons in 80 years, leaving more than 800 people dead and forcing another 100,000 from their homes. Meanwhile, Central Europe faced its worst flooding in decades after heavy rains swelled major rivers like the Elbe and the Danube. In the United States, nearly half the country continues to suffer from drought, while heavy rainfall has broken records in the Northeast, devastated crops in the South, and now is inundating Colorado.
Businesses are starting to wake up to the mounting risks that water – whether in overabundance or scarcity – can pose to their operations and bottom line. At the World Economic Forum in Davos this year, experts named water risk as one of the top four risks facing business in the twenty-first century. Similarly, 53% of companies surveyed by the Carbon Disclosure Project reported that water risks are already taking a toll, owing to property damage, higher prices, poor water quality, business interruptions, and supply-chain disruptions.
The costs are mounting. Deutsche Bank Securities estimates that the recent US drought, which affected nearly two-thirds of the country’s lower 48 states, will reduce GDP growth by approximately one percentage point. Climate change, population growth, and other factors are driving up the risks. Twenty percent of global GDP already is produced in water-scarce areas. According to the International Food Policy Research Institute (IFPRI), in the absence of more sustainable water management, the share could rise to 45% by 2050, placing a significant portion of global economic output at risk.
When President Barack Obama announced the country’s first national climate strategy, many people wondered what it would mean across the nation. Yet, the strategy may carry even more significant implications overseas.
The plan restricts U.S. government funding for most international coal projects. This policy could significantly affect energy producers and public and private investors around the globe.
On July 16, 2013 the World Bank agreed to support universal access to reliable modern energy and limit the financing of coal-fired power plants to rare circumstances in an effort to address climate change concerns.
Sustainably-focused small and medium enterprises (SMEs) manufacture and market environmentally friendly products and serve low-income communities. Not only do they create jobs and spur economic growth, but they also provide models for the businesses of the future, those that will thrive in a low-carbon, resource constrained world. The Global Impact Investing Rating System (GIIRS), used by investors worldwide to evaluate SME’s in developing countries, has adopted environmental criteria, thus raising the visibility of environmentally-focused businesses in emerging markets.
GIIRS is a standardized rating system that generates an easily digestible single value for scoring an emerging market SME and/or impact investment fund. Investment funds obtain a calculated GIIRS score based on the ratings of the portfolio of companies they invest in and the operations of the fund manager. GIIRS is crucial to the growth of the impact investing industry as it makes impact measurement accessible much like the Lipper or Morningstar ratings did for the mutual fund industry.
WRI’s New Ventures team persuaded the GIIRS managers to embed key environmental metrics into the ratings system in part through its position as the environmental expert on the GIIRS emerging markets standards advisory committee. By August 2010 eleven leading emerging market fund managers agreed to use the GIIRS rating system in their investment decision-making. Collectively, they have raised around US$1 billion to invest in high impact GIIRS-rated enterprises. These GIIRS “Pioneer Funds” will be pilot testing GIIRS with their portfolio companies throughout the developing world. Additionally, it has been adopted as the standard all companies and funds must reach to participate in the socially responsible angel network Investor’s Circle.
A social entrepreneur invests the little working capital she has to bring solar electricity to a community that –like 1.2 billion people worldwide– lacks access to electricity. The community used to use dirty, expensive and choking kerosene for light to cook by and for children to learn by. The entrepreneur knows she can recoup her costs, because people are willing to pay for reliable, high-quality, clean energy – and it will be even less than what they used to pay for kerosene. Sounds like a good news story, right?
Three months later, the government utility extends the electrical grid to this same community, despite official plans showing it would take at least another four years. While this could be good news for the community, one unintended consequence is that this undermines the entrepreneur’s investment, wiping out their working capital, and deterring investors from supporting decentralized clean energy projects in other communities that lack access to electricity.
Few countries are unaffected by China’s overseas investments. The country’s outward foreign direct investments (OFDI) have grownfrom $29 billion in 2002 to more than $424 billion in 2011. While these investments can bring economic opportunities to recipient countries, they also have the potential to create negative economic, social, and environmental impacts and spur tension with local communities.
To address these risks, China’s Ministry of Commerce (MOFCOM) and Ministry of Environment (MEP)—with support from several think tanks—recently issued Guidelines on Environmental Protection and Cooperation. These Guidelines are the first-ever to establish criteria for Chinese companies’ behaviors when doing business overseas—including their environmental impact. But what exactly do the Guidelines cover, and how effective will they be? Here, we’ll answer these questions and more. | 0.7 | high | 6 | 1,278 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology",
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.55,
"creativity": 0.45
} |
cb8b700b-62fb-4a8a-a988-2f6da03b3944 | Costa Rican Birds.com | interdisciplinary | historical_context | Costa Rican Birds.com
site by David L. Ross, Jr.
Great Green Macaw (Ara ambigua) is emblematic
of Costa Rica's conservation efforts, both in terms of its magnificence, as
well as in the sense of urgency, and in the relentlessness of the challenges
which this amazing republic faces. These macaws are much more rare than their
better known siblings the Scarlet Macaw (Ara macao) which in Costa
Rica is more common on the Pacific Slope. The Great Green Macaws are seldom
parrots, resplendent quetzals, dazzling hummingbirds, and amazing toucans, are
all to be expected in the American tropics. Costa Rica, the rich coast, is also
rich in its variety and splendor of birds.
Macaw (Ara macao) photographed by David
Ross in Corcovado National Park, Puntarenas, Costa Rica
This is a site created for those interested in Costa Rican birds, and
tropical nature in general. The Central American democracy of Costa Rica is
famous for its rainforest, its national parks and preserves, and for those in
the know--for an amazing avifauna. Costa Rica's land area is roughly equal to
that of the state of West Virginia, yet it list fully 10% of the worlds species
of birds. To see this assortment, one must visit a wide variety of habitats.
It is tropical Costa Rica's wide range of habitat types that house this richness
in bird species. Within short roadtrips of an hour or two, the visitor or birder
can be in remarkably different environments. From the dry forests of Guanacaste,
to cloud forests, and the high elevation of the Continental Divide and volcanic
peaks such as Volcan Irazu and Volcan Poas, to the middle elevations of the
the Caribbean Slope, and the lowland rainforest below, one can enter into impressively
different worlds of plants scenery and birds.
Initially this site will depend heavily if not entirely on the
copyrighted material of the webmaster
David L. Ross, Jr.. Please do not reproduce, or repost these
to the web without permission from the owner. It is hoped that we may soon draw
upon some of the talented naturalists and ornithologists that are working and
have worked within Costa Rica and the Neotropics.
Welcome! and Cyber journey the rainforest, dryforest, cloudforest and
the highlands in search of tropical birds. Enjoy and share with friends students
and classmates, these images, sounds, and articles of birding and natural history
experiences in amazing Costa Rica. Look and listen to solitaires, rumbling volcanoes,
and howler monkeys at keyboards distance, and then hopefully in muddy boots
on a rain wet sendero in a land of wonder. This is Pura Vida (pure life), the
bomb, off the hook--if the word "Quetzal" makes your pulse quicken.
This may be a sight worth revisiting as it grows and changes through time..
Page Updated 10-20-2008 | 0.65 | medium | 6 | 655 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.45,
"creativity": 0.45
} |
4dce3fd0-2a71-4a61-91e2-f5a138718178 | Family: Cyprinidae, Carps Minnows | interdisciplinary | historical_context | Family: Cyprinidae, Carps and Minnows view all from this family
Description To 20" (49 cm). Moderately elongate, with distinctive hump on nape (in adults) overhanging head. Greenish-gray above, sides lighter, whitish below. Breeding males reddish-orange below and on paired fins. Head short; snout depressed, broadly rounded, overhanging mouth. Fins large, triangular; 9 dorsal fin rays; 10 or more anal fin rays; caudal peduncle very long and narrow; caudal fin deeply forked.
Endangered Status The Humpback Chub is on the U.S. Endangered Species List. It is classified as endangered in Arizona, Colorado, and Utah. Its numbers have declined throughout its original range, in the Colorado, Green, Yampa, White, and Little Colorado Rivers, and it has disappeared in some areas due to impoundments, water diversions, and the introduction of exotic fishes. This fish was adapted to the turbulent waters, the temperatures, and the food sources of the Colorado River and its tributaries. The massive dams built along the river changed all that, and a number of fish declined precipitously. The Colorado River Fish Recovery Team and other groups are working to bring native species back to stretches of river between the dams.
Habitat Swift channels of large, turbid rivers.
Range Colorado River system, SW. Wyoming to Mexico. Currently found in Green River drainage, Utah, and Mojave Reservoir, Arizona-Nevada border. | 0.65 | high | 4 | 318 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.4
} |
bb9a8134-59e6-42da-9661-847d13720709 | American businessman, philanthropist author | technology | problem_set | American businessman, philanthropist and author, William “Bill” Gates co-founded Microsoft in 1975 with his friend, Paul Allen. From the onset, Gates’ dream was to lead the company to a technology revolution, making the dreams of every family to own a personal computer come true.
Birth of Microsoft
Gates, then aged 20 and Allen, 22, began to market a basic programming language, originally called “Micro-Soft”. This led to the foundation of Microsoft, the largest PC software company in the world today. It’s part of everyday life for millions of people – most of the world’s computers run a Windows-based operating system. However, in the mid-1970s, personal computers as we know them today didn’t exist. They were large and cumbersome, looking more like a gaming console with a keyboard attached.
Gates decided to design a new operating system and through a stroke of genius struck up a deal with IBM to charge a license fee for its use, rather than selling it outright to the computer giant – meaning that every computer that IBM sold would run a Microsoft operating system. This had a huge effect on consumers, as computing at last became affordable for the masses.
Windows was first launched in 1985 but the early version, Windows 1.0, was nothing like the interface we use today. A decade later, the launch of Windows 95 set a new benchmark. Launched on 24th August 1995, it began the revolution that shaped the world of technology as we know it today.
It introduced features such as the start menu and taskbar, with the software taking massive leaps forward in terms of graphic design. Home computers became more affordable and consumers began to realise their potential. Windows 95 was followed by Internet Explorer, the first web browser for many consumers, who were now able to search for information and catch up online with friends all over the world.
Computer sales boomed – the Office for National Statistics stated one-quarter of British households had a computer in 1995 and this had doubled by 2001.
An updated version with new features, Windows XP was launched in 2001 but with one constant trend – usability. Microsoft Office has become one of the most widely-used software packages in the world and includes most of the programs needed to complete work throughout the day.
Gates has also supported many philanthropic endeavours, having donated a vast amount of money to charitable organisations and scientific research programs. He established the Bill and Melinda Gates Foundation with his wife in 2000. In 2007, they donated more than $28 billion to charities, making them America’s second-most generous philanthropists.
Gates has personally donated money to educational institutions, including $20 million in 1999 to Massachusetts Institute of Technology for a new computer laboratory, the William H Gates Building.
Despite being the world’s richest man, as noted in Forbes’s annual list of billionaires, even a great entrepreneur needs advice sometimes, particularly about search engine optimisation (SEO). In 2010, Gates’ blog was lower in Google rankings than fake Bill Gates blogs that had sprung up online.
An article in the Guardian newspaper gave Gates free advice, such as changing the blog’s title from The Gates Notes to one that exploited the fact it was the only official Bill Gates blog. Every page on Gates’ website had the same title, even though they were about different topics, which was also criticised for reducing people’s chances of locating the information being put out.
Gates was also advised to make use of incoming links, such as the Bill and Melinda Gates Foundation home page, which didn’t contain a link to his blog. The article suggested Gates’ team should be more clued up about SEO in order to maximise the blog’s success.
Not everyone can achieve the top spot but harnessing the powers of SEO to make a website easier to find when people search for it should be a priority – not only for Bill Gates but also for millions of other users. | 0.6 | medium | 4 | 862 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [
"science",
"social_studies",
"arts_and_creativity"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.45,
"creativity": 0.4
} |
dbca7f09-9f3e-4836-9c1d-3a13fb3796ba | boy 1980s James Wexler | science | research_summary | As a boy in the 1980s James Wexler, an engineer in Boston, spent his summers covered in furious, itchy welts. Every July his parents sent him to Camp Becket in the Berkshires, a boys-in-the-woods kind of place with musty cabins and no electricity. Despite applying thick coats of DEET-based Off! repellent, Wexler always returned from his month in western Massachusetts with dozens of mosquito bites and what felt like a pint less blood.
"Other kids could go without repellent and the mosquitoes wouldn't touch them," says Wexler, now 27. "I think they just like me more."
Many share Wexler's frustration at the inadequate protection afforded by insect repellents, including DEET, which is generally regarded as the best that science currently has to offer. Improving on its performance might hinge in part on understanding what lies behind the truth of his observation: not everyone attracts mosquitoes equally.
DEET: The One to Beat
DEET (chemical compounds more formally known as both N,N-diethyl-meta-toluamide and N,N-diethyl-3-methylbenzamide)—first developed by the U.S. Department of Agriculture (USDA) in 1946 and patented for use in jungle warfare by the U.S. Army—does keep bugs from biting. One study published in The New England Journal of Medicine in July 2002 found that a 23.8 percent DEET solution deterred caged mosquitoes from biting the arms of human volunteers for 302 minutes on average, compared with 20 minutes for the old standard, citronella.
Similarly, 2005 comparisons by the Australian consumer group CHOICE found that formulations of DEET and another synthetic repellent called picaridin both outperformed and outlasted citronella and other natural compounds.
Yet even the best repellents do not work well for everyone. Why not?
First, insects respond to certain attractants: lactic acid on the skin produced by muscular activity, exhaled carbon dioxide, high body temperature, moisture and even skin color (they prefer darker shades). Your diet, exercise, environment and skin pH all influence how tasty you seem to pests—and how hard repellents must work to keep them away.
Second, in addition to mosquitoes, the army of biting insects includes diverse battalions: ticks, blood-feeding mites, deerflies, horseflies, blackflies, biting midges, fleas and lice, to name just a few. DEET dispels mosquitoes but only protects somewhat against biting mites and ticks, and not at all against horseflies, deerflies or biting midges.
Precisely how DEET works is still unclear, despite decades of study. The most longstanding theory has been that DEET jams mosquitoes' ability to smell lactic acid, in effect leaving them blind to the presence of nearby sources of blood. But a 2008 study in the Proceedings of the National Academy of Sciences by Zainulabeuddin Syed and Walter Leal of the University of California, Davis, suggested that something about DEET might instead actively repel mosquitoes.
Even if DEET were 100 percent effective in chasing away mosquitoes, however, its toxicity would still be a drawback. DEET is generally safe, notes Emily Zielinski-Gutierrez, a behavioral scientist at the U.S. Centers for Disease Control, but it can sometimes cause rashes or irritation, or even seizures and death if ingested. So "anything you can do to limit a child's exposure is good," says Dave Stone, director of the National Pesticide Information Center.
DEET-based repellents should therefore not be treated like sunscreen that can be lathered on generously and frequently. With all pesticides you should avoid covering the hands or face. If a DEET formula claims to protect for eight hours, don't apply it every two hours just because you go swimming or to "bolster your defenses".
Developing Safer Alternatives
For all those reasons, scientists are looking for safer, more enduring, more effective alternatives to DEET. At North Carolina State University in Raleigh, for example, entomologist Michael Roe is developing a compound based on a chemical called 2-undecanone, found in tomato plants, that rivals DEET in efficacy and has so far shown no negative health risks.
Other researchers have used computer models to identify at least 24 synthetic chemical compounds that should repel insects; Ulrich Bernier, a research chemist at the USDA's Mosquito and Fly Research Unit, has tested them all. Twenty performed as long—or as much as three times as long—as DEET in tests on cloth, although their safety has not been established. Tests with caged mosquitoes and treated human arms are up next, along with a battery of studies to determine safety, efficacy on various insects and other variables.
Notwithstanding progress in developing newer, better insect repellents, however, one further complication may always leave some people less satisfied with them. Because the swelling and itching around a bite is essentially an allergic reaction to a mosquito's saliva, one person may show many more welts than another in response to the same number of bites. For mosquito bait like Wexler, staying indoors may always be the best solution. | 0.65 | medium | 5 | 1,103 | [
"introductory science",
"algebra"
] | [
"research methodology"
] | [
"technology",
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.45,
"creativity": 0.4
} |
2d2219b3-6745-4551-a871-8bb11d4e9af8 | Marijuana Medicine: Science Beyond | interdisciplinary | research_summary | Marijuana As Medicine: the Science Beyond the Controversy by MackMarijuana As Medicine: the Science Beyond the Controversy by Mack
Marijuana As Medicine: the Science Beyond the Controversy
byMackEditorMack
Paperback
Pricing and Purchase Info
$23.95
Earn 120 plum® points
Out of stock online
Not available in stores
about
Based on a study from The Institute of Medicine, this text provides patients and their caregivers a foundation for making decisions about their health care. Presents extracted critical findings from the IOM on this issue and interprets them for a general audience. Softcover.
Title:Marijuana As Medicine: the Science Beyond the ControversyFormat:PaperbackDimensions:8.75 × 6.35 × 0.68 inPublisher:National Academy Press
The following ISBNs are associated with this title:
ISBN - 10:0309065313
ISBN - 13:9780309065313
Reviews | 0.65 | high | 6 | 246 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.4
} |
0e0d8003-4916-462c-8b85-d5fb2ecc6afb | fructose—a component table sugar | interdisciplinary | research_summary | The fructose—a component of table sugar and high-fructose corn syrup—in added sugars triggers your liver to store fat more efficiently, and in weird places. Over time, a diet high in fructose could lead to globules of fat building up around your liver, a precursor to nonalcoholic fatty liver disease, something rarely seen before 1980.
Sugar Smart Tip: Avoid drinks with lots of added sugars, including healthy-sounding smoothies. You’re better off if the fructose in your diet comes from natural sources like fruit—the fiber helps blunt the sugar shock to your system. Plus, a piece of fruit has way less sugar than a commercial smoothie full of added sugars (some of them contain 54 grams, or about 13½ teaspoons worth of sugar!).
A study found that for every extra 150 calories from sugar available per person each day, diabetes prevalence rises by 1.1%.
Sugar Smart Tip: It’s easy to recommend giving up sugar-sweetened beverages like soda, but the truth is that those drinks account for just one-third of your added sugar intake. You have to look further, really honing in on labels. Much of the hidden sugars hide out under your own roof, in unassuming places like ketchup, frozen dinners, beef jerky, and bread.
You might expect sugar-curbing recommendations from the American Diabetes Association, thanks to sugar’s clear impact on the disease. But the reality is that heart disease and diabetes are intricately related: Heart disease and stroke are the number one causes of death among people with type 2 diabetes, accounting for 65% of those deaths.
Sugar Smart Tip: Don’t exceed the American Heart Association’s recommended sugar levels, which are 5 teaspoons for women (20 grams); 9 teaspoons for men (36 grams); and 3 teaspoons (12 grams) for children. For reference, a can of soda generally contains up to 12 grams of sugar; a single slice of whole wheat bread contains up to 2 teaspoons of added sugars.
Added sugars cause excess insulin in the bloodstream, which takes its toll on your body’s circulatory highway system, your arteries. Chronic high insulin levels cause the smooth muscle cells around each blood vessel to grow faster than normal. This causes tense artery walls, something that puts you on the path to high blood pressure, and ultimately, makes a stroke or heart attack more likely.
Sugar Smart Tip: Don’t be tricked by processed “whole grain” products. To create whole grain flour, wheat kernels are basically pulverized to dust, which, when eaten, causes glucose spikes in our bodies similar to eating table sugar, white flour, or high-fructose corn syrup. “For instance, the kind of whole wheat bread typically used for sandwiches and white bread are digested at about the same rate and cause about the same rise in blood glucose levels, and therefore require the same amount of insulin to clear the bloodstream of glucose,” The Sugar Smart Diet author Anne Alexander writes.
There is an unsettling connection between sugar and cholesterol. A study in the Journal of the American Medical Association found that, after excluding people with high cholesterol and/or diabetes and people who were highly overweight, those who ate the highest levels of added sugars experienced the biggest spike in bad cholesterol levels and dangerous triglyceride blood fats, and the lowest good (HDL) cholesterol levels. One theory? Sugar overload could spark your liver to churn out more bad cholesterol while also inhibiting your body’s ability to clear it out.
Sugar Smart Tip: Eat a protein-rich breakfast. Skipping breakfast makes you 4.5 times more likely to become obese. Eating breakfast also helps keep your blood sugar levels more favorable. An added perk? One study found that when overweight women chose protein-rich eggs over a bagel, they naturally ate about 160 fewer calories during the subsequent lunch.
Brown University neuropathologist Suzanne de la Monte, MD, coined the term “type 3 diabetes” after her team was the first to discover the links between insulin resistance, high-fat diets, and Alzheimer’s disease. In fact, her work suggests Alzheimer’s is a metabolic disease, one in which the brain’s ability to use glucose and produce energy is damaged. To paraphrase, it’s like having diabetes in the brain.
Sugar Smart Tip: Know sugar’s many names. Check labels; ingredients that end in –ose are sugar, and so is anything with sugar or syrup after the name. Don’t overindulge in sugary, fatty foods—that seems to be what sets off Alzheimer’s-like symptoms in rat studies.
Much like street drugs, sugar triggers the release of chemicals that set off the brain’s pleasure center, in this case opioids and dopamine. And as they do with street drugs, people develop a tolerance for sugar, meaning they need more sugar for a feel-good “fix.” In rat studies looking at sugar addiction, when animals binge on the sweet stuff, they experience chattering teeth, tremors, shakes, and anxiety when it’s taken away.
Sugar Smart Tip: Prevention advisor Andrew Weil, MD, urges people to be patient as they embark on a diet that cuts added sugars. He says it usually takes about a week for the taste buds to habituate to a lower overall level of sweetness in the diet. After that, foods you used to love may seem sickeningly sweet.
Sugar. Makes. You. Feel. Famished. Emerging research suggests regularly eating too much sugar scrambles your body’s ability to tell your brain you’re full. Carrying a few extra pounds and living with type 2 diabetes can throw off your body’s ability to properly put off leptin hormones; leptin’s job is to say, “I’m full! Now stop eating!” Fructose also appears to play badly with leptin; eating a high-fructose diet means your body feels hungry, even when you’re overeating.
Sugar Smart Tip: Instead of reaching for a standard chocolate bar, opt for a bit of organic chocolate with at least 70% cacao. When you feel a sugar craving coming on, walk for 15 minutes. Researchers found a 15-minute walk can curb cravings for a sugar-laden chocolate bar by 12%. Whatever you do, don’t just sit there—that will actually increase your sugar cravings. (Try these
You know the feeling. You grab a chocolate candy bar, and with it, get that brief jolt of energy. Soon to be replaced by unrelenting fatigue. Science shows it takes just 30 minutes or less to go from a sugar rush to a full-on sugar crash. This sugar spike-and-crash sets you up to want more sugar—a vicious cycle. To add insult to injury, The Sugar Smart Diet points out that sugar also triggers the release of serotonin, a sleep regulator. So much for an energy bump!
We might reach for sugar to feel better, but we’re getting the opposite effect in the end. A study published in Public Health Journal followed nearly 9,000 people to study the link between depression and eating sugary sweets and fast food. After six years, those who ate the most junk faced a nearly 40% greater risk of developing depression, compared to those who shunned junk food the most. In people with insulin resistance, it appears the brain releases lower levels of feel-good dopamine.
Sugar Smart Tip:
- If you’re an ice-cream addict, today and tomorrow, eat one serving and then give away or throw away the carton. Then, instead of keeping a stocked-up freezer at home, make it a point to drive out to a local ice cream shop to get it. After that, put in place stricter guidelines, like you can only do this on Fridays and Saturdays.
- If you’re a sucker for soda or juice, try this: Sip the full-sugar variety today, but in a smaller bottle or can. Tomorrow or the day after, swap every other serving with ice water or seltzer water with a twist of lime.
- If you’re a dessert lover: Have your regular dessert today, but tomorrow opt for a fruit-based dessert like a baked apple or poached pear. The day after, step down to raw fruit, splurging on the varieties you like most, say, mangoes, berries, or purple or red grapes.
Sugar in your bloodstream attaches to proteins to form harmful new molecules called advanced glycation end products, or AGEs. These unwanted invaders attack nearby proteins, damaging them, including protein fibers in collagen and elastin, the components that keep your skin firm and elastic. The result of too much sugar? Dry, brittle protein fibers that lead to wrinkles and saggy skin.
There’s more! AGEs promote the growth of fragile collagen and deactivate your body’s natural antioxidant enzymes. This opens the door to more sun damage, which, as we all know, also damages and ages your skin. | 0.7 | medium | 4 | 1,890 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"technology",
"life_skills"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.65,
"creativity": 0.35
} |
cd25cf1e-d6c1-4cbf-9eb2-b6e1e9b12593 | **Shared Pattern**: fundamental principle | interdisciplinary | worked_examples | **Shared Pattern**: The fundamental principle connecting electrical circuits and Kirchhoff's Laws is the **conservation of some quantity**. In electrical circuits, this quantity is **electric charge**. Kirchhoff's laws are essentially mathematical statements derived from this fundamental conservation principle, applied to the flow of charge within a circuit. **The Surprising Connection**: The surprise lies in how a seemingly simple physical constraint – the inability of charge to spontaneously appear or disappear – translates into powerful, predictive mathematical rules that govern the complex behavior of electrical networks. It's not immediately obvious that the microscopic behavior of individual electrons (their movement and accumulation) dictates the macroscopic voltage drops and current flows we observe and utilize. Kirchhoff's laws are the bridge that allows us to move from the fundamental conservation of charge to the analysis of complex circuits, revealing that the rules of charge flow are as fundamental and universal as the rules of energy or mass conservation. **Illustrative Example**: Let's consider a simple electrical circuit with two resistors ($R_1$ and $R_2$) connected in series to a voltage source ($V_s$). We want to find the current flowing through the circuit and the voltage drop across each resistor. * **Circuit Description**: A voltage source ($V_s = 12$ Volts) is connected to a resistor $R_1 = 4$ Ohms, followed by a resistor $R_2 = 2$ Ohms, forming a closed loop. * **Applying Kirchhoff's Laws**: 1. **Kirchhoff's Current Law (KCL) at a Junction**: In this simple series circuit, there's only one "junction" where wires meet in a way that current can split or combine. However, in a series circuit, the current is the *same* everywhere. KCL states that the sum of currents entering a junction equals the sum of currents leaving it. If we consider any point in the series loop, the current entering that point must equal the current leaving it, as charge cannot accumulate or vanish. Let $I$ be the current flowing through the circuit. At any point in the loop, $I_{in} = I_{out} = I$. This law, while trivial in this specific case, is the bedrock for analyzing more complex circuits with multiple branches. 2. **Kirchhoff's Voltage Law (KVL) around a Loop**: KVL states that the algebraic sum of all the voltage drops around any closed loop in a circuit must be zero. This is a direct consequence of the conservation of energy for a charge moving around a closed path. The total energy gained by a charge from the voltage source must be dissipated or stored within the circuit elements. * Let's traverse the loop clockwise, starting from the negative terminal of the voltage source. * We gain voltage from the source: $+V_s$. * We encounter a voltage drop across $R_1$: $-I \cdot R_1$ (Ohm's Law, $V=IR$). The negative sign indicates a voltage drop in the direction of current flow. * We encounter a voltage drop across $R_2$: $-I \cdot R_2$. * KVL equation: $V_s - I \cdot R_1 - I \cdot R_2 = 0$. * **Solving for Current**: * Rearranging the KVL equation: $V_s = I \cdot R_1 + I \cdot R_2$ * Factoring out $I$: $V_s = I (R_1 + R_2)$ * Solving for $I$: $I = \frac{V_s}{R_1 + R_2}$ * Substituting values: $I = \frac{12 \text{ V}}{4 \text{ Ohms} + 2 \text{ Ohms}} = \frac{12 \text{ V}}{6 \text{ Ohms}} = 2 \text{ Amperes}$. * **Calculating Voltage Drops**: * Voltage drop across $R_1$: $V_{R1} = I \cdot R_1 = 2 \text{ A} \cdot 4 \text{ Ohms} = 8 \text{ Volts}$. * Voltage drop across $R_2$: $V_{R2} = I \cdot R_2 = 2 \text{ A} \cdot 2 \text{ Ohms} = 4 \text{ Volts}$. * **Verification using KVL**: $V_s - V_{R1} - V_{R2} = 12 \text{ V} - 8 \text{ V} - 4 \text{ V} = 0$. The loop sum is zero, confirming our calculations and the validity of KVL. **Reciprocal Learning**: * **Mastering Electrical Circuits Facilitates Understanding Kirchhoff's Laws**: A deep understanding of how electrical circuits function – the flow of charge, the concept of voltage as electric potential difference, and resistance as opposition to flow – provides the physical intuition behind Kirchhoff's laws. When you visualize charge carriers moving, you can more readily grasp why charge must be conserved at junctions (KCL) and why energy must be conserved around a loop (KVL). The behavior of components like resistors, capacitors, and inductors makes more sense when viewed through the lens of these conservation principles. * **Mastering Kirchhoff's Laws Facilitates Understanding Electrical Circuits**: Conversely, a firm grasp of Kirchhoff's laws provides the analytical tools to dissect and predict the behavior of *any* electrical circuit, no matter how complex. By applying KCL and KVL systematically, one can set up a system of equations to solve for unknown currents and voltages. This systematic approach allows for the analysis of circuits that are not immediately intuitive, transforming the understanding of circuits from a qualitative "feel" to a quantitative, predictable science. **Mathematical Foundation**: * **Kirchhoff's Current Law (KCL)**: For any node (junction) $k$ in a circuit, the sum of currents entering the node equals the sum of currents leaving the node. Mathematically: $$ \sum_{i=1}^{n} I_{in, i} = \sum_{j=1}^{m} I_{out, j} $$ Or, if we define currents entering as positive and leaving as negative: $$ \sum_{k=1}^{N} I_k = 0 $$ This is a direct manifestation of the conservation of charge: $\frac{dQ}{dt} = 0$ at any point in the circuit. * **Kirchhoff's Voltage Law (KVL)**: For any closed loop in a circuit, the algebraic sum of the voltage rises and drops around the loop is zero. Mathematically: $$ \sum_{i=1}^{n} V_i = 0 $$ This is a consequence of the conservation of energy. The work done by electric fields on a charge moving around a closed loop is zero. For resistive circuits, this is often combined with Ohm's Law ($V=IR$): $$ \sum_{i=1}^{n} I_i R_i = \sum_{j=1}^{m} V_{source, j} $$ (Sum of voltage drops equals sum of voltage rises). **Universal Application and Implications**: The pattern of conservation laws governing flow and interaction is a fundamental theme that resonates across numerous scientific disciplines. * **Fluid Dynamics**: Conservation of mass dictates that in a closed system, the total mass remains constant. This principle is analogous to KCL. In fluid flow, at junctions, the rate of fluid entering must equal the rate of fluid leaving. Conservation of energy (Bernoulli's principle) is analogous to KVL, describing how pressure, velocity, and height changes balance out in a flowing fluid. * **Thermodynamics**: The First Law of Thermodynamics is the conservation of energy. In any process, energy is neither created nor destroyed, only transformed. This is directly analogous to KVL, where energy from the voltage source is transformed into heat dissipated by resistors. * **Mechanics**: Conservation of linear momentum states that the total momentum of a system remains constant in the absence of external forces. This is akin to KCL for momentum. Conservation of angular momentum applies to rotating systems. * **Ecology**: In an ecosystem, the total biomass or energy within a trophic level is conserved, with transfers occurring between levels. While not as precisely mathematical as Kirchhoff's laws, the principle of conservation is evident in population dynamics and energy flow. * **Everyday Life**: Even simple actions like balancing a budget involve a form of conservation. The total money spent and saved must equal the total income received. If you're tracking money in different accounts, the principle of KCL applies: money entering one account must have come from somewhere else, and money leaving an account must go somewhere. The profound implication of this connection is that the rules governing the flow of electricity are not arbitrary but are deeply rooted in fundamental physical principles that also govern the behavior of matter, energy, and momentum in vastly different contexts. Mastering these conservation principles in one domain provides a powerful conceptual framework for understanding them in others, highlighting the interconnectedness of all knowledge. | 0.65 | medium | 8 | 1,944 | [
"advanced knowledge"
] | [
"cutting-edge work"
] | [
"mathematics",
"science",
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.55,
"creativity": 0.4
} |
1a964819-f684-4a59-a789-f5b8b1f7966c | Columbia, SC--Richland County educators | interdisciplinary | tutorial | Columbia, SC--Richland County educators are invited to borrow the Enviroscape watershed model for classroom and youth group presentations. The model may be borrowed for a one-week period, and the borrower is responsible for the model's pickup and return.
The Enviroscape is a three-dimensional watershed model that allows students to visualize how water and pollutants travel through the landscape. The model depicts stormwater runoff and can be used to illustrate various types of water pollution and the effects of human activity on the environment. Enviroscape landscape features include a farm, factory, golf course, parking lot, roads, residential areas, and more. Visit the Enviroscape website for more details about the model, or watch this YouTube video for a tutorial.
The Enviroscape comes in a portable suitcase with the landscape model, cocoa and koolaid powder "pollutants," spray bottles, figurines for cars, trees, houses, livestock, and more. A user guide and laminated cards describing sources of water pollution are also included.
Contact the Richland SWCD at RichlandSWCD@gmail.com for more information. Request the model by filling out this form. Evaluate this educational equipment rental using this form.
# # #
Conservation Districts are political subdivisions of state government under the local direction of five-member Boards of Commissioners. In South Carolina, Conservation District boundaries conform to County boundaries. The Richland Soil and Water Conservation District promotes the wise use of natural resources for the benefit of the citizens of Richland County.
Richland Soil and Water Conservation District
2020 Hampton Street, Room 3063A
Columbia, SC 29204
Phone (803) 576-2080
Fax (803) 576-2088 | 0.7 | high | 4 | 383 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.35,
"creativity": 0.4
} |
91d35939-e337-4c0b-b84f-ba8013e6505e | Sustaining healthy lifestyle often | interdisciplinary | historical_context | Sustaining a healthy lifestyle is often a challenging feat. Since most convenience
foods seem to typify the antonym of health, extra effort is required to strategically map
out nutritionally-rich preparations that integrate well within a busy lifestyle; to the
health enthusiast this is part and parcel of the daily health regimen. Yet everyone knows
that seeking out the most nutritionally-dense "superfoods" aids in simplifying
the quest towards optimum health. It alleviates some of the strain involved in trying to
consume considerable amounts of salubrious nourishment often not readily available
on-the-go. One such "superfood" is the chia seed which packs a punch so strong
that it is virtually unmatched in its nutritious profile.
Chia, or salvia hispanica L, literally means "strength" in Mayan and can be traced back over 3,000 years to Central America where the Aztecs utilized it as one of their primary plant sources of food, notably their third most important crop next to corn and beans. Chia was considered more valuable than gold and was often used to pay taxes and tribute to the Aztec nobility.
When the Aztec civilization fell during the Spanish conquest, the Spanish banned chia and many other crops due to their close association with the religious systems of these ancient cultures and replaced the native crops with foreign ones such as wheat and carrots. Remnants of both the Aztec and Mayan civilizations remained in portions of Mexico where small people groups continued using the seeds for making flour, oil, and drinks from the gel that forms when the seeds are mixed with liquid.
Though essentially obfuscated throughout many generations, chia would eventually reemerge as a popular superfood identified as being rich in omega-3 fatty acids, protein, antioxidants, and dietary fiber.
One of the primary benefits of chia seeds is their high concentration of essential fatty acids (EFAs), which are up to four times the concentration of other grains. EFAs are important for the respiration of vital organs, yet the human body is unable to manufacture them itself; they must be obtained through diet.
Chia is also touted as having the highest omega-3 content of any plant-based source, containing 64 percent alpha linolenic acid (ALA). Flax, another popular source of ALA, contains 55 percent. The omega-3 to omega-6 ratio is also highly auspicious in chia, representing a healthy balance of 3:2.
Chia is high in complete protein, containing about 23 percent protein per seed. All essential amino acids are present and appropriately balanced within the protein, making it complete and nutritious in and of itself. Packed with essential vitamins and trace minerals, chia is a phenomenal whole food for any diet. They also behave wonderfully when ground and used in gluten-free recipes.
A great antioxidant source, chia provides high levels of chlorogenic acid, caffeic acid, and flavanol glycosides. These are all strong polyphenols that maintain proper function of bodily organs and tissues and that protect against cancer and cardiovascular disease through the removal of damaging free radicals.
High in fiber, chia is known for its easy digestibility. Its layer is a strong source of mucillois soluble fiber which aids in maintaining healthy digestion and assimilation of nutrients. Absorbing more than seven times its weight when placed in water, chia seeds form a gel that, when eaten, produces a physical barrier between carbohydrates and digestive enzymes in the stomach. This process effectively slows the rate at which carbohydrates are converted into blood sugar, rendering chia a great addition to a diabetic diet.
Similarly, chia consumption contributes to maintaining balanced hydration and electrolyte levels within the body, steadying water intake, assimilation, and absorption.
Chia seeds have an amazingly long shelf life when stored in their natural, dry state. Unlike flax seeds which have a highly impenetrable outer shell, requiring them to be ground into a meal that can turn rancid rather quickly, chia seeds can be stored and eaten just as they are for their full benefits.
All in all, chia seeds are a wonderful, whole superfood that is great for a variety of creative uses. Since they have no flavor of their own and actually perpetuate the flavors of the foods with which they are combined, the uses for chia are limitless. Additionally, chia seeds offer a great protein alternative to soy-based products that contain harmful plant estrogens that can severely alter hormonal balance in both men and women.
As chia continues to gain popularity in the West, it is sure to continue attracting the attention of the medical community and consumers alike who are recognizing it as more than just a seed for growing potter animals. Quickly becoming a staple among the health-conscious, chia is gaining the spotlight as arguably the most diverse superfood available. (Natural News, 9.16.2009) http://www.naturalnews.com/027035_chia_seeds_health.html
Chia: The Natural Answer for Omega-3. Vitamin Retailer. Sept. 2009: 54.
Salvia hispanica - Reference.com
Seeds of Wellness: Return of a Supergrain - Saturday Evening Post, The
Chia Seeds: The Complete Protein Solution for Vegetarian Men | 0.65 | medium | 6 | 1,085 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.55,
"creativity": 0.45
} |
495b8079-42b1-41e3-86ec-592e1d4a7a3f | last post scales, demonstrated | arts_and_creativity | worked_examples | In my last post on scales, I demonstrated how we can use scales as a vehicle to isolate and improve the fundamental cello technique of bow control at increasingly slower speeds. Today, I will show how we can use the familiar exercise of scale-playing to improve a fundamental technique of musicianship, and an essential professional skill--counting.
To be honest, a lot of string players, even advanced ones, have a weakness when it comes to rhythm and counting. Brass, woodwind, and percussion players often have much stronger rhythmic and counting chops than string players--probably because the pedagogical repertoire for those instruments tends to be more rhythmically complicated than that for strings. Changing time signatures, irregular time signatures, complicated rhythms, cross-rhythms? They learn them all, whereas it's an exceptional pre-college string player who can confidently tap three against five, for example, or sightread with ease in the time signature of 11/8.
It's seldom too soon, and never too late, to do something about this. The two exercises below are a way to kill two birds with one stone by incorporating numerical and cross-rhythm counting into everyday fundamentals practice.
Let's start by playing some scales using slurred bowings. Now, most of us can easily play through a scale using slurs of two, three, or four. But it may surprise you to know that when it comes to slurs, most people can't count to five.
That's OK, of course. There are two easy ways to make sure your five-note slur comes out with the correct number of notes in it: think of it as "One, two, one, two, three" OR "One, two, three, one, two." In the tempo of your choice, play the following, concentrating on really counting to five, and keeping all five notes of the slur even. Resist the temptation to place accents on any note.
Slurring six notes to a bow will be easier, since we can count "One, two, three, one, two, three" or "One, two, one, two, one, two" without much trouble. But when it comes to slurring seven notes to a bow, there are three possibilities for counting that we'll find in musical compositions: 2+2+3 OR 3+2+2, or, more rarely, 2+3+2. Slurring seven is actually pretty easy because when you start on do, a seven-note slur encompasses all the pitches of the diatonic scale. That ought to help if you have trouble with the counting.
- Eight-note slurs: easy! 4+4.
- Nine notes: the easiest way is 3+3+3, or you could try 3+2+4.
- Ten notes: adopt whichever way is easiest from five-note slurs, and do it twice!
- Eleven notes: 3+3+3+2, or 3+2+3+3 or another combination of 3s and 2s.
- Twelve notes: 3+3+3+3 or 4+4+4.
Go on through 13, 14, 15 and so on, figuring out how you're going to count them. As you advance through repeated practice, you can go up to 20-note slurs or higher.
Now it's time to have some real fun with this. Pull out one of the cellist's best friends: the metronome. Set it to a slow tempo of 40 bpm to the half note/minim. We're going to play a slow scale in slurs of two half notes/minims per bow to internalize the tempo. And now...we're going to do a scale of three-note slurs against the two-beat pulse of the metronome. This can be tricky for first-time players. The trick is to internalize the overall rhythmic pattern created. When you divide 3 by 2, you get 1.5. Here are two different ways of writing down this pattern:
It's not hard to tap these rhythms on a desk or on your leg if you remember that three must be divided perfectly in half: "One, two AND three." Or you can use a mnemonic such as "Nice cup of tea," which a British percussionist friend taught me many years ago.
Let's apply this to the scale. Keep the metronome on 40, and chant "One, two AND three" or "Nice cup of tea" as you play, if necessary. Avoid tapping your feet, however--it's distracting and doesn't help you keep better time.
With the metronome still on, play a scale slurring four against the metronome's two. (This is much easier--2+2.) Now let's do five against two. This is not hard if you just remember that 5 divided by 2 is 2.5, so the broad pattern will be "One, two, three AND four five."
In the staff, it looks like this.
A good daily cross-rhythm workout could look like this: metronome on 40 to the half note/minim, play scales in slurs of 2, 3, 4, 5, 6, 7, and 8. Of course, that's not the only way to practise cross-rhythms. Why not put the metronome in 3/4 time and play 2-note slurs against it? Next, play "four against three" and "three against four," using the handy mnemonic "Pass the bread and butter."
Once you get good at this stuff, it's really geeky and fun. The possibilities are endless. For more advanced fun, try 3 against 5 and 5 against 3. I like to use the mnemonic "I like to hug teddy bears."
In other words... | 0.65 | medium | 3 | 1,267 | [
"foundational knowledge"
] | [
"advanced concepts"
] | [
"science",
"life_skills"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.45,
"creativity": 0.3
} |
86cd9013-ae2d-4833-aef6-0d9e2868b680 | **Problem**: city council considering | social_studies | historical_context | **Problem**: A city council is considering a proposal to build a new, large-scale shopping mall in a historically low-income, predominantly Black neighborhood. Residents express concerns about potential gentrification, displacement, and the impact on existing small businesses. The council needs to assess the likely social psychological impacts of this development on the community. **Common Pitfalls**: * **Pitfall 1: Focusing solely on economic benefits.** * **Why it's wrong**: This approach is flawed because it ignores the significant social and psychological dimensions of urban development. While economic growth is important, solely prioritizing it can lead to overlooking the human cost of displacement, the erosion of social capital, and the psychological stress experienced by residents facing these changes. Urban sociology, and specifically its psychological focus, emphasizes that communities are not just economic units but complex social systems with deeply embedded social relationships and identities. * **Pitfall 2: Assuming all residents will benefit equally or react uniformly.** * **Why it's wrong**: This is a flawed assumption because it fails to account for the heterogeneity within any community. Different groups within the neighborhood (e.g., long-term homeowners, renters, small business owners, different age groups, different socioeconomic strata) will experience the impacts of the mall differently. A psychological lens reveals that individual experiences are shaped by factors like perceived control, social support networks, attachment to place, and prior experiences with urban change. A uniform approach ignores these crucial psychological variations. **Correct Method**: * **Step 1: Identify the relevant social-psychological theories of urban change.** * **Because**: To understand the *impact* on the community, we need theoretical frameworks that explain how urban environments and changes within them affect individual and group psychology. Relevant theories include: * **Social Identity Theory (Tajfel & Turner)**: How does the neighborhood's identity, often tied to its history and cultural fabric, interact with the influx of a new, potentially dominant culture associated with the mall? Will it strengthen or weaken group cohesion? * **Attachment Theory (Bowlby, applied to place)**: How attached are residents to their current homes and neighborhood? What are the psychological consequences of perceived threats to this attachment? * **Sense of Place Theory**: How does the physical and social environment contribute to a feeling of belonging and identity? How might the mall alter this sense of place? * **Theory of Planned Behavior (Ajzen)**: How might residents' attitudes, subjective norms (what they perceive others think), and perceived behavioral control influence their responses to the development? * **Gentrification and Displacement Literature**: Drawing on sociological studies of gentrification, what psychological stressors are commonly associated with displacement, such as loss of social networks, increased commuting, and feelings of alienation? * **Step 2: Analyze potential impacts through the lens of these theories, considering differential effects.** * **Because**: We must move beyond generalities and predict specific psychological outcomes for different segments of the population. This involves: * **Assessing potential displacement**: For renters, the risk of rent increases and eviction is higher. This can lead to anxiety, loss of social support (as neighbors move away), and a diminished sense of security. For homeowners, while less likely to be displaced, they might experience increased property taxes or feel alienated by changes to their neighborhood's character. * **Examining impact on social networks**: The mall might draw people away from local gathering spots, weakening existing informal social ties. This can lead to increased loneliness and a reduced sense of community support, which are critical for psychological well-being. * **Investigating changes to sense of place and identity**: If the mall introduces a vastly different aesthetic or commercial culture, long-term residents might feel their neighborhood's identity is being erased. This can lead to feelings of marginalization, resentment, and a loss of pride. * **Considering the impact on small businesses**: Owners and employees of existing businesses face economic insecurity, stress, and potential loss of their livelihood and social connections tied to their work. * **Evaluating psychological resources**: How resilient is the community? Are there existing strong social capital networks that can buffer negative impacts? Do residents feel they have agency or control over these changes? * **Step 3: Propose mitigation strategies informed by the psychological analysis.** * **Because**: Understanding the psychological mechanisms of impact allows for targeted interventions. For example: * **Community engagement**: Facilitate participatory planning processes where residents have a genuine voice. This can increase perceived control and reduce anxiety. * **Support for small businesses**: Offer resources for adaptation, marketing, or relocation assistance to mitigate economic and psychological stress. * **Preservation of community spaces**: Identify and protect existing social hubs or create new ones that foster community interaction. * **Affordable housing policies**: Implement measures to protect renters and ensure housing affordability, directly addressing a major source of psychological distress. * **Cultural preservation initiatives**: Support local arts, history, and cultural events to reinforce a positive sense of place and identity. **Verification**: The "answer" here isn't a single numerical result but a comprehensive assessment of potential psychological impacts and their mitigation. Verification involves: 1. **Peer Review of Theoretical Application**: Have experts in urban sociology and social psychology review the chosen theories and their application to the specific problem. Do the chosen theories accurately capture the dynamics at play? 2. **Empirical Grounding**: Cross-reference the predicted impacts with existing sociological and psychological research on similar urban development projects in comparable communities. Are the identified stressors and coping mechanisms consistent with documented patterns? 3. **Community Consultation Feedback**: Present the assessment and proposed mitigation strategies to community members. Do they resonate with residents' lived experiences and concerns? Are the proposed solutions perceived as feasible and helpful? This feedback loop is crucial for validating the psychological analysis. 4. **Scenario Testing**: For each predicted impact, consider alternative outcomes and how they might be triggered or avoided. For instance, if displacement is a major concern, what specific policy levers (e.g., rent control, inclusionary zoning) would most effectively mitigate the psychological distress associated with it? **Generalizable Pattern**: 1. **Problem Identification**: Define a specific urban issue with social and psychological dimensions. 2. **Theoretical Framing**: Select relevant social-psychological theories that explain human behavior and well-being within urban contexts and in response to change. 3. **Contextual Analysis**: Apply these theories to the specific context, considering the unique characteristics of the place and its inhabitants. 4. **Impact Assessment (Differentiated)**: Predict potential psychological impacts, explicitly analyzing how different groups within the community might experience these changes differently. 5. **Intervention Design**: Develop targeted strategies to mitigate negative impacts and enhance positive ones, directly addressing the psychological mechanisms identified. 6. **Validation and Refinement**: Seek feedback from stakeholders and empirical data to verify the assessment and refine interventions. **Broader Application**: This reasoning process can be applied to a wide range of urban sociology problems with a psychological focus, such as: * **Assessing the psychological impact of public transportation changes** (e.g., new subway lines, bus route alterations) on different user groups, considering factors like perceived accessibility, safety, and social connection. * **Evaluating the psychological effects of urban green space development** on residents' well-being, stress levels, and sense of community, considering issues of equitable access and gentrification. * **Understanding the psychological drivers behind community resistance or acceptance of new urban developments** (e.g., affordable housing projects, industrial facilities), by analyzing residents' social identities, perceived risks, and sense of agency. * **Analyzing the psychological consequences of increasing surveillance technologies in public urban spaces** on feelings of freedom, trust, and social interaction. In essence, this pattern encourages a deep, theory-driven, and context-sensitive understanding of how urban environments shape human minds and emotions, moving beyond simplistic economic or demographic analyses. It emphasizes the importance of considering *lived experience* and *subjective reality* in urban planning and policy-making. | 0.65 | medium | 6 | 1,642 | [
"intermediate understanding"
] | [
"research"
] | [
"technology",
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.65,
"creativity": 0.35
} |
d3940df1-e484-4e43-968e-92ce92e63336 | Honors English 3-2 | science | ethical_analysis | Honors English 3-2
In America assisted suicide is a very controversial topic, one of the most controversial is physician assisted suicide or P.A.S, this involves a physician providing a patient at his or her own request with a legal dose of medication, which the patient self-administers(Scoccia 32). In other forms of assisted suicide the patient himself performs the last death- causing act, for example the physician might connect the patient to a machine that dispenses a lethal injection, and the patient is the one who pushes the button to release the fatal fluid into the body. In addition moral shock appeals are not unknown to the P.A.S movement. Those who oppose any measures permitting assisted suicide argue that it’s our moral duty to preserve all life; they also argue that allowing people to assist others in destroying their life’s would violate our fundamental duty to respect human life. They also argue that helping a patient maintain control and end suffering is an ethical act. People have many freedoms, and the right to die should be no different than the right to vote, freedom of speech and any other right.
Supporters of Assisted suicide have an even stronger point; they claim that all people have a moral right to choose freely what they will do with their lives as long as they inflict no harm on others. People should also have the right to make their own decisions about ending their own life in the same way they can choose or refuse other types of medical therapies. Too many this is not a wrong or right situation, because we have the right to vote, freedom of speech and the right to bear arms, why shouldn’t we have the right to die (Scoccia 33). Autonomy, which is the principle that shows and describes the rights of the people who make their own decisions, is perhaps the strongest argument in favor of Assisted Suicide. . Why shouldn’t society allow assisted suicide, it doesn't hurt anybody else, just imagine yourself in a position where you didn't want to be of this world anymore, and your decision was final. According to supporters keeping a person that is suffering is very inhumane (Scoccia 34).
Physician assisted suicide is legal in only a few places. U.S Supreme Court ruled that a ban on P.A.S was not unconstitutional, so this left the door open for laws permitting this practice (Scoccia 33). People in legalization who are supporters are responding to the fear of being in terrible pain and agony, of being hooked up to life-support equipment, and of becoming a financial or emotional drain on their families (Erek 51). They fear becoming dependent on others or having a very poor quality of life. Many doctors or physicians that support this issue argue that it should be allowed to those who are terminally ill, but shouldn’t be allowed to those that are healthy (Soccia 33).
There are many forms of assisted suicide and another not as controversial as P.A.S, is Continuous sedation or known as C.S. This is where at the end of life a physician uses sedatives to reduce or take away the consciousness of a patient until death would then follow (Scoccia 32). This is a medication that terminates or brings a patient to a slow but painless death. One that is very similar is Euthanasia which is described as the administration of drugs with the explicit intention of ending a patient’s life at the patient’s explicit request (Erek 50). Continuous sedation may have the upper hand over P.A.S in that it might be less susceptible to abuse, and the doctor in the white coat, adds social sanction top the act of intentionally ending someone’s life (Scoccia 36). According to the code of ethics, containing C.S, they state that applying C.S at the end of life should be a last resort and should be only for dying patients with a very short life expectancy (Scoccoa 34). Many people that argue think that assisted suicide is inhumane, but it seems too many fairly clear that there is… | 0.6 | medium | 3 | 859 | [
"basic science",
"measurement"
] | [
"experimental design"
] | [
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
2808b5f5-9ae0-4107-ab1e-6dc98bae777e | Background of Cystic Fibrosis Consortium | interdisciplinary | data_analysis | Background of Cystic Fibrosis Consortium
In 1989, following discovery of the CFTR gene, a consortium of genetic researchers was formed in order to catalogue the large, and growing, number of disease-causing mutations. The purpose of the Consortium was to increase and facilitate communications among CF researchers who were working on mutant identification in the CFTR gene.
The Consortium was important for several obvious reasons. The first was to avoid unnecessary overlapping effort and to speed up the screening process; it was in everybody's interest to have a format for reporting data and confirming observations. Second, accurate population figures could be derived quickly once a mutation was identified. Further, the information was seen as not only important for carrier testing, but also for understanding the function of the CF gene product, and for facilitating studies to correlate clinical symptoms and mutations.
The Consortium quickly grew to 130 groups of CF laboratories (from over 30 countries). But the goal of understanding the functional and clinical implications of hundreds of mutations, many extremely rare, became insurmountable. With the link to the new CFTR2 project in 2010, progress toward this goal will be enhanced by the compilation of clinical data from CF patient registries around the world. The information in the Cystic Fibrosis Mutation Database should be used with great discretion in clinical settings and in the interpretation of genotype-phenotype correlation. | 0.65 | high | 6 | 284 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.45,
"creativity": 0.45
} |
3a198429-655c-4de0-b8bb-c0106b758e85 | you ever watched Senate | interdisciplinary | technical_documentation | Have you ever watched the Senate during a very close vote? If so, you may have seen the vice president sitting or standing at the presiding officer's desk on the Senate Floor. Other than to succeed to the presidency upon the death or resignation of a president, a vice president's only constitutional duty is to preside over the Senate. Vice presidents cannot vote in the Senate, except to break a tie, nor may they formally address the Senate, except with the senators' permission. Initially vice presidents appointed senators to standing committees, regulated access to the galleries and supervised the keeping of the Senate Journal, but these duties were later removed.
During the twentieth and twenty-first centuries the vice president's role has evolved into more of an executive branch position, and is usually seen as an integral part of a president's administration. He presides over the Senate only on ceremonial occasions or when a tie-breaking vote may be needed.
When the vice president is absent, the president pro tempore presides over the Senate. Junior senators fill in as presiding officer when neither the vice president nor president pro tempore is on the Senate Floor.
To learn more about the vice president, president pro tempore, and other Senate leaders and officers visit the Virtual Reference Desk. | 0.6 | medium | 4 | 256 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
0b1785a0-26d8-4b40-8a99-ab4b50b8e5a4 | leo-hair-groom levelling digital playing | interdisciplinary | creative_writing | leo-hair-groom
On levelling the digital playing field
The Berlin-based 3D artist Harriet Davey reflects on the brand-creator paradigm and why digital futures are only as expansive as the teams making them
“My favourite bit in many games has been the character creator, but it’s also kind of a frustrating place to be in, because there were times when I couldn’t make them how I wanted them to look,” recalls Harriet Davey. “Then I would end up just being really frustrated at the femme options, and I always ended up just playing the man because they would always have better choices.”
Customisation options have improved since Davey, who uses she/they pronouns, was first playing these games, but the impact on their creative outlook was lasting. “I think there’s a lot stemming from not being able to see myself in them and then now building things myself,” they tell us.
Top: One of Harriet Davey’s mythical 3D avatars; Above: Davey’s 3D alter ego, Whowle; All images courtesy Harriet Davey
You may have come across Davey’s glossy, mythical, semi-human avatars by now – including their own alter-ego, Whowle – via social media, Twitch streams, or in their growing catalogue of collaborations with the likes of Maison Margiela, Y-3, Adult Swim and Weekday, the latter involving a capsule collection emblazoned with their ethereal creations.
