text
stringlengths
225
532k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
16
1.86k
date
null
file_path
stringclasses
413 values
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
54
138k
score
float64
2.52
5
int_score
int64
3
5
Skip to 0 minutes and 8 secondsHi. My name is Gwynne Richards. I am an associate lecturer here at the University of Warwick and also a supply chain consultant. Logistics is all about the physical movement and storage of goods. So this week, we're going to look at how product is moved, the different modes of transport that we use to transport goods around the world and also, we're going to take a look into some of the warehouses that are used for the storage and dispatch of goods. We're also going to look at the challenges that companies face in terms of their logistics and also look at the innovations that those companies are bringing into logistics in order to overcome those challenges. Skip to 0 minutes and 48 secondsLearners will have a greater appreciation of the role of logistics within the supply chain. They'll see all the different modes of transportation that are used to transfer goods throughout the world, and also, all of the new technology that's being introduced into both warehousing and transportation. We'll also look at how we can overcome some of the challenges that face companies, especially in the area of e-commerce. During this week, we're going to have a look at the definition and the history of logistics. We're going to see who invented the shipping container, which revolutionised the movement of goods globally. Skip to 1 minute and 27 secondsWe're then going to go on and look at transport and warehousing and then discuss the challenges that are facing companies in terms of logistics today. We'll also finally look at the innovations that these companies are introducing to overcome some of those challenges. Finally, we'll have a look at other areas of logistics, such as 3D printing, which could potentially do away with warehouses altogether. There are a number of questions that we pose throughout the week and a number of discussion areas that we'd like learners to take part in. We want the learners to bring in their own experiences and expertise into the discussions and hopefully help others then get a greater appreciation of logistics. Skip to 2 minutes and 18 secondsI hope you enjoy the course and look forward to hearing about your experiences and seeing the discussions. Welcome to Week 5 During this week we are going to discuss logistics and its role within the supply chain. This week your tutor is Gwynne Richards. Gwynne has over thirty years’ experience in warehouse management and logistics, and is an Associate Lecturer at the University of Warwick. He founded his own logistics consultancy and training company in 2003. Gwynne produces and runs Warehouse Management and Transport courses on behalf of the Chartered Institute of Logistics and Transport, Hong Kong Polytechnic University, Singapore Institute of Management, The University of Westminster and The University of Warwick where he is a module tutor for the Masters course in Supply Chain. His book on Warehouse Management was published in 2011 by Kogan Page and has sold over 9,000 copies worldwide. A second book on Logistics and supply chain tools was published in October 2013 and a second edition of Warehouse Management was released in June 2014. How does this week fit into the overall course? Logistics is all about the physical aspects of the supply chain. Where we store the goods and how we transport them from place to place. What will learners be able to do differently at the end this week? Learners will have a greater understanding of the logistics processes and the challenges facing companies today from e-commerce and the pressure to be more environmentally friendly. These can be very conflicting areas. We will also look at how companies try to overcome these challenges. How is the week structured? This week covers an aspect of logistics such as its history, modes of transportation, what warehouses do and how companies are innovating. How would you like learners to engage? Each step has either videos or articles which we suggest the learners read and view. We then ask that they get involved in the discussion topics that we have introduced. They may need to do some additional research to get more information. © University of Warwick
<urn:uuid:ead8eae8-e208-46d1-9be5-ffc7387a9953>
CC-MAIN-2020-16
https://www.futurelearn.com/courses/supply-chains/0/steps/23740
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.974827
822
3.21875
3
Helping lift families out of poverty In 2013, 767 million people – or one in ten people in the world – were estimated to be living below the international poverty line. Dedicated to high-quality poverty research with real societal impact, The University of Manchester is now shaping policy and practice in several countries, helping to alleviate poverty on a massive scale. Global problem: persistent poverty Addressing persistent poverty across the world is an urgent issue, but many proposed solutions attempted in the past have failed. Promising ideas can prove unsuccessful in practice, and progress can often be temporary. Families affected by chronic poverty find it hard to send their children to school and have limited access to markets for goods and services. Manchester solution: direct cash transfers Research beacon breakthroughs Find out how world-class academic research is commercialised by scientists, engineers, medical professionals, business leaders and policymakers at Manchester. Armando Barrientos, Professor of Poverty and Social Justice at our Global Development Institute, led international research into the scope and effectiveness of direct cash transfers as a means to reduce persistent poverty. These are regular sums of money given by government to families living in extreme poverty to use as they see fit. The research by Professor Barrientos and his colleagues in Manchester’s Chronic Poverty Research Centre initially examined the impact of tax-financed pension programmes on poverty among older people, before extending its focus to all forms of direct transfer to poor households. The research demonstrated that direct anti-poverty transfers are a practical, politically sustainable and financially feasible means to address extreme and chronic poverty in low-and middle-income countries. Professor Barrientos says: “The key findings were that properly designed and implemented anti-poverty transfers strengthen the productive capacity of households, address long-term structural and persistent poverty and allow households to allocate their resources." “These breakthrough Manchester findings have shaped development policy, influenced national governments and informed practice in several countries, helping to alleviate poverty across the globe." “Poverty research has a long tradition at Manchester,” he added. “I wanted to conduct my research here because of the critical mass of researchers from a range of disciplines working on poverty and development at an international level.” Direct results of our research proving the long-term positive impacts of direct cash transfers in tackling persistent poverty include: - US$2 per month pledged to all children born in South Sudan after the 2006 Peace Accord; - 40% increase in UK government funding for the Department for International Development’s Chars Livelihood Programme, which aims to improve the livelihoods of more than one million people in chronically poor households in the island Chars of north-western Bangladesh; - implementation of a pilot anti-poverty transfer programme in Uganda; - shaping of development policy at a global level, following Professor Barrientos advising the UN High Level Panel Report for the post-2015 development agenda. Find out more Read the research papers: - 'Design and rural context in antipoverty transfers: Implications for programme outcomes', Global Food Security, Vol 12, 2016 - 'Justice-based social assistance', Global Social Policy, Vol 16, 2, 2016 - 'Antipoverty transfers and labour market outcomes: Regression Discontinuity Design findings', The Journal of Development Studies, Vol 51, issue 9, 2015 - 'Is there a role for social pensions in Asia', Asia & the Pacific Policy Studies, Vol 2, 1, 2015 Meet the researcher: - Professor Armando Barrientos, Professor of Poverty and Social Justice
<urn:uuid:b9d491b7-eb14-42be-9a39-a1e20331cb57>
CC-MAIN-2020-16
https://www.manchester.ac.uk/research/beacons/breakthroughs/direct-cash-transfers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.917089
738
2.515625
3
By Matt Doran My social media posts typically fall well behind the news cycle (if they even make to publication). Rather than retweeting and linking to articles about the issue du jour, I try to use social media platforms in educative ways that promote contemplation and reflection. One question many have recently asked: How is it that seemingly decent people justify and rationalize fundamentally deplorable policies and leaders? The psychological phenomenon of cognitive dissonance helps us understand why individuals will often "explain away" the indefensible. Cognitive dissonance refers the mental discomfort that results from contradictory beliefs, or when our beliefs run contrary to our behaviors (especially in light of new evidence). We seek consistency in our attitudes and perceptions. When what we believe is challenged, something must change in order to reduce the dissonance (lack of agreement). The need for dissonance reduction is especially acute when it involves beliefs about the self. Everyone wants to believe they are fundamentally good people who make good decisions (about health, finances, politics, etc). But sometimes the evidence mounts against us. In government and politics, this happens when parties and leaders engage in actions and policies that violate clear moral and ethical boundaries. To reduce the dissonance, supporters must change a belief--either I'm not so good at making decisions after all, or the actions/policies are justified. Aesop's fable, the Fox and the Grapes, helps illustrate cognitive dissonance. The Fox noticed a beautiful bunch of ripe grapes hanging from a high vine. After multiple attempts to jump for the grapes, the Fox fell short. He finally concludes that the sour grapes are not worth it after all. Clearly, the Fox believed two things: the grapes are desirable and he had the ability to reach them. But when the evidence showed the falsity of his belief about himself, the Fox reduces the dissonance by rationalizing that the grapes really aren't so desirable. Here's a good explanation of cognitive dissonance: https://www.verywellmind.com/what-is-cognitive-dissonance-2795012 From Why Learn History (When It's Already on Your Phone) by Sam Wineburg. "Wedging a media literacy course into an already crammed curriculum is like slapping a new coat of paint on a house that's teetering on its foundation: it lends to better street appeal but it does little to address the underlying problem. Making headway will entail more than a four-week media or news literacy course. It will require a fundamental reorientation to the curriculum. . . . What once fell on the shoulders of editors, publishers, librarians, and subject matter experts now falls on the shoulders of each and every one of us. The big problem with this new reality is that the ill-informed hold just as much power at the polling station as the well-informed. Reliable information is to civic intelligence what clean air and water are to public health. . . . Jefferson's solution is no less apt today than it was in his era. 'If we think [the people] are not enlightened enough to exercise their control with a wholesome discretion, the remedy is not take it from them, but to inform their discretion by education.'" - Sam Wineburg By Matt Doran Especially on patriotic holidays, our propensity is to sanctify the causes of our wars. But clear historical analysis compels a more complex and nuanced narrative. The back cover of Scars of Independence: America's Violent Birth by Holger Hoock gives us pause for reflection and analysis.
<urn:uuid:ceb5a7a5-014e-4bbb-b90d-b20014f82a02>
CC-MAIN-2020-16
https://www.21socialstudies.com/blog/archives/07-2019
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.938914
732
2.59375
3
Pulmonary imaging is important in the diagnosis of the acute lung injury associated with vaping, known as electronic cigarette or vaping product use-associated lung injury (EVALI), according to a special review article published in the journal Radiology. The report outlines what is currently known about this condition and discusses remaining questions. Although e-cigarettes have been often marketed as a safer alternative to traditional cigarettes, EVALI has emerged as a serious and sometimes fatal complication of vaping. Radiologists play a key role in the evaluation of suspected EVALI. Accurate identification of the condition allows for prompt medical treatment, which may decrease the severity of injury in some patients. “Rapid clinical and/or radiologic recognition of EVALI allows clinicians to treat patients expeditiously and provide supportive care,” said Seth Kligerman, M.D., associate professor at UC San Diego School of Medicine and division chief of cardiothoracic radiology at UC San Diego Health in San Diego, California. “Although detailed clinical studies are lacking, some patients with EVALI rapidly improve after the administration of corticosteroids. Additionally, making the correct diagnosis may prevent unnecessary therapies and procedures, which themselves can lead to complications.” Despite ongoing investigations by public health officials, the exact cause of EVALI remains unclear. What is currently known is that most patients are young adult and adolescent men. Over 80% of EVALI patients report vaping tetrahydrocannabinol (THC) or cannabidiol CBD containing compounds. Patients with EVALI typically have a combination of respiratory and gastrointestinal symptoms, as well as general symptoms like fever or fatigue. Chest CT findings in EVALI can be variable but most commonly show a pattern of diffuse lung injury with sparing of the periphery of the lungs. EVALI is a diagnosis of exclusion. The patient must have a history of vaping within 90 days and abnormal findings on chest imaging, but other possible causes for the patient’s symptoms must be eliminated. Dr. Kligerman also notes that some patients may present to the emergency department with relatively mild symptoms or radiologic findings. “If EVALI is not diagnosed in a timely manner, patients may continue vaping after leaving the doctor’s office, clinic or emergency department which could lead to worsening lung injury,” he said. The article cautions that aside from EVALI, vaping may pose long-term health risks. Nicotine and THC addiction, cardiovascular disease and chronic pulmonary injury are all potential consequences of e-cigarette use and are particularly concerning in the predominantly younger population that is associated with vaping. “Right now, we do not know the long-term effects of vaping, as it is still a relatively new method of nicotine and THC delivery, and there are countless variables involved which further confound our understanding of what is happening on a patient-specific level,” Dr. Kligerman said. He added that while recent studies have shown an association between vaping and the development of asthma, chronic bronchitis and chronic obstructive pulmonary disease, these studies have only shown an association and not causation. “Although I am hesitant to speculate on specifics as we just do not have the data, I would not be surprised if vaping is directly linked to many of the chronic pulmonary and cardiovascular diseases commonly associated with traditional cigarette smoking,” Dr. Kligerman said. “The link between vaping and lung cancer is unknown at this point,” he noted. Studies with long-term follow up will be needed to evaluate EVALI patients for these conditions and others, including malignancies, that may require longer term vaping exposure to develop. Reference: “Radiologic, Pathologic, Clinical, and Physiologic Findings of Electronic Cigarette or Vaping Product Use-associated Lung Injury (EVALI): Evolving Knowledge and Remaining Questions” by Seth Kligermanwere, M.D.; Costa Raptis, M.D.; Brandon Larsen, M.D., Ph.D.; Travis S. Henry, M.D.; Alessandra Caporale, Ph.D.; Henry Tazelaar, M.D.; Mark L. Schiebler, M.D.; Felix W. Wehrli, Ph.D.; Jeffrey S. Klein, M.D.; and Jeff Kanne, M.D., 28 January 2020, Radiology.
<urn:uuid:9f7fcd15-6b72-4b27-8e63-b047a195c776>
CC-MAIN-2020-16
https://scitechdaily.com/what-in-known-about-evali-diagnosis-of-the-acute-lung-injury-associated-with-vaping/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.925222
917
2.5625
3
2 The delegates at the constitutional convention decided to divide the national government into three branches: Legislative Branch, Executive Branch, and Judicial Branch. 3 Separation of Power: The Constitution divides government power among the legislative, executive, and judicial branches.The separation of power insures that no one branch of government will have too much power. 12 (a group of advisors to the president) Executive BranchPresidentVice-PresidentCabinet(a group of advisors to the president) 13 Powers of the Executive Branch carry out the laws and make people obey themmanage or run the governmentsuggest new lawsappoint Cabinet membersappoint Supreme Court judgesapprove or reject (veto) laws made by Congress 14 PresidentGeorge W. BushVice-PresidentRichard Cheney 15 The Cabinet Secretary of State Secretary of Treasury Secretary of War Secretary of EducationSecretary of Homeland SecurityAttorney General 20 Supreme Court The Supreme Court is the highest court in nation. There are 9 judges (justices) on the Supreme Court.The Supreme Court Justices are appointed by the President and serve for life.Congress must approve the appointments 21 Powers of the Judicial Branch interprets or reviews laws passed by Congressdecide if a law agrees with the Constitution or disagrees with it (unconstitutional)settle arguments between the statesprotect the rights of the people 25 Checks and BalancesThe three branches of government have roles that check, or limit, the others so that no single branch can have too much authority.It prevents any one branch of government from becoming too powerful.The executive checks the legislative and judicial.The legislative checks the executive and judicial.The judicial checks the executive and legislative. 30 Congress can impeach (bring charges against) and remove a president. Supreme Court can declare laws passed by Congress unconstitutional (against the constitution). 31 President vetoes the bill 1 2 Congress approvesa bill prohibitingflag burningPresident vetoes the bill12Congress overrides thePresident’s vetoCitizen arrested forburning flag and sues34Supreme Courtdeclares lawunconstitutional5
<urn:uuid:a35516fb-3a1c-451a-aa6e-c5a7a5661f2c>
CC-MAIN-2020-16
http://slideplayer.com/slide/728231/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00355.warc.gz
en
0.90772
415
3.625
4
Learn About Georges Braque in Art History, View His Art and Famous Paintings "Purple Plums", Braque Georges Braque,1882-1963, one of France’s famous artists in art history painted >“Musical forms with the Words Fete and Journal”, in 1913; the medium was oil, pencil and charcoal on canvas. He prepared his canvases very carefully as it was the foundation on which the structure of his artwork was built. Parts of his canvases were purposely left unpainted later worked into the composition unchanged as a textural effect adding to the artistic composition as a whole. In 1918 Braque painted another of his famous paintings “Musical Forms”, a collage. In this artwork Braque used real textures in found objects seen in the neck of the stringed instrument formed from corrugated cardboard. He used brown wrapping paper, white ribbed paper, pre-printed paper and other textures tying them together in a harmonious composition. Developing this technique further Braque mixed textures such as sand into his paint. At times he used thick applications of textured paints and in other instances he would scrub the paint to a thin film revealing a texture beneath. Texture became and element in his artwork complement line, form and color. Defining his creative art process and abilities as not having the skill to paint the natural beauty of a woman in the “Architectural Record, May 1910, quoted by Gelett Burgess in the article “The Wild Men of Paris”, Georges Braque said “I must therefore create a new sort of beauty, the beauty that appears to me in terms of volume of line, of mass of weight, and through that beauty interpret my subjective impression. Nature is a mere pretext for a decorative composition, plus sentiment. It suggests emotion, and I translate that emotion into art”. Another of Braque’s famous works is “Le Courrier”, 1914, a collage consisting of charcoal, pencil, gouache, paper and cardboard. A synonym for style of artwork is “Synthetic Cubism”, a reconstruction of pre-made forms into an artistic composition. Georges Braque kept a notebook or sketchpad with him constantly. He made notations putting down ideas for a time when he was strongly motivated to paint but didn’t know what to paint at the moment. Other famous painters of this period in art history are Pablo Picasso and Fernand Leger. To view the gallery of Georges Braque, click here. Click on the graphics below to increase graphic sizes. At the same you time can also view an opportunity to purchase a poster or painting reproduction.