3D VISUALISER
LONDON | 0.6 | medium | 6 | 345 | [
"intermediate understanding"
] | [
"research"
] | [] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.4
} |
7e106744-bd1d-4373-ac51-286821fa342c | This is a great request | technology | data_analysis | This is a great request! Let's build some educational web content about morpheme analysis for language communication, keeping it at a beginner-friendly complexity level. --- ## Understanding Morpheme Analysis: The Building Blocks of Words Welcome to this interactive guide on **morpheme analysis**! In language communication, words aren't just random strings of letters. They are often built from smaller, meaningful units called **morphemes**. Understanding how to break down words into their constituent morphemes can significantly improve your vocabulary, spelling, and comprehension. ### What is a Morpheme? A morpheme is the smallest unit of meaning in a language. It cannot be divided into smaller meaningful parts. * **Free Morphemes:** These can stand alone as words (e.g., "cat," "run," "happy"). * **Bound Morphemes:** These cannot stand alone and must be attached to another morpheme to form a word (e.g., prefixes like "un-", suffixes like "-ing", "-ed"). ### Why is Morpheme Analysis Important? * **Vocabulary Expansion:** By recognizing common prefixes and suffixes, you can often understand the meaning of new words. * **Improved Spelling:** Knowing how suffixes are added can help prevent spelling errors. * **Deeper Comprehension:** Understanding the root word and its affixes provides a richer understanding of a word's meaning and nuance. --- ### Let's Get Interactive! Try analyzing a few words yourself. We'll provide a word, and you can try to identify its morphemes. --- ### The Code Behind the Magic Let's see how this page is built! #### 1. HTML Structure (index.html) We'll use semantic HTML elements to give our content structure and meaning. ```html <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Morpheme Analysis Explained</title> <link rel="stylesheet" href="style.css"> </head> <body> <header> <h1>Morpheme Analysis: The Building Blocks of Words</h1> <p>Unlock the power of word structure in language communication.</p> </header> <main> <section class="explanation"> <h2>What is a Morpheme?</h2> <p>A morpheme is the smallest unit of meaning in a language. It cannot be divided into smaller meaningful parts.</p> <h3>Types of Morphemes:</h3> <ul> <li><strong>Free Morphemes:</strong> These can stand alone as words (e.g., "cat," "run," "happy").</li> <li><strong>Bound Morphemes:</strong> These cannot stand alone and must be attached to another morpheme to form a word (e.g., prefixes like "un-", suffixes like "-ing", "-ed").</li> </ul> </section> <section class="importance"> <h2>Why is Morpheme Analysis Important?</h2> <ul> <li><strong>Vocabulary Expansion:</strong> By recognizing common prefixes and suffixes, you can often understand the meaning of new words.</li> <li><strong>Improved Spelling:</strong> Knowing how suffixes are added can help prevent spelling errors.</li> <li><strong>Deeper Comprehension:</strong> Understanding the root word and its affixes provides a richer understanding of a word's meaning and nuance.</li> </ul> </section> <section class="interactive-section"> <h2>Let's Get Interactive!</h2> <p>Try analyzing a few words yourself. We'll provide a word, and you can try to identify its morphemes.</p> <div class="word-analyzer"> <label for="wordInput">Enter a word:</label> <input type="text" id="wordInput" aria-label="Enter a word to analyze"> <button id="analyzeButton">Analyze</button> <div id="result" role="status" aria-live="polite"></div> </div> </section> </main> <footer> <p>© 2023 Language Learning Hub. All rights reserved.</p> </footer> </body> </html> ``` **Explanation of HTML:** * `<!DOCTYPE html>`: Declares the document type and version of HTML. * `<html lang="en">`: The root element, specifying the language as English. * `<head>`: Contains meta-information about the HTML document, like character set, viewport settings, and the link to our CSS file. * `<meta charset="UTF-8">`: Ensures proper character encoding for a wide range of characters. * `<meta name="viewport" ...>`: Crucial for responsive design, telling the browser to set the width of the page to the device's width and scale it appropriately. * `<title>`: Sets the title that appears in the browser tab. * `<link rel="stylesheet" href="style.css">`: Links our HTML to the external CSS file for styling. * `<body>`: Contains the visible content of the web page. * `<header>`: Represents introductory content, typically containing headings and introductory text. * `<main>`: Encloses the dominant content of the `<body>`. It should only appear once per page. * `<section>`: Divides the content into logical sections. We use classes like `explanation`, `importance`, and `interactive-section` for styling and organization. * `<h2>`, `<h3>`, `<ul>`, `<li>`, `<p>`: Standard semantic elements for headings, lists, and paragraphs, making the content understandable to browsers and assistive technologies. * `<div class="word-analyzer">`: A container for our interactive element. * `<label for="wordInput">`: An accessibility feature. Linking a label to an input field (using `for` and `id`) allows screen readers to announce the purpose of the input and enables users to click the label to focus the input. * `<input type="text" id="wordInput" aria-label="...">`: The text field where users will enter words. `aria-label` provides an accessible name for the input. * `<button id="analyzeButton">`: The button to trigger the analysis. * `<div id="result" role="status" aria-live="polite">`: This `div` will display the analysis results. `role="status"` and `aria-live="polite"` are important accessibility attributes. They tell screen readers to announce changes in this area without interrupting the user's current task. * `<footer>`: Represents the footer of the document, often containing copyright information. #### 2. CSS Styling (style.css) We'll use modern CSS practices for layout, typography, and responsiveness. ```css /* --- General Styles --- */ :root { --primary-color: #007bff; --secondary-color: #6c757d; --light-gray: #f8f9fa; --dark-gray: #343a40; --white: #ffffff; --font-family-sans-serif: 'Segoe UI', Tahoma, Geneva, Verdana, sans-serif; --font-family-serif: Georgia, 'Times New Roman', Times, serif; } body { font-family: var(--font-family-sans-serif); line-height: 1.6; color: var(--dark-gray); background-color: var(--light-gray); margin: 0; padding: 0; } .container { /* A common pattern for centering content and limiting width */ max-width: 960px; margin: 20px auto; padding: 0 20px; } header { background-color: var(--primary-color); color: var(--white); padding: 40px 0; text-align: center; margin-bottom: 30px; box-shadow: 0 2px 5px rgba(0, 0, 0, 0.1); } header h1 { margin-bottom: 10px; font-size: 2.5em; font-family: var(--font-family-serif); } header p { font-size: 1.1em; opacity: 0.9; } main { padding: 0 20px; /* Add padding to main content for smaller screens */ } section { background-color: var(--white); padding: 30px; margin-bottom: 30px; border-radius: 8px; box-shadow: 0 2px 10px rgba(0, 0, 0, 0.08); } h2 { color: var(--primary-color); margin-bottom: 15px; font-size: 1.8em; font-family: var(--font-family-serif); } h3 { color: var(--secondary-color); margin-top: 20px; margin-bottom: 10px; font-size: 1.4em; } ul { padding-left: 20px; } li { margin-bottom: 10px; } strong { color: var(--primary-color); } /* --- Interactive Section Styles --- */ .interactive-section h2 { text-align: center; } .word-analyzer { display: flex; flex-wrap: wrap; /* Allows items to wrap to the next line on smaller screens */ gap: 15px; /* Space between flex items */ justify-content: center; align-items: center; margin-top: 20px; } .word-analyzer label { font-weight: bold; margin-right: 5px; } .word-analyzer input[type="text"] { padding: 10px 15px; border: 1px solid #ccc; border-radius: 4px; font-size: 1em; flex-grow: 1; /* Allows input to take available space */ min-width: 150px; /* Ensures input doesn't get too small */ } .word-analyzer button { background-color: var(--primary-color); color: var(--white); border: none; padding: 10px 20px; border-radius: 4px; font-size: 1em; cursor: pointer; transition: background-color 0.3s ease; } .word-analyzer button:hover { background-color: #0056b3; /* Darker shade on hover */ } #result { width: 100%; /* Make result take full width */ text-align: center; margin-top: 20px; font-size: 1.1em; font-weight: bold; color: var(--secondary-color); min-height: 30px; /* Ensure space for results */ } /* --- Footer Styles --- */ footer { text-align: center; padding: 30px 0; margin-top: 40px; background-color: var(--dark-gray); color: var(--light-gray); font-size: 0.9em; } /* --- Responsive Design --- */ @media (max-width: 768px) { header h1 { font-size: 2em; } section { padding: 20px; } .word-analyzer { flex-direction: column; /* Stack items vertically on small screens */ align-items: stretch; /* Stretch items to fill width */ } .word-analyzer input[type="text"], .word-analyzer button { width: 100%; /* Make input and button full width */ box-sizing: border-box; /* Include padding and border in the element's total width and height */ } .word-analyzer label { margin-right: 0; margin-bottom: 5px; display: block; /* Make label a block element */ } } @media (max-width: 480px) { header h1 { font-size: 1.7em; } body { font-size: 15px; } section { padding: 15px; } } ``` **Explanation of CSS:** * `:root`: Defines CSS custom properties (variables). This makes it easy to manage colors and fonts globally. * `body`: Sets a base font, line height, text color, and background for the entire page. `margin: 0; padding: 0;` resets default browser margins. * `.container`: A utility class (though not explicitly used in the HTML above, it's a common pattern) to center content and limit its maximum width. * `header`: Styles the header with a background color, text color, padding, and center alignment. `box-shadow` adds a subtle depth. * `section`: Styles each content block with a white background, padding, rounded corners, and a soft shadow. * `h2`, `h3`: Styles headings with specific colors and margins for visual hierarchy. * `strong`: Makes important terms stand out with the primary color. * `.interactive-section`: Styles the area for our interactive component. * `.word-analyzer`: * `display: flex;`: Enables Flexbox for layout. * `flex-wrap: wrap;`: Allows items to move to the next line if they don't fit horizontally. * `gap: 15px;`: Adds spacing between flex items. * `justify-content: center;`: Centers the flex items horizontally. * `align-items: center;`: Vertically aligns items in the center. * `.word-analyzer input[type="text"]`: Styles the input field. `flex-grow: 1;` allows it to expand and take up available space. `min-width` prevents it from becoming too small. * `.word-analyzer button`: Styles the button with a primary color, padding, and a pointer cursor. `transition` makes the hover effect smooth. * `#result`: Styles the area where analysis results will appear, ensuring it takes full width and has some basic styling. `aria-live="polite"` is crucial for screen readers. * `footer`: Styles the footer with dark background, light text, and centered content. * **Responsive Design (`@media` queries):** * `@media (max-width: 768px)`: Styles applied when the screen width is 768px or less. This is a common breakpoint for tablets and smaller desktops. * `flex-direction: column;`: Stacks the flex items (label, input, button) vertically. * `align-items: stretch;`: Makes the input and button take the full width. * `width: 100%; box-sizing: border-box;`: Ensures elements occupy the full available width. * `@media (max-width: 480px)`: Styles for even smaller screens (smartphones). Adjusts font sizes for better readability. #### 3. JavaScript Functionality (script.js) This script will handle the basic morpheme analysis. For a complexity level of 4/10, we'll keep it simple. ```javascript // Wait for the DOM to be fully loaded before running the script document.addEventListener('DOMContentLoaded', () => { // Get references to the HTML elements we need const wordInput = document.getElementById('wordInput'); const analyzeButton = document.getElementById('analyzeButton'); const resultDiv = document.getElementById('result'); // Define a simple dictionary of common morphemes and their meanings/types // This is a very basic example. Real morpheme analysis is much more complex! const morphemeDictionary = { // Prefixes 'un': 'prefix (not)', 're': 'prefix (again)', 'pre': 'prefix (before)', 'dis': 'prefix (opposite of)', 'mis': 'prefix (wrongly)', // Suffixes 'ing': 'suffix (present participle/gerund)', 'ed': 'suffix (past tense)', 'er': 'suffix (comparative/one who does)', 'est': 'suffix (superlative)', 'ly': 'suffix (adverbial)', 'ness': 'suffix (state of being)', 'able': 'suffix (capable of)', 'ible': 'suffix (capable of)', // Common Roots (very simplified) 'act': 'root (do)', 'port': 'root (carry)', 'dict': 'root (say)', 'vis': 'root (see)', 'spect': ' | 0.65 | medium | 6 | 3,739 | [
"algorithms",
"software design"
] | [
"distributed systems"
] | [
"language_arts"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.65,
"creativity": 0.35
} |
0476c549-e741-4147-bb03-e0223d63ca74 | Creating images: changes real | interdisciplinary | historical_context | Creating images: changes in real and virtual imaginary of Hrodna through the 20th – beginning of the 21st century
Even with eyes protected by the green spectacles, Dorothy and her friends were at first dazzled by the brilliancy of the wonderful City. (L. Frank Baum, The Wonderful Wizard of Oz)
Changes in the outside world result in and result from our imaginary world. One can invest a lot in building edifices, the other can make a picture of a new reality and create it in such a way. I’d like to analyze changes made in a Belarusian city Hrodna throughout 20th-21st centuries, paying attention to its architectural form and textual or imaginary description.
Various political powers made great efforts to reshape the city, and each of them had its own methods how to do it. I’ll try to compare their actions, dividing the time interval into 4 periods: 1) 1918-1939 – Hrodna in the Polish state, 2) 1944-1987 – Soviet period, 3) 1987-1994 – Perestroyka and Independent Belarus, 4) 1995-nowadays – the latest history.
The following aspects will be analyzed: 1) in “real sphere”: topographical structure of the city (changing of disposition of streets and squares), architecture of the city (the main dominants, their appearance), monuments, 2) in “virtual sphere”: city icons (the main objects that represent the city in guidebooks and albums), architectural dominants (other frequent architectural representations), verbal images and characteristics of the city, 3) relations between “real” and “virtual” images.
Material chosen to analyze imaginary of Hrodna is guidebooks and photo-albums made by Hrodna authors as it is the most representative instrument of creation of stereotypes for city-dwellers and tourists and it usually reflects an “official” image of the city.
1. Polish city – restoration and historical research
The interwar period was a time of state and national determination for the lands of Eastern Europe. After attempts of organizing the Independent Belarusian State the territory of Belarus was divided into two parts and belonged to two different states: Poland (the II Republic of Poland) and BSSR. Hrodna found itself in Poland. The newly organized Polish state worked on forming its identity and ideology. Proclaiming restoration of Res Publica Polonia – Polish Lithuanian Commonwealth – it engaged in study of history (of country and localities) and reconstruction of urban elements that would emphasize history of Res Publica.
During this period the first archeological excavations were made in Hrodna, there were prepared projects of reconstruction of the Old Castle (Palace of Stephan Batory), the first books of Hrodna history appeared (researches made by J. Jodkowski), the Museum of local lore was established.
Topographically there were no large-scale changes in the city space. Elements of Russian intrusion were thoroughly abolished. In place of an Orthodox church built within an architectural complex of Haradnica in 1860-s, the monument of Freedom (a bald eagle – symbol of Poland) was erected. The parochial church in the city square (Fara Vitauta), which was originally Catholic, but rebuilt in 19th century as an Orthodox (with typical “onion” cupola), was redesigned as Catholic in Neo-gothic style. Though Orthodox churches were also restored. The oldest Kalozha church (12th c.) that was half wrecked by the river in 1853 was provisionally rebuilt in 1934-1939 (the first restoration was in 1889-1911). Remains of another medieval Orthodox church founded in excavations in Old Castle yard were surrounded by protective constructions.
The first guide and popular historical books were edited in the interwar period1. The city is called there “advanced in age” (J.Jodkowski, 1923, p. ), “one of the oldest city in the North-East of Poland” (Grodno i okolice, 1934, p. 3), “the capital of an knighthood” (Ibidem, p. 4), “center of a region”, “of a province” (Ibidem, p. 4), “the favorite place of residence of great dukes of Lithuania, and later of kings of Polish-Lithuanian Commonwealth” (Ibidem, p. 5), “a place where parliaments were hold” (Ibidem, p. 5). So its antiquity and political position in Res Publica Polonia were emphasized.
These guidebooks present mainly historical places of the city, they say broadly about their meanings, present photos of some of them. The first photos of Grodno i okolice are panorama of Hrodna (with Jesuits’ and Minorites’ (Bernardines’) churches, Old and New Castles, a watch-tower as dominants), and a palace of Stephan Batory. Grodno, made by pupils of gymnasium, starts with Kalozha church photo. On other pictures in the books there are churches in the city square, the wooden lamus of 17th c., the monument to E. Orzeszko, Kalozha church, the Old Castle, Jesuits’ church, palace of A. Tyzenhaus, house of E. Orzeszko, J. Pilsudski on the Old Castle yard, Synagogues. Grodno, written by J. Jodkowski (1923), contains pictures of panoramic view (3), catholic churches and cloisters (11), Kalozha church (4), Royal Castles (4), synagogue (1), buildings and palaces (3), persons (2), a city seal (1).
So, the guidebooks present old sacred and secular buildings, panoramic views of the city. The dominant representations are the churches in the city square, the Castles, Kalozha church. They represent political meaning of the city, its multicultural character, emphasize its old history.
We can say that the icon of Hrodna in that period was Kalozha church or the Old Castle. They were used the most often as representation of Hrodna. Kalozha church was a symbol of antiquity of the city, its uniqueness; the Old Castle represented residential and parliament functions of Hrodna, said about its greatness (unlike it, the New Castle would be a sign of abolishment of Res Publica Polonia, so this building is not chosen as a represantation of the city).
2. Soviet city
Being rebuilt after the II World War Hrodna was formed in a convention of a modern Soviet city with developed industry and social service.
In this period the area and population of the city grows extremely. In the prewar period the population of Hrodna averaged 49.000, after the War it was less than half of it, in 1959 it amounted 72.900, in 1970 – 132.500, in 1979 – 195.000. The area has increased several times. New modern industrial and residential districts appear. But I’d like to focus on the central part of the city – its historical core – to see the way how it was developed.
The most important in organizing the urban space was to create a city square, which would conform to the new political situation. The old market square was rebuilt in 1950-60-s: it was enlarged because the City hall, palace of Radziwills, and some houses were destructed during the War and not rebuilt afterwards; the Parochial church was detonated in 1961. “Palace of culture” of textile-workers was built in the Western part of the square in 1958, a classicistic building with huge staircase in front of it, appropriate for organizing a place for presidium in parades. Hotel “Neman” was built in the Eastern part in 1961. (This square was also used as a parade square before, but buildings of the churches served as focus points. That’s why the Parochial church was rebuilt after every change of regime, until it was not destroyed completely as it was mentioned). Dimensions of the Soviet square decreased optically the Jesuits church (an absolute dominant before), transforming it into one of a series of buildings of the square along with the Palace of culture.
At the same time another square is being organized in Hrodna. As early as 1949 Lenin monument was erected in the other side of Sovetskaya street and the Lenin square was originated. (Historically this part of the city never pretended to be a center, though at the end of 18th century a new modern district Haradnica was established here, and the palace of A. Tyzenhaus, contemporary city head, formed an architectural ensemble and was used as a cultural center for the city. Architectural complex of palaces and schools was used as framing for the newly organized square). In 1970-s the new square was enlarged, in 1987 it “was modernized, planned for holding manifestation and other mass festivals, it became an administrative and public center of the city”2. Indeed, the area of the Lenin square was enlarged a few times after 1970-s. City and oblast halls became the only dominants here. A new monument to Lenin marked the new center of Hrodna (Now the zero kilometer stone stands in the Lenin square).
Another way of inculcation of Soviet symbols was making monuments and memorial tablets. Actually, in the pre-Soviet Hrodna there were only monuments inside Churches (to Stanislaw August Poniatowski, Stephan Batory, Antony Tyzenhauz, portraits of benefactors, tablets to people buried in churches), monuments on cemeteries, allegorical or heraldic figures in front of palaces. The first “city monuments” were placed in the interwar period, and they were the Monument to Freedom (mentioned above) and a monument to Eliza Orzeszko (which was transported to cemetery during the II World War). The Soviet period starts to use actively this form of commemoration. Monuments to different figures of the Revolution, revolutionary struggling of 19th c., heroes of the II World War appeared year after year in all the kind of public spaces.
The city and its history… This history is in the names of its streets and avenues, boulevards and squares, in the numerous monuments and obelisks and memorial tombstones and plaques, in the sacred earth of the Mound of Glory3.
It should be noted that monuments were placed in all the important places of the old city if those were destroyed. For example, in the place of old Palace of Tyzenhauz, destroyed in the I World War, a monument to the Unknown Warrior was put and common grave was organized, in the place of the former Dominican Church a monument to marshal Sokolovsky. So that former significant places obtained a new semantic meaning.
These were the most important changes in the material sphere of the city in the Soviet period, I believe. Of course, sacral buildings or palaces destroyed during the war were not rebuilt. But physically historical Hrodna remained a city of narrow streets and 19th century buildings. There were organized only 2 modern squares in the center of the city, and there were built some new buildings in place of the destroyed ones. The most influential activity was rearranging the city sphere in the minds of people, and erection of monuments was a part of its process.
Building a totally new Hrodna in virtual reality is well seen in the albums, guidebooks, postcards of that period4.
A “kings’ town”, “parliament’s town” changes into a “new town” (Hrodna, 1975), “young industrial city”, “modern industrialized and cultural center” (Grodnienskaya oblast, 1976), that has an “industrial appearance” (Ibidem). Though, it is mentioned that the city is old and modern at one time (“ancient town, new town” (Ibidem)), but it is renewed over and over, and its youthfulness became the most determinant characteristic of Hrodna.
These changes in character of the city had to become apparent in its look.
Not long ago a person that approaches the city would see cupola of orthodox and catholic churches dominating over the city panorama, but nowadays works of today’s generations are brought to the forefront. A TV-tower, high-rise residential and administrative buildings, factories and plants create appearance of Hrodna… 5
What are the mental dominants of city’s area? Which places of Hrodna are the most frequent in albums? Texts and photos of the albums present first of all Lenin square, Sovetskaya street. Most images contain broad streets, high-rise buildings, and factories. As a part of historical aspect of old Hrodna Kalozha can appear or Pakrousky Cathedral (built in 1906-1910). There are no mentionings of the Royal Castles in the city; catholic churches are very rare in books. Very interesting is the way how catholic churches are presented in text. “Pryniamonnie – kray rodny”, edited in 1976 by city’s authorities, lists the Castle hill, the Lower church, Kalozha church, and “catholic churches in baroque style – one, that is situated in Paris commune str. (erected in 1595), another in K.Marx str. (1647) etc. There are also some interesting buildings of later epochs” (1976).
Album of Kaluta (Hrodna, 1975) names in the introduction the following buildings: Kalozha church (twice), the Old Castle, “building of Russian drama theatre” (Tyzenhauz theatre) (twice), the memorial estate of E. Orzeszko, a prison, a house were revolutionary committee met, a house, where Dzierzynski stayed for one night, the “Azot” factory.
Events that constitute the history of Hrodna are the following, according to the same album: Mongols and Tatars invasion, crusaders invasion, war with the Swedes (18th c.), war with Napoleon, and then a lot of events connected with the Revolution and the II World war.
The names listed in the article are: Peter the Great, Denis Davydoff, Kastus Kalinousky, Uladzimir Urubleusky, and revolutionary and II World War heroes.
This list of events, names, buildings is common for all the guidebooks of the period (it remains the same even till the end of 1980-s). These events are of the most importance for history of Moscovia and Russia. The name of K. Kalinousky, a leader of anti-Russian rebellion, appears as a follower of Gertzen, Chernyshevsky, Dobroliubov; U. Urubleusky as a friend of Marx and Engels. There are no mentions of places, buildings, events, and persons important for history of the city itself or connected with the history of Great Duchy of Lithuania, Polish-Lithuanian Commonwealth, Independent Belarus (except K. Kalinousky and U. Urubleusky, sometimes also E. Orzeszko appears). Hrodna is depicted as a common Soviet city.
Even an album edited in 1987 (I.I. Kovkel) says nothing about kings that lived in Hrodna and parliaments hold in the city.
Such selection of buildings and historical persons and events had to serve to creation of the Soviet Russian identity of the city. All the other items are just passed over in silence.
Pictures presented in albums also show Hrodna as a modern industrial Soviet city. There are a lot of photos of new streets and high-rise buildings. In large part life of people, not architecture or history is shown in albums: smiling faces of men and women, representatives of different professions at workplaces, children in school uniforms, sportsmen and people of science.
These tendency is common for albums of Soviet cities. Moscow6 is presented as a “big political and industrial centre”, a “city-hero”, “city-creator”, “city-new-settler”, that “grows younger and prettier”7. There is a special album, dedicated to its inhabitants with plenty of emphatic or thoughtful faces and expressive figures of young and old Moscowers8. The portrayal of people as representations of a city is important for humanistic orientated Soviet guidebooks and it provides them with supplementary value.
Unsacralization of space was also a significant task for Soviet ideology-makers. A typical modern unsanctified Soviet city is the capital of BSSR Minsk9. The examined albums of Minsk make only one mention of a church – one found in archeological excavations. Though there were exceptions to this rule in city-guides: Vilnius, Kyiv, Pskov, Moscow can be presented as “white-stone” or “gold-domical”10.
In the absolute majority of Hrodna albums distinguishing local landscapes rare serve as a background. Buildings of churches can appear in an image, but they would be out of focus or there would be only small unrecognizable part of a building (gate before Kalozha church on a background of trees, stones of the Old Castle wall) and a caption wouldn’t mention names of historical buildings.
The only exception of such presentation of Hrodna is the oldest Soviet album of Hrodna compiled by Alaksiey Karpiuk, a famous Belarusian writer that lived in Hrodna11. The album was printed in 1966 in Minsk. Photos of Hrodna churches and Castles are presented as well as photos of factories and portraits here, and captions specify presented buildings and tell about the old history of the city, as well as about the modern one. A. Karpiuk uses verses of Danuta Bichel-Zahnetava for description of the city, very patriotic Belarusian lyrics. So, this album is an example of independet original work with high performance level of texts and photos included.
Frequency of presentation of architectural objects in the photos:
The icon of Hrodna has also changed. In 1983 a new drama theatre was built on the place of the former Minorites’ (Bernardinki’s) cloister. An outstanding example of modern architecture, the theater building was used to create a new symbol of Hrodna.
So, mostly, the Soviet Hrodna guidebooks present an absolutely new understanding of character, history, appearance of the city, which has nothing in common with the previous epoch.
3. Time of Independence
Late 1980-s and 1990-s became a new period for the history of the city. As a part of the new Independent Belarusian state Hrodna had to reinterpret itself. Belarusian identity is built upon history of medieval knighthoods, Great Duchy of Lithuania, Res Publica Polonia, and Independent Belarus. Hrodna once again became a city of royal residence and place of parliaments of Poland, of residence of Belarusian government in 1920.
New scientific researches upon history of the city were made using data given by Polish historian of the beginning of the century. There were made new excavations in the Old Castle, Kalozha church. A restoration committee prepared plans for reconstruction of the city square and rebuilding of the Parochial Vitoldian church. The New Castle was given to the Ministry of Culture and the Historical and Archeological museum removed there. Church buildings were returned to believers and they became opened for visitors. So, all these “lacking” places appeared again in the city space.
The topography of the city hasn’t been changed much due to political changes.
The new government also used erections of monuments as a method of building identity. Memorials to leaders and activists of Independent Belarus (of 1920-s) appeared throughout the city. Place of Hebrew ghetto was marked in the city space. Sites of destroyed churches were drawn on the street surface. Some of the old monuments were destroyed, but mostly new Belarusian and old Soviet monuments stay concurrently in the city space.
But the main changes occurred in the mental mapping of the city. New albums and guidebooks presented Hrodna as an “antique”, “old” city12. All the architectural monuments, sacred and profane, appeared once again in the city text. Lithuanian (understood as GDL) and Belarusian character of the city was emphasized. It became again a city of narrow streets and great history. Icons of Hrodna became the Old Castle as a residence of Great duke Vitaut together with Kalozha Church. Saint Kazimierz, patron of GDL, became one of the symbols of the city (Kaziuki fair was reestablished as a city fest). Hrodna is positioned as “a spiritual and cultural capital of the Grand Lithuanian Duchy or Rzeczpospolita”13.
Pictures in albums present first of all churches and castles, old streets of Hrodna. Old pictures of the city are reedited (for example, they are a part of Гродна, Мн, 2003 album together with modern photos). Unfortunately, modern districts and portraits of inhabitants almost completely disappear from albums, so that they represent only city centre from its “revised”, proper point of view. Data cited in the table above demonstrate changes in imaginary of the city. This new representative mode remains actual for the modern situation.
During the last years no changes in virtual mapping of Hrodna were made. The convention of writing guidebooks and making photos of the city remains the same as in 1990s. But great changes in topography and architecture of the city are being hold. It seems like the time come to realize the ideas declared in guidebooks of 1970-s. The “old”, “antique”, “with narrow streets” Hrodna looks more and more like a “young industrial city”, “modern industrialized and cultural center”, though alterations are made under a slogan of “reconstruction of historical heritage” of the city.
First of all, number and dimensions of streets and squares are being changed. Narrow-street Hrodna is being transformed into a city with broad streets and huge squares. New squares started to appear in the outskirts, and slowly approached to the historical core. A traditional place for a circus tent or provisional merry-go-rounds on Sovietskich pogranichnikov str. was changed into a square before a new-erected monument to Soviet frontier guards14. A monument to Soviet militia was posed before a security services building, and after cutting trees in a nearby park a place before the monument formed a square. Former botanic garden (established in the end of 18th century by E. Gilibert) was “ennobled”, a lot of old trees have been cut, as a result a monument to the Unknown Warrior, which stood in this park on the place of destroyed palace of Tyzenhauz, became a prominent dominant. The whole part of park before the monument from side of a street was denuded of trees. Optically it was united with an architectural ensemble from the other side of the street (it used to constitute common space with palace of Tyzenhauz in the 18th century when it was built), so that the square before the monument can almost come up with the Lenin square nearby. The last point of such squares changes was the reconstruction of the Savetskaya ploshcha made last year. The former city market and public garden on the place of destroyed Radziwills palace was transformed into an arterial road with an elongated huge square. Now Savetskaya ploshcha stretches from the North side of the market square to the Tank-monument on the Paris commune street. Its dimensions have been increased nearly four times. Buildings of churches became once again smaller optically, and the Tank became the new dominant of this square.
Another way of extension of city’s dimensions is broadening of its streets. During the last few years Gorky str., Vilenskaya str., D. Haradzenskaha str. were reorganized and widen. Trees on sides of streets are cut; pavements are diminished; obstructed buildings are destroyed; so that streets became half as much again wider, and nearby buildings smaller.
Empty space and expanses became the most characteristic features of Hrodna.
A price for this modernization was a destruction of valuable historical buildings (built in 19th – beginning of 20th century), such as 5, 12, 15, 21Urytskaha str., 44 Sacyyalistychnaya str., 2 Gorky str. They were a part of historical district of Hrodna protected by law of Belarus. House of 29 Gorky str., an outstanding example of Hrodna constructivism buildings of 1930-s, was destroyed together with other buildings of the beginning of 20th century that formed earlier “Zalataya horka” (“Golden hill”) district for the sake of broadening of Gorky street.
Priority is given to the signs of postwar history of Hrodna, its military merits. New monuments erected or appeared due to topographical changes are mostly connected with war discourse. It is interesting that a monument now can be an architectural dominant outshining old city’s dominants (as the Tank or the Unknown Warrior monument).
No research or excavation works are made during the reconstruction of the city.
So appearance of Hrodna is changing headily and an old Soviet dream of industrial Hrodna is being consequently realized.
Not long ago a person approaching the city would see cupolas of orthodox and catholic churches dominating over the city panorama, but nowadays works of today’s generations are brought to the forefront. A TV-tower, high-rise residential and administrative buildings, factories and plants create appearance of Hrodna…15
1 Grodno i okolice. Jeziora Augustowskie. Suwalszczyzna: Przewodnik turystyczny, Grodno, 1934. Grodno / wyd. Kółko historyczne przy 1-em Społecznym Gimnazjum koedukacyjnym, Grodno, 1934, 97 s. Józef Jodkowski, Grodno, Wilno, 1923, 120 s.: 28 ill. Mieczysław Orłowicz, Przewodnik ilustrowany po wojewodztwie Białostockim: z ilustracjami, planami i mapami, Białystok, 1937, 477 s.
2 Гродно: энциклопедический справочник, Мн, 1989, с. 252.
3 Гродно / тэкст да альбома І.А. Калюты, фота У.І. Мяжэвіча, У.М.Гофмана, В.П.Косціна і інш., Мн., 1975, л. 47.
4 The following guidebooks will be analyzed: Гродна/ аўтар тэксту А. Карпюк, вершы Д.Бічэль-Загнетавай, Мн: Беларусь, 1966, л.: іл.; Гродна, Гродно, Grodno/ тэкст да альбома І.А. Калюты, фота У.І. Мяжэвіча, У.М.Гофмана, В.П.Косціна і інш., Мн.: “Беларусь”, 1975, 47 л.: 39 іл.; Гродненская область, Белорусская ССР / под ред. Л.Г.Клецкова, Е.Е.Емельяновой, А.В. Богуша, Мн.: Беларусь, 1976, 222 с.: илл.; Прынямонне – край родны / тэкст І.С.Граблеўскі, фота А.М.Коласаў, Г.В.Гулеўскі, Мн.: Беларусь, 1981, c.:илл.; Гродно. Grodno / текст И.И.Ковкель, Я.Н.Мараш, художник А. Шуплецов, фото Г.Л. Лихтаровича,Мн.: Полымя, 1987, 95 с.: илл.
5 Гродненская область, Белорусская ССР, Мн., 1976, с. 102.
6 Н. Рахманов. Московские зори, М., 1972, л.: ил.; Москва. Moscow. Moscou. Moskau: фотоальбом / сост. и худ. ред. П. Зубченков. М., (1973), л.: илл.
7 Москва. Moscow. Moscou. Moskau: фотоальбом / сост. и худ. ред. П. Зубченков, p..
8 Москва и москвичи / сост. и автор текста В. Стигнеев, М., 1975, л.: илл.
9 Мінск 1067-1967. Фотааповесць аб 900-годдзі сталіцы Савецкай Беларусі: альбом-выстаўка Саюза журналістаў БССР. / рэд. С. Нортман, вып. 1, Мн, 1967, 77 с.: 85 іл.; Мінск у фотаілюстрацыях / рэд. Кароль У.А., Мн., 1958, л.: іл.
10 B. Orentaitė, Vilnius, Vilnius, 1977, 120 c.: 90 ill.; Ю. Баланенко, Ал. Березин, Москва, М., 1972, 512 с.: илл.; Моя столица моя Москва / под общ. ред. Ю.И. Баланенко, М., 1974, 208 с.: илл.; Wł. A. Serczyk, L. Kmietowicz, Kijów, Kraków, 1986, s.: il.; А.А. Бологов, Псков: путеводитель, Л., 1974, 296 с.: илл.
11 Гродна/ аўтар тэксту А. Карпюк, вершы Д.Бічэль-Загнетавай, Мн: Беларусь, 1966, л.: іл.
12 Гродна. Гродно / Фота Г.Л. Ліхтаровіча, аўтар тэксту П.П. Макараў, Мн: Беларусь, 1988. 144 с.: 159 іл. Гродно – ХХІ век: фотоальбом/ фото М. Анищенко, предисловие Е. Жабрун, комментарии И. Трусов, Брест, 2002, 217 с.: 112 ил. Гродна, Гродно, Grodno / склад. А. Ласмінскі, аўтар тэксту Св. Куль-Сяльвестрава, Мн: Беларусь, 2003, 200 с.:іл.
13 Гродна, Гродно, Grodno, Мн, 2003, c. 17.
14 About the importance of empty “usable” space in a city see: The Berlin City Forum. Jacques Derrida, Kurt Foster and Wim Wenders, “Architectural Design” 1992, p. 53.
15 Гродненская область, Белорусская ССР, Мн., 1976, с. 102.
Category: In quest of Hrodna
Published: 31 January 2007 | 0.7 | medium | 6 | 7,798 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.55,
"depth": 0.65,
"creativity": 0.35
} |
581b93f8-7551-4d35-a6f2-06c241519880 | term tympanoplasty generic term | technology | historical_context | The term tympanoplasty is a generic term that refers to any type of reconstructive procedure of the middle ear. Most tympanoplasties involve repair of the eardrum and/or repair of the middle ear hearing bones (hammer, anvil, stirrup). In some cases, a mastoidectomy procedure is combined with a tympanoplasty to eradicate a chronic infectious process such as a cholesteatoma.
Most tympanoplasties are outpatient procedures with optional overnight stay in our observation unit. The surgical times vary from about 20 minutes to 2 hours depending on the extent of the disease process and the technique for the repair. With hearing bones affected, a so called ossiculoplasty is performed with the intention to restore the continuity of the chain of hearing bones (ossicles).
Some tympanoplasties can be performed through the ear canal without an incision around the auricle. In some other cases, however, an incision behind the ear becomes necessary. An endaural approach, which utilizes an incision in the lateral aspect of the ear canal is rarely used.
The ear drum repair can be performed using a variety of tissues. Most commonly, temporalis fascia is used, which can be easily harvested through all approaches. This is a layer of fibrous tissue just over the chewing muscle. Thus, many patients experience some chewing issues after surgery. Other risks include unsuccessful ear drum repair with re-perforation or a lack of hearing improvement. Also, the facial nerve runs through the ear and is therefore at risk during every ear surgery. This risk, however, is very low and a monitoring system is routinely used.
Patients are usually asked to return for a clinic appointment about 1 week after surgery. Several other appointments will be required depending on the details of the procedure performed. | 0.6 | medium | 4 | 368 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
4002312c-c2f3-4337-9461-a98bdad69d5e | SiteW helps you build your website | arts_and_creativity | historical_context | SiteW helps you build your website
Editing my Site's Design
To customize your website design, you have several possibilities:
For your images, you can use the following options:
• Filters (Black and white, Color, Gradient, Blur, Invert, Contrast)
• Parallax for a stunning 3D effect
• Full screen to create your header, footer or separator
• Rotation tool to make original creations
Finally, you can also use our Image, Gallery, Widget or even Video blocks... | 0.5 | medium | 6 | 115 | [
"intermediate understanding"
] | [
"research"
] | [] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.4
} |
80804ed6-cec0-4f74-b069-1086b27d5888 | Diagnostic Assessment: Algebraic Geometry | mathematics | worked_examples | ## Diagnostic Assessment: Algebraic Geometry (Level 10/10) This assessment is designed to evaluate a deep understanding of fundamental concepts in algebraic geometry, assuming a strong background in abstract algebra and foundational geometry. --- ### Question 1: Conceptual Understanding (Multiple Choice) **Question:** Let $k$ be an algebraically closed field. Consider the polynomial ring $k[x, y]$ and the ideal $I = \langle xy - 1 \rangle$. What is the geometric object corresponding to the variety $V(I)$? **Options:** A) The union of the $x$-axis and the $y$-axis. B) The parabola defined by $y = x^2$. C) The hyperbola defined by $xy = 1$. D) The entire affine plane $k^2$. **Answer:** C) The hyperbola defined by $xy = 1$. **Explanation:** The variety $V(I)$ is the set of points $(a, b) \in k^2$ such that $f(a, b) = 0$ for all $f \in I$. In this case, $I = \langle xy - 1 \rangle$, so $V(I) = \{ (a, b) \in k^2 \mid ab - 1 = 0 \}$. This equation, $ab = 1$, precisely defines the hyperbola in the affine plane $k^2$. **Why others are wrong:** * **A) The union of the $x$-axis and the $y$-axis:** This corresponds to the variety $V(\langle xy \rangle)$. The ideal for this variety is $\langle xy \rangle$, not $\langle xy - 1 \rangle$. * **B) The parabola defined by $y = x^2$:** This corresponds to the variety $V(\langle y - x^2 \rangle)$. The defining polynomial is different from $xy - 1$. * **D) The entire affine plane $k^2$:** The entire affine plane $k^2$ is the variety $V(\langle 0 \rangle)$, where the ideal is the zero ideal. The ideal $\langle xy - 1 \rangle$ is non-trivial and defines a proper subvariety. --- ### Question 2: Application (Problem Solving) **Scenario:** Let $C$ be the curve in $\mathbb{P}^2$ defined by the homogeneous polynomial $F(X, Y, Z) = X^2 + Y^2 - Z^2$. **Task:** Determine the points at infinity on the curve $C$. **Solution Approach:** 1. To find points at infinity, we set $Z = 0$ in the homogeneous equation. This gives the dehomogenized equation $X^2 + Y^2 = 0$. 2. We are looking for solutions in the projective plane $\mathbb{P}^2$, which means we consider solutions $(X: Y: 0)$ where $X$ and $Y$ are not both zero. 3. The equation $X^2 + Y^2 = 0$ over an algebraically closed field $k$ implies $Y^2 = -X^2$, so $Y = \pm iX$, where $i$ is a square root of $-1$ (which exists in an algebraically closed field). 4. If $X \neq 0$, we can set $X=1$, yielding solutions $(1: i: 0)$ and $(1: -i: 0)$. These are distinct points in $\mathbb{P}^2$. 5. If $X=0$, then $Y^2 = 0$, so $Y=0$. This would give $(0: 0: 0)$, which is not a point in $\mathbb{P}^2$. 6. Therefore, the points at infinity on $C$ are $(1: i: 0)$ and $(1: -i: 0)$. **Common Errors:** * Forgetting to dehomogenize by setting $Z=0$. * Treating $X^2 + Y^2 = 0$ as having no solutions (e.g., over the real numbers) and not considering the properties of algebraically closed fields. * Not understanding the notation $(X: Y: Z)$ for projective coordinates and failing to normalize or identify distinct points. --- ### Question 3: Analysis (Compare/Contrast) **Prompt:** Compare and contrast the concepts of a variety and a scheme in algebraic geometry. **Key Distinctions:** * **Geometric Objects vs. Local Rings:** Varieties are primarily viewed as geometric sets of points satisfying polynomial equations. Schemes, on the other hand, are defined by their structure sheaf, associating a ringed space $(X, \mathcal{O}_X)$ where $X$ is a topological space and $\mathcal{O}_X$ is a sheaf of rings. This allows for a more abstract and algebraic perspective. * **Field Dependence:** Classical varieties are often defined over algebraically closed fields for simplicity. Schemes are more general and can be defined over any commutative ring, allowing for the study of arithmetic properties (e.g., schemes over $\mathbb{Z}$). * **Local Structure:** Schemes provide a finer local structure. For any point $p$ in a scheme $X$, the stalk $\mathcal{O}_{X, p}$ is a local ring. This local ring captures crucial information about the geometry near $p$. Varieties, when viewed as topological spaces, have local rings associated with them, but the scheme-theoretic approach formalizes this and extends it beyond just fields. * **Singularities:** Schemes offer a more sophisticated framework for understanding singularities. For instance, the local ring at a singular point is not regular. **Depth Indicator:** A deep understanding is demonstrated by explaining how the functor of points perspective, where a scheme represents a functor from the category of commutative rings to the category of sets, provides a unified framework that subsumes classical algebraic geometry and allows for the study of objects like schemes over $\mathbb{Z}$. --- ### Question 4: Synthesis (Open-ended) **Challenge:** Consider the ring $R = k[x, y] / \langle y^2 - x^3 - x \rangle$. Construct a geometric object corresponding to the spectrum of this ring, $\text{Spec}(R)$, and briefly describe one of its geometric properties. **Expected Elements:** * Identification of the geometric object as an affine scheme. * Description of the associated affine variety $V(\langle y^2 - x^3 - x \rangle)$ as the set of points in $k^2$ satisfying the given equation. * Recognition that this variety represents an elliptic curve (or a related singular cubic curve if the field characteristic is 2). * Discussion of a geometric property, such as: * The singularity at the origin if the characteristic of $k$ is not 2. * The genus of the curve. * The group law on the non-singular points (if applicable). **Levels of Response:** * **Basic:** Identifies $\text{Spec}(R)$ as an affine scheme and correctly writes down the associated variety $V(\langle y^2 - x^3 - x \rangle)$. * **Proficient:** Correctly identifies the variety as a cubic curve, possibly mentioning its classification (e.g., elliptic curve), and correctly states that $\text{Spec}(R)$ is the affine scheme corresponding to this variety. * **Advanced:** Provides a detailed geometric property, such as analyzing the singularity at $(0,0)$ by examining the local ring $R_{(x,y)}$ or discussing the genus of the curve using the formula for singular cubics. --- ### Question 5: Evaluation (Critical Thinking) **Scenario:** A student claims that the variety $V(\langle x^2 + y^2 \rangle)$ over $\mathbb{R}$ is empty, but over $\mathbb{C}$ it consists of only the point $(0,0)$. Evaluate this claim. **Criteria:** * Correctness of the statement regarding $V(\langle x^2 + y^2 \rangle)$ over $\mathbb{R}$. * Correctness of the statement regarding $V(\langle x^2 + y^2 \rangle)$ over $\mathbb{C}$. * Justification for both cases, referencing the properties of the respective fields. **Reasoning Required:** The student needs to apply the definition of a variety and consider the properties of the fields of definition. * Over $\mathbb{R}$, the equation $x^2 + y^2 = 0$ has only one real solution: $x=0$ and $y=0$. Thus, $V(\langle x^2 + y^2 \rangle) = \{(0,0)\}$ over $\mathbb{R}$. * Over $\mathbb{C}$, the equation $x^2 + y^2 = 0$ implies $y^2 = -x^2$, so $y = \pm ix$. This yields solutions of the form $(x, ix)$ and $(x, -ix)$ for any $x \in \mathbb{C}$. If $x \neq 0$, these represent points like $(1, i)$ and $(1, -i)$. If $x=0$, then $y=0$, giving $(0,0)$. Thus, $V(\langle x^2 + y^2 \rangle) = \{(a, b) \in \mathbb{C}^2 \mid b = \pm ia\}$. This is not just the point $(0,0)$; it is a union of two lines passing through the origin: $y = ix$ and $y = -ix$. **Evaluation:** The student's claim is **partially correct but fundamentally flawed**. The statement about $\mathbb{R}$ is correct. However, the statement about $\mathbb{C}$ is incorrect; the variety is not just the origin but consists of two distinct lines through the origin. The error likely stems from confusing the affine plane $\mathbb{C}^2$ with the projective plane $\mathbb{P}^2$, or from not fully accounting for all solutions to $x^2 + y^2 = 0$ in $\mathbb{C}$. --- ### Self-Assessment Rubric * **Novice:** Can recall basic definitions of varieties and ideals. Struggles to apply these definitions to solve simple problems or distinguish between related concepts. * **Developing:** Can solve straightforward problems involving varieties and ideals, such as finding points on a variety. May have difficulty with projective geometry or the nuances of scheme theory. * **Proficient:** Demonstrates a solid understanding of varieties, ideals, and their relationship. Can apply these concepts to analyze geometric properties and solve problems in affine and projective settings. Understands the basic motivation for schemes. * **Expert:** Possesses a deep conceptual grasp of algebraic geometry, including schemes. Can perform complex analyses, synthesize information from different areas, and critically evaluate claims. Understands the functor of points and the transition from varieties to schemes. --- ### Gap Identification Guide * **Difficulty with Question 1:** Indicates a weak grasp of the fundamental correspondence between ideals and varieties. Misconceptions about how polynomial equations define geometric shapes. * **Difficulty with Question 2:** Suggests issues with projective geometry, particularly handling points at infinity and working with algebraically closed fields. * **Difficulty with Question 3:** Points to a lack of understanding of the motivations and framework of scheme theory, or an inability to articulate the differences between classical and modern approaches. * **Difficulty with Question 4:** Reveals challenges in connecting ring-theoretic objects (like quotient rings) to their geometric interpretations (schemes/varieties) and describing their properties. * **Difficulty with Question 5:** Indicates potential misunderstandings of field properties (especially algebraically closed fields) and their impact on the solution sets of polynomial equations, or confusion between affine and projective spaces. | 0.7 | medium | 6 | 2,629 | [
"calculus fundamentals",
"algebra"
] | [
"real analysis",
"abstract algebra"
] | [
"science",
"technology",
"arts_and_creativity"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.55,
"creativity": 0.35
} |
9c7e2166-32ef-41d4-85bf-f80bce9a6b2c | Amy Waller, RN | interdisciplinary | problem_set | Amy Waller, RN
Director of Nursing
At Mill Valley Care Center, we work hard to prevent infections. When needed, we help the physicians determine if antibiotics are appropriate. Anytime antibiotics are used, they can cause side effects. When antibiotics are not needed, they won’t help you, but the side effects can still hurt you.
Common side effects of antibiotics include:
More serious side effects include:
- Clostridium difficile infection (also called C. diff) , which causes diarrhea that can lead to severe colon damage and death.
- Severe and life-threatening allergic reactions.
Remember, antibiotics can save lives, and when appropriately used the benefits outweigh the risks. For further questions or concerns, please call or stop by the facility.
To learn more about antibiotic prescribing and use, visit URL: www.cdc.gov | 0.65 | medium | 4 | 174 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.5,
"depth": 0.35,
"creativity": 0.4
} |
78747405-1f3b-46e3-a3f2-e30da812b6f1 | After birth a foal should normally | technology | historical_context | After birth a foal should normally:
- Sit up in 1 to 2 minutes
- Have a suck reflex in 2 to 10 minutes post partum
- Attempt to stand
- Should be standing within 2 hours (Average 1 hour)
- Suckle within 4 hours
- Urinate within 8 hours
The mare and newborn foal should be given the time to bond without human intervention for the fist 4 hours. A foal that fails to stand 2 hours and suckle within 4 hours is considered abnormal and needs veterinary assistance.
IMPORTANT POINTS TO REMEMBER:
- Allow the mare and foal undisturbed time to bond.
- Ensure the foal receives a sufficient amount of colostrum. (The sticky yellow 1st milk “Liquid Gold” present for approximately 3 days), because a foal losses the ability to absorb colostrum and it rapidly decreases after a 12 hour period.
- Check the foal has passed the meconium within the first 2 hours.
WHY ARE FOALS DIFFERENT FROM HORSES: Foals are very susceptible to extreme temperature changes, so try to avoid direct sun or wet conditions. Foals are born with very limited energy stores, so need to suckle soon after birth and at regular intervals (every 20-30 minutes) The mares placenta does not allow the passages of immunity, so foals are born with poor immunity, they rely entirely on the mares colostrum to help prevent disease.
Problems in the newborn foal:
Premature: Shorter gestation period and signs of immaturity.
Immaturity: Foals at term but small in size, floppy ears, silky hair coat, slightly domed head and tendon laxity.
Septicaemia: Can result from infection before birth. (i.e. Placentitis), infections usually through the navel, respiratory and gastrointestinal tract. Good hygiene, colostrum and plasma transfusions will help prevent infections.
Joint infections: Are very prominent in foals. Infections occur via bacteria spread in the blood stream. ANY case of lameness should be seen as soon as possible by your veterinarian.
Meconium impactions: Firm stick like droppings present at birth, meconium is normally passed within 12 hours. Foals present with unproductive straining and colic signs should be seen as soon as possible by your veterinarian.
Urine dribbling: Usually from the naval, may be noted soon after birth or as late as a month post partum, should be seen as soon as possible by your veterinarian.
Tendon laxity and bent limbs: Not uncommon in the newborn foal. Some may need veterinary attention.
WHY SHOULD YOU CALL A VETERINARIAN: A vet is able to identify early stages of infections and problems associated with immaturity. They can perform a blood test on the foal 12 to 24 hours post partum, this will assess antibody levels. A plasma transfusion may be warranted to protect the newborn foal from infections.
CHECK THE MARE: A veterinarian must always be called if the mare fails to clean (Pass the placenta within 3 hours). Always try to keep the placenta, your veterinarian can acquire a wealth of information from a well preserved placenta.
NORMAL VALUES IN FOALS 12 TO 24 HOURS OLD:
Heart rate: 80 – 120 beats per minute
Respiratory rate: 30 breaths per minute
REMEMBER: A FOALS CONDITION CAN DETERIORATE RAPIDLY, IF IN DOUBT ABOUT YOUR FOALS HEALTH CALL YOUR VETERINARIAN IMMEDIATLY. | 0.65 | medium | 4 | 795 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [
"mathematics"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.35,
"creativity": 0.3
} |
3c62b72e-b6fb-4c4c-a00c-c0bf0ff40ba8 | Provided author(s) NUI Galway | interdisciplinary | ethical_analysis | Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available.
Downloaded 2018-12-18T19:47:04Z
Some rights reserved. For more information, please see the item record link above.
Title:
Developing Children's Participation: Lessons from a Participatory
IT Project
Author: Bernadine Brady
Address:
Health Services Executive (HSE) / National University of Ireland, Galway (NUIG) Child & Family Research and Policy Unit Department of Political Science and Sociology National University of Ireland, Galway Republic of Ireland
Tel: 00 353 91 493522
Fax: 00 353 91 750564
e-mail: email@example.com
Original Submission:
16th December 2004
Revised Submission:
14 th October 2005
Word Count: 5,925
Biography:
Bernadine Brady is a Researcher with the HSE/ NUI, Galway Child & Family Research and Policy Unit.
Acknowledgements:
The author would like to thank John Canavan, Brian McGrath and Pat Dolan for helpful comments on a draft of this article.
Developing Children's Participation: Lessons from a Participatory IT Project
Abstract
The UN Convention on the Rights of the Child, advances in the sociology of childhood and the consumer rights movement have placed the spotlight on children‟s rights in society, challenging those working with children to examine how they share power and ensure that children‟s views are taken on board. While childrens‟ service practitioners are broadly supportive of the concept of participation and there are numerous examples of how children‟s participation has been realised in practice, many are unsure where to begin due to the range of options, considerations and challenges associated with participatory work. This article describes and analyses the process used by Barnardos in developing and implementing a participatory approach in a children‟s IT project in Galway City, Ireland. The process employed, the challenges encountered and the added value the participatory approach brought to the project are outlined. Finally, four broad lessons emerging from the experience are discussed, namely; the value of having a clear framework and reflective practice; that good participatory work is inextricably linked with good project management; that small efforts at participatory work can increase capacity and appetite for further work and that there is a role for informal approaches in the context of a formal participatory framework.
Introduction
„Children‟s participation‟ is a broad term, which means involving children in decisions that affect their lives, the lives of their community and the larger society in which they live. It involves supporting children and young people to think for themselves, to express their views effectively and to interact in a positive way with other people (Save the Children, 2003). The UN Convention on the Rights of the Child (UNCRC) upholds the rights of children to have their voices heard in matters which affect them. A body of theoretical and practice literature has emerged to support organisations in understanding and developing children‟s participation (Treseder, 1997; Lansdown, 2001; Shier, 2001; McAuley and Brattman, 2002; Kirby et al, 2003; and others). Cutler and Taylor‟s (2003, p.4) survey of the participation infrastructure among UK youth organisations highlighted that there is a considerable level of activity and broad support for children‟s participation among children and youth services, but found that many organisations face particular challenges in moving from principled support for children‟s participation to embedding that commitment in everyday practice, indicating a need for assistance with „route mapping and path-finding‟. By describing the experience of Barnardos, Galway in „trying out‟ and learning from a participatory methodology in the context of a children‟s IT project, this article aims to add to the learning in relation to how children‟s services can begin to meaningfully translate their support for children‟s participation into practice. The analysis is based on a formative evaluation of the project undertaken by the author (Brady, 2004). After setting the context with a brief overview of key concepts, opportunities and challenges in relation to participation, the choices made in relation to participation by Barnardos are described and located within a framework, based on the work of Kirby et al (2003) and Treseder (1997). The article asks whether a participatory approach made a difference in this project and outlines a number of lessons emerging that may be of interest to organisations interested in engaging in participatory work.
Children's Participation
In recent times, a number of trends, not necessarily compatible, have converged to give momentum to the cause of children‟s participation. Firstly, the UN Convention on the Rights of the Child formally acknowledged for the first time in international law that children are the subjects of rights, rather than just recipients of adult protection (Lansdown, 2001). Article 12 of the Convention states that, if children are able to express their views, it is necessary for adults to create the opportunities for them to do so. Secondly, children are consumers of goods and services, and thus, in line with a growing consumer movement, are considered to have a right to exercise their preferences and influence the nature and quality of the goods and services made available to them (Sinclair, 2004). Thirdly, a growing body of work on the sociology of childhood, instead of subsuming children into the family, takes the life of the whole child as a starting point and studies children as an independent social group with its own culture, characteristics and meaning (Torrance, 1998; Jans, 2004). It is argued that children‟s participation enables children to democratically engage as citizens with their communities and society; leads to better decisions and services for children; can enhance children‟s skills and self-esteem; and better protects children (Sinclair and Franklin, 2000; Lansdown, 2001).
Ireland marked the new millennium with the launch of the National Children‟s Strategy, „the most significant policy commitment to children and young people made by government in the history of the Irish State‟ (Pinkerton, 2004, p.120). The unifying vision of the National Children‟s Strategy is:
"An Ireland where children are respected as young citizens with a valued contribution to make and a voice of their own; where all children are cherised and supported by family and the wider society; where they enjoy a fulfilling childhood and realise their potential" (Government of Ireland, 2000, p.4).
One of the three goals of the National Children‟s Strategy is that „children will have a voice in matters which affect them and their views will be given due weight in accordance with their age and maturity‟ (Government of Ireland, 2000, p.30). Martin (2000, p.5) considers the empowerment of children as autonomous human beings with legal rights and with ability to participate fully in Irish society to be „the new millennium challenge‟, which will involve Irish society accepting an evolving „child liberation philosophy‟ to improve the lives of children.
Participation in Practice: Opportunities and Challenges
But in practical terms, how can children‟s participation be achieved? Participatory practice has been defined as a means through which the voices of children and young people are heard; something that is concerned with and relevant to the lives of children and young people; a means to a political end; inclusive; and transformative, i.e. it needs to challenge the dominant discourse that represents children and young people as lacking the knowledge or competence to be participants in the policy debate (Setting the Agenda: Social Inclusion, Children and Young People, 2004). Literature on children‟s participation has valuably illustrated that participation can have various levels and dimensions, stressing that there is no one „perfect‟ model of participation, and what is appropriate will vary from case to case. Frameworks such as Hart‟s Ladder of Participation (1992) and Treseder‟s (1997) adaptation of the model, illustrate that different degrees of involvement each have the potential to be the most appropriate under a given set of circumstances. Moreover, children‟s participation can relate to public or private decisions; it can be informal or formal; small or large scale, one-off or continuous (Kirby et al, 2003). Children‟s decisions can relate to service planning and development, or to influencing policy. Practitioners are urged to be conscious of the diversity of children, taking age, disability, gender, race and social and economic circumstances into account (Sinclair, 2004). Examples have been provided of children‟s successful involvement in research, advocacy, conference participation, project design, management, monitoring and evaluation and other areas (Lansdown, 2001).
While there is consensus among practitioners that participation is a „good thing‟, there is confusion as to what counts as participation, what participation is for, and exactly how participation impacts on social exclusion (Setting the Agenda: Social Inclusion, Children and Young People, 2004). Furthermore, Kirby and Bryson (2002) highlight that, while there is a fast growing literature about how and why to involve young people in making public decisions, there is very little evaluation and research about how best to do so and what impacts can be achieved. Some of the criticisms of participative approaches are that they are not representative, that models based on adult democratic principles risk replicating their disempowering aspects and that they will prove most attractive to the most confident and articulate young people. Critiques of general participatory work can apply to work with children – for example Cooke and Kothari (2001, p.14) argue that proponents of participatory approaches have been „naïve about the complexities of power and power relations‟, while they, Kapoor (2002) and others have critiqued what they perceive as the inadequate theorietical basis of participatory development.
Given the range of reasons for and against engagement in participatory work with children and the countless possibilities associated with the process, it is not surprising that organisations embracing a child liberation philosophy find it difficult to find a clear and meaningful starting point. As the following case study illustrates, Barnardos were keen to translate their theoretical support for children‟s participation into practice, but, like many children‟s services, were unsure regarding how best to operationalise this commitment. The steps taken by them in translating their principled support for participation into practice in relation to a children‟s IT project are discussed and analysed.
Case Study: Barnardos 'Computer Characters' Project
Context
Barnardos is Ireland‟s largest national voluntary childcare organisation, working with more than 12,000 children in over 30 locations around the country. The work of the organisation is underpinned by a commitment to the best interests of children and young people, promoting and respecting their rights in all of the work. Barnardos (West and Midlands Region) received funding for a pilot children‟s IT project from the national Children‟s Hour initiative in 2000. The „Computer Characters‟ project wished to target the emerging „digital divide‟ between those children who are benefiting and those who are being left behind by the information society (Becker, 2000), by increasing and improving the access to and usage of information technology by disadvantaged children and their families. As work to develop a children‟s participation policy for Barnardos was underway at the time funding was received for the project, the value of using the children‟s IT project as an opportunity to pilot and learn from a participatory methodology was recognised.
The Computer Characters project was of one year‟s duration initially, commencing training in October 2003. Ten-week training sessions took place at six sites, which
included local youth projects and community centres. Thirty-three children participated
7
in the project, (ranging in age from 3 years to 13 years) and including specific groups for Travellers, refugees and asylum seekers. Representatives of local statutory and voluntary organisations sat on an advisory group to support Barnardos with the project design and implementation.
Project Evaluation
As assessment of the project‟s participatory methodology was a key area of interest for Barnardos, the Child & Family Research and Policy Unit (CFRPU) was commissioned by Barnardos to undertake a formative or process evaluation of the project. According to Rossi et al. (1999), process evaluations verify whether a programme has been delivered as intended to programme recipients. A process evaluation is suitable for a relatively new programme, to answer how well it has established its operations and services, with feedback helping to shape how the service develops. While process evaluation involves some assessment of the impact of the programme on participants, impact evaluation is not the primary consideration.
Project Methodology
„Computer Characters‟ was fundamentally a social inclusion project, which aimed to tackle disadvantage in relation to IT by combining a community development approach with a children‟s participation methodology. The community development approach involved consultation with local groups and agencies, targeting of children from excluded communities (both area based and communities of interest) and working with local community and voluntary groups, while the children‟s participation aspect of the project involved choosing an appropriate level of participation, implementing it and reflecting on it. How the project merged the two approaches is described under the following five headings:
8
a. Increasing knowledge and understanding of participatory approaches among stakeholders.
b. Deciding on the level of participation that was most feasible within the parameters of the project.
c. Gaining access to and securing the participation of children and families.
d. Encouraging active participation and shared decision-making during sessions and maintaining the ongoing participation of selected participants.
e. Reflecting on and learning from the experience of the project.
a. Increasing knowledge and understanding of participatory approaches among stakeholders.
One of the most crucial questions for organisations undertaking participatory work is „why are we doing this?‟ (Sinclair, 2004; McNeish, 1999). Barnardos believed that a participatory approach would help to tailor the project delivery to meet the needs of the target group, enhance children‟s self-esteem and responsibility, improve children‟s communication and decision-making skills and show respect for children and young people.
Before the project model was designed, Barnardos commissioned a literature review in relation to participatory approaches with children and training was provided to staff and Advisory Group members on „consulting children‟. This helped to enhance knowledge and understanding of what participation is and how a participatory approach could be adopted. While this training was valuable, it related mostly to formal consultation, and a more general focus on participatory approaches with children may have been more useful. The evaluation noted that, at this early stage, it would have been useful to have more discussions among stakeholders (staff, management, advisory group members), in order to surface attitudes and pre-conceptions in relation to children‟s rights or abilities to participate, which, as McNeish (1999, p.199) points out, represent a „hidden barrier‟ to participation in virtually all organisations.
b. Deciding on the most feasible level of participation.
Participation literature stresses the importance of clarity and realism regarding the extent and possibility of change in the use of participatory approaches, with genuine and beneficial forms of consultation on a smaller scale preferable to grandiose, tokensitic gestures (McNeish, 1999; Kirby et al, 2003). Given the one-year funding timescale within which the project had to operate, Barnardos felt that there would not be time to build ownership of the wider project structure and that the most meaningful level of participation would be achieved through the direct training provided as part of the project. Even within the training, there were some parameters in relation to what was desired – for example, the project had to develop participants‟ IT skills. Using the Tresder model (1997, p.7), therefore, the level of participation chosen was „adult initiated, shared decisions with children‟, which in this case means that adults have the initial idea for the project and bring the groups together but young people are involved in every step of the planning and implementation, including taking decisions.
Sinclair (2004) stresses that it is incumbent on those involved in participation work to ensure that their practice reaches appropriate ethical standards. An ethical statement was developed by the project advisory group, outlining procedures in relation to consent, safety, confidentiality, voluntary participation and complaints procedure. Procedures were put in place in line with this ethical statement – for example, participants were informed that their participation was voluntary and consent forms for the project and the evaluation had to be signed by parents.
c. Gaining access to and securing the participation of children and families.
The project wished to target families who were most disadvantaged in relation to IT. It gained information about potential participants via an advisory group, who collectively possessed a wide range of knowledge about groups and areas in the city experiencing social and / or economic disadvantage and the current profile of services for these families. Local youth and community groups were identified to act as an interface between the project and participants, selecting participants that they felt would enable the project to meet its objectives. While this approach worked well and was the most feasible in terms of the project timescale, it is worth noting that groups and areas identified that did not have well-established youth or community groups were precluded from participating, reflecting Sinclair‟s (2004) point that children with minimal involvement with local agencies are generally less likely to be included in participation activities. The evaluation also identified a need for clearer guidelines and additional support for the selection of participants to ensure that the project reaches its desired target group, i.e. families with little experience of or access to computers.
d. Encouraging active participation and shared decision-making during sessions and maintaining ongoing attendance.
The child-centred, participatory approach adopted in training was in line with guidelines for engaging children in participatory approaches (McNeish, 1999; Sinclair and Franklin, 2000; Lansdown, 2001). Ground rules were developed at the outset by the trainers in conjunction with participants and the objectives and rationale of the course were clearly outlined to children. Children had numerous opportunities to express their feelings and opinions about any aspect of the course – including through feedback forms, a suggestion box and a complaints box. Children were asked to identify their interests and training was designed to fit in with these interests as much as possible. Learning to use the Internet to look up information about their favourite football team or singer, using a scanner to scan photos of their favourite people and things and using a word document to paste photos and write about their lives are examples of how learning IT was made relevant to the children. Children could take the lead on their own training including choosing games and software to use and deciding a theme for a group project. Children took part in self-directed learning, but could ask for assistance if required. Parents were encouraged to get involved, were kept informed regarding the progress of the course and were asked for written and verbal feedback about their child‟s learning and enjoyment. Those parents attending sessions were encouraged to allow their child to take the lead and not direct them in their choices. Throughout the course, there was an emphasis on fun, sharing and celebration of achievements. Trainers adapted to the dynamics of each group (influenced by age, parental attitudes, culture, gender and other factors) as much as possible, while retaining a focus on broad learning objectives. For example, a small group of pre-school children living in a residential centre for asylum seekers and refugees were trained by multi-lingual trainers on-site, using mobile technology to facilitate access by families.
Children who joined the training groups maintained strong attendance in the majority of cases. Just a small proportion (less than 10 per cent) of children attended erratically or dropped out. While this is a normal occurrence in all training groups, the project paid attention to the range of factors, both external and internal, that impact on a child‟s ability to participate. While many of the external factors were beyond the control of the project (i.e. attitude of parents, interests of the child, other commitments), efforts were made to identify and overcome barriers occurring internally in the group, (such as shyness, lack of confidence, timing of sessions) in order to support ongoing attendance and a healthy level of participation. The group leaders went to great lengths to make children feel welcome and important. Following a recommendation in the Interim Evaluation Report, additional group work was included in the course to add a social,
interactive and creative dimension, which appeared to have a positive impact – certainly the level of participation was high in the second phase.
e. Engaging in ongoing reflection and learning
Participants were introduced to the evaluator at the outset and consented to their participation in the evaluation and to the attendance of the evaluator at training sessions. The evaluator met with the project co-ordinator, trainers and advisory group regularly to reflect on the process and outcomes. Thus, the formative evaluation of the „Computer Characters‟ project enabled the stakeholders to gain a deeper understanding of the factors in the project environment that influenced outcomes and to feed these back into the ongoing work of the project.
Challenges associated with the participatory approach
Needless to say, there were plenty of challenges in implementing a participatory approach. Firstly, the children came from school and home environments, which generally did not encourage them to take a lead, so was not always easy for them and their parents to accept or understand a participatory model. For example, where parents took part in sessions, they would, in some cases, direct the child regarding what to do on the computer, which was contrary to the project‟s approach. Children‟s participation literature stresses the importance of surfacing and exploring attitudes to children‟s participation among adults (McNeish, 1999). While this was done with other adult stakeholders in the project (i.e. trainers, advisory group members, staff), more discussion with parents about the „what and why‟ of participation would have been valuable. However, feedback from some parents suggests that they noticed the way the trainers worked with children and learned from them regarding how they should let their child take the lead. Secondly, while a participatory approach emphasises what children want, the trainers found that children don‟t always know what they want to do. In some cases, information and experience has to be provided before they can identify the possibilities. In this project, the Co-ordinator brainstormed with the children all the things they could possibly do and showed them additional options before they chose what they themselves wanted to do.