<urn:uuid:fdf2767a-fdb1-4388-b3ed-3891476dd108>
CC-MAIN-2020-16
https://www.arthistory-famousartists-paintings.com/GeorgesBraque.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.962644
565
3.140625
3
The number of children in the world that have lost their mother or father, are parentless, or have been abandoned, now exceeds 143 million. In the past hour . . . - 1,625 children were forced to live on the streets by the death or abuse of an adult - 1,667 children under the age of five died from malnutrition and vaccine-preventable diseases - 115 children became prostitutes - 66 children under 15 years of age were infected with HIV - 257 children were orphaned because of HIV / AIDS Most children are under the age of 15 and are . . . - Sleeping on concrete beds and rancid garbage piles every night in streets, sewers and dumps - Scavenging amongst human waste and excreta for rotting morsels and scraps to eat - Huffing glue and other substances in order to numb the cold, hunger, pain and shame - Prostituting themselves for basic food and shelter - Trafficked and sold into sexual bondage, even at 5 years old or younger - Abused and brutalized by sexual predators, local gangs, corrupt police officers, and slum lords - Victimized by HIV / AIDS infected men who believe that sleeping with young virgins can cure the disease - Recruited into lives of thievery, smuggling and drug dealing - Abducted to serve as child soldiers or sex slaves of soldiers - Exploited as child laborers or slaves in sweatshops - Executed by local businessmen and officials who view them as dirty pests interfering with trade and commerce - Sacrificed in occult / witchcraft rituals - Robbed of childhoods, self-esteem and innocence - Robbed of hope Today 45,000 children will become orphans (statistics from www.worldorphans.com) According to UNICEF, children in Uganda who have lost both parents exceeds 2.3 million, of which one million is due to HIV/AIDS (43%). Uganda, with a population of 31 million, has an estimated one million people infected with HIV/AIDS. 51% of Uganda’s population is children under the age of 15 years. Less than 25% of children who complete primary school go on to enroll in secondary school, and there’s a registered 59% record of early marriages in Ugandan rural areas among girls. Malaria still remains the number one killer disease in sub-Saharan Africa and claims 320 people everyday in Uganda alone, especially children. Uganda has been a victim of a 23 year-long civil war in the northern region where a resistance army abducted children as child soldiers. Many children have been displaced and families separated. So many lives were lost resulting in the aftermath of war, poverty, despair, and many orphaned children. The truth from God’s Word “I will not leave you as orphans. I will come to you.” John 14:18 “Whoever receives a child like this in my name, receives me.” Matthew 18:5 “Speak up for those who cannot speak for themselves…defend the rights of the poor and needy.” Proverbs 31:8 “Whatsoever you do unto the least of these my brethren, you do it unto me.” Matthew 25:40 Please join us in our mission to bring hope to these hopeless children!
<urn:uuid:eb8aa31c-7465-4390-a0f7-c88669e13024>
CC-MAIN-2020-16
http://www.myfathershouseintl.org/about/the-cause/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00355.warc.gz
en
0.958706
696
2.71875
3
Share This Post School Bus Safety Safety Starts at the Bus Stop Your child should arrive at the bus stop at least five minutes before the bus is scheduled to arrive. Visit the bus stop and show your child where to wait for the bus: at least three giant steps (six feet) away from the curb. Remind your child that the bus stop is not a place to run or play. Get On and Off Safely When the school bus arrives, your child should wait until the bus comes to a complete stop, the door opens, and the driver says it’s okay before approaching the bus door. Your child should use the handrails to avoid falling. Use Caution Around the Bus Your child should never walk behind a school bus. If your child must cross the street in front of the bus, tell him/her to walk on a sidewalk or along the side of the street to a place at least five giant steps (10 feet) in front of the bus before crossing. Your child should also make eye contact with the bus driver before crossing to make sure the driver can see him/her. If your child drops something near the school bus, like a ball or book, the safest thing is for your child to tell the bus driver right away. Your child should not try to pick up the item, because the driver might not be able to see him/her.
<urn:uuid:8e50dc11-8e18-4e0b-aa73-cb5d552425ff>
CC-MAIN-2020-16
https://www.spencerlawgroup.com/school-bus-safety/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.943399
285
3.421875
3
Imagine an iceberg. The visible part, already humongous, is the web, the “web surface” or “world wide web,” the one you use in particular by going through Google or any other popular search engines. The rest, much more extensive but immersed in darker and darker waters as we sink, is the deep web and the dark web. What is the dark web? Also known as darknet, the dark web is a parallel Internet. Its content is not accessible via conventional search engines such as Google, Bing, DuckDuckGo, etc. The dark web does not work with a central server but thanks to peer-to-peer (P2P) networks with hidden IP addresses, which allow several computers to communicate directly with each other. Networks (Tor, I2P or Freelance) are organized into nodes, successive encrypted layers, like an onion, to make it almost impossible to track Internet users. And communication data flows randomly through these nodes located around the world. Additional tools allow the user’s IP address and geolocation data to be changed regularly, always to preserve the user’s anonymity. Is there a difference between dark web and deep web? Often confused, dark web and deep web do not mean precisely the same thing. The deep web remains a mystery for many, even though it gathers about 95% of the Internet’s content. The deep web includes unindexed content or content that requires a significant number of clicks to access it. These are invisible pages because they are not very interesting and remain very far away in the search results. But it may also be a choice of some content owners not to reference them on search engines. Thus, to access their pages, you must first know the URL and/or access them with a password. Thus, if we can consider that deep web includes darknet, the two terms are not synonymous. How to access the dark web? There is nothing illegal about sailing on the dark waters of the darknet unless you want to buy humans or illegal drugs. Tor allows you to browse the referenced web anonymously, but also to access.onion sites. You will need to use a version of Firefox configured for Tor, Tor Browser or Tails. But it is also possible to access the dark web via I2P (Invisible Internet Project) and Freenet. Once the tools are mastered, all that remains is to access sites visible only on the dark web, and this is probably the most challenging part. Because as mentioned earlier, they are hidden. You must therefore either know the URLs in advance, consult collaborative directories or specific search engines. Dark web users have different profiles. There are those who do not want to make their data accessible to Gafa (Google, Facebook, Twitter, Amazon, …). It is also used professionally by criminals and offenders, political dissidents, whistleblowers (such as Edward Snowden) to communicate with the media, investigative journalists (The New Yorker or The Guardian have created a SecureDrop on Tor to communicate with whistleblowers and receive documents) and investigators, of course.
<urn:uuid:f34773b8-d411-40d8-ab42-e43762306b75>
CC-MAIN-2020-16
http://www.blackindesign.com/dark-web-an-introduction/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.924446
643
3.0625
3
The young bearded vulture which was observed in mid-February in Western Germany (see here) is still in the area. It was now observed near a road close to Hillershausen by Maria Theresia Herbold (see photo). She saw the bearded vulture sitting on a fox carcass and feeding on it. It was harassed by some crows and did not take off when the car stopped. The fox was most likely a roadkill. The young bearded vulture has probably now learnt that there is food close to roads – this can be dangerous as it may get hit by a car when feeding on roadkill - hence please send us any further observations. Following this sighting, some local contacts went back to the fox carcass to check for any feathers left behind by the bearded vulture. Feathers are regularly shed and replaced (all from small down feathers and body feathers to the big flight feathers) and if found can be genetically analyzed. Manfred Hölker found 3 feathers and sent us the pictures for us to check if they are indeed from a bearded vulture. One small down feather might originate from the bearded vulture and will be sent to the lab for analysis. We hope to be able to get a DNA fingerprint which we can then compare with the existing genetic database from the Alps to confirm the origin of the bird. The VCF would like to thank again the local birdwatchers for their great effort to collect the feathers. It is amazing to see how many people are engaging in following the bearded vulture in Germany! It also made it into the local newspaper, see download below (in German).
<urn:uuid:924e0e80-bbd2-490b-a119-fcedaf6efb54>
CC-MAIN-2020-16
https://www.4vultures.org/2017/03/10/young-wandering-bearded-vulture-still-in-germany/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.973255
332
2.734375
3
On August 31st, 1955, the first solar-powered automobile was introduced. William G, Cobb showed the “Sunmobile” at the General Motors Powerama Auto Show in Chicago, Illinois. The “Sunmobile” has 12 cells made of selenium that produce an electric current that turns a tiny motor. 61 years later, mass-productions of solar-powered cars have not been available yet. Like GM, other car corporations are also trying to master the solar-powered automobile. Toyota plans to create a solar car that will use power from cells on the vehicle and also recharge using solar panels on the roof of the owner’s house. August 25th through the 28th consists of the largest Corvette event in the world held at Carlisle. This event will represent all generations of this classic sports car. You’ll be able to participate in autocross, burnouts, and a parade through downtown Carlisle. There will also be a huge swap meet with all types of vendors. With more than 5,000 featured Corvettes, you will not want to miss this event! With the 2016 Olympics underway, most of us had thought that by now there would be self-tying shoes, flying cars, and hover-boards. Well by the 2020 Olympics in Tokyo, that might be possible. Japanese engineers say that their flying cars will be in the air by the 2020 Olympics. A team of Japanese engineers are working to develop the first flying car with the goal of launching it for the Tokyo Olympics. This vehicle, called Skydrive, has three wheels and is equipped with a motor and four rotors. The reason behind this futuristic means of transportation is to provide a new way of transport to avoid the destruction of the Japan’s earthquakes. So far the prototype measures a fifth of the final size and was recently tested hovering almost 10 feet off the ground. The new vehicles of the future could be around before we know it. August 13th through the 14th the New Hope-Solebury Community Association will host the New Hope Automobile Show. Taking place at New Hope-Solebury High School, this show will feature foreign and domestic cars, classics and antiques, and much more. Since 2016 is the 59th year of the show, the celebration will present a 1965 Ford GT40. Proceeds will fund scholarships to the high school seniors. Don’t miss out on this exciting event. Today, August 6th, in Philadelphia Team Penske will be celebrating their 50th anniversary. Taking place at The Simeone Museum, Karl Kainhofer will make a special appearance along with Gordon Kirby to honor Roger Penske. Penske was awarded Sports Car Club of America Driver of the Year in 1960, the most number of Indianapolis wins for a racing team, and much more. After Kainhofer and Kirby discus Penske’s achievements, there will be a book signing. This exciting event will be one you do not want to miss! August 14th from 5am to 2pm George Cross & Sons presents the West Coast’s largest Swap Meet. At the Fairplex, you’ll see over 2,400 vendor spaces filled with rare car accessories at low prices. Also thousands of original and restored cars will make an appearance including Corvettes, Porsches, and Volkswagens. Don’t miss out on this fun event.
<urn:uuid:74e39dfb-8c27-4dc7-8416-99e24dfc3119>
CC-MAIN-2020-16
https://eimports.wordpress.com/2016/08/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.952621
702
2.5625
3
Atheneum Books for Young Readers From the author of Soldier Boys and Search and Destroy comes a thought-provoking, action-packed story based on the little-known history of the Japanese Americans who fought with the 442nd Regimental Combat Team during World War II. Yuki Nakahara is an American. But it's the start of World War II, and America doesn't see it that way. Like many other Japanese Americans, Yuki and his family have been forced into an internment camp in the Utah desert. But Yuki isn't willing to sit back and accept this injustice-it's his country too, and he's going to prove it by enlisting in the army to fight for the Allies. When Yuki and his friend Shig ship out, they aren't prepared for the experiences they'll encounter as members of the "Four-Four-Two," a segregated regiment made up entirely of Japanese-American soldiers. Before Yuki returns home-if he returns home-he'll come face to face with persistent prejudices, grueling combat he never imagined, and friendships deeper than he knew possible. Family Relationships; Racial Diversity; Military families; Incarceration; Race discrimination; son in military; father in prison; racism; racial prejudice mother and father Cybils Awards, 2017, Nominee, Middle Grade Fiction World War II; soldiers; internment camps; combat; war; army; friendship Hughes, Dean, "Four-Four-Two" (2017). Diverse Families. 1166.
<urn:uuid:1188ff8c-5960-4e5a-88d0-c3360fcc3d70>
CC-MAIN-2020-16
https://stars.library.ucf.edu/diversefamilies/1166/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.918405
317
2.90625
3
Is It Poisonous? Foods to Avoid Giving to Your Pets Giving your furry friends some table scraps may seem like a good idea but be careful what you give them! Some foods can be quite toxic to dogs and cats. Let’s go over what foods you should keep to yourself, as well as which foods aren’t as toxic as some people think they are. This is not a complete list so regardless, you should do your research before giving your pets something new off of your own plate. First, let’s talk about xylitol. Xylitol is an artificial sweetener that you will find an innumerable of human foods items. From baked goods to gum, to candy, etc. The big one that people should be aware of that is often given to pets is peanut butter. Not all peanut butters contain xylitol, so just make sure to read the label to ensure it does not contain this toxin. In humans, it is much less of a concern and is safe in quantities consumed normally. However, in dogs it can rapidly decrease blood sugar and can lead to liver failure within a few days of consumption. Common signs of xylitol poisoning signs include, vomiting, lethargy, and dizziness. Next up, grapes and raisins! They may be sweet and delicious, but they can be deadly to our pets. The mechanism of why they are poisonous is unknown, but as few as 4-5 grapes can cause vomiting and lethargy very quickly in dogs and cats. If more are consumed, then symptoms can progress to acute kidney failure. Is it theorized that the toxin is located in the skin of the grape but the exact chemical has not yet been isolated. Did you know that Macadamia nuts could be a fatal snack for our fur-babies? Side effects can occur with the consumption of as little as 0.7g/kg. This means as few as 6 of these nuts can cause serious side effects in a medium-sized dog, including vomiting, fever, and muscle tremors. It does this due to cyanide-like compounds that attack the nervous system. Let’s tackle chocolate. People seem to think if their dog eats ANY chocolate, then their dog is going to die immediately. However, for any symptoms to occur a 60lbs dog would need to eat at least 100g of dark chocolate (about 3 regular size chocolate bars of pure chocolate). If they ate this much you would see symptoms such as vomiting and diarrhea. If your medium-sized dog happened to eat 200g or more they would have severe symptoms including heart problems, tremors, and seizure. The compound that causes the poisoning is called theobromine, a compound in the methylxanthine family. It stops metabolic processes in dogs and results in the symptoms listed above. If you suspect your pet has eaten chocolate and you are worried then you should get them checked at the vet. It is good to know, though, that unless they eat a lot of chocolate, it is not life threatening. Next I want to mention some foods that are toxic to dogs, but only in very high doses. Avocados contain a compound persin, which can cause vomiting and diarrhea. However, it must be consumed at a very high concentration and is mostly concentrated in the leaves, bark, skin, and pit of the avocado and its tree. Therefore, if your dog eats some of the flesh of the avocado there is not much to worry about. Onions, garlic, leeks, and chives are part of the Allium family of plants that contain the compound allicin. This compound is an organosulfoxide that can cause anemia in pets by destroying red blood cells. However, they would have to consume a very high dose in order to have any negative effects. Foods that are poisonous to people are also poisonous to dogs, so make sure not to feed them items such as apple seeds and peach pits. These contain cyanide and are highly toxic. Alcohol is also a no-no for dogs since the effects it has on dogs is amplified due to their smaller size and can quickly cause liver damage. Marijuana is also a not a good thing to give to your dog. It contains a compound called delta-9-tetrahydrocannabinol, or THC. Dogs have a much more sensitive cannabinoid receptor, which makes THC very toxic to them. It can cause inactivity, incoordination, dilated pupils, increased sensitivity to motion, sound or touch, hypersalivation, urinary incontinence, an abnormally slow heart rate, restlessness, aggression, slow breathing, low blood pressure, rapid, involuntary eye movements, and in rare cases, seizures and coma. If you are using marijuana, do NOT give it to your dog. Like I said before, this is not a complete list, but should give you an idea of what is unsafe for your furry friends. If you are looking to share some food with your pets, meat is always a good option!
<urn:uuid:eac80bba-9686-4195-871d-68abf38e5ce5>
CC-MAIN-2020-16
https://www.earthmd.ca/blogs/health-and-nutrition-in-our-pets/is-it-poisonous-foods-to-avoid-giving-to-your-pets
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.972994
1,029
2.703125
3
- At least a 2:2 honours degree or equivalent in an area related to subject of study. - Grade B/Grade 5 in the GCSE examination in any of the following: English Language, English Literature, Welsh Language (First Language), Welsh Literature. Where an equivalent to a grade B in either English Literature or Welsh Literature is achieved, a minimum of a grade C/grade 4 must be achieved in the corresponding GCSE examination in English or Welsh (First) Language. - Grade B/Grade 5 in the GCSE Examination in Mathematics or Mathematics-Numeracy must also be achieved. - GCSE grade B equivalency tests in English and mathematics are available to applicants for admission to the teacher education courses for the next academic session at Bangor University. Applicants wishing to undertake the equivalency test must already have a grade C at GCSE standard. - A willingness and positive attitude towards seeking to improve personal use of the Welsh Language. Months of entry Associate Teachers (ATs) will explore and analyse the principles of the new science curriculum enabling them to become effective practitioners who have a sound understanding of theory-based pedagogy. They will be given opportunities to critically reflect on the implication of recent reports into standards of science education in Wales and understand the importance of evidence practice within science. ATs will study and critically evaluate a wide range of science pedagogies in Biology, Chemistry and Physics, thus enabling them to provide effective learning experiences in a range of educational contexts. The ATs will be provided with the knowledge and skills to develop learners’ thinking through problem based learning and dialogic teaching and to understand the key issue of assessing learners’ understanding of conceptual models and alternative frameworks in ensuring effective progression in learning. The Secondary PGCE programme is designed to provide you with a deep understanding of how children and adolescents learn, and equip you with the skills and knowledge needed to develop as a creative and innovative teacher. You will learn about adolescent’s development through the Secondary sector and be supported to become an excellent teacher. This PGCE with QTS* is recognised across Wales and England and is often transferable* further afield for entry into the teaching profession. This course is also offered through the medium of Welsh. Committed schools with well-trained mentors will support Associate Teachers’ progress towards Qualified Teacher Status in accordance with Professional Standards for Teaching and Leadership in Wales. Experienced tutors and researchers in university and school based staff will provide excellent support and stimulating sessions, and the qualification gained will equip students to teach within and beyond Wales. Students on this English medium course will be placed in English Medium Schools only and you do not need to speak Welsh, or live in Wales, to apply for the course. However as part of our commitment to bilingualism we will support you in your understanding of Welsh culture and your Welsh language learning, whether you are a complete beginner or a fluent user of the language. *Those seeking to teach outside Wales and England should check recognition and transferability of Qualified Teacher Status with the respective country’s Teachers’ Professional Body. Qualification, course duration and attendance options - full time12 months - Campus-based learningis available for this qualification Course contact details
<urn:uuid:b17056b6-37e3-44c6-83b5-3b665da98cfd>
CC-MAIN-2020-16
https://www.prospects.ac.uk/universities/bangor-university-3633/school-of-education-and-human-development-8114/courses/pgce-secondary-chemistry-125879
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.919815
665
3.015625
3
Over-stayed his welcome Death of Captain Cook By James Burney James Burney, first lieutenant of Cook’s Discovery gives this account of the great navigator’s last days. Saturday, February 6, 1779. At 4 in the afternoon a fresh breeze suddenly sprang up from the NW. The canoes all left us, making towards the land, which was about ten miles distant. In less than an hour the wind increased to a gale and we lost sight of the Resolution to the northward of us. At midnight were within three leagues of the south side of Mowwlie. Stood backwards and forwards till morning. Sunday, 7th. At daylight, not seeing the Resolution and the gale continuing, stood back to the SE to get under the lee of Owhyhe. At 1 in the afternoon saw the Resolution. Towards evening the weather moderated. All night standing off and on near NW part of Owhyhe. Monday, 8th. In the morning, being to windward of the Resolution, took all the sails in and set our rigging up afresh. Afternoon, running to the southward along the west side of Owhyhe, found a current against us. In the night the Resolution hailed us that they had sprung their foremast. Tuesday, 9th. The Resolution’s boat came on board and informed us the head of their foremast was so badly sprung as to make it necessary to get the mast out, and that their old leak had broken out afresh, on which accounts Captain Cook was bound back to Karacacooa Bay again, there being no certainty of finding a harbor at Mowwhe, and the road at Atoui too exposed a place for getting a mast out…. Wednesday, 10th. At 2 in the morning, the Resolution having made too free with the shore found themselves very near breakers and made signal of danger. Both ships hauled off till near daylight and then ran along shore again. In the forenoon, being moderate weather and in sight of Karacacooa Bay, many canoes came off to us with provisions. The Indians told us that eight men in a double canoe were lost in the bad weather. Thursday, 11th. At 6 in the morning the Resolution anchored in Karacacooa Bay, as did we two hours after, nearly in our old berth, and moored the ship. The natives flocked about us with hogs, vegetables, curiosities, etc. as formerly. Friday, 12th. The astronomers’ tents were erected at the same place as before. A great many canoes arrived in the bay from the northward, Kerrioboo with his followers amongst the rest. He was very inquisitive, as were several of the Owhyhe chiefs, to know the reason of our return, and appeared much dissatisfied with it. Saturday, 18th. The Resolution’s foremast was taken out and hauled up on the beach between the tents and the watering place. All the carpenters of both ships were set to work to repair it. This morning, an Indian snatched away a pair of tongs from the armorer’s forge, with which he jumped overboard and put them into a canoe. Our boat was so quick after him that he had not time to get in himself but was seized and brought on board, though the canoe escaped. He was severely flogged and kept in irons till the tongs were sent from the shore to procure his release. Our launch watering on shore this forenoon was much disturbed by the Indians, who threw stones and played other mischievous tricks, which made it necessary to have a guard when she was next sent. In the afternoon the same unlucky tongs were again stolen and in the same manner by an Indian who jumped overboard and got into a canoe with them. They were fired at with muskets from the ship but without execution, whilst Mr. Edgar, our master, in the small cutter pursued them to the shore near the south point of the bay. Parrear, the Indian chief before mentioned, was in Captain Clerke’s cabin when the theft was committed, and immediately left the ship promising to get the tongs restored. At the same time the Resolution’s pinnace, which was at the tent, seeing the bustle, rowed alongshore and joined in the chase. The thief got first on shore and immediately put the tongs with a chisel and the lid of a harness cask, that had been stolen but not missed, into another canoe, which came out and delivered them to the small cutter. Mr. Edgar then thought of returning to the ship, satisfied with what he had got, but seeing the Resolution’s pinnace at hand and Captain Cook walking that way from the tents, he thought he might safely venture to seize the canoe in which the thief had landed. For this purpose he got on shore and was pushing her off, when Parrear, to whom it seems the canoe belonged and who probably was the contriver of the theft, laid hold to prevent him, which was resented by one of the pinnace’s men, striking Parrear with an oar. A crowd of Indians, who had been by the waterside all the time, and till then quiet, immediately began to throw stones. There being no arms in either boat, the pinnace men were so roughly handled that to avoid the stones they all jumped into the water and swam to some rocks at a little distance. Mr. Edgar and one of our midshipmen, Mr. Vancouver, who were on shore, fared very little better, till Parrear ordered the Indians to desist, and told our people to go on board with the boats. This they would gladly have done but all the pinnace’s oars had been taken away. Parrear said he would fetch them, but he was no sooner out of sight than the mob began to throw stones again. Mr. Edgar, on this, attempted to walk towards the tents, expecting to meet Captain Cook, but was prevented by some Indians who said they would lead him to Parrear. He followed these people and soon met Parrear and another man with an oar and a broken one. He was conducted back to the boats and put off, rowing towards the tents. In their way thither, Parrear overtook them in a canoe and brought Mr. Vancouver’s cap, which had been lost in the fray. He then asked if he might come on board the next morning and whether we should hurt him for what had happened. Being promised he should suffer no harm if he came, he went away paddling towards the town of Kavarooa where Kerrioboo lived. Captain Cook, who at the beginning of the disturbance was at the astronomers’ tents, ran around alongshore towards the boats with Lieutenant King and two of the marines, but was misled by some of the Indian chiefs, and did not know anything of the ill usage of the boats till he returned to the tents, by which time it was dark and too late to take any notice of it. Sunday, 14th. At daylight our great cutter, which had been moored to the buoy of the small bower anchor, was missing and on examining, the rope which fastened her was found to have been cut. This theft was the more easily committed as the boat was left full of water to preserve her from the sun, making the upper part of her gunwale even with the water’s edge. Captain Clerke having informed Captain Cook of this, orders were given for our launch and small cutter to go armed to the south point of the bay and prevent any of the sailing canoes going out, but not to molest the small ones. The Resolution’s great cutter was sent in chase of a large sailing canoe that was making off; their small cutter was dispatched to guard the west point, whilst Captain Cook himself prepared to go with his pinnace and launch to the town of Kavarooa with an intention to bring Kerrioboo on board. The canoe chased by the Resolution’s great cutter was not overtaken, but her retreat was cut off in such a manner that she was forced to the nearest shore within the south point of the harbor, where the Indians hauled her up, the cutter not being able to follow for the rocks. Captain Cook, who was then leaving the ship, seeing the canoe ashore, said he was sure she could not escape; and being asked how the cutter was to get her if the natives made resistance, he answered there could be no great difficulty, for he was very positive the Indians would not stand the fire of a single musket. Indeed, so many instances have occurred which have all helped to confirm this opinion that it is not to be wondered at if everybody thought the same. A little before 8, Captain Cook landed at the town of Kavarooa with Lieutenant Phillips of the Marines, a sergeant, corporal, and seven privates; in all, reckoning himself, eleven. The Indians made a lane for him to march along, having always showed great respect to both captains, however insolent they may have been at times to others. Captain Cook had scarcely got on shore when the boats near the south point of the harbor fired several muskets at some large canoes that were trying to get out, by which an Indian chief named Nooekemar was killed. The first notice we had of this was from two Indians that came off to the ships in a small canoe to complain of it, but finding they were not attended to, they inquired for Captain Cook. Being told he was at the town of Kavarooa, they went thither. About half an hour after this, we heard the firing of muskets on shore, which was followed by the Resolution’s pinnace and launch firing. With glasses we could see Captain Cook receive a blow from a club and fall off a rock into the water. The ships then fired, but at too great a distance to make certain of any particular mark. The boats soon after came off with an account that Captain Cook and four of the marines were killed and their bodies in possession of the Indians. The particulars of this misfortune, gathered from those who were on the spot, are as follows. When Captain Cook with his party landed, the Indians made a lane and some of them brought hogs which they offered him. He inquired for Kerrioboo and his two sons; the Indians immediately dispatched messengers and the boys came, who conducted them to Kerrioboo’s house. Having waited some time without, Captain Cook doubted his being there. Lieutenant Phillips went in to see and found Kerrioboo just awakened. He came out to Captain Cook, who after some inquiries appeared perfectly satisfied that Kerrioboo was innocent of the cutter’s being stolen, and desired he would go on board with him, to which Kerrioboo readily agreed, and they walked down towards the boats. Kaoowa, the youngest of Kerrioboo’s sons, who was a great favorite of Captain Cook, went before and got into the pinnace. When Kerrioboo came near the waterside, two chiefs and an old woman who was crying, stopped him, and made him sit down. He then seemed irresolute and frightened. At this tune our people began to suspect mischief. The marines were stationed on a rock close to the waterside that they might not be surrounded by the natives who were seen to be arming themselves; whilst an old man who seemed to be one of the priesthood was singing to Captain Cook and Kerrioboo, as was thought, to prevent suspicion. Captain Cook then let Kerrioboo go, and said he was not to be forced on board without killing a number of people. The old chief was immediately taken away and no more seen. Captain Cook likewise was about to give orders for embarking, when he was provoked by the insolence of a man armed with a thick mat and a long spike, at whom he fired with small shot, which neither penetrated the mat nor frightened the Indians as was expected. Another man with an iron spike came near Mr. Phillips, who, suspecting his intentions, drove him back with the butt end of his musket. Two or three stones were then thrown and one of the marines knocked down. Captain Cook, who had a double-barreled gun, immediately fired with ball. The sergeant said he had shot the wrong man, on which he told the sergeant to shoot the right. The Indians gave a general volley of stones and began to close on our people; Captain Cook therefore gave orders for the marines to fire, which they did amongst the crowd and were seconded by the boats. The Indians at first gave back, but directly after, before the marines had time to load again, advanced. Captain Cook called out to take to the boats. The pinnace was near the shore, but ten or twelve yards distant from the rock where the marines stood, and this short space was uneven slippery rocks, so that being pressed upon in their retreat, they were obliged to take to the water. Captain Cook in coming down was struck by an Indian behind him with a staff, on which he turned and beat the man back with his musket. He was again followed and received at the same instant a blow on the head and a stab with a spike in the neck, which tumbled him into the water. Being no swimmer and stunned by the blow, he turned towards the shore again, and a number of Indians surrounded and dragged him on the rocks, where they beat and stabbed him in several places, snatching the daggers from each other out of eagerness to have their share in killing him. Four of the marines were killed, one of them on shore (Thomas Fatchet), whom nobody knew what became of; the other three in the water, James Thomas, corporal, and John Allen and Theophilus Hinks, privates. The corporal had loaded again, and received a stab in the belly when up to the in middle in the water. He fired at the Indian who gave it and directly after fell dead. They were all dragged on shore. Of those that escaped, the lieutenant of marines was wounded in the shoulder by a spike, the sergeant received a slight wound, and one of the marines, Jackson, was struck in the face with a stone, by which he is in danger of losing an eye. Being unable to swim he would probably have been drowned or fell into the hands of the Indians, had not Lieutenant Phillips jumped overboard out of the pinnace and assisted him. The people in the boats at first had so little apprehensions of any danger from the Indians that when the firing began on shore, the pinnace put close in to the rocks to let Kaoowa land, as he was much frightened and asked to go. The whole of this affair, from Captain Cook’s leaving the Resolution to the return of the boats, happened in the short space of one hour. Nine stand of arms with iron ramrods, besides Captain Cook’s double-barreled gun and hanger, fell into the hands of the Indians. On notice of our defeat, the boats stationed near the points of the harbor were recalled and a strong reinforcement sent to Lieutenant King at the tents, and soon after orders to strike them and get the Resolution’s foremast off. Many Indians being seen assembling to the right of the tents, we kept firing with our great guns to disperse them; and a large party of our people were posted on the marai, which overlooked that part of the beach where the mast lay, to protect those who were busied in launching it. About everything came off from the shore without any other molestation from the Indians than a few stones, in return for which some of them were shot who ventured nearer than otherwise they would have done, from an idea that their armor (thick mats soaked in water) were musketproof. The Indians were observed to be very careful of conveying away their dead. Proofs of great courage were shown by two men in carrying off a dead body from within reach of our fire. At 4 in the afternoon the boats were sent to the town of Kavarooa to demand the dead bodies. On approaching the shore, stones were thrown which fell short. Lieutenant King went in with our small cutter waving a white flag, whilst the other boats lay on their oars. The Indians left off throwing and waved a white flag in return. They had already made a number of little stone breastworks to screen them from our firearms, and during this conference they several times counted our numbers. In answer to the demand, some chiefs said that tomorrow the bodies should be brought, of which word was sent to Captain Clerke. An old man, named Kooaha, whom we have all along taken to be the chief priest, had the confidence to swim off and get into the boat, where he remained some time. He had an iron dagger in his hand. This is the same man who performed the strange ceremonies when Captain Cook landed at our first coming here. The reason given why the bodies were not delivered tonight was that they were carried some distance up into the country. At another part of the town, however, the Indians made motions which we thought signified they were cut to pieces. And one fellow came to the waterside flourishing Captain Cook’s hanger with many tokens of exultation and defiance. Orders soon after came for the boats to return. After dark, a guard boat was stationed to row round the ship, lest any of the Indians should swim off and attempt to cut the cables. They were very busy on shore all night, making much noise, running about with lights, and howling, as we supposed, over their dead.