The third challenge brings us back to the dichotomy between the divergent forces of children‟s empowerment and consumer rights driving the case of children‟s participation. While this project was rooted in a desire to encourage participation as an empowering activity for children, when given a choice regarding content, many young people showed a preference for what could be considered consumerist activities. For example, one older group (9-12 years) were oriented to individual interests, such as downloading music or ring tones, while children of all ages were drawn to computer games, particularly those featuring famous cartoon characters and car racing. While the younger and more inexperienced computer users could develop keyboard, literacy and motor skills through playing games which they would not otherwise have an opportunity to do, the older group were reasonably computer and internet literate and so, had the trainers merely followed their lead, there would have been little skills development or group work. In this case the trainers encouraged the young people to develop a web page and learn morphing, which they agreed to and enjoyed. For the trainers, therefore, getting a balance between teaching and facilitating, leading and being led was a challenge, as was the decision regarding the degree to which pursuing individual consumer desires was acceptable in a project designed to develop young people‟s skills, abilities and capacities.
Did the participatory approach make a difference?
Evaluation of the project found that it was very successful – children derived great enjoyment from the project, their IT skills developed and they had an opportunity to practice social and group work skills. However, the key concern here is not so much what emerged, as what difference the participatory approach made to the project and to the outcomes for children. While comparison of a participatory and non-participatory approach would be necessary to adequately answer this question, nonetheless some observations regarding how the participatory approach offered „added value‟ in this project can be made.
Participatory approaches recognise the importance to children of physical places and social contexts in which they lead their lives, whether in formal or informal spaces, such as school, services or home (Moss and Petrie, 2002). A key criterion for genuine participatory work is relevance to children‟s lives and a link to their day-to-day experience (Lansdown, 2001). This projects‟ approach to children‟s IT training is in line with recommendations from research (Facer et al, 2001), which emphasises that children are motivated to acquire computer skills by non-technological objectives, such as personal communication and peer group interests, and that training should be based on its relevance to children at the present time. Facer et al (2001) argue that to overcome current societal inequalities in relation to IT, it is important to contest dominant constructions of „valuable‟ ICT skills and work with young people to develop their vision of an information society, while Valentine et al (2002) urge that policies to promote an inclusive „information society‟ recognise that children‟s use of computers is not only about the broad-scale distribution of resources but about children‟s everyday social relations. Facilitating children to take the lead on content meant that the children took the lead in creating relevance. Furthermore, children were viewed as actors, rather than respondents, thus allowing for the creation of imaginative actions rooted in their daily lives (Tisdall and Davis, 2004; Hill et al, 2004).
Furthermore, the participatory approach facilitated trainers to respond and adapt to the diversity of ages and cultural backgrounds among participants. Because trainers took the lead from the children as regards the content they desired, it was in fact easier for them to encourage and respond to cultural diversity, rather than depending on their own or others opinions regarding what is culturally appropriate.
Children‟s rights advocates argue that participatory work with children enhances children‟s self-esteem and confidence and can help to develop leadership skills. In the case of this project, children grew in confidence over the course of the training. The evaluator observed a confidence among children regarding their rights to express themselves to trainers and to take initiative in making suggestions. There was also a sense of ownership in relation to IT, wherein the children were supported to express and communicate their own social reality through the medium of technology. The values of sharing and respect for others promoted by the trainers were also evident in most cases.
Discussion
A number of key learning points in relation to participatory work emerge from this project. These are the importance of a clear framework and reflective practice; that good participation work is inextricably linked with good project management; that small scale participation can have larger scale impact; and finally that there is value in undertaking informal approaches within a formal framework. These points are each discussed in turn.
1. A clear framework and reflective practice
Participation literature stresses that, to engage honestly with children, it is crucial that those involved in participatory work thoroughly think through the decision-making context and the appropriate level of power-sharing (Sinclair, 2004). This project was greatly enhanced by the fact that it worked from a clearly defined framework (participatory approach), developed at the outset on the basis of a literature review. The formative evaluation process helped to review, reflect on and refine the project development. For all involved with the project, the framework provided a clear ethos and direction, without which the participatory work may have lacked focus or meaning. Furthermore, ongoing reflection on the emerging practice meant that stakeholders‟ understanding of participation developed and evolved.
2. Good participatory work is inextricably linked with good project management
The project evaluation identified that a range of critical success factors in the direct training and wider project environments such as secure funding, advisory group expertise, skilled staff, as well as the features of the training model outlined earlier, created the environment in which good participatory work could take place. The lesson, therefore, is that the outcomes from participatory work are heavily influenced by the wider project structure, skills, relationships and procedures, as well as by the specific actions in relation to securing and developing participation.
3. Doing participation on a small-scale increases capacity and appetite for further work
While children‟s participation literature recommends that services start small and develop genuine participation, the ideal scenario is that participation and the active listening to children ultimately becomes part and parcel of the formal and informal ways in which organisations make decisions (Kirby el al, 2003). Among the „Computer
Characters‟ evaluation recommendations were that the level of children‟s participation be extended in the next phase of the project to include the wider project structure (for example, children could be represented on the project advisory group). Apart from this particular project, the challenge for Barnardos is to ensure that the organisation, both regionally and nationally, develops a genuinely participative structure and culture, ultimately becoming a child and youth centred organisation, wherein children and young people are involved in making decisions on a daily basis, in many ways and with varying degrees of influence (Kirby et al, 2003, Sinclair, 2004). While this project represents just one step of many for Barnardos towards becoming a child and youth centred organisation, its impact in terms of increased learning, confidence and understanding in the organisation and among external stakeholders (i.e. advisory group members, local community and youth groups) has been significant. Witnessing and experiencing the genuinely positive outcomes of a child centred approach, even on a small scale, has raised the profile of participatory work among stakeholders and increased their capacity and inclination to pursue a participatory agenda in other areas.
4. Informal participation work can work well in the context of a formal framework In the literature, a distinction is made between formal and informal mechanisms to support children‟s participation. Formal mechanisms provide opportunities for children and young people to influence decisions, such as a youth parliament or consultation meetings, while informal approaches enable children to express their views and have them listened to in less structured manner. There is much more in the children‟s participation literature about formal than informal approaches, yet informal approaches, such as those used in the direct training in this project, are essential to child-focused practice (Kirby et al, 2003). Allowing children to take control in an informal manner, but within a formal participatory framework, that explains and justifies the rationale, was an approach that met with success in this particular project. Stakeholders found it valuable that the methodology was explicitly articulated as it provided guidance for daily interaction moments as well as a reference for bigger decisions. This marriage of the formal and informal may be attractive to organisations concerned that their approach is not sufficiently „participatory‟ (Setting the Agenda: Social Inclusion, Children and Young People, 2004).
Conclusion
As noted at the outset, the emphasis on children‟s rights has emerged primarily through consumer movements, legislative change and the growing field of the sociology of childhood. Barnardos‟ decision to adopt a participatory approach in this IT project was motivated by a desire to develop and innovate in relation to good practice in child care and to operationalise the intent of the National Children‟s Strategy, which emphasises children‟s rights to have a say in matters that affect them. Designated funding, with scope for innovation gave Barnardos the „space‟ to try out and learn from a participatory approach, from which they have gained greater expertise, understanding and confidence in relation to participatory work. Barnardos experience in this particular case shows that the participatory approach brought an added value in terms of relevance to children‟s social reality, increased confidence and cultural compatibility. The experience of the project has been that it is useful to start small, and do participation well rather than attempting too much before the organisation has a well-developed awareness, understanding and competence in relation to participation. Research, evaluation and training were critical in terms of drawing out learning and promoting common understanding. While the degree of participation was small, the spread of the awareness and learning has been great, both internally within Barnardos and externally among stakeholders in the project.
References
Becker H.J. 2000. Who‟s Wired and Who‟s Not: Children‟s Access to and Use of Computer Technology, Future of Children, 10 (2) 44-75, 2000.
Brady, B. 2004. Computer Characters: Evaluation Report, Galway: HSE / NUI Galway Child and Family Research and Policy Unit
Cooke, B. & Kothari, U. 2001. Participation: The New Tyranny?, London: Zed Books. Cutler D & Taylor A. 2003. Expanding and Sustaining Involvement: A Snapshot of Participation Infrastructure for Young People Living in England. London: Carnegie Young People Initiative.
Facer K, Sutherland R, Furlong R. and Furlong J. 2001. What‟s the Point of Using Computers? The Development of Young People‟s Computer use in the Home. New Media and Society, Vol. 3 (2), pp 199-219.
Government of Ireland. 2000. The National Children's Strategy: Our Children – Their Lives, Dublin: The Stationery Office.
Hart R. 1992. Children's Participation: From Tokenism to Citizenship, Innocenti Essays, 4. Florence: UNICEF.
Hill M, Davis J, Prout A, Tisdall K 2004. Moving the Participation Agenda Forward, Children & Society, Volume 18, Issue 2, pp77-96.
Jans M. 2004. Children as Citizens: Towards a Contemporary Notion of Child Participation. Childhood, Vol. 11 (1): pp27-44.
Kapoor, I. 2002. The Devil‟s in the Theory: A Critical Assessment of Robert Chambers‟ Work on Participatory Development. Third World Quarterly, Vol. 23, No. 1, pp101-117. Kirby P & Bryson S. 2002. Measuring the Magic: Evaluating and Researching Young People's Participation in Public Decision-Making, London: Carnegie Young People Initiative.
Kirby P, Lanyon C, Cronin K and Sinclair R. (2003) Building a Culture of Participation: Involving children and young people in policy service planning delivery and evaluation.
Research Report. UK: Department for Education and Skills and National Children‟s Bureau.
Lansdown G. 2001. Promoting Children's Participation in Democratic Decision-Making, Florence: Innocenti Research Centre.
Lansdown G. 1995. Taking Part: Children's Participation in Decision-Making. London: IPRR.
McAuley K and Brattman M. 2002. Hearing Young Voices, Consulting Children and Young People, including those experiencing Poverty or other forms of Social Exclusion, in relation to Public Policy Development in Ireland, Key Issues for Consideration.
Dublin: Open Your Eyes to Child Poverty Initiative.
McNeish D. 1999. Promoting participation for children and young people: some key questions for health and social welfare organisations. Journal of Social Work Practice, Vol. 13, No. 2, 1999.
Martin F. 2000. The Politics of Children's Rights. Cork: Cork University Press.
Moss, P. Petrie, P. 2002. From Children's Services to Children's Spaces: Public Policy, Children and Childhood. London: Routledge Falmer.
Pinkerton J. 2004. Children‟s participation in the policy process: some thoughts on policy evaluation based on the Irish National Children‟s Strategy. Children & Society, Volume 18, Issue 2, pp119-130.
Rossi P.H, Freeman H.E. and Lipsey M.W. 1999. Evaluation: A Systematic Approach. Sixth Edition. Sage Publications.
Save the Children. 2003. Policy on Children's Participation, London: Save the Children.
Setting the Agenda: Social Inclusion, Children and Young People. 2004. Children & Society, Volume 18, Issue 2, pp 97-105.
Shier H. 2001. Pathways to Participation: A New Model for Enhancing Children‟s Participation in Decision Making, Children and Society, 15 (2) 107-117.
Sinclair R. 2004. Participation in practice: making it meaningful, effective and sustainable, Children & Society, Volume 18, Issue 2, pp106-118.
Sinclair R, Franklin A. 2000. A Quality Projects Research Briefing: Young People's Participation, Department of Health, Research in Practice and Making Research Count, Department of Health.
Tisdall K, Davis J. 2004. Making a Difference? Bringing Children‟s and Young People‟s Views into Policy Making, Children & Society, Volume 18, Issue 2, pp131142.
Torrance K. 1998. Contemporary Childhood: Parent-child Relationships and Child Culture. Leiden: DSWO Press.
Treseder P. 1997. Empowering Children and Young People: Promoting Involvement in Decision Making. Training Manual. London: Save the Children Fund and Children‟s Rights Office.
United Nations Convention in the Rights of the Child.
Available:www.cypu.gov.uk/corporate/childrights.
Valentine G, Holloway S and Bingham N. 2002. The Digital Generation? Children, ICT and the Everyday Nature of Social Exclusion, Antipode, 34 (2) 296-315. | 0.7 | medium | 6 | 8,497 | [
"intermediate understanding"
] | [
"research"
] | [
"technology",
"social_studies"
] | {
"clarity": 0.7,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.45,
"depth": 0.65,
"creativity": 0.35
} |
533ba848-e8ab-4788-8b87-67960179c31e | program require approval under | interdisciplinary | ethical_analysis | * This program does not require approval under the Private Career Colleges Act, 2005
Preparing to attend the Certification of Qualification exam 433A?
What does an Industrial Mechanic Millwright Do?
Industrial Mechanic Millwrights (433A) maintain and repair stationary industrial machinery, mechanical equipment and automated and robotic systems. Industrial Mechanic Millwrights are most often involved with installing, maintaining repairing and removing machinery and equipment in industrial plants and factories.
Job Related Skills, Interests and Values:
● reading diagrams and schematic drawings to determine work procedures
● maintain and repair stationary industrial machinery and mechanical equipment
● operating hoisting and lifting devices as necessary during the repair of machinery
● working independently and with others to solve mechanical and technical problems
● communicating , persuading, and explaining to others what needs to be done
● working accurately with numbers, and on occasion doing basic drawings of machine parts
● cleaning, lubricating and performing other routine maintenance work on machinery
● using welding equipment, hand and power tools as necessary
The course offers a review of the following topics:
● Safety and Trade Science
● Technical Drawing
● Fasteners, Threads, Lubrication
● Rigging, Lifting, Shafts and Attachments
● Bearings, Drive Belts
● Installation, Levelling and Alignment
● Metallurgy, Metal Cutting Process
● Chain and Friction Bearings
● Pumps and Seals
● Hydraulic and Pneumatic Systems
● Prime Movers, Material Handling
● Ventilation, pollution Control
● WHMIS Review
Registration is open to anyone 18 years of age or older. This course is recommended for persons with related experience.
What’s Your Future as an Industrial Mechanic Millwright ?
Most workers in this trade work full-time, sometimes in shift work, most often indoors at industrial plants or in commercial buildings. Industries in Southern Ontario that employ Industrial Mechanic Millwrights include:
● primary steel producers
● motor vehicle manufacturers
● machinery and equipment manufacturers
● mining companies
● As an apprentice, you would start at a wage less less than that of a journeyperson
● This rate gradually increases as you gain competency and skill
● Fully qualified Industrial Mechanic/Millwrights can earn anywhere from $19.00/hr to $30.00 per hour, with benefits and opportunities for overtime as well | 0.65 | high | 6 | 504 | [
"intermediate understanding"
] | [
"research"
] | [
"social_studies",
"arts_and_creativity",
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.45,
"creativity": 0.45
} |
5e0aa531-65a2-44e0-9f20-d6031f0a5b58 | by PAUL FASSA | mathematics | historical_context | by PAUL FASSA
The term “limey” is based on the history of the British Royal Navy’s use of limes on board ships during the mid-1700s and onward to prevent and cure scurvy among their sailors while out at sea for extended periods. At first oranges, lemons, and limes were used. But eventually limes became the standard Navy issue. Limes were more abundant in trade route regions and doctors also thought they were the most beneficial citrus fruit.
The practice of sucking on limes or drinking lime-water at sea cured the sailors’ scurvy epidemic, and the slang term of limey extended beyond British sailors to become an epithet, sometimes with a smile sometimes not, for Brits in general.
Interestingly, scurvy is making a bit of a comeback in some industrial nations. And many diseases in with different medical labels are slowly being recognized as manifestations of scurvy by independent medical practitioners. Ebola could be one of them. High fever and hemorrhagic activity are symptomatic of extreme scurvy as well as Ebola.
Scurvy can create acidosis as well, which can lead to further complications such as cancer. Vitamin C is the remedy of course. Limes contain both vitamin C and are alkaline producing. Alkaline from an acidic fruit? How’s this? Citric fruits are acidic in themselves, but the pH buffer systems in our bodies wind up producing alkalinity from them. Strange but true. The key phrase is alkaline producing. See what’s in sections 8 and 9 to the right.
But Wait, There’s Much More
If you eat in a Cuban or authentic Mexican restaurant, you’ll probably get limes served with their entrees, especially with any kind of meat. Maybe that tradition is based on the fact that there are studies that have demonstrated lime’s efficacy on inhibiting multiple drug resistant E. coli, cholera, and salmonella in fish and meats as well as in other foods and water.
Another study determined that lime juice was a powerful malaria remedy. A Nigerian hospital treated 120 malaria infected children for acute uncomplicated malaria, but they were randomized into two groups: One group was treated with the World Health Organization (WHO) recommended antimalarials artemisinin combination therapy (ACT) alone, while the other group was treated with both ACT and lime juice.
The ACT with lime juice treatment eliminated malaria parasites faster than the ACT alone therapy, most within 72 hours. The ACT alone treatment had an 18% early treatment failure rate. It seems the use of lime with ACT negated the side effect potential of antimalarials aremisinin combination therapy (ACT).
Another African study involved children with sickle cell anemia (SCA), which is often triggered by dehydration, acidosis, and fever that are usually due to malaria. Inspired by the lime juice malaria study, the researchers embarked on treating children with SCA to determine if it would ameliorate crisis or recurrent bone pain.
They discovered a significant reduction of both occurrences and concluded: “Regular intake of lime juice may be of great therapeutic and nutritional relevance in children with SCA.”
An in vitro (lab culture) study in India determined that compounds in lime extract inhibited pancreatic cancer cell growth. Pancreatic cancer is a difficult cancer, so the more ammo against it the better. Non-side effect lime compounds limonexic acid, isolimonexic acid, and limonin produced Panc-28 cell inhibition by inducing apoptosis (cell death) in a range of 73 to 89 percent depending on the method of lime compound extraction.
Yet in another study in Thailand, limes were found to be an important component for smoking cessation. Their research concluded: “Fresh lime can be used effectively as a smoking cessation aid, although not as good as nicotine gum in reducing cravings.” Maybe do both if necessary?
You Too Can Be a Limey
A commonly suggested Ayurvedic daily practice is to drink lemon or lime in warm water upon arising and before eating. This practice enhances liver health, which is very vital to overall health. It also enhances alkalinity and pH value.
It’s catching on in alternative health circles, and it’s so easy and inexpensive. You can get away with using non-organic limes and take advantage of those inexpensive Mexican limes to get into the healthy habit of becoming a limey too.
Paul Fassa is a contributing staff writer for REALfarmacy.com. His pet peeves are the Medical Mafia’s control over health and the food industry and government regulatory agencies’ corruption. Paul’s valiant contributions to the health movement and global paradigm shift are world renowned. Visit his blog by following this link and follow him on Twitter here. | 0.6 | medium | 4 | 986 | [
"algebra",
"geometry basics"
] | [
"calculus",
"statistics"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.45,
"creativity": 0.4
} |
8c883f80-a32f-41e4-aa16-b249f1a06ebf | The Greek World | interdisciplinary | historical_context | The Greek World
Routledge, 1997 - History - 622 pages
Studying from the Mycenean to the late Hellenistic period, this work includes new articles by twenty-seven specialists of ancient Greece, and presents an examination of the Greek cultures of mainland Greece, Asia Minor, Egypt and Italy.
With the chapters sharing the theme of social history, this fascinating book focuses on women, the poor, and the slaves – all traditionally seen as beyond the margins of powerand includes the study of figures who were on the literal margins of the Greek world.
Bringing to the forefront the research into areas previously thought of as marginal, Anton Powell sheds new light on vital topics and authors who are central to the study of Greek culture.
Plato's reforms are illuminated through a consideration of his impatient and revolutionary attitude to women, and Powell also examines how the most potent symbol of central Greek history – the Parthenon – can be understood as a political symbol when viewed with the knowledge of the cosmetic techniques used by classical Athenian women.
The Greek World is a stimulating and enlightening interaction of social and political history, comprehensive, and unique to boot, students will undoubtedly benefit from the insight and knowledge it imparts.
What people are saying - Write a review
The Greek worldUser Review - Not Available - Book Verdict
This work presents a smorgasbord of previously unpublished articles designed to stimulate interest in areas of classical studies that are usually ignored. The 27 contributors touch on subjects ranging ... Read full review
Other editions - View all
The Greek World
The Greek World is a stimulating and enlightening interaction of social and political history, comprehensive, and unique to boot, students will undoubtedly ...
www.informaworld.com/ smpp/ 312490637-790848/ title~content=t727474926
The Greek World by Anton Powell at Questia Online Library
Studying from the Mycenean to the late Hellenistic period, this work includes new articles by twenty-seven specialists of ancient Greece, and presents an ...
www.questia.com/ library/ book/ the-greek-world-by-anton-powell.jsp
Ling, Roger The Greek World New York: Peter Bendrick Books, 1976. Person, Anne. Everyday Life in Ancient Greece. New York: Franklin Watts, 1994. ...
library.thinkquest.org/ 19317/ htm/ bibliogr.htm
Classics: Modules: Intro to Greek and Roman History
la Tritle, The Greek World in the Fourth Century (1997) ... How did hoplite warfare shape the Greek world? Discuss the nature of its development and ...
www2.warwick.ac.uk/ fac/ arts/ classics/ modules/ introhist/ essays/
The Greek World - Boek - BESLIST.nl
Bekijk en vergelijk informatie, beoordelingen, vragen & antwoorden en de beste winkels voor 'The Greek World' op BESLIST.nl ▪ Boeken Engels ...
boeken_engels.beslist.nl/ boeken_engels/ d0000291957/ The_Greek_World.html
Aspasia - Wikipedia, the free encyclopedia
"Athens' Pretty Face: Anti-feminine Rhetoric and Fifth-century Controversy over the Parthenon", The Greek World. Routledge (UK). ISBN 0-415-06031-1. ...
en.wikipedia.org/ wiki/ Aspasia
The Greek World
The Greek World - Studying from the Mycenean to the late Hellenistic period, this work includes new articles by twenty-seven specialists of ancient Greece, ...
www.routledgeclassicalstudies.com/ books/ The-Greek-World-isbn9780415170420
Dress, Gender and the Menstrual Culture of Ancient Greece, by Amy ...
The goddess Artemis, daughter of Zeus and sister of Apollo, took on many names and identities in the Greek world perhaps most famously as the huntress. ...
Greek Theater in NY with Randy Gener
The Greek world, with its mythic preoccupation of the roles of men and women in ..... "The Greek World" Edited by Anton Powell Routledge Press Paperback, ...
The public use of private relationships in the Greek world, .... The Greek World in the Fourth Century. From the fall of the Athenian ...
www.springerlink.com/ index/ L54454VN55W3PN6P.pdf | 0.65 | medium | 5 | 1,007 | [
"domain basics"
] | [
"expert knowledge"
] | [
"technology",
"language_arts",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.55,
"creativity": 0.35
} |
987a7435-0d89-4f7b-89ac-d2f4cf8f2252 | What is Seasonal Affective Disorder (SAD) | arts_and_creativity | historical_context | What is Seasonal Affective Disorder (SAD)?
Also known as “Winter Blues” SAD is a depressed and withdrawn response to the short days of decreased sunlight, and long nights of late fall and winter seasons.
Decreased light affects sleep patterns and bio-rhythms. It affects four times as many women as men. Yet men and children can also suffer. SAD is severely debilitating to some and an inconvenience to others, but you don’t have to merely tolerate it.
Natural, simple, and effective remedies are available.
To conquer Winter Blues and Depression, you can’t wait for an outside force to magically shift your mood.
You’re going to have to take the lead in your life and blast through mental and physical obstacles. You’ll need to do so with a belief that you are worth it, and a willingness to accept your own lightness-of-being.
This is why I chose a stag, whose antlers are adorned with joyful and abundant spring flowers, to adorn this book’s cover.
A stag is an animal of power and vigor. As a totem, it represents the protector. Who, I ask, is your innate protector? It’s you, at your strongest and best. The deer represents intuition and gentleness. It brings harmony, happiness, peace, and longevity.
With its antlers, the deer can push through forest obstacles. Antlers allow it to protect itself and those it loves from harm, and to prove its power with all that would challenge.
With colorful and healing flowers adorning its antlers, the stag carries along the light and joy of spring and summer as it moves through life, even into the occasional dark shadows of forest trees. And to top it all off, antlers represent a crown of achievement. Isn’t it time to celebrate reconnecting with your own power?
Table of Contents:
Lights! Lights! Lights!
Whether you suffer from SAD, temporary depression, or chronic depression, Light Therapy is absolutely essential. You need to replicate the sun’s rays in any possible way.
Light is an environmental stimulus for regulating circadian cycles. When sunlight is lacking, the results can be mental or emotional discomfort. In severe cases, this can lead to SAD and depression...
Bathe or Shower with full appreciation to your body, hair, and skin as it is now.
Release judgment of your body. The human body comes in all shapes and sizes. It is an amazing gift that self-heals, adjusts to our needs, and sustains us through all circumstances. Think of your body as a companion that is there for you regardless of the circumstances, and then set about taking care of it as best you can...
Listen to music that either helps process depression or raises it to a higher vibration.
Science has shown that music creates vibrations that can either harmonize and raise your vibration, or create disharmony and energetic distress.
Sometimes, it does help to listen to music that “identifies” with your depression. As you feel it more deeply, it helps you access emotions so you can release them. But don’t reside there. Process and then move on to music that lifts your spirits...
I sank deeply into post-partum depression after giving birth to our first child.
Several of the techniques offered in this book saved my sanity. (Details of these events are included in the “Author” chapter.) A few years later, we moved to a northern state, living where long, cold winters defined my world with sub-freezing temperatures, brooding grey clouds, and months of snowplowed streets lined with four-foot-high mounds of dirty, frozen snow.
... I desperately needed sunlight! The more I lamented lack of sunshine, the more it rattled my peace of mind. I finally remembered the practices I’d used to survive the post-partum months and so I began to pull myself out of the blue funk. I learned to meditate, which taught me how to control my thoughts instead of allowing them to control me. By intentionally applying a variety of specific practices, I recaptured my sense of self. Lesson was finally learned – again!... | 0.6 | medium | 3 | 861 | [
"foundational knowledge"
] | [
"advanced concepts"
] | [
"science",
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.45,
"creativity": 0.3
} |
6cc5cd7b-aac5-4526-897e-b98c8469e500 | INSIDE THIS ISSUE | interdisciplinary | data_analysis | INSIDE THIS ISSUE
04 / Company event looks forward to future success
08 / FM Conway solves Baker Street challenge
13 / New five-year health and safety strategy
18 / FM Conway 2018 ‘Pride of Conway’ awards
SPRING 2018 | www.fmconway.co.uk
FOREWORD FROM MICHAEL CONWAY
AS THE INDUSTRY ASSESSES THE FALLOUT FROM CARILLION, OUR FOCUS FOR THE COMING YEAR REMAINS ON STABLE AND SUSTAINABLE GROWTH.
The demise of one of the construction industry’s biggest companies has been a wake up call for many. Although the reasons for Carillion’s failure are multiple, it is a reminder of the risks of becoming overstretched: too focused on growing turnover and paying shareholder dividends, rather than on delivering successful projects that bring strong returns.
Conversely, our goal as a business through 2018 will continue to be focusing on what we do best – delivering exceptional results for our customers in our core areas of specialism.
This doesn’t mean that we won’t continue to look at new opportunities, but it’s essential that growth remains stable and sustainable: identifying areas where we can make a difference for our customers by bringing to bear our expertise and knowledge. Put simply, whether working on Berkeley’s Southall development (page 14), at the Channel Tunnel (page 6) or London’s Baker Street (page 8), our objective remains delivering the infrastructure that communities need to thrive.
At the same time, Carillion has taught us that the industry needs to raise the standards of what it does, and the efficiency of how it’s done. From Greenford Flyover on page 12, to the work being done by our lighting division on page 16, this issue of Construct is littered with examples of innovation: but we need to make sure that we’re continuing to push our boundaries to deliver better results for our customers and our communities.
That means investing in new methods and technology, but also in our people. At the heart of our success lie our values as a family business and that doesn’t just mean having Conway in your name. Instead, it’s our wider team – from technical and construction teams in the field to our office staff – that sets us apart. We were reminded of the strength of this family at our recent whole company event in January, which you can read about on page four. Our commitment to continue to put people first is also the driving force behind our new health and safety strategy, which is discussed on page 13.
Getting the most from our teams means creating a supportive culture defined by honesty in our working relationships, inclusive practices and respectful attitudes that encourage everyone to contribute their ideas and energy. This approach has always been intrinsic to how we work; but as we reflect on recent shocks to our industry, and on future challenges, it is more important than ever now.
MICHAEL CONWAY MBE
CEO FM CONWAY
FIRST RAIL DELIVERY BOOSTS WORK TO CUT BUSINESS’ CARBON FOOTPRINT
The first rail delivery of aggregates from the Port of Tilbury to FM Conway’s Theale asphalt plant in Reading has been successfully completed, supporting the company’s commitment to sustainable construction.
Along with bitumen, aggregates are one of the key components that make up the road surface. Tim Metcalf, aggregates and asphalt executive director at FM Conway, said that the business’ ongoing commitment to reduce its environmental impact had acted as the impetus for FM Conway to look at alternative ways to transport its aggregate supply:
“This more carbon efficient form of transport means that we can cut the number of lorry movements on our roads, as well as giving us greater control over our product supply. The rail link provides us with a reliable source of aggregate, ensuring that we can continue to produce high-quality highway materials for our customers when they need them, passing benefits in terms of time and cost.”
SETTING THE BAR ON AIR QUALITY
FM Conway is investing £7 million in its vehicle fleet as part of its ongoing efforts to lead environmental best practice within the construction sector.
The business has commissioned 25 new HGVs and 136 1.5 tonne, 3.5 tonne and 7.5 tonne vehicles. The new purchases include 60 7.5 tonne vehicles and 17 eight-wheel tippers, which meet Euro Six standards.
The move comes in advance of key environmental proposals being outlined by the Mayor of London, including the extension of the Ultra Low Emissions Zone within the capital.
The business has now invested over £235 million in its materials manufacturing and logistics infrastructure over the past decade. Peter Parle, FM Conway’s transport manager, comments: “Whether it’s investing in plant and vehicle emission technology or cycle safety, FM Conway aims to pave the way on best practice for construction logistics. This latest move will ensure that our vehicle fleet continues to meet the highest environmental standards, helping to improve London’s air quality and supporting our many construction projects in the capital.”
INNOVATION AT WORK
WORKING IN COLLABORATION WITH TRIME UK, FM CONWAY HAS BEEN DEVELOPING A KEY SAFETY FEATURE TO DELIVER INNOVATION IN LIGHTING TOWERS.
One of the business’ teams noticed that it was possible to move the traditional tower plants while extended – posing a risk to teams working in already hazardous nighttime conditions.
As a result, the business has developed an innovative mechanism using sensors which automatically collapse the lighting column if the plant is moved or not mounted securely, removing the risk to the equipment, on-site teams and members of the public.
FM Conway celebrates company-wide successes to kick start 2018
More than 1,000 FM Conway employees came together at the end of January to recognise the business’ successes and look forward to the opportunities ahead.
The Queen Elizabeth II Conference Centre in Westminster temporarily became FM Conway HQ on 26 January as the business assembled for its 2018 company event.
FM Conway chief operating officer, Andrew Hansen, began the day with a keynote address, reporting strong growth for the company following major contract wins, new business acquisitions and partnerships, and key infrastructure investments of £235 million over the past decade.
Headline statistics included news that FM Conway is now among the UK’s top 70 largest private employers, deploying 3,000 people every day. Growth has been a consistent factor in the company’s development, with turnover increasing from £160 million four years ago, to in excess of £300 million this financial year. The aggregates and asphalt division has gone from strength to strength, making the company the second largest asphalt supplier in the south east of England and the sixth largest supplier in the UK.
Central services executive director, Joanne Garwood, also set out some of the business’ continued investment plans, including developing its asphalt plant network and the construction of a new innovation centre to support FM Conway’s research and development work.
The overarching theme for the biennial event was ‘working better together’, emphasising the importance of partnerships and sharing knowledge and expertise across the business to bring benefits for customers and the travelling public. Joanne also unveiled a new scheme designed to encourage employees to put forward their ideas for improving ways of working through the ‘Big Idea’ competition, offering rewards for team members who propose innovations.
Plans to make sure that talented people continue to join FM Conway were outlined, with a new target of creating one apprentice place for every 20 employees in recognition of the essential need to recruit and train the talent that the construction industry requires for the future.
The company event was a fantastic opportunity to bring together all our great people and celebrate another successful two years for the business.
Andrew Hansen
chief operating officer, FM Conway
A major highlight of the day was a presentation from former Formula One world champion Damon Hill, who shared his experiences of how the power of competition and team work can be harnessed for success.
Rounding off the day was a lively Q&A session hosted by chief financial officer David Donnelly, followed by the Pride of Conway Awards to celebrate those employees who have gone the extra mile for FM Conway and its clients.
Andrew Hansen, chief operating officer, commented: “The company event was a fantastic opportunity to bring together all our great people and celebrate another successful two years for the business.
“The talent and skill of our staff is what underpins our great work for customers. Our focus over the next two years will be on continuing to do what we do well and investing in our people and business to ensure that we meet the needs of our customers now and in the future.”
KEEPING UP WITH EUROTUNNEL
FROM RESURFACING ESSENTIAL CONNECTIONS TO FOSTERING BIODIVERSITY, TIGHT PROGRAMMING, SAFETY AND ATTENTION TO DETAIL ARE ESSENTIAL TO CUSTOMER EXPERIENCE AT THE CHANNEL TUNNEL.
By the end of the night, we had transported over 1,200 tonnes of asphalt and had successfully completed the works efficiently but safely within the tight timeframe.
UPGRADING CRITICAL INFRASTRUCTURE
Spanning nearly 32 miles from Kent to Calais, the Channel Tunnel transports 21 million passengers and over 2.5 million cars between the UK and France every year. The railway link also provides a crucial trade connection between the UK and mainland Europe and annually transports over €115 billion of goods.
Working at the Eurotunnel Folkestone terminal in Kent, FM Conway is responsible for an ongoing programme of surfacing and asset management to ensure that this vital connection stays up and running, delivering a seamless and enjoyable experience for Eurotunnel’s passengers.
The nature of the link means that works need to be carefully programmed to minimise disruption. Recently, FM Conway coordinated the resurfacing of the site’s two loading overbridges, which are used to transport freight and passenger vehicles from the terminal down onto the train platforms themselves.
To coincide with Eurotunnel’s bi-national evacuation training day and essential maintenance work, FM Conway needed to deliver the surfacing works within a 12-hour window to ensure the terminal could be reopened once the training day ended. As a result, extensive planning was required to make sure that the project was delivered faultlessly and safely.
Luke Pantrey, surfacing supervisor at FM Conway, explains: “Down to the minute planning was essential to coordinate this extensive project within the course of a single night.
“By self-delivering the entire project – from supplying our 10mm Surepavlt surf 40/60 PSV 60 asphalt; from our plant in Erith to transporting the arisings back for recycling – we were able to ensure that we had complete control of the programme. By the end of the night, we had transported over 1,200 tonnes of asphalt and had successfully completed the works efficiently but safely within the tight timeframe.”
SHAPING THE LANDSCAPE
As well as keeping customers moving en-route to and from the continent, FM Conway’s asset management team is working with Eurotunnel to keep the terminal up and running, while also supporting environmental work on the coastal landscape.
Steve Simmonds, contracts manager at FM Conway, comments: “Our primary job is to ensure that the Eurotunnel service buildings, as well as the main terminals, and the connected road network are kept well maintained at all times to ensure Eurotunnel is able to deliver the best possible customer service to people travelling to and from the continent.”
The contract also covers management of Samphire Hoe – a site of special scientific interest which was reclaimed from the sea using chalk marl from the excavations of the Channel Tunnel. The asset management team maintains the site on an ongoing basis to foster biodiversity and attract indigenous plant and animal life, carrying out drainage works as required to prevent surface water pooling and ensuring the area closely mimics the surrounding landscape.
Steve Simmonds continues: “As part of our contract with Eurotunnel, our team ensures that this popular destination remains accessible and safe for visitors – requiring regular maintenance to manage and shape the landscape as it matures. Together with Eurotunnel, we’re also always looking at ways to improve the environment, introducing new features that boost biodiversity and provide more attractions for the many schools that visit.”
FM CONWAY SOLVES BAKER STREET CHALLENGE WITH TWO WAY TRANSFORMATION
AN AMBITIOUS SCHEME IS SET TO RESTORE THE CHARACTER OF ONE OF LONDON’S MOST FAMOUS STREETS.
Working for Westminster City Council and Transport for London (TfL), FM Conway is delivering a major transformation of the Marylebone road network to balance the needs of motorists, pedestrians and cyclists, by converting Baker Street and its neighbour Gloucester Place to two-way traffic.
Renowned for being home to English literature’s most famous detective, site of the Beatles’ record store and a key property on the Monopoly board, Baker Street is also one of Marylebone’s busiest streets, seeing high traffic volumes heading south towards Oxford Street from the Marylebone Road.
The route was converted to a one-way street in the 1960s in a bid to ease congestion, but changing vehicle dynamics in the area have seen the growth of heavy single-file traffic which can act as a barrier to pedestrians and other road users at peak times.
The £15 million project, which is being supported by the Baker Street Quarter Partnership and the Portman Estate, is seeking to restore the area’s heritage as an accessible and walkable London village.
Michael Hurley, senior supervisor at FM Conway, explains:
“One-way systems can in the right circumstances ease congestion, but in the long term has had the opposite effect in Marylebone – resulting in higher speeds and bonnet-to-bumper traffic that can hamper access for pedestrians.”
“The new two-way scheme has been designed to redress the problem, slowing down traffic to make it easier for pedestrians to cross these streets while also creating simpler and more easily navigable routes for motorists.”
The project is seeing major reconstruction and realignment works at a total of 44 junctions along both Baker Street and Gloucester Place, as well as the series of interconnecting routes that run between them. Such a wholesale transformation of the network has required close coordination between the project partners to ensure the safety of pedestrians, while keeping the area moving. Michael continues:
“The number one priority for the construction programme has been ensuring safe pedestrian access, creating clearly marked routes around the works and alternative crossing points as the road layout itself has changed.
“At the same time, we’ve worked closely with TfL and Westminster City Council over a number of months to coordinate the traffic management programme with other improvements and construction works across the wider area, to ensure that the disruption to motorists is kept to a minimum.”
As well as pedestrians and motorists, improving access for cyclists through Marylebone is a critical part of the project. Advanced stop lines – which enable cyclists to wait safely at the front of queuing traffic – are being introduced at all junctions, while new cycle lanes will connect the area with the wider London Cycle Grid, making it easier for two-wheeled road users to both pass through and visit the area.
The nature of the project and its scale means that constant dialogue with businesses, residents and the wider community has been essential to ensure that the works run smoothly with minimal disruption, as Michael explains:
“Keeping both Baker Street and Gloucester Place accessible to traffic for the majority of the works has been critical to making sure Marylebone remains open for business. We’ve worked closely with local businesses as well as road users to communicate the changes that are taking place on a regular basis.”
The first phase of the project, including replacement of nearly half of the junctions, is now complete and the area is due to open to two-way traffic during early 2019.
CONWAY AECOM IS DELIVERING A MAJOR HIGHWAY MAINTENANCE PROGRAMME WITH RE – A JOINT VENTURE BETWEEN BARNET COUNCIL AND CAPITA – HELPING THE BOROUGH TO MAXIMISE INVESTMENT AND DELIVER LONG-TERM BENEFITS FOR ITS RESIDENTS AND BUSINESSES.
Since 2015, CONWAY AECOM has been working in conjunction with Re (Regional Enterprise) on behalf of Barnet Council to deliver a £50m, five-year Network Recovery Programme (NRP) – a major investment scheme for the borough’s highway network.
At a time when many local authorities face significant budget restraints, the NRP is designed to maximise the borough’s investment and efficiently improve the condition of its road network. The maintenance programme is focused on making intelligent interventions on the network to maximise longevity, saving on costly short-term repairs and ensuring Barnet’s road and pavements can be used for safe, reliable travel in the long term.
John Holliday, contract director at FM Conway, explains: “The NRP is all about doing more with Barnet’s investment and minimising asset management costs in the long run – making full use of state-of-the-art maintenance treatments.”
Under the NRP, CONWAY AECOM has been at the forefront of delivering an extensive carriageway resurfacing and footway reconstruction programme. Following detailed assessments of the borough’s highways, the team has used a variety of treatment types to effectively repair the borough’s roads and pavements, with a focus on future-proofing them. In addition to traditional resurfacing treatment, the wide-scale use of Micro Asphalt, a thin bituminous mix rolled onto the road surface to correct localised imperfections, has extended the life of many roads by up to 10 years.
Re is now celebrating the completion of 1,000,000 square metres of highway resurfacing works since the start of the NRP in 2015 – marking a significant achievement and key milestone for both Re, CONWAY AECOM and Barnet Council.
In addition to the network recovery plan, CONWAY AECOM has been working on several complementary schemes focused on improving the borough’s transport network.
**Proactive Patching Programme (PPP)**
As part of Barnet Council’s ‘Taking Care of Neighbourhoods’ campaign to keep the borough clean and green and improve travel connections, CONWAY AECOM’s Rhinopatch machine has been used extensively on the borough’s roads to accurately repair potholes. Using infrared heating technology, the machine provides the council with a cost-effective way of repairing its roads.
**Bus stop improvements**
In partnership with Transport for London (TfL), Re and CONWAY AECOM are working to improve Barnet’s bus stops to make buses more accessible, reduce congestion and improve air quality.
The improvements to the borough’s bus stops include correcting kerb heights and re-laying footways to provide better transfer to buses for disabled passengers. To date, 35 improvements have been carried out to bus stops in Barnet, with a total of 85 planned for this financial year.
Residents have been kept informed at every stage of the improvement programme, with a key emphasis on minimising disruption and delays on the borough’s bus network as such an important part of its transport infrastructure.
---
The NRP is all about doing more with Barnet’s investment and minimising asset management costs in the long run – making full use of state-of-the-art maintenance treatments.
**JOHN HOLLIDAY**
contract director,
FM Conway
RAISING THE BAR AT GREENFORD FLYOVER
COMPLEX WORKS ON LONDON’S A40 WESTERN AVENUE HAVE CALLED FOR AN INNOVATIVE AND HIGHLY TECHNICAL APPROACH FROM THE ASSET MANAGEMENT TEAM.
FM Conway’s asset management team has been working closely with Transport for London (TfL) to deliver a technically challenging flyover renewal scheme on one of London’s main strategic roads, the A40.
As part of the company’s London Highways Alliance Contract (LoHAC) with TfL and its JV partner AECOM, the brief for the FM Conway team was to replace 24 bearings and the internal deck drainage system on the A40 Greenford Roundabout Flyover. This key piece of infrastructure serves thousands of drivers travelling in and out of London every day, so it has been vital to minimise disruption for the public during the works.
Contracts manager Ismet Sakajani explains: “The Greenford Roundabout Flyover sits on a primary route into the capital. Built in 1979, the structure’s bearings and drainage systems have deteriorated over many years and were in critical need of repairs. The challenge for us was to keep it open while undertaking these works.”
The solution chosen by the team has had the dual benefit of not only allowing the flyover to remain open, but also bringing forward the targeted completion date for the project by working closely with TfL’s engineering team. Using heavy-duty temporary props, FM Conway has been able to lift the bridge deck up to 2.5mm off its existing bearings, working with the wider CONWAY AECOM team to carefully monitor the loadings on the bridge while the old bearings are replaced with new.
Ismet explains the process so far: “The temporary props need a solid foundation on which to sit, so before we began the replacement work we excavated down to the flyover’s pile caps – down to a depth of three metres in some places. We then put the steel props in place, fixing them to the bridge soffit. The next stage was to lift the bridge deck using hydraulic power and lock the props in place.”
The team is using hydro demolition technology on the top of the concrete columns to remove the old bearings. Once removed, a new bearing is then drilled into the existing socket and secured with concrete and a final layer of grout to fill any air pockets between the bearing and the concrete.
“It’s a delicate process which requires constant dialogue between the different team members,” says Ismet. “By using these modern technologies, however, we’ve been able to keep the flyover open to drivers and are on schedule to complete the works in early April, four weeks ahead of TfL’s original completion date.”
Philip Gray, TfL’s Structures Team Leader, says: “CONWAY AECOM’s method of construction ensured minimal impact on the network, allowing London to keep moving whilst undertaking a technically challenging project and ensure Greenford Roundabout Flyover continues to perform well into the future.”
FM Conway launches new five-year health and safety strategy
The business has developed a new health and safety strategy to ensure that its employees, partners and the public continue to go home healthy and safe at the end of the day.
Health and safety is a core pillar of FM Conway’s business model. As part of its continued efforts to ensure people always come first, the business has been designing a new five-year health and safety strategy.
FM Conway’s director of safety, health, environment and quality (SHEQ), Andrew Cox, explains: “Meeting the highest health and safety standards isn’t just a corporate target for us, it’s central to the way we operate, underpinning our core values.
“Our teams work across technically demanding projects, often in heavily-trafficked areas and in close proximity to the public, so it’s vital that we continually evolve our approach and keep up with the latest industry best practice.”
FM Conway has been consulting with its employees to develop the renewed strategy, which seeks to create an environment in which staff feel confident to speak up and take responsibility for others’ wellbeing as well as their own.
The strategy places attention on the importance of safeguarding employees’ mental wellbeing and long-term health as well as tackling immediate safety hazards. Planned campaigns will address and raise awareness of long-term impacts including those from noise and dust.
Andrew adds: “We have a series of strategic initiatives and campaigns planned to help keep health and safety in its broadest sense front and mind for all our staff. This includes a mental health campaign and the creation of a Green Flag scheme to recognise those sites across the business that are meeting best practice.
“We’re also extending our professional driver recognition scheme, which awards individual drivers with gold, silver and bronze hardhats for meeting and exceeding behaviours that the company values, such as customer satisfaction reports, near miss reporting and defect reporting – all linked back to our core values across the company.”
FM Conway will be continuing to consult with employees on the new strategy over the coming months.
FM Conway is helping to open up a strategic regeneration site in West London, delivering vital civil engineering works for Berkeley West Thames’ Southall Waterside development.
UNLOCKING SOUTHALL WATERSIDE
Berkeley West Thames’ Southall Waterside scheme is set to be one of London’s most exciting new residential developments. Due to deliver 3,750 new homes in West London as well as a range of community amenities, FM Conway is playing a key role in opening up the site to kickstart construction on this major regeneration project.
The development sits alongside the Great Western Railway between the Grand Union Canal and Southall Station in the London Borough of Ealing. It was formerly home to the Southall Gasworks which closed in the 1970s, leaving an underutilised and largely inaccessible 88-acre area of land.
The brief for the FM Conway team is therefore to open up the site by constructing two new bridges – a 42-metre span structure over the Grand Union Canal and a 24-metre concrete bridge over Yeading Brook – as well as a 400-metre road to provide vehicle and pedestrian access from the western side of the development.
FM Conway’s project manager Derek Daly explains: “the construction of the new bridges and road is the vital first step in kick-starting the development. Once they are in place, Berkeley West Thames can open up the Southall Waterside scheme to wider construction traffic, and begin really transforming the site.
“Our focus has been on careful phasing of the Western access works, delivering as much of the project in parallel with other preliminary construction activity as possible to cut down timescales.”
Alongside detailed planning, FM Conway’s programme has been boosted by the fact that the majority of the construction materials for the scheme can be sourced from the business’ Heathrow asphalt plant, which lies less than half a mile west of the site.
“It’s a complex programme and having the Heathrow plant so close has been a major benefit,” says Derek. “It not only gives us full control over our materials supply chain but also cuts down the need for storage on the constricted site. In delivering the earthworks for the new structures, we’ve actually been able to import materials by barge on the canal, saving time as well as reducing vehicle movements in the local area.”
The knowledge, enthusiasm, skill and effort of the whole FM Conway team has been vital to keeping the programme on track and meeting the technical challenges of the works.
DEREK DALY
project manager,
FM Conway
The nature of the scheme has created a number of technical challenges, calling for FM Conway to think innovatively to deliver the critical works.
In particular, construction of the new bridge over the Grand Union Canal required complex programming to complete the structure against tight timescales and with limited access. The four 43.5 metre steel girders for the bridge, weighing in at a massive 75 tonnes, were manufactured offsite for greater efficiency and while work to secure 116 sheet piles 7.5 metres into the canal to support the structure was underway. Again, as a result of limited access the decision was taken by the team to install the piles from the water using pontoons, saving valuable programme time.
The works were further complicated by the close proximity of the Great Western rail line, requiring extra close attention to be paid to the construction process to ensure the safety of those on site and prevent any obstruction of the railway.
Physical infrastructure has not been the only concern. The construction of the access road has entailed the merging of two waterways via a large-scale diversion under the Yeading Brook bridge into a neighbouring waterway, the River Crane. A carefully planned fish rescue process has ensured that local wildlife haven’t been affected by the works.
“It’s a challenging but exciting project to be involved in – it’s not often that you get to play such a key role in helping to regenerate a major part of London!” says Derek.
“The knowledge, enthusiasm, skill and effort of the whole FM Conway team has been vital to keeping the programme on track and meeting the technical challenges of the works. The support of Berkeley’s team has also been invaluable, particularly in helping to coordinate the complex stakeholders involved in the works, including the Canal & River Trust and the Environment Agency to name just a few.”
The enabling works are due to be completed in May this year, paving the way for the next chapter of Southall Waterside’s bright future.
What does FM Conway’s lighting team do?
We look after eight major lighting contracts across London, covering 160,000 lighting units. The scope of these varies but our work focuses on asset management, routine and reactive maintenance as well as lighting installation. We also offer artistic and architectural lighting services.
Lighting is a key part of FM Conway’s end-to-end offer for customers so we work closely with our term maintenance, civils and structures teams. Just some of the high-profile schemes that we support include the London Highways Alliance Contract with Transport for London for the North West of the city, and a large-scale public realm renewal scheme for Bond Street for Westminster City Council.
What are the key challenges for customers at present?
Two major challenges for our public sector clients are reducing carbon footprint and managing falling revenue budgets. Our job is to help customers to reduce energy use by employing new technologies while making their capital investment go further.
These challenges often go hand in hand and one of the ways that we’ve been helping the London Borough of Bexley to cut energy use and carbon, as well as maximise investment in the borough’s lighting assets is through the installation of LED luminaires. It’s part of a ‘spend to save’ model that we’ve helped them to create. LED luminaires use up to 60 per cent less energy than traditional lanterns and have a typical lifespan of 50,000 hours, reducing long-term maintenance costs by 30 per cent.
LEDs are one important part of solving local authorities’ dilemma. The other is better mapping of assets to create a data inventory which clients can use to anticipate renewal and maintenance costs. It’s a proactive approach and we look at age profiling of assets, energy reporting and condition surveys, using this information to create detailed degradation models, maintenance management plans and budget forecasts.
Lighting is a key part of FM Conway’s end-to-end offer for customers so we work closely with our term maintenance, civils and structures teams.
Graham Cartledge
Director of Lighting, FM Conway
How is the skills challenge affecting the lighting sector?
FM Conway’s lighting team has grown rapidly in recent years and we’re now just under 90 strong, but it’s no secret that the skills challenge is a concern for us. As the construction industry grapples with an ageing workforce, we need to work harder to get young people interested in lighting careers. We work with the business’ recruitment, learning and development teams to get people into the division as well as upskill existing staff.
We’re committed to the Highway Electrical Association compliance scheme, which is the industry standard training programme, and many of our operatives are working towards an NVQ/CBQ qualification. We’re also setting up a new mentoring scheme to share practical and business skills and in line with our focus on cost efficiency, one of our trainee quantity surveyors will be the first to benefit from this.
How do you see the lighting sector evolving over the next few years?
It’s an exciting time to be in lighting. New technologies are reshaping our industry and we’re at the heart of enabling the move towards smart cities. Just some of the initiatives that we’re working on include the installation of smart lighting columns that house electric vehicle charging technology. We’re also looking at ‘small cells’ technology which boosts 4G mobile signal and will eventually support 5G in urban areas.
Beyond the public realm, the Internet of Things (IoT) has the potential to improve building safety and compliance. We’re looking at how IoT can enable remote monitoring of emergency lighting and the detection of fire, smoke and carbon monoxide. There’s also the potential to use it to reduce energy usage in buildings by remotely controlling and monitoring appliances.
FM Conway’s employees are at the heart of its success, and it is their ongoing dedication and commitment that ensures that the company continues delivering great work. At the business’ biennial company event this year, Joanne Garwood, central services executive director, presented the ‘Pride of Conway’ awards to recognise those outstanding employees who have gone above and beyond for FM Conway and its customers.
The awards recognised employees from all sectors of the business, from people working in frontline delivery to those providing crucial support services for the company and its clients.
**THIS YEAR’S WINNERS:**
**AARON MANNING**
**PRIDE OF CONWAY AWARD**
Aaron Manning was the ‘Pride of Conway’ winner. Aaron has been an employee at FM Conway for over 10 years. He brings commitment and creativity to everything that he does, whether developing occupational health training videos or improved manual handling devices for the term maintenance team. Aaron’s friendly personality means that he is respected and liked throughout the business. He is a real asset to FM Conway.
**MALCOLM NOAKES**
**GOING THE EXTRA MILE AWARD**
Malcolm Noakes was crowned the winner of the ‘Going the Extra Mile’ award after assisting in a major traffic accident. Travelling on his way to work, Malcom stopped to give first aid treatment to victims of a road traffic incident prior to the arrival of the emergency services and was praised by paramedics for his quick action.
Highly commended was Brandon Taggart.
**STEWART MARTIN**
**HEALTH AND SAFETY AWARD**
Stewart Martin, divisional compliance manager, was awarded the health and safety prize after developing the ‘Near Miss Top 10’ concept. This simple but crucial initiative communicates the 10 most important near misses flagged by employees to the entire business, ensuring that all staff can take action to prevent potentially harmful incidents occurring in the future.
Highly commended were George Palaghiu and Catalin Livadariu.
Jason Ward secured the ‘Apprentice of the Year’ award. Jason’s hard work and dedication resulted in him graduating a year early from FM Conway’s apprenticeship programme and he has now moved into a permanent position at the business as an accredited traffic management operative.
Kwasi Mensah was named as the ‘Mentor of the Year’. He is committed to developing the skills of his younger colleagues and is constantly looking for new opportunities to help them become well-rounded employees.
Jackie Goddard, part of the front of house team at FM Conway head office, was voted this year’s winner of the Player’s Player award by over 1,000 employees who attended the company event for her friendly, courteous and professional manner with clients and staff. Christy Madden, Nick Howard, Terry Snelling and Matt Moore were all shortlisted.
Dean Hales took home the innovation award after coming up with a system to make lighting towers safer. Used widely by the business during nighttime works, Dean noticed that the towers could be moved while extended, posing a health and safety risk. His idea of a system which automatically collapses the towers if they are moved or not mounted securely has been developed with Trime UK and is helping to keep people safe across the company.
Highly commended were Nick Howard and Matt Moore.
Highly commended were Terry Whybrow and Tony Stevens.
FM Conway Ltd
Conway House
Vestry Road
Sevenoaks
Kent
TN14 5EL
Tel: 01732 600 700
www.fmconway.co.uk
@FMConwayLtd | 0.6 | medium | 7 | 8,104 | [
"advanced basics"
] | [
"advanced research"
] | [
"science",
"technology",
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.35,
"depth": 0.65,
"creativity": 0.35
} |
17988f11-8097-4c20-a74d-d2f9a71a0027 | island Redonda, owned Antigua | science | historical_context | The island of Redonda, owned by Antigua and Barbuda, is a beautiful, forbidding rock in the Lesser Antillean Islands. It is home to three endemic species of lizards: an anole (Anolis nubilus), a ground lizard (Pholidoscelis atrata), and and as of yet unnamed Sphaerodactylus dwarf gecko.
Until 2017, the island was also overrun with rats and goats, introduced to the island by humans over a century ago. These rats and goats had denuded the island of vegetation and were threatening the birds and lizards living on the island. The government of Antigua and Barbuda decided to eradicate the mammals and my team and I were brought on to gather baseline data on the natural history of the lizards to determine how they evolve after the eradication and as the islands recover. | 0.55 | medium | 4 | 178 | [
"scientific method",
"basic math"
] | [
"advanced experiments"
] | [
"social_studies"
] | {
"clarity": 0.4,
"accuracy": 0.5,
"pedagogy": 0.3,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.4
} |
c95fafe0-a687-4a09-a947-f58cf62cc9e6 | EDT601 Instructional Design | arts_and_creativity | comparative_analysis | EDT601 Instructional Design
Overview and application of the instructional design (ID) process. Topics include learning theories and how they relate to ID, design of needs assessment, analysis of subject matter content, development of effective learning objectives, design of instructional strategies, online collaboration, integration of online delivery systems, and assessment and evaluation strategies.
- Compare the advantages and disadvantages of the Rapid Approach to Instructional Design with other ID methods.
- Differentiate between the five steps of the ADDIE model and evaluate how they work together in the creation of effective instructional design.
- Rate the strengths and weaknesses of at least three different Instructional Design Models and define which type of Instructional Design each is best suited for.
- Conduct a performance gap assessment on a problem and use the results to determine the best method for addressing the problem.
- Discuss the importance of well-defined learning objectives in creating effective instructional design.
- Write clear and concise learning objectives which are useful, observable, assessable, and written in performance terms.
- Compare at least three different Learning Management Systems (LMS) and differentiate between the advantages and disadvantages of each.
- Analyze the design of an online course by assessing what elements are used effectively and why, and what elements need improvement and how they could be improved. | 0.65 | medium | 4 | 262 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"technology"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.35,
"creativity": 0.3
} |
b29e2318-d189-41ea-8fd2-1c8c65494a2b | |Part Battle Bulge World | interdisciplinary | historical_context | |Part of the Battle of the Bulge and World War II|
Murdered American soldiers at Malmedy (picture taken on January 14, 1945)
|Date||December 17, 1944|
|Mass murder by firing squad|
|Deaths||84 American POWs of the 285th Field Artillery Observation Battalion|
The Malmedy massacre was a war crime committed by members of Kampfgruppe Peiper (part of the 1st SS Panzer Division), a German combat unit led by Joachim Peiper, at Baugnez crossroads near Malmedy, Belgium, on December 17, 1944, during the Battle of the Bulge. According to numerous eyewitness accounts, 84 American prisoners of war were massacred by their German captors: the prisoners were assembled in a field and shot with machine guns.
The term Malmedy massacre also applies generally to the series of massacres committed by the same unit on the same day and following days, which were the subject of the Malmedy massacre trial, part of the Dachau Trials of 1946. The trials were the focus of some controversy.
Hitler's main objective for the Battle of the Bulge was for the 6th SS Panzer Army commanded by General Sepp Dietrich to break through the Allied front between Monschau and Losheimergraben, cross the Meuse River, and capture Antwerp.:5 Kampfgruppe Peiper, named after and under the command of SS-Obersturmbannführer Joachim Peiper, was composed of armoured and motorised elements and was the spearhead of the left wing of the 6th SS Panzer Army. Once the infantry had breached the American lines, Peiper's role was to advance via Ligneuville, Stavelot, Trois-Ponts, and Werbomont and seize and secure the Meuse bridges around Huy.:260+ The best roads were reserved for the bulk of the 1st SS Panzer Division Leibstandarte SS Adolf Hitler. Peiper was to use secondary roads, but these proved unsuitable for heavy armoured vehicles, especially the Tiger II tanks attached to the Kampfgruppe. The success of the operation depended on the swift capture of the bridges over the Meuse. This required a rapid advance through US positions, circumventing any points of resistance whenever possible. Another factor Peiper had to consider was the shortage of fuel: the fuel resources of the Reich had been greatly reduced since the fall of Romania.
Hitler ordered the battle to be carried out with a brutality more common on the Eastern Front, in order to frighten the enemy. Sepp Dietrich confirmed this during the war crimes trial after the war ended. According to one source, during the briefings before the operation, Peiper stated that no quarter was to be granted, no prisoners taken, and no pity shown towards Belgian civilians.
Peiper advances west
|Wikisource has original text related to this article:|
The Germans' initial position was east of the German-Belgium border and the Siegfried Line near Losheim. SS-Oberstgruppenführer Sepp Dietrich's plan was for the Sixth Panzer to advance northwest through Losheimergraben and Bucholz Station and then drive 72 miles (116 km) through Honsfeld, Büllingen, and a group of villages named Trois-Ponts, to connect to Belgian Route Nationale N23, and cross the River Meuse.:70
Peiper had planned to use the Lanzerath-Losheimergraben road to advance on Losheimergraben immediately following the infantry, who were tasked with capturing the villages and towns immediately west of the International Highway. Unfortunately for the Germans, during their retreat earlier in the year they had destroyed the Losheim-Losheimergraben road-bridge over the railway, which prevented their use of this route. A rail overpass they had planned to use could not bear the weight of the German armour, and German engineers were slow to repair the Losheim-Losheimergraben road, forcing Peiper's vehicles to take the road through Lanzerath to Bucholz Station.:34 Peiper's forces were delayed by massive traffic jams behind the front.
But German military operations on the northern front, the key route for the entire Battle of the Bulge, was troubled by unexpectedly obstinate resistance from American troops. A single platoon of 18 men belonging to an American reconnaissance platoon and four US Forward Artillery Observers held up a battalion of about 500 German paratroopers in the village of Lanzerath, Belgium for almost an entire day.:34 Peiper's entire timetable for his advance towards the River Meuse and Antwerp was seriously slowed, allowing the Americans precious hours to move in reinforcements.
The German 9th Fallschirmjäger Regiment, 3rd Fallschirmjäger Division finally flanked and captured the American platoon at dusk, when they ran low on ammunition and were planning to withdraw. Only one American, a forward artillery observer, was killed, while 14 were wounded: German casualties totalled 92. The Germans paused, believing the woods were filled with more Americans and tanks. Only when Peiper and his tanks arrived at midnight, twelve hours behind schedule, did the Germans learn the woods were empty.
First massacre at Büllingen
At 4:30 on December 17, more than 16 hours behind schedule, the 1st SS Panzer Division rolled out of Lanzerath and headed east for Honsfeld. After capturing Honsfeld, Peiper left his assigned route for several kilometres to seize a small fuel depot in Büllingen, where members of his force killed several dozen American POWs.
Unknown to Peiper, he was in a position to flank the 2nd and the 99th Infantry Divisions: had his troops advanced north from Büllingen towards Elsenborn, they may have been able to flank and trap the American units. But Peiper followed orders. He was more determined to advance west and he stuck to his Rollbahn towards the Meuse River and captured Ligneuville, bypassing Mödersheid, Schoppen, Ondenval, and Thirimont.