<urn:uuid:430d3c29-f3c9-47c0-b67e-6cf223c01fec>
CC-MAIN-2020-16
https://mauiwebdesigns.com/hawaii-history/death-of-captain-cook/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.990715
3,723
3.203125
3
An inspiring workshop for 7-13 years studying the way light is affected by mirrors and lenses. Through a series of guided experiments, students can discover the angle of reflection, split white light using various prisms, construct a periscope as well as a working camera that uses UV sensitive paper to make photographs outdoors. Workshop is 1 hour. An exciting new workshop allowing students to work with an artist to see the way light, mirrors and the science of reflection can be used to make creative images. The workshop allows students to experiment with light and mirror materials to explore their properties and to design their own creative installations. Students take documentary photographs of the construction and final designs. LIGHT LAB EXPLORER An exciting and inspiring workshop for 6-12 years looking at the creative science of light. Learn about the wonderful nature of light and the way the eye sees through a series of guided experiments designed for scientific learning as well as aesthetic exploration. Experiments include splitting white light into rainbows, making white light from red, green and blue torches, drawing with ultra-violet light and bending light using lenses to make an upside down viewer that you put over your head. Workshop is 1 hour. CLOSE-UP LIGHTBOX PHOTOGRAPHY A workshop for all types of groups, taking a fresh look at familiar landscapes through close-up macro photography. We explore a local park or woodland to uncover natural patterns found in the environment using cameras with a variety of add on filters, mirrors and torches. Natural material is gathered and used on lightboxes to study the transmission of light through natural materials. Patterns are made using natural materials on the light boxes and photographed. All workshops have been developed for use in schools and science festivals and are run by an experienced artist and science communicator. Light Lab works annually with Falkirk Science Festival and Aberdeen Techfest as well as running arts and science projects with many Scottish local authorities.
<urn:uuid:cc63ed6b-ac17-449b-b4b2-0464f653ed24>
CC-MAIN-2020-16
https://www.lightlabproject.com/workshops?lightbox=dataItem-jn4muci01
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.930212
392
3.078125
3
Basketball was born in Massachusetts. But it grew up in Indiana. The fit was better here. Dr. James Naismith invented the roundball game in 1891, to give students at the Massachusetts college where he taught an indoor sport to play during the winter, when it was cold and snow was on the ground in that New England state. Its popularity spread rapidly, and by 1893, just two years later, the first Indiana team was organized, at Crawfordsville. Then 18 years after that, Indiana began its state high school basketball tournament, in 1911. When the 1925 Hoosier tourney was held, the celebrity invited to present the awards to the winners, was Dr. Naismith. And 11 years later, when he made a return to the Hoosier state, Naismith was quoted as saying publicly, “Basketball really had its beginning in Indiana, which remains today in the center of the sport.” Wonder why basketball turned into Hoosier Hysteria here in the land of Johnny Appleseed, James Whitcomb Riley, and Cole Porter? As opposed to its maybe becoming identified with Ohio, or Rhode Island, or Utah? Well, for one thing football seems to have gained an earlier and firmer foothold (no pun intended) in other states than it ever did in Indiana. The gridiron sport requires several people to be played, while Indiana farm boys (and girls) could shoot baskets and practice their dribbling in any spare time they had, after doing their chores, going to school, etc., and all by themselves, if necessary. Indiana was more rural than, say, Ohio or Illinois. And the hundreds of small high schools once scattered across Indiana were delighted to embrace the roundball sport, in rural areas where opportunities for recreation and entertainment were scarce. And great basketball rivalries began to develop between those schools, either in the same county, or a particular area of the state. “We won the sectional!” Or, “We won the county tourney!” A win in the regional (the tourney one step up from the sectional, for any non-Hoosiers) was usually not considered much of a chance in the small schools; and anything beyond that, nearly impossible. The “big city schools” always won the semi-state and state, small town and rural Hoosiers were convinced. Except, not always. Thorntown won “the state” in 1915. In the 1910 census, the population of Thorntown was 1,508. In the 2010 census, it was 1,520. In Indiana, some things change very little in a century. And in 1954, many years later, the colossal state finals upset of all time left the Milan Indians as a Hoosier legend. The Indians, from a little school in a little town in Ripley County, southeastern Indiana, defeated the mighty Muncie Central Bearcats, 32-30, on a last-second shot by the Indians’ star shooting guard, Bobby Plump, who was later chosen “Mr. Basketball” in Indiana for that year, and earned other honors in his college career. “Mr. Basketball” in Indiana is the Number One player chosen for the post-season state All-Star Team. For those of you who aren’t from Indiana or never lived here, if you saw the movie “Hoosiers” from 1986, that’s the Milan story, with different names for the town and the characters and some dramatizations added to the plot. The movie’s coach Norman Dale was Milan coach Marvin Wood. Jimmy Chitwood, the troubled star who sank the game-winning shot, was Bobby Plump. And so on. A team that the Indians defeated in the semi-finals — or “semi-state,” as we Hoosiers call it — was the Crispus Attucks Tigers from Indianapolis, an all-black school in the days before many Indiana schools were integrated. A super-talented sophomore on that team was a boy named Oscar Robertson, born in Tennessee but raised in Indiana. He went on to lead his school to two straight state championships, had a terrific career with the University of Cincinnati, and an even better one with the Cincinnati Royals and Milwaukee Bucks. He was the best Indiana basketball player of all time — up to THAT time. More on that a little later. I met Robertson once after his professional career, when he came to Madison to sign some autographs for fans at a Clifty Drive restaurant. I found him to be business-like and not overly friendly. But that’s neither here nor there. My own hometown of Madison, Indiana (southeastern also) had a period of considerable accomplishment in basketball from about 1941 to 1950, then another one in the late ’50s and early ’60s. A new coach hired in 1939 at Madison High School, Ray Eddy, took the Madison Cubs to the final game of the state tournament in 1941, although they — sadly — lost to Washington, 39-33. Then in 1949, the Cubs made it to the final game again — only to be edged by Jasper, 62-61. But Madison had its first “Mr. Basketball” that year, a hot shooter named Dee Monroe who scored 36 points in the championship game, a record for the finale at that time. And the next year — finally — the Madison Cubs became state champions, easily downing the Lafayette Jefferson quintet, 67-44, in the final game. And they did it absent their star center, Spence Schnaitter, for most of the game, as Schnaitter received an injury early on and Eddy had to take him out. Sophomore center Morrie Lorenz came in and subbed for Schnaitter quite capably, and the rest of the starting five took up the slack. To date, Madison hasn’t won another state championship in basketball, but in the years 1959-’62, the Cubs went undefeated during the season, three straight years. Their coach in those years was a guy named Julius “Bud” Ritter, who had played on the Evansville Bosse Bulldogs state champs of 1944 and 1945. The key player in that long series of successes was a tall, awkward-looking All-Star named Harold “Buster” Briley. Briley, an amiable young man, well liked but with a host of funny anecdotes that swirled around him, played forward. And he did things HIS way. Like Frank Sinatra, you might say. Briley was a top scorer, sinking 1,985 points in four seasons in which he started every varsity game. And don’t forget, there was no 3-point shot in those days. He had a wonderful shot from the left side, cattie-cornered from the basket (there’s a Hoosierism for you!) It was a one-hand set, although he did sometimes shoot jumpers –usually at the climax of a fast break. On his set shots, the ball would float up toward the basket, and the fan’s first thought might be, “Oh, Buster, it was too soft! It’s going to fall short!” But if you thought that, you obviously hadn’t seen Buster play before. His soft shots kept going, and going, and finally, SWISH! Two points. And in the era of the late 1950s, when 6-4 forwards didn’t normally dribble the ball very much, Buster often did. And that was something to see. He wasn’t exactly a ballet dancer when it came to grace and agility. I can still see him roaring down the court at full speed, dribbling the ball in his own inimitable way, with his palm instead of his fingers, up high around his waist, glancing from the ball to his path and down to the ball again, constantly. But here’s the thing: You seldom saw anyone steal the ball from Buster Briley. He had it under better control than he appeared to have. All-Star forward Larry Humes played the second leading role in those Cubs successes, and was chosen Mr. Basketball for the state in his senior year of 1962. Humes was a top-notch scorer and rebounder. All of us Madisonians felt that Briley should have gotten the honor, two years earlier; but instead it went to Ron Bonham, of Muncie Central, which had defeated the Cubs in the semi-state. Briley came in second. Both Briley and Humes starred on the court at Evansville College. Indiana state basketball, with one path to the state championship for any team in the state, went on through the 1960s, ’70s, and ’80s. In the late 1990s, it was changed to a multi-class tournament, as it had been in most states for many years. Lots of Hoosiers were unhappy about that, but it did give the smaller schools more of a chance to win a championship of their own. From the late ’60s, up to the start of the 21st Century, a number of other outstanding young Hoosier players went on from high school to college and, in some cases, to the NBA as well. George McGinnis and Reggie Miller, both from Indianapolis; Steve Alford of New Castle, and Damon Bailey of Bedford North Lawrence come to mind. Also the Zeller brothers — Tyler, Cody and Luke — from Washington, Indiana. BUT — and I know that everyone familiar with basketball was waiting for this: The best basketball player ever to come out of Indiana; possibly the best from ANYWHERE — was a working-class Hoosier boy from French Lick. Larry Bird was his name. In a basketball world which was already being dominated by black players when he was in high school, this tall, lanky White kid with a typical Hoosier boy grin went from Springs Valley High School (graduating in 1974), to Indiana University for about five days, then over to Indiana State University at Terre Haute, where he had an unbelievable career. Dead-eye shooter, extremely clever passer, strong rebounder, good ball handler who wasn’t afraid to dribble it up the floor. He was a basketball genius who always seemed to be five to 10 seconds ahead of everyone else on the floor in visualizing mentally what was going to happen next, and how to handle it. Basketball commentators liked to say that he was “not very fast,” and “couldn’t jump very well,” but they say that about every White player. It didn’t seem to hamper him any. If you never saw him play for the Indiana State Sycamores, or the Boston Celtics in the NBA, go on YouTube and google “Larry Bird,” and I think you’ll see what I mean. The Celts won three NBA championships under Bird’s guiding hand. He sometimes seemed to have super-human powers on the court. When warming up for a game in a fieldhouse where he hadn’t played before, he might ask the opposing coach, casually, “What’s the single-game scoring record for this place?” Hearing the answer, he’d say, “Hmm. Think I’ll break it tonight.” And he would! And in the clutch, if the Sycamores, or the Celtics, were behind by a few points and desperately needed a field goal — or two or three — Bird would say, laconically, “Gimme the ball.” He had ice water in his veins. Nine times out of 10, he’d pull the team across the finish line ahead of the opponents. He was “The Hick from French Lick.” “Larry Legend.” Indiana’s “real state Bird.” So, for any of you who aren’t Hoosiers, who never have lived here, that’s a brief rundown on why they call it Hoosier Hysteria. For those of you who ARE from Indiana, hope you’re thinking, “Thanks, Wayne, for the memories!” about now. And here’s a wind-up that’ll probably make you smile. I stay in touch with several of my Army buddies, from 50-odd years ago. One of them, who is from Massachusetts and now lives in Maine, was talking with me on the phone one day. I told him, “You know, Bob, Indiana’s kind of an odd state. South Bend’s in the north; North Vernon is in the south; and French Lick doesn’t mean what you think it does!” He cracked up laughing at that, then said, with surprise, “You mean there’s actually a town in Indiana called FRENCH LICK?!” I answered, “Heck, yeah, man! That’s Larry Bird’s hometown!”
<urn:uuid:cfde5cd9-511d-46e4-bb82-b34f918a3a84>
CC-MAIN-2020-16
https://oldcorporal.com/?p=8051
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.979941
2,774
2.78125
3
The deepest parts of the world’s oceans are named for the god of the underworld, Hades. This hadal zone, below 6,000m, includes some of the least visited parts of the planet: until recently, four times as many people had walked on the surface of the moon as had dived to below 10,000m. In May 2019, that number increased from three to five*. The Five Deeps expedition is a privately funded attempt to dive the deepest parts of five of the world’s oceans: Atlantic; Southern; Indian; Pacific; and Arctic. The number of dives that have so far been undertaken is truly mind-blowing, with an expected total of at least 72,000m vertical depth and over 74,000km of water traversed. American private equity investor and retired naval officer Victor Vescovo is an explorer. As part of the Explorer’s Grand Slam, he’s summited Everest and reached both Poles. In 2016 he approached Triton Submersibles, asking them to build a vessel that could not only reach the hadal zone, but also carry a passenger. The vessel needed to be a fully functioning research vessel, able to dive multiple times (it’s already made ten dives to below 10,000m), and be capable of withstanding 140MPa of pressure, i.e. c20% greater than the deepest point in the ocean. The result is the Triton 36000/2 Full Ocean Depth Hadal Exploration System, available to purchase, should you so wish, for $48.7 million. I must admit, I didn’t even know about Five Deeps until May this year, when Mr Vescovo and Dr. Alan Jamieson of Newcastle University broke the record for deepest manned dive previously held by Jacques Piccard and Don Walsh (in 1960, they reached a maximum depth of 10,911m in the bathyscaphe Trieste**). I noticed that Omega was among the sponsors and set about trying to find out more information about their involvement. Unfortunately, apart from noting Mr Vescovo’s personal watch (see above), no further information was forthcoming. However, it seems that more than one Omega was worn during the dive – while Mr Vescovo was sporting a Planet Ocean chronograph, the DSV Limiting Factor was also “wearing” a watch***. According to attendees who flew in for the Omega event at the British Museum last week, the Seamaster Planet Ocean Ultra Deep Professional (or SPUDProf) was designed and built in around six months. Using the same Grade 5 Titanium from which Limiting Factor’s perfectly spherical pressure hull was forged, Omega created a 55mm wide, 28mm thick watch capable of withstanding not just the c11,000m of the Challenger Deep, but an additional 25%, per the ISO for Dive Watches. The watch is powered by a Master Coaxial movement, the anti-magnetic no-date cal. 8912, and has a 60- hour power reserve (useful, given the unforeseen issues suffered by Lander Skaff (see below)). It also uses Omega’s Liquidmetal (R) technology to bond the massive conical sapphire crystal to the case. As watches go, this is clearly a behemoth. The three prototype watches (FOD-X, for Full Ocean Depth-eXperimental) may lead to something else in the future, perhaps using the same titanium, or case construction, or manta lugs, but who knows. This watch is interesting, being (probably) the deepest tested mechanical watch to date (15,000m), but it’s also a bit of a dead end. Actually, most deep watches are dead ends (see the ill-fated quartz watches of Beuchat, Sinn, St Moritz, Bell & Ross, et al) but I’m still a fan. As a recreational diver and freediver, I know my limits. I also know that wearing a dive watch and a computer is probably a little pretentious (if I really wanted redundancy, I would carry a second computer) but that doesn’t stop me packing a couple each time I go diving. There’s a certain romanticism, perhaps, in wearing a watch underwater, even if it’s not strictly necessary. The Seamaster Planet Ocean Ultra Deep Professional commemorates a rather incredible thing – the successful production of a manned research vessel capable of repeated dives to hadal depths. The scientific information that has already been gathered during the four ocean dives is still being analysed, and a Discovery Channel documentary will air later this year. Distressingly, they appear to have found plastic at the world’s deepest point. The Five Deeps expedition still has a few dives to make – the Arctic Ocean is its final destination, with a visit en route to the wreck of RMS Titanic – although there’s no word from Omega as to whether Limiting Factor will be wearing a watch again. *Remarkably, the number increased further during the Five Deeps expedition, as John Ramsay (the 36000/2’s structural designer), Jonathan Stuwe and Patrick Lahey were added to the list. **James Cameron also reached the bottom of the Mariana Trench in March 2012, in the one-man Deepsea Challenger ***Three of these watches were “worn” on dives, including one by one the remote Lander vehicles, Skaff, which got stuck in the silt at the bottom of the trench and had to be rescued!
<urn:uuid:408ee385-1cbc-45e7-91c4-da9763c8ec46>
CC-MAIN-2020-16
http://www.thewatchnerd.co.uk/diving-the-underworld/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.955641
1,167
2.71875
3
Table of Contents What is Binge-Eating Disorder? Binge-eating disorder (BED) belongs to a family of eating disorders. It generally develops during childhood and varies in severity, risk-level, and outcome. Signs and Symptoms Binge-eating disorder (BED) is characterized by the following signs and symptoms: - Consuming more food than what most people consume, during a specific time period (usually within a 2-hour timeframe), under similar circumstances. - Experiencing a lack of control over how much and when food is consumed, feeling unable to stop eating, and significant distress, during binge-eating episodes. Initially, these “episodes” typically occur, on average, at least once-a-week for at least 3 months, and are not associated with the recurrent use of inappropriate compensatory behaviors like those found with bulimia nervosa. Three or more of the following factors should also be present: - Rapidly consuming more food than normal - Consuming large quantities of food until one becomes uncomfortably full - Communing large amounts of food, when not physically hungry - Eating alone out of embarrassment due to the amount of food being consumed - Feeling disgusted, depressed, or guilty after a binge-eating episode Note: To be diagnosed with BED, the symptoms must occur at minimum twice-a-week for 6-months and at least once-a-week for the preceding 3-months. Those with a binge-eating disorder often feel ashamed of their eating problems, and as a result, try to hide their symptoms. Binge-eating is typically associated with feelings of distress and a loss of control. This condition can be triggered by personal stressors, an negative body image perception, or even boredom. Repeated binge-eating episodes are often preceded by a trauma or a negative experience. And, over time, binge-eating episodes can become chronic. Possible Causes of BED The exact cause of BED varies from person-to-person. Some researchers believe that the cause stems from the neuropeptide Y compound found in the brain – a compound that is partially responsible for regulating weight. According to these researchers, this compound can cause several regions in the brain to malfunction, leading to binge-eating. Other researchers believe that an altered brain circuitry is the cause of BED. According to these researchers, an altered circuitry interferes with one’s internal reward system, leading to a binge-eating disorder. Most researchers, however, believe that increased brain tissue in the region that controls eating urges, can trigger this disorder. Specifically, these researchers believe that an increase in the brain’s gray matter (brain material) can lead to weight gain and an exaggerated response to positive sugar ratings. Moreover, studies suggest that reduced white brain matter is also linked to BED. [thrive_custom_box title=”” style=”dark” type=”color” color=”#faf8d7″ border=”#000000″] BED involves the over-analyzation, overvaluation, and/or intense examination of one’s own body shape and weight. It is important to note, however, that one’s body mass index (BMI) alone is not linked to BED, which implies that being over one’s ideal body weight is not always associated with this condition. On the other hand, body shape and weight does appear to be linked to an altered self-esteem and/or a bias towards one’s body size. Furthermore, negative moods are associated with binge-eating – both before and after it emerges, which trigger a lower self-esteem. BED Risk Factors While the exact cause of BED varies, there are some significant risk factors such as gender (females develop it more frequently than males) and dysfunctional family interactions. [thrive_custom_box title=”” style=”dark” type=”color” color=”#faf8d7″ border=”#000000″] Weight-centered criticism from a parent can place a child at-risk of becoming a binge-eater. This is especially true if that criticism is leveled at the child before he/she turns 10-years-old. It is important to note that children with BED, over the age of 13, may begin to overeat, gain weight, and voice displeasure with his/her body shape and size. Moreover, dysfunctional family interactions, especially during meals, may trigger BED in vulnerable children and adolescents. In fact, a recent study on eye-tracking technology and eating disorders, found that people with eating disorders tend to obsess about the “unattractive areas” (i.e. large buttock, big breasts, wide hips, love-handles, etc.) of their body more often, than those without eating disorders. A preoccupation with “flaws” can lead to distorted thinking and physical distress. Binge-eating is more common in females, who are overweight, who are depressed, and who smoke marijuana and/or frequently engage in illegal drugs (excluding binge-drinking). Studies suggest that the frequency of overeating or binge-eating generally peaks (3.2 %) by age 19, with 2.3% to 3.1% of females and 0.3% to 1% of males reporting binge-eating, between ages 16- and 24-years-old. Asian-Americans are more likely, than Caucasian-Americans to report having a BED, but less likely to seek treatment for it. Also, homosexual, heterosexual, and bisexual males with BED have a higher rate of anxiety and drug abuse than those without an eating disorder. Mood disorders are also more common in lesbian and bisexual females with eating disorders than those without eating disorders. One study found that African-Americans are more dissatisfied with their bodies and more obese, than their white counterparts. However, it important to note that the number of African-Americans study participants was much lower than the number of Caucasian-Americans participants, and thus, should be interpreted with caution. Another study found African-American women with BED did better with self-monitoring technology than their Caucasian-American female counterparts. Lastly, a 2017 study on eating disorders revealed that every socioeconomic class is at-risk for this disorder. According to researchers, the onset of BED occurs at a later age, than the onset of anorexia or bulimia, leading to a more favorable remission rate for BED. However, the severity, duration, and suicide risk appear to be the same for all three eating-disorders. Below are some statistics from the National Institute of Mental Health regarding Bing Eating Disorders: So, What Can You Do? You should consult your child’s pediatrician, if you suspect that he/she is suffering from an eating disorder. Your child’s doctor will evaluate him/her to determine, if he/she has an eating disorder. This medical professional will also rule out any other physical conditions that could be causing or worsening your child’s BED symptoms. In addition, he/she will supervise your child’s medical care. Your child’s doctor may order a thyroid test to check for low thyroid levels and a genetic test to rule out Prader-Willi Syndrome (a defect in chromosome-15). Prader-Willi Syndrome can cause a person to over-eat. It is important to note that a variety of genetically-linked disorders and intellectual disabilities resemble BED symptoms or increase your child’s risk of developing BED. Specialized eating-disorder centers can perform certain procedures such as observing the binge-eater’s eating patterns while with family members. [23,24] Doctors should take every measure to provide appropriate treatment for a binge-eating disorder by determining if treatment should be inpatient or outpatient. It is rare for people with BED to be hospitalized, unless there are other issues, such as substance abuse or suicidal tendencies. In severe cases, however, or in the case of loneliness, inpatient therapy may be considered. Nutritionists, counselors, and cognitive behavioral therapists (CBT) will play a crucial role in the recovery process. In some cases, medications are needed to help control BED symptoms and aid in the recovery process. Fluoxetine (Prozac): Fluoxetine is an FDA-approved selective serotonin reuptake inhibitor (SSRI) for the treatment of conditions like binge-eating disorder (BED), depression, obsessive-compulsive disorder (OCD), bulimia nervosa, and panic disorder. This medication is beneficial for BED because it helps reduce binging episodes. However, it is important to note that a common side-effect of Prozac is weight gain, so other serotonin/norepinephrine reuptake inhibitors (SNRIs) may be used instead. lisdexamfetamine (Vyvanse): Another drug used to control BED symptoms is lisdexamfetamine (Vyvanse). Lisdexamfetamine is an FDA-approved stimulant used to treat ADHD and moderate-to-severe BED.[11,18] Anti-seizure drugs: these may be used to combat eating disorders like BED. Anti-seizure drugs are often used with anti-obesity drugs, phentermine, lorcaserin, and/or orlistat to curb compulsive-eating by regulating the neuropeptide Y compound. Keep in mind, however, these drugs can have a wide-variety of side-effects. Behavior Therapies and Counseling Cognitive Behavior Therapy Cognitive behavior therapy (CBT) is the most effective BED treatment. A randomized study compared CBT with a placebo to Prozac alone and CBT plus Prozac, and found that CBT alone was just as effective in treating BED as any other treatment regimen. If family members are deemed “problematic,” family therapy can help reduce triggers and BED behaviors. Utilizing self-monitoring weight loss strategies, such as keeping a diary of food intake, physical activity, weight-monitoring, and risk-related behaviors like drinking sugar-laden drinks, along with using an electronic tracker or mobile app, can ward-off binging episodes. Dialectical Behavior Therapy Another useful strategy, developed by Dr. Marsha Linehan, is dialectical behavior therapy. This therapy identifies and addresses relationship issues that can trigger unhealthy emotions. It is beneficial for BED because it teaches the binge-eater how to self-soothe, thereby reducing unhealthy eating behaviors. [20,21] Virtual reality therapy uses modern technology to create awareness and memory and to teach patients to accept their body as normal so they can feel normal as a whole person. Meditation & Yoga Mindfulness meditation or insight meditation allows binge-eaters to accurately recognize and acknowledge experiences in a healthy, non-judgmental manner, thus calming fears and impulses. Yoga has also proved useful helping binge-eaters maintain a stable weight and BMI. Binge-eating disorder is often (but not always) associated with obesity and/or an elevated body mass index (BMI). In fact, many obese people simply overeat on a regular basis, rather than in spurts. And, according to current research, certain metabolic, endocrine, neurologic, hormonal, and genetic factors can predispose someone for obesity. In addition, anxiety, depression, and bipolar disorder are linked to BED, which increases the risk of developing other maladaptive behaviors. The good news is that long-term monitoring can ensure the safety of the bing-eater, while improving treatment outcomes. In comparison to other eating disorders, BED is less likely to lead to serious acute complications. It also has a more favorable prognosis, especially if weight and BMI can be normalized or maintained, than other eating disorders. Thus, it is imperative that binge-eaters maintain a healthy diet, reduce their stress, and engage in healthy and reasonable physical activity. - Stunkard, A. J. (1959). Eating patterns and obesity. Psychiatr Q., 33,284-95. - American Psychiatric Association. (2013). Diagnostic and statistical manual of mental disorders, 5th Edition. - Wade, T .D., Treloar, S. A., Heath, A. C., & Martin, N. G. (2009). An examination of the overlap between genetic and environmental risk factors for intentional weight loss and overeating. Int J Eat Disorder, 42(6),492-497. - Ahlskog, J. E., & Hoebel, B. G. (1973). Overeating and obesity from damage to a noradrenergic system in the brain. Science, 182(4108), 166-169. - Flament, M..F., Bissada, H., & Spettigue, W. (2012). Evidence-based pharmacotherapy of eating disorders. Int J Neuropsychopharmacol, 15(2),189-207. - Schäfer, A., Vaitl, D., & Schienle, A. (2010) Regional grey matter volume abnormalities in bulimia nervosa and binge-eating disorder. Neuroimage, 50(2), 639-643. - Pearl, R. L., White, M. A., & Grilo, C. M. (2014). Overvaluation of shape and weight as a mediator between self-esteem and weight bias internalization among patients with binge eating disorder. Eat Behavior, 15(2),259-261. - Smink, F. R., van Hoeken, D., & Hoek, H. W. (2012). Epidemiology of eating disorders: Incidence, prevalence and mortality rates. Curr Psychiatry Rep, 14(4):406-414. - Sonneville, K. R., Horton, N. J., Micali, N., Crosby, R. D., Swanson, S. A., Solmi, F., et al. (2013). Longitudinal associations between binge eating and overeating and adverse outcomes among adolescents and young adults: Does loss of control matter? JAMA Pediatrics, 167(2),149-155. - Treasure, J., Claudino, A. M., & Zucker, N. (2010). Eating disorders. Lancet, 375(9714), 583-593. - Cassels, C. (2015) FDA okays Vyvanse for binge eating disorder. Medscape Medical News. - Lee-Winn, A., Mendelson, T., & Mojtabai, R. (2014) Racial/ethnic disparities in binge eating: Disorder prevalence, symptom presentation, and help-seeking among Asian Americans and non-Latino whites. American Journal of Public Health, 104(7),1263-1265. - Feldman MB, Meyer IH. (2011) Comorbidity and age of onset of eating disorders in gay men, lesbians, and bisexuals. Psychiatry Res, 180(2-3),126-131. - Fernandes, N. H., Crow, S. J., Thuras, P., & Peterson, C. B. (2010). Characteristics of black treatment seekers for eating disorders. Int J Eat Disorder, 43(3),282-285. - Steinberg, D. M., Levine, E. L., Lane, I., Askew, S., Foley, P. B., Puleo, E., et al. (2014). Adherence to self-monitoring via interactive voice response technology in an eHealth intervention targeting weight gain prevention among Black women: Randomized controlled trial. J Med Internet Res, 16(4),114. - Steinhausen, H. C. (2009). Outcome of eating disorders. Child Adolesc Psychiatr Clin N Am, 18(1), 225-242. - Franko, D. L., Keshaviah, A., Eddy, K.T, Krishna, M., Davis, M. C., & Keel, P. K. (2013). A longitudinal investigation of mortality in anorexia nervosa and bulimia nervosa. Am J Psychiatry, 170(8), 917-925. - McElroy, S. L., Hudson, J. I., Mitchell, J. E., Wilfley, D., Ferreira-Cornwell, M. C., Gao, J., et al. (2015). Efficacy and safety of lisdexamfetamine for treatment of adults with moderate to severe binge-eating disorder: An randomized clinical trial. JAMA Psychiatry. - Grilo, C. M., Crosby, R. D., Wilson, G. T., & Masheb, R. M. (2012). A 12-month follow-up of fluoxetine and cognitive behavioral therapy for binge eating disorder. J Consult Clin Psychol,80(6),1108-13. - Klein, A. S., Skinner, J. B., Hawley, K. M. (2013). Targeting binge eating through components of dialectical behavior therapy: preliminary outcomes for individually supported diary card self-monitoring versus group-based DBT. Psychotherapy (Chic), 50(4),543-552. - Fischer, S., & Peterson, C. (2014). Dialectical behavior therapy for adolescent binge eating, purging, suicidal behavior, and non-suicidal self-injury: A pilot study. Psychotherapy (Chic). - Katzman, D. K., Peebles, R., Sawyer, S. M., Lock, J., & Le Grange, D.(2013). The role of the pediatrician in family-based treatment for adolescent eating disorders: opportunities and challenges. J Adolescent Health, 53(4), 433-440. - Wilson, G. T. (2011). Treatment of binge eating disorder. Psychiatric Clin North Am, 34(4), 773-783. - Hay, P. (2012). A systematic review of evidence for psychological treatments in eating disorders: 2005-. Int J Eat Disorder,46(5), 462-469. - Riva, G. (2014). Out of my real body: cognitive neuroscience meets eating disorders. Front Hum Neuroscience,8, 236. - Woolhouse, H., Knowles, A., & Crafti, N. (2012). Adding mindfulness to CBT programs for binge eating: A mixed-methods evaluation. Eating Disorders, 20(4), 321-39. - Carei, T. R., Fyfe-Johnson, A. L., Breuner, C. C., & Brown, M. A. (2010). Randomized controlled clinical trial of yoga in the treatment of eating disorders. Journal Adolescent Health,46(4),346-351. - Bauer, A., Schneider, S., Waldorf, M., Braks, K., Huber, T. J., Adolph, D., et al. (2017). Selective visual attention towards oneself and associated state body satisfaction: An eye-tracking study in adolescents with different types of eating disorders. Journal of Abnormal Child Psychology. - Bulik, C. M., Hebebrand, J., Keski-Rahkonen, A., Klump, K. L., Reichborn-Kjennerud, T., Mazzeo, S. E., et al. (2007). Genetic epidemiology, endophenotypes, and eating disorder classification. Int J Eat Disorder, 40, 52-60. - Mulders-Jones, B., Mitchison, D., Girosi, F., & Hay, P. (2017). Socioeconomic correlates of eating disorder symptoms in an Australian population-based sample. PLoS One, 12(1).
<urn:uuid:4cffaad7-efb3-4d81-90b1-83fdcac01064>
CC-MAIN-2020-16
https://parentingpod.com/binge-eating-disorder/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.892095
4,234
3.71875
4
Kudus are members of the tribe of antelopes known as “Tragelaphini.” Males in this tribe all have spiral horns and white vertical stripes, and are much larger than females. Other spiral-horned antelopes in our Tarangire-Manyara Ecosystem study area include bushbucks (photo below left) and elands (photo below center). While kudus are cryptic and difficult to spot as they hide in the bushes, we usually see one or two lesser kudus (Tragelaphus imberbis) during our surveys for hoofed mammals (see photo above right). We were thrilled this past week to see an antelope we have not yet seen – a greater kudu (Tragelaphus strepsiceros). The stunning male greater kudu has the longest horns of any antelope, and differs from the lesser kudu by having a throat beard (see photos below). We are happy to expand our list of ungulates we are monitoring in our study area to include this magnificent creature. Science News and Updates From the Field from Wild Nature Institute. If You Love Us, Make A Donation! All Photos on This Blog are Available as Frame-worthy Prints to Thank Our Generous Donors. Email Us for Details of this Offer.