The terrain and poor quality of the roads made his advance difficult. Eventually, at the exit of the small village of Thirimont, the spearhead was unable to take the direct road toward Ligneuville. Peiper again deviated from his planned route. Rather than turn left, the spearhead veered right and advanced towards the crossroads of Baugnez, which is equidistant from Malmedy, Ligneuville, and Waimes.
Massacre at Baugnez crossroads
Between noon and 1 pm, the German spearhead approached the Baugnez crossroads, two miles south-east of Malmedy. An American convoy of about thirty vehicles, mainly elements of B Battery of the American 285th Field Artillery Observation Battalion, was negotiating the crossroads and turning right toward Ligneuville and St. Vith, where it had been ordered to join the 7th Armored Division. The spearhead of Peiper’s group spotted the American convoy and opened fire, immobilising the first and last vehicles of the column and forcing it to halt. Armed with only rifles and other small arms, the Americans surrendered to the German tank force.
The armoured column led by Peiper continued west toward Ligneuville. The German troops left behind assembled the American prisoners in a field along with other prisoners captured earlier in the day. Many of the survivors testified that about 120 troops were standing in the field when, for unknown reasons, the SS troops suddenly opened fire with machine guns on the prisoners.
As soon as the SS machine gunners opened fire, the POWs panicked. Some tried to flee, but most were shot where they stood. Some dropped to the ground and pretended to be dead. SS troops walked among the bodies and shot any who appeared to be alive. A few sought shelter in a café at the crossroads. The SS soldiers set fire to the building and shot any who tried to escape.
Several POWs later testified that a few of the prisoners had tried to escape, and others claimed that some prisoners had picked up their previously discarded weapons and shot at the German troops when they attempted to continue toward Ligneuville.[unreliable source?]
A few survivors emerged from hiding shortly afterwards and returned through the lines to nearby Malmedy, where American troops still held the town. Eventually, 43 survivors emerged, some who had taken shelter with Belgian civilians. The first survivors of the massacre were found by a patrol from the 291st Combat Engineer Battalion at about 2:30 p.m. the same day. The survivors were interviewed soon after they returned to American lines. Their stories were consistent and corroborated each other, although they had not had a chance to discuss the events with each other. The inspector general of the First Army learned of the shootings about three or four hours later. By late evening of the 17th, rumours that the enemy was killing prisoners had reached the forward American divisions.
One US unit issued orders that "No SS troops or paratroopers will be taken prisoner but will be shot on sight.":261–264 Some American forces may have killed German prisoners in retaliation, like the shooting of German prisoners that took place at Chenogne on January 1, 1945.:261–264
The Baugnez crossroads was behind German lines until the Allied counter-offensive in January. On January 14, 1945, US forces reached the crossroads and massacre site. They photographed the frozen, snow-covered bodies where they lay, and then removed them from the scene for identification and detailed post mortem examinations. The investigation was focused on documenting evidence that could be used to prosecute those responsible for the apparent war crime. Seventy-two bodies were found in the field on January 14 and 15, 1945. Twelve more, lying farther from the pasture, were found between February 7 and April 15, 1945.[unreliable source?]
About 20 of the 84 bodies recovered showed head wounds consistent with a coup de grâce leaving powder burn residue, indicating a closely administered and deliberate shot to the head at point-blank range consistent with a massacre and not self-defense or injuries inflicted while attempting to escape. The bodies of another 20 showed evidence of small-caliber gunshot wounds to the head but didn't display powder-burn residue. Some bodies showed only one wound, in the temple or behind the ear. Ten other bodies showed fatal crushing or blunt-trauma injuries, most likely from rifle butts. The head wounds were in addition to bullet wounds made by automatic weapons. Most of the bodies were found in a very small area, suggesting the victims were gathered close together before they were killed.iii[›]
Peiper advances west
The opening forced through the American lines by Kampfgruppe Peiper was marked by other murders of prisoners of war, and later of Belgian civilians. Members of his unit killed at least eight other American prisoners in Ligneuville.
Further massacres of POWs were reported in Stavelot, Cheneux, La Gleize, and Stoumont, on December 18, 19 and 20. Finally, on December 19, 1944, between Stavelot and Trois-Ponts, German forces tried to regain control of the bridge over the Amblève River in Stavelot, which was crucial for receiving reinforcements, fuel, and ammunition. Peiper’s men killed about 100 Belgian civilians.
American Army engineers blocked Peiper's advance in the narrow Amblève River valley by blowing up the bridges. Additional US reinforcements surrounded the Kampfgruppe in Stoumont and la Gleize. Peiper and 800 of his men eventually escaped this encirclement by marching through the nearby woods and abandoning their heavy equipment, including several Tiger II tanks.:376ff
On December 21, during the battle around La Gleize, the men of Kampfgruppe Peiper captured an American officer, Major Harold D. McCown, who was leading one of the battalions of the 119th US Infantry Regiment.:365ff Having heard about the Malmedy massacre, McCown personally asked Peiper about his fate and that of his men. McCown testified that Peiper told him neither he nor his men were at any risk and that he (Peiper) was not accustomed to killing his prisoners. McCown noted that neither he nor his men were threatened in any manner, and he testified in Peiper's defence during the 1946 trial in Dachau. As was pointed out at trial however, by the time Col. McCown (having been promoted since) was captured near La Gleize on December 21, Peiper's tactical situation had deteriorated and he knew that he and his men were likely to be taken prisoner themselves. On December 17 at Malmedy, Peiper's unit was still advancing aggressively and had hope of reaching its objective, whereas by December 21 at La Gleize, he was nearly cut off, out of fuel, and had sustained over 80% casualties. Peiper kept Col. McCown and others essentially as bargaining chips as his unit fled La Gleize on foot, only for Col. McCown to escape in the confusion.
Once re-equipped, Kampfgruppe Peiper rejoined the battle, and other killings of POWs were reported on December 31, 1944, in Lutrebois, and between January 10 and 13, 1945, in Petit Thier, where killings were personally ordered by Peiper. The precise number of prisoners of war and civilians massacred attributable to Kampfgruppe Peiper is still not clear. According certain sources, 538 to 749 POWs had been the victims of war crimes perpetrated by Peiper's men. These figures are not corroborated by the report of the United States Senate subcommittee that later inquired into the subsequent trial; according to the Committee. According to this report, the count of POWs or civilians killed at different places is as follows:
|Place||Prisoners of war killed||Civilians killed|
Aftermath and trial
On January 13, 1945, American forces recaptured the site where the killings had occurred. The cold had preserved the scene well. The bodies were recovered on January 14/15, 1945. The memorial at Baugnez bears the names of the murdered soldiers.
In addition to the effect the event had on American combatants in Europe, news of the massacre greatly affected the United States. This explains why the alleged culprits were deferred to the Dachau Trials, which were held in May and June 1946, after the war.
In what came to be called the "Malmedy massacre trial", which concerned all of the war crimes attributed to Kampfgruppe Peiper during the Battle of the Bulge, the highest-ranking defendant was General Sepp Dietrich, commander of the 6th SS Panzer Army, to which Peiper’s unit had belonged. Joachim Peiper and his principal subordinates were defendants. The tribunal tried more than 70 persons and pronounced 43 death sentences (none of which were carried out) and 22 life sentences. Eight other men were sentenced to shorter prison sentences.
After the verdict, the way in which the court had functioned was disputed, first in Germany (by former Nazi officials who had regained some power due to anti-Communist positions with the occupation forces), then later in the United States (by Congressmen from heavily German-American areas of the Midwest). The case was appealed to the Supreme Court of the United States, which made no decision. The case then came under the scrutiny of a sub-committee of the United States Senate.
This drew attention to the trial and the judicial irregularities that had occurred during the interrogations that preceded the trial. But, before the United States Senate took an interest in this case, most of the death sentences had been commuted, because of a revision of the trial carried out by the US Army. The other life sentences were commuted within the next few years. All the convicted war criminals were released during the 1950s, the last one to leave prison being Peiper in December 1956.
A distinct case about the war crimes committed against civilians in Stavelot was tried on July 6, 1948, in front of a Belgian military court in Liege, Belgium. The defendants were 10 members of Kampfgruppe Peiper; American troops had captured them on December 22, 1944, near the spot where one of the massacres of civilians in Stavelot had occurred. One man was discharged; the others were found guilty. Most of the convicts were sentenced to 10 years' imprisonment; two officers were sentenced to 12 and 15 years.
Death of Peiper
Peiper chose to live in France following his 1956 release from jail and settled in Traves. A former Communist resistance member in that region identified him in 1974 and notified the French Communist Party. In 1976 a Communist historian found the Peiper file in the STASI archives. On June 21, tracts denouncing his presence were distributed in the village. A day later, an article in the Communist publication L'Humanité revealed Peiper's presence in Traves, and he received death threats. Because of the death threats, Peiper sent his family back to Germany, but he remained in Traves. During the night of July 13/14, 1976, a gunfight took place at Peiper's house and it was set on fire. Peiper's charred corpse was later found in the ruins with a bullet in his chest. The perpetrators were never identified, but were suspected to be former members of the World War II French Resistance or Communists. Peiper had just started writing a book about Malmedy and what followed.
- List of massacres in Belgium
- Wereth Massacre, the torture and killing of 11 African-American prisoners of war in Wereth, committed by 1st SS Panzer Division on the same day.
^ i: In Cole's history of World War II, footnote 5 on page 264 reads, Thus Fragmentary Order 27. issued by Headquarters, 328th Infantry, on December 21 for the attack scheduled the following day says: "No SS troops or paratroopers will be taken prisoner but will be shot on sight."
- Cole, Hugh M. (1965). "Chapter V: The Sixth Panzer Army Attack". The Ardennes. United States Army in World War II, The European Theater of Operations. Washington, D.C.: Office of the Chief of Military History.
- MacDonald, Charles (1984). A Time For Trumpets: The Untold Story of the Battle of the Bulge. Bantam Books. ISBN 0-553-34226-6.
- Émile Engels, ed. (1994). Ardennes 1944–1945, Guide du champ de bataille (in French). Racine, Bruxelles.
- Gallagher, Richard (1964). Malmedy Massacre. Paperback Library. pp. 110–111.
- Kershaw, Alex (October 30, 2005). The Longest Winter: The Battle of the Bulge And the Epic Story of World War II's Most Decorated Platoon. Da Capo Press. p. 330. ISBN 0-306-81440-4.
- Cavanagh, William (2005). The Battle East of Elsenborn. City: Pen & Sword Books. ISBN 1-84415-126-3.
- Reynolds, Michael (February 2003). Massacre At Malmédy during the Battle of the Bulge. World War II Magazine. Archived from the original on March 7, 2007.
- Review and Recommendation of the Deputy Judge Advocate for War Crimes. October 20, 1947. pp. 4–22.[permanent dead link]
- Cole (1965). Statement of General Lauer "the enemy had the key to success within his hands, but did not know it."[page needed]
- Wholesale Slaughter at Baugnez-lez-Malmedy, Willy D. Alenus Archived May 5, 2007, at the Wayback Machine
- Glass, Lt Col Scott T. (November 22, 1998). "Mortuary Affairs Operations at Malmedy". Centre de Recherches et d'Informations sur la bataille des Ardennes. Archived from the original on September 27, 2007. Retrieved March 22, 2007.
- Glass, MAJ Scott T. "Mortuary Affairs Operations At Malmedy—Lessons Learned From A Historic Tragedy".
- Roger Martin, L'Affaire Peiper, Dagorno, 1994, p. 76
- Toland, John (December 1959). The Brave Innkeeper of 'The Bulge'. Coronet Magazine. Archived from the original on August 8, 2007.
- Kent, Capt John E. "Stavelot, Belgium, 17 to 22 December 44". Centre de Recherches et d'Informations sur la Bataille des Ardennes. Archived from the original on August 8, 2007.
- Lebeau, Guy. "Sad souvenirs or life of the people of Stavelot during the winter of 1944–1945". Centre de Recherches et d'Informations sur la Bataille des Ardennes. Archived from the original on September 27, 2007.
- Goldstein, Donald M.; Dillon, Katherine V.; Wenger, J. Michael (1994). Nuts!: The Battle of the Bulge: The Story and Photographs. London: Brassey's. pp. 167–182.
- Malmedy massacre Investigation–Report of the Subcommittee of Committee on Armed Services. United States Senate Eighty-first Congress, first session, pursuant to S. res. 42, Investigation of action of Army with Respect to Trial of Persons Responsible for the Massacre of American Soldiers, Battle of the Bulge, near Malmedy, Belgium, December 1944. October 13, 1949.
- Parker, Danny S. (August 13, 2013). "Fatal Crossroads: The Untold Story of the Malmedy Massacre at the Battle of Bulge" (paperback ed.). Da Capo Press. p. 239. ISBN 978-0306821523.
- Westemeier, Jens (2007). Joachim Peiper: A Biography of Himmler's SS Commander. Schiffer Publications. ISBN 978-0-7643-2659-2.
- Steven P. Remy, The Malmedy Massacre: The War Crimes Trial Controversy (Harvard University Press, 2017), x, 342 pp.
- Mortuary Affairs Operations At Malmedy – Lessons Learned From A Historic Tragedy, by Major Scott T. Glass. Quartermaster Professional Bulletin, Autumn 1997
- Battle of the Bulge on the Web, Malmedy Massacre resources
- "Massacre at Malmédy during the Battle of the Bulge" (reprint of an article in World War II by M. Reynolds)
- Gettysburg Daily article on 65th anniversary of the Malmedy Massacre.
- Fatal Crossroads: The Untold Story of the Malmédy massacre at the Battle of the Bulge, Book by Danny S. Parker, November 2011 | 0.7 | medium | 6 | 5,290 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"life_skills"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.55,
"depth": 0.65,
"creativity": 0.35
} |
c5310101-9c42-4e18-80d7-d3f27683da6a | El Paso Earth Month | interdisciplinary | historical_context | El Paso Earth Month
10 Easy Eco-Friendly Earth Month Tips!
You can also download the flyer.
- Invest in local food! Growing your own food, or purchasing from the farmer’s market, can help reduce your food miles, which contributes to improved air quality. Find out more at our Local Food Page.
- Compost! Yard trimmings & food residuals alone constitute 24% of the U.S. municipal solid waste stream1; composting is a sustainable way to help reduce waste and benefit the environment, plus compost is a great fertilizer. Find out more at our Garden EP Page.
- Calculate your carbon footprint both individually & for your home. A carbon footprint is the amount of carbon dioxide and other carbon compounds emitted due to the consumption of fossil fuels by a particular person, group, etc. Find out how at our Carbon Footprint Page.
- Use alternative transportation! Using public transportation, carpooling, biking or walking on your way to and from work saves energy and reduces carbon dioxide emissions and other pollutants. Leaving your car at home just 2 days a week can reduce carbon pollution by an average of two tons per year.2 Find out more at our Get Involved Page.
- Wash your clothes in cold water. It’s an easy way to save energy and prevent carbon pollution. Hot water heating accounts for about 90% of the energy your washing machine uses to wash clothes.3
1. EPA. https://blog.epa.gov/blog/2015/09/urban-composting-its-always-worth-it/
2. EPA. https://blog.epa.gov/blog/tag/earth-month-tips/
3. EPA. https://blog.epa.gov/blog/tag/earth-month-tips/
- Reduce, reuse, recycle. What does this mean? The best way to manage waste is to not produce it in the first place, like printing dual sided, or avoiding purchasing disposable goods. Use reusable products instead of purchasing one-time use products, like bottled water. Learn what, how, and where to recycle in El Paso, and invest in recycled products! Find out more about recycling in El Paso at the El Paso Recycling Page.
- Plant a tree. A single tree can absorb up to 2,000 pounds of carbon dioxide over its lifetime. Find out more on our Desert Canopy Page.
- Start a garden. Plants act as highly effective air cleaners, absorbing carbon dioxide, plus many air pollutants, while releasing clean oxygen, which contributes to improved air quality. Gardens can also provide fresh healthy foods which can save you money. Find out more on our Garden EP Page.
- Turn off the tap. Conserving water helps reduce your carbon footprint & conserves energy. Just by turning off the tap while you brush your teeth in the morning & before bedtime, you can save up to 8 gallons of water! That adds up to more than 200 gallons a month.4 Find out more at the El Paso Water Utility Page.
- Change 5 lights. The average home spends about 12% of its electricity bill on lighting. Replace your 5 most frequently used light fixtures or bulbs with Energy Star qualified products, and you will prevent carbon pollution while saving $75 a year on energy bills.5
4. EPA. https://blog.epa.gov/blog/tag/earth-month-tips/
5. EPA. https://blog.epa.gov/blog/tag/earth-month-tips/ | 0.65 | medium | 5 | 744 | [
"domain basics"
] | [
"expert knowledge"
] | [
"science",
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.45,
"creativity": 0.35
} |
9cf2102d-15c2-44a7-8d22-2fdc77828d86 | Water purification process removing | interdisciplinary | historical_context | Water purification is the process of removing undesirable chemical and biological contaminants from raw water. The goal is to produce water fit for a specific purpose. Most water is purified for human consumption (drinking water) but water purification may also be designed for a variety of other purposes, including to meet the requirements of medical, pharmacology, chemical and industrial applications. In general, the methods used include physical process such as filtration and sedimentation, biological processes such as slow sand filters or activated sludge, chemical process such as flocculation and chlorination and the use of electromagnetic radiation such as ultraviolet light. The purification process of water may reduce the concentration of particulate matter including suspended particles, parasites, bacteria, algae, viruses, fungi; and a range of dissolved and particulate material derived from the minerals that water may have made contacted after falling as rain. This new book gathers the latest research from around the globe in this field. | 0.6 | high | 6 | 180 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology"
] | {
"clarity": 0.4,
"accuracy": 0.6,
"pedagogy": 0.3,
"engagement": 0.45,
"depth": 0.45,
"creativity": 0.45
} |
f20c9d34-a598-4eac-851c-5002c1b33855 | Scientific Name: – Rumex | science | historical_context | Scientific Name: – Rumex
The docks and sorrels, genus Rumex L., are a genus of about 200 species of annual, biennial and perennial herbs in the buckwheat family Polygonaceae.
Members of this family are very common perennial herbs growing mainly in the northern hemisphere, but various species have been introduced almost everywhere.
Some are nuisance weeds (and are sometimes called dockweed or dock weed), but some are grown for their edible leaves.
Rumex species are used as food plants by the larvae of a number of Lepidoptera species. | 0.5 | medium | 4 | 118 | [
"scientific method",
"basic math"
] | [
"advanced experiments"
] | [] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.3,
"engagement": 0.3,
"depth": 0.35,
"creativity": 0.4
} |
b04391c6-c2e8-4b67-8b4e-9fa7434f5d6c | Spring Load and Spring Rate | interdisciplinary | problem_set | Spring Load and Spring Rate
Spring Load Definition
Your spring’s working loads determine a specific amount of force at a desired loaded height.
Spring Rate Definition
The constant amount of force you need to travel ONE inch or millimeter of distance.
As it was explained in the definitions above, spring load determines a specific amount force or pressure at a specific loaded height while spring rate determines the rate of force you will need in order to travel one unit of measurement (in. or mm.). You can use either one to calculate the other; rate to calculate working loads and working loads to calculate rate. The formulas and diagrams are explained in simple examples below.
This example shows you how spring load works and how it is derived from spring rate. You have a spring with a free length of 5 inches and your spring rate is of 7.5 pounds of force per inch (lbf/in). This spring needs to reach a solid height of 3 inches, therefore having to travel 2 inches. To calculate the working load of how much force you’ll need in order to reach a solid height of 3 inches, you’ll have to multiply the distance traveled by the spring rate as shown in the following formula and diagram.
Spring Load FormulaRate (Travel) = Load
15 = L
Spring rate is a calculation more complex to calculate; you’ll find the full formula at the bottom of this article. You can calculate your required spring rate based on your spring’s working loads too though. Take the values from the previous example. This way, you may also confirm the results you received on the previous formula. The distance traveled was of 2 inches while the load was 15 pounds of force. To calculate the required spring rate to meet these working loads you’ll have to divide the load by the distance traveled as shown in the following diagram and formula.
Spring Rate FormulaRate = Load ÷ Travel
k= L ÷ T
k = 15 ÷ 2
k = 7.5 lb/in
Full Spring Rate Formulak = Gd^4 / [8^3D na]
G = E / 2(1 + V)
d = D outer - d
- Spring Wire Diameter = d
- Spring Outside of Spring = D outer
- Mean Diameter Of Spring = D
- Young's Modulus of material = E
- shear modulus of material = G
- Spring Constant = K
- Active Coils = na
- Poisson ratio off Material = V | 0.6 | low | 4 | 525 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"mathematics",
"science",
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.4,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.25,
"creativity": 0.3
} |
eb36e744-e64e-4058-baa6-81d53cc9987c | fiber system designed transmit | technology | data_analysis | The fiber system is designed to transmit the light from 5,000 science targets imaged at the telescope’s prime focus to DESI’s spectrographs.
Each optical fiber, with a 107-micron-diameter core, is terminated in a ferrule that is then mounted in a robotic fiber positioner. The fibers are collected behind the focal plane into 10 groups of 500. Each group spans 47.5 meters from the focal plane to the spectrograph room via guides, supports, strain-relieving spool boxes, and ruggedized cables. Each group of 500 fibers is then precisely arranged and terminated into a linear arc that provides the optical entrance-slit illumination to an associated spectrograph. | 0.6 | medium | 4 | 158 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.3,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.4
} |
9b90eaed-e09f-4cd2-a2a6-201ec8e0c4be | Cross Functional Instructional Areas | interdisciplinary | historical_context | Cross Functional Instructional Areas:
Literature, Languages, Philosophy, Religion, Musicology, Art, Global Studies
When one thinks of humanities, it is important to consider what time period is being referred to in relation to the term. Humanities are academic disciplines that study human culture. However, in the Middle Ages, divinity referred to classics and were the main area of secular (non-spiritual) studies in universities at that time. Today, the humanities have a different focus: ancient and modern languages, literature, philosophy, religion, art, and musicology.
Today, in high schools, humanities classes usually consist of English Literature, Global Studies, and Art.
Isn’t it interesting how one word, one study, could change course over time? In this course of study and creation, you will have the opportunity to determine what aspect, time period, element, and aspects of humanities you are most interested in discovering and then, deciding what you want to do with your discoveries! Would you like to paint, write, sing, make music, create a book of your studies, and invest your time in the wisdom of something that you have discovered that you would then want to find a new way to share with others? The humanities provides so many different ways of looking at human culture, as well as art, language, literature, philosophy, religion, etc. Consider the opportunity to look through the lens of History at people in another time period, another culture, another experience, and how you could best express what you have come to understand, or even, what you still question.
What to Expect:
In this particular journey, get ready to discover the humanities in many different ways: from artwork, to music, to philosophy, to language and creative writing, to music, to global studies, and to literature. Using your chosen viewpoint, think about what you would like to create as a result of your tour through your chosen area of work in the humanities: would you like to create something of your own? Would you like to collaborate with others to display and communicate the best of all of your talents for a showcase? Would you be interested in digging more deeply into the research of something that has always fascinated you, but now, you have the resources, and the time – right at the edges of your fingertips – to dig right in? There will be experts and there will be resources. There will be time for you to ask questions, and to think about what you want to do, and then, there will be time to do it! In the end, there will be the opportunity to showcase your work, your thoughts, ideas, and opinions at an event created, just for you.
What You Will Do:
Students will have the opportunity to avail themselves to many different elements of the humanities, through the internet, through film, through field trips, and through speakers who will come to share their own experiences, and insights. Students will have the opportunity to make decisions, based upon their own interests, to discover if they would like to work alone, with a partner, or with a group of people or, on a number of projects that they feel will represent the talents and interests that they have and by which they have been most inspired. Students will have the opportunity to ask questions, investigate their personal interests, and pursue their own ideas to cultivate as their final products for display at the final event. You will have an opportunity to evaluate your own work by using criteria that guide the work of most professional writers, inventors, and other creative people. | 0.55 | medium | 5 | 717 | [
"domain basics"
] | [
"expert knowledge"
] | [
"science",
"technology",
"language_arts"
] | {
"clarity": 0.4,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
33c8d82d-fc08-4bff-a82b-a2ec01ce9f78 | 29 Sep G | science | historical_context | 29 Sep G.G. George’s New Book: The Arizona State Fair
The Arizona State Fair, the latest book by Phoenix author and historic preservation activist, G.G. George, chronicles the history of Arizona’s State Fair from its origins as a territorial fair in 1884, through the early days of Arizona’s statehood, up to the present day. The book is filled with 210 historic photographs that vividly illustrate the history of the fair and surrounding areas, as well as the cast of historical figures who were instrumental in establishing the fair. In addition to performing an exhaustive search of state and local historical archives, Ms. George collected cherished photographs and stories from local residents, which are incorporated throughout the book.
The book details the history of the area known as Six Points, at the intersection of Grand Ave., 19th Ave. and McDowell Rd. Early area developers, including F.Q. Story (founder of the historic district which bears his name), General M. H. Sherman; and politicians, including Phoenix Mayor John C. Adams (owner of the Hotel Adams) were instrumental in developing the area around Grand Avenue and orchestrating the purchase of 80 acres in the Six Points area in 1905. The location became the site of the Arizona Territorial Fair, which transitioned to the Arizona State Fair after Arizona achieved statehood in 1912.
In addition to providing a history of the Arizona State Fair and its evolution from a showcase of Arizona’s agricultural roots, when horse races and rodeo events were popular attractions, to its modern incarnation as an exposition and entertainment showcase; the book details many other interesting events in the fairgrounds’ history. Some of the fair’s fluctuations in fortune include the cancellation of the fair in 1918 due to the flu pandemic, and a hiatus in the 1930’s due to lack of financial resources during the Great Depression. During that time period, a federal camp for men and boys was opened at the fairgrounds. The New Deal era brought money that resulted in construction of many of the historic buildings that exist at the fairgrounds today, including the WPA Building and the cattle barns.
Challenges facing the Arizona State Fair today include finding ways to maintain its economic viability, and obtaining the funding necessary to preserve and restore its historic buildings. As a vocal and effective historic preservation advocate, Ms. George has been instrumental in these efforts, but acknowledges there is much work still to be done. It is her hope that her book, The Arizona State Fair, will serve, not only as an engaging historic record, but also as a call to action to preserve and restore the Arizona State Fairgrounds – a site that has been an important part of our history since Arizona’s earliest days.
The Arizona State Fair is available from author G. G. George, firstname.lastname@example.org (Arcadia Publishing, 2017. 128 pages). Ms. George will participate in a book signing on Saturday, October 14, 2017 at Antiques on Central, 730 E. Missouri Ave., Phoenix from 11:00 a.m. to 3:00 p.m.
About the author, G.G. George:
Phoenix author G.G. George currently serves as President of the Encanto Citizens Association, President of the Phoenix Historic Neighborhoods Coalition, and as a member of the Arizona State Fair Stakeholders Group. A long-time historic preservation activist, Ms. George became involved in historic preservation advocacy and activism in Phoenix when she paid a visit to the Moreland Corridor in 1970 with a donation for a back-to-school clothing drive and saw the patchwork of missing houses that had been torn down in advance of the I-10 freeway project. The devastation facing those residents spurred her to learn more and become involved. She said skepticism that Phoenix had anything historic worth preserving was the greatest obstacle to be overcome in the early days of the historic preservation movement in Phoenix. When asked to name her proudest achievement as a community leader in historic preservation, she cited being a founder of the Encanto Citizens Association and succeeding in getting Encanto-Palmcroft and Encanto Park listed on the National Register of Historic Places. This achievement provided the impetus for surrounding neighborhoods to seek historic designation also. Ms. George helped found the Encanto Citizens Association in 1969 when she found the alleys too dark in the evening and organized neighbors to light up the night to improve security and safety. The group’s achievements include helping to win the freeway fight to eliminate the planned 10-story high freeway through the heart of Phoenix and having it instead moved underground between 7th Street and 7th Avenue, saving Encanto-Palmcroft’s historic streetlights from being replaced with modern ones by APS, instituting the first Encanto-Palmcroft Home Tour in 1981, and the 2017 installation and dedication of the William G. Hartranft Entry Garden at Encanto Park honoring Mr. Hartranft, the founder of the Phoenix Parks System. The group’s continuing goals include education, preservation and planning for the future. Ms. George related that some of the challenges facing historic Phoenix today include maintaining the integrity of the historic districts and other structures in the face of current development and increases in density around Phoenix’s historic core. This poses new challenges and opportunities to increase awareness and educate the public about the benefits of historic preservation, including the value, tradition and charm of our historic neighborhoods and buildings. Ms. George’s current projects include preservation of the historic buildings at the Arizona State Fairgrounds, and her book, The Arizona State Fair, serves to educate others as to the background and importance of these structures, as well as the important role of the fairgrounds in Arizona history. | 0.65 | medium | 5 | 1,228 | [
"introductory science",
"algebra"
] | [
"research methodology"
] | [
"technology",
"social_studies",
"arts_and_creativity"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.45,
"creativity": 0.35
} |
d823ed00-19d4-4069-9a4d-82a2096c6b5a | Ayurvedic Medicine & DDD | life_skills | research_summary | Ayurvedic Medicine & DDD
Ayurvedic Medicine, What Is It?
Ayurvedic Medicine was developed more than 3,000 years ago in India and is a holistic healing art as it is based on the belief that health and wellness depend on a delicate balance between the mind, body, and spirit.
How Can It Help With Muscle and Joint Pain?
When it comes to body pain, specifically joint and muscle pain, Ayurvedic medicine may help with pain management for joints and muscles.
With Rheumatoid Arthritis (RA) for example, a double-blind, random controlled study 2011 published study in the Journal of Clinical Rheumatology determined that an Ayurvedic herbal compound was just as effective at treating RA symptoms as Trexall (methotrexate), a powerful anti- rheumatoid and cancer treatment drug.
Osteoarthritis ( wear and tear arthritis) is another common disease impacting millions of people around the world. A common Ayurvedic treatment, frankincense, a dried resin derived from the Boswellia tree, has been used to help relieve the pain by reducing the inflammatory process. According to NCCIH (National Center for Complementary and Integrative Health, U.S. National Institutes of Health (NIH)., osteoarthritis patients had significant decreases in pain after using a frankincense remedy.
A compound used often in Ayurvedic medicine is Tumeric, a spice derived from the turmeric plant (Curcuma longa), which contains beta-carotene, calcium, flavonoids, iron, niacin, potassium, zinc and other nutrients. And in addition to its potential effectiveness in treating peptic ulcers and some forms of cancer, turmeric also has proven anti-inflammatory properties.
Is It Safe?
Ayurvedic medicine has been used by humans for thousands of years and is still practiced by more than 90% of people in India today, although in western medicine it is still considered an alternative form of healthcare practice.
A 2008 study published in the Journal of the American Medical Association (JAMA) found that almost 21 percent of Ayurvedic medicines purchased over the Internet contained detectable levels of lead, mercury or arsenic; however, it was also pointed out by the researchers that no widespread epidemic of poisoning has been reported to date, thereby providing a statistically safe solid track record.
Women who are pregnant or nursing, or people who are thinking of using Ayurvedic therapy to treat a child, should be especially sure to consult their health care provider. There has been growing concern over contamination with toxins such as lead, mercury and arsenic in many Ayurvedic herbal remedies. Be sure to make certain the source is pure when utilizing herbal Ayurvedic medicine.
DEGENERATIVE DISC DISEASE
What Is It?
Degenerative Disc Disease (aka DDD) is a breakdown of the intervertebral disc between the vertebra of the spine. It is thought to be partly a result of genetics, and partly due to wear and tear. This will usually result in decreased disc height and roughening of the edges of the vertebral spine possibly causing joint irritation and pain as well as possible nerve irritation which can also lead to pain. This pain and swelling can lead to limited joint motion which can then lead to decreased muscle performance and ultimately movement problems.
What Causes It?
Typical causes usually are due to wear and tear over time. People usually have accumulated micro-trauma over a period of time which leads to the discs being stressed beyond their capacity to tolerate the compressive load. Aging leads to decreased hydration of the discs which makes them more brittle and less resilient, thereby leading to degeneration. Just like you can develop arthritis and degeneration of the knee, you can have this of the spinal discs.
What Can You Do?
Maintaining range of motion of the vertebrae and their discs can help to improve blood circulation to the area as well as hydration of the material in-between the disc, which is a viscous gel like material. There is no real blood supply to the inside of the disc, so it relies on normal movement to pump fluids and nutrients in and out, like a sponge.
Stretching exercises can be helpful in preventing the negative effects of DDD and promote the range of motion of the vertebral segments, as mentioned above, as well as maintaining adequate muscle activation around the spinal column also known as spinal stabilization exercises.
What Are Professional Treatment Options?
When achieving Range of Motion is not possible on your own or when you are not sure of what specialized exercises are safe to perform, you can consult with a Licensed Healthcare provider that specializes in the management of non-invasive, conservative spine care such as a Doctor of Physical Therapy, Chiropractor or Osteopathic Physician. which All three of these disciplines have formal training in hands on spine care techniques to maximize the health and function of the spine.
Professional procedures to assist in management DDD symptoms can include:
- Manual therapy (Joint mobilization / manipulation)
- Cold laser (low level laser)
- Soft tissue massage
- Postural awareness and control training
- Therapeutic / corrective exercise
- Ergonomic training
- Fascial manipulation/Release
- Adhesion (scar) tissue management with stainless steel instrument known as Instrument Assist Soft Tissue Mobilization (IASTM)
What Can You Expect?
If special attention is made to a diagnosed DDD presentation, you can effectively manage the effects of this condition with conservative management in most cases.
If the pain is severe and unrelenting or if you begin to lose control of your bladder and bowel functions, this can be a medical emergency and you must seek emergency care right away as you may have compromise to the spinal cord or spinal nerves.
Aside from the medical emergencies mentioned above, it is possible to live a normal and healthy life even with advanced stages of DDD. In fact, studies have shown that up to 40% of people who have DDD have no pain at all! | 0.7 | medium | 6 | 1,203 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.55,
"creativity": 0.35
} |
3878b2f8-49aa-43d0-9943-fee8e4886972 | Lymphoma cancer lymphatic system | technology | qa_pairs | Lymphoma is a cancer of the lymphatic system, which is the system that helps fight toxins in the body. The lymphatic system includes lymph nodes that store excess fluid (lymph) that is taken from the blood and is pushed around the body to excrete it. People who suffer from Lymphoma have a large abnormal number of lymphocytes that outweigh the normal lymphocytes. This causes the body’s immune system to fault and affects how the body fights infections. Lymphoma can target specific lymph glands, such as the spleen, thymus and bone marrow, as well as other organs throughout the body if not treated. Symptoms include swelling of the lymph nodes which can occur all over the body, such as the neck, groin, abdomen or armpits.
There are two types of Lymphoma that spread and are treated differently:
- Non-Hodgkin lymphoma (which accounts for about 90% of lymph nodes)
- Hodgkin lymphoma (which can be only seen from blood tests and in biopsies)
There are four stages of Lymphoma:
- Stage I – cancer is found in one lymph node area or one area or organ outside the lymph nodes
- Stage II – cancer is found in two or more lymph node areas or in one area or organ outside the lymph nodes on the same side of the diaphragm (the sheet of muscle slung beneath the lungs that enables breathing)
- Stage III – cancer is found in lymph node areas on both sides of the diaphragm
- Stage IV – cancer has spread outside the lymphatic system to one or more organs, such as the spleen, liver or skin
Alongside the conventional cancer treatment, some therapies of lymphatic drainage assist people on feeling better whilst maintaining the fluid retention and pressure. | 0.55 | medium | 4 | 351 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.25,
"creativity": 0.3
} |
f550bb2f-a631-4a9c-b090-cedae53e604e | After more than Century | technology | historical_context | After more than a Century of farming, Yakama Nation has purchased a farm from the Inaba Family who’s been blessed to have that opportunity the Yakama Nation gave their family in the early 1900’s.
Lon Ibana’s Family started farming near Wapato in the early 1900’s, clearing sagebrush and built irrigation systems during the winter.The Yakama Nation and tribal people helped the Inaba’s farm, first by giving them access to land – when federal laws wouldn’t let them farm elsewhere. And second by giving them a place to farm after they were confined to a camp in Wyoming during World War 2.
Lon Inaba says his family’s farm will now help teach the reservation’s younger generations. “It’s something that I’m proud of and I want to share that pride in where you’re coming from and what you’re able to do for your communities.”
Inaba hopes that the farm can soon be used to give other tribal nations food sovereignty too. | 0.65 | medium | 5 | 221 | [
"data structures",
"algorithms basics"
] | [
"architecture patterns"
] | [] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.3,
"engagement": 0.45,
"depth": 0.45,
"creativity": 0.45
} |
04607b5c-da55-49ec-9ddf-c57a0dd87f9b | Presently, area forms much | science | historical_context | Presently, the area forms much of the City of Peterborough in Cambridgeshire. The Church of England, however, still describes the diocese as consisting of Northamptonshire, Rutland and the Soke of Peterborough, i.e. that part of the city north of the River Nene.
In the Saxon period, the lord of the hundred had the power, or liberty, of holding a court and administering justice within its boundaries, and this system was subsequently continued by the Abbots of Peterborough, who either enforced in person, as lords, the observance of the ancient socage laws and customs, or appointed a deputy to act for them. On the establishment of Quarter Sessions in 1349, the separate jurisdiction of the Soke was still maintained as distinct from that of the county of Northampton; and, except for parliamentary purposes and matters relating to the militia, it was entirely independent of that county. Quarter Sessions for the liberty were held at the Sessions House in Peterborough, and petty sessions at the same place.
The civil government of the liberty was vested in the Marquess of Exeter, as Lord Paramount of Peterborough and custos rotulorum; around 40 magistrates appointed by the crown; and a high bailiff of the city appointed by the dean and chapter of Peterborough Cathedral. The Soke had its own magistrates, who were appointed by the Lord Paramount, acting under a commission of oyer and terminer, and gaol delivery, as well as under the ordinary commission, and the magistrates for the liberty retained the power of hanging a criminal in cases of murder, which in fact they exercised so late as 1812. The Local Jurisdictions Act 1820, though giving the liberty bench the power to commit (for murder only) to the county Assizes, did not abridge their full rights of gaol delivery. The Soke had also a separate rate, out of which all payments were made, and a separate police force, the Liberty of Peterborough Constabulary, appointed by and under the control of the magistrates of the Soke. In 1874, the City of Peterborough was granted a Charter of Incorporation and the new council was required to appoint a Watch Committee and constabulary, the Peterborough City Police. The two forces were eventually amalgamated in 1947 to form the Peterborough Combined Police Force.
In the provisions of the County and Borough Police Act 1856, the Weights and Measures Act 1878 and the Contagious Diseases (Animals) Act 1878, the Liberty of Peterborough, like that of the Isle of Ely, was in each instance treated as a separate county. | 0.55 | medium | 5 | 575 | [
"introductory science",
"algebra"
] | [
"research methodology"
] | [] | {
"clarity": 0.4,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.25,
"creativity": 0.3
} |
3a527017-5404-4774-bbc8-3f1fdb5df18c | Cognitive Brain Research Unit | arts_and_creativity | research_summary | At the Cognitive Brain Research Unit (CBRU) we address human auditory and crossmodal cognition, as well as their impairments and plasticity. The main research areas are human language and music processes, their plasticity, and the development of auditory functions. We utilize modern brain research methods in our interdisciplinary work, which is carried out with an international and national collaboration network.
Speech perception, disorders, and plasticity
Speech sound representations and their plasticity in language learning is one of the core areas in our research. We have shown that language-specific memory traces, predominant in the left temporal lobe, operate in an automatic fashion. Read the publication here.
We also address the neural basis of auditory and audiovisual processing underlying reading and reading impairments. Furthermore, we aim to shed light to the impaired neural processing stages of speech and auditory information in dyslexia, autism spectrum, and other language and learning deficits. Our work has indicated that with appropriate intervention programs, dyslexia and language impairments can be alleviated and their neural basis altered. Related publications can be found here.
Music cognition and its educational and clinical applications
During past years, the research in the Brain and Music team has shown that music sounds are processed in the auditory cortex as any other sound but partially by spatially distinct neural networks. In professional and amateur musicians, these neural networks can represent musically relevant sound information with higher accuracy than in non-musicians. Importantly, however, also non-musicians can extract highly complex musical information even when they concentrate on a parallel task outside auditory modality during the brain recordings.
Early development of auditory cognition
The research on the developmental aspects of audition, memory, and attention is primarily based on event-related potentials and magnetic fields from children, infants, and fetuses. Our studies show that the fetal brain is capable of disentangling sounds with different pitches and that the neonatal brain has high-level cognitive skills related to sound perception.
In children, the development of skills related to understanding speech and music is of great interest due to the benefits of early detection of possible impairments of hearing abilities. Our current projects aim at understanding the normal development of these abilities.
Auditory processing in the ageing brain: deterioration and plasticity
With ageing, speech perception especially in background noise becomes increasingly difficult even without major alteration in pure-tone audiogram. Our goal is to understand the age-related deterioration in the central auditory system and its impact on auditory processing in everyday life. To this aim, we develop and test objective (attention-independent) electrophysiological indices for the different aspects of central-auditory processing such as discrimination and identification of complex auditory signals, and the duration and capacity of auditory sensory memory. One promising index is the mismatch negativity. Furthermore, by using these very same indices, we explore the effectiveness of different types of training and practice program, in an attempt at alleviating or cancelling some of the age-related deterioration.
The neural basis of auditory processing and its plasticity
Besides these central research areas, we also investigate the neural basis and plasticity of auditory processing, for instance, phenomena such as auditory memory and primitive intelligence. Furthermore, we determine how auditory training, acquisition of special skills, or extraordinary demands on the auditory system, such as blindness, cause reorganization in the neural substrate of auditory perception. We also constantly strive for improving research paradigms for efficient data acquisition. For example, with the "multi-feature" paradigm ("Optimum-1") it is possible to record the MMN for about 5 sound features in the same time in which MMN was acquired with the oddball paradigm for 1-2 features only.
Natural Emotions in Digital Interaction
We are working to enrich interaction in digital environments by finding new ways of conveying emotional information. Why? To improve human collaboration, decrease misunderstanding, disconnection and loneliness.
Digital systems are not designed to consider emotions. As a result, the tools we have for expressing our emotions online are severely lacking in quality. This in turn inhibits empathy, the mechanisms that allow people to understand each other, connect and collaborate.
The problem is evident in how discussions online easily become unnecessarily heated, in the growing rate of cyberbullying and in the difficulties that distributed teams have in their cooperation.
The Cognitive Brain Research Unit (CBRU) - preceded by the Cognitive Psychophysiology Research Unit - was founded by Prof. Risto Näätänen. Originally, research at CBRU focused on two cerebral responses: the mismatch negativity (MMN) and processing negativity (PN), both discovered by Näätänen et al. (1978). The MMN is a change-detection mechanism that reflects cortical sound-discrimination accuracy, whereas the PN indicates how the brain selects relevant stimuli for further processing. The MMN has become a popular tool world-wide in the field of cognitive neuroscience due to its wide apllicability. MMN can be applied to a variety of groups, including patients, infants, and even fetuses, and it can be recorded even from inattentive participants. Already in 2004, an estimated 1000 publications in international refereed journals reported using this brain response.
Read more about MMN discovered by Prof. Risto Näätänen | 0.6 | medium | 4 | 1,069 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"mathematics",
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
3aa5aac9-d354-449e-8fe7-1d944eda4c5b | Long-eared Owl (Asio otus) - Wiki | interdisciplinary | tutorial | Long-eared Owl (Asio otus) - Wiki
From Wikipedia, the free encyclopedia
[Photo] Long-eared Owl (Asio otus) de:Waldohreule. german description: Das Foto zeigt eine Waldohreule in freier Wildbahn. Nur selten sieht man die nachtaktiven Tiere tags??ber. Fotodaten: Canon EOS 10D, EF 300 mm 2,8 mit 1,4x Konverter, Dreibein, Spiegelvorausl??sung. Photo taken by Sascha R??sner (http://de.wikipedia.org/wiki/Benutzer:Sascha_R%C3%B6sner). date: 2004.
|Copyright (C) 2004 Sascha R??sner|
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License".
The Long-eared Owl
) is a species of owl
which breeds in Europe, Asia, and North America. Breeding season is from February to July. This bird is partially migratory, moving south in winter from the northern parts of its range. Its habitat is forest close to open country. Asio otus
is more elusive than other owl
s in this family.
This species is a part of the larger grouping of owl
s known as typical owl
s, family Strigidae
, which contains most species of owl
. The other grouping of owl
s are the barn owl
s, family Tytonidae
The Long-eared Owl
is a medium sized owl
, 31-37 cm in length with an 86-98 cm wingspan. The Long-eared Owl
carries its blackish tufts, which are positioned in the center of the head, in an erect posture. The females are larger in size and darker in coloration than the males. The Long-eared Owl
’s brownish feathers are vertically streaked. Tarsus and toes are entirely feathered. Eye disks are also characteristic in this species. However, eye disks of A. otus
are darker in color or rusty-orange. This nocturnal species is perhaps most easily seen perched in a tree in its daytime roost.
It nests in trees, often conifers, using the old stick nests of other birds
such as crows, ravens and magpies (Family Corvidae
) and various hawks. The average clutch size is 4-6 eggs, and incubation time averages from 25-30 days. It will readily use artificial nesting baskets. It roosts and nests in temperate forests. An unusual characteristic of this species is its communal nesting in thickets during the winter months.
is nocturnal, and it hunts over open country by night. It is very long winged, like the similar Short-eared Owl
, and glides slowly on stiff wings when hunting. Its food is mainly rodent
s, small mammals, and birds
|The text in this page is based on the copyrighted Wikipedia article shown in above URL. It is used under the GNU Free Documentation License. You may redistribute it, verbatim or modified, providing that you comply with the terms of the GFDL.| | 0.6 | medium | 4 | 752 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.4
} |
91aaf66d-4abb-40c7-8785-50077ba3bbdc | Morisset Hospital Historic Sculpture | arts_and_creativity | historical_context | Morisset Hospital Historic Sculpture
Many years ago, this interesting Chinese rootwood carved sculpture was on display in the Administration Office area of the Recreation Hall. Various stories about the sculpture abound – mostly hearsay for there is no substantiated facts about the sculpture. We know little about the sculpture’s origin, however we do believe that the Li Tieh-kuai has probably been at the hospital since the Recreation Hall and Administration Office were first in use around 1909.
In 1998 MHHS contacted the Art Gallery of NSW to have the sculpture assessed. That assessment confirmed that the Morisset Hospital sculpture was probably a depiction of the fifth of the Eight Immortals of Chinese mythology and that the sculpture is circa 1900.
The sculpture fits together a bit like a 3D jigsaw, unfortunately there are some pieces missing. If those pieces were returned to the sculpture it would be a most unique piece.
The Story of Li Tieh-kuai, (Iron-crutch Li)
This Fifth Immortal is Li Tieh-kuai, (Iron-crutch Li). He is the emblem of the sick, hence his significance to Morisset Hospital. He always carries a crutch. His recognized emblem is the bottle-gourd or calabash that forms part of the equipment of every Immortal.
There are several versions of the stories of the Eight Immortals. Li Tieh-kuai is the most ancient of the Eight Immortals; his calabash relieves suffering. Prior to becoming an immortal, his spirit once travelled to the heavens. When his apprentice came across the lifeless looking body of Li Tieh-kuai, the apprentice mistakenly presumed that he had died and so cremated him. In another version, the apprentice was told that Li Tieh-kuai spirit was visiting the heavens and that his spirit would return in seven days, but on the sixth day, the apprentice had to leave his master's body as his mother was gravely ill and he had to return home, so he cremated the body. When Li returned to find his body had been cremated he had no choice but to enter the corpse of a homeless man who died of starvation. Unfortunately the man's head was "long and pointed, his face black, his beard and hair woolly and dishevelled, his eyes of gigantic size, and one of his legs was lame." Li Tieh-kuai gave him a gold band to keep his hair in order, and an iron crutch to help his lame leg. | 0.6 | medium | 4 | 536 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.25,
"creativity": 0.3
} |
6370af15-2316-4255-9730-08310dd39e66 | Sign up for | mathematics | data_analysis | Sign up for
News & Offers!
Your email:
Subscribe
Bestsellers
Arch Angel DX
Arch Angel DX
Our price: $7.99
Leopard DX
Leopard DX
Our price: $6.99
Dragon DX
Dragon DX
Our price: $7.99
Katana - Blizzard Champion
Katana - Blizzard Champion
Our price: $14.99
Boss - Blizzard Champion
Boss - Blizzard Champion
Our price: $14.99
Groove Champion
Groove Champion
Our price: $14.99
Valkyrie Champion
Valkyrie Champion
Our price: $14.99
Valkyrie STAR
Valkyrie STAR
Our price: $15.99
Wahoo R-Pro
Wahoo R-Pro
Our price: $11.99
Valkyrie DX
Valkyrie DX
Our price: $7.99
Online Payments
Golf Discs :: Drivers :: Inspire Neutron
View cart Checkout
Inspire Neutron
$15.99
Shop with Confidence!
with our Low Price Guarantee
List Price:
$20.99
You Save:
24%
The Inspire is the second fairway driver from Axiom Discs, and is an understable complement to the breakout hit Crave. Skilled players will be able to get smooth straight and turnover/flip lines from the Inspire, while beginners and lower-powered throwers will gain distance...
scroll for more
7 5
-2 1
Inspire Neutron
Inspire Neutron
The Inspire is currently available in the following plastics...
Inspire Proton ($14.99)
Inspire Neutron ($15.99)
Diameter: 21.1 cm
Wing Width: 1.8 cm
Rim Depth: 1.2 cm
Max Weight: 175.1 g
Approved: 3/22/2014
The Inspire is the second fairway driver from Axiom Discs, and is an understable complement to the breakout hit Crave. Skilled players will be able to get smooth straight and turnover/flip lines from the Inspire, while beginners and lower-powered throwers will gain distance and usability from its understable nature.
Axiom Neutron Plastic is the same juicy blend of Neutron used by MVP Disc Sports. It provides subtle grip and the best durability on the market.
Features:
• Under-Stable Driver Disc
• Durable Grippy Neutron Plastic
• Unique 2-piece construction
• Initial Stability:
Overstability with advanced/expert skill
-0.7
Newer players may experience up to 4x additional overstability
| 0.7 | medium | 4 | 667 | [
"algebra",
"geometry basics"
] | [
"calculus",
"statistics"
] | [
"technology"
] | {
"clarity": 0.7,
"accuracy": 0.5,
"pedagogy": 0.6,
"engagement": 0.5,
"depth": 0.25,
"creativity": 0.3
} |
7afb8e8f-d837-4fc7-83a1-5568d975ad14 | World Day Prayer focuses | technology | historical_context | World Day of Prayer focuses on women of Chile
March 3, 2011
The potent symbol of bread will take pride of place this week as an annual common day of prayer focuses on the struggle of women in Chile.
This year’s commemoration of World Day of Prayer, an annual event in which women across the globe observe a day of prayer on the first Friday in March, focuses on the “loaves and fishes” passage from Mark 6:30-44, in which Jesus feeds 5,000 persons.
This year, participants for the March 4 event are following women from Chile in prayer that organizers say will help women and their male supporters “enter a process that draws us into the bible, into the context of Chile and into the real situations” of those living in Chile.
The theme of this year’s event is “How Many Loaves Have You?” and those participating in ceremonies are being asked to carry a “panera,” the Chilean term for breadbasket. “Bread is an exceedingly important part of life in Chile,” Eileen King, executive director of the New York-based World Day of Prayer, told ENInews, adding that bread becomes particularly important in times of crisis.
The last few years have not been easy for Chile. Earthquakes rocked the country in 2010 and this year. The economy has also struggled. Chile has also tried to recover from the 1973-90 military rule of General Augusto Pinochet. The legacy of the Pinochet regime, in which prayer organizers said “thousands of women were among the victims who were tortured and killed,” has also continued.
“The lingering effects of the brutality continue despite recent democratic governments in Chile,” World Day of Prayer organizers said in a statement.
“It’s in moments of crisis that we are called to ask, ‘What do we have to offer?’” King told ENInews. “We recognize that our abundance comes from God, and that abundance is to be shared.”
World Day of Prayer describes itself as “a worldwide ecumenical movement of Christian women of many faith traditions who come together to observe a common day of prayer on the first Friday in March. Women ― and thousands of men ― pray together from sunrise to sunset. Through World Day of Prayer, women affirm that prayer and action are inseparable and that both have immeasurable influence in the world.” | 0.6 | medium | 4 | 506 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [
"science",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.25,
"creativity": 0.3
} |
24b3ba2d-e4eb-4a0e-824b-99f536222207 | common dolphin throughout history | science | historical_context | The common dolphin throughout history has often been recorded in art and literature. It was recently proposed that two forms of this species, the short- beaked (delphis) and long-beaked (capensis) common dolphin, represent two distinct species.
The Common Dolphin In Detail :
- PHYSICAL DESCRIPTION Common dolphins are colorful, with a complex crisscross or hourglass color pattern on the side; the long-beaked common dolphin being more muted in color. When looking at the profile of the two common dolphin species, the short-beaked common dolphin has a more rounded melon that meets the beak at a sharp angle, as compared to the long-beaked common dolphin that has a flatter melon that meets the beak at a more gradual angle.
- COLOUR Color patterns on the common dolphin are the most elaborate of any cetacean. The back is dark gray-to-black from the top of the head to the tail dipping to a V on the sides below the dorsal fin. The flanks are light gray behind the dorsal fin and yellowish-tan forward of the dorsal fin, forming an hourglass pattern. Its belly is white. There are large dark circles around the eyes connected by a dark line that runs across the head behind the beak and a black stripe runs from the jaw to the flippers.
- FINS AND FLUKES The dorsal fin is triangular-to-falcate (curved). It is pointed and located near the middle of the back and is black-to-light gray in color with a black border. The flippers are long and thin and slightly curved or pointed depending on geographical location. Flukes are thin and pointed at the tips with a slight notch in the center.
- LENGTH AND WEIGHT Common dolphins can reach lengths of 7.5 to 8.5 feet (2.3-2.6 m) and weigh as much as 297 lb. (135kg). The short-beaked common dolphin is relatively heavier, and has a larger dorsal fin and flippers than the long-beaked one.
- FEEDING Delphinus delphis feeds on squid and small schooling fish. In some parts of the world, they feed at night on the deep scattering layer, which moves towards the water’s surface during that time. Common dolphins have been seen working together to herd fish into tight balls. Like many other dolphin species, the common dolphin will sometimes take advantage of human fishing activities (such as trawling), feeding on fish escaping from the nets or discarded by the fishermen. | 0.65 | medium | 3 | 537 | [
"basic science",
"measurement"
] | [
"experimental design"
] | [
"technology"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.35,
"creativity": 0.3
} |
c1ba64d7-a895-4574-a778-5476a85a53ee | Introduction to Folklore | social_studies | research_summary | Introduction to Folklore
This course introduces students to the study of Folklore, its occurrence in daily life, and the scholarly analysis of its use in culture. As a discipline, Folklore explores expressive cultural forms in both traditional and modern societies, in small-scale groups where people interact face-to-face, as well as in large-scale, often industrial societies in which traditional themes, symbols, and forms occupy new positions in everyday life. We will study contemporary applications of folklore as they relate to the formation and maintenance of individual and group identity, belief, tradition, performance, stereotypes, and public display. These issues will emerge in our study of several folklore genres, including folk speech, jokes, superstitions, folktales, contemporary legends, material culture, and musical traditions. Through fieldwork and research assignments, students will gain the skills necessary to conduct an ethnography study and develop an understanding of the relationship between folk groups, folklore genres, and the issues they express. | 0.6 | high | 8 | 191 | [
"advanced knowledge"
] | [
"cutting-edge work"
] | [] | {
"clarity": 0.4,
"accuracy": 0.6,
"pedagogy": 0.3,
"engagement": 0.45,
"depth": 0.45,
"creativity": 0.45
} |
14c44a0d-cfdb-4841-be95-4079b4407470 | How technology creates better interpersonal connections | interdisciplinary | practical_application | How technology creates better interpersonal connections
Using communication technology to improve relationships
Does technology bring us closer together? It can seem like a weird question to ask, since innovations like VoIP and real-time chat let us more easily connect with friends, co-workers, and others, even over great distances.
But not all technologies are equally effective at forming strong interpersonal connections, which are particularly important in workplace contexts. As more organizations turn to remote and mobile working arrangements, it’s crucial to branch out from the old standbys of email, phone calls, and in-person meetings and invest in alternatives that provide sufficient context and enable rich collaboration from anywhere.
In fact, solutions such as video conferencing and team collaboration tools with intelligence features are the most effective for connecting people regardless of their physical locations. As the 2020s begin, let’s explore some specific examples of how these technologies build connections that last.
Less time commuting, more time to focus on strategic projects
Long commutes have become facts of life for millions of workers. According to the U.S. Census Bureau,* the average Americans’ commute in 2019 is 27 minutes (just one way), up two minutes from 2009. While that may not seem drastic, over the course of a year, it totals 17 extra hours spent in traffic.
What if there were a way to spend less time in traffic or on the train? It would benefit both the environment and worker morale, as lengthy commutes are one of the main detractors from job satisfaction.
Collaboration technologies make it more practical to avoid commuting and instead work from virtually anywhere:
- With chat apps, you can have a real-time conversation, share files, and search for specific assets from one interface with lots of context.
- Video conferencing allows for face-to-face meetings even at a distance, in high definition and with sophisticated controls.
- Cognitive collaboration solutions can pull information from multiple sources (e.g., public social media profiles and CRM data) to create context around any online meeting.
As long as a worker has access to the internet, these collaboration possibilities and others can allow for productive work, with no taxing commute required. Employees can build better working relationships, too, since the tools in question give them clear insights into what others are doing and thinking.
More eye contact and more immersive meetings through video conferencing
Video technology, in particular, is ideal for simulating the experience of being in the same room as the other attendees in an online meeting, even if everyone is actually located somewhere else.
A modern video platform has several key advantages over communicating via audio-only calls or emails and chats:
- It allows for full visibility into participants’ reactions and body language This insight is useful for understanding how a meeting is really going, and can be especially helpful if there’s a language/culture barrier.
- It helps curb multitasking Although the word gets a lot of lip service in resumes, multitasking is highly impractical in many contexts, as the brain isn’t that great at listening to a call and typing up an email simultaneously, for example. Video puts people in the spotlight and discourages multitasking, which in turn, increases productivity.
- It’s usable from multiple devices, not just dedicated standards-based video conferencing systems PCs, Macs, phones, and tablets can all seamlessly join an online video conference with just the tap or click of a button when it’s time for things to start.
- It’s integrated with other collaboration tech like screen sharing So participants can share their entire screens or desktops, or just a particular app or document as needed, to go in depth while on the video call.
- It can support a variety of use cases, not just internal meetups For example, a video link could be set up for a webinar, training session, or social media broadcast. Accordingly, the clarity of video can build connections across multiple contexts.
Reducing reliance on emails and phone calls
Both email and traditional voice calls often leave a lot to be desired, in terms of how personal they feel as well as how effective they are in enhancing productivity.
Checking and digging through an inbox all day is a huge time sink, not to mention a somewhat impersonal way to interact with people – after a while, everyone can feel like just a name next to a message. Phone calls are similarly problematic and somewhat anonymous, although a bit better since you can at least hear what the other person sounds like.
While moving on from email has long been a priority for many workers and their organizations, only recently has doing so become really practical. Chat apps provide strong alternatives to rifling through emails or setting aside lots of time for phone calls. Messages can be exchanged in real time, so there’s not the delay of email. Plus, files can easily be shared in the conversation, while built-in search makes it straightforward to find what’s needed.
Workplace chat can work well in tandem with video conferencing, too, so that every meeting is set up for success and can be properly followed-up on. Cisco Webex provides the integrated collaboration capabilities, from video to AI-driven meetings, that your organization needs to ensure strong interpersonal connections between your teams.
To learn more, get started with a free Webex plan today.
Sep 14, 2020 — Arushi Raghuvanshi
Aug 18, 2020 — Connie Tang
Jul 27, 2020 — Cole Callahan
Mar 02, 2020 — Sri Srinivasan, SVP and GM, Team Collaboration Group at Cisco
Feb 07, 2020 — Webex Team
Dec 17, 2019 — Webex Team
Dec 13, 2019 — Jillian Zimmerman
Nov 18, 2019 — Jillian Zimmerman
Nov 04, 2019 — Webex Team
Oct 30, 2019 — Webex Team
Oct 10, 2019 — Webex Team
Oct 07, 2019 — Rai Johnson
Sep 03, 2019 — Connie Tang
Aug 21, 2019 — Kacy Kizer
Aug 01, 2019 — Connie Tang
Jun 27, 2019 — Mark Miller
May 30, 2019 — Deepa Mahendraker
May 16, 2019 — Juan Gallardo
Apr 02, 2019 — Mandy Yeung | 0.65 | medium | 6 | 1,405 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology",
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.65,
"creativity": 0.45
} |
6ec615cd-a742-40f3-abed-8509e4f559b6 | This lesson will be interesting | technology | case_study | This lesson will be interesting! BGP (Border Gateway Protocol) is the routing protocol that glues the Internet together. I’m going to explain in which situations we need BGP and how it works.
Before you continue reading I should tell you to “forget” everything you know about routing protocols like RIP, OSPF and EIGRP so far…Those three routing protocols have one thing in common: they are all IGPs (Interior Gateway Protocols). We only use them within our autonomous system but they are not scalable to use for a network as large as the Internet.
RIP, OSPF and EIGRP are all different but they have one thing in common…they want to find the shortest path to the destination. When we look at the Internet we don’t care as much as to find the shortest path, being able to manipulate traffic paths is far more important. There is only one routing protocol we currently use on the Internet which is BGP.
Why do we need BGP?
Let’s start by looking at some scenarios so you can understand why and when we need BGP:
Nowadays almost everything is connected to the Internet. In the picture above we have a customer network connected to an ISP (Internet Service Provider). Our ISP is making sure we have Internet access. Our ISP has given us a single public IP address we can use to access the Internet. To make sure everyone on our LAN at the customer side can access the Internet we are using NAT/PAT (Network / Port address translation) to translate our internal private IP addresses to this single public IP address. This scenario is excellent when you only have clients that need Internet access. On our customer LAN we only need a default route pointing to the ISP router and we are done. For this scenario we don’t need BGP…
Maybe the customer has a couple of servers that need to be reachable from the Internet…perhaps a mail- or webserver. We could use port forwarding and forward the correct ports to these servers so we still only need a single IP address. Another option would be to get more public IP addresses from our ISP and use these to configure the different servers. For this scenario we still don’t need BGP…
What if I want a bit more redundancy? Having a single point of failure isn’t a good idea. We could add another router at the customer side and connect it to the ISP. You can use the primary link for all traffic and have another link as the backup. We still don’t require BGP in this situation, it can be solved with default routing:
- Advertise a default route in your IGP on the primary customer router with a low metric.