<urn:uuid:a62f3485-68b6-4af9-b39a-bf5980a0bc41>
CC-MAIN-2020-16
https://www.wildnatureinstitute.org/blog/new-antelope-the-greater-kudu
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.930726
279
2.84375
3
Elbow arthritis occurs when the cartilage of the elbow joint becomes worn or damaged. This cartilage normally acts as a cushion between the bone and the joint, and when it is worn away, the direct contact and friction between the bones causes pain, swelling, decreased strength and range of motion. Arthritis of the elbow is often caused by previous trauma or injury to the elbow joint, but can also be the result of aging, as the cartilage within the joint wears down over time. Symptoms of Elbow Arthritis The main symptoms of arthritis of the elbow are pain and swelling, which may worsen over time or with movement. Additional symptoms may include: - Limited range of motion - Locking of the joint - Tingling in the elbow As arthritis of the elbow progresses, some individuals may experience a numbness in their ring and pinky fingers. This may be caused by swelling in the elbow that puts pressure on the ulnar nerve, causing a tingling sensation in the elbow and possible numbness in the fingers. Diagnosis of Elbow Arthritis To diagnose arthritis of the elbow, a doctor will review all symptoms and perform a physical examination. X-rays and other imaging tests are often used to assess the amount of damage to the joint. Treatment of Elbow ArthritisArthritis of the elbow is commonly treated with a combination of methods. Avoiding certain physical activities that place stress on the elbow may be helpful. Medication may also be used to treat pain and may include: - Anti-inflammatory drugs - Prescription pain relievers - Corticosteroid injections Physical therapy may be a successful form of treatment for some patients. Severe cases of arthritis of the elbow may require surgery to smooth irregular tissue surfaces, or to reposition or replace the joint through arthroscopy.
<urn:uuid:7ef1afbb-9a01-4de6-a392-e64544549fc0>
CC-MAIN-2020-16
https://www.meddiagnosticrehab.co/elbow-arthritis.php
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.92707
377
3.015625
3
This enriching programme helps kids use their voices and bodies to express themselves through drama, dance and music. In addition to developing artistic talents, kids get to practice language skills and learn to be comfortable in the spotlight in a fun, informal environment. The skills students learn in the Performing Arts programme give them confidence to perform on the Stafe of Life. Through music, dance and drama, students develop self-discipline, memory concentration, co-operation, imagination, and empathy (through role playing). Speech & Drama The Speech & Drama is incorporated into our English lessons for our Primary School. Your child will be taught on body languages, facial expressions, acting, intonation etc to enable him/her to sit for the Trinity College London examinations for Drama.
<urn:uuid:df379d5b-b735-497c-906a-3f6ab540a673>
CC-MAIN-2020-16
https://www.kingsley.edu.my/kis/?page_id=5757
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.909475
157
2.671875
3
“SURVEYS PUBLISHED IN THE GASTROENTEROLOGY LITERATURE HAVE STATED THAT GASTROINTESTINAL PROBLEMS, SUCH AS CHRONIC CONSTIPATION OR DIARRHEA, OCCUR IN 46% TO 85% OF CHILDREN WITH ASDS.” Journal of Pediatrics – Scott M. Myers, MD The digestive tract is the heart of the innate immune system. The innate immune system is a barrier defence against microbes. This barrier system also plays a key role in regulating inflammation. Digestion and inflammation go hand in hand, and both are essential components of successful biomedical treatment. Many parents ask “where do we start”? The answer is almost always with the DIGESTIVE TRACT. Research shows that children with autism have a higher rate of inflammation and immune dysregulation in the digestive tract. These abnormalities cause inflammation. Inflammation plus a genetic predisposition creates a “cloud” in the brain. Clearing that “cloud’ of inflammation creates a tremendous amount of potential for development. Causes and symptoms of digestive dysfunction include: - Food allergies and sensitivities - Enzyme deficiency or dysfunction - Chronic constipation and/or diarrhea - Mucous, blood or undigested food in stool - Pain, cramping or discomfort - Leaky gut - Issues with absorption Addressing digestive issues is the key to successful biomedical treatment WHAT IS HEALTHY DIGESTION? Your child should be having 2-3 bowel movements daily. The bowel movements should be formed, easy to pass and uniform in colour. There should be no undigested food (except corn!), mucous or blood in the stool. Although bowel movements usually have an unpleasant odour, sometimes the odour is unhealthy. The smell of the stool can be very helpful in identifying the root cause of digestive symptoms. Example: yeasty, foul, sweet, like a harbour, and bready smells can all indicate yeast overgrowth HOW ARE DIGESTION, IMMUNE FUNCTION AND INFLAMMATION RELATED TO DEVELOPMENT? Research shows that immune system dysregulation is a common feature in autism. The digestive system regulates immune system and inflammatory response. Healing the digestive tract is the first step in enhancing immune function and lowering inflammation levels that impair development. A study done at Johns Hopkins, by Dr. Pardo and Dr. Vargos, showed neuroinflammation (inflammation in the brain) in individuals with autism spectrum disorder. Other studies have shown levels of inflammation in autism are higher than those of juvenile RA (rheumatoid arthritis), Crohn’s and other extremely inflammatory disorders. These studies on inflammation also identify another critical problem for autistic children: their high inflammation levels are accompanied by impairments in their ability to REMOVE INFLAMMATION. Signs of inflammation outside the digestive tract include: - Inability to focus and/or concentrate - Cognitive and language delay - Cradle cap - Behavioural issues - Chronic illness - Sleep disturbance - Itching or itchy bum WHAT CAUSES DIGESTIVE IMPAIRMENT THAT LEADS TO INFLAMMATION AND IMMUNE PROBLEMS? This is a very exciting area of research because it begins to gather information that will help prevent autism and other developmental disorders. At a staggering rate of 1 in 150 Canadian children, this issue affects everyone. - Food allergies and sensitivities and early introduction of allergens - C-Section and IV antibiotics – don’t allow natural colonization of good bacteria in the intestine - Vaccinations, metals and environmental toxins – have the ability to shut down enzymes that breakdown food (casein, gluten, soy, corn etc) - GMO – Genetically modified foods disrupt innate immune function in the digestive tract by introducing genetic material from other organisms. - Antibiotics – kill good bacteria which protects the body from other microbes, helps to absorb nutrients and regulates inflammation Article source: http://treatautism.ca/ Although there are many different treatments to rectify digestive health and strengthen the immune system, we always focus on the least disruptive and most simple approach. We recommend a healthy diet (trying to eliminate refined carbohydrates from the diet) and introduce supplements like the Manna GUT Support (with important probiotics, essential digestive enzymes, colostrum and L-Arginine) to help restore the balance in the digestive tract. We also recommend the Manna Blood Sugar Support with each meal to help reduce the glycemic index of the meal and therefore normalise blood sugar levels, which can help with craving and appetite control.
<urn:uuid:a9b7ff3c-0623-413f-9a31-a68034ea79ce>
CC-MAIN-2020-16
https://www.mannaplus.co.za/digestion-autism-adhd/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.881926
986
3.46875
3
The Book of the Duchess is the first major work of the English poet Geoffrey Chaucer (l. c. 1343-1400 CE), best known for his masterpiece The Canterbury Tales, composed in the last twelve years of his life and left unfinished at his death. The Canterbury Tales, first published c. 1476 CE by William Caxton, became so popular that Chaucer’s earlier work was overshadowed, only receiving critical attention much later and popular notice as late as the 19th century CE. Among these is The Book of the Duchess, composed c. 1370 CE in honor of Blanche, Duchess of Lancaster (l. 1342-1368 CE), wife of John of Gaunt (l. 1340-1399 CE), Duke of Lancaster and Chaucer’s best friend. Blanche died in 1368 CE, probably from the plague, at the age of 26, and John of Gaunt mourned her for the rest of his life even though he would remarry. The Book of the Duchess is thought to have been composed on the second anniversary of her death. It may have been commissioned by John of Gaunt and was read at Blanche’s memorial service on the two-year anniversary of her death. The poem was clearly appreciated by John of Gaunt as, afterwards, he rewarded Chaucer with a grant of ten pounds a year for life, at that time equal to almost a year’s salary. The poem is written in Middle English and belongs to the literary genre known as the high medieval dream vision in which a narrator opens by relating some problem he is experiencing and then falls asleep, has a dream which suggests or clearly reveals a solution to the problem, and wakes feeling at peace or resigned to his situation. Chaucer’s piece deviates from this form in that the narrator never claims to have resolved his problem through the dream; the poem ends simply with him saying he woke and wrote the dream down. This being so, the entire poem should be understood as having been written after the narrator woke from the dream and so his problem of unrequited love – which he describes as a "sickness" he has suffered from for eight years (lines 36-37) – continues even after the dream. Chaucer would have crafted the piece in this way to highlight the difficulty in moving on from loss. The poem offers no solution to the problem of grief other than a compassionate listener in the form of his narrator. Through a series of questions and by relating stories, the narrator helps the knight relive the joys of his relationship and express his grief over the loss of his wife even though there is nothing he can do to relieve it. The poem opens with the narrator complaining that he cannot sleep and lives in a kind of apathy where he feels neither joy nor sorrow, does not care about anything, and fears he may die because of his lack of sleep (lines 1-29). In lines 30-42 he says how he does not really know why he is experiencing this but can guess and how there is only one physician who can heal him but will not do so. The poem relies on an audience’s acquaintance with the romantic vision of courtly love, a poetic genre of medieval literature developed in Southern France in the 12th century CE which frequently featured a knight hopelessly in love and devoted to a lady. The lady in these poems is often depicted as a physician who can heal the knight either emotionally, spiritually, or physically, and so the 'physician' the narrator refers to in line 39 is a lady he loves who has either left him or will not return his love. Since he cannot sleep, the narrator reads a book (Ovid’s Metamorphosis, though the title is never given) containing the story of the lovers Seys (usually given as Ceyx) and Alcyone. Seys goes on a sea voyage and, when he fails to return on the given day, Alcyone begins to worry. She prays to the goddess Juno for a sign of whether Seys still lives and her prayer is answered in the form of Morpheus, god of sleep, appearing as Seys to tell her he is dead. Alcyone dies of grief three days later (lines 62-214). The narrator then marvels at the story and how Alcyone received an answer to her prayer when he has not and so he prays to Juno, almost instantly falls asleep, and begins to dream (lines 215-291). He finds himself in bed on a May morning with birds singing and quickly gets dressed to join a hunt in progress outside. He is separated from the others in the party and walks alone through the woods until he comes upon a man in black sitting alone (lines 292-445). The man, described as a handsome and noble knight, is writing a poem and completely unaware of the narrator. The poem is a lament for lost love, which the knight recites as he writes, in which he says how the love of his life has died and he will never feel joy again. The narrator is moved by the poem and even more so by the knight’s obvious sorrow and moves to comfort him, but the knight is so deep in despair he does not notice at first (lines 445-514). The narrator apologizes for disturbing the knight, says how he is obviously depressed and asks what he can do to help. The knight answers that there is nothing anyone can do and then relates how miserable his life has become, how he curses fortune which has stripped him of happiness, and how life is meaningless now whereas once it was bright and joyful (lines 515-709). The narrator then tries to console him by reminding him of the wisdom of Socrates in confronting fate, and how famous lovers have suffered throughout history like Medea with Jason, Dido with Aeneas, Samson with Delilah (lines 710-740). The knight tells him he does not know what he is talking about because the knight has lost far more than any of the people cited and tells him to sit down and he will make the problem clearer. The knight then tells the narrator of how he met this beautiful woman, fell in love, and married her (lines 741-1041). The narrator interrupts to say how his wife sounds very nice but she could not have been as perfect as the knight is depicting her. The knight replies how everyone saw her in the same way and there was never anyone as beautiful or kind or gentle as she (lines 1042-1111). The narrator still does not grasp the knight’s problem and asks him to tell of their first words with each other and how she came to know he loved her and then asks plainly what has gone wrong with the relationship (lines 1112-1144). The knight obliges and tells the narrator of the first song he composed for her and then talks about their relationship and how much she meant to him (lines 1145-1297). The narrator asks, "Where is she now?" and the knight replies, "She is dead" at which the narrator exclaims, "Be God, hyt is routhe!" (literally, "it is sorrowful" but better translated as "I am so sorry!") and instantly hears the hunting party returning. He then wakes from the dream to find himself in his bed with the book of Seys and Alcyone in front of him, marvels at the dream he had and says how he knew he had to write it down immediately (lines 1298-1334). The poem ends with the narrator saying how he has done so and now his dream his done. The Book of the Duchess, like all of Chaucer’s works, is written in Middle English, well before spelling was standardized by the poet, writer, and lexicographer Samuel Johnson (1709-1784 CE) wrote the first English dictionary. Words are spelled as they sound and the poem is written to be read aloud. Read silently, the meaning of a word is not always clear but, out loud, and within the context of the sentence, is better understood. The first line, for example, “I have gret wonder, be this lyght” is clearly “I have great wonder, by this light” when spoken out loud. The letter 'Y' stands for 'I' but stresses on syllables follow the rhyme of the poem and so the 'Y' is sometimes sounded as 'ee' and sometimes as 'ee-uh'. The word 'quod' or 'quoth' means 'to speak' and a 'sweven' is a 'dream'. Other words, which may at first seem strange, are intelligible within the sentence’s context where the spelling of a previous word, closer to modern English, will make the meaning clear. The following text comes from the online site Libarius.com (cited in the bibliography below) which provides hyperlinks and glossary to Middle English on its site. This is the standard version as found in The Riverside Chaucer edited by scholar Larry D. Benson, 1987 CE. I have gret wonder, be this lyght, How that I live, for day ne nyght I may nat slepe wel nigh noght, I have so many an ydel thoght Purely for defaute of slepe 5 That, by my trouthe, I take no kepe Of nothing, how hit cometh or gooth, Ne me nis nothing leef nor looth. Al is ylyche good to me -- Joye or sorwe, wherso hyt be -- 10 For I have felyng in nothyng, But, as it were, a mased thyng, Alway in point to falle a-doun; For sorwful imaginacioun Is alway hoolly in my minde. 15 And wel ye woot, agaynes kynde Hit were to liven in this wyse; For nature wolde nat suffyse To noon erthely creature Not longe tyme to endure 20 Withoute slepe, and been in sorwe; And I ne may, ne night ne morwe, Slepe; and thus melancolye And dreed I have for to dye, Defaute of slepe and hevynesse 25 Hath sleyn my spirit of quiknesse, That I have lost al lustihede. Suche fantasies ben in myn hede So I not what is best to do. But men myght axe me, why soo 30 I may not slepe, and what me is? But natheles, who aske this Leseth his asking trewely. Myselven can not telle why The sooth; but trewely, as I gesse, 35 I holde hit be a siknesse That I have suffred this eight yere, And yet my boote is never the nere; For ther is phisicien but oon, That may me hele; but that is doon. 40 Passe we over until eft; That wil not be, moot nede be left; Our first matere is good to kepe. So whan I saw I might not slepe, Til now late, this other night, 45 Upon my bedde I sat upright And bad oon reche me a book, A romaunce, and he hit me took To rede and dryve the night away; For me thoghte it better play 50 Then playen either at ches or tables. And in this boke were writen fables That clerkes hadde, in olde tyme, And other poets, put in ryme To rede, and for to be in minde 55 Whyl men loved the lawe of kinde. This book ne spak but of such thinges, Of quenes lyves, and of kinges, And many othere thinges smale. Amonge al this I fond a tale 60 That me thoughte a wonder thing. This was the tale: There was a king That highte Seys, and hadde a wyf, The beste that mighte bere lyf; And this quene highte Alcyone. 