- Advertise a default route in your IGP on the secondary customer router with a high metric.
This will make sure that your IGP sends all traffic using the primary link. Once the link fails your IGP will make sure all traffic is sent down the backup link. Let me ask you something to think about…can we do any load balancing across those two links? It’ll be difficult right?
Your IGP will send all traffic down the primary link and nothing down the backup link unless there is a failure. You could advertise a default route with the same metric but you’d still have something like a 50/50% load share. What if I wanted to send 80% of the outgoing traffic on the primary link and 20% down the backup link? That’s not going to happen here but with BGP it’s possible.
This scenario is a bit more interesting. Instead of being connected to a single ISP we now have two different ISPs. For redundancy reasons it’s important to have two different ISPs, in case one fails you will always have a backup ISP to use. What about our Customer network? We still have two servers that need to be reachable from the Internet.
In my previous examples we got public IP addresses from our ISP. Now I’m connected to two different ISPs so what public IP addresses should I use? From ISP1 or ISP2? If we use public IP addresses from ISP1 (or ISP2) then these servers will be unreachable once the ISP has connectivity issues.
Instead of using public IP addresses from the ISP we will get our own public IP addresses.The IP address space is maintained by IANA (Internet Assigned Numbers Authority – http://www.iana.org/ ). IANA is assigning IP address space to a number of large Regional Internet Registries like RIPE or ARIN. Each of these assign IP address space to ISPs or large organizations.
When we receive our public IP address space then we will advertise this to our ISPs. Advertising is done with a routing protocol and that will be BGP.
If you are interested here’s an overview of the IPv4 space that has been allocated by IANA:
Besides getting public IP address space we also have to think about an AS (Autonomous System):
An AS is a collection of networks under a single administrative domain. The Internet is nothing more but a bunch of autonomous systems that are connected to each other. Within an autonomous system we use an IGP like OSPF or EIGRP.
For routing between the different autonomous systems we use an EGP (external gateway protocol). The only EGP we use nowadays is BGP.
How do we get an autonomous system number? Just like public IP address space you’ll need to register one.
Autonomous system numbers are 16-bit which means we have 65535 numbers to choose from. Just like private and public IP addresses, we have a range of public and private AS numbers.
Range 1 – 64511 are globally unique AS numbers and range 64512 – 65535 are private autonomous system numbers.
If you are interested, see if you can find the AS number of your ISP:
BGP has two flavors:
- External BGP: used between autonomous systems
- Internal BGP: used within the autonomous system.
External BGP is to exchange routing information between the different autonomous systems. In this lesson I explain why we need internal BGP. I would recommend to read it after finishing this lesson and learning about external BGP first.
You now have an idea of why we require BGP and what autonomous systems are. The Internet is a big place, as I am writing this there are more than 500.000 prefixes in a complete Internet routing table. If you are curious, you can find the size of the Internet routing table here:
On the internet there are a number of looking glass servers. These are routers that have public view access and you can use them to look at the Internet routing table. If you want to see what it looks like check out:
Scroll down all the way to “Category 2 – IPv4 and IPv6 BGP Route Servers by region (TELNET access)”. You can telnet to these devices and use show ip route and show ip bgp to check the BGP or routing table.
When we run BGP, does this mean we have to learn more than 500.000 prefixes? It depends…let’s look at some examples:
Above in our picture our customer network has an autonomous system number (AS 1) and some IP address space (10.0.0.0 /8), let’s pretend that these are public IP addresses. We are connected to two different ISPs and you can see their AS number (AS2 and AS3) and IP address space (22.214.171.124/8 and 126.96.36.199/8). We can reach the rest of the internet through both ISPs.
We can use BGP to advertise our address space to the ISPs but what are the ISPS going to advertise to our customer through BGP? There are a number of options:
- They advertise only a default route.
- They advertise a default route and a partial routing table.
- They advertise the full Internet routing table.
Let’s walk through these three options! | 0.65 | low | 4 | 1,725 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.55,
"creativity": 0.35
} |
e682f77b-b0dd-494c-9ae1-d19e8a03cf39 | Kid: want toy"To child | interdisciplinary | research_summary | Kid: "I want a toy"To a child, this is a simple matter. He sees you buy things with money and just assumes that whenever you want something you just conjure up the money to pay for it. In other words, he can not yet grasp cause and effect. He doesn't abstract that you must earn money first, then offer that money to someone in exchange for something. He assumes that you want something first, then for some reason there is this weird adult ritual where you must offer this green paper stuff for it. Ultimately, it is just the desire to have something that is primary to the child, not the work or production that came before it. Parent: "Toys cost money" Kid: "So, just get some money" Parent: "And where should I get the money?" Kid: "Just go to the bank or use that plastic card thing" Because they regard the green stuff as a mere formality that doesn't represent anything real, this leads the child to the following conclusion: Kid: "I wish everyone just had a lot of green stuff (money) so you could just have whatever you want" or "I wish everything were free."While this seems like a cute anecdote to illustrate a child's first stage of conceptual development it is actually much more than that. It represents the conceptual level of the entire left including the president, the federal reserve chairman, and Nobel Prize-winning Keynesian economists. With respect to economics, I have blogged about this phenomena at length in at least three prior posts: "Have You Had 'Enough': Obama's Inversion of Reality", Cargo Cult Economics, and Production and the Primacy of Existence. Naturally, this phenomena is not restricted to the field of economics. At the outset of the gun control debate, where profound conceptual level abstractions were being considered regarding the government's role in protecting individuals from crime, the purpose and meaning of the Second Amendment to the Constitution, the state's role in regulating the sale of firearms, the states role with regard to the mentally ill vis-a-vis criminal behavior, etc. the Obama administration offered letters, not from his adult constituents or legal scholars, but from grade school children. According to this report: ....the White House released handwritten letters to the President from some of the children who will be at the White House when President Obama unveils his plan to prevent gun violence. The kids offer their own ideas on gun control - ideas that go significantly further than the President's plan.Naturally, like with money, the children operate at a first order conceptual stage. They know that a man with guns killed children. Therefore, they ask the president to stop this from happening by getting rid of guns. I remember thinking in a similar way as a kid growing up during the cold war. Nuclear bombs were scary to me because they threatened to annihilate mankind. Therefore, I reasoned, they should just get rid of the nuclear bombs. Of course, at that age I couldn't comprehend the difference between the West and the communist Soviet Union, nor could I understand that nuclear weapons had most likely averted another world war by threatening such destruction. As I discussed in previous posts here and here, simplicity is the essence of good thinking within a certain context, namely that prior facts or principles be fully integrated into a conclusion. For example, Einstein's theory that "matter is energy" sounds very simple, but it integrates an enormous body of prior knowledge. The case of children not grasping cause and effect nor being able to integrate a vast body of prior principles such as the concepts of freedom, individual rights, and self-defense does not represent an example of "simple" thinking, but rather, an example of primitive conceptual development and therefore has no place in a serious discussion. In the case of adults making the same errors, it is an example of illogical, irrational, or wrong thinking. In the case of adults exploiting childrens' errors for propaganda, it is an example of evil. | 0.6 | medium | 4 | 809 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
7902c678-56ff-410c-9fa7-8e1683807782 | Unveiling Intersections: Geometric Topology | mathematics | historical_context | # Unveiling the Intersections: Geometric Topology and Arithmetic Structures Welcome, fellow explorer, to the fascinating frontier where the continuous meets the discrete! Are you ready to investigate how the shapes of spaces interact with the rigor of number theory? This documentation guides you through the conceptual landscape of **Geometric Topology**, particularly where its powerful tools intersect with **Arithmetic Structures**. At this advanced level (9/10), we assume you are comfortable navigating abstract algebraic structures and foundational topological concepts. Our goal here is not just to state facts, but to foster an intuition for *why* these connections matter. --- ## 1. Overview and Introduction: Where Does Shape Meet Number? What happens when we try to impose arithmetic constraints—like integrality or modularity—onto geometric objects? Geometric Topology, at its heart, seeks to classify topological spaces based on their fundamental properties (homotopy, homology, fundamental group, etc.). But what if the spaces we study arise naturally from arithmetic contexts, such as algebraic varieties or modular surfaces? This documentation focuses on the interplay, specifically exploring: * **Arithmetic Groups:** How do discrete subgroups of Lie groups (like $\text{SL}_2(\mathbb{Z})$) generate interesting topological spaces (e.g., hyperbolic manifolds)? * **Rigidity Theorems:** When does the arithmetic structure *rigidly* determine the underlying geometry? (Think Mostow Rigidity.) * **Lattices and Foliations:** How do arithmetic lattices act on geometric structures, and what topological consequences arise from these actions? **Thought Experiment:** If you take the familiar integers ($\mathbb{Z}$) and use them to define a tiling of the plane (a lattice), what topological invariants (like genus or Euler characteristic) does that resulting structure possess? How does this differ from a tiling generated by real numbers? --- ## 2. Prerequisites and Setup: Preparing the Conceptual Toolkit Before we can effectively investigate these deep connections, what foundational knowledge must we possess? This is less about "installing software" and more about ensuring our mathematical machinery is calibrated. ### 2.1. Essential Background Requirements To successfully navigate this material, we require fluency in the following areas: 1. **Algebraic Topology:** Familiarity with Homology, Cohomology, and fundamental groups ($\pi_1$). Can you articulate the difference between a homotopy equivalence and a homeomorphism? 2. **Lie Theory:** Understanding of Lie groups, homogeneous spaces, and principal bundles. Specifically, a working knowledge of $\text{SL}_n(\mathbb{R})$ or $\text{SL}_n(\mathbb{C})$. 3. **Differential Geometry Basics:** Concepts like Riemannian metrics, curvature, and geodesics are often necessary to define the "geometry" being studied. 4. **Algebraic Number Theory:** Knowledge of Dedekind domains and the structure of rings of integers is helpful when discussing arithmetic subgroups. ### 2.2. Conceptual Setup: The Arithmetic Quotient We often construct our primary geometric objects by taking a homogeneous space $X$ (e.g., the upper half-plane $\mathbb{H}^2$) and quotienting it by a discrete arithmetic subgroup $\Gamma \subset \text{Isom}(\mathbb{H}^2)$. $$\text{Geometric Space } M = X / \Gamma$$ **Guided Investigation:** If $X$ is highly symmetric (like $\mathbb{H}^2$ with constant negative curvature), what role does the discrete subgroup $\Gamma$ play in determining the resulting manifold $M$? Does $\Gamma$ introduce "holes" or "cusps" into the topology of $M$? No software installation is strictly required, but maintaining a robust environment for symbolic manipulation (like Mathematica or specialized geometry software) can aid in visualizing the resulting quotient spaces, such as the modular surface $\text{SL}_2(\mathbb{Z}) \setminus \mathbb{H}^2$. --- ## 3. Getting Started: The Fundamental Example – The Modular Surface Let us ground our abstract discussion in the most studied example where arithmetic and geometry collide: the modular surface. ### Step 3.1. Defining the Space Consider the upper half-plane $\mathbb{H}^2 = \{z \in \mathbb{C} \mid \text{Im}(z) > 0\}$. This space carries a canonical hyperbolic metric. What is the group that preserves this metric and orientation? It is $\text{PSL}_2(\mathbb{R})$. ### Step 3.2. Introducing the Arithmetic Subgroup The arithmetic subgroup we focus on is the **Special Linear Group over the Integers**: $$\Gamma = \text{SL}_2(\mathbb{Z}) = \left\{ \begin{pmatrix} a & b \\ c & d \end{pmatrix} \mid a, b, c, d \in \mathbb{Z}, ad - bc = 1 \right\}$$ ### Step 3.3. Constructing the Quotient The modular surface, $M$, is defined as the quotient: $$M = \Gamma \setminus \mathbb{H}^2$$ **Discovery Question:** Since $\text{SL}_2(\mathbb{Z})$ is a discrete group acting isometrically on $\mathbb{H}^2$, what kind of geometric structure must $M$ inherit? (Hint: Think about curvature.) ### Step 3.4. Topological Features Introduced by Arithmetic The quotient $M$ is not a compact surface. Why? The group $\text{SL}_2(\mathbb{Z})$ has parabolic elements (like the translation by $1$: $\begin{pmatrix} 1 & 1 \\ 0 & 1 \end{pmatrix}$). These elements correspond to **cusps** in the quotient space. **Challenge:** If we compactify $M$ by adding points at infinity (the cusps), what resulting topological object do we obtain? (The answer involves a sphere with one point removed, which is topologically a disk, or, more precisely, the surface $\mathbb{P}^1(\mathbb{Q})$.) --- ## 4. Detailed Feature Documentation: Rigidity and Action As we move beyond the modular surface, we encounter deeper phenomena where arithmetic structure dictates geometric constraints. ### 4.1. Geometric Rigidity: When Geometry is Determined by Arithmetic What if the arithmetic group is not acting on a space of constant curvature, but on a more complex homogeneous space $X = G/K$? **Margulis Super-Rigidity Theorem:** This theorem states, roughly, that if a lattice $\Gamma$ in a higher-rank semisimple Lie group $G$ acts on a homogeneous space $X$ preserving a measure, the resulting geometric structure is often highly constrained, frequently forcing the action to be derived from the underlying algebraic structure of $G$. **Investigative Prompt:** If we have two different Riemannian metrics, $g_1$ and $g_2$, on a compact quotient $M = \Gamma \setminus X$, when does the existence of an isomorphism between the induced geometric structures imply that the metrics $g_1$ and $g_2$ must be related by an automorphism of $X$? (This is the essence of Mostow Rigidity in the context of hyperbolic manifolds.) ### 4.2. Arithmetic Lattices and Foliations Arithmetic lattices often induce interesting geometric structures, such as foliations, on larger spaces. Consider the space $X = \text{SL}(n, \mathbb{R}) / \text{SO}(n)$, which models oriented, totally real planes in $\mathbb{R}^n$. An arithmetic lattice $\Gamma \subset \text{SL}(n, \mathbb{Z})$ acts on $X$. The action of $\Gamma$ often generates **horospherical foliations**. These foliations are highly structured due to the algebraic nature of $\Gamma$. **Key Insight Question:** If a foliation on a manifold $M$ is generated by the action of an arithmetic lattice $\Gamma$, how does the algebraic structure of $\Gamma$ (e.g., its density or its algebraic rank) influence topological invariants like the entropy of the foliation? --- ## 5. Examples and Use Cases: Exploring Higher Dimensions How do these concepts generalize beyond 2-dimensional hyperbolic geometry? ### 5.1. Hyperbolic 3-Manifolds and Kleinian Groups In three dimensions, the arithmetic analogue of $\text{SL}_2(\mathbb{Z})$ is often a **Kleinian group** $\Gamma$, which is a discrete subgroup of $\text{PSL}_2(\mathbb{C})$ acting on the 3-sphere $S^3$. The quotient $M = \Gamma \setminus \mathbb{H}^3$ yields a 3-manifold with a hyperbolic structure (if $\Gamma$ is torsion-free and the quotient is compact). **Application Scenario:** Suppose we are given a closed hyperbolic 3-manifold $M$. If we know that $\pi_1(M)$ contains a subgroup isomorphic to $\text{SL}_2(\mathbb{Z})$, what does this imply about the geometry of $M$? (It implies the existence of embedded totally geodesic surfaces within $M$.) ### 5.2. Arakelov Theory Connection (Advanced Arithmetic Topology) While pure Geometric Topology often focuses on real/complex geometry, advanced arithmetic topology (Arakelov theory) seeks to define topological invariants that are invariant under arithmetic changes (e.g., changing the ring of integers). If you consider the "spectrum" of a ring $R$ (the set of prime ideals), how can you define a topological space whose homology groups reflect arithmetic properties like class numbers or regulators? This is where the concept of the **Adelic Space** arises, bridging analysis, geometry, and number theory. --- ## 6. Troubleshooting and FAQ Encountering difficulties when moving between the continuous geometric world and the discrete arithmetic world is common. | Problem/Observation | Guiding Question for Resolution | Potential Insight | | :--- | :--- | :--- | | **The quotient $M = \Gamma \setminus X$ is too singular.** | Did $\Gamma$ contain elements of finite order (torsion)? If so, how do these elements relate to geodesic loops in $M$? | Torsion elements create "orbifold points" or "singularities." If $\Gamma$ is torsion-free, the resulting quotient is a true manifold. | | **Rigidity theorems seem too strong/restrictive.** | Are the hypotheses of the theorem (e.g., higher rank, specific measure-preserving action) fully satisfied? | Higher-rank lattices are much more rigid than rank-one lattices (like $\text{SL}_2(\mathbb{Z})$). Rigidity often fails if the rank is too low. | | **I cannot visualize the cusps.** | Can you find a coordinate system where the action of the parabolic element becomes a simple translation? | Cusps are topologically equivalent to the tail of a cylinder or a funnel. They correspond to the boundary points missed by the discrete group action. | **FAQ: Why is $\text{SL}_2(\mathbb{Z})$ so special?** It is the fundamental example because it is the simplest non-trivial arithmetic group acting on a rank-one symmetric space ($\mathbb{H}^2$). Its study (modular forms, elliptic curves) provides the blueprint for understanding higher-rank arithmetic geometry. --- ## 7. Best Practices and Tips for Exploration How can we cultivate a deeper intuition for these interwoven structures? 1. **Visualize the Fundamental Domain:** Always attempt to sketch the fundamental domain $F \subset X$ for the action of $\Gamma$. How do the sides of $F$ need to be identified to form the quotient $M$? This geometric visualization often reveals topological features like genus. 2. **The Role of Curvature:** When studying $M = \Gamma \setminus X$, ask: *What is the average curvature of $M$?* For arithmetic quotients of negatively curved spaces, the curvature is often related to arithmetic invariants (e.g., the Selberg zeta function). 3. **Test the Rank Hypothesis:** When considering a rigidity statement, always ask: "What happens if I reduce the rank of the ambient group $G$?" If the statement fails at rank 1, it highlights the crucial role of higher-rank structure in forcing rigidity. 4. **Connect to Representation Theory:** Remember that arithmetic groups are representations of number fields. When you see a geometric result, ask: "Can this result be rephrased purely in terms of the algebraic representations of the associated number field?" This shift in perspective often unlocks deeper understanding. | 0.7 | high | 6 | 2,819 | [
"calculus fundamentals",
"algebra"
] | [
"real analysis",
"abstract algebra"
] | [
"science",
"technology",
"philosophy_and_ethics"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.65,
"creativity": 0.45
} |
3d0608f3-59e9-4c6b-aee7-d8eef8a9f17a | discussion female police examined | technology | qa_pairs | This discussion of female police examined the changes that have occurred in the status of women in policing in this decade, the nature of the resistance of male officers to women in policing and the problems the women officers face as a result, and current research and policy issues related to women and policing. Abstract Since 1972 many of the discriminatory practices that restricted the selection and deployment of female police have been eliminated. Women have increased in numbers and proportions in law enforcement agencies, but they still make up only a token proportion of all police personnel. The barriers to women in policing come from both the structural characteristics of policing and police agencies and the ways that cultural mandates and behavioral norms related to gender shape interpersonal interactions in specific occupations. Structural factors include the opportunity structure, the power structure, and relative numbers. The dangers involved in police work also heighten the barriers to informal acceptance of anyone regarded as an outsider. Male officers' language, attitudes, sexual harassment, and informal social exclusion can also remind female officers that they are desired sexual objects, visible outsiders, and feared competitors. Interactions with male citizens can also be problematic for female police officers. Future issues to be addressed are the effects of moving beyond token status in numbers, the assignment of women officers, the use of women as supervisors, turnover, and pregnancy policies. Footnotes, table, and 48 references. Question: What year did the discussion on female police begin? Answer: 1972 Question: Have all discriminatory practices that restricted the selection and deployment of female police been eliminated since 1972? Answer: No | 0.6 | medium | 4 | 317 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
5e9b94b3-c475-4168-969c-e03d44e50594 | Scholars undecided about precise | technology | technical_documentation | Scholars are undecided about the precise origin and meaning of Sarapis (or Serapis as he was called by the Roman emperors). Attempts have been made to demonstrate an origin in Asia Minor, Babylon or Greece, but so far unsuccessfully. It is more likely that Sarapis was 'born' on Egyptian soil. According to an ancient cult legend, Ptolemy I received orders in a dream to transport the cult statue of Pluto from Sinope on the Black Sea to Egypt. When he asked his advisors what the dream meant, they told him that the god was called Sarapis and that the order had to be followed, which it subsequently was. Some researchers interpret the story to mean that Sarapis was a deliberate creation of Ptolemy and his advisors with the intention of uniting the Egyptians and the Greeks living in Egypt under one religion. Others are of the opinion that the intention was to give the Greeks their own deity. There are two arguments against the theory that Sarapis was a Ptolemaic 'invention' - first, this would mean that for the first time in the history of religions an 'invented' deity was worshipped for a long time, and second, the legend demonstrates that the name Sarapis was already known to the advisors. It is clear that the name Sarapis is a graecized form of the name Osiris-Apis, the bull of Memphis identified with the ba of Osiris and worshipped in Egypt. The fact that the statue of Pluto in Alexandria was given the name Sarapis means that this new god was added to the pantheon as a special form of Osiris-Apis. However, Sarapis is not identical to Osiris; thus it is still only Osiris with whom an Egyptian wants to be identified with after death. There are also striking iconographic differences - Sarapis is never depicted mummiform, but rather as a Greek god with beard and a kalathos on his head.
The basis of the Sarapis theology is supplied by Osiris as the god of the underworld and of fertility. Just like Osiris, Sarapis is linked with the earth and with regenerative power. The kalathos that Sarapis wears on his head points to his links with the earth and its fruits. Just like Osiris, Sarapis, too, was regarded as the lord of the Nile, but also of the sea; he rules the storms and rescues people in peril. Sarapis quickly came to be seen as a healer of all kinds of diseases and this characteristic certainly contributed to him being worshipped in a wider circle. To his aspect as healer he also added that of giver of oracles; in both instances Sarapis used a dream or a vision to appear to believers. Sarapis has a close relationship with Isis; together with her he was worshipped as 'soter', saviour. In the Roman Period, Sarapis became associated with Helios and became the 'Lord of Time' and god of all, and his cult spread through the region around the Mediterranean Sea. In the 2nd century AD, the church father Tertullian could still state that 'the whole earth now swears by Serapis', but by 391 AD the destruction of his temples in Alexandria and Canopus marked the end of the worship of Sarapis. | 0.55 | medium | 4 | 663 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [] | {
"clarity": 0.4,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
ffbf0993-8fed-4a64-8cf8-c1065a6c67ac | many ‘awareness’ months throughout | interdisciplinary | historical_context | We have many ‘awareness’ months throughout the year, but one that is of particular interest to me is April because it’s IBS Awareness Month. You will probably see more ‘chatter’ and ‘conversation’ on the internet, and more articles in newspapers and magazines, discussing this growing digestive and gut health epidemic. I know ‘epidemic’ is a big word, but I feel IBS is a big problem in the Western world, and it is a growing problem, causing a financial problem for the NHS, but an even bigger issue here is the affect IBS has on quality of life, on body image, confidence, energy levels and mood.
When I started out as a natural health practitioner over 26 years ago, the term Irritable Bowel Syndrome hadn’t been ‘invented’. Phrases like spastic colon were commonly used to describe bloating, stomach cramps and irregular bowel movements. The label of IBS didn’t appear until about 20 years ago or thereabouts. The same applies to Crohn’s Disease and Ulcerative Colitis, two of the most common of the diseases under the Inflammatory Bowel Disease (IBD) category. Crohn’s Disease and Ulcerative Colitis only emerged at the beginning of the 20th century, and in 1932, only 10 cases were diagnosed. Since then Inflammatory Bowel Disease has also exploded in epidemic proportions. Interestingly, in China, Crohn’s Disease didn’t exist until about a decade ago. Does this have some connection with countries becoming more developed and more industrialised. When this happens, diets change, more processed and ‘fast’ food becomes available, affecting the gut microbiome in a negative way, leading to irritation, inflammation and ulceration.
In the UK we have around 15 – 20% of the population diagnosed with IBS. However, this figure is a conservative one, as it only accounts for the people who have visited a GP or Gastroenterologist, and we have a statistic for. There are tens of thousands of people that suffer with chronic bloating, painful trapped gas, constipation, diarrhoea, to name a few of the symptoms, that are hiding behind closed doors due to embarrassment and shame, afraid to seek help from their GP. It is so important to get a proper diagnosis though as many symptoms of IBS can also be symptoms of diseases more dangerous and life-threatening. IBS is not a life-threatening disease. It may be life-limiting, but it will not kill you, unlike bowel cancer or ovarian cancer. It’s important to rule out these two cancers as both can cause bloating, abdominal pain and change in bowel movements. It’s also important to be tested for Coeliac Disease (allergy to gluten) and Inflammatory Bowel Disease, as these can also cause bloating, abdominal pain and change in bowel movements.
One thing I always ask my clinic clients and people that contact me asking for advice about their bloating and abdominal pain is when they first noticed their symptoms, and can they remember what triggered them. I ask them to go back to a time when they didn’t have any symptoms at all, and think what may have happened. Perhaps the bloating and constipation began after an intensive course of antibiotics for acne or a UTI. Perhaps they had a debilitating dose of food poisoning, and their gut just hasn’t been right since, or perhaps when they were at University and they lived on a diet of junk food and alcohol, they’d noticed that they were always bloated, especially after eating. Very often you can see a pattern begin to appear.
There is no blood test, scan or x-ray to diagnose IBS. It is a diagnosis of exclusion, and this can take some considerable time, as the GP and Gastroenterologist begins to test and x-ray to rule out the above mentioned diseases. Gynaecological disorders can also contribute to bloating, in particular endometriosis and ovarian cysts, so you can see how difficult and long-winded it can sometimes be to get a proper diagnosis of IBS. With the best will in the World, your GP and Gastroenterologist will carry out all necessary tests, but when the tests come back ‘negative’, where do you go from there. All a GP can then do is offer you synthetic medication to help manage the IBS symptoms. Not ideal is it, as the medication does just that, treat the symptoms, and doesn’t get down to the real issue of IBS, what caused it in the first place.
It’s important though that if you have suddenly developed bloating and it doesn’t subside, or you have a change in bowel habit, from normal to constipation, or normal to diarrhoea, and there’s evidence of blood in it, please go and have a chat with your GP. It’s probably nothing serious, but always good to get checked out.
If you have been diagnosed with IBS and you need help resolving the symptoms, please contact me: email@example.com | 0.6 | medium | 4 | 1,021 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"technology",
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.45,
"creativity": 0.3
} |
4764fb04-a530-4e3b-b756-fda10d3ee771 | Tamir added advanced driver-assistance | life_skills | historical_context | Tamir added that advanced driver-assistance systems (ADAS) reduce “the frequency of collisions but also their severity, which is particularly important to cyclists, who are one of the most vulnerable road users.”
We began our conversation at Ft. Meyer, the military base in Arlington, Va., where we were reviewing the feasibility of an automated shuttle service and discussing safety applications for ADAS in Defense Department vehicles housed on the base. I had some more questions for him about ADAS – a crucial precursor technology in the ongoing unveiling of automated vehicles (AVs).
Kelley Coyner: While you’re working to solve that riddle of AVs being able to predict cyclist behavior, what are ways that AV tech can be used now to protect bicyclists and pedestrians?
Uri Tamir: There is no need to wait [for AVs to hit the road].
Mobileye’s systems provide sufficient time, either to the driver or to the vehicle’s actuation system, to take action and possibly avoid, or at least mitigate, the severity of a collision. Collision avoidance is a fairly immediate solution if you consider some other methods available to increasing bicycle safety (like bicycle helmets).
How do ADAS improve bike and pedestrian safety?
Each year, about 2 percent of motor-vehicle crash deaths are bicyclists. And that is after cities and the governments have spent millions of dollars on education and training programs to increase the use of safe-riding habits and helmet use.
ADAS does not replace those best driving/riding practices that governments are so desperate to promote – drivers should always be highly aware of vulnerable road users and cyclists should always ride with caution and make sure they wear helmets. But collision-avoidance systems that alert the driver of an imminent collision with bikes and pedestrians have the ability to make safer cities across the United States.
How many cars and trucks have you retrofitted with ADAS? Since the introduction of pedestrian and cyclist collision warnings, thousands of vehicles in the U.S. have been equipped with this life-saving feature as part of our ADAS aftermarket product. And thousands of new vehicles also have bicycle-detection technology powered by Mobileye. (Editor’s note: Take a look at all the other examples of what ADAS can accomplish besides spotting people walking and biking.)
Transit and sanitation fleets all over North America, including the New York Metropolitan Transportation Authority [MTA], which started equipping its buses earlier this year, work with us. And as part of the U.S. DOT Smart City Challenge, the winning city, Columbus, Ohio, will retrofit its entire fleet with Shield+, our ADAS solution for urban long vehicles.
What results have you seen so far?
Research recently released by the Transportation Research Board, the Washington State Transit Insurance Pool [WSTIP], and the University of Washington exploring the effectiveness of Shield+ on WSTIP’s assets was incredibly favorable about the positive impact that Shield+ can have on collisions and urban safety.
In that study, the buses logged more than 350,000 miles and close to 24,000 operating hours with Mobileye Shield. During that time, Shield+-equipped buses were involved in zero collisions with pedestrians or bicyclists. And they were not involved in any rear-end collisions.
Buses with Shield+ experienced 43 percent fewer pedestrian and cyclist collisions and blind-spot warnings. After WSTIP reviewed its insurance-claims history, it found that buses equipped with Shield+ showed a 58.5 percent potential reduction in vehicular and pedestrian claims due to collisions. That is a significant result, not only for safety but also for the [return-on-investment for] transit fleets.
Dish Network, the satellite television provider, analyzed more than 18 months and 12 million miles of Mobileye use, including collision rates and costs. It compared the data with its pre-Mobileye information and has seen a reduction of 85 percent in all types of collisions that Mobileye addresses and a 92 percent reduction in collision costs.
How much does an after-market retrofit cost?
Cost varies depending on the vehicle and the specific crash-avoidance system, but in this type of industry, the ROI is high. A transit authority could have retrofitted its entire fleet with collision avoidance for a tenth of the cost of a single jury verdict for a serious injury caused to a pedestrian by a right-turning bus.
Are you trying this on buses?
Buses are certainly a target for us, and there are unique challenges for the mass-transit industry when it comes to pedestrian and bicyclist safety.
The size and length of buses creates large blind spots on both sides of the vehicle and, with the bus’s A-pillar, this contributes to limited visibility for the bus operator. Greater turn radii pose a risk of a collision in almost every turn, particularly with a pedestrian or a cyclist hidden in one of the vehicle’s blind spots.
Another challenge unique to the transit industry is approaching and leaving bus stops. When you think about it, transit buses are the only mode of transportation that requires a driver to move directly towards a group of standing pedestrians like they do when approaching a bus stop.
To solve these challenges, we created a multi-camera ADAS solution, up to four cameras on a regular 40-foot bus and six cameras for an articulated bus. The cameras communicate with each other and alert the driver both visually and through audible alerts. The alerts are directional, meaning, if the risk of a collision with a cyclist is detected from the right side of the bus, the bus operator will receive a visual and audible alert from the right-side display.
What is next in after-market applications? What is on your wish list?
One feature that I am particularly excited about is animal detection. Large animals crossing the road, such as deer or moose, pose significant collision risks in certain parts of the U.S., and there is a dire need for collision systems that can identify them. | 0.6 | medium | 4 | 1,259 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.45,
"creativity": 0.4
} |
94e4b41a-e4a7-4c02-b8aa-3dfa7fb8ba75 | Young teens see pregnancy | life_skills | research_summary | Young teens see pregnancy as a way to enhance relationships
Researchers gain insight into how to prevent teen pregnancyProvidence, RI – Younger teen-agers who become pregnant tend to view pregnancy as a way to form or enhance connections with others, and are less likely to think they are unprepared to raise a child. By contrast, pregnant teens who are 18 or 19 years old acknowledge that they lack preparedness, but say there are advantages to having a baby earlier in life. These observations offer some insight into how to prevent teen pregnancies, researchers say in a paper published in the current issue of Pediatrics.
"We need to help teen-agers identify ways to connect with others in life besides motherhood," says lead author Cynthia Rosengard, PhD, MPH, a researcher in internal medicine at Rhode Island Hospital and an assistant professor of medicine at Brown Medical School. "If those connections are lacking in a teen-ager's life, that's something we all need to look at – whether we're parents, teachers or physicians."
The study was conducted with 247 pregnant adolescents, ages 12 to 19, who were seeking prenatal care at a primary care clinic. They were given a survey that asked for demographic information and included open-ended questions about the advantages and disadvantages of being pregnant as a teen-ager compared to waiting until they were older.
While the teens' answers varied, there were common themes. Among the list of advantages, they believed a baby would help them form connections with others, such as bringing them closer to their boyfriend or creating a family. One 13-year-old noted as an advantage, "being able to play along with your child not only being his/her parent but being a friend."
Some said if they had a baby early in life, that would give them more time later to accomplish what they wanted. For example, one adolescent said her child would be older when she wanted to become a lawyer. Others expressed concerns about fertility later in life. And some said they would receive more support as a young parent than if they were older.
Some teens also said having a baby would require them to mature and take on more responsibility; one young woman said that motherhood would keep her from drinking and doing drugs. A 15-year-old wrote "the good thinks (sic) are that I have someone to live for."
Among disadvantages, teens expressed that they would have more responsibility and would miss out on typical adolescent experiences. Some said they would have to put their lives on hold and revise their life goals. They also expressed concern that they could have difficulty juggling school and motherhood and might have to drop out of school. A 14-year-old responded: "1. No job to support me and my baby 2. Im (sic) not out of school."
Those who said they were not prepared emphasized different areas in which they were not ready, including being too young and lacking stability. Teens also were concerned about how others might view them because they had a baby during adolescence.
Disadvantages mentioned by a 17-year-old were: "financial problems. Not waiting until I was married because I'm not sure if the father is always gonna be there."
Researchers noted differences between the age groups. About half of those aged 18 or 19 said they were not prepared for pregnancy, compared to 42 percent of 16- and 17-year-olds and 35 percent of teens under 16. They gave reasons such as: immaturity, being emotionally unprepared, financial or employment instability, uncertain relationships and lack of stable housing. Likewise, 63 percent of the oldest teens felt the pregnancy would disrupt their life, while 83 percent of teens under 16 believed the pregnancy would bring on more responsibility and change their life plans.
Researchers also found a difference among Hispanics compared to other ethnic groups; Hispanic teens were less likely to say they were unprepared to raise a child. Overall, those surveyed cited more disadvantages than advantages to teen pregnancy. However, Hispanic teens cited positive aspects of pregnancy in terms of how it enhanced connections with others, including the perception that a baby would bring them closer to their boyfriend.
In the survey, disadvantages outnumbered the advantages, possibly because society sends many negative messages about teen-age pregnancy, Rosengard says. However, because the teens were already aware of some of the drawbacks, intervention efforts should reinforce these challenges.
"We can say that if you happen to get pregnant or you choose to get pregnant, you're most likely going to have to put aspects of your life on hold. Chances are that you are going to miss out on being a teenager because there are more responsibilities. Perhaps if these disadvantages were more salient to these adolescents, they might have been able to do more to avoid a pregnancy," Rosengard says.
There are known health consequences of teen-age pregnancy, as well. Adolescents often delay seeking prenatal care, have poor prenatal health behaviors, and give birth to low birth-weight infants. Even healthy infants born to teen-age mothers are at increased risk of neonatal death.
While pregnancy rates have declined in recent years, in 2000, more than 800,000 girls under the age of 20 became pregnant in the United States – with about half of those giving birth. In recent years, there has been a strong emphasis on programs designed to prevent teen-age pregnancies. However, little work has focused on what teen-agers believe about pregnancy, the authors write.
The collective responses in this study tell researchers that there is no uniform way to prevent teen pregnancy. "You really need to know who you're talking to and where they're coming from, and that should help you to tailor the way you intervene," Rosengard says.
The study was conducted by researchers from Rhode Island Hospital, Women & Infants Hospital and Brown Medical School, all in Providence, RI. The research was supported by the Rhode Island Foundation.
Founded in 1863, Rhode Island Hospital (www.rhodeislandhospital.org) is a private, not-for-profit hospital and is the largest teaching hospital of Brown Medical School. A major trauma center for southeastern New England, the hospital is dedicated to being on the cutting edge of medicine and research. Rhode Island Hospital ranks 13th among independent hospitals who receive funding from the National Institutes of Health, with research awards of more than $27 million annually. Many of its physicians are recognized as leaders in their respective fields of oncology, cardiology, orthopedics and minimally invasive surgery. The hospital's pediatrics wing, Hasbro Children's Hospital, has pioneered numerous procedures and is at the forefront of fetal surgery, orthopedics and pediatric neurosurgery. Rhode Island Hospital is a founding member of the Lifespan health system.
Last reviewed: By John M. Grohol, Psy.D. on 30 Apr 2016
Published on PsychCentral.com. All rights reserved. | 0.6 | medium | 5 | 1,449 | [
"domain basics"
] | [
"expert knowledge"
] | [
"science"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.55,
"creativity": 0.3
} |
11ffd5af-b409-4c15-b6d9-0002f8ce2b87 | Last week covered math | mathematics | historical_context | Last week I covered the math of Ancient Greece. Fast-forward about 1,500 years and we’re in the Italian Renaissance, the period which ushered in dramatic changes in art, science, politics, the economy, and of course, mathematics. The three most significant changes, covered below, were the pursuit of formulae for higher order equations (i.e., moving beyond the quadratic formula), modernizing and standardizing mathematical symbols, and coming to a consensus on what seems like a trivial question: What is a number?
Unless otherwise noted, my summary and commentary below is based on A History of Mathematics by Victor Katz.
From Quadratics to quartics
One way to categorize equations with unknowns is to group them by the degree of the unknown. The lowest degree, like x = 12, are known as linear equations. Raise x to the second power and we have a quadratic equation, like x² = 9. Raise it to the third power and we have a cubic equation, like x³ = 8. Raise it once more, to the fourth power, and we have a quartic equation, like x⁴ = 81. Finding the values of the unknowns in equations like these has been a focus of mathematics since the time of the Babylonians.
The Babylonians, active a couple centuries before the common era, were able to apply a formula to solve linear and quadratic equations. The modern quadratic formula, employed to solve an equation of the form ax² + bx + c = 0, looks like this:
The quadratic formula. Substitute a, b, and c, and voilà, you have your x.
Other cultures around the world achieved similar feats, probably in independence. But it would be several thousand years before anyone worked out a formula for solving equations of the third and fourth degree, the cubics and quartics mentioned above.
Abacists and the economy
When we consider the Renaissance, we’re quick to think of developments in art and science, and of the characters who embodied both, like Leonardo da Vinci. But there were other changes afoot.
Europe was moving out of its medieval, barter economy, and into a more modern economy based on money. The businesses themselves were becoming more sophisticated, too. Instead of one-off ventures in which someone would commandeer a ship and crew to bring foreign products to market, businesses were forming which made possible a continuous flow of goods between ports.
Double-entry accounting, an error-detection tool which is still used to this day, was first codified during the Renaissance (though it may have been invented earlier).
These changes in business came along with a new class of tradesmen: abacists. Part accountant, part mathematician, part instructor, the abacists bear much of the responsibility for the mathematical developments of the Renaissance. Why? Because they pushed forward the study of mathematics and passed it on to their students.
Higher order equations
The abacists used Islamic and Greek math as their foundation and then built from there. In terms of finding general solutions to the cubic and quartic equations discussed above, there were a number of players involved. The most famous of these was Girolamo Cardano. In addition to being the foremost mathematician of his era, Wikipedia credits him with being a physician, philosopher, gambler, and, inexplicably, “supporter of the witch hunt.”
In terms of Cardano’s mathematical achievements, he made use of negative numbers, acknowledged the existence of imaginary numbers, and published formulas for cubic and quartic equations in his seminal book Ars Magna. The key word there is published, since the formulas were not originally created by Cardano. One came from his predecessor Scipione del Ferro, and another from his assistant, Lodovico Ferrari. Cardano attributed the work of both in his book.
Perhaps the most famous of Cardano’s appropriations were the formulas of Niccolò Tartaglia. Tartaglia shared his cubic formulae (in the form of a poem!) with Cardano on the condition that Cardano not publish them. It turned out that del Ferro (mentioned above) came to the same solutions as Tartaglia, which Cardano felt entitled to publish. Still, Tartaglia felt he’d been betrayed, and the episode kicked off a feud that would last the rest of their lives.
Perhaps the most striking realization I’ve had in spending the past few weeks studying the history of math was that its representation was not born fully-formed. The first numbers bore no resemblance to our own, and the same holds for our symbols. In other words, the first addition that was ever written wasn’t “2 + 2 = 4.” Instead, it was probably more akin to “take two of a thing, add to them another two, and the result is four.”
Some of the most important developments of mathematical symbolism came out of the Renaissance (just check out the number of symbols on this page which originated in the 15th and 16th centuries). I’ve highlighted a few below, which, along with others, culminated in what we now understand to be modern algebraic symbolism in the mid-seventeenth century.
From Roman to Hindu-Arabic numerals
What’s XXIX times XVII? Why, CDXCIII, of course. In case your Roman numeral multiplication is a little rusty, that’s 29 times 17, which equals 493. Worse yet, what would that result multiplied by ten be? In our modern Hindu-Arabic numerals we just add a zero at the rightmost position: 4930. But in Roman Numerals it changes the number entirely, from CDXCIII to MMMMCMXXX.
Needless to say, a place-based system (whether decimal or not) which employed zero as a place value offers huge advantages over a non-place-based system. Still, Arabic-Hindu numerals were not adopted immediately. Why? Katz writes: “It was believed that the Hindu-Arabic numerals could be altered too easily, and thus it was risky to depend on them alone in recording large commercial transactions.” If this seems quaint, think about the last time you wrote a check. You likely wrote out the value twice, once using numerals ($17.50) and again using English words (seventeen dollars and fifty cents).
Just as the the Renaissance was brining changes to the representation of numbers, mathematical symbols, like + and -, were changing too. But this was a slow, iterative process. An intermediate step, near the end of the fifteenth century, involved replacing the Italian words for plus and minus with the abbreviations of p̅ and m̅.
It’s worth noting that calling symbolic notation or a place-value number system an “advancement” is at least partly subjective. Just as we find the Roman numeral system to be foreign and difficult, mathematicians of that era would likely have judged our numbers and systems similarly. It just depends on what one is familiar with.
Other mathematical symbols were standardized during this era. Among them, the (totally radical) symbol √ for square root, which is credited to the German mathematician Christoff Rudolff, the symbol = for equality, credited to the Welshman Robert Recorde, who wrote of the two parallel lines that “no two things could be more equal.” Rafael Bombelli, the Italian mathematician, wrote powers as a superscript relative to the entity being raised (though next to the number, rather than the variable). And the Frenchman François Viète used letters to represent unknowns in algebraic equations, an innovation whose utility and importance speaks for itself.
Finally, Simon Stevin developed and advocated for a notation for decimal fractions which bear a striking resemblance to our modern notation. In Stevin’s notation, which he called “decimal numbers,” the number 123.875 would be written 123⓪8①7②5, rather than as an integer summed with traditional fractions, 123 ⅞. According to Katz, “He also played a fundamental role in changing the basic concepts ‘number’ and in erasing the Aristotelian distinction between number and magnitude.” I’ll get to these concepts in the next section.
Unifying number and magnitude
The Greeks had some interesting ideas about different types of number. They drew stark a distinction between discrete numbers, which they placed in the category of “number,” and continuous numbers, like √2, which they called “magnitude.” The two types behaved differently in different situations, hence the distinction.
Stranger still, the Greeks even drew a distinction between 1 and numbers greater than 1, arguing that 1 (unity) is simply a generator of numbers, as the point is the generator of a line. Stevin, mentioned in the previous section, was sure that 1 was a number like any other. So sure, in fact, that he wrote “THAT UNITY IS A NUMBER” in his l’Arithmétique. Stevin also worked to remove the distinction between number and magnitude, though it would be several more centuries before discrete arithmetic and continuous magnitude found their union. Still, Katz writes, Stevin’s contribution was significant: “Ultimately, [Stevin] was so successful that it is difficult to understand how things were done before him.” | 0.65 | medium | 7 | 1,963 | [
"calculus",
"linear algebra"
] | [
"graduate mathematics"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.65,
"creativity": 0.4
} |
e7f75bfa-a262-4013-8867-2a8c4b6f7cc8 | The Power of Gratitude | social_studies | historical_context | The Power of Gratitude
Teaching our kids to say “Thank you’’ is important but more important is instilling the value of gratitude in them…. Gratitude goes Beyond Therapy. New research on gratitude finds that it helps younger kids and students to be happier and more compassionate. Believe it or not, Gratitude has always been a very significant element of healthy lifestyle and mindset.
Gratitude counteracts the instant gratification of demands by children today. As parents, it becomes our prime concern to raise our children with Gratitude. It does not only make them a happier person, but also makes them a greater and a more responsible individual who has values to instigate in the further generations to come. The tips that I now share, shall become a helping hand for you to guide your child down the path of a compassionate, optimistic, and a grateful life;
1. Count Your Blessings Every time your children feel blue, show them the brighter side of things. Make them realize that they have a family that is rooting for them, their parents who love them with all their hearts and will provide unconditional support, and friends to add colors in a daily black and white show. Show them how they have a shelter to protect them, clothes to warm them, food to sustain them, and most of all, love and belongingness that keeps the world going.
2. Thank You A “thank you” has a very deep and important meaning. The children need to realize that there are a set of people responsible for every need that has been met for them- in the society, as well as in the family. The meaning and the value of the words “thank you” play a major role in changing one’s perspective of the world. This needs to be modeled at home by you, the parents.
3. Spend Mindful Time with Your Kids Understand that no gift could be as valuable as your time with your children. This will open the doors for better understanding, sharing and bonding between you and them. In the talks, show how important they are for you, and how truly grateful you are to have them.
4. Encourage Your Children to be Helpful Helping others instills a certain joy of giving, which is the natural mantra of a happy being. When they try and help others, they realize that others are grateful towards them, which encourages children further. Make them more cooperative and appreciate their helpful nature.
5. Help Kids Find What Matters To Them As adults, it’s our pleasure to help kids discover their passions and to find a path of purpose that co-relates with them— with their values, interests, and dreams. This begins with encouraging them to learn and to discover more and more about the social issues the kids care about. Help them to understand in what ways they can make a difference towards these issues and how important it is for all of us to take initiatives, no matter how big or small on personal levels. The deepest sense of Gratitude in life comes from connecting to a bigger picture, to an issue that matters to others and doing things that contribute to society down the road.
“Trying to make grateful kids isn’t just an issue for families; it’s an issue for society as well. Society desperately needs to harness the Power of Gratitude.”
By Minu Dubey
Counselor & Psychologist | 0.65 | medium | 3 | 683 | [
"foundational knowledge"
] | [
"advanced concepts"
] | [
"science"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.35,
"creativity": 0.3
} |
966d1cd8-a554-4e46-9da6-25f3c8beacd2 | Federal Writers' Project Life | interdisciplinary | historical_context | Federal Writers' Project - Life Histories/2015/Fall/Section 018/Chinese Laundryman Joe Shing
Joe Shing (Chinese Name 周兴, Chinese spelling Zhou Xing, 1893~?) was a Chinese immigrant running a laundry house in Spartanburg, South Carolina, USA, in 1930s. He was represented for the typical Chinese immigrants at that time, who lived in cities, at the low class of society, who conserved some Chinese traditions, remained sensitive to the world, and at the same time struggled to win a place in the USA society.
The South Carolina Writer Ruth D. Henderson interviewed Joe Shing in 1938, in which Joe said that he started to operate the laundry house set up by his cousin, Joe Whot (Chinese spelling Zhou Wo), many years ago. He survived the business and although in a tough environment, kept an “easy-living” life attitude.
Family and Childhood
Joe Shing was born in Polo, Kanton Province, in China in 1893. Joe was his family name, and Shing was his given name. He abided the Chinese tradition to put the family name at front. His family is a typical poor peasant family in 1930’s China, operating the primitive and laborious cultivation, participated by all the family members. They raised cotton, corns and potatoes, but the family could barely afford its own meal and often starved.
He went to a feudalistic private school but quitted after the feudal government that employed the students was overthrown. At that time China had just opened its door to the outside world and Joe’s family for the first time heard of the USA from the missionary. In order to escape from the poor and turbulent China, they put their eyes on the USA, which was described as a “great country where you can live easy and do like you want to” .
Teenager Years in the USA
Joe Shing followed his father’s footsteps by coming to the United Sates under the influence of missionaries.
Joe first arrived in San Francisco at 18, and started to learn English after his arrival. He got his first job as a clerk in a Chinese grocery store, and after three years, moved to Chicago to join his brother’s Coffee shop. After accumulating enough money by this business, he and his brother started a laundry house in Athens, Georgia. After several years of success, Joe Shing received the news that his father past away. Having to financially support his family in China, Joe was ultimately forced to shut down his business.
The War and the Homeland
Joe Shing signed for military for the War of 1917 but did not actually go to the battle. When interviewed by Henderson in December 1938, his homeland China was in war with Japan, a part of the World War II. He was confident about China’s final victory, and had faith in China’s future development.
Joe returned his country three times; the last trip was in 1932. He witnessed the change of China and appreciated them. His cousin Joe Hand (Chinese name “周汉”, Chinese spelling Zhou Han) who started the laundry business with him, came back to the homeland at last, but Joe Shing chose to stay in the America.
Joe Shing operated a laundry house in Spartanburgs, South Carolina, after his previous laundry business was shut down. His Laundry House was small and inconspicuous. The house had two floors and was decorated by Chinese elements. The laundry equipment was simple and crude, and the environment was dim.
Joe employed African American women to help wash and iron clothes. His customers were mainly Asians and African Americans, and his price was approximately 20% cheaper than the other local laundry houses .
The laundry house was also Joe’s home, where he slept and cooked and ate. His living section was separate from the laundry business section; although the two-floor house was small, it was orderly arranged.
Chinese in the USA in 1930s
The Great Depression
The Great Depression was rampant in the 1930s. It was a severe depression in economy lasted from 1929 to the late 1930s. The unemployment was high and people faced the hard time to live. The president Herbert Hoover believed in ‘rugged individualism’, the idea that people would recover by their own, and then the situation worsened . In 1932 President Franklin D. Roosevelt came to stage and enacted the New Deal, using the government’s forces to help recover the economy. The whole 1930s was a time when the USA gradually recovered from the economy recession, and the job competition was fierce. Asian immigrants faced more intense competition than the native residences did, and they mainly took the tiring and dangerous jobs.
The Nativism, an anti-immigrant attitude was popular since 1880s, after WWI. Several anti-immigrant laws (such as Chinese exclusion act of 1882, Emergency Quota Act of 1921, and National Origins Act of 1924) were enacted since 1880s and still influenced the American Chinese in 1930s. The Chinese Exclusion Act enacted in 1882 was specially aimed at Chinese, not repelled until 1943. This act made Chinese immigration to the United States illegal . Asians were not allowed to own land and had no right to citizenship . So Joe Shing, a low-educated man even could not speak English, was probably a stowaway.
Despite the fact that 1930s was the hard time for the recovery from the Great Depression, the nativism made the USA more unwelcomed to Chinese. They lived under pressure and usually in poverty, undertaking the tough and sometimes dangerous jobs, which did not require high-level education. They were especially vulnerable during times of economic crisis . For example, Chinese laundrymen on east coast of the USA saw their earnings decline by about one-half during the depression.
Cling to the homeland
Although most Chinese who came to the USA at that time were escapists from the chaotic and poor homeland, they still maintained their identities as Chinese and remained separate from the whites. Since they were discriminated due to their race, a feeling of alienation raised in them. They recognized themselves as Chinese, and respected the Chinese traditions and often gathered to form a Chinatown , creating a sense of belonging.
Bibliography Henderson, D. Ruth, “South Carolina Writers Project, Life History”, Spartanburg’s Chinatown, 5,7
Chang, Kornel S, “ Impact of the Great Depression on Asian Americans” Encyclopedia of the Great Depression. Ed. Robert S. McElvaine. Vol.1. New York: Macmillan Reference USA, 2004. 78
John, J. Newman and John M. Schmalbach,“ The Great Depression and the New Deal”, United States History. Second Edition. AMSCO School Publications INC. 492
Hudson, David L, “Herbert Hoover”, The handy presidents answer book, Visible Ink Press. 330
Lai, Him. Mark, “Teaching Chinese Americans to be Chinese”, Chinese American Transnationalism. ED. Sucheng Chan. Temple University Press. 194
Patel, Samir. S, “America’s Chinatowns”, ARCHEOLOGY, Vol. 67 Issue 3 (2014): 40
- “easy-living” Ruth D. Henderson, “South Carolina Writers Project, Life History”, Spartanburg’s Chinatown, 5 | 0.7 | medium | 6 | 1,651 | [
"intermediate understanding"
] | [
"research"
] | [
"technology",
"language_arts",
"social_studies"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.55,
"creativity": 0.35
} |
4f79ede4-49ff-40fd-b187-91a1379b94a0 | Bridging Divide: Stem Cells | science | historical_context | ## Bridging the Divide: From Stem Cells to Engineered Tissues **Shared Pattern**: The fundamental pattern connecting stem cell biology and biomedical engineering is **controlled differentiation and directed self-assembly**. Both fields are deeply concerned with guiding biological components, whether they are individual cells or complex tissues, to develop and organize in specific, predictable ways to achieve a desired functional outcome. In stem cell biology, this means coaxing pluripotent cells into specialized cell types. In biomedical engineering, it means designing scaffolds, bioreactors, and stimuli to orchestrate the growth and arrangement of these cells into functional tissues or devices. At its core, it's about harnessing and directing the inherent biological potential for organization and specialization. **The Surprising Connection**: The surprising connection lies in recognizing that **biomedical engineering provides the essential physical and chemical "environment" and "instructions" that stem cell biology needs to realize its potential for tissue regeneration and therapeutic applications**. While stem cells possess the intrinsic ability to differentiate and self-organize, this process is highly sensitive to external cues. Without the sophisticated tools and design principles of biomedical engineering, the precise control required to generate functional, implantable tissues from stem cells would be impossible. Conversely, the remarkable plasticity of stem cells offers biomedical engineers a dynamic and adaptable "building material" that can far surpass the capabilities of inert synthetic materials. This interdependence is not immediately obvious because stem cell biology is often viewed as a pure science of cellular mechanisms, while biomedical engineering is seen as a discipline of device design. However, the most impactful advances in regenerative medicine emerge precisely at their intersection, where biological potential is translated into tangible therapeutic solutions through engineering design. **Illustrative Example**: **Engineering a Functional Pancreatic Islet for Type 1 Diabetes Treatment** Type 1 diabetes is characterized by the autoimmune destruction of insulin-producing beta cells within the pancreatic islets. Stem cell biology offers the promise of generating these beta cells from sources like induced pluripotent stem cells (iPSCs). However, simply generating beta cells isn't enough; they need to be organized into functional islets that can sense glucose levels and secrete insulin appropriately, and crucially, be protected from immune attack. This is where biomedical engineering steps in. * **Step 1: Stem Cell Differentiation (Stem Cell Biology)** * Human iPSCs are derived from a patient's somatic cells (e.g., skin cells) and reprogrammed to a pluripotent state. * Through carefully designed protocols involving specific growth factors, small molecules, and signaling pathways (e.g., Activin A, BMP4, FGF7, and specific inhibitors like SB431542 and Y-27632), these iPSCs are guided through a developmental trajectory mimicking pancreatic organogenesis. This process involves sequential differentiation into endoderm, then pancreatic progenitors, and finally, insulin-producing beta cells. The precise timing and concentration of these biochemical signals are critical for achieving high purity and functional maturity of the beta cells. * **Step 2: Scaffold Design and Fabrication (Biomedical Engineering)** * To mimic the natural microenvironment of pancreatic islets and protect them from immune rejection, biomedical engineers design and fabricate specialized encapsulation devices. A common approach involves creating microcapsules from biocompatible and immunoprotective materials like alginate. * These alginate microcapsules are engineered with specific pore sizes. The pore size is critical: it must be small enough to prevent the passage of immune cells (like T-lymphocytes) that would attack the transplanted beta cells, but large enough to allow essential nutrients (like glucose and oxygen) to enter and insulin to exit. The alginate itself is often modified with other biomolecules, such as RGD peptides, to promote cell adhesion and survival. * **Step 3: Cell Encapsulation and Implantation (Biomedical Engineering & Stem Cell Biology in Tandem)** * The differentiated iPSC-derived beta cells, now mature and capable of insulin production, are mixed with the liquid alginate solution. * This cell-laden alginate is then dropped into a calcium chloride solution, which causes the alginate to instantly cross-link and form stable microcapsules. * These microcapsules, containing the functional beta cells, are then implanted into the patient, often under the skin or in the peritoneal cavity. The engineered microcapsule acts as a protective barrier, allowing the beta cells to engraft, function, and secrete insulin in response to blood glucose levels, without triggering a destructive immune response. This example showcases how the biological precision of stem cell differentiation is married with the material science and design capabilities of biomedical engineering to create a viable therapeutic strategy for a complex disease. **Reciprocal Learning**: Mastering stem cell biology provides biomedical engineers with a deep understanding of the intrinsic cellular programs and signaling pathways that govern cell fate and tissue development. This knowledge allows engineers to design more biologically relevant and effective scaffolds, bioreactors, and delivery systems. For instance, knowing the specific extracellular matrix components that support pancreatic beta cell function informs the selection of materials and surface modifications for encapsulation devices. Conversely, understanding biomedical engineering principles equips stem cell biologists with the tools and methodologies to precisely control the cellular microenvironment and guide differentiation. Knowledge of biomechanics, material properties, and microfluidics enables biologists to design experiments that probe specific cellular responses to physical cues, leading to more refined differentiation protocols. For example, applying controlled shear stress in a bioreactor can influence stem cell differentiation towards specific lineages, a concept rooted in biomechanics. **Mathematical Foundation**: While not always explicitly stated in everyday discourse, mathematical principles underpin many aspects of this connection. * **Diffusion and Mass Transport**: The efficacy of the encapsulated pancreatic islets relies on the diffusion of glucose into the microcapsules and insulin out. This can be modeled using Fick's laws of diffusion. For a spherical microcapsule of radius $R$ and a concentration gradient $\Delta C$ across its thickness, the flux $J$ (amount of substance per unit area per unit time) is proportional to the diffusion coefficient $D$ and the concentration gradient: $J = -D \frac{dC}{dx}$ The pore size of the alginate matrix dictates the diffusion coefficient $D$ for different molecules, a critical parameter in designing the capsule for optimal nutrient and waste exchange. * **Cell Growth and Viability Kinetics**: Understanding how cell populations grow, differentiate, and survive within a scaffold or bioreactor often involves modeling using differential equations that describe population dynamics. For example, a simple model for cell proliferation might be: $\frac{dN}{dt} = \mu N$ where $N$ is the cell number and $\mu$ is the growth rate. However, in engineered tissues, $\mu$ can be influenced by nutrient availability (modeled by Michaelis-Menten kinetics), waste product accumulation, and mechanical stress, all of which are engineered parameters. * **Mechanical Stress and Strain**: The mechanical properties of scaffolds and the forces exerted on cells during tissue development can be described using continuum mechanics and finite element analysis. Understanding the relationship between applied stress ($\sigma$) and strain ($\epsilon$) in a scaffold material, often characterized by its Young's modulus ($E$) as $\sigma = E\epsilon$, is crucial for designing structures that can withstand physiological loads without compromising cell viability or function. **Universal Application and Implications**: The pattern of **controlled differentiation and directed self-assembly** is not confined to stem cell biology and biomedical engineering. It is a fundamental principle observed across numerous natural and engineered systems: * **Embryonic Development**: The entire process of embryonic development is a prime example. A single fertilized egg undergoes controlled cell division, differentiation, and self-assembly to form complex tissues and organs, guided by intricate genetic programs and molecular signaling gradients. * **Materials Science**: In materials science, engineers design processes to control the crystallization, microstructure, and self-assembly of atoms and molecules into functional materials with specific properties, such as polymers or advanced ceramics. * **Robotics and Swarm Intelligence**: In robotics, engineers are exploring how to design simple robotic units that can autonomously self-assemble into larger, more complex structures or perform coordinated tasks, mirroring biological self-organization. * **Nanotechnology**: The self-assembly of nanoparticles into ordered arrays or functional nanostructures is a key area in nanotechnology, driven by precise control over intermolecular forces. The implications of understanding and harnessing this pattern are profound. It allows us to not only regenerate damaged tissues and organs but also to design novel biomaterials, develop more effective drug delivery systems, and even engineer entirely new biological functions. The ability to control biological self-organization through engineered environments is at the heart of many cutting-edge advancements in medicine and beyond, promising a future where we can precisely sculpt living matter for therapeutic and technological benefit. | 0.7 | medium | 8 | 1,808 | [
"research methods",
"statistics"
] | [
"doctoral research"
] | [
"technology",
"arts_and_creativity"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.65,
"creativity": 0.4
} |
2a30ba6b-3982-44ad-9b0e-c5b94893d019 | Researchers already submitting ideas | technology | research_summary | Researchers are already submitting ideas for projects for the 14th and 15th Five-Year Plan
The National Space Science Center affiliated to the Chinese Academy of Sciences has officially launched a program consisting of five space exploration projects to be accomplished during the 13th Five-Year Plan (2016-20).
The projects involve a series of satellites and a spacecraft to study solar-geophysical activity, the water cycle on Earth, and cosmogenic origin of black holes, gravitational waves and gamma-ray bursts.
"President Xi Jinping spoke of the importance of space exploration at a major sci-tech conference on May 30. It is necessary to promote the all-round development of space science, space technology and space applications via initiating these projects," said Xiang Libin, vice-president of the Chinese Academy of Sciences.
The five projects were selected from a number of candidates sponsored by the academy's Strategic Priority Program on Space Science over the past five years.
"Under the State-funded Strategic Priority Program, we have already launched three satellites into space, achieving significant research results, which will be released in the coming few months," Xiang said.
China's first Dark Matter Particle Explorer satellite was launched in December last year, followed by the Shijian 10 satellite, which was launched and recovered in April, and the Quantum Experiments at Space Scale satellite that was launched in August.
"The research, design, production and launch of scientific satellites are a prolonged process that usually takes five to 10 years. A program that provides continuous support to promising projects means space scientists across the country are given a stable channel to demonstrate their ideas step by step," Xiang said.
The center has also begun soliciting research ideas from all space science institutes across China.
Researchers are able to submit an introduction to their research ideas to the center by the end of December. After the first round of expert reviews, the ideas with prospects for study will receive grants from the center for up to six months of in-depth study to form detailed research plans, some of which will be chosen as candidates for the country's 14th Five-Year Plan (2021-25) or 15th Five-Year Plan (2026-30) on space exploration.
"The primary criteria for selecting a candidate project is the prospect of scientific achievement," said Wu Ji, director of the National Space Science Center.
According to Wu, international research frontiers include cosmogenic origin and solar-geophysical activity.
"However, this is a bottom-up application process instead of a top-down deployment process, which means we have no intention of starting projects that cover all international frontiers. We will only chose projects that Chinese scientists have an interest in and research capabilities to perform," he said.
The satellites, when launched, will work in coordination with scientific facilities on Earth.
"For example, we have sent some researchers to work with the Laser Interferometer Gravitational-Wave Observatory-which detected gravitational waves in February-in the United States. In the future, once waves are detected on the ground, we will turn our satellite immediately in the given direction to obtain more accurate data," Wu said. | 0.55 | medium | 5 | 668 | [
"data structures",
"algorithms basics"
] | [
"architecture patterns"
] | [
"science",
"social_studies"
] | {
"clarity": 0.4,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.25,
"creativity": 0.3
} |
903d49b6-30e0-43e9-a92a-2e33bcc11549 | What are penguins | technology | historical_context | What are penguins?
Penguins are a type of bird that is most known for living in cold weather environment and for swimming instead of flying. In fact, penguins usually spend around half of their time swimming in very cold ocean waters.
Penguins are very good at swimming. They can reach very high speeds in the water, and they are capable of diving down quite deep when hunting for food, in addition to leaping out of the water to escape predators.
What do penguins look like?
There is some variation in appearance for different breeds of penguins, but in general they are smaller birds (the largest only reaches 3 feet in height). They have black and white feather patterns, and their wings are flippers.
Their color pattern is very useful for defense against potential predators, such as orca whales. The reason is that their darker feathers on their backs makes it hard to see them from above, where they blend in with the dark depths of the water.
Their lighter feathers on their bellies makes it hard to see them from below, where they blend in with the lighter colors of the ocean where the light from the sun shines down.
The most notable way to tell the different penguin breeds apart is by the different kinds of color patterns and marks on their heads. For instance, Macaroni penguins were so named because of the orange feathers on their heads.
Other breeds of penguins include the Adelie penguins, King penguins, Emperor penguins, Rockhopper penguins, Galapagos penguins, and Gentoo penguins.
Where do penguins live?
It’s common to think of penguins in Antarctica, but they also live in several other parts of the Earth’s southern hemisphere. In fact, penguins can be found in parts of South Africa and Australia as well.
Penguins spend so much of their time in the water, and make their habitats in and around the ocean, so it is not surprising that their diet mainly consists of fish. Penguins have also been seen to eat octopus, squid, and several types of crustaceans, such as shrimp.
Taking care of their offspring
Most kinds of penguins choose mates that they will have for their entire lifetimes. Other kinds of penguins stay with their specifically chosen mates for a mating season.
Penguins, like most birds, lay their eggs in the springtime, usually in the same location every year. Something unique about penguins is that both the mother and father penguins will take turns warming the eggs: it is not the sole responsibility of just one of the parents.
Penguins also spend time with their chicks after they hatch to keep them safe from any potential predators for several months. Penguin chicks are easily identifiable from their very fuzzy appearance, as their water-resistant feathers do not grow in until later.
Additional information about penguins
Because penguins live nearby the ocean and spend so much of their time in the water, it is very fortunate that they are able to drink salt water, unlike humans.
Penguins have to hold their breath when they dive under the water, but some breeds, such as the emperor penguin, can do this for 20 minutes. | 0.6 | medium | 4 | 631 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
7332a145-0625-47f2-9324-c382fca511f0 | characterize optimal exploitation paths | science | creative_writing | We characterize the optimal exploitation paths of two perfect substitute primary energy resources, a non-renewable polluting resource and a carbon-free renewable one. Both resources can supply the energy needs of two sectors. Sector 1 is able to reduce its carbon footprint at a reasonable cost owing to a CCS device. Sector 2 has only access to the air capture technology, but at a significantly higher cost. We assume that the atmospheric carbon stock cannot exceed some given ceiling. We show that it is optimal to begin by fully capturing the sector 1's emissions before the ceiling is reached and next, to deploy the air capture in order to partially abate sector 2’s emissions. The optimal carbon tax is first increasing during the pre-ceiling phase and next, it declines in stages down to 0.
Climate change; Energy; CCS; Air capture; Carbon tax;
- Q32: Exhaustible Resources and Economic Development
- Q42: Alternative Energy Sources
- Q54: Climate • Natural Disasters • Global Warming
- Q58: Government Policy
Jean-Pierre Amigues, Gilles Lafforgue, and Michel Moreaux, “Des modes de capture du carbone et de la compétitivité relative des énergies primaires”, Économie et Prévision, n. 208-209, 2016, pp. 39–55.
TSE Working Paper, n. 13-392, April 2013 | 0.7 | medium | 4 | 319 | [
"scientific method",
"basic math"
] | [
"advanced experiments"
] | [] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.35,
"creativity": 0.4
} |
5587f93e-c906-4866-bbc7-91b55ef40630 | – scroll down to see further images – | technology | tutorial | – scroll down to see further images –
This very well cast and relatively large image of Krishna shows the deity as a crawling infant – a form known as Balakrishna. He holds a butter ball in his right hand. He is naked other than for a chest band, a waist band, and jewellery. His left hand rests on what appears to be another butterball.
He wears multiple necklaces, bracelets, upper arm bands, anklets, and hair decoration as well as a tall, jewelled hair decoration. All the while, Krishna maintains a serene, knowing, slightly smiling expression.
One particularly beautiful aspect of the bronze is a hair curl, modelled like a butter curl, that protrudes from the back of Krishna’s head.
He crawls atop a tiered, rectangular plinth, the sides of which are decorated with lotus petals and sections of cross-hatching. The top of the plinth, beneath Krishna, is similarly decorated. It stands on four small cylindrical feet. The image of Krishna and the plinth are attached permanently by means of bronze rivets. The dynamism of the scene is emphasised by Krishna’s left foot and leg protruding away from the back of the plinth.
The imagery of the butterballs relates to another incident in his early life when he stole a butterball from his mother’s larder.
The image of Krishna has been cast in bronze but the platform upon which he crawls has been cast in brass, providing a pleasing contrast between the two metals. The combination of brass and bronze in religious items is referred to as ganga-jumna. ‘Ganga’ refers to the River Ganges and ‘Jumna’ to the River Jumna (also called Yamuna). The Jumna is the longest tributary river of the Ganges in northern India. It travels a length of 1,376 kilometres (855 miles) before merging with the Ganges at Triveni Sangam, Allahabad, the site for the massive Kumbha Mela festival every twelve years. It is the longest river in India that does not directly flow into the sea. The water of one has a slight yellow hue on account of the alluvial mud suspended in its waters, whilst that of the other has a reddish hue, and so in this vessel, the two rivers are represented by yellowish brass and reddish copper, with the combination in the one item being symbolic of the merging and mixing of these two holy rivers at Triveni Sangam.
This is a fine miniature bronze. The condition, patina and casting are all excellent.
Mitchell, A.G., Hindu Gods and Goddesses, UBSPD, 1982. | 0.6 | medium | 3 | 560 | [
"programming basics"
] | [
"software development"
] | [] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
ef4309b0-2d6c-4bf1-8780-abfd1d7f3333 | stem spread obesity, must | technology | research_summary | To stem the spread of obesity, we must study the web of commercial interests and strategies driving it, says Jonathan Wells.
Pelotas is a South Brazilian city of marked economic contrasts. At the roadside, thin ponies pull battered carts past bicycles. Along the thoroughfare, motorcycles and smart new cars zoom past them. Some people live in shacks made from plastic bags, others in mansions with yachts moored at their garden's edge. Away from the city centre, small stores still offer cheap staples and vegetables. But closer to the centre, a large supermarket has opened, with an escalator leading up from the car park.
The city, where I contribute to epidemiological research on obesity, is also undergoing a marked nutritional transition. In Brazil, between 1973 and 1996, obesity increased from 2.4 to 6.9 per cent in men and from 7.0 to 12.5 per cent in women.
In simple terms, obesity arises when people consume more energy than they expend, either by eating too much or exercising too little. But obesity remains difficult to counter, and hundreds of research papers have been written on tackling it, mostly from high-income countries. Such studies can easily measure dietary intake, physical activity, and obesity status by simple methods (questionnaires, measuring weight and height) or, nowadays, with sophisticated state-of-the-art body movement recorders and stable isotope probes. Yet obesity becomes ever more prevalent.
It's undoubtedly true that economic and cultural transitions affect dietary intake and activity levels. If we measure these changing circumstances, we can see the impact of the growing 'obesogenic niche'—the sum total of environmental factors which collectively predispose to excess weight gain. The problem is that such research risks being simply a witness to the process, telling us what is happening without explaining why. For scientists, the 'why' should be just as important as the 'how'.
What is really driving the obesity epidemic is not increased dietary intake, or decreased activity levels, but the web of economic strategies and commercial interests that cause individual people to change or maintain certain behaviours. The way industry understands and manipulates individuals' behaviour is fundamental to the growth of the obesogenic niche.
Heads of industry would probably argue that they are not trying to create an obesity epidemic. Nevertheless, there are enormous profits to be had from obesity. The foods that maximise profit just happen to be those high in sugar or fat. They are cheap to produce, easy to brand and market, and easy to stock in supermarket aisles. And there are numerous ways to encourage people who are pre-obese to buy these foods.
Sedentary behaviour is also profitable, and encouraged by industry. A moped is more glamorous than a bicycle. A new computer game will re-invigorate peoples' interest, but not their bodies.
Until now, obesity research has concentrated on measuring the numbers of obese people, and attempting to identify the predisposing risk factors. This tends to identify individual behaviours, but not the push and pull factors that encourage or oblige people to display them. We can count the number of hours spent in a car or playing video games, but if we don't understand comprehensively why the car was used or the game was played, efforts to tackle obesity are doomed to failure.
Every new moped or litre of petrol sold, every new supermarket product purchased, is one more small step along the economic transition — and one more turn of the screw by the profit-led industries. These industries need people to indulge in obesity-causing behaviours in order to achieve their quarterly targets. Until commercial practices become the target, first of research studies and then of interventions, we are likely to retain our role of documenting, rather than truly understanding and preventing, the obesity epidemic.
Understanding the obesogenic niche, rather than what happens to the people in the niche, is an urgent but relatively ignored priority. The kind of research needed to probe this issue is very different from conventional biomedical research. Ideally, researchers should have expertise in the same skills that the companies use to maximise their profits — advertising, economics, and forecasting social trends.
Public health scientists need to take on commercial companies at their own game. Perhaps researchers should begin by measuring the same outcomes that companies use to maximise their profit. If the company knows how to sell more biscuits, health researchers need to know how to achieve the opposite.
As yet, governments have been very reluctant to go on the offensive against commercial interests, because the two parties are interconnected. With substantial tax revenues deriving directly from corporate profits, the financial risks to national economies are obvious.
At the simplest level, only when the cost of treating obesity and its co-morbidities exceeds the tax levied from the obesogenic companies is there an economic logic for taking action. Something similar has already happened with smoking in Europe. A more sophisticated approach suggests it would be prudent to act before this tipping point is reached. Obesity is so difficult to treat that prevention is the crucial target.
Maximising profit and incessantly maintaining economic growth are central to the western industrial economic model. This is our mode of capitalism, and the same model is driving the nutritional transition. As countries are absorbed into this model and pass through the transition, an increasing proportion of the population are drawn into new behavioural patterns, altering their physical activity and their access to food. And the obesogenic niche is not exclusive to adults, it also affects foetuses, infants, toddlers, children and adolescents. Each stage of the life-course is a target for commercial interests.
Capitalism out-competes other economic systems, as evidenced by its worldwide spread. So on purely economic grounds it is successful. But the costs may be expressed in other currencies, such as the prevalence of hypertension, type 2 diabetes and cardiovascular disease. Capitalism has been studied primarily by economists. It's time health researchers got in on the act.
Jonathan Wells is a reader in childhood nutrition, Childhood Nutrition Research Centre, UCL Institute of Child Health, London.
See Letter to the editor.
This article is part of a Spotlight on Tackling chronic diseases. | 0.65 | medium | 6 | 1,272 | [
"algorithms",
"software design"
] | [
"distributed systems"
] | [
"science",
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.65,
"creativity": 0.45
} |
425948ab-872d-48d3-9232-50c42ccb3eea | lot people now slowly | interdisciplinary | historical_context | A lot of people are now slowly seeing the true benefits of using algae; this article is going to discuss more algae and the benefits of using it and even direct you to the right place to buy some for your personal use. First of all, algae are actually one of the long term products that are a good source of oils for fuel, biomass, food, fodder and other important products that people use today. This product is indeed scarce but it does not mean it is low in number because there are a number of algaebarn out there that are producing a lot of algae for the market. If you want to know more about algae and its benefits, make sure you check the article below.
The benefits that algae hold stem from how old these plants are and how they have evolved over billions of years. They store energy in the form of oil and the process of doing it is actually efficiently done by these plants with their own natural process.
Check the list below for more reasons to why you should be using algae to produce other important and useful products.
You don’t have to worry about using a lot of algae because this type of marine plant grows very fast. Mass production is everywhere which means you don’t have to worry about drying up the world of its algae. In just a few hours, algae can double their numbers and can be harvested every day; algae can help produce more biomass and biofuel for the world to use. This is why algae are one of the most productive plants in the world today; with that rate of growth and purpose, you can’t help but appreciate this creation. You can’t overlook the fact that algae are a plant that you can see anywhere especially when you go to the beach; algae are everywhere but not many people are utilizing this plant the right way. Click the following link: https://www.algaebarn.com to know more about algae benefits.
Algae is a plant that is giving the world more jobs especially in processing them into other products that the world loves to use. With the number of products that can come from algae, this is helping generate more business and in turn, generate more jobs for the people as well. You can’t deny the fact that algae, as simple as a plant it may look like, is a huge help for the world. To know more algae click the following link: https://www.encyclopedia.com/plants-and-animals/microbes-algae-and-fungi/moneran-and-protistan/algae. | 0.6 | medium | 4 | 519 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"technology",
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.25,
"creativity": 0.3
} |
b73ce0b6-8ae2-47b4-93f8-6015d1c5a361 | Red Slender Loris | life_skills | historical_context | Red Slender Loris
The Red slender loris has a curious appearance, being a small primate with very big red eyes, rounded ears, and arms and legs which are long and slim. Its large eyes that face forward, giving it excellent night vision as well as superb depth perception. It uses its hands and feet skillfully and they are well adapted to climbing amongst the trees of its habitat. They have an opposable big toe on each foot, producing a pincer-like grip.
Habits and lifestyle
Red slender lorises are nocturnal and arboreal. When not feeding, they are quite sociable, forming small groups where the members groom each other, sleep and play in the same area. They may sleep in tangled branches, tree hollows, or just on a branch, tightly curled. Females are higher than males in the social hierarchy. They forage alone and become active at night, and during the daylight hours they rest or sleep. These animals communicate by means of urine scent marks, to claim territory or advertise their reproductive status. If threatened, they usually remain motionless until danger has passed. Failing this, they will stare at the attacker while growling and emitting an unpleasant smell from the scent glands beneath their arms.
Diet and nutrition
The Red slender loris is primarily insectivore and eats insects, lizards, small vertebrates, fruit, leaves, buds, and birds eggs.
Little is known about the mating of Red slender lorises living in the wild. However it is suggested that their mating system is polygynandrous (promiscuous), when both males and females have multiple mates. Breeding takes place usually two times a year from May to December. The gestation period is 166 to 175 days, and birthing is once or twice each year, with usually one offspring being produced, occasionally two. Females may reenter estrus while nursing a previous litter. Infants are altricial, and cling to their mothers continuously during their first four weeks. Then they are placed in a sheltered place during their mother’s active nighttime periods. Weaning occurs at about 185 days, when the juveniles are adult size. They reach sexual maturity around 10 to 18 months (males being slower) and may first reproduce soon after.
Though protected by law within a theoretically protected habitat, these animals are regularly hunted for “medicinal” use of their body parts, a major threat that many animals in Asia share. They are also killed by cars when crossing roads and electrocuted on power lines when attempting to climb along a “vine”. Huge habitat loss as a result of illegal logging, and the development of cinnamon, palm oil, rubber and tea plantations, is likely sealing off any chance of recovery while humans are active in the area.
According to the IUCN Red List, the total Red slender loris population size is fewer than 2,500 mature individuals. There are two subspecies of red slender loris: the western red slender loris is estimated to number approximately 1,500 individuals; the Montane slender loris is estimated to number around 80 individuals. Overall, currently Red slender lorises are classified as Endangered (EN) and their numbers today are decreasing.
As insectivores, Red slender lorises may have an impact on the insect community but it's not confirmed.
Fun facts for kids
- Slender lorises cannot jump even short distances, but with their long limbs they can bridge large gaps in the trees.
- Slender lorises are often called “bananas on stilts.”
- In Dutch ‘loris’ means ‘clown’. This might be because of their big, round eyes and their faces look like they’ve been painted.
- A loris sleeps in a very particular position. It curls into a ball and puts its head between its legs.
- Slender lorises can make the following sounds: whistles, chitters, krik calls, zic calls, growls, and screams.
- Through huddling and allogrooming, touch plays an important part in establishing and maintaining the group cohesion of red slender lorises. This may also help them orient in the dark. | 0.7 | medium | 5 | 878 | [
"domain basics"
] | [
"expert knowledge"
] | [
"technology"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.55,
"creativity": 0.45
} |
918638e1-322c-4c99-90f8-6a6baf123c55 | Tutorial: Implementing Secure HTTP | technology | practical_application | ## Tutorial: Implementing Secure HTTP Request Methods for Mobile Application Backends **Overview**: This tutorial transforms best practices for web development request methods (GET vs. POST) into actionable steps for mobile application development, focusing on security, intent, and server interaction when updating or creating data via HTTPS. **Prerequisites**: * Basic understanding of HTTP methods (GET, POST). * Familiarity with making HTTPS network requests from a mobile application (e.g., using URLSession in iOS or Retrofit in Android). * Access to the backend server configuration or documentation. --- ### Step 1: Determine the Intent of Each Application Request The primary goal is to map application actions accurately to the appropriate HTTP method based on whether data is being retrieved or modified. 1. **Classify Retrieval Actions:** Identify all actions where the application *only* reads data from the server and does not change any persistent state. * **Action:** Use the **`GET`** method. * **Example:** Fetching a user's profile details, loading a list of available games, or retrieving message history. 2. **Classify Modification Actions:** Identify all actions where the application *creates, updates, or overwrites* data on the server, even if the action is not strictly "destructive" (i.e., it overwrites a score instead of deleting a record). * **Action:** Use the **`POST`** method. * **Example:** Creating a new game session, updating a high score, sending a message, or submitting user registration data. 3. **Validate the "Destructive" Definition:** Treat any action that changes server-side data—even overwriting a value—as requiring `POST`. * **Checkpoint:** Review your application's network calls. If any call modifies server data (e.g., updates a score), confirm its method is set to `POST`. ### Step 2: Enforce POST for All Data-Altering Operations Since mobile applications use custom clients rather than standard web browsers, the primary defense against Cross-Site Request Forgery (CSRF) attacks (like those leveraged via `<img>` tags in browsers) is to use the correct method universally for modifications. 1. **Mandate POST for Updates:** Configure your application code to exclusively use `POST` for any request that results in data creation or modification on the server. 2. **Avoid GET for State Changes:** Explicitly prohibit using `GET` for actions like "Creating games," "Updating scores," or "Sending messages." 3. **Server Preference:** Recognize that a custom application client has no inherent reason to favor `GET` over `POST` when interacting with its own backend API. Use `POST` for simplicity, safety, and clarity of intent. * **Practical Guidance:** If you find yourself tempted to use `GET` for brevity, remember that `POST` clearly signals to proxies and servers that the request is intended to make a change, allowing systems to handle it appropriately (e.g., avoiding aggressive caching). ### Step 3: Address Caching and Logging Implications Understand how using `POST` affects intermediate network components and debugging logs compared to `GET`. 1. **Manage Caching Risks:** Acknowledge that `GET` requests are susceptible to being served from proxy caches, meaning the request might not always reach the target server, or you might receive stale data. * **Mitigation:** While you can add headers like `Cache-Control: no-cache` to `GET` requests, using `POST` inherently signals to proxies that the request should generally be forwarded to the origin server without caching the response. 2. **Adjust Server Logging Procedures:** Prepare for the fact that `POST` data (parameters sent in the request body) is typically *not* logged by default in standard web server access logs (unlike `GET` parameters in the URL). * **Action:** Implement application-level logging within your server-side code to capture the contents of the `POST` body for debugging and auditing purposes. * **Tip:** Be prepared to correlate time-sorted `GET` logs (containing request paths) and your custom `POST` data logs during troubleshooting. * **Checkpoint:** Confirm that your server monitoring setup includes custom logic to capture and log the payload data sent via `POST` requests. ### Step 4: Implement Robust SSL/TLS Verification Regardless of the HTTP method used, securing the transport layer is critical, especially when users connect over untrusted networks (like public Wi-Fi). 1. **Enforce Certificate Validation:** Ensure your mobile application strictly verifies the SSL/TLS certificate presented by your Web server during the HTTPS handshake. 2. **Handle Self-Signed Certificates (If Applicable):** If your backend uses a self-signed certificate, you must **pin** that specific certificate within your mobile application code. This prevents Man-in-the-Middle (MITM) attacks where an attacker substitutes a fraudulent certificate. 3. **Validate Trust Chain:** Do not bypass certificate validation checks, as this leaves users vulnerable to eavesdropping and data interception. * **Troubleshooting:** If your app fails to connect to the server after implementing strict verification, check the certificate chain validity or ensure the pinned certificate hash matches exactly. --- **Practice Exercise**: For your application, identify three distinct actions: one that only retrieves data (e.g., `GET /user/settings`), one that updates a record (e.g., `POST /game/update_score`), and one that creates a new entity (e.g., `POST /user/new_message`). Manually verify in your network debugging tool (e.g., Charles Proxy or Xcode Network Monitor) that the first uses `GET` and the latter two correctly use `POST` over HTTPS. **Key Takeaways**: * Use **`POST`** for any request that modifies, creates, or overwrites server data, even if the action isn't technically "destructive." * Using `POST` signals intent, aids in avoiding caching issues, and keeps sensitive parameters out of URL query strings that might be logged externally. * Even in app-to-server communication, **strict SSL/TLS certificate verification (including pinning)** is mandatory to prevent MITM attacks. **Next Steps**: Investigate methods for securely transmitting authentication credentials (like tokens) within the `POST` body or using secure HTTP headers, rather than relying on query parameters, to further enhance security against logging exposure. | 0.7 | medium | 5 | 1,355 | [
"data structures",
"algorithms basics"
] | [
"architecture patterns"
] | [] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.55,
"creativity": 0.35
} |
0308c61c-4962-4100-b7db-4817528f1adb | Oil & Gas | science | historical_context | Oil & Gas
Buy
12 October 2010
Providence Resources is an international upstream oil and gas company currently actively involved in Ireland, the UK, Nigeria and the Gulf of Mexico
Share Price Performance (p)
Source: Fidessa
Werner Riding
+44 (0)20 7634 4772 firstname.lastname@example.org
Simon Hawkins +44 (0)20 7634 4757 email@example.com
Sam Woodward
+44 (0)20 7634 4756 firstname.lastname@example.org
Providence Resources
Initiation of Coverage
Providence Resources (AIM: PVR) is an exploration and production company with an asset base focused primarily offshore Ireland, onshore UK and the US Gulf of Mexico (GoM).
Providence was incorporated in 1997 as a result of a de-merger which saw Arcon International Resources spin out its O&G assets into a new company that subsequently listed on the Exploration Securities Market (ESM) of the Irish Stock Exchange. In 2005 Providence was listed on the Alternative Investment Market (AIM) in London; it remains listed on both indices.
Main Asset Overview
Source: Providence
Providence has established an asset portfolio spanning the entire E&P cycle from early-stage frontier exploration to existing oil and gas development and production. In addition to the traditional E&P business, management has established two SPVs that offer investors exposure to other parts of the E&P value chain. These include Eirgas, a gas storage development play, and Exola, a heavy oil unit created to exploit discovered but as yet undeveloped heavy oil resources in the Celtic Sea.
Unlike many of its small-cap peers, Providence has a meaningful production-related revenue stream, which is derived from its UK Singleton and US GoM assets. These cashflows provide a valuable revenue stream which will facilitate ongoing portfolio investment.
In our opinion the assets with the greatest chance of generating a step-change in value in the short-to-medium term are the three Irish exploration/appraisal stage projects: Dunquin (8.4Tcf and 316MMbbl recoverable prospect), Spanish Point (multi-Tcf gas condensate accumulation) and Burren (resource upgrade expected 4Q10).
We see short-term price drivers being focused primarily on the high-impact exploration portfolio. Following extensive G&G work we anticipate a resource upgrade at Burren in 4Q10, which we think has potential to surprise on the upside. We also expect ongoing project development in the rest of the portfolio to help generate shareholder value as Providence embarks on a major offshore Ireland drilling campaign.
We initiate with a BUY recommendation and a 788p target price.
Contents
Providence has a 16% fully carried interest in Dunquin, the 8.4Tcf exploration prospect West of Ireland
Growing level of production with a 2010 targeted exit rate of 1,500boe/d
Investment Thesis
Providence Resources is a diversified small-cap E&P company with a spread of assets ranging from early-stage exploration through to existing production. Its main areas of focus are the UK & Ireland and the US Gulf of Mexico. In the UK and US GoM, Providence's production assets provide the company with an invaluable revenue stream that covers G&A and provides sufficient operational cashflow to service its interest-bearing debt.
Key Points
Diversified asset base — Portfolio comprises assets from all stages of the E&P cycle.
Production growth — Anticipated 2010 year-end production rate of 1,500boe/d, with Singleton production expected to rise from 750 to 1,500boe/d over the next 24 months.
High-impact exploration — Providence holds a 16% carried interest in Dunquin, an 8.4Tcf mid-case recoverable gas condensate prospect.
Material appraisal stage assets — Providence owns a 56% interest in Spanish Point and Burren.
Multiple development stage assets — Through the Exola portfolio.
Major operating partner relationships — Including, amongst others, ExxonMobil, Petronas, Chevron and ENI.
Balanced Portfolio
Providence has material 2P reserves of 17.2MMboe that are expected to support a growing production base — forecast to rise throughout 2H10 and into 2011. The UK and US GoM assets will contribute roughly evenly towards a guided year-end exit production rate of around 1,500boe/d. This will generate sufficient revenue to allow ongoing portfolio reinvestment.
Short-term Drivers
We see continued progress with respect to the development of Burren and Spanish Point as likely short-term catalysts. Based on interpretation of 300km 2 of new high-quality 3D seismic, we are anticipating an updated resource report for Burren by 4Q10. Following this, we would then expect management to attempt to secure another farm-in partner to mitigate its financial exposure ahead of further drilling activity in 2012.
In conjunction with operating super major ExxonMobil, we see completion of the site survey at Dunquin as a further positive development ahead of a more active phase of exploration activity, with a potential drill date of summer 2011.
Outlook
Over the next 24 months Providence will enter the most active operational phase in its history. With an extensive portfolio of over 12 drill-ready prospects, we foresee activity levels increasing significantly, with a number of potentially transformational events due to take place.
We believe Providence has the opportunity to create a meaningful Irelandfocused E&P business, and with drilling due to take place on many of its exploration, appraisal and development projects, we highlight that there are numerous events that could add substantial shareholder value. We feel Providence has a deep, quality portfolio that belies its current market cap (£60.0m). We suggest that if one or more of the upcoming highimpact opportunities are successful there is a chance for shareholders to realise significant capital growth.
3
Valuation
For a small company, Providence has an extensive asset base spanning a range of related segments of the upstream industry, including assets at various stages of the cycle from exploration, appraisal and production, to gas storage and heavy oil field developments.
We present our valuation in terms of Core NAV along with an indication of risked upside. Typically our Core NAV comprises an evaluation of proved producing reserves along with an assessment of development assets adjusted for net cash/(debt).
Figure 1: Portfolio Valuation Summary
| Gross Oil Gross Gas Gross Net Oil Net Gas Net Un-risked Risked Risked value Asset WI Classification MMbbl Bcf MMboe MMbbl Bcf MMboe value $m value $m £/share | |
|---|---|
| Production Assets GOM* Various Reserves 3 3 4 9 96.0 91.2 1 .75 Singleton* 99.13% Reserves 6 4 7 96.0 86.4 1 .65 | |
| Production Assets Reserves 9.0 38.0 15.3 192.0 177.6 3 .40 | |
| Development Assets AJE* 6.7% Contingent 1 43 850 285 10 5 7 19 71.3 21.4 0 .41 Dragon* 100.0% Contingent - 70 12 - 1 8 3 17.5 5.3 0 .10 | |
| Spanish Point* 56.0% Contingent 1 60 1,400 3 93 90 7 84 220 918.4 275.5 5 .27 Burren - volumes to be confirmed in Q4 10 56.0% Contingent - - - - - - 0.0 0.0 - | |
| Nemo 72.5% Contingent 2 0 - 20 15 - 1 5 21.8 5.4 0 .10 Baltimore 60.0% Contingent 3 0 - 30 18 - 1 8 27.0 6.8 0 .13 Barryroe* 30.0% Contingent 5 9 52 68 18 1 6 20 42.2 10.5 0 .20 | |
| Helvick 72.5% Contingent 3.5 - 3.5 2.5 - 2.5 7.6 1.9 0 .04 | |
| Hook Head 72.5% Contingent 2 0 - 20 15 - 1 5 21.8 5.4 0 .10 | |
| Baxters Copse* 50.0% Contingent 5.0 - 5.0 2.5 - 2.5 10.0 3.0 0 .06 | |
| Development Upside Contingent 440.5 2,372.0 835.8 168.9 874.1 314.6 1,137.5 335.2 6 .42 | |
| Net Cash/(Debt) | -101.3 -101.3 -1.94 |
| Core NAV Reserves + Contingent 177.9 912.1 329.9 1,228.2 411.6 7 .88 | |
| Exploration Assets Orpheus 100.0% Prospective - 290 4 8 - 2 90 4 8 145.0 14.5 0 .28 Pegasus (Central) 100.0% Prospective - 300 5 0 - 3 00 5 0 150.0 15.0 0 .29 | |
| Dunquin* 16.0% Prospective 3 16 8,400 1,716 51 1,344 2 75 721.5 144.3 2 .76 Drombeg* 16.0% Prospective 6,000 1,000 - 9 60 160 480.0 48.0 0 .92 Dalkey Island 50.0% Prospective 2 50 2 50 125 - 125 122.4 12.2 0 .23 Marlin 60.0% Prospective - 74 12 - 4 4 7 22.2 2.2 0 .04 | |
| Exploration Upside Prospective 566.0 15,064.0 3,076.7 175.6 2,938.4 665.3 1,641.1 236.3 4 .52 | |
| RENAV | 2,869.3 647.8 12.40 |
*Externally generated volumes; Source: Providence Resources, Ambrian estimates
Our calculation of Core NAV is 788p/share, and comprises US$91.2m of asset value, or 175p/share for US GoM, US$86.4m (165p/share) for Singleton, in addition to 642p/share for its development-stage assets. From this we deduct 194p/share to account for €74.5 of net debt.
Beyond our estimation of Core NAV we draw attention to Providence's considerable exploration pipeline. When we take into account the exploration upside we point to a further US$236.3m of risked exploration asset value, equivalent to an additional 452p/share.
We acknowledge the valuation gap between our Core NAV and Providence's current market value and point to several potential catalysts that will help bridge it. The first is newsflow; with activity levels rising at all of Providence's key projects, we anticipate more regular newsflow that could unlock additional shareholder value. We also suggest the proceeds of a potential asset disposal (US GoM or Aje) will help reduce gearing levels. This, in turn, would remove any discount the market may be applying resulting from uncertainty surrounding a relatively high level of gearing.
4
Financial Summary
For the six months ended 30 June 2010 Providence recorded revenue of €11.34m, up 8.3% from €10.46m 1H09. Lower realisations in the period of US$78.4/bbl vs. US$87.6/bbl for oil and US$5.65/Mcf vs. US$6.32/Mcf for gas were offset by higher YoY production volumes, which were up 19% in boe terms.
In June 2009 Providence carried out an equity placing to raise €16.9m, and in February 2010 an additional placing was completed raising a total €16.3m. The proceeds of both funding rounds were used to reduce net debt levels in addition to providing working capital. We estimate that current net debt stands at €74.5m, comprising €89.7m of loans and longterm liabilities and €15.2m of unrestricted cash.
Strategy
Providence has created a portfolio of assets that includes a mixture of high-impact exploration, appraisal/pre-development and existing production. In building its portfolio, the overriding approach has been to operate in geopolitically stable countries where the risk of asset expropriation is low.
In order to exploit the opportunities within its overall licence inventory, Providence has created a corporate structure that has three main segments.
In addition to the traditional E&P business that contains all of the West of Ireland exploration/appraisal assets along with the US and UK production, Providence also owns 100% of two SPVs (Exola and Eirgas) that are focused on heavy oil and gas storage respectively.
Source: Ambrian
5
Providence Resources – 12 October 2010
Outlook
The next 6-18 months will be the most active period in Providence's history as progress is made on all parts of its portfolio. We see opportunities to create substantive shareholder value from all of its core assets: Exola, the offshore Ireland E&P business, and Eirgas, in addition to disposing of non-core assets in Nigeria and potentially the US GoM. We also see continued growth in production and free cashflow as a result of ongoing development work at Singleton; we expect this to contribute a further 750boe/d to a total field production level of around 1,500boe/d within two years.
In its existing portfolio Providence has a number of potential catalysts that may generate significant capital growth. We feel the breadth and depth of Providence's asset base belies its current market value and that there is considerable underlying potential that — with successful exploitation over the next 6-18 months — could unlock significant additional shareholder value.
6
Portfolio comprises a mix of highimpact exploration, appraisal and development opportunities
Key Asset Review
Providence has a balanced portfolio that comprises a mix of exploration, appraisal/development and production across four main geographic areas:
Ireland
The UK
The US
Nigeria
In total, Providence holds an interest in 20 exploration and/or production licences. Nine of these are located offshore Ireland, two onshore UK, eight offshore US GoM and one offshore Nigeria. A review of these key assets follows and a summary sheet listing a breakdown of assets by region and type can be found in the Appendix.
Ireland
Ireland represents Providence's main area of geographic focus and, thus, half of its licence interests can be found here. The licence position can be sub-divided into three distinct areas:
Celtic Sea (Exola)
St George's Channel and East Irish Sea (Eirgas/E&P)
Offshore West of Ireland (E&P)
Providence currently produces no oil or gas from Ireland; however, with two significant appraisal-stage projects (Burren and Spanish Point) off the west coast and the whole Exola portfolio in the Celtic Sea, efforts are ongoing to change this and current management expectations are that first oil is likely to occur in 2013.
Source: Providence Resources
Celtic Sea (Exola)
In early 2010 Providence spun-off its unconventional oil assets located in the Celtic Sea with the formation of a special purpose vehicle (SPV) — Exola. Previously these assets were considered to pose both a significant technical and/or financial challenge and include heavy oils, waxy oils and marginal fields.
7
In conjunction with Nautical Petroleum, Providence's heavy oilfocused SPV Exola will appraise Irish Sea development opportunities
Providence Resources – 12 October 2010
The development of Exola's six key assets — Hook Head, Barryroe, Helvick, Dunmore, Baltimore and Nemo (discussed in more detail below) — has until recently been considered uneconomic due to low oil prices. However, prices recovered through 2009 and YTD in 2010 they have stabilised and have been predominantly range-bound between US$7085/bbl. This is a level that makes a number of projects economic.
In addition to higher oil prices, advances in technology and the close proximity of these assets to existing infrastructure mean they now represent a much more compelling investment proposition. Subject to necessary access to capital, management is confident that first oil could be achieved by 2013. Furthermore, in an attempt to mitigate the company's financial risk, it has focused on farming out part of its licence interests to new interested parties that have technical knowhow to assist in exploitation (recent examples of this strategy include the farm-out of Baltimore and Nemo to Nautical Petroleum). Looking forward, we anticipate further deal-related newsflow as Providence uses both its relatively high level of equity interests on a per project basis and its tax losses to negotiate a number of 'carrys' through to first oil/gas.
Baltimore (60%, operated)
Located in Licensing Option 10/1, the initial discovery well 48/19-2 was drilled in 1992 and discovered heavy oil. However, due to the nature of the crude (11˚ API) and weak market fundamentals (low oil price and low demand for heavy crudes) the well was plugged and abandoned.
Providence was awarded Licence Option 10/1 over the block in February 2010 and in April farmed out 40% to Nautical Petroleum, with initial studies of existing data indicating significant in-place resource potential. As part of the farm-in agreement Nautical is in the process of carrying out a detailed feasibility study with a view to identifying the most appropriate development solution for Baltimore. In addition to this we point out that recent work identified a separate 74Bcf gas prospect called Marlin near to the currently-producing Kinsale Head gas field.
Nemo (54.375%, operated)
The initial discovery well at Nemo was drilled in 1974 by Marathon, finding a small gas cap overlying a heavy 16˚API oil leg in deeper horizons. In 2006 Providence acquired a new 3D seismic survey over the area; subsequent interpretation work led to the identification of around 30Bcf in the gas cap and an estimated 230MMbbls of oil in the deeper formations. On 28 September Providence secured its second farm-out with Nautical Petroleum, whereby Nautical will earn an initial 25% in Nemo by agreeing to carry out a development feasibility study. Further to this, Nautical holds an option to increase its interest to 65% in return for funding the drilling of an appraisal well before year-end 2011.
Barryroe (30%, non-operated)
The Barryroe licence area is located directly beneath the Seven Heads gas field. Production testing of three wells drilled previously on the licence demonstrated flow rates between 1,300 and 1,600bbl/d. Despite being light 44˚ API crude, the oil has a high wax content (up to 20%); this implies that a more complex and costly production/processing solution will be required.
8
Since the initial discovery by Esso in 1973 two further wells were drilled, with both intercepting oil-saturated sands. A recent resource report by RPS Energy estimated that Barryroe could contain up to 500MMbbls of oil in place, and with an assumed recovery factor of 15%, Providence's net share of the recoverable resource would be 22.5MMbbls. Partners in this licence are San Leon (30%) and Lansdowne (40% and operator). As is the case with Nemo, we understand the partners are looking to farm down their equity interests in exchange for a new 3D seismic survey and a free carry on another well.
Source: Providence Resources
Hook Head (72.5%, operated)
To date four individual well penetrations have tested the Hook Head structure (a large mid-basinal anticline) and all encountered hydrocarbons. The first two (50/11-1 initial discovery and 50/11-2 appraisal) were drilled by Marathon in 1971 and 1975, with post-drill analysis suggesting the location of the structural-crest was to the NW of the initial discovery. This was later confirmed by a seismic survey acquired by Providence in 2006, and then by appraisal well 50/11-3 drilled in 2007. In 2008 the company drilled a further appraisal well (50/11-4) on the north-west flank of the structure, which also encountered a gas-bearing zone; however, the well was subsequently plugged and abandoned.
The future work programme will see Providence concentrate on the central part of the structure. Latest internal volumetric estimates suggest a potential in-place resource of c.120MMbbls. As with many other oil accumulations in the area, the Hook Head crude is waxy (10-20%), but unlike Baltimore and Nemo, it is lighter, with an API gravity of 24˚.
On 4 October management closed its second farm-out deal in as many weeks, this time with Sosina Exploration Limited for an initial 10% interest in Hook Head. In return Sosina will fund and carry out a number of studies on potential appraisal drilling locations and the development feasibility of Hook Head. It has the option to increase its holding to 50% by fully funding an appraisal well by the end of 2011.
9
Helvick (72.5%, operated)
The 49/9-2 Helvick discovery was drilled in 1983 by Gulf Oil and flowed light 44˚ API oil on test at a cumulative rate of 9,900bbl/d in addition to 7.5MMcf/d of gas. The discovery was appraised by three further wells in the late 1980s before Providence drilled its first well in 2000, which replicated the success of the initial appraisals by flowing oil on test at around 5,200bbl/d. Subsequent post-drill technical work showed the reservoir to be structurally complex and that the level of compartmentalisation would require further appraisal. Based on the level of additional work at the time, a standalone development could not be justified and so the asset was put on hold.
With around 10MMbbls of oil in place, Helvick is expected to produce around 3-4MMbbls over a period of about 3-4 years. This implies production of around 1MMbbls pa, or 2,783bbl/d, and will therefore pay back quickly. With first oil scheduled for 2013, Helvick is likely to be Providence's first oil production from Ireland. We also point out that the importance of Helvick to Providence is not limited simply to the cashflow it will generate; we expect the development of a light oil field offshore Ireland to attract considerable positive sentiment and refocus the industry's attention on a province that — with only 170 oil and gas wells drilled in total — is still significantly underexplored.
Dunmore (72.5%, operated)
Gulf Oil also drilled discovery well 50/6-1 on Dunmore in the 1980s; subsequent flow testing demonstrated that the reservoir was capable of producing high quality 44˚ API crude at a rate of 2,100bbl/d. Appraisal well 50/6-4 was then drilled by Providence in 2008 and, although the well failed to identify similarly oil-saturated reservoir sands as in the initial discovery well, a new, previously unidentified Jurassic carbonate interval also shown to be oil-bearing was encountered. In conjunction with the JV partners, work aimed at understanding the potential of this 'new' reservoir section is being carried out.
St George's Channel and East Irish Sea (Eirgas/E&P)
Providence's gas storage assets in the St George's Channel (Dragon) and the East Irish Sea (Kish Bank) exist in a separate SPV called Eirgas. Eirgas was established in early 2010 to capitalise on gas production and storage opportunities offshore Ireland and in the UK.
Earlier this year Eirgas held an option over the Kinsale Head and Seven Heads gas field; however, in May the company chose not to exercise the option, which subsequently expired. We feel this represents a clear indication by management that it considers this asset to be non-core. Following the expiry of the option, Eirgas has remaining interests in two gas assets: the Dragon field in St George's Channel and Kish Bank in the East Irish Sea.
Source: Providence Resources
Dragon (100%, operated)
Licence 1/07 is located in the St George's Channel Basin and contains 25% of the Dragon gas field which was discovered in 1994 and is estimated to hold some 70Bcf of recoverable gas. The field is predominantly located in the licence directly adjacent in UK waters. Marathon Oil, the previous owner of Dragon in the UK sector, recently relinquished the licence, meaning that it is available for re-application. Providence reacted swiftly to this situation and reapplied for the newly available licence area; it is now awaiting licence approval. Assuming Providence is awarded the licence, it would hold 100% of the field and at this point we understand the intention is to farm down and bring in a new strategic partner to assist in drilling several new appraisal/development wells.
In addition to representing another important near-term development project for Providence (due to its location in the Irish Sea in close proximity to Milford Haven and the Irish gas market), any infrastructure that is installed in response to a large gas discovery will be of strategic importance and will likely form a key part of a more significant gas infrastructure network between Ireland and the UK.
Underlying Dragon is the Orpheus prospect along with other intervals that are also thought to be hydrocarbon-bearing and have a combined attributed prospective resource of 290Bcf. In addition to Orpheus, Providence has a 100% interest in Pegasus, a larger Jurassic prospect with 890Bcf of associated prospective gas resources.
Kish Bank Basin (100%, operated)
Acquired in August 2008, Providence is exploring the potential of CO2 sequestration and gas storage opportunities (CCS) in the Kish Basin through Undersea Large-Scale Saline Sequestration & Enhanced Storage (ULYSSES).
A recent independent estimate of 2C recoverable resources at Spanish Point suggests 1.4Tcf gas and 160MMbbl oil
Providence Resources – 12 October 2010
Source: Providence Resources
Efforts are ongoing to explore the capability of saline reservoirs to act as possible sinks for gas storage and carbon sequestration. In April 2010 the potential of the Kish Bank Basin for gas storage was evaluated and one location was confirmed as being suitable for offshore natural gas salt cavern development.
On top of the gas storage and CCS potential, the Kish Bank area also contains several conventional E&P opportunities. One of the largest undrilled prospects in this respect is Dalkey Island, a 50%-owned 870MMboe in-place exploration target that, in conjunction with Star Energy, is subject to ongoing G&G studies ahead of a potential drilling in 2011.
Offshore West of Ireland (E&P)
Providence's core E&P assets outside the UK and US GoM are found offshore West of Ireland. In our opinion, these licences are likely to be the key value drivers over the next 6-18 months. They combine relatively low-risk appraisal/development opportunities with higher-risk, highreward exploration activity.
Figure 7: Offshore West of Ireland Exploration/Appraisal Licences
Source: Providence Resources
Source: Providence Resources
Source: Providence Resources
Spanish Point (56%, operated)
Located in the Porcupine Basin, the licences containing Spanish Point and the Burren oil discovery were awarded in 2004. Spanish Point was originally discovered in 1981 (well 35/8-2); a well test flowed light oil at 1,000bbl/d in addition to 5MMcf/d, decisively demonstrating that there is an active, regional hydrocarbon system. However, at that time a lack of existing infrastructure, low commodity prices and high production costs meant that an expensive standalone development was uneconomic.
After extensive efforts, in August 2008 Providence successfully completed a farm-out to Chrysaor (the Barclays Capital-backed fracture stimulation specialist). Following this, in 2009 some 300km 2 of high-quality 3D seismic was acquired, with results indicating a large structural closure and an undrilled interval (750ft) that may be hydrocarbon-bearing above the section drilled in 1981 (35/8-2). As part of the farm-in agreement, pending results from the seismic, Chrysaor may choose to drill two appraisal wells, funding at least 60% of the costs, which will allow it to increase its interest from 30% to 60%. Results of the 3D seismic interpretation will be known over the next few months, and will be used to determine the final resource estimates.
Burren (56%, operated)
The initial oil discovery well was drilled in 1978 (35/8-1) and flowed oil to surface at around 730bbl/d from a Cretaceous sandstone reservoir. Postwell analysis showed that the primary target lower Jurassic sands were never penetrated due to high down-hole pressures, and so there is still significant untested resource potential.
In 2009 300km 2 of new 3D seismic was acquired over the Burren/Spanish Point area and, since then, processing and preliminary interpretation work has shown the data quality to be excellent. In conjunction with Chrysaor, using the new seismic we understand the JV is building a detailed reservoir model that will enhance the understanding of both reservoir and hydrocarbon distribution. From this we anticipate new resource potential to be identified and this will serve as the basis for an accurate volumetric resource estimate and upgrade later this year.
Dunquin (16%, non-operated)
Providence was awarded Frontier Exploration Licence 3/04, which contains the giant Dunquin prospect, in 2004. In February 2006 ExxonMobil farmed into the licence, taking an 80% stake by committing to a US$40m work programme, and beyond the US$40m cost pool Providence will pay 8% of all costs thereafter.
Subsequent to the Exxon farm-out and as part of the US$40m cost pool, a 2D seismic survey was shot in 2006 and it was this that revealed the giant 8.4Tcf mid-case Dunquin prospect. Geologically, Dunquin is an isolated carbonate platform build-up that has developed on top of a giant ridge that is centrally located in the South Porcupine Basin.
In 2009 Exxon farmed out 50% of its 80% interest to ENI and a commitment to drill a well to test the integrity of the structure was made (Providence is fully carried on this). We understand that a site survey to assess an appropriate drilling location has been carried out and that a firm decision from Exxon with respect to a more definitive drilling schedule may be close.
Dunquin will be drilled either in summer 2011 or summer 2012 and we understand the key determinant as to precisely when the well will spud revolves around a decision the JV partners will make with respect to choosing a suitable drilling rig. This is expected before year end.
Dunquin is a giant 8.4Tcf gas prospect with transformational potential
Source: Providence Resources
Due to its size, along with Spanish Point and Burren, Dunquin is one of Providence's main assets and is considered to have transformational potential. We point out that, in the case of success, Dunquin will open up a new exploration province in the South Porcupine Basin and will likely initiate a land-grab by other major operators that are keen not to miss out on gaining access to a potentially valuable new hydrocarbon play that contains giant prospects.
Drombeg (16%, non-operated)
Awarded in March 2008, the Drombeg licences (FEL 1/08 & 2/08) are located to the south-west of Dunquin and contain the Drombeg prospect. In an effort to enhance its understanding of the subsurface, in June 2008, along with operating partners ExxonMobil (80%) and Sosina (4%), Providence acquired and interpreted a new 2D seismic survey.
The UK
Providence owns two fields onshore UK in the Weald Basin, West Sussex: Singleton and Baxter's Copse.
Figure 10:
Source: Providence Resources
Singleton forms a large part of Providence's total current group level production and is one of its key assets that will provide production and revenue growth over the years ahead. In conjunction with Northern Petroleum, Providence also has an interest in Baxter's Copse, an onshore oil field development project in West Sussex.
Singleton (99.125%, operated)
Providence has held an interest in Singleton since the early 1990s, and in 2007 moved to increase its ownership to 99.125% by acquiring Star Energy's interest for US$15.5m. A new field evaluation study was completed in 2008; this led to the implementation of a new FDP in 2009, which in turn improved field production levels by 50%.
Singleton was first brought on-stream in 1989, with production peaking at 1,000boe/d in 1996 from four wells. Current production runs at around 750boe/d following a 50% increase from the X-10 well, which was brought on-stream in May 2009. Providence will complete two development wells in 2010, helping to bring the total number of production wells to seven and it is expected this will raise overall field production to around 1,500boe/d over the next two years.
Source: Ambrian
Providence's 2010 drilling programme includes sidetracking the X9 well in addition to two new lateral sections on the currently producing X8 well; this is expected to add incremental production of c.350boe/d. We point out that the X9 sidetrack will be fracture-stimulated ̶ this forms part of the company's overall plan to increase oil recovery from Singleton.
Baxter's Copse (50%, operated)
Providence has a 50% interest with partner Northern Petroleum in the Baxter's Copse oil discovery and Burton Down exploration prospect. The licence is directly adjacent to Singleton and provides further exploration and development potential.
Baxter's Copse was drilled by Conoco in 1983 and tested 50bbl/d; since this time reinterpretation of existing 2D seismic has improved the understanding of the subsurface and latest indications suggest a larger accumulation than first thought. Current gross 2P reserves stand at 5.4MMbbls. Baxter's Copse is now scheduled for development, with the first horizontal well to be drilled from the Singleton facilities planned for 2012. First oil is expected in the same year.
The US
The US portfolio contains ten producing oil and gas assets, nine in the Gulf of Mexico and one onshore Louisiana.
Source: Providence Resources
Having been affected by hurricanes Gustav and Ike in 2008, Providence's GoM production from Ship Shoal and High Island is still not yet back to prehurricane levels. The most recent assessment of lost production for 2009 suggested around 350boe/d was shut-in as a result of hurricane damage.
The current combined rate of oil and gas production from all GoM assets is approximately 800boe/d, and we anticipate this will remain flat for the next few years. The production profile is not expected to grow significantly, primarily due to a low level of commitment with respect to development capex from the operating partner. In this regard, as a minority holder of a number of non-operated interests, Providence's options are constrained by the willingness of its operating partner to continue to invest (or not).
Going forward, we consider Providence's US production as one of its less important areas with respect to potential drivers of future growth. In time we anticipate that, should a buyer of these assets materialise with a bid considered to be satisfactory for shareholders, management may agree to dispose of them and focus on its core assets — located in Ireland.
Providence Resources – 12 October 2010
Nigeria
Providence currently owns a 5% interest in the Aje field located in OML 113 offshore Nigeria. This asset is now considered non-core and we anticipate at some point in the next few months that management will move to sell it. We would expect proceeds from the asset disposal to be used to pay down a portion of the company's outstanding long-term liabilities.
Source: Providence Resources
Management
Tony O'Reilly, Chief Executive
Tony O'Reilly is a graduate of Brown University in Rhode Island. He is Chief Executive of Providence Resources plc, having served on the Board since incorporation. He has previously worked in mergers and acquisitions at Dillon Read and in corporate finance at Coopers and Lybrand, advising natural resource companies. He served as Chairman of Arcon International Resources plc (having been Chief Executive from 1996 to 2000) until April 2005, when Arcon merged with Lundin Mining Corporation. He joined Wedgwood in 2001, becoming Chief Executive (2002 to 2005), following which he became Chief Executive of Providence. He is a non-executive director of Independent News and Media plc, Fitzwilton Limited, Zenergy Power plc and a number of other companies.
Philip O'Quigley, Finance Director
Philip O'Quigley is a Fellow of the Institute of Chartered Accountants in Ireland. Having trained with Ernst & Young, Dublin, he moved into finance positions within the oil and gas industry in the early 1990s. He joined Glencar Mining plc, the IEX- and AIM-quoted gold mining company, in 1997 as Finance Director. In 2002 he left Glencar Mining plc as an Executive Director and since that time has been involved in a number of private and public companies in the oil and gas industry, including Petroceltic International plc, where he was Finance Director.
John O'Sullivan, Executive Director
John O'Sullivan is a geology graduate of University College, Cork, and holds a Masters in Applied Geophysics from the National University of Ireland, Galway. He also holds a Masters in Technology Management from the Smurfit Graduate School of Business at University College, Dublin, and is completing a dissertation leading to a PhD in Geology at Trinity College, Dublin. He is a Fellow of the Geological Society and a member of both the Energy Institute and the Petroleum Exploration Society of Great Britain. He has 19 years' experience in the oil and gas exploration and production industry with both Mobil and Marathon and is a qualified person as defined in the guidance note for Mining Oil & Gas Companies, March 2006, of the London Stock Exchange.
Dr Brian Hillery, Non-executive Chairman
Has served as Chairman of the Board of Directors since the company's incorporation. He is Non-executive Chairman of Independent News & Media plc and is a Director of the Central Bank of Ireland. A former Professor at the Graduate School of Business, University College Dublin, he has also served as a member of the Irish Parliament as a TD and Senator (1977-1994). He was an Executive Director of the European Bank for Reconstruction and Development (EBRD) London (1994-1997) and was Non-executive Chairman of UniCredit Bank (Ireland) plc.
17
Providence Resources – 12 October 2010
Lex Gamble, Non-executive Director
Lex Gamble was appointed as a Non-executive Director of the company in August 2005. Mr Gamble holds a Bachelor of Arts Degree from the University of Washington, and a Masters Degree from Harvard Business School. Mr Gamble has been an investment banker for over 35 years and has provided strategic advice to more than 200 US and international companies, including several in the FTSE 100 and Fortune 500. During his time as Managing Director with Smith Barney Group Inc, Morgan Grenfell plc and Kidder Peabody & Co Inc, he advised corporate clients on capital raisings totalling in excess of US$40bn. Mr Gamble is a Director of the Harris Bank and Trust Company (Chicago), Crosswater Financial Corporation (Minneapolis), Ashford Castle (Ireland), the University of Washington Foundation, and the University Of Washington School Of Business (Seattle) and was a Founding Principal of Lockwood Financial Group a leading provider of consulting and wealth management services to high net worth individuals.
James SD McCarthy, Non-executive Director
Appointed as a Non-executive Director of the company in May 2005, Mr McCarthy holds a Bachelor Degree in Civil Law, an MBA from the University of Pittsburgh and is a qualified solicitor. He is managing Director of Corporate Finance Ireland Limited and a Director of Windsor Motors Limited and Rockall Technologies Limited and a number of other companies. Mr McCarthy is a former Director of Arcon International Resources plc.
Dr Philip Nolan, Non-executive Director
Appointed as a Non-executive Director of the company in May 2004, Dr Nolan was CEO of Eircom plc from 2002 to 2006. He is currently Chairman of Infinis Ltd and Sepura Ltd, two privately-owned companies. He is also a Non-executive Director of De La Rue plc and of the Ulster Bank Group. He is Chairman of the Irish Management Institute and is a member of the Board of the Ireland Fund and The Queens University Foundation. Dr Nolan, graduated from Queen's University in Belfast with a BSc and a PhD in geology and has an MBA from the London Business School.
Appendix
Table 1: Providence's Assets by Region
Source: Providence Resources
Oil and Gas Research
Simon Hawkins
+44 (0)20 7634 4757
Werner Riding
+44 (0)20 7634 4772
Sam Woodward
+44 (0)20 7634 4756
Sales Team
Trading
Cliff Banyard
+44 (0)20 7634 4742
Lee Hunter
+44 (0)20 7634 4753
Darren Knight
+44 (0)20 7634 4752
David Mackay
+44 (0)20 7634 4751
Nick Screech
+44 (0)20 7634 4741
Chris Stallard
+44 (0)20 7634 4740
Operations
Mike Dack
Providence Resources – 12 October 2010
Company Address
Ambrian Partners Limited Old Change House 128 Queen Victoria Street London EC4V 4BJ
+44 (0)20 7634 4734
Telephone
+44 (0)20 7634 4700
Website
www.ambrian.com
Emails
email@example.com
Ambrian Partners Limited is authorised and regulated by the Financial Services Authority for the conduct of Investment Business in the UK and is a Member of the London Stock Exchange.
Ambrian Partners Limited is registered in England and Wales no. 4236075. Registered office – Old Change House, 128 Queen Victoria Street, London EC4V 4BJ. Phone +44 (0)20 7634 4700 Fax: +44 (0)20 7634 4701 Email: firstname.lastname@example.org
For the purposes of the regulatory requirements in relation to the management of Conflicts of Interest, Ambrian publishes this document as non-independent research which is a Marketing Communication under the FSA Conduct of Business rules. It has not been prepared in accordance with the regulatory rules relating to independent research, nor is it subject to the prohibition on dealing ahead of the dissemination of investment research. Please refer to the Compliance Department for a summary of our conflicts of Interest Policy and Procedures.
The information and opinions in this report were prepared by Ambrian Partners Limited "Ambrian". It has been approved for publication and distribution in the UK by Ambrian which is regulated by the Financial Services Authority (FSA) for the conduct of Investment Business in the UK and is a member of the London Stock Exchange. The information and opinions contained herein have been obtained from public sources and are believed by Ambrian to be reliable, but we make no representation as to the accuracy or completeness of such information.
The analyst principally responsible for the preparation of this report receives compensation that is based upon, among other factors, Ambrian's overall investment banking revenue. However, such analysts have not received, and will not receive, compensation that is directly based upon one or more specific investment banking activities or transactions.
Opinions, estimates and projections in this report constitute the current judgement of the author as of the date of this report. They do not necessarily reflect the opinions of Ambrian and are subject to change without notice. Ambrian has no obligation to update, modify or amend this report or to otherwise notify the reader thereof in the event that any matter stated herein, or any opinion, projection, forecast or estimate set forth herein, changes or subsequently becomes inaccurate, or if research on the subject company is withdrawn. Prices and availability of financial instruments are also subject to change without notice. This report is provided for informational purposes only. It is not to be construed as an offer to buy or sell or a solicitation of an offer to buy or sell any financial instruments or to participate in any particular trading strategy in any jurisdiction.
Ambrian may engage in securities transactions in a manner inconsistent with this report, and with respect to the securities covered by this report, may buy from and sell to customers on either an agency, a principal investment, or market making basis. Disclosures of conflicts of interest, if any, are disclosed at the beginning of this report, or are available from the Compliance Officer. On the date of this report Ambrian, persons connected with it and their respective directors may have a long or short position in any of the investments mentioned in this report and may purchase and/or sell the investments at any time in the open market as an agent. Additionally, Ambrian within the previous twelve months may have acted as an investment banker or may have provided significant advice or investment services to the companies or in relation to the investment(s) mentioned in this report.
When we comment on AIM and Plus Market listed shares, customers should be aware that because the rules for these markets are less demanding than for those of the Official List of the London Stock Exchange the risks are higher.
The report is confidential and is submitted to selected recipients only. It may not be reproduced in whole or in part to any other person. Ambrian and /or persons connected with it may effect or have effected transactions in the investments referred to in the material contained in this report.