65 So hit befel, therafter sone, This king wolde wenden over see. To tellen shortly, whan that he Was in the see, thus in this wyse, Soche a tempest gan to ryse 70 That brak hir mast, and made it falle, And clefte her ship, and dreynte hem alle, That never was founden, as it telles, Bord ne man, ne nothing elles. Right thus this king Seys loste his lyf. 75 Now for to speken of his wyf: -- This lady, that was left at home, Hath wonder, that the king ne come Hoom, for hit was a longe terme. Anon her herte gan to erme; 80 And for that hir thoughte evermo Hit was not wel he dwelte so, She longed so after the king That certes, hit were a pitous thing To telle hir hertely sorwful lyf 85 That hadde, alas! this noble wyf; For him she loved alderbest. Anon she sente bothe eest and west To seke him, but they founde nought. 'Alas!' quod she, 'that I was wrought! 90 And wher my lord, my love, be deed? Certes, I nil never ete breed, I make a-vowe to my god here, But I mowe of my lord here!' Such sorwe this lady to her took 95 That trewely I, which made this book, Had swich pite and swich routhe To rede hir sorwe, that, by my trouthe, I ferde the worse al the morwe After, to thenken on her sorwe. 100 So whan she koude here no word That no man mighte fynde hir lord, Ful ofte she swouned, and saide 'Alas!' For sorwe ful nigh wood she was, Ne she koude no reed but oon; 105 But doun on knees she sat anoon, And weep, that pite was to here. 'A! mercy! Swete lady dere!' Quod she to Juno, hir goddesse; 'Help me out of this distresse, 110 And yeve me grace my lord to see Sone, or wite wher-so he be, Or how he fareth, or in what wyse, And I shal make you sacrifyse, And hoolly youres become I shal 115 With good wil, body, herte, and al; And but thou wilt this, lady swete, Send me grace to slepe, and mete In my slepe som certeyn sweven, Wher-through that I may knowen even 120 Whether my lord be quik or deed.' With that word she heng doun the heed, And fil a-swown as cold as ston; Hir women caught her up anon, And broghten hir in bed al naked, 125 And she, forweped and forwaked, Was wery, and thus the dede sleep Fil on hir, or she toke keep, Through Juno, that had herd hir bone, That made hir to slepe sone; 130 For as she prayde, so was don, In dede; for Juno, right anon, Called thus her messagere To do her erande, and he com nere. Whan he was come, she bad him thus: 135 'Go bet,' quod Juno, 'to Morpheus, Thou knowest hym wel, the god of sleep; Now understond wel, and tak keep. Sey thus on my halfe, that he Go faste into the grete see, 140 And bid him that, on alle thing, He take up Seys body the king, That lyth ful pale and no-thing rody. Bid him crepe into the body, And do it goon to Alcyone 145 The quene, ther she lyth alone, And shewe hir shortly, hit is no nay, How hit was dreynt this other day; And do the body speke so Right as hit was wont to do, 150 The whyles that hit was on lyve. Go now faste, and hy thee blyve!' This messager took leve and wente Upon his wey, and never ne stente Til he com to the derke valeye 155 That stant bytwene roches tweye, Ther never yet grew corn ne gras, Ne tree, ne nothing that ought was, Beste, ne man, ne nothing elles, Save ther were a fewe welles 160 Came renning fro the cliffes adoun, That made a deedly sleping soun, And ronnen doun right by a cave That was under a rokke y-grave Amid the valey, wonder depe. 165 Ther thise goddes laye and slepe, Morpheus, and Eclympasteyre, That was the god of slepes heyre, That slepe and did non other werk. This cave was also as derk 170 As helle pit over-al aboute; They had good leyser for to route To envye, who might slepe beste; Some henge hir chin upon hir breste And slepe upright, hir heed y-hed, 175 And some laye naked in hir bed, And slepe whyles the dayes laste. This messager come flying faste, And cryed, 'O ho! Awake anon!' Hit was for noght; ther herde him non. 180 'Awak!' quod he, 'who is, lyth there?' And blew his horn right in hir ere, And cryed `awaketh!' wonder hye. This god of slepe, with his oon ye Cast up, axed, 'who clepeth there?' 185 'Hit am I,' quod this messagere; 'Juno bad thou shuldest goon' -- And tolde him what he shulde doon As I have told yow here-tofore; Hit is no need reherse hit more; 190 And wente his wey, whan he had sayd. Anon this god of slepe a-brayd Out of his slepe, and gan to goon, And did as he had bede him doon; Took up the dreynte body sone, 195 And bar hit forth to Alcyone, His wif the quene, ther-as she lay, Right even a quarter before day, And stood right at hir beddes fete, And called hir, right as she het, 200 By name, and sayde, 'My swete wyf, Awak! Let be your sorwful lyf! For in your sorwe there lyth no reed; For certes, swete, I nam but deed; Ye shul me never on lyve y-see. 205 But good swete herte, look that ye Bury my body, at whiche a tyde Ye mowe hit finde the see besyde; And far-wel, swete, my worldes blisse! I praye god your sorwe lisse; 210 To litel whyl our blisse lasteth!' With that hir eyen up she casteth, And saw noght; 'A!' quod she, 'for sorwe!' And deyed within the thridde morwe. But what she sayde more in that swow 215 I may not telle yow as now, Hit were to longe for to dwelle; My first matere I wil yow telle, Wherfor I have told this thing Of Alcione and Seys the king. 220 For thus moche dar I saye wel, I had be dolven everydel, And deed, right through defaute of sleep, If I nad red and taken keep Of this tale next before: 225 And I wol telle yow wherfore: For I ne might, for bote ne bale, Slepe, or I had red this tale Of this dreynte Seys the king, And of the goddes of sleping. 230 Whan I had red this tale wel And over-loked hit everydel, Me thoughte wonder if hit were so; For I had never herd speke, or tho, Of no goddes that coude make 235 Men for to slepe, ne for to wake; For I ne knew never god but oon. And in my game I sayde anoon -- And yet me list right evel to pleye -- 'Rather then that I shulde deye 240 Through defaute of sleping thus, I wolde yive thilke Morpheus, Or his goddesse, dame Juno, Or som wight elles, I ne roghte who -- To make me slepe and have som rest -- 245 I wil yive him the alderbest Yift that ever he abood his lyve, And here on warde, right now, as blyve; If he wol make me slepe a lyte, Of downe of pure dowves whyte 250 I wil yive him a fether-bed, Rayed with golde, and right wel cled In fyn blak satin doutremere, And many a pilow, and every bere Of clothe of Reynes, to slepe softe; 255 Him thar not nede to turnen ofte. And I wol yive him al that falles To a chambre; and al his halles I wol do peynte with pure golde, And tapite hem ful many folde 260 Of oo sute; this shal he have, Yf I wiste wher were his cave, If he can make me slepe sone, As did the goddesse Alcione. And thus this ilke god, Morpheus, 265 May winne of me mo fees thus Than ever he wan; and to Juno, That is his goddesse, I shal so do, I trowe that she shal holde her payd.' I hadde unnethe that word y-sayd 270 Right thus as I have told hit yow, That sodeynly, I niste how, Swich a lust anoon me took To slepe, that right upon my book I fil aslepe, and therwith even 275 Me mette so inly swete a sweven, So wonderful, that never yit I trowe no man hadde the wit To conne wel my sweven rede; No, not Ioseph, withoute drede, 280 Of Egipte, he that redde so The kinges meting Pharao, No more than koude the leste of us; Ne nat scarsly Macrobeus, (He that wroot al th'avisioun 285 That he mette, Kyng Scipioun, The noble man, the Affrican -- Swiche marvayles fortuned than) I trowe, a-rede my dremes even. Lo, thus hit was, this was my sweven. 290 Me thoughte thus: -- that hit was May, And in the dawning ther I lay, Me mette thus, in my bed al naked: -- I loked forth, for I was waked With smale foules a gret hepe, 295 That had affrayed me out of slepe Through noyse and swetnesse of hir song; And, as me mette, they sate among, Upon my chambre-roof withoute, Upon the tyles, al a-boute, 300 And songen, everich in his wise, The moste solempne servyse By note, that ever man, I trowe, Had herd; for som of hem song lowe, Som hye, and al of oon acorde. 305 To telle shortly, at oo worde, Was never y-herd so swete a steven, But hit had be a thing of heven; -- So mery a soun, so swete entunes, That certes, for the toune of Tewnes, 310 I nolde but I had herd hem singe, For al my chambre gan to ringe Through singing of hir armonye. For instrument nor melodye Was nowher herd yet half so swete, 315 Nor of acorde half so mete; For ther was noon of hem that feyned To singe, for ech of hem him peyned To finde out mery crafty notes; They ne spared not hir throtes. 320 And, sooth to seyn, my chambre was Ful wel depeynted, and with glas Were al the windowes wel y-glased, Ful clere, and nat an hole y-crased, That to beholde hit was gret Joye. 325 For hoolly al the storie of Troye Was in the glasing y-wroght thus, Of Ector and of king Priamus, Of Achilles and king Lamedon, Of Medea and of Iason, 330 Of Paris, Eleyne, and Lavyne. And alle the walles with colours fyne Were peynted, bothe text and glose, Of al the Romaunce of the Rose. My windowes weren shet echon, 335 And through the glas the sonne shon Upon my bed with brighte bemes, With many glade gilden stremes; And eek the welken was so fair, Blew, bright, clere was the air, 340 And ful atempre for sothe hit was; For nother cold nor hoot hit nas, Ne in al the welken was a cloude. And as I lay thus, wonder loude Me thoughte I herde an hunte blowe 345 T'assaye his horn, and for to knowe Whether hit were clere or hors of soune. I herde goinge, up and doune, Men, hors, houndes, and other thing; And al men speken of hunting, 350 How they wolde slee the hert with strengthe, And how the hert had, upon lengthe, So moche embosed,I not now what. Anon-right, whan I herde that, How that they wolde on hunting goon, 355 I was right glad, and up anoon; I took my hors, and forth I wente Out of my chambre; I never stente Til I com to the feld withoute. Ther overtook I a gret route 360 Of huntes and eek of foresteres, With many relayes and lymeres, And hyed hem to the forest faste, And I with hem; -- so at the laste I asked oon, ladde a lymere: -- 365 'Say, felow, who shal hunten here' Quod I, and he answerde ageyn, 'Sir, th'emperour Octovien,' Quod he, `and is heer faste by.' 'A goddes halfe, in good tyme,' quod I, 370 'Go we faste!' and gan to ryde. Whan we came to the forest-syde, Every man dide, right anoon, As to hunting fil to doon. The mayster-hunte anoon, fot-hoot, 375 With a gret horne blew three moot At the uncoupling of his houndes. Within a whyl the hert y-founde is, Y-halowed, and rechased faste Longe tyme; and so at the laste, 380 This hert rused and stal away Fro alle the houndes a prevy way. The houndes had overshote hem alle, And were on a defaute y-falle; Therwith the hunte wonder faste 385 Blew a forloyn at the laste. I was go walked fro my tree, And as I wente, ther cam by me A whelp, that fauned me as I stood, That hadde y-folowed, and koude no good. 390 Hit com and creep to me as lowe, Right as hit hadde me y-knowe, Hild doun his heed and joyned his eres, And leyde al smothe doun his heres. I wolde han caught hit, and anoon 395 Hit fledde, and was fro me goon; And I him folwed, and hit forth wente Doun by a floury grene wente Ful thikke of gras, ful softe and swete, With floures fele, faire under fete, 400 And litel used, hit seemed thus; For bothe Flora and Zephirus, They two that make floures growe, Had mad hir dwelling ther, I trowe; For hit was, on to beholde, 405 As thogh the erthe envye wolde To be gayer than the heven, To have mo floures, swiche seven As in the welken sterres be. Hit had forgete the povertee 410 That winter, through his colde morwes, Had mad hit suffren, and his sorwes; Al was forgeten, and that was sene. For al the wode was waxen grene, Swetnesse of dewe had mad it waxe. 415 Hit is no need eek for to axe Wher ther were many grene greves, Or thikke of trees, so ful of leves; And every tree stood by himselve Fro other wel ten foot or twelve. 420 So grete trees, so huge of strengthe, Of fourty or fifty fadme lengthe, Clene withoute bough or stikke, With croppes brode, and eek as thikke -- They were nat an inche asonder -- 425 That hit was shadwe overal under; And many an hert and many an hynde Was both before me and bihinde. Of founes, soures, bukkes, does Was ful the wode, and many roes, 430 And many squirelles that sete Ful hye upon the trees, and ete, And in hir maner made festes. Shortly, hit was so ful of bestes, That thogh Argus, the noble countour, 435 Sete to rekene in his countour, And rekene with his figures ten -- For by tho figures mowe al ken, If they be crafty, rekene and noumbre, And telle of every thing the noumbre -- 440 Yet shulde he fayle to rekene even The wondres, me mette in my sweven. But forth they romed wonder faste Doun the wode; so at the laste I was war of a man in blak, 445 That sat and had yturned his bak To an ook, an huge tree. 'Lord,' thoghte I, 'who may that be? What ayleth him to sitten here?' Anoon-right I wente nere; 450 Than fond I sitte even upright A wonder wel-faringe knight -- By the maner me thoughte so -- Of good mochel, and yong therto, Of the age of four and twenty yeer. 455 Upon his berde but litel heer, And he was clothed al in blakke. I stalked even unto his bakke, And ther I stood as stille as ought, That, sooth to saye, he saw me nought, 460 For-why he heng his heed adoune. And with a deedly sorwful soune He made of ryme ten vers or twelve Of a compleynt to himselve, The moste pite, the moste routhe, 465 That ever I herde; for, by my trouthe, Hit was gret wonder that nature Might suffren any creature To have swich sorwe, and be not deed. Ful pitous, pale, and nothing reed, 470 He sayde a lay, a maner song, Withoute note, withoute song, And hit was this; for wel I can Reherce hit; right thus hit began. -- 'I have of sorwe so grete won, 475 That Joye gete I never non, Now that I see my lady bright, Which I have loved with al my might, Is fro me dedd, and is a-goon. And thus in sorwe lefte me alone. 480 'Allas, o deeth! What ayleth thee, That thou noldest have taken me, 'Whan that thou toke my lady swete? That was so fayr, so fresh, so free, So good, that men may wel y-see 485 'Of al goodnesse she had no mete!' -- Whan he had mad thus his complaynte, His sorowful herte gan faste faynte, And his spirites wexen dede; The blood was fled, for pure drede, 490 Doun to his herte, to make him warm -- For wel hit feled the herte had harm -- To wite eek why hit was adrad, By kinde, and for to make hit glad; For hit is membre principal 495 Of the body; and that made al His hewe chaunge and wexe grene And pale, for no blood was sene In no maner lime of his. Anoon therwith whan I saugh this, 500 He ferde thus evel ther he sete, I wente and stood right at his fete, And grette him, but he spak noght, But argued with his owne thoght, And in his witte disputed faste 505 Why and how his lyf might laste; Him thoughte his sorwes were so smerte And lay so colde upon his herte; So, through his sorwe and hevy thoght, Made him that he ne herde me noght; 510 For he had wel nigh lost his minde, Thogh Pan, that men clepeth god of kinde, Were for his sorwes never so wrooth. But at the laste, to sayn right sooth, He was war of me, how I stood 515 Before him, and dide of myn hood, And grette him, as I best koude. Debonairly, and nothing loude, He sayde, `I prey thee, be not wrooth, I herde thee not, to sayn the sooth, 520 Ne I saw thee not, sir, trewely.' 'A! goode sir, no fors,' quod I, 'I am right sory if I have ought Destroubled yow out of your thought; Foryive me if I have mistake.' 525 'Yis, th'amendes is light to make,' Quod he, `for ther lyth noon ther-to; Ther is nothing missayd nor do,' Lo! how goodly spak this knight, As it had been another wight; 530 He made it nouther tough ne queynte And I saw that, and gan me aqueynte With him, and fond him so tretable, Right wonder skilful and resonable, As me thoghte, for al his bale. 535 Anoon-right I gan finde a tale To him, to loke wher I might ought Have more knowing of his thought. 'Sir,' quod I, `this game is doon; I holde that this hert be goon; 540 Thise huntes conne him nowher see.' 'I do no fors therof,' quod he, 'My thought is theron never a deel.' 'By oure lord,' quod I, `I trowe yow weel, Right so me thinketh by your chere. 545 But, sir, oo thing wol ye here? Me thinketh, in gret sorwe I yow see; But certes, good sir, yif that ye Wolde ought discure me your wo, I wolde, as wis god help me so, 550 Amende hit, yif I can or may; Ye mowe preve hit by assay. For, by my trouthe, to make yow hool, I wol do al my power hool; And telleth me of your sorwes smerte, 555 Paraventure hit may ese your herte, That semeth ful seke under your syde.' With that he loked on me asyde, As who sayth, `Nay, that wol not be.' 