This report is prepared for professional clients and is not intended for retail clients in the UK as defined by the FSA rules and should not be passed on to such persons. Any U.S. person receiving this report and wishing to effect a transaction in any security discussed herein, must do so though a U.S. registered broker dealer. | 0.65 | medium | 6 | 11,312 | [
"intermediate science",
"statistics"
] | [
"specialized research"
] | [
"technology",
"social_studies",
"life_skills"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.35,
"depth": 0.65,
"creativity": 0.35
} |
b5f66240-29e6-4acd-b88c-7c8a7d1c8cff | Email Request Collaboration Commutative | mathematics | data_analysis | ## Email 1: Request for Collaboration on Commutative Algebra Research Project **Subject: Proposal for Collaborative Research: Exploring Applications of Commutative Algebra in Cryptography** **Dear Professor Anya Sharma,** I hope this email finds you well. I am writing to you today from the Department of Applied Mathematics at [Your University/Institution Name] to propose a collaborative research project focused on the intersection of commutative algebra and modern cryptography. Your seminal work on [mention specific relevant work of Prof. Sharma, e.g., "polynomial rings and their properties in relation to coding theory"] has been a significant inspiration to my own research, and I believe our combined expertise could yield impactful results. My current research endeavors are centered around investigating the algebraic structures that underpin advanced cryptographic protocols, particularly those leveraging lattice-based cryptography and homomorphic encryption. A key area of interest for me is the application of concepts from commutative algebra, such as **ideals**, **modules**, and **homomorphisms** in **commutative rings**, to develop more efficient and secure cryptographic primitives. Specifically, I am keen to explore the following: * **The role of Gröbner bases in the complexity analysis of polynomial systems arising in cryptographic schemes.** The computation of Gröbner bases for ideals in polynomial rings $k[x_1, \dots, x_n]$ (where $k$ is a field) provides a canonical representation of the ideal, which can be instrumental in understanding the computational hardness of certain cryptographic problems. For instance, if $I \subseteq k[x_1, \dots, x_n]$ is an ideal, and $G = \{g_1, \dots, g_m\}$ is a Gröbner basis for $I$ with respect to a chosen monomial order, then the problem of determining if a polynomial $f \in k[x_1, \dots, x_n]$ belongs to $I$ is equivalent to checking if the remainder of $f$ upon division by $G$ is zero. This has direct implications for solving systems of polynomial equations that form the basis of some cryptosystems. * **The application of module theory to analyze the structure of cryptographic keys and ciphertexts.** The concept of **modules** over a **commutative ring** $R$ provides a powerful framework for understanding algebraic structures beyond vector spaces. If we consider a ring $R$ that represents a set of operations in a cryptographic protocol, then $R$-modules can describe the relationships and transformations of keys or encrypted data. For example, in lattice-based cryptography, the underlying mathematical objects are often related to modules over certain rings, and understanding their structure can lead to insights into the security and efficiency of these schemes. * **Investigating the properties of specific commutative rings relevant to secure multi-party computation (SMPC).** Rings like $\mathbb{Z}_n$ (the integers modulo $n$) or polynomial rings over finite fields are fundamental in SMPC. The properties of these rings, such as their **units**, **zero divisors**, and the existence of **primitive elements**, directly influence the feasibility and security of different SMPC protocols. For instance, the ability to perform homomorphic operations on encrypted data in SMPC often relies on the ring structure of the underlying encryption scheme. I believe that your extensive knowledge in [mention specific area of expertise of Prof. Sharma again, e.g., "computational algebraic geometry and its applications"] would be invaluable in guiding this research. I am particularly interested in discussing how techniques from **computational commutative algebra**, such as **elimination theory** and **syzygy computation**, can be tailored to address the specific challenges in cryptographic design. To provide a more concrete example of the mathematical rigor we aim for, consider the problem of solving a system of polynomial equations $f_1(x_1, \dots, x_n) = 0, \dots, f_m(x_1, \dots, x_n) = 0$ over a field $k$. This system defines an algebraic variety $V(I)$, where $I = \langle f_1, \dots, f_m \rangle$ is the ideal generated by these polynomials. The problem of finding solutions $(a_1, \dots, a_n) \in k^n$ is equivalent to finding the points on $V(I)$. If we can compute a Gröbner basis $G$ for $I$, we can simplify the system. For instance, if $G$ contains a polynomial that depends only on a subset of variables, say $g_1 \in k[x_1, \dots, x_j]$, we can solve for $x_1, \dots, x_j$ first. This process, known as **elimination**, is a cornerstone of computational algebraic geometry and has direct applications in cryptanalysis. I would be delighted to schedule a meeting at your convenience to discuss this proposal in more detail. I am available to present a brief overview of my preliminary findings and to explore potential research questions and methodologies. Please let me know what time works best for you in the coming weeks. Thank you for your time and consideration. I look forward to the possibility of collaborating with you. **Sincerely,** [Your Name] [Your Title] [Your Department] [Your University/Institution Name] [Your Email Address] [Your Phone Number] --- ## Email 2: Follow-up on Research Collaboration Discussion **Subject: Following Up: Commutative Algebra & Cryptography Research Collaboration** **Dear Professor Anya Sharma,** It was a pleasure speaking with you yesterday regarding our potential research collaboration on the applications of commutative algebra in cryptography. I truly appreciate you taking the time to discuss the project and share your valuable insights. I found our conversation about [mention a specific point of discussion, e.g., "the challenges of constructing efficient homomorphic encryption schemes using polynomial rings over finite fields"] particularly stimulating. As we discussed, the algebraic structure of the underlying rings plays a crucial role in defining the security and functionality of these schemes. To reiterate some of the key areas we touched upon: * **Ideal Membership Problem and its Cryptographic Implications:** We discussed how the difficulty of the Ideal Membership Problem for certain classes of ideals in polynomial rings is directly related to the security of some public-key cryptosystems. Formally, given a polynomial $f$ and an ideal $I = \langle g_1, \dots, g_m \rangle$ in $k[x_1, \dots, x_n]$, the Ideal Membership Problem asks whether $f \in I$. The computational complexity of solving this problem, especially when $I$ is defined by a large number of generators or has a complex structure, can be leveraged as a security assumption. For example, if $f$ represents a message and $I$ represents the set of valid ciphertexts under a particular encryption scheme, then the inability to efficiently determine if $f \in I$ for an arbitrary $f$ contributes to the scheme's security. * **Module-theoretic approaches to analyzing algebraic structures in cryptography:** We also explored how module theory can provide a more abstract yet powerful lens. Consider a ring $R$ and an $R$-module $M$. If the operations in a cryptographic protocol can be interpreted as $R$-linear maps on $M$, then understanding the structure of $M$ (e.g., its decomposition into simpler modules, its annihilator) can reveal vulnerabilities or opportunities for optimization. For instance, if $M$ is a free $R$-module of rank $r$, then its structure is akin to $R^r$, but if it has torsion or is not projective, its properties can be more complex and potentially exploited. * **The role of specific ring properties in SMPC:** We specifically discussed the importance of the **Jacobson radical** of a ring in certain SMPC protocols. The Jacobson radical, denoted by $J(R)$, is the intersection of all maximal left ideals of $R$. For commutative rings with unity, $J(R)$ is also the intersection of all maximal right ideals. Elements of $J(R)$ are precisely those elements $x \in R$ such that $1+xy$ is a unit for all $y \in R$. In SMPC, if operations are performed modulo an ideal $I$, and $R/I$ is the resulting ring, the properties of $J(R/I)$ can influence the security against certain types of attacks, particularly those involving the reconstruction of secret information. As a next step, I would like to propose the following: 1. **Define a specific cryptographic problem:** We could focus on a particular problem, such as the hardness of solving certain systems of polynomial equations arising in code-based cryptography, or the analysis of key recovery attacks on lattice-based schemes. 2. **Identify relevant algebraic structures:** Based on the chosen problem, we can pinpoint the specific commutative rings and modules that are most relevant. 3. **Develop a rigorous mathematical framework:** We can then apply precise definitions and theorems from commutative algebra to analyze these structures and their implications for cryptography. I am particularly excited about the prospect of co-authoring a research paper that bridges these two fields. I am confident that our combined expertise will lead to significant contributions. Would you be open to a brief follow-up meeting next week to outline a more detailed research plan, perhaps focusing on a specific problem statement and the initial mathematical tools we would employ? Please let me know your availability. Thank you again for your valuable time and for considering this exciting research opportunity. **Best regards,** [Your Name] [Your Title] [Your Department] [Your University/Institution Name] [Your Email Address] [Your Phone Number] | 0.7 | medium | 6 | 2,086 | [
"calculus fundamentals",
"algebra"
] | [
"real analysis",
"abstract algebra"
] | [
"science",
"technology"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.65,
"creativity": 0.35
} |
c70b9a87-4123-476c-b5d2-ac69bcf2061a | Eighteen nursing students created | technology | historical_context | Eighteen nursing students created history in December simply by graduating. Two years prior, the students had been the first class to take advantage of the newly expanded Nursing program by being admitted during the spring semester rather than the fall. The revised nursing program took flight in 2007, accepting two classes of 24 students each semester—nearly doubling the nursing enrollment. Select a category, or browse all news stories below. Art isn't about fame or fortune. That's the message of The Nobodies 2010 Art Collective, an exhibition in the McClelland Art Gallery running from Feb. 15-24. Reprising of a show last year by Abner Aguilar and Chris Smith, this year they are joined by Bob Fraser, Ed Mejia, and Scott Cushman. Fernando Ortega, contemporary Christian singer-songwriter, will be performing a free concert at Union College at 7:30 p.m., Feb. 19. A musician since the age of eight, Ortega perfected his unique sounds at the University of New Mexico before releasing his first album in 1994. This will be his third performance at Union College. For Justin Gibson, an invitation to one banquet led to an award at another. Gibson’s poster for the spring 2009 Associated Student Body banquet won a student silver ADDY at this year’s Nebraska ADDY Awards. The ADDY awards are presented annually by the American Advertising Federation for creativity in advertising. The competition is a three-tiered process, starting at the state level then winning designs go on to compete at regional and national competitions. The library is currently offering a free trial of Films on Demand, streaming educational videos from producers such as Films for the Humanities and Sciences, BBC, PBS, Cambridge Educational, and more. The collection includes over 6000 full length films which may be viewed in their entirety or in shorter segments. The trial will be available until March 10, 2010. Contact Sabrina Riley with your questions and comments. Off-campus login information is available upo Bruce Forbes, chair of Union’s Division of Fine Arts, is taking visitors in new Directions with his McClelland Art Gallery display. Running through Feb. 13, his 25 gallery pieces include platinum and palladium prints, toned silver gelatin prints and color digital prints. The heat and hot water will be shut off to the dorms and other main campus buildings from 10:00 p.m. tonight (Feb. 2) until 6:30 a.m. tomorrow in order to repair two damaged steam valves in the campus heating system. The temperature in the dormitories should not drop more than 10 degrees, but please close all windows and window blinds to conserve residual heat. When uprooting a life and immigrating to a new country, many things get left behind. For Thuy Ho, it was more than just things that didn’t fit in a suitcase; she had to leave behind her medical license. In her native Vietnam, Ho had earned a medical degree and had years of experience as an internist, but did not qualify to continue practicing medicine in the United States. Undaunted by the task of starting over, she enrolled in Union College’s Physician Assistant Studies Program. Now in her second year of the graduate degree, Ho has qualified for the National Health Services Corps Scholarship, a highly competitive and prestigious full-ride scholarship for physician assistants willing to practice medicine in less prestigious locales. Life in Vietnam Raised in postwar Vietnam by Catholic parents, Ho decided to pursue a medical career early in life. “My father was a pharmacist,” she smiled. “He encouraged me to be a physician so I could help them by opening a clinic nearby.” Did you know that the U.S. Department of Labor estimates that today’s learner will have held 10-14 jobs by age 38? Did you know that for students starting a four-year technical degree, half of what they learn in their first year of study will be outdated by their third year of study? Classes will be held today, Jan. 8, 2010. While the schedule continues as normal, administrators will be understanding if those who live at a distance choose not to brave the roads. Please use good judgement in deciding whether or not to come to class. Your safety is most important. Students and employees are encouraged to dress warmly, donning layers, hats and gloves. Students without appropriate cold-weather attire are encouraged to contact Dr. Linda Becker in Student Services for assistance. Hot drinks will also be served all day in the Student Services office. Any faculty unable to get to the college should call Dr. Russell's office (402.486.2501). Staff stuck off campus should contact their supervisor. Please continue checking e-mail, the snow closing line (486-2551) and Web site (www.ucollege.edu) throughout the day for any updates or possible weather closings. Is the thought of facing the arctic outdoor air preventing you from asking a librarian for the research assistance you need? This semester, the library is offering another solution. You may now seek the assistance of a reference librarian from the cozy warmth of your dorm room or home through instant messaging. This service is being tested during second semester. To find out more about how to access the service, see Ask Your Librarian. Please note that this service is av Art is a commodity. Young girls are not. Union College's Peace and Social Justice Club, in conjunction with Union's chapter of Amnesty International, invites the Lincoln community to help put an end to slavery by buying art on Sunday, Dec. 6 from 1-3 p.m. Held in the lobby of Engel Hall on the Union College campus, the Tiny Hands, Big Hearts sale will benefit Tiny Hands International, a Lincoln-based organization dedicated to stopping human trafficking. The students were inspired to support Tiny Hands after representatives spoke about the organization's mission to help enslaved girls during a chapel service at the college. Amanda Clark, president of the Peace and Social Justice club, said seeing photos of just a few of the thousands of little girls sold to brothels each year made the cause personal. of my new nieces. I thought of my little sister,” said Clark, a senior graphic design major. “I started to think of all of the young women I know and about them being forced into something like that.” She knew she had to do something. Unsure what sort of impact a single college student could make, inspiration struck during a conversation with a friend and fellow artist. “I thought of my new nieces. I thought of my little sister,” said Clark, a senior graphic design major. “I started to think of all of the young women I know and about them being forced into something like that.” She knew she had to do something. Unsure what sort of impact a single college student could make, inspiration struck during a conversation with a friend and fellow artist. When eight students in Union College's Event Planning class started brainstorming about their class project, they found they were passionate about two things: the BackPack Program and fashion. The combination of these interests will culminate in Fashion for Food, a benefit fashion show featuring designers and boutiques from Lincoln and Omaha on Sunday, December 6 at 7:00 p.m. at Campus Life North (map). On Sept. 22, Union College’s Leadership Symposium presented speaker Greg Mortenson, co-author of New York Times bestseller Three Cups of Tea who was nominated this year for the Nobel Peace Prize by several members of the United States House of Representatives. In October 2009, Union College received another 10-year accreditation from both the Higher Learning Commission (HLC) and the Adventist Academic Association (AAA). Live streaming video of college events had been a wish of many Union parents, alumni and employees for a long time. However, due to the expense of the necessary Internet bandwidth, it wasn't until last spring that Tom Becker, director of Information Systems, was able to find a solution. Working with the local Time Warner Cable office in Lincoln, Becker was able to negotiate a new contract that quadrupled the connection speed on campus. The results of their collaboration can be seen at uclive.ucollege.edu, which provides streaming video of select athletic, social, and artistic events. “It got started because a lot of parents and grandparents of students like to see what their children and friends are doing,” said Becker. “But we had limited bandwidth to our campus, not enough to stream video.” Becker asked the local Time Warner Cable office for some additional bandwidth for a few days during the Mid-America Union Basketball Tournament last spring so that he could try broadcasting the games on the Internet. Union College was awarded the Grower Designation of the Governor's Excellence in Wellness Award on Tuesday, October 27, 2009 at the WorkWell annual awards banquet held at the Rococo Theatre. Union College was one of 28 award recipients out of the 130 WorkWell member companies. The criteria for the award was a company that offers a health and wellness program for their employees with varied programs to encourage annual health assessments, annual cholesterol screening, exercise and healthy food choices and the program is deemed a successful wellness program by having more than 50 percent active participation numbers and is supported by upper management. "More and more companies are creating Wellness programs because they improve productivity and job satisfaction," said Nancy Petta, professor of human performance and chair of Union's Wellness Committee. "At Union, it's even more important because we really care about each other not only as colleagues, but as friends." While the award is based on last year's performance, the Wellness Committee is continuing to provide opportunities for personal improvement this year based on the NEWSTART program. Each month, a different element of NEWSTART is emphasized: N= Nutrition (September) E= Exercise (October) W= Water (November) S= Sunshine (December) T= Temperance (January) A= Air (February) R= Rest (March) T= Trust in Divine Power (April) On the heels of a moving Friday night concert, Australian musicians Endless Praise will offer a free workshop for song leaders on Tuesday, Oct. 27 at 5 p.m. in Union College’s Woods Auditorium. Participants will learn how to more effectively integrate music with worship services. The six-member band is one of Australia’s leading Christian music groups and has appeared at events such as the Sydney 2000 Olympic Games and the Australian Gospel Music Festival. Endless Praise incorporates inspirational worship, pop, contemporary, funky and R&B elements into their performances. “Endless Praise touched my heart with their stories and songs,” said Valentina Goodman, sophomore elementary education major. “Union is very blessed to have them here on our campus. I think they have a lot to offer students.” While the workshop is geared toward students, all are welcome regardless of musical ability. Completing homework assignments on time can be an art form. Sometimes, the homework itself is art. Running through Oct. 24, the McClelland Art Gallery is showcasing more than 35 pieces created by students. The artwork consists of projects completed this year in classes such as Design I, Oil Painting, Watercolor, Intro to Graphic Arts and Page Layout. Union College’s department of education hosted Lincoln's second annual International Phi Delta Kappa (PDK) Multicultural education program, Oct. 7, 2009. Ambitious elementary and secondary education majors from Union College, Nebraska Wesleyan University, Concordia University, Southeast Community College Beatrice and members of the University of Nebraska Lincoln PDK Chapter flooded Union’s campus, ready to learn. “It was exciting to see so many different cultures come together with the common purpose of education,” said Jessica Reeder, freshman elementary education major from Colorado. A total of 26 teachers from ten Asian, European and South American countries lead roundtable discussions that focused on administrative organization, curricular and instructional approaches to multicultural education. “I felt a strange, common bond with each person there. In a way we all shared the same life goal – to educate children,” said Tabitha Schumacher, freshman elementary education major from North Dakota. “I felt a calling, through the PDK meeting, to become a student missionary sometime in my college education. I want to experience the things I heard first-hand.” Teachers shared information about their culture and how education systems in their countries differ from the United States. Many teachers donned their national costumes, showed video clips, pictures and displayed artifacts unique to their country. | 0.7 | medium | 6 | 2,655 | [
"algorithms",
"software design"
] | [
"distributed systems"
] | [
"social_studies",
"arts_and_creativity"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.65,
"creativity": 0.45
} |
25017e1b-42a0-4233-a7aa-e9ce5dcad7f9 | Asylum Seeker Starter | social_studies | historical_context | Asylum Seeker Starter
Authored By: Asylumlaw.org
"Every person has the right to live free from persecution, or the fear of persecution, based on their race, religion, nationality, membership in a particular social group, or political opinion. Though every government is obligated to provide this right, many fail. Every year millions of people face persecution for traits they cannot control or exercising their religious or political beliefs. When governments fail to protect these rights, people have the right to move to a country that will protect them. This is the right to asylum. People who seek to exercise this right are called "asylum seekers" or, in some cases, "refugees." In 1951, the formal basis for exercising the right to asylum was established by an interational treaty, the Geneva Convention Relating to the Status of Refugees. Countries signing that Convention have an obligation to provide asylum or refuge to people fleeing persecution." | 0.55 | medium | 4 | 195 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.3,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.4
} |
3a925d52-7803-414e-9f95-9fad844224b0 | Arthasastra written Canakya Kautalya | philosophy_and_ethics | historical_context | The Arthasastra was written by Canakya or Kautalya around the fourth century BC. One of the eminent historians of Indian History, D D Kosambi, has observed thatRead On
The title Arthasastra means `The science of material gain'¡Xfor a very special type of state, not for the individual. The end was always crystal clear. Means used to attain it needed no justification. There is not the least pretence of morality or altruism. [In the Arhtasastra] the only difficulties ever discussed, no matter how gruesome and treacherous the methods, are practical, with due consideration to costs and possible effects... Espionage and the constant use of agent-provecateurs is recommended on massive and universal scale by the Arthasastra. The sole purpose of every action was safety and profit of the state. Abstract questions of ethics are never raised or discussed in the whole book. Murder, poison, subversion were used at need by the king's secret agents, methodically and without a qualm... Strife for the throne is treated as a minor occupational hazard by Canakya. No regard to morality or filial piety is ever questioned. He quotes a predecessor's axiom; `Princes, like crabs, are father eaters¡K' The eleventh book (probably shortened in transmission) of the Arthasastra is devoted to the methods of systematically breaking up free, powerful, armed tribes of food producers that had not yet degenerated into absolute kingdoms.
The main technique was to soften them up for disintegration from within, to convert the tribesmen into members of class society based upon individual private property.. | 0.7 | medium | 6 | 346 | [
"intermediate understanding"
] | [
"research"
] | [
"technology",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.45,
"creativity": 0.45
} |
b760f987-640b-451a-8ebe-398e26e8c557 | Faculty Senate Steering Meeting | interdisciplinary | research_summary | Faculty Senate Steering Meeting
Minutes
November 3, 2011
3:00 – 5:00 p.m.
Tigert 226
Attendees: Cheri Brodeur, Marc Heft, Sue Alvers, Scott Nygren, Paul Ortiz, Mark Tillman, Barbara Wingo, Bernard Mair, Joe Glover, Debra Murie, Naomi Young, Nancy Poehlmann, Mike Katovich, and David Quillen.
The meeting was called to order at 3:03 p.m. and introductions were made. Minutes from October were approved.
Chair's Report
Scott Nygren, Faculty Senate Chair
Scott Nygren noted that a new regulation was posted about leave restructuring. Even though it didn't mention it in the regulations, Dr. Machen assures us that the leave restructuring will only be implemented if the 3% state employees have to pay toward their pension goes into effect. The courts might decide that it is illegal. The comment period for the new regulation ends on Nov. 11. The Graduate Initiative is due November 23. This will be our topical discussion item at the next Senate meeting.
Provost's Report
Joe Glover, Provost
Joe Glover noted that there was nothing pressing at the moment. As of today, the union hasn't agreed with the benefits regulation.
Open Access
Scott Nygren, Chair
Scott will ask Isabel Silver and Judy Russell if they can present Open Access in December instead of November.
University Constitution Committee
Paul Ortiz, Chair
The Constitution Committee assigned a "red light" to the new regulation that was recently posted with Nov 11 as the deadline for comments. Dr. Ortiz wishes to add this to the Nov 17 Faculty Senate agenda.
Calendar
Bernard Mair,Chair, Curriculum Committee
Senate agreed a long time ago that homecoming should be rescheduled in October if there's a football game. If homecoming is to be moved to November it must have Senate approval. For the 2012-2013 calendar, would like to change homecoming to Nov 9-10. This will create two four-day weekends. One for homecoming/Veterans Day and one for Thanksgiving. The reason for changing is that the games in October are heavily subscribed by the visiting teams, so no extra tickets are available. Also, would like to approve the 2015-2016 calendar. The 2015-2016 calendar has Wednesday before Thanksgiving listed as tentative as a day off for students.
Council Reports
Budget Council
Marc Heft, Chair
Working on the impacts of RCM on academic programs. At the last Budget Council had conversation with Steve Humphries and Paul D'Anieri on RCM impact on interdisciplinary teaching and research. Will have Mark Rieger and Doug Jones as guests for the November meeting. The council is also continuing discussion on benefits changes.
Research and Scholarship Council
Debra Murie, Co-Chair
SCORS heard updates from the IRB and IACOC. What's the processing time for protocol approvals? IRB is going online to streamline. Enterprise Reporting is trying to connect the two systems (use of shadow books and enterprise reporting) in order to reduce shadowbooks).
Academic Policy Council
Nancy Poehlman, Co-Chair
Dr. Glover and the council discussed awarding students posthumous degrees. Maria Rogal will research other universities on how they handle these situations. The council also discussed the Graduate Program Renewal and thanked Carol Murphy for facilitating the Topical Discussion at the last Senate meeting. Topics for the future are: online security of exams and interdisciplinary programs.
Infrastructure Council
Mark Tillman, Co-Chair
Discussed the Technology fee with Elias Eldayrie giving back history of the fees. Technology fees bring in about $6 million with $1 million set aside to use for projects. The council will be reviewing the new FERPA training
Agenda for November Faculty Senate Meeting
Agenda for November 17, 2011 Faculty Senate meeting was approved with revisions.
Meeting adjourned at 4:42 p.m. | 0.65 | medium | 4 | 974 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"technology",
"social_studies"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.4,
"depth": 0.45,
"creativity": 0.3
} |
a5f89b86-30ab-44e7-af2e-5f8cf5339b7d | no-new-revenue (NNR) tax rate | technology | comparative_analysis | The no-new-revenue (NNR) tax rate enables the public to evaluate the relationship between taxes for the prior year and for the current year based on a tax rate that would produce the same amount of revenue if applied to the same properties that are taxed in both years (no new taxes). When appraisal values increase, the NNR tax rate should decrease.
1. **2019 total taxable value.** Enter the amount of 2019 taxable value on the 2019 tax roll today. Include any adjustments since last year's certification; exclude one-fourth and one-third over-appraisal corrections made under Tax Code Section 25.25(d) from these adjustments. This total includes the taxable value of homesteads with tax ceilings (will deduct in Line 2).
1 Tex. Tax Code 26.012(14)
$1,575,657,849
2. **2019 tax ceilings.** Enter 2019 total taxable value of homesteads with tax ceilings. These include the homesteads of homeowners age 65 or older or disabled.
2 Tex. Tax Code 26.012(14)
$989,247,668
3. **Preliminary 2019 adjusted taxable value.** Subtract line 2 from line 1.
$586,410,181
4. **2019 total adopted tax rate.**
/$100
1.150000
5. **2019 taxable value lost because court appeals of ARB decisions reduced 2019 appraised value.**
A. Original 2019 ARB values:
$0
B. 2019 values resulting from final court decisions:
-$0
C. 2019 value loss. Subtract B from A.
$0
6. 2019 taxable value subject to an appeal under Chapter 42, as of July 25.
A. 2019 ARB certified value: $0
B. 2019 disputed value: -$0
C. 2019 undisputed value. Subtract B from A. $4
7. 2019 Chapter 42-related adjusted values. Add line 5 and 6. $0
8. 2019 taxable value, adjusted for actual and potential court-ordered adjustments. Add line 3 and line 7. $586,410,181
9. 2019 taxable value of property in territory the school deannexed after January 1, 2019. Enter the 2019 value of property in deannexed territory. $0
10. 2019 taxable value lost because property first qualified for an exemption in 2020. If the school district increased an original exemption, use the difference between the original exempted amount and the increased exempted amount. Do not include value lost due to freeport or goods-in-transit, temporary disaster exemptions. Note that lowering the amount or percentage of an existing exemption in 2020 does not create a new exemption or reduce taxable value.
A. Absolute exemptions. Use $195,134
B. Partial exemptions. 2020 exemption amount or 2020 percentage exemption times 2019 value: +$3,544,388
C. Value loss. Add A and B. $3,739,522
11. 2019 taxable value lost because property first qualified for agricultural appraisal (1-d or 1-d-1), timber appraisal, recreational/organic appraisal, or public utility appraisal. $0
| | |
|---|---|
| 12. Total adjustments for lost value. Add lines 9, 10C and 11C. | $4,883,552 |
| 13. 2019 adjusted taxable value. Subtract line 12 from line 8. | $581,526,629 |
| 14. Adjusted 2019 total levy. Multiply line 4 by line 13 and divide by $100. | $6,687,556 |
| 15. Taxes refunded for years preceding tax year 2019. Enter the amount of taxes refunded by the district for tax years preceding tax year 2019. Types of refunds include court decisions, Tax Code Section 25.25(b) and (c) corrections and Tax Code Section 31.11 payment errors. Do not include refunds for tax year 2019. This line applies only to tax years preceding tax year 2019. | $4,793 |
| 16. Adjusted 2019 levy with refunds. Add lines 14 and 15. Note: If the governing body of the school district governs a junior college district in a county with a population of more than two million, subtract the amount of taxes the governing body dedicated to the junior college district in 2019 from the result. | $6,692,349 |
| 17. Total 2020 taxable value on the 2020 certified appraisal roll today. This value includes only certified values and includes the total taxable value of homesteads with tax ceilings (will deduct in line 19). These homesteads includes homeowners age 65 or older or disabled. A. Certified values. | $999,006,628 |
---
7 Tex. Tax Code 26.012(15)
8 Tex. Tax Code 26.012(13)
9 Tex. Tax Code 26.012(13)
10 Tex. Tax Code 26.012(13)
11 Tex. Tax Code 26.012(13)
B. Pollution control and energy storage system exemption: Deduct the value of property exempted for the current tax year for the first time as pollution control or energy storage system property:
- $0
C. Total 2020 value. Subtract B from A.
10 Tex. Tax Code 26.012, 26.04(c-2)
11 Tex. Tax Code 26.012(6)
18. Total value of properties under protest or not included on certified appraisal roll.\(^{12}\)
A. 2020 taxable value of properties under protest.
The chief appraiser certifies a list of properties still under ARB protest. The list shows the district's value and the taxpayer's claimed value, if any, or an estimate of the value if the taxpayer wins. For each of the properties under protest, use the lowest of these values. Enter the total value under protest.
$0
B. 2020 value of properties not under protest or included on certified appraisal roll. The chief appraiser gives school districts a list of those taxable properties that the chief appraiser knows about but are not included at appraisal roll certification. These properties also are not on the list of properties that are still under protest. On this list of properties, the chief appraiser includes the market value, appraised value and exemptions for the preceding year and a reasonable estimate of the market value, appraised value and
exemptions for the current year. Use the lower market, appraised or taxable value (as appropriate). Enter the total value not on the roll.\(^{14}\)
**C. Total value under protest or not certified.** Add A and B.
12 Tex. Tax Code 26.01(c) and (d)
13 Tex. Tax Code 26.01(c)
14 Tex. Tax Code 26.01(a)
| 19. **2020 tax ceilings.** Enter 2020 total taxable value of homesteads with tax ceilings. These include the homesteads of homeowners age 65 or older or disabled.\(^{15}\) | $112,966,743 |
| --- | --- |
| 15 Tex. Tax Code 26.012(6)(B) |
| 20. **2020 total taxable value.** Add lines 17C and 18C. Subtract line 19. | $886,039,885 |
| --- | --- |
| 21. **Total 2020 taxable value of properties in territory annexed after January 1, 2019.** Include both real and personal property. Enter the 2020 value of property in territory annexed by the school district. | $0 |
| --- | --- |
| 22. **Total 2020 taxable value of new improvements and new personal property located in new improvements.** New means the item was not on the appraisal roll in 2019. An improvement is a building, structure, fixture or fence erected on or affixed to land. New additions to existing improvements may be included if the appraised value can be determined. New personal property in a new improvement must have been brought into the school district after Jan. 1, 2019, and be located in a new improvement. | $17,075,981 |
| --- | --- |
| 23. **Total adjustments to the 2020 taxable value.** Add lines 21 and 22. | $17,075,981 |
| --- | --- |
| 24. **2020 adjusted taxable value.** Subtract line 23 from line 20. | $868,963,904 |
| --- | --- |
| 25. **2020 NNR tax rate.** Divide line 16 by line 24 and multiply by $100. | $0.7701/$100 |
| --- | --- | | 0.65 | medium | 4 | 2,325 | [
"programming fundamentals",
"logic"
] | [
"system design"
] | [] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.6,
"engagement": 0.55,
"depth": 0.55,
"creativity": 0.35
} |
4e1d5fd3-87a8-4374-af80-da53f81119a1 | Confessions Auto Finance Manager | life_skills | practical_application | Confessions of an Auto Finance Manager Part 2: Tricks of the Trade Tricks of the Trade F&I guys know that our customers are already in the "yes mode." They've just agreed to buy a car so it's our job to keep them saying yes to other things like extended warranties, fabric protection and additional alarm systems. The office for my new job was in a mobile home parked at the back of the car lot. In most other dealerships where I worked the F&I room was usually in the back somewhere, away from the excitement of the showroom and the noise of the service bays. But what goes on in the F&I office is the lifeblood of the car business — deals are closed. Before you enter the finance office, a car deal has really just been a lot of talk. But in F&I, all the verbal promises are put in writing, the customer signs and the contract legally binds the buyer to make all the payments. So there's a lot of money on the line. Dave, the guy who ran the finance office at my new job, wasn't the stereotype of the sneaky F&I guy. He had a good sense of humor and was very relaxed with his customers — a little too relaxed, I thought. If he just pushed a little harder it seemed he could've sold a lot more products. I was anxious to finish my training and be in charge so I could do things my way. And see how much more money I could make. In the beginning, I just sat in the back of the room while Dave handled the customers. He usually introduced me to the people by saying, "This is James. I'm training him for this position. Do you mind if he sits in with us?" No one ever objected, and soon they forgot I was there. Meanwhile, I got to observe Dave's sales techniques, such as the way he started the F&I process. Setting the Tone Dave would casually glance down at the contract and then look up at the people as if he was surprised and say, "Oh! So you're the folks who bought that black Suburban. Man, that's such an awesome car! You're going to have a great time taking it on vacation this summer. And the four-wheel drive is good in the snow, too." What he was doing was showing the customer that he cared about their purchase and shared their excitement, like they were on the same team. This opening set the right tone, which was important since most of the customers we got were pretty worn out by this point. Often they had been test-driving and negotiating all afternoon and, basically, they just wanted to get the hell out of there. Dave had to get them refocused on the excitement of the new car because he was about to try to sell them a whole slew of additional things. Most salesmen know that once a customer starts saying yes, it's easy to keep them saying yes to other things. The customers we got in the F&I room had just agreed to buy a car. So there was a good chance they would keep saying yes to other add-ons. We called this being in the "yes mode," and we tried our best to exploit it. Here's how Dave did it. He would start by asking the customer a question he knew they would say yes to. So he'd say, "Do you like this car?" Obviously, they would say yes since they had just agreed to buy it. "I bet you'll really enjoy taking this car on vacation." Of course they said, "Yes." So then he'd ask, "So I'm sure you'll want to buy an extended warranty to protect your investment?" And they often said, "Yes." Sitting in the back of that room I took a lot of notes, wrote out lists of forms that were needed and details I had to complete. Dave taught me the tricks of the trade mainly by just letting me observe how he worked with the customers. It was a psychological game that was partly a carefully scripted technique and partly just plain old salesman's intuition. Running F&I on My Own After only 10 days of training me, Dave went on vacation and I was left in complete charge of all the finance work for the entire dealership. I was excited to know I could do things my way. But there was a problem that worried me, a secret that only I knew. Sure, I was good with numbers. And by now I was a pretty good salesman. But I'm not detail-oriented. And this was a job that definitely needed strict attention to the fine points. It wasn't unusual for a car deal to involve as many as a dozen different documents, all of which needed to be signed in multiple places in just the right way. Plus, the dealership could get really busy; sometimes we sold a dozen cars on a Saturday afternoon. A straight cash deal could be wrapped up in only 15 minutes. But other transactions, particularly leases, could take an hour or more. If you didn't get everything right it would be rejected by the DMV. Naturally, I didn't admit my lack of attention to detail. Instead, I made endless checklists to remind me to dot all the i's and cross the t's. But as I gained experience I became more confident. I even decorated my office to make customers more comfortable. I put up pictures of the beach and some inspirational sayings — fun stuff to relax people. The Flow of the Deal The F&I process actually started before I even met the customer. I would be given the credit application to run while they were still negotiating with the salesman. At this point, I'd go out and take a look at the people to get a feel for them. That way, when I met them in the F&I room I could break the ice by making some small talk. For example, if I saw one of them wearing a Green Bay Packers hat, the first thing I'd say to them was, "How about those Packers?" In my time in F&I I talked about all kinds of things I had no real interest in: deer hunting, football, hockey — even cooking. If the customer's credit score came back over 700, we wanted to make sure they bought a car as quickly as possible and got them out of there. We would tell the salesman to "spot them" — let them take delivery on the spot — before their loan was even formally approved by the bank. On the other hand, if the customer was a "deadbeat," meaning that they had really bad credit, we knew there was no way we could sell them a car. So the two ends of the spectrum — the really good and the really bad — were easy to deal with. But the vast majority of customers fell somewhere in between, and it required a lot of work to get them financed. I'd say that three out of four people wanted to finance their car by taking out a loan or leasing it. The dealership had access to wholesale lending rates, called the "buy rate" and loaned this money to the customer at a few percentage points higher, which we called the "sell rate." This was a huge source of revenue for the dealership and it amounted to about 50 percent of the commissions I earned. So the incentive was high to inflate the interest rate and get the customer to agree to the loan at that rate. Padding the interest rate was usually very easy to do because most of our customers had no idea what rate they qualified for. If I sensed that they were uninformed about their credit score, I knew I could offer them, say, two points over and they would agree to it. The customers I looked for were people who had good credit but didn't know it. Then I could say, "We ran your credit report and, well, we both know you've had a few problems. But you're nice people so here's what we're going to do for you." A Lucrative Sales Pitch After the loan was arranged and agreed to by the customer, I began to sell them an assortment of extra products and services. This was a grueling process but it was where a lot of my commissions came from so I had to summon my energy and give it my best shot. The biggest item for me to sell was the extended warranty. Usually, I'd begin by asking, "How long do you folks plan on keeping your new car?" The answer I wanted was: "I'm going to keep it until the wheels fall off." If I heard this I knew I could easily sell them an extended warranty. But if they said they always traded in after three years I was pretty well screwed. Still, most people said "Five years plus." I was reading an F&I magazine one day and I found a little detail that helped me make tens of thousands of dollars selling extended warranties. Here's how it worked. If the customer said they were going to keep their car a long time, I'd say, "Did you know that your new car has more computer chips in it than the first spaceship that went to the moon?" This had an amazing effect on people — they got goose bumps and leaned forward wanting to hear more. Then I'd continue, "It's a sophisticated piece of machinery and it's expensive to repair. To give you an idea, a transmission problem could be $3,000 or higher. So if something were to go wrong — which we hope it doesn't — it could be very expensive to repair. Now, you have your factory warranty and then everything that happens after that is your responsibility. By this point, a lot of people would be listening carefully, following along as I outlined the different warranty plans. I had a 50 percent sales record with extended warranties which was nice because the markup (the profit made by the dealer that contributed to my commission) was nearly double the actual cost of the warranty. The other thing that sold people on the extended warranty was when I told them, "It's cheaper if you buy it now and you can always cancel it if you change your mind. So you see there's really no risk." Of course, if they cancelled it, it became a "charge back" for me in my next month's paycheck, so I really hoped they didn't do this. But plenty of people never cancel something like an extended warranty once they buy it, often because they simply forget about it. After about a year at this dealership I began to see something that really made me mad. Every month we got a statement that showed how much we made in the F&I office. And it also showed how many charge backs we had, which were things customers had purchased but then cancelled. Anything that we sold could be cancelled except for "hard-adds," things that were physically attached to the car like running boards or upgraded stereos. The accounting was done by this weasely guy who worked in a dingy, windowless office in the back of the dealership. His desk was a complete mess, with papers strewn all over the place. I had no idea how he could find anything in there. But he generated a monthly report that showed how much was made in the F&I room. And he also reported the number of charge backs that were deducted from our commissions. After awhile, I noticed that on the months that I sold a lot of add-ons there also tended to be a lot of charge backs. It was like having my paycheck cut in half. Was he ripping me off? I couldn't prove it. But I knew I would never make the kind of money I wanted working there. Not only that, but the owner's son had taken over running the place and I just didn't see eye to eye with him. In retrospect, the way it turned out was a blessing in disguise. I heard about an opening at a larger dealership across town. I landed a job there and hit the F&I jackpot. | 0.65 | low | 4 | 2,472 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"technology",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.55,
"creativity": 0.35
} |
50c8afa6-4f9f-4efc-be09-13cab09872a7 | Faculty Performa Designa4on: Associate | interdisciplinary | research_summary | Faculty Performa
Designa4on: Associate Professor, Department: Philosophy
*Phone numbers:
Land Line No. 01147007162
Mobile No.+91 9810368450
*E-‐mail Id: email@example.com
Educa4onal Qualifica4ons:
Posi4ons Held/ Career Profile: Assoc. Prof.
Teaching Experience:
Years: 21+
Area of Specializa4on: Western Philosophy, Platonic Studies, Applied Ethics and Aesthe4cs Courses and Subjects Taught:
Aesthe4cs
B.A. (H) 3
RD
Year
Philosophy of Law
B.A. Hons. Programme, Philosophy(Erstwhile FYUP), 3 rd Year
Elements of Indian Philosophy B.A.(H) 1 ST Year, CBCS
21
st
Year runn
I
i 4
d
S
b li 4 M A
P II/S
III(2013‐ 14
i)
Aesthe4cs
B.A. (H) 3 Year
Philosophy of Law
B.A. Hons. Programme, Philosophy(Erstwhile FYUP), 3 rd Year
Elements of Indian Philosophy B.A.(H) 1 ST Year, CBCS
Imagina4on and Symboliza4on M.A. Part II/Semester III(2013-‐14 session)
Areas of Interest:
Academic
Pursuing constant research in areas of interest like Platonic studies, , Applied Ethics and Aesthe4cs and working on an inter-‐disciplinary perspec4ves of these
Non Academic Reading, Travelling and watching Movies
Any other informa4on (Research, Publica4ons, Presenta4ons and Awards)
* Have a couple of research publica4ons in major journals of Philosophy like Journal of Indian Philosophical Quarterly (JICPR) and Indian Philosophical Quarterly(IPQ).
* 1 (One) Chapter published by Words Worth: Delhi, India.
* Have publica4on of 4(four) Chapters in books published by Inter-‐Disciplinary Press: Oxford, U.K. A Chapter to be published by Oxford University Press: Canada, to be published in January,2016.
* Have presented papers at Inter-‐na4onal forums like Global inter-‐disciplinary conferences held at University of Oxford, U.K. and Prague, Czech Republic.
* Have presented papers at various na4onal conferences and seminars at
different colleges of Delhi University, Department of Philosophy, Delhi University, India Interna4onal Centre, New Delhi (ICPR Conducted Na4onal Conference).
* I am a steering group Commiiee member of one of the groups of Inter-‐ Disciplinary.Net. The group is 'Ero4c/Gender and Sexuality' that conducts Interna4onal-‐Global Conferences. As the steering group member, I am also responsible for peer review for selec4ng papers to be presented at these conferences.
* Have an ar4cle published by Hindustan Times, in their Educa4on supplement successively for 3 years(2010-‐13) on Philosophy as a subject of choice at the Undergraduate level.
* Also, a steering group commiiee member (inducted in September,2015) for Gender and Love group. , I shall be responsible for peer reviewing and selec4ng papers to be presented at the upcoming conferences of this project of inter-‐disciplinary.net
* I am a member of JICPR. | 0.7 | medium | 4 | 880 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"philosophy_and_ethics"
] | {
"clarity": 0.7,
"accuracy": 0.5,
"pedagogy": 0.6,
"engagement": 0.5,
"depth": 0.35,
"creativity": 0.3
} |
d678a61f-d36a-4b0c-90e2-ec28a5f6a279 | How Stop Sudanese Genocide | social_studies | historical_context | How to Stop the Sudanese Genocide (and How Not To)
On January 9, the Sudanese government inked a deal with southern rebels to end the country's 21 year-long civil war. While the agreement gives hope to a region that has not experienced a shred of development in ten years, it does not cover the 22-month conflict in Sudan's western Darfur region, where approximately 70,000 people have died and more than 1.8 million others have been displaced from their homes. According to Human Rights Watch, the Sudanese government continues to attack civilians in Darfur and has failed to take any steps to "neutralize and disarm the Janjaweed/armed militias." Meanwhile, rebels have launched several small-scale offensives, in blatant violation of cease-fire accords signed with the government last November. Given the threat of ongoing calamity in the region, President Bush must bolster the African Union (AU), which negotiated the most recent peace accords, in order to arrive at a political, and, if necessary, military resolution to the crisis.
For too long, efforts to stem the bleeding in Darfur reflected a 1990's mindset. During the nineties, international crisis resolution revolved around a toolkit comprising international law, institutions, and commerce. This toolkit first emerged after the fall of the Berlin Wall, when theorists of international politics from across the political spectrum waxed lyrical about the "End of History" and the "new paradigm" of international cooperation. As described by Robert Kagan, the hallmarks of global politics would place "emphasis on negotiation, diplomacy, and commercial ties, on international law over the use of force." International law, supported by multilateral institutions and global commerce, would emerge as the defining regime for global affairs.
Sadly, however, these tools have grown corroded from misuse and desperately need reforging.
First, international law has been reduced to a porridge of diplomatic double-speak. During the debate over the invasion of Iraq, numerous EU members spoke of law as a hallowed arbiter of conflict; yet the EU has failed to acknowledge that genocide is occurring in Sudan despite overwhelming evidence. At the UN, diplomats who recently used broad legal strokes to describe the U.S. as a violator of international law, now wriggle out of defining Darfur as genocide, all while thousands face slaughter.
Second, multilateral institutions like the UN, EU and the Arab League have turned a blind eye. All three allude to the "humanitarian crisis" - not the genocide - in Darfur but none has taken significant action in response. The Security Council passed toothless resolutions calling on Khartoum to rein in the Janjaweed and is "considering" imposing sanctions. The EU sent humanitarian aid. And an Arab League fact-finding mission went so far as to blame the "conflict" on drought and under-development in Darfur.
Finally, international commerce has, if anything, compounded the crisis. Economics, according to the post-Cold War paradigm, were supposed to offer both carrot - free trade and export markets - and stick - sanctions - to ensure good international citizenship. Instead, the economic ties of Security Council members like France, Russia, and China to the Khartoum regime and its oil spigots have hampered forceful action or even sanctions.
But if these three tools have failed miserably, unilateral American force will not save the day either. The U.S., stretched thin by the war on terror, can ill-afford to open a new front, let alone in another oil-producing Muslim country.
How, then, can the tragedy be stopped?
Fortunately, a solution is in reach. The U.S. should strengthen the efforts of the most important regional multilateral institution - the African Union. The U.S. should empower the AU to offer incentives to both sides, including recognizing Darfur's autonomy within a unified Sudan. Without such incentives, there's little reason for the rebels to endorse the cease-fire -- much to the detriment of civilians -- or for the government to rein in the Janjaweed.
Simultaneously, the U.S. must militarily reinforce the AU if an invasion of Sudan is deemed necessary. Currently, the African Union lacks both the will and the resources to invade a sovereign state. The AU has deployed 900 troops of a possible 3,500 designated for peacekeeping duties, and none of these soldiers is armed. The U.S. and its allies must immediately provide assistance to deploy the remaining peacekeepers, then offer substantial aid, including arms shipments and special operations training, to the AU. Both President Bush and John Kerry voiced support for exactly this plan during the campaign and recently our outgoing UN ambassador, John Danforth, suggested beefing up the AU force with more troops and international monitors. President Bush must now act on these recommendations.
If we successfully fortify the AU, we can place our own power and prestige behind a retooling of international law, institutions and commerce - for the betterment of Sudan and the world.
Michael M. Rosen is an attorney in San Diego. Daniel I. Silverberg is an attorney in San Francisco. | 0.65 | medium | 5 | 1,079 | [
"domain basics"
] | [
"expert knowledge"
] | [
"science",
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.55,
"creativity": 0.45
} |
82e573c1-175c-48cf-8b3d-91783c685510 | Backhousia citriodora, commonly known | life_skills | research_summary | Backhousia citriodora, commonly known as lemon myrtle, or sweet verbena, is a subtropical flowering shrub native to Australia but is now grown around the world.
[Note: The Right Flowers is not a medical site. Knowledge of and information about the therapeutic benefits and applications of flowers, while known through the ages, does not constitute medical advice. If you are having health issues, you should consult with a physician.]
The plant was named backhousia citriodora after James Backhouse, an English botanist. Initially, the plant was named “lemon-scented myrtle” due to its strong lemon aroma but with time it was shortened to “lemon myrtle”.
Lemon myrtle is a hardy plant and can thrive in poor soils. It mostly grows in rainforests and along river banks.
The shrub is considered the queen of the herbs due to its lemon twist and is one of the highly sought-after herbs in Australia. Sweet verbena is not only popular in Australia, but it is also a darling of alternative cure and culinary enthusiasts due to its aromatic citrus flavor which is not only sweet but also refreshing.
The Right Flowers in Your Inbox!
Sign up for our free notifications of new articles!
Traditionally, the Australian Aborigines harvested the shrub in the rainforests to enhance their dishes. They also used it to relieve sore throats and heal wounds. Today, gardeners normally cultivate the shrub as an ornamental plant in order to enjoy its citrus notes in the yard. Some also cultivate it for culinary and medicinal reasons.
Normally, it is the leaves and flowers of the sweet verbena that are used for culinary and herbal purposes. The shrub contains citral, a potent antimicrobial, antifungal and antiseptic compound commonly found in plants and fruits with the citrus flavor. The plant is also used to bring out the flavor and increase the aroma of salads, meats, curries, bakings, desserts, and sauces.
In the 1900s, the flowers and leaves of the lemon myrtle shrub were harvested aggressively for commercial purposes. The shrub’s essential oil was extracted via distillation and exported to the US and Europe where it was used for flavoring beverages.
In recent years, researchers have sought to evaluate the medicinal capabilities of the plant. In a study conducted in 2004, researchers sought to find out the effectiveness of lemon myrtle against molluscum contagiosum, a viral infection.
The study involved 31 patients diagnosed with the infection treated with a single dose of lemon myrtle topically applied daily. After 21 days, researchers noticed that there was a 90 percent reduction in lesions. Therefore they concluded that lemon myrtle was effective against viral infections such as molluscum contagiosum.
Good for skincare
Lemon myrtle is widely used in the skincare industry to make soaps, conditioners, body lotions, and lip balms. Its scent is highly sought after in the beauty industry because it is known to have calming and soothing effects.
Lemon myrtle has sufficient levels of antioxidants. These are ideal for protecting the body against oxidative stress and the effects of free radicals.
Lemon myrtle is a great shrub to have in your yard. It will not only impart its citrus scent to the yard, but it is also good for making your dishes sing and has many health benefits. | 0.6 | medium | 4 | 704 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
e6212332-573e-42f2-bbd0-373498416128 | hope you get chance | interdisciplinary | concept_introduction | We hope you get the chance to read your child’s report card. Report cards are important but it’s important to recognize that these are snapshot in time and don’t tell you everything about your child at school. The comments are very important and will tell you more about your chid’s progress at school. Each comment should answer the following three questions:
- What is the strength?
- What is a challenge?
- What are the next steps to address that challenge?
Please contact your child’s teacher(s) to learn more about what is happening at school and what your child is learning.
Report Cards Sent Home near the end of the day (email and/or hardcopy).
Please watch for these – read the comments with your child please! Report cards are important but don’t tell the entire story of what is happening with your child at school The best way to learn about that is by keeping in regular contact with teachers.
The image and quote above is a good reminder about report card results, although important, don’t define your child. There are many things that we can’t put a number on. The numbers on the report card a snapshot in time and can be used as stepping stones for future growth and learning. A good article about how to talk to your child about report cards can be found here (note this is an external website and is not associated with the HSD or MMS).
If you have questions about the set up of the report card please read this: Report Card Opinions vs. Facts. | 0.65 | medium | 3 | 320 | [
"foundational knowledge"
] | [
"advanced concepts"
] | [] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.25,
"creativity": 0.3
} |
5d568df9-6778-4e84-accf-6baa91dd90ee | On Wednesday, the U | interdisciplinary | historical_context | On Wednesday, the U.S. Supreme Court will hear oral arguments on the constitutionality of allowing public schools to lead students in reciting the Pledge of Allegiance, which contains the phrase, "one nation under God." A look in Gallup's online public opinion database, the Gallup Brain, shows that this is a new chapter in a national discussion that began more than 50 years ago.
In the 1950s, during the height of the Cold War and the anti-communist sentiment that went with it, politicians suggested that the phrase, "under God," be added to the existing pledge to the flag, to distinguish a religious America from non-religious communist countries. A substantial majority of Americans, 69%, said they supported the addition, according to a 1953 Gallup Poll, while 21% were opposed.
"From this day forward, the millions of our schoolchildren will daily proclaim in every city and town, every village and rural schoolhouse, the dedication of our nation and our people to the Almighty," declared President Dwight D. Eisenhower on Flag Day in 1954, after signing the bill that added "under God" to the Pledge of Allegiance.
Patriotism, Prayer, or Both?
By 2000, the Cold War had become a chapter in history books. That year, Michael A. Newdow, an atheist from Sacramento, Calif., filed a lawsuit arguing that his daughter who attended an area school was injured when she had to "watch and listen as her state-employed teacher in her state-run school leads her classmates in a ritual proclaiming there is a God." A district court judge ultimately dismissed the case. But the Ninth Circuit Court of Appeals -- the largest appellate court in the United States -- reversed the decision and ruled that the inclusion of "under God" in the pledge violates the Establishment Clause in the Constitution.
If the Supreme Court does not reverse this ruling, children in the public schools in the nine states covered under the Ninth Circuit Court of Appeals would no longer be allowed to recite the pledge, and the ban could apply to public schools across the nation.
How did the American public feel about all this? In a June 2002 Gallup Poll, Gallup asked respondents if they agreed or disagreed with the federal court's ruling. Eighty-four percent said they disagreed, and 14% agreed.
Religiosity Then and Now
Given the high degree of religiosity among Americans, it's no surprise that support for the phrase, "under God," remains high. Gallup research shows that two of the most indicative markers of religiosity -- belief in God and church attendance -- have changed relatively little over the last 50 years. In 1954, 98% of Americans told Gallup they believed in God, and in 1999, the last time the question was asked, 94% said they believed in either God (86%) or a universal spirit (8%). Forty-six percent of Americans said they had attended church within the last seven days in 1954; 43% said so in 2003.
Elk Grove Unified School District v. Newdow may be a troubling case, particularly for a court that begins each session with "God save the United States and this honorable court." In addition, the motto, "In God We Trust," appears on U.S. currency and many patriotic songs include references to God ("God Bless America"). Newdow, a non-practicing lawyer, has pledged to continue his attempt to overturn these national expressions of religion, as well as others. The Supreme Court hopes to rule on this issue by June, but the most recent Gallup data suggest that there is a broad public mandate to leave well enough alone. | 0.65 | medium | 4 | 800 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.55,
"creativity": 0.35
} |
e5b6cb67-a8be-4a3f-8ff3-d5902c7fe9b0 | holy Prince Constantine Brancoveanu | interdisciplinary | tutorial | The holy Prince Constantine Brancoveanu, the son of Prince Matthew Basarab, was born in 1654. When his parents died, he was raised and educated by his uncle, Constantine Cantacuzino. When another uncle, Prince Serban Cantacuzino died on on October 19, 1688, Constantine was chosen to succeed him as Prince of the Romanian Land (Wallachia). St Constantine was a wise and just ruler who was guided by Christian principles, and worked for the benefit of his people. He also built and restored many churches and monasteries. His philanthropy extended even into Transylvania and Moldavia, which were ruled by others.
In 1714, after a reign of twenty-five years, St Constantine, his sons, and his sons-in-law were arrested by soldiers sent to Bucharest by Sultan Ahmed III (1703-1730).The prisoners were brought to Constantinople, where they were tortured for four months. Prince Constantine was told that if he and his sons wanted to escape death, they would have to convert to Islam and pay a large sum of money. Constantine did not have the money required by the Turks, and he did not wish to convert to the Moslem faith.
Seeing that neither tortures nor threats would induce the prisoners to forsake Christ, the Turks sentenced them to death. Before his own execution, St Constantine had to watch as his sons were beheaded before his eyes.
On the Feast of the Dormition (August 15), The sixty-year-old prince, his sons, and his counsellor Ianache Vacarescu died as martyrs for Christ. Their bodies were left unburied for three days, then they were thrown into the sea. Their relics were recovered by Orthodox Christians who brought them to the Monastery of the Theotokos on the island of Chalki.
St Constantine’s wife Marica brought his holy relics back to Bucharest and placed them in the church of St George the New, which he had founded. He was glorified by the Orthodox Church of Romania in 1992. | 0.6 | medium | 4 | 445 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
4e6f2495-b60b-46f2-a26b-1a92d886800e | Charlie Francis responded National | interdisciplinary | concept_introduction | Charlie Francis has responded to the National Roman Legion Museum with ‘Audere est Facere’, in particular the clashing of indigenous and invading cultures during the emergence of Roman Britain.
Britiannia was one of the last provinces to be added to the Roman Empire, and it proved to be one of the most troublesome. The Romans invaded Britain in AD 43 with an army of about 40,000 men.
Landing on the Kentish coast, they won a decisive battle and quickly advanced to the River Thames. They marched on the British stronghold of Colchester, having awaited the arrival of the Emperor Claudius, and defeated the tribal leaders.
Within a few years, the new province covered all of south eastern Britain. By 48, Roman forces were on the borders of what is now Wales.
The two most powerful tribes in Wales – the Silures in the south-east and the Ordovices in the north – were bitterly hostile to the Romans. An arduous struggle ensued that would last nearly three decades.
During the tenure of Emperor Vespesian the Second Augustan Legion were led to their new fortress in Caerleon, and forward to complete the defeat of the Silures by Julius Frontinus, provincial governor from 74 to 77. In mid and north Wales, the Ordovices were likewise subdued after campaigns by Frontinus and his successor Agricola in 78.
“I was looking for a fun project to work on myself and coming from York – a Roman town – I was naturally interested in the National Roman Legion Museum and its collections. The purpose of my track – which is based on one Miles Davies chord – is to accompany the National Roman Legion Museum experience.” | 0.6 | medium | 4 | 355 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"science",
"technology",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.4
} |
4317cd93-0b55-41d3-a880-0b514fda0024 | Please Take Me Home By Blink 182 | science | concept_introduction | Please Take Me Home By Blink 182
Not Within Top #500
Please Take Me Home
Blink 182
Send "Please Take Me Home" Ringtone to Your Cell (ad)
Popular ringtone start times for this song... (mouse over to see times)
Download the Ringtone Send Ringtone to Cell Phone
Recent ringtone creations using this song...
• Ringtone Created By Michael Jacobs
Please Take Me Home 00:41 → 01:06
6 years ago by Michael Jacobs
• Ringtone Created By Michael Jacobs
Please Take Me Home 00:08 → 00:33
6 years ago by Michael Jacobs
• Ringtone Created By Seymour Butts
Please Take Me Home 00:00 → 00:14
6 years ago by Seymour Butts
• Ringtone Created By Bri F.
Please Take Me Home 00:28 → 00:52
7 years ago by Bri F.
• Ringtone Created By Hannah Hawes
Please Take Me Home 00:00 → 00:40
7 years ago by Hannah Hawes
Recent app creations...
• 00:10→00:50
4 years ago
• 00:08→00:38
4 years ago
• 00:28→00:58
5 years ago
• 00:00→00:40
5 years ago
• 01:24→02:22
5 years ago
Lyrics For "Please Take Me Home"
We're sorry, but we don't have lyrics available for this song. Please check back later.
Check out these videos...
FEEDBACK | 0.65 | low | 4 | 413 | [
"scientific method",
"basic math"
] | [
"advanced experiments"
] | [] | {
"clarity": 0.6,
"accuracy": 0.4,
"pedagogy": 0.6,
"engagement": 0.5,
"depth": 0.25,
"creativity": 0.3
} |
245f50a2-63e4-417b-87e2-3b607e0041c6 | What is policy | interdisciplinary | historical_context | What is policy?
1. What is policy? A policy is a guiding principle or procedure that sets the framework and provides direction for management decisions. Our policies are guided by and consistent with the Constitution, public laws, Executive proclamations and orders, and regulations and directives from higher authorities. NPS policies translate these sources of guidance into cohesive directions. Policy direction may be general or specific. It may prescribe the process by which decisions are made, how an action is to be accomplished, or the results to be achieved. The primary source of NPS policy is the publication Management Policies 2006. The policies contained therein are applicable Service-wide. They reflect our management philosophy. Director's Orders supplement and may amend Management Policies. Unwritten or informal "policy" and peopleís various understandings of NPS traditional practices are never relied on as official policy.
2. Who establishes Service-wide policy? Service-wide policy is issued only by the Director. Supplemental policies, instructions, directives, and other forms of guidance of regional or otherwise limited application that are in conformance with Service-wide policies may be issued by regional directors or associate directors within formal delegations of authority. Park-specific instructions, procedures, directives and other guidance supplemental to and in conformance with applicable NPS policies (such as hours of operation, the dates of seasonal openings, or procedures for implementing Service-wide policies) may be set by superintendents within formal delegations of authority from regional directors.
3. Who else sets policy for the National Park System? At levels above the Director, policy may be established by Congress as it passes laws that apply to the National Park Service, or it may be established by the President, the Secretary of the Interior, or the Assistant Secretary for Fish and Wildlife and Parks. Regulations issued by other agencies, such as OSHA and EPA, sometimes reflect national policy with which the NPS must comply.
4. What kinds of policies has Congress set for the National Park System? The NPS Organic Act sets broad policies for the national park system. The broad policies tell us that the national parks have been set aside for the fundamental purpose of conserving "the scenery and the natural and historic objects and the wild life therein." They also tell us that we are to provide for the enjoyment of the parks "in such manner and by such means as will leave them unimpaired for the enjoyment of future generations." Congress has also established broad policies on specific topics such as concessions management and protecting wild and scenic rivers. Congress has included in the enabling legislation for many parks specific policies applicable to those parks, which may sometimes vary markedly from the generic legislation. For example, Congress has authorized hunting in some units of the park system.† Beyond the national parks, Congress has also established policies that govern the many program activities that the Service administers to extend the benefits of natural and cultural resource conservation and recreation throughout this country and the world.
5. How Is NPS policy-making related to Congressís policy-making? Congressís broad, legislated policies are somewhat general and usually do not specify how the end goals are to be achieved. Fortunately, the Organic Act also authorizes the NPS to "regulate the use" of national parks, which means we may develop more detailed policies to implement the overarching policies set by Congress. We have articulated those detailed policies in NPS Management Policies, which govern the way NPS managers are to make decisions on a wide range of issues that come before them. The current edition of Management Policies was approved in August 2006. If and when it is necessary, policies may be modified or supplemented by Directorís Orders. The latest information on policies may be found on the web at http://www.nps.gov/policy.† Legislation establishing broad policy for NPS outreach programs relating to, for example, the Land and Water Conservation Fund program and historic preservation, allow the NPS to develop more specific policies to meet the practical management needs of those programs.
6. How do NPS regulations relate to policy making? Regulations generally are mechanisms for implementing laws and for enforcing policies that have been established by the Director. In national park operations, we are most familiar with the NPS regulations published in title 36 of the Code of Federal Regulations, and which are basically detailed statements of how policies prescribed by the Director (or higher authorities) will be applied to the public who use the parks. They are published as regulations because we cannot enforce rules unless we first publish them as a "rulemaking." For example, we cannot issue a citation to a visitor who lets his dog run loose unless there is a specific regulation that prohibits that activity in a park. Once policies are published in this form, they apply to everyone, are non-discretionary, and their violation may invoke a fine and/or imprisonment. We also publish regulations to tell the public how we will administer various programs, such as concession activities, the National Register of Historic Places, and the Land and Water Conservation Fund.
7. What is the 3-level Directives System? The NPS Directives System consists of internal instructions and guidance documents to ensure that NPS managers and staff have clear information on NPS policy and on required and/or recommended actions. It is intended to reflect the NPSís organizational values of teamwork, delegation to the most effective level, empowerment of employees, accountability, and reduction in overall paperwork. The Directives System is composed of 3 "levels" of documents:
In many cases, Level 3 handbooks and reference manuals will look very similar to the old "Guideline" series. They may serve as a source of "one-stop shopping" for comprehensive information about a particular program or function. But they will be more carefully crafted to clearly distinguish between what is mandatory or required, and what is merely recommended. Those who issue Level 3 documents may not impose any requirements beyond what has already been issued in a Directorís Order (or in a statute, regulation, Executive order, or some other higher source of authority), unless the Director has specifically authorized them to do so.
8. How is NPS policy developed? Policy initiatives may develop as a sudden, urgent response to an unanticipated problem or issue, or through a slow, evolutionary process where the Service gains increased experience or insight regarding a problem or issue. Sometimes the initiative does not originate within the NPS, but from persons or organizations outside the NPS who have strong interest in how we manage the parks. However, NPS policy usually is developed through a concerted work group and consensus-building effort, involving extensive field review, consultation with the National Leadership Council, and review and comment by the general public. This effort culminates with the Director signing a Directorís Order. On a larger scale, the 1988 Management Policies underwent a systematic internal and external review over a period of several years, resulting in the 2001 edition. A similar effort culminated with the Director's August 2006 approval of the current edition.
Specific development procedures for Level 2 and Level 3 documents are as follows:
a. The originating office or program area decides who will be the project leader in preparing the document(s). That person should then confer with the Office of Policy regarding detailed procedures and how to successfully approach the task.
b. A "justification statement" explaining the need for an order is prepared at the earliest opportunity, and sent from the appropriate associate director through the Chief, Office of Policy, to the Director, who decides whether the order should be prepared. Before sending the justification statement to the Director, the Chief usually sends it to the National Leadership Council. Any comments from the NLC are attached for the Director's consideration. Some justification statements may also be reviewed by the Assistant Secretary FWP.
c. The project leader decides whether to begin the process by doing a Level 2 or Level 3 document. In most cases it will be better to start with the Level 3 document because it is more comprehensive and you will be less likely to overlook a policy or required procedure that will need to be covered by the Director's Order. Also, a review and comment period on a Level 3 document eliminates the need for review and comment on a related Directorís Order if it is already covered in the Level 3 document.
d. The project leader identifies and gathers all of the policies, guidelines, staff directives, special directives, memoranda and other forms of guidance that have been issued on the subject matter.
e. The project leader decides if it would be better to independently draft the document or to convene a small (or large) work group to assist in the effort.
f. The responsible party(s) reviews all the necessary material and prepares an outline of how the new document will be organized. In some cases, a great deal of creative writing may be necessary; in other cases, it may simply be a "cut and paste" job to bring pre-existing guidance documents into conformance with the new Directives System.
g. The Office of Policy should be consulted at key points in the document's development, to ensure that it will conform with the new Directives System. Other affected program areas should be consulted if they are not already represented on a work group. Where there are legal implications, the project leader may also obtain informal assistance from the Solicitor's Office. It is sometimes advisable to also confer with outside parties (i.e., partner organizations, "stakeholders") who will be affected by the policies or procedures when adopted by the NPS.
h. A rough draft should be reviewed by knowledgeable NPS staff who will be affected by, and required to implement, the finished product. This can be done as widely or narrowly as the project manager thinks appropriate.
i. A finished draft is then delivered to the Office of Policy in hard copy and in MS Word format.
a. The Office of Policy and the project leader determine whether to circulate for official review the Level 3 document, or to circulate just the Directorís Order component.
b. When the document meets substance and format requirements, the Office of Policy distributes a draft to the National Leadership Council for a 60-day review and comment period.
c. For Directors Orders that will affect interests outside the NPS, the originating office, following clearance by the Departmentís Executive Secretariat, issues a Federal Register notice inviting 30-day public review and comment.
d. The originating office evaluates all comments and makes any necessary changes.
e. The Office of Policy distributes a revised draft, along with a summary of comments and revisions, to the NLC for a 14-day period.
f. The originating office evaluates all comments resulting from the 14-day review and makes any necessary changes (which generally will not be very extensive at this point).
g. In rare instances, when the 14-day review results in extensive changes, another round of NLC review may be necessary.
h. The Office of Policy "packages" the final document for approval.
i. The Solicitorís Office may be asked to surname the final document, after which it is sent to the Director for consideration.
j. The Director approves (or disapproves) the document.
k. After approval, the originating office may publish a Federal Register notice that the policies/procedures have been adopted and explain the disposition of public comments.
10. How do the approved documents get distributed? Shortly after the Director approves a Director's Order, the Chief, Office of Policy, distributes it to the National Leadership Council. NLC members are then responsible for distributing copies to the parks and program managers. In addition:
-- The office having lead responsibility distributes Level 3 documents in electronic format and, if preferred, in hard copy. That office may also distribute approved Director's Orders to whomever they think has a need for them.
-- Management Policies, Director's Orders and Level 3 handbooks/reference manuals are also published on the NPS's World Wide Web site at http://www.nps.gov/policy.
11. What happens after the documents are approved and distributed? All NPS personnel are responsible for knowing and adhering to policies and other requirements that are issued by the Director or by an associate director who has been delegated appropriate authority.
12. Iím confused by all the different levels. How will I know what is mandatory and what is merely advice? A clear understanding of what is or is not mandatory can be obtained from key words contained in the various guidance documents (regardless of whether those documents are policy statements, Directorís Orders, guidelines, manuals, memoranda, etc.). The key words are: should, may, must, and will. These words are unambiguous; they can mean only one thing. When we see the words must or will (or must not, will not) used in any guidance document there is no reason to ask if it is mandatory or not--it is mandatory. The only question that you may need to ask is whether the person who issued the guidance document has the authority to tell you that you must or will do something. Generally, only the Director issues Service-wide guidance of a mandatory nature. But the Director may also delegate to an associate director authority to issue required standards or procedures, or may delegate to regional directors authority to prescribe requirements applicable region-wide.
13. What happens if those who make decisions do not comply with Service-wide policy? It is important to the future of the national park system and NPS programs that Service-wide policies and procedures be judiciously and consistently applied. The integrity of the directives system is maintained through employee performance reviews. Failure to comply with established policies and procedures may indicate a lack of knowledge, a lack of thoroughness, and/or unsound judgment and decision-making. It may also indicate insubordination. Unless specifically stated otherwise, Management Policies and Director's Orders are intended only to improve the internal management of the NPS and are not intended to, and do not, create any right or benefit, substantive or procedural, enforceable at law or equity by a party against the United States, its departments, agencies, instrumentalities or entities, its officers or employees, or any other person. However, some NPS policies are simply reiterations of regulations or statutes, and they carry the force and effect of law. Violating those policies could lead to more serious consequences.
14. How do I obtain a policy waiver? Adherence to the Service-wide policies found in Management Policies and Director's Orders is mandatory unless waived by the Director. To request a waiver, a memorandum must be sent to the Director from the superintendent (through the regional director, and through the Chief, Office of Policy). The memorandum should concisely and candidly describe:
Any helpful supplemental information should be attached to the memorandum, and the memorandum should conclude with two lines indicating "I concur" and "I do not concur," with a space for the Director's signature. The Director will check the appropriate decision line.
Prior to formally requesting a waiver, the problem or issue should first be discussed with staff at the Office of Policy, who will help ascertain whether there is some other acceptable way to achieve the desired result. The Office of Policy will also ensure that other NPS offices with relevant responsibilities and expertise are consulted. A waiver cannot be granted if it would result in the impairment of park resources or values, and thus violate the no-impairment clause of the NPS Organic Act.
15. May the public participate in policy-making? The travel and tourism industry, recreational equipment manufacturers, environmental organizations, the visiting public and many others have a strong interest in the way the national parks are managed. They also have a strongly held belief in their right to participate in the decision-making process. This belief is supported by the Administrative Procedure Act, which requires agencies to give the public an opportunity to comment on major policy decisions that will affect them. Prudence and Departmental policy dictate that the NPS seek and consider public comment through Federal Register notices and other selective means as we adopt our Directorís Orders and update NPS Management Policies, just as we routinely do with NPS regulations. However, we do not generally seek public comment on operational matters that are likely to be of no, or limited, interest to the public.
16. Where can I find the most current information about NPS policy? The latest NPS policy documents are posted on the Internet at www.nps.gov/policy.
17. Iíve heard references to the "no-impairment" issue. How can I find out more about it? The NPS is prohibited by law from taking any action that would impair park resources and values, unless specifically provided by Congress. Section 1.4 (Park Management) of Management Policies provides policy guidance on this topic. Visit the web site at http://www.nps.gov/protect/ for more detailed guidance.
18. Some of the posted Director's Orders show sunset dates that have expired. Does that mean we should no longer consider them to be a valid source of guidance? No, that is not the case. When the NPS initiated the new directives system, a "sunset date" seemed like a good idea. But we have come to realize that the renewal process imposes an unnecessary and burdensome workload. For this reason, sunset dates are no longer included in new Director's Orders. And this decision is being applied retroactively. As older Director's Orders are edited, the sunset date is being removed. New wording in both cases indicates that the Director's Order will remain in effect until revised or rescinded. NPS staff should continue to abide by Director's Orders posted on the policy web site, even though the sunset dates may have passed.. | 0.7 | medium | 6 | 3,634 | [
"intermediate understanding"
] | [
"research"
] | [
"science",
"technology"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.55,
"creativity": 0.35
} |
df03b601-cf26-4d13-a815-4cc08e707a0c | |Just interval||6:5, 19:16, 32:27| | interdisciplinary | historical_context | |Just interval||6:5, 19:16, 32:27|
|24 equal temperament||300|
|Just intonation||316, 298, 294|
In the music theory of Western culture, a minor third is a musical interval that encompasses three half steps, or semitones. Staff notation represents the minor third as encompassing three staff positions (see: interval number). The minor third is one of two commonly occurring thirds. It is called minor because it is the smaller of the two: the major third spans an additional semitone. For example, the interval from A to C is a minor third, as the note C lies three semitones above A, and (coincidentally) there are three staff positions from A to C. Diminished and augmented thirds span the same number of staff positions, but consist of a different number of semitones (two and five). The minor third is a skip melodically.
Notable examples of ascending minor thirds include the opening two notes of "Greensleeves" and of "Light My Fire".
The minor third may be derived from the harmonic series as the interval between the fifth and sixth harmonics, or from the 19th harmonic.
The minor third is commonly used to express sadness in music, and research shows that this mirrors its use in speech, as a tone similar to a minor third is produced during sad speech. It is also a quartal (based on an ascendance of one or more perfect fourths) tertian interval, as opposed to the major third's quintality. The minor third is also obtainable in reference to a fundamental note from the undertone series, while the major third is obtainable as such from the overtone series. (See Otonality and Utonality.)
The minor scale is so named because of the presence of this interval between its tonic and mediant (1st and 3rd) scale degrees. Minor chords too take their name from the presence of this interval built on the chord's root (provided that the interval of a perfect fifth from the root is also present or implied).
A minor third, in just intonation, corresponds to a pitch ratio of 6:5 ( play ) or 315.64 cents. In an equal tempered tuning, a minor third is equal to three semitones, a ratio of 21/4:1 (about 1.189), or 300 cents, 15.64 cents narrower than the 6:5 ratio. In other meantone tunings it is wider, and in 19 equal temperament it is very nearly the 6:5 ratio of just intonation; in more complex schismatic temperaments, such as 53 equal temperament, the "minor third" is often significantly flat (being close to Pythagorean tuning ( play )), although the "augmented second" produced by such scales is often within ten cents of a pure 6:5 ratio. If a minor third is tuned in accordance with the fundamental of the overtone series, the result is a ratio of 19:16, this produces an interval of 297.51 cents. The 12-TET minor third (300 cents) more closely approximates the 19-limit (Limit (music)) minor third 16:19 Play (297.51 cents, the nineteenth harmonic) with only 2.49 cents error. M. Ergo mistakenly claimed that the nineteenth harmonic was the highest ever written, for the bass-trumpet in Richard Wagner's WWV 86 Der Ring des Nibelungen (1848 to 1874), when Robert Schumann's Op. 86 Konzertstück for 4 Horns and Orchestra (1849) features the twentieth harmonic (octave of the fifth harmonic, or major third) in the first horn part three times.
Other pitch ratios are given related names, the septimal minor third with ratio 7:6 and the tridecimal minor third with ratio 13:11 in particular.
The minor third is classed as an imperfect consonance and is considered one of the most consonant intervals after the unison, octave, perfect fifth, and perfect fourth.
The sopranino saxophone and E♭ clarinet sound in the concert pitch ( C ) a minor third higher than the written pitch; therefore, to get the sounding pitch one must transpose the written pitch up a minor third. Instruments in A – most commonly the A clarinet, sound a minor third lower than the written pitch.
Pythagorean minor third
In music theory, a semiditone (or Pythagorean minor third) is the interval 32:27 (approximately 294.13 cents). It is the minor third in Pythagorean tuning. The 32:27 Pythagorean minor third arises in the C major scale between D and F. Play
It can be thought of as two octaves minus three justly tuned fifths. It is narrower than a justly tuned minor third by a syntonic comma.
- ↑ Haluska, Jan (2003). The Mathematical Theory of Tone Systems, p.xxiv. ISBN 0-8247-4714-3. 19th harmonic, overtone minor tone.
- ↑ Curtis ME, Bharucha JJ (June 2010). "The minor third communicates sadness in speech, mirroring its use in music". Emotion. 10 (3): 335–48. doi:10.1037/a0017928. PMID 20515223.
- ↑ Dowsett, Peter (2015). Audio Production Tips: Getting the Sound Right at the Source, p.3.6.3. CRC. ISBN 9781317614203. "The minor third, however, does not appear in the harmonic series until the nineteenth harmmonic. Your ear almost expects to hear the major third ([on A:] C♯), and when that is replaced with a more distantly related note, this makes the listener feel more 'unpleasant', 'tense', or 'sad'."
- ↑ Alexander J. Ellis (translating Hermann Helmholtz): On the Sensations of Tone as a Physiological Basis for the Theory of Music, page 455. Dover Publications, Inc., New York, 1954. "16:19...The 19th harmonic, ex. 297.513 [cents]". Later reprintings: ISBN 1-150-36602-8 or ISBN 1-143-49451-2.
- ↑ Prout, Ebenezer (December 1, 1908). "In the Forecourts of Instrumentation", The Monthly Musical Record. p.268.
- ↑ John Fonville. "Ben Johnston's Extended Just Intonation- A Guide for Interpreters", p.124, Perspectives of New Music, Vol. 29, No. 2 (Summer, 1991), pp. 106-137.
- ↑ Paul, Oscar (1885). A manual of harmony for use in music-schools and seminaries and for self-instruction, p.165. Theodore Baker, trans. G. Schirmer. | 0.65 | medium | 4 | 1,620 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"mathematics",
"technology",
"arts_and_creativity"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.35,
"creativity": 0.3
} |
aa7a0663-6672-4aa5-8fb0-54a03cdb0031 | Wednesday, December 10, 2008 | life_skills | worked_examples | Wednesday, December 10, 2008
So I was reading through all of SuperMoms posts and getting a little jealous. Apparently she thought she was too overweight and went to the doctor. She told him she had tried the usual and it wasn't getting the job done. He prescribed some miracle pill and the result is that she has lost 20 some pounds in like a month. I, in reading this, called my doctor and scheduled an appt......for TODAY. I want in on the miracle weight loss. I too have done the over the counter stuff and the diets. Don't get me wrong I don't want it to do all the work for me, but a little help would be sooo nice. I know that most of us have been pretty damn thin at one time and it is just weird to know that I am a "fat" girl. I am so tired ALL the time. Hopefully, this pill is an option for me. PLEASE GOD!!!! Let it be an option for me. I have been food diary-ing (though that hasn't happened in a week or two,oops!) and trying to work out some everyday. Maybe this will help keep me accountable. Either way, I have to get the weight off and keep it off. Cheer me on folks!
So today is Friday and I wrote the first part of this on Wed. My weight at the doctor was 163. That is enormous for someone who is only 5 feet tall. My doctor said some of my weight gain is probably do to my birth control and no they do not prescribe it. At all. I am going to start working really hard to get some of the weight off and will try and update every few weeks.
2 comments:
Super Mom said...
I am so sorry if I made you depressed sweetie!!! I didn't mean to! And I'm sorry your doctor was an ass. :(
I was 5'3" and 177 when I started, techinically considered OBESE. That made me cry when the doctor told me that... even now on my perscription they write "For Obesity" on there... /cry...
Stick to your plan and you can do it. And I am planning on meeting up with you guys tomorrow for Needsleepy's birthday and I will bring you some "Yoga Booty Ballet"! Hope that will cheer you up!
Needsleepy said...
I know hun...Supermom is a bitch...sigh. What is she doing losing all that weight without us? Right?! hee hee (Pst...When we go out tomorrow, I am going to give her REAL soda instead of that diet crap!!) That will teach her! Man, I can not wait...Adult Drinks here I come!
| 0.65 | low | 4 | 609 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.45,
"depth": 0.45,
"creativity": 0.35
} |
6f35d1fd-32c6-4632-a6ed-b66b2f3598b3 | Statistical mechanics powerful tool | science | historical_context | Statistical mechanics is a powerful tool for understanding macroscopic thermodynamic properties from microscopic behavior. However, its abstract nature and reliance on probability can lead to common misunderstandings. ### Misconception 1: Statistical mechanics is just about averaging over all possible microstates. * **Why it occurs:** The term "average" is central to statistical mechanics, and learners often associate it with simple arithmetic means without fully appreciating the role of probability distributions. * **Example of error:** Assuming the average energy of a system is simply the sum of all possible energies divided by the number of microstates, ignoring that some microstates are far more probable than others. This leads to incorrect predictions for systems not in thermal equilibrium or when considering specific ensembles. For instance, calculating the average energy of a gas by simply summing all possible kinetic energies and dividing by the total number of particles, rather than weighting each energy by its Boltzmann factor. * **Correct understanding:** Statistical mechanics calculates *ensemble averages*, which are weighted averages where each microstate's contribution is proportional to its probability (e.g., given by the Boltzmann factor $e^{-\beta E_i}$). The probability distribution is crucial. * **How to remember:** Think of it as a "weighted average" or "probability-weighted average," not just a simple average. ### Misconception 2: The microcanonical ensemble (fixed N, V, E) is the only fundamental ensemble. * **Why it occurs:** The microcanonical ensemble is often introduced first as it directly represents an isolated system with fixed energy, which aligns with a naive view of thermodynamics. * **Example of error:** Trying to derive all thermodynamic relations directly from the microcanonical ensemble, even when dealing with systems in contact with a heat bath (canonical ensemble) or a particle reservoir (grand canonical ensemble). For instance, attempting to calculate the heat capacity of a system in contact with a heat bath using microcanonical formulas, which would inherently fail to account for energy exchange. * **Correct understanding:** All ensembles (microcanonical, canonical, grand canonical) are equally fundamental for statistical mechanics. The choice of ensemble depends on the physical constraints of the system being modeled. The canonical ensemble is often the most convenient for systems in thermal contact with a heat bath, as its partition function directly yields thermodynamic potentials like free energy. * **Key distinction:** The microcanonical ensemble describes a *single isolated system*, while the canonical and grand canonical ensembles describe systems in contact with larger reservoirs, allowing for energy and particle exchange, respectively. ### Misconception 3: Statistical mechanics is only applicable to systems with a very large number of particles. * **Why it occurs:** The "statistical" nature implies large numbers, and many introductory examples involve gases or solids with Avogadro's number of particles. * **Example of error:** Dismissing statistical mechanics as irrelevant for small systems like quantum dots, single molecules, or mesoscopic devices. Applying macroscopic thermodynamic concepts derived from large-N statistics to these systems without modification. For example, assuming a sharp phase transition can occur in a system of only a few hundred particles, which is not the case due to finite-size effects. * **Correct understanding:** Statistical mechanics provides the framework for understanding *any* system where microscopic randomness is relevant. While the *sharpness* of thermodynamic limits (like phase transitions) is a feature of infinite systems, the underlying principles of probability and ensemble averaging apply to systems of any size. Finite-size scaling theory specifically addresses how properties of small systems deviate from their bulk, infinite-system counterparts. * **When it applies/doesn't:** The *formalism* of statistical mechanics applies to all systems. However, certain *phenomena* like sharp phase transitions are emergent properties of systems with a very large number of degrees of freedom (approaching the thermodynamic limit). **Red Flags**: * Using "average" without specifying "ensemble average" or "probability-weighted average." * Assuming a system's properties are solely determined by its energy, ignoring entropy or temperature. * Confusing the properties of an isolated system with those of a system in contact with a heat bath. **Self-Check Questions**: * If a system can be in two states with energies $E_1$ and $E_2$, how would you calculate the average energy? What information is missing if you only know $E_1$ and $E_2$? * When studying a solid crystal in a lab, which ensemble is most appropriate and why? * Can statistical mechanics be used to describe the behavior of a single atom in a trap? If so, how might its behavior differ from an atom in a large crystal? **Prevention Strategies**: * Always be explicit about the ensemble being used and its physical justification. * Focus on the probability distribution of microstates, not just the set of possible states. * Understand that thermodynamic quantities are often derived from partition functions, which encapsulate all relevant probability information. * Be mindful of the thermodynamic limit and finite-size effects when applying concepts to small systems. | 0.65 | medium | 6 | 1,035 | [
"intermediate science",
"statistics"
] | [
"specialized research"
] | [
"mathematics",
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.45,
"creativity": 0.35
} |
17e5535f-a2a8-4969-b3cf-dbde551b38b2 | Okay, let's construct debugging | technology | problem_set | Okay, let's construct a debugging exercise focused on algebraic K-theory in R, targeting a complexity level of 10/10 with a focus on arithmetic. ## Problem Description The `algebraic_K_theory` package in R is intended to compute the K-theory groups of a ring. Specifically, this implementation aims to calculate the K-theory of polynomial rings over a field. The function `compute_K_polynomial_ring` should take a field `F` (represented by its characteristic and a list of its basis elements) and a list of variables `vars` as input. It should then compute the first K-theory group, K_1, of the polynomial ring F[vars]. **Expected Behavior:** For a field `F` with characteristic `p` and basis `basis_F`, and a list of variables `vars`, the function should return a representation of the K_1 group of the polynomial ring F[vars]. For simple cases, such as F = Q (rationals, characteristic 0) and vars = "x", the K_1 group of Q[x] is expected to be isomorphic to the multiplicative group of non-zero rational numbers, Q*. **Actual Behavior:** The provided implementation fails to compute the K-1 group correctly. It produces incorrect results, including non-sensical outputs for simple inputs, and sometimes crashes with unexpected errors. ## Buggy Implementation ```R # algebraic_K_theory: Buggy Version # This code attempts to compute K_1 of a polynomial ring over a field. # It contains several arithmetic and logical errors. #' Compute K_1 of a polynomial ring F[vars] #' #' @param F A list representing the field. #' F$char: The characteristic of the field (e.g., 0 for Q, a prime p for F_p). #' F$basis: A list of basis elements of the field as strings. #' @param vars A character vector of variable names (e.g., c("x", "y")). #' @return A representation of the K_1 group. #' @examples #' # Example for Q[x] #' Q <- list(char = 0, basis = list("1")) #' compute_K_polynomial_ring(Q, c("x")) #' #' # Example for F_2[x] #' F2 <- list(char = 2, basis = list("0", "1")) #' compute_K_polynomial_ring(F2, c("x")) compute_K_polynomial_ring <- function(F, vars) { # Step 1: Represent the field F. # For simplicity, we'll work with Q as a base case for characteristic 0. # For prime characteristics, a more complex representation is needed. if (F$char == 0) { # Assume F is Q, the field of rational numbers. # Basis for Q is just "1". if (!identical(F$basis, list("1"))) { stop("For characteristic 0, basis must be list('1') representing Q.") } field_elements <- function(n) { # Generate n rational numbers. This is a simplification. # A proper implementation would involve fractions. sample(seq(-10, 10, by = 0.5), n, replace = TRUE) } field_operations <- list( add = function(a, b) a + b, mul = function(a, b) a * b, inv = function(a) 1 / a # Potential division by zero ) } else { # For prime characteristic p, F_p. # Basis for F_p is {0, 1, ..., p-1}. if (!all(sapply(F$basis, function(x) grepl("^\\d+$", x)))) { stop("Basis elements for prime characteristic must be integers.") } field_elements <- function(n) { sample(as.numeric(F$basis), n, replace = TRUE) } field_operations <- list( add = function(a, b) (a + b) %% F$char, mul = function(a, b) (a * b) %% F$char, inv = function(a) { if (a == 0) stop("Division by zero in field.") # Modular multiplicative inverse # This is a naive implementation and only works for small primes for (x in 1:(F$char - 1)) { if ((a * x) %% F$char == 1) return(x) } stop("Inverse not found (should not happen for prime field).") } ) } # Step 2: K_1 of a polynomial ring R[x_1, ..., x_n] is isomorphic to K_1(R) x Z^n. # For a field F, K_1(F) is isomorphic to F*. # So, K_1(F[x_1, ..., x_n]) is isomorphic to F* x Z^n. # We will focus on computing F* for simplicity in this exercise. # Generate some elements of F* (non-zero elements of F) num_elements_to_sample <- 5 if (F$char == 0) { # For Q, we sample non-zero rationals. sampled_elements <- field_elements(num_elements_to_sample) # Ensure no zeros are sampled if field_elements generates them. sampled_elements <- sampled_elements[sampled_elements != 0] if (length(sampled_elements) == 0) { sampled_elements <- c(1, -1, 2, 0.5, -2) # Fallback if sampling fails } } else { # For F_p, sample non-zero elements. sampled_elements <- field_elements(num_elements_to_sample) sampled_elements <- sampled_elements[sampled_elements != 0] if (length(sampled_elements) == 0) { sampled_elements <- sample(1:(F$char - 1), num_elements_to_sample, replace = TRUE) } } # The K_1 group should be represented by its generators or a set of elements. # For F*, we can think of it as the multiplicative group of the field. # We'll return a list of sampled elements from F*. # The K_1 of F[vars] is K_1(F) x Z^n. # K_1(F) is F*. # Z^n represents the effect of the variables. # For this simplified exercise, we return elements from F*. # The Z^n part is implicitly handled by the structure of the problem, # but we are not explicitly representing it here. # Return sampled elements from F* return(list(K1_elements = sampled_elements, field_char = F$char)) } ``` ## Test Cases Revealing Bugs ```R # Test 1: K_1 of Q[x] Q <- list(char = 0, basis = list("1")) # Expected: A representation of Q* (non-zero rationals). # For example, a set of sampled non-zero rationals. # The actual output might be different due to the bug. print("--- Test 1: Q[x] ---") result1 <- tryCatch(compute_K_polynomial_ring(Q, c("x")), error = function(e) e) print(result1) # Expected output structure might be a list with K1_elements. # Actual output might be an error or unexpected values. # Test 2: K_1 of F_2[x] F2 <- list(char = 2, basis = list("0", "1")) # Expected: A representation of F_2* (which is just {1}). # The actual output might be different. print("--- Test 2: F_2[x] ---") result2 <- tryCatch(compute_K_polynomial_ring(F2, c("x")), error = function(e) e) print(result2) # Expected output for F_2* should be just {1}. # Test 3: K_1 of F_3[x, y] F3 <- list(char = 3, basis = list("0", "1", "2")) # Expected: A representation of F_3* x Z^2. F_3* = {1, 2}. # The actual output might be different. print("--- Test 3: F_3[x, y] ---") result3 <- tryCatch(compute_K_polynomial_ring(F3, c("x", "y")), error = function(e) e) print(result3) # Expected output for F_3* should contain elements from {1, 2}. # Test 4: Edge case - Field basis mismatch for Q Q_bad_basis <- list(char = 0, basis = list("1", "2")) print("--- Test 4: Q basis mismatch ---") result4 <- tryCatch(compute_K_polynomial_ring(Q_bad_basis, c("x")), error = function(e) e) print(result4) # Expected: An error message indicating basis mismatch. # Test 5: Edge case - Non-integer basis for prime characteristic F5_bad_basis <- list(char = 5, basis = list("0", "1", "a")) print("--- Test 5: F_5 non-integer basis ---") result5 <- tryCatch(compute_K_polynomial_ring(F5_bad_basis, c("x")), error = function(e) e) print(result5) # Expected: An error message indicating non-integer basis elements. ``` ## Debugging Process ### Bug 1: Incorrect Field Representation and Operations for Characteristic 0 * **Symptom**: When `F$char` is 0 (intended for Q), the `field_elements` function samples from `seq(-10, 10, by = 0.5)`. This generates floating-point numbers, not rational numbers. The `field_operations` for addition and multiplication are standard R arithmetic, which is correct for real numbers but not for precise rational arithmetic. The `inv` function `1 / a` can lead to division by zero if `a` happens to be 0 (though the sampling attempts to avoid this). More critically, the representation is not of rationals. * **Root Cause**: The code simplifies the representation of rational numbers to standard R numeric types (doubles), which lack the precision and structure for true rational arithmetic. It doesn't use a rational number class or fraction representation. The `field_elements` function is also not robust in ensuring only non-zero elements are returned if it were to sample zeros. * **Debugging Steps**: 1. Run `Test 1: Q[x]`. Observe the output. It might show floating-point numbers. 2. Examine the `compute_K_polynomial_ring` function, specifically the `if (F$char == 0)` block. 3. Notice `field_elements` uses `seq(-10, 10, by = 0.5)`. This generates `c(-10.0, -9.5, ..., 9.5, 10.0)`. These are not rational numbers in the mathematical sense (e.g., 1/3 is not representable exactly). 4. Consider the mathematical definition of K_1(Q[x]). It's isomorphic to Q*, the multiplicative group of non-zero rational numbers. The current implementation does not produce elements from Q*. * **Fix**: A proper implementation would require a rational number package (like `gmp` or a custom fraction class). For this exercise, we'll simulate rational arithmetic using a simplified approach or acknowledge the limitation. A more robust fix would involve using a dedicated rational arithmetic library. For this exercise, we will *assume* the `field_elements` function is meant to generate *representative* non-zero rationals and focus on the arithmetic within the field operations if they were applied. However, the core issue is the *representation*. Since we are asked to *fix* the code and not add external dependencies, we will refine the sampling and acknowledge that true rational arithmetic is complex. The most immediate fix is to ensure the sampling *tries* to get non-zero rationals and to correct the `field_operations` if they were intended to be applied to these representations. Given the constraints of not adding external packages, a pragmatic fix for this exercise is to: 1. Use a more appropriate sampling for rationals, perhaps by generating numerators and denominators. 2. Ensure the `field_operations` are correctly applied to this representation. 3. Acknowledge that perfect rational arithmetic is beyond simple R types. **Revised Approach for Fix:** We will assume the intent was to *represent* elements of Q* and focus on the *structure* and *logic* rather than perfect arithmetic emulation. The `field_elements` for `char=0` should generate fractions. ```R # For characteristic 0 (Q), use a simple fraction representation # This is a highly simplified representation for demonstration. # A real implementation would need a robust rational number library. field_elements_Q <- function(n) { # Generate n random numerators and denominators, ensuring non-zero denominators numerators <- sample(-10:10, n, replace = TRUE) denominators <- sample(1:10, n, replace = TRUE) # Ensure positive denominators # Ensure we don't get 0/x, and if we get x/1, it's just x. # For simplicity, let's just return a few representative rationals. # This is NOT a general solution but for fixing the bug's symptom. # A better approach would be to use a fraction class. # For this exercise, let's just return a hardcoded list of representative rationals. # This highlights the problem but doesn't fully solve rational arithmetic. # The actual bug is that it used doubles and standard arithmetic. # We'll replace it with a placeholder that signifies "rational numbers". # For this exercise, let's stick to the original thought process and fix the *arithmetic* # if we were to use doubles, or better, acknowledge the need for a rational type. # Let's redefine field_elements for Q to produce a list of strings representing fractions. # This is still a simplification but better than doubles. nums <- sample(-5:5, n, replace = TRUE) dens <- sample(1:5, n, replace = TRUE) fracs <- character(n) for(i in 1:n) { if (nums[i] == 0) { fracs[i] <- "0" } else if (dens[i] == 1) { fracs[i] <- as.character(nums[i]) } else { fracs[i] <- paste0(nums[i], "/", dens[i]) } } # Ensure no zeros are included in F* fracs <- fracs[fracs != "0"] if (length(fracs) == 0) { fracs <- c("1", "-1", "2", "1/2", "-2") # Fallback } return(fracs) } # field_operations for Q (using string manipulation for fractions is too complex for this exercise) # The *real* fix is to use a rational number library. # For *this exercise*, we will revert to using `numeric` but acknowledge its limitations # and ensure the sampling and zero-check are better. # The bug is more about the *representation* and *arithmetic*. # Let's fix the sampling for non-zero elements. ``` **Actual Fix for Bug 1**: The primary issue is the representation of rationals. The `field_elements` function for `F$char == 0` needs to generate non-zero rationals. The current sampling can produce zeros. The `field_operations` for rationals are standard arithmetic, but the *type* is wrong. For this exercise, we will focus on fixing the sampling and the explicit zero check. ```R # In compute_K_polynomial_ring, for F$char == 0: # ... field_elements <- function(n) { # Generate n rational numbers. This is a simplification using R's numeric type. # A proper implementation would involve fractions. # Ensure we sample non-zero values. sampled_values <- numeric(0) while(length(sampled_values) < n) { val <- sample(seq(-100, 100, by = 0.1), 1) # Sample more widely if (val != 0) { sampled_values <- c(sampled_values, val) } } return(sampled_values) } # field_operations remain the same for numeric types. # The main fix is the sampling logic for non-zero elements. ``` ### Bug 2: Incorrect Modular Inverse Calculation * **Symptom**: For prime characteristic fields (e.g | 0.65 | medium | 6 | 3,752 | [
"algorithms",
"software design"
] | [
"distributed systems"
] | [
"mathematics",
"science",
"social_studies"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.55,
"creativity": 0.35
} |
646cf805-d4a0-46e5-ad9e-4522743eb595 | Advanced Applications Evidence Analysis | technology | data_analysis | ## Advanced Applications of Evidence Analysis in the Humanities: Beyond Source Evaluation Evidence analysis, rooted in logic, reasoning, and critical thinking, forms the bedrock of source evaluation in the humanities. However, its advanced applications extend far beyond mere appraisal of credibility. By integrating with sophisticated methodologies like the historical method and legal analysis, evidence analysis becomes a powerful tool for reconstructing complex past events, adjudicating competing narratives, and even anticipating future societal trajectories. ### Advanced Application 1: Digital Forensics for Historical Reconstruction **Challenge:** Reconstructing nuanced historical events from fragmented, often biased, digital remnants (e.g., social media archives, leaked documents, digitized personal correspondence). Traditional source evaluation struggles with the sheer volume, ephemerality, and potential for sophisticated manipulation of digital evidence. **Solution Approach:** Applying principles of digital forensics—traditionally used in legal contexts—to historical inquiry. This involves not just verifying the authenticity of digital artifacts but also analyzing metadata, network traffic, and temporal sequencing to establish provenance, detect tampering, and infer authorial intent or action. Techniques like steganography detection, blockchain analysis for immutable records, and network graph analysis for tracing information dissemination are employed. **Key Innovation:** Moving beyond "what is this source?" to "how did this information come to be, and what does its digital fingerprint reveal about its creation and propagation?" This parallels legal digital forensics in its meticulous examination of digital trails but is applied to understanding historical causality and social dynamics. **Impact:** Enables more granular and verifiable historical narratives, particularly for recent history and events where digital communication played a significant role. It can uncover hidden connections and reveal the mechanics of propaganda or dissent in ways previously impossible. ### Advanced Application 2: Comparative Legal-Historical Evidence Analysis in Transitional Justice **Context:** The intersection of history and law, particularly in post-conflict societies or during truth and reconciliation processes. This involves analyzing evidence related to past atrocities to establish accountability, inform reparations, and foster societal healing. **Integration:** This application merges the historical method's focus on context, causality, and narrative construction with legal analysis's emphasis on burden of proof, admissibility of evidence, and establishing guilt or liability. It involves analyzing testimonies, official documents, photographic evidence, and even oral histories through a dual lens. **Emergent Properties:** The creation of "legal histories" that are robust enough to withstand legal scrutiny while remaining sensitive to the complexities and nuances of historical experience. This allows for a more comprehensive understanding of systemic violations and individual culpability, moving beyond simplistic victim/perpetrator binaries. It also highlights the limitations of purely legalistic approaches that may overlook broader societal contributing factors. **Future Potential:** Developing standardized frameworks for analyzing evidence in transitional justice settings, potentially informing international law and human rights advocacy. This could also influence how historical injustices are taught and memorialized, ensuring a more accurate and just representation of the past. ### Edge Cases & Boundaries **Limitation 1:** The "black box" problem in AI-generated content. As AI becomes adept at creating convincing synthetic media (deepfakes, fabricated texts), traditional methods of source authentication become increasingly challenging. The origin and intent behind such content are obscured. **Workaround:** Developing AI-driven provenance tracking and deepfake detection algorithms specifically tailored for historical and humanities research. This involves analyzing subtle artifacts in AI-generated content that differ from human creation, and cross-referencing with known AI models and training data. **Extreme Case:** Analyzing evidence from a hypothetical future scenario where all historical records are deliberately and expertly falsified by an advanced civilization. **Insight:** This extreme scenario reveals that at its core, evidence analysis is not just about verifying authenticity but about inferring the most probable truth given a set of assumptions about human behavior, intentionality, and the nature of reality. It forces a reliance on meta-evidence – evidence about the nature of evidence itself. ### Research Frontiers **Current Investigation:** The application of network analysis and agent-based modeling to reconstruct complex historical social networks and predict the spread of ideas or conflict. This moves beyond linear causality to understand emergent social phenomena. **Open Problem:** Developing robust methodologies for analyzing evidence from periods with extremely sparse or entirely absent documentation, requiring greater reliance on indirect evidence and inferential reasoning. **Theoretical Extension:** Generalizing evidence analysis frameworks to encompass not only textual and material evidence but also sensory data (e.g., soundscapes, olfactory traces) as historical evidence, pushing the boundaries of what constitutes a "source." ### Mastery Indicators **Recognition:** Advanced evidence analysis is required when dealing with contested historical narratives, legal disputes over historical facts, or when attempting to reconstruct events with significant information asymmetry. **Optimization:** Experts don't just evaluate individual pieces of evidence; they analyze the *ecology* of evidence – how different sources interact, corroborate, or contradict each other, and how patterns emerge from their collective weight. **Integration:** Combining digital forensics with traditional archival research, or legal evidentiary standards with qualitative historical interpretation, to create a more comprehensive and defensible understanding of the past. ### Deep Insight The most profound insight is that evidence analysis in the humanities is not merely a passive act of verification but an active process of constructing plausible realities. It is a constant negotiation between what is demonstrably true and what is reasonably inferred, where the very definition of "evidence" is fluid and context-dependent, pushing the boundaries of human understanding of the past and its echoes in the present. | 0.65 | high | 6 | 1,107 | [
"algorithms",
"software design"
] | [
"distributed systems"
] | [
"mathematics",
"science",
"language_arts"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.45,
"creativity": 0.4
} |
7d1e9d58-38fd-4846-b87a-01c15f21153a | A History of Notable Senate Investigations | social_studies | historical_context | A History of Notable Senate Investigations
Chapter 1: Origins
Chapter 2: Process
Chapter 3: Challenges
Chapter 4: Senate Investigations: A Selected List
The authority of Congress to investigate is an implied constitutional power. James Madison anticipated the significance of congressional inquiry in Federalist 51 when he urged: "In framing a government which is to be administered by men over men. . .you must first enable the government to control the governed; and in the next place oblige it to control itself." Congress has exercised its investigative responsibility since the earliest days of the republic. Today congressional oversight enables House and Senate members to serve as the eyes and ears of the American public.
Congressional investigations date back to 1792 when the House passed a resolution to examine the disastrous St. Clair expedition. Since then Congress has conducted hundreds of investigations. Noteworthy inquiries have required a combination of persistence, thoroughness, expert staff, sharp questioning, good publicity, and some luck. Successful investigators diligently conduct background research and have been shrewd in evaluating evidence and in questioning witnesses. The very best have managed to achieve a level of bipartisanship to maintain credibility. Particularly during the second half of the 20th century, senators and their committee staff have honed their public relations skills to attract press coverage and hold public attention. Historically significant Senate investigations have uncovered wrongdoing, have punished transgressors, and have produced legislation aimed at prohibiting similar abuse in the future.
Congressional investigations have not been confined to oversight of the executive or judicial branches though that has often been the focus of past inquiries. Congress may investigate anything related to the development of public policy. Since its earliest investigations, Congress has availed itself of the power of inquiry in order to inform the public and to write good legislation. Over the past two centuries the Senate has probed issues such as interstate commerce, Ku Klux Klan activities, the sinking of the R.M.S. Titanic, Wall Street banking practices, organized crime, antiunion activity, the sale of cotton, and the Vietnam War. Perhaps the Senate’s best-known investigatory committee, the Select Committee on Presidential Campaign Activities (commonly known as the Watergate Committee), investigated alleged malfeasance in the executive branch and was instrumental in bringing about the resignation of President Richard Nixon.
Each house of Congress governs its committee investigations through authorizing or enabling resolutions which define the scope of the inquiry and identify the anticipated result. Many investigations are performed by select or special committees, established to probe a particular issue, report on it, and make policy recommendations based on that report. Committee members may inquire into those issues that are relevant to the subject under investigation. In the case of temporary committees, members generally set their own procedural rules based on the majority vote of committee members.
In 1827, the House empowered the Committee on Manufactures "to send for persons and papers" relating to tariff legislation, and since then both houses have considered it their right to summon anyone, whether inside or outside the government, to testify. In 1857, Congress provided that reluctant witnesses could be held in contempt and tried by federal courts. The Senate passed a resolution to conduct its first legislative inquiry on December 14, 1859, creating the Select Committee to Inquire into the Facts of the Recent Invasion and Seizure of the United States Armory at Harper’s Ferry. Since then, the Senate has increasingly recognized the importance of investigations, and has expanded its powers to conduct inquiries including subpoena power for all standing committees granted by the Legislative Reorganization Act of 1946.
Two processes have threatened Congress’ investigatory power: the executive branch’s refusal to cooperate with inquiries and the perception that committees have overstepped their constitutional authority. In 1881 the Supreme Court decided, in Kilbourn v. Thompson, that a House investigation into the bankruptcy of Jay Cooke and Company had exceeded its authority because no clear legislation could result from the inquiry. Generally, however, the courts have broadly construed congressional powers to conduct investigations. During the Senate investigation of the Teapot Dome scandal in the 1920s the Supreme Court held in McGrain v. Daugherty (1927), that congressional committees could issue subpoenas, could compel witnesses to testify, and could hold them in contempt if they failed to comply. In a second decision, Sinclair v. United States (1929), the Court ruled that a witness who lies before a congressional committee can be convicted of perjury.
Investigations, in the words of Senator Sam Ervin, chairman of the Watergate Committee, "can be the catalyst that spurs Congress and the public to support vital reforms in our nation’s laws." He cautioned, however, that probes may also "afford a platform for demagogues and the rankest partisans." Despite these challenges, investigations remain a critical tool for legislators to formulate laws and inform public opinion.
1859-1860 Select Committee to Inquire into the Facts of the Recent Invasion and Seizure of the United States Armory at Harper's Ferry
(The Harper's Ferry Inquiry)
Resolution passed: December 15, 1859. Report: June 15, 1860.
Chairman: James Murray Mason (D-VA)
Investigation of John Brown's raid on the arsenal at Harper's Ferry, Virginia.
Resolution passed: December 10, 1861. Report: May 22, 1865.
Chairman: Senator Benjamin Wade (R-OH)
Investigation of the executive branch's conduct of the Civil War.
1871-1873 Select Committee to Investigate Alleged Outrages in the Southern States
Resolution passed: January 19, 1871. Terminated: March 12, 1873.
Chairman: John Scott (R-PA)
Investigation of Ku Klux Klan activities in North Carolina.
1885-1886 Select Committee to Investigate Interstate Commerce
Resolution passed: March 17, 1885. Report: January 18, 1886.
Chairman: Shelby Cullom (R-IL)
Investigation of railroad and water interstate transportation regulation; led to 1887 passage of Interstate Commerce Act.
1912 Senate Committee on Commerce, Subcommittee Hearings
(Titanic Disaster Investigation)
Hearings: April 18, 19, 22, 1912. Report: May 28, 1912.
Chairman: William Alden Smith (R-MI)
Investigation of the sinking of the H.M.S. Titanic.
1912 Committee on Privileges and Elections, Subcommittee Hearings
(The Clapp Committee)
Resolution passed: April 27, 1912. Hearings: June, October 1912.
Chairman: Moses E. Clapp (R-MN)
Investigation of campaign contributions during the presidential elections of 1904 and 1908.
1913-1917 Senate Committee on the Judiciary Special Lobby Investigation
Hearings: June to September 1913, January to July 1914. Report July 16. 1917.
Chairman: Charles A. Culberson (D-TX)
Investigation of alleged lobbying activities in Washington, D.C., and elsewhere.
1923-1924 Committee on Public Lands and Surveys
(The Teapot Dome Investigation)
Hearings: October 22, 1923 to May 14, 1924. Report: June 6, 1924.
Chairman: Thomas J. Walsh (D-MT)
Investigation of government oil reserves in Wyoming leased to oilmen and developers.
1932-1934 Committee on Banking and Currency Investigation of Wall Street
(The Pecora Wall Street Expose)
Hearings: April 11, 1932 to May 4, 1934.
Chairman: Peter Norbeck (R-SD), 1932-1933; Duncan U. Fletcher (D-FL), 1933-1936
Investigation of Wall Street banking and stock exchange practices; led to passage of the Securities Act of 1933, the Banking Act of 1933, and the Securities Exchange Act of 1934.
Resolution passed: February 25, 1933. Terminated: June 30, 1936.
Chairman: Hugo Black (D-AL)
Investigation into use of government mail subsidies; led to passage of Air Mail Act of 1933.
1934-1936 Special Committee Investigating the Munitions Industry
(The Nye Munitions Committee)
Hearings: September 1934 to February 1936.
Chairman: Gerald R. Nye (R-ND)
Investigation of the manufacturing and sale of munitions and the economic circumstances of U.S. entry into World War I.
1935-1938 Special Committee to Investigate Lobbying Activities
(Public Utility Companies Investigation)
Resolution passed: July 11, 1935. Terminated: June 16, 1938.
Chairman: Hugo Black (D-AL), 1935-1937; Sherman Minton (D-IN), 1937-1938
Investigation of public utility company lobbyists.
1936-1940 Education and Labor Committee, Subcommittee on Civil Liberties
(Senate Civil Liberties Committee)
Hearings: April 10, 1936 to July 1, 1940.
Chairman: Robert M. La Follette, Jr. (R-WI)
Investigation of antiunion practices.
1941-1948 Special Committee to Investigate the National Defense Program
(The Truman Committee)
Resolution passed: March 1, 1941. Last hearing: November 22, 1948.
Chairman: Harry S. Truman (D-MO), 1941-1945; James M. Mead (D-NY), 1945-1947; Owen Brewster (R-ME), 1947-1948
Investigation of defense contracts.
1945-1946 Joint Committee on the Investigation of the Pearl Harbor Attack (Pearl Harbor Committee)
Hearings: November 1945 to May 1946.
Chairman: Alben Barkley (D-KY)
Investigation of the attack at Pearl Harbor.
1949 Committee on Expenditures in the Executive Departments, Investigations Subcommittee
("Five Percenters" Investigation)
Hearings: August 8 to 26, 1949. Report: January 18, 1950.
Chairman: Clyde R. Hoey (D-NC)
Investigation of influence peddling in defense contracts.
1950 Foreign Relations Committee Subcommittee Investigation of Charges by Senator McCarthy
(The Tydings Committee)
Hearings: March 8 to June 28, 1950. Report: July 20, 1950.
Chairman: Millard E. Tydings (D-MD)
Investigation of alleged disloyalty by State Department employees.
1950-1951 Special Committee to Investigate Organized Crime in Interstate Commerce
(The Kefauver Committee)
Resolution passed: May 3, 1950. Report: August 31, 1951.
Chairman: Estes Kefauver (D-TN), 1950-1951; Herbert R. O'Conor (D-MD), 1951
An investigation of organized crime in America. Many of the hearings were broadcast nationally on television.
1951 Committee on Armed Services and the Committee on Foreign Relations Inquiry into MacArthur Dismissal
(The MacArthur Inquiry)
Hearings: May 3 to June 27, 1951.
Chairman: Richard Russell (D-GA)
Investigation of the dismissal of General of the Army Douglas MacArthur and of U.S. policy in the Far East.
1953-1954 Senate Committee on Government Operations, Permanent Subcommittee on Investigations
(The McCarthy Hearings)
(The Army-McCarthy Hearings)
The investigations by this subcommittee can be divided into two distinct phases. The first consisted of a series of hearings conducted by Joseph McCarthy throughout 1953 regarding alleged Communist influence on the press and on government, including "The Voice of America," the State Department's overseas information centers, and the U.S. Army.
Report: January 25, 1954.
Chairman: Joseph R. McCarthy (R-WI)
The second phase involved the committee's investigation of Senator McCarthy's attacks on the army. These hearings were broadcast on national television.
Hearings: April 22 to June 17, 1954. Report: August 31, 1954.
Acting Chairman: Karl E. Mundt (R-SD)
1957-1960 Select Committee on Improper Activities in Labor-Management Relations
(Labor Racketeering Investigation)
Resolution passed: January 30, 1957. Report: March 31, 1960.
Chairman: John L. McClellan (D-AR)
Investigation into corruption in the labor or management field, including in the Teamsters union. The committee heard from more than 1,500 witnesses over 270 days of hearings.
1964 Rules and Administration Committee
(Bobby Baker Case)
Hearings: October and December 1963; February, October, December, 1964. Report: July 8, 1964.
Chairman: B. Everett Jordan (D-NC)
Investigation of conflicts of interest and financial improprieties engaged in by Baker, who served as secretary to the majority until he resigned on October 7, 1963.
1973-1974 Select Committee on Presidential Campaign Activities
(The Watergate Committee)
Resolution passed: February 7, 1973. Report: June 27, 1974.
Chairman: Samuel Ervin (D-NC)
Investigation of possible corruption in the 1972 presidential election campaign.
Resolution passed: January 27, 1975. Report: April 29, 1976.
Chairman: Frank F. Church (D-ID)
Investigation into abuse of power in intelligence-gathering by CIA and the FBI.
1987-1989 Select Committee on Secret Military Assistance to Iran and the Nicaraguan Opposition
Hearings: May 5 to August 3, 1987. Report: November 17, 1987.
Chairman: Daniel Inouye (D-HI)
Investigation into alleged covert sales of military equipment to Iran and diversion of the proceeds to aid the Nicaraguan Contras. | 0.65 | high | 6 | 3,433 | [
"intermediate understanding"
] | [
"research"
] | [
"technology"
] | {
"clarity": 0.5,
"accuracy": 0.6,
"pedagogy": 0.4,
"engagement": 0.45,
"depth": 0.65,
"creativity": 0.45
} |
e966dacd-e183-44db-b279-49ab34f8bceb | Yuma Area Office | interdisciplinary | practical_application | Yuma Area Office
Yuma Desalting Plant Operations
Before being desalted, the water passes through several pretreatment steps to remove all solids, which would quickly clog the expensive desalting membranes. Pretreating the water extends the life of the membranes to 3 to 5 years. Without pretreatment, membranes would last approximately 1 hour.
Saline drainage water from farmlands east of Yuma flows in a concrete-lined drainage canal to the desalting plant and enters the plant at an intake system where screens remove algae and large debris, such as tree branches, from the water. As the drainage water flows by gravity through underground pipes into the plant, the water is treated with chlorine. This chlorination kills micro-organisms and stops the growth of algae, which would plug or damage the plant's filters and membranes.
Grit sedimentation basin
Once inside the plant, the water goes through grit sedimentation basins, the first pretreatment facility. There the rapidly flowing water slows down and spreads out, allowing gravity to pull the sediment to the bottom. At the bottom of the basins, automated rakes scrape the sediment buildup to the side. From the basins, the sediment is piped to a sludge handling area, where most of the water is removed from the sediment and the sediment is discarded. The partially-cleaned water near the top of the basins flows over the basin walls and into the intake pumping plant, which pumps the water to the next pretreatment process, the solids contact reactors.
Railroad cars and trucks transport most of the chemicals into the plant. Pebble-sized quicklime and ferric sulfate are stored in silos until used. When needed, the quicklime is blown from the bottom of the silos to the square lime slaker building. There, the quicklime is mixed (or slaked) with water to form a lime slurry (water thick with lime, about the consistency of cream). The lime slurry is then pumped from the slaker building to the solids contact reactors and mixed with the water in the reactors. The ferric sulfate is mixed with water and also injected into the solids contact reactors.
Aerial view of three solids contact reactors
The three large solids contact reactors each measure about 56 meters (185 feet) in diameter and about 8 meters (26.2 feet) deep. Each one can hold about 18,000 cubic meters or 18 million liters (4.71 million gallons) of water. Inside these three giant structures, lime and ferric sulfate remove more suspended particles in the water and soften it by taking out most of the calcium. Ferric sulfate helps the lime form sludge and settle the suspended particles to the bottom of the solids contact reactors.
The sludge in the solids contact reactors is scraped to the center and transferred to the sludge thickener, where the sludge can be concentrated further by settling. Pumps then force concentrated sludge through an underground pipeline to a disposal site consisting of evaporation ponds. Each acre-size evaporation pond will be filled with sludge. When the sludge dries, the ponds are covered over with soil to blend into the desert landscape. The buried sludge eventually becomes a limestone deposit. The sludge can also be used in scrubbers on air pollution control systems or can be recycled and used for soil treatment on farmlands.
5. Dual Media Gravity Filters and Sulfuric Acid Process
The water clarified by the solids contact reactors flows through pipes called launders, which are located near the top of the reactors, then flows to the dual media gravity filters. Before the water reaches the dual media gravity filters, sulfuric acid is added to reduce the pH of the water from 10 to 7.5. (pH is an indicator of how acidic or alkaline water is.) Adding sulfuric acid prevents calcium carbonate plating, which would plug and cake the filters. Very tiny suspended solids remaining in the water are removed as the water flows by gravity through the anthracite coal and sand filters. The dual media gravity filters consist of 28 filter cells. Each cell filters approximately 13,500 cubic meters or 13.5 million liters (3.6 million gallons) of water per day. The tiny solids that are filtered out of the water are left behind in the sand and anthracite coal, and these tiny solids are cleaned out periodically by backwashing the filters.
6. Clearwell and SHMP Silos
The filtered water flows from the dual media gravity filters into a large underground storage tank called a clearwell, which can hold about 13,500 cubic meters or 13.5 million liters (3.6 million gallons) of water. Concrete that covers the top of the clearwell keeps dust from blowing into the cleaned water. As the water flows into the clearwell, additional chlorine is added to stop the growth of micro-organisms and algae; SHMP (sodium hexametaphosphate) is added to the water from the SHMP silos to help prevent scale buildup in the reverse osmosis desalting membranes; and again, the pH of the water is lowered to about 5.5 to prevent scaling of the desalting membranes. Scaling would occur if the pH is too high, and other damage would occur if the pH is too low.
Fourteen high-pressure pumps at the clearwell force water from the underground tank into the processing area and into the reverse osmosis membranes. The water enters the membranes at an average pressure of about 2,500 kilopascals (362 pounds per square inch). After going through the desalting process, a stream of pressurized reject water is sent through energy recovery units on three of the high pressure pumps. The stream of fast moving water turns the turbines of these energy recovery units and powers the pumps. This helps reduce overall energy consumption and costs. Ammonia is added into the pump discharge pipe to convert the remaining chlorine to a less aggressive biocide called chloramine, which prevents mold and bacteria from growing in the spiral-wound membranes.
8. Desalting Process Area
Reverse osmosis is the process of separating salt from water through the exertion of pressure on semipermeable membranes. Salty water is forced through cellulose acetate membrane walls which do not allow salt to pass through.
The desalting equipment can produce about 837 gallons of desalted water per second.
For Telecommunications Relay Services (TRS) Dial: 711 | 0.65 | medium | 4 | 1,332 | [
"intermediate knowledge"
] | [
"specialized knowledge"
] | [
"mathematics",
"science",
"technology"
] | {
"clarity": 0.6,
"accuracy": 0.5,
"pedagogy": 0.5,
"engagement": 0.5,
"depth": 0.45,
"creativity": 0.3
} |
050f09c5-3fb7-4d3f-ab70-2f05133789de | grand style World's Columbian | arts_and_creativity | historical_context | In the grand style of the World's Columbian Exposition (1893) and Paris Exposition (1900), the Jamestown Ter-Centennial Exposition commemorated the three hundredth anniversary of Jamestown's establishment by English settlers in 1607. The exposition featured a separate space for African American exhibitions due to segregationist policies of the Jim Crow era. Thomas W. Hunster, Director of Drawing for Washington, DC's African American public schools, was among the leaders who ensured that displays clearly communicated African American achievement while advocating for civil rights. He is acknowledged as a collaborator, along with other notables such as historian Daniel Alexander Payne Murray, in Giles B. Jackson and D. Webster Davis's report on the exposition, The Industrial History of the Negro Race in the United States, published in 1908 and revised in 1911.
Professor Hunster and his students received accolades for their work. In the black-and-white photo above, student-made items included paintings similar to two portraits of parrots in the Museum's collection. The top row contains a painting similar to Parrot (below) by William N. Buckner, Jr., made two years after the Ter-Centennial. Buckner, a student of Professor Hunster's at the renowned M Street School, went on to become an artist and a principal in Washington, DC public schools.
- Resource Type
- Set Name | 0.75 | high | 6 | 293 | [
"intermediate understanding"
] | [
"research"
] | [
"social_studies"
] | {
"clarity": 0.6,
"accuracy": 0.6,
"pedagogy": 0.5,
"engagement": 0.55,
"depth": 0.45,
"creativity": 0.45
} |
8363061c-e40d-4123-b024-726fa2857578 | Microbiological contamination attenuated controlled | science | historical_context | Microbiological contamination can be attenuated and controlled, never eliminated. As demonstrated in several years of ground studies and actual space operations, humid areas and wet systems are the most prone to biocontamination. Space exploration requires the development of more reliable, rapid, significant and safe methods for preventing, monitoring and controlling biocontamination within human confined environments. These methods have to be automated, simple, lightweight and with minimal consumables. Both space and terrestrial monitoring and prevention/mitigation methods are currently working separately, rather than in synergy. The proposed BIOWYSE project foresees development and demonstration of an integrated biocontamination control system for water and humid areas, for space exploration habitat management within infrastructures, experimental payloads, cargo and crew transportation elements, to be demonstrated on the ISS. BIOWYSE stems from the results of actual flight experiments, such as Viable ISS, the biocontamination control requirements of experts working groups, and state of art prevention, monitoring and mitigation technologies. By adopting a clear modular and concurrent approach, the BIOWYSE consortium will design, build and test innovative prevention, monitoring and mitigation modules, which will be then integrated in a compact system. A portable prototype will be tested in laboratory and then deployed to selected locations for field testing, to demonstrate its ability to operate under actual conditions. Modules containing gravity-dependent technologies will be designed and built with the goal of In Orbit Demonstration on the ISS, in the Columbus module. The device has full potential for exploitation within several space programs, and commercial applications in confined habitats, hospitals, greenhouses and water systems. The BIOWYSE project is focusing on water loops and humid areas on board ISS and future human exploration missions. The main goal of the BIOWYSE project is:
Development and demonstration of compact, integrated solution (hardware & software) and operational method for preventing, monitoring and mitigating the microbial contamination risk in water systems and humid surfaces onboard ISS and in future human space exploration missions. | 0.6 | medium | 6 | 404 | [
"intermediate science",
"statistics"
] | [
"specialized research"
] | [
"technology",
"arts_and_creativity",
"life_skills"
] | {
"clarity": 0.5,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
25074193-7fa4-4e2b-9916-38c2636d596a | Soyez forts, les formations | technology | historical_context | Soyez forts, les formations du café des familles Be Strong promeuvent l'implication dirigée par les parents Par la Commission de l'Oklahoma pour les enfants et les jeunes Mercredi, 3 avril 2024 La Commission de l'Oklahoma pour les enfants et les jeunes (OCCY), en partenariat avec Be Strong Families, est ravie d'annoncer des opportunités de formation à venir visant à permettre aux individus et aux organisations du Oklahoma de soutenir et de renforcer les familles par le biais d'initiatives communautaires. La formation du Café des parents est un atelier de deux jours conçu pour fournir aux participants les compétences et les connaissances nécessaires pour produire et organiser des Cafés des parents de Be Strong Families. Grâce à l'apprentissage expérientiel et des activités interactives, les participants exploreront les principes fondamentaux de l'implication dirigée par les parents, favorisant la communauté, la confiance et les facteurs de protection Strengthening Families™. Après la formation du Café des parents, le module complémentaire Café des parents vers Café de vitalité offre une opportunité avancée pour les animateurs certifiés du Café des parents pour améliorer davantage leurs compétences. Les participants exploreront les domaines de vitalité de Be Strong Families, apprenant comment passer de l'animation de Cafés des parents à celle de Cafés de vitalité. Ce module interactif d'une journée vise à permettre aux participants de renforcer et d'encourager les familles à un niveau plus profond. Remarque : La participation et la certification à la formation du Café des parents de Be Strong Families les 24 et 25 avril 2024, ou les 30 et 31 octobre 2023, sont des conditions préalables au module complémentaire Café des parents vers Café de vitalité. En plus de l'expérience transformante décrite par Caitlin Merritt, Shannon Luper, de Girl Scouts Behind Bars et de Girl Scouts of Eastern Oklahoma, souligne l'importance de ces formations de café : « La zone sans jugement des cafés offre un réconfort pour enlever mon chapeau professionnel et mettre mon chapeau de parent pour libérer certaines pressions du parent unique. » La priorité de participation sera donnée aux organisations qui servent la population âgée de 0 à 5 ans. Pour plus d'informations ou pour vous inscrire, veuillez contacter Caitlin Merritt à caitlin.merritt@occy.ok.gov ou appelez le (405) 606-4907. Dans d'autres développements passionnants, le Center for Children and Families, Inc., à Norman, a reçu une subvention de 10 000 dollars de United Way Norman pour mettre en œuvre des Cafés des parents de Be Strong Families après leur participation au groupe d'automne. De plus, Shannon Luper avec Girl Scouts Behind Bars et Girl Scouts of Eastern Oklahoma mettra en œuvre les cafés dans le centre pénitentiaire du nord-est de l'Oklahoma à Vinita, OK, apportant des perspectives et un soutien précieux aux familles au sein du système pénitentiaire. Question : Quel est le prérequis pour participer au module complémentaire Café des parents vers Café de vitalité ? Réponse : La participation et la certification à la formation du Café des parents de Be Strong Families les 24 et 25 avril 2024, ou les 30 et 31 octobre 2023. Question : Quel est l'objectif principal des formations de café de Be Strong Families ? Réponse : L'objectif principal est d'outiller les individus et les organisations pour soutenir et renforcer les familles par le biais d'initiatives communautaires. Question : Quel est le principal objectif de la formation du Café des parents ? Réponse : Le principal objectif est d'équiper les participants des compétences et des connaissances nécessaires pour produire et organiser des Cafés des parents de Be Strong Families, en mettant l'accent sur l'implication dirigée par les parents et les facteurs de protection. Question : Quel est le nom du module complémentaire qui s'appuie sur la formation du Café des parents ? Réponse : Le module complémentaire Café des parents vers Café de vitalité. Question : Quelle organisation collabore avec Be Strong Families pour proposer la formation du Café des parents ? Réponse : La Commission de l'Oklahoma pour les enfants et les jeunes (OCCY) | 0.55 | medium | 5 | 1,189 | [
"data structures",
"algorithms basics"
] | [
"architecture patterns"
] | [
"arts_and_creativity"
] | {
"clarity": 0.4,
"accuracy": 0.5,
"pedagogy": 0.4,
"engagement": 0.4,
"depth": 0.35,
"creativity": 0.3
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.