'Graunt mercy, goode frend,' quod he, 560 'I thanke thee that thou woldest so, But hit may never the rather be do, No man may my sorwe glade, That maketh my hewe to falle and fade, And hath myn understonding lorn, 565 That me is wo that I was born! May noght make my sorwes slyde, Nought the remedies of Ovyde; Ne Orpheus, god of melodye, Ne Dedalus, with playes slye; 570 Ne hele me may phisicien, Noght Ypocras, ne Galien; Me is wo that I live houres twelve; But who so wol assaye himselve Whether his herte can have pite 575 Of any sorwe, lat him see me. I wrecche, that deeth hath mad al naked Of alle blisse that ever was maked, Y-worthe worste of alle wightes, That hate my dayes and my nightes; 580 My lyf, my lustes be me looth, For al welfare and I be wrooth. The pure deeth is so my fo Thogh I wolde deye, hit wolde not so; For whan I folwe hit, hit wol flee; 585 I wolde have hit, hit nil not me. This is my peyne withoute reed, Alway deinge and be not deed, That Sesiphus, that lyth in helle, May not of more sorwe telle. 590 And who so wiste al, be my trouthe, My sorwe, but he hadde routhe And pite of my sorwes smerte, That man hath a feendly herte. For who so seeth me first on morwe 595 May seyn, he hath y-met with sorwe; For I am sorwe and sorwe is I. 'Allas! and I wol telle the why; My song is turned to pleyning, And al my laughter to weping, 600 My glade thoghtes to hevynesse, In travaile is myn ydelnesse And eek my reste; my wele is wo, My goode is harm, and ever-mo In wrathe is turned my pleying, 605 And my delyt into sorwing. Myn hele is turned into seeknesse, In drede is al my sikernesse. To derke is turned al my light, My wit is foly, my day is night, 610 My love is hate, my sleep waking, My mirthe and meles is fasting, My countenaunce is nycete, And al abaved wherso I be, My pees, in pleding and in werre; 615 Allas, how mighte I fare werre? 'My boldnesse is turned to shame, For fals Fortune hath pleyd a game Atte ches with me, allas, the whyle! The trayteresse fals and ful of gyle, 620 That al behoteth and nothing halt, She goth upryght and yet she halt, That baggeth foule and loketh faire, The dispitouse debonaire, That scorneth many a creature! 625 An ydole of fals portraiture Is she, for she wil sone wryen; She is the monstres heed ywryen, As filth over ystrawed with floures; Hir moste worship and hir flour is 630 To lyen, for that is hir nature; Withoute feyth, lawe, or mesure. She is fals; and ever laughinge With oon eye, and that other wepinge. That is broght up, she set al doun. 635 I lykne hir to the scorpioun, That is a fals, flateringe beste; For with his hede he maketh feste, But al amid his flateringe With his tayle he wol stinge, 640 And envenyme; and so wol she. She is th'envyouse charite That is ay fals, and seemeth weel, So turneth she hir false wheel Aboute, for it is nothing stable, 645 Now by the fyre, now at table; Ful many oon hath she thus yblent; She is pley of enchauntement, That semeth oon and is not so, The false theef! What hath she do, 650 Trowest thou? By our Lord, I wol thee seye. Atte ches with me she gan to pleye; With hir false draughtes divers She stal on me, and took my fers. And whan I saw my fers aweye, 655 Alas! I couthe no lenger playe, But seyde, "Farewel, swete, y-wis, And farwel al that ever ther is!" Therwith Fortune seyde, "Chek her!" And "Mate!" in mid pointe of the chekker 660 With a poune erraunt, allas! Ful craftier to pley she was Than Athalus, that made the game First of the ches: so was his name. But God wolde I had ones or twyes 665 Y-koud and knowe the jeupardyes That koude the Grek Pithagores! I shulde have pleyd the bet at ches, And kept my fers the bet therby; And thogh wherto? for trewely, 670 I hold that wish nat worth a stree! Hit had be never the bet for me. For Fortune can so many a wyle, Ther be but fewe can hir begyle, And eek she is the las to blame; 675 Myself I wolde have do the same, Before god, hadde I been as she; She oghte the more excused be. For this I say yet more therto, Hadde I be god and mighte have do 680 My wille, whan she my fers caughte, I wolde have drawe the same draughte. For, also wis god yive me reste, I dar wel swere she took the beste! 'But through that draughte I have lorn 685 My blisse; allas! that I was born! For evermore, I trowe trewly, For al my wil, my lust hoolly Is turned; but yet what to done? Be oure Lord, hit is to deye sone; 690 For nothing I ne leve it noght, But live and deye right in this thoght. There nis planete in firmament, Ne in air, ne in erthe, noon element, That they ne yive me a yift echoon 695 Of weping, whan I am aloon. For whan that I avyse me weel, And bethenke me everydeel, How that ther lyth in rekening, In my sorwe for nothing; 700 And how ther leveth no gladnesse May gladde me of my distresse, And how I have lost suffisance, And therto I have no plesance, Than may I say, I have right noght. 705 And whan al this falleth in my thoght, Allas! than am I overcome! For that is doon is not to come! I have more sorowe than Tantale.' And whan I herde him telle this tale 710 Thus pitously, as I yow telle, Unnethe mighte I lenger dwelle, Hit dide myn herte so moche wo. 'A! good sir!' quod I, 'say not so! Have som pite on your nature 715 That formed yow to creature, Remembre yow of Socrates; For he ne counted nat three strees Of noght that Fortune coude do.' 'No,' quod he, 'I can not so.' 720 'Why so, good sir! Pardee!' quod I; 'Ne say noght so, for trewely, Thogh ye had lost the ferses twelve, And ye for sorwe mordred yourselve, Ye sholde be dampned in this cas 725 By as good right as Medea was, That slow hir children for Jason; And Phyllis als for Demophon Heng hirself, so weylaway! For he had broke his terme-day 730 To come to hir. Another rage Had Dydo, quene eek of Cartage, That slow hirself for Eneas Was fals; a whiche a fool she was! And Ecquo dyed for Narcisus. 735 Nolde nat love hir; and right thus Hath many another foly don. And for Dalida died Sampson, That slow himself with a pilere. But ther is noon alyve here 740 Wolde for a fers make this wo!' 'Why so?' quod he; 'hit is nat so, Thou woste ful litel what thou menest; I have lost more than thow wenest.' 'Lo, sir, how may that be?' quod I; 745 'Good sir, tel me al hoolly In what wyse, how, why, and wherfore That ye have thus your blisse lore,' 'Blythly,' quod he, 'com sit adoun, I telle thee up condicioun 750 That thou hoolly, with al thy wit, Do thyn entente to herkene hit.' 'Yis, sir.' 'Swere thy trouthe therto.' 'Gladly.' 'Do than holde herto!' 'I shal right blythly, so God me save, 755 Hoolly, with al the wit I have, Here yow, as wel as I can,' 'A goddes half!' quod he, and began: -- 'Sir,' quod he, `sith first I couthe Have any maner wit fro yowthe, 760 Or kyndely understonding To comprehende, in any thing, What love was, in myn owne wit, Dredelees, I have ever yit Be tributary, and yiven rente 765 To love hoolly with goode entente, And through plesaunce become his thral, With good wil, body, herte, and al. Al this I putte in his servage, As to my lorde, and dide homage; 770 And ful devoutly prayde him to, He shulde besette myn herte so, That it plesaunce to him were, And worship to my lady dere. 'And this was longe, and many a yeer 775 Or that myn herte was set o-wher, That I did thus, and niste why; I trowe hit cam me kindely. Paraunter I was therto most able As a whyt wal or a table; 780 For hit is redy to cacche and take Al that men wil therin make, Wherso so men wol portreye or peynte, Be the werkes never so queynte. 'And thilke tyme I ferde so 785 I was able to have lerned tho, And to have coud as wel or better, Paraunter, other art or letter. But for love cam first in my thought, Therfore I forgat hit nought. 790 I chees love to my firste craft, Therfor hit is with me laft. Forwhy I took hit of so yong age, That malice hadde my corage Nat that tyme turned to nothing 795 Through to mochel knowleching. For that tyme yowthe, my maistresse, Governed me in ydelnesse; For hit was in my firste youthe, And tho ful litel good I couthe, 800 For al my werkes were flittinge, And al my thoghtes varyinge; Al were to me yliche good, That I knew tho; but thus hit stood. 'Hit happed that I cam on a day 805 Into a place, ther I say, Trewly, the fayrest companye Of ladies that ever man with ye Had seen togedres in oo place. Shal I clepe hit hap other grace 810 That broght me ther? Nay, but Fortune, That is to lyen ful comune, The false trayteresse, pervers, God wolde I coude clepe hir wers! For now she worcheth me ful wo, 815 And I wol telle sone why so. 'Among thise ladies thus echoon, Soth to seyn, I saw ther oon That was lyk noon of al the route; For I dar swere, withoute doute, 820 That as the someres sonne bright Is fairer, clere, and hath more light Than any planete, is in heven, The mone, or the sterres seven, For al the worlde so had she 825 Surmounted hem alle of beaute, Of maner and of comlynesse, Of stature and wel set gladnesse, Of goodlihede so wel beseye -- Shortly, what shal I more seye? 830 By God, and by his halwes twelve, It was my swete, right al hirselve! She had so stedfast countenaunce, So noble port and meyntenaunce. And Love, that had herd my boone, 835 Had espyed me thus soone, That she ful sone, in my thoght, As helpe me God, so was ycaught So sodenly, that I ne took No maner reed but at hir look 840 And at myn herte; for-why hir eyen So gladly, I trow, myn herte seyen, That purely tho myn owne thoght Seyde hit were bet serve hir for noght Than with another to be weel. 845 And hit was sooth, for, everydeel, I wil anoon-right telle thee why. I saw hir daunce so comlily, Carole and singe so swetely, Laughe and pleye so womanly, 850 And loke so debonairly, So goodly speke and so frendly, That certes, I trow, that evermore Nas seyn so blisful a tresore. For every heer upon hir hede, 855 Soth to seyn, hit was not rede, Ne nouther yelow, ne broun hit nas; Me thoghte, most lyk gold hit was. And whiche eyen my lady hadde! Debonair, goode, glade, and sadde, 860 Simple, of good mochel, noght to wyde; Therto hir look nas not asyde, Ne overthwert, but beset so weel, Hit drew and took up, everydeel, Alle that on hir gan beholde. 865 Hir eyen semed anoon she wolde Have mercy; fooles wenden so; But hit was never the rather do. Hit nas no countrefeted thing, It was hir owne pure loking, 870 That the goddesse, dame Nature, Had made hem opene by mesure, And close; for, were she never so glad, Hir loking was not foly sprad, Ne wildely, thogh that she pleyde; 875 But ever, me thoght, hir eyen seyde, "By god, my wrathe is al for-yive!" 'Therwith hir liste so wel to live, That dulnesse was of hir adrad. She nas to sobre ne to glad; 880 In alle thinges more mesure Had never, I trowe, creature. But many oon with hir loke she herte, And that sat hir ful lyte at herte, For she knew nothing of her thoght; 885 But whether she knew, or knew hit noght, Algate she ne roghte of hem a stree! To gete hir love no ner was he That woned at home, than he in Inde; The formest was alway behinde. 890 But goode folk, over al other, She loved as man may do his brother; Of whiche love she was wonder large, In skilful places that bere charge. 'Which a visage had she therto! 895 Allas! myn herte is wonder wo That I ne can discryven hit! Me lakketh bothe English and wit For to undo hit at the fulle; And eek my spirits be so dulle 900 So greet a thing for to devyse. I have no wit that can suffyse To comprehenden hir beaute; But thus moche dar I seyn, that she Was rody, fresh, and lyvely hewed; 905 And every day hir beaute newed. And negh hir face was alderbest; For certes, Nature had swich lest To make that fair, that trewly she Was hir cheef patron of beautee, 910 And cheef ensample of al hir werke, And moustre; for, be hit never so derke, Me thinketh I see hir ever-mo. And yet more-over, thogh alle tho That ever lived were not alyve, 915 They ne sholde have founde to discryve In al hir face a wikked signe; For hit was sad, simple, and benigne. 'And which a goodly, softe speche Had that swete, my lyves leche! 920 So frendly, and so wel y-grounded, Up al resoun so wel y-founded, And so tretable to alle gode, That I dar swere by the rode, Of eloquence was never founde 925 So swete a sowninge facounde, Ne trewer tonged, ne scorned lasse, Ne bet coude hele; that, by the masse, I durste swere, thogh the pope hit songe, That ther was never yet through hir tonge 930 Man ne woman gretly harmed; As for hir, ther was al harm hid; Ne lasse flatering in hir worde, That purely, hir simple recorde Was founde as trewe as any bonde, 935 Or trouthe of any mannes honde. Ne chyde she koude never a deel, That knoweth al the world ful weel. `But swich a fairnesse of a nekke Had that swete that boon nor brekke 940 Nas ther non sene, that missat. Hit was whyt, smothe, streght, and flat, Withouten hole; and canel-boon, As by seming, had she noon. Hir throte, as I have now memoire, 945 Semed a round tour of yvoire, Of good gretnesse, and noght to grete. 'And goode faire Whyte she hete, That was my lady name right. She was bothe fair and bright, 950 She hadde not hir name wrong. Right faire shuldres, and body long She hadde, and armes; every lith Fattish, flesshy, not greet therwith; Right whyte handes, and nayles rede, 955 Rounde brestes; and of good brede Hyr hippes were, a streight flat bake. I knew on hir non other lak That al hir limmes nere sewing, In as fer as I had knowing. 960 'Therto she koude so wel pleye, Whan that hir liste, that I dar seye, That she was lyk to torche bright, That every man may take of light Ynogh, and hit hath never the lesse. 965 'Of maner and of comlinesse Right so ferde my lady dere; For every wight of hir manere Might cacche ynogh, if that he wolde, If he had eyen hir to beholde. 970 For I dar sweren, if that she Had among ten thousand be, She wolde have be, at the leste, A cheef mirour of al the feste, Thogh they had stonden in a rowe, 975 To mennes eyen koude have knowe. For wher-so men had pleyd or waked, Me thoghte the felawship as naked Withouten hir, that saw I ones, As a coroune withoute stones. 980 Trewely she was, to myn ye, The soleyn fenix of Arabye, For ther liveth never but oon; Ne swich as she ne know I noon. 'To speke of goodnesse; trewly she 985 Had as moche debonairte As ever had Hester in the bible And more, if more were possible. And, soth to seyne, therwithal She had a wit so general, 990 So hool enclyned to alle gode, That al hir wit was set, by the rode, Withoute malice, upon gladnesse; Therto I saw never yet a lesse Harmul, than she was in doing. 995 I sey nat that she ne had knowing What harm was; or elles she Had coud no good, so thinketh me. 'And trewely, for to speke of trouthe, But she had had, hit had be routhe. 1000 Therof she had so moche hir del -- And I dar seyn and swere hit wel -- That Trouthe him-self, over al and al, Had chose his maner principal In hir, that was his resting-place. 1005 Therto she hadde the moste grace, To have stedfast perseveraunce, And esy, atempre governaunce, That ever I knew or wiste yit; So pure suffraunt was hir wit. 1010 And reson gladly she understood, Hit folowed wel she coude good. She used gladly to do weel; These were hir maners everydeel. 'Therwith she loved so wel right, 1015 She wrong do wolde to no wight; No wight might do hir no shame, She loved so wel hir owne name. Hir luste to holde no wight in honde; Ne, be thou siker, she nolde fonde 1020 To holde no wight in balaunce, By half word ne by countenaunce, But-if men wolde upon hir lye; Ne sende men into Walakye, To Pruyse, and into Tartarye, 1025 To Alisaundre, ne into Turkye, And bidde him faste, anoon that he Go hoodles to the drye see, And come hoom by the Carrenare; And seye, "Sir, be now right ware 1030 That I may of yow here seyn Worship, or that ye come ageyn!' She ne used no suche knakkes smale. 'But wherfor that I telle my tale? Right on this same, as I have seyd, 1035 Was hoolly al my love leyd; For certes, she was, that swete wyf, My suffisaunce, my lust, my lyf, Myn hap, myn hele, and al my blisse, My worldes welfare, and my lisse, 1040 And I hires hoolly, everydeel.' 'By our lord,' quod I, 'I trowe yow weel! Hardily, your love was wel beset, I not how ye mighte have do bet.' 'Bet? ne no wight so wel!' quod he. 1045 'I trowe hit, sir,' quod I, 'parde!' 'Nay, leve hit wel!' 'Sir, so do I; I leve yow wel, that trewely Yow thoghte, that she was the beste, And to beholde the alderfaireste, 1050 Who so had loked hir with your eyen.' 'With myn? Nay, alle that hir seyen Seyde and sworen hit was so. And thogh they ne hadde, I wolde tho Have loved best my lady fre, 1055 Thogh I had had al the beautee That ever had Alcipyades, And al the strengthe of Ercules, And therto had the worthinesse Of Alisaundre, and al the richesse 1060 That ever was in Babiloyne, In Cartage, or in Macedoyne, Or in Rome, or in Ninive; And therto also hardy be As was Ector, so have I Ioye, 1065 That Achilles slow at Troye -- And therfor was he slayn also In a temple, for bothe two Were slayn, he and Antilegius, And so seyth Dares Frigius, 1070 For love of hir Polixena -- Or ben as wys as Minerva, I wolde ever, withoute drede, Have loved hir, for I moste nede! "Nede!" nay, I gabbe now, 1075 Noght "nede", and I wol telle how, For of good wille myn herte hit wolde, And eek to love hir I was holde As for the fairest and the beste. 'She was as good, so have I reste, 1080 As ever was Penelope of Grece, Or as the noble wyf Lucrece, That was the beste -- he telleth thus, The Romayn Tytus Livius -- She was as good, and no-thing lyke, 1085 Thogh hir stories be autentyke; Algate she was as trewe as she. 'But wherfor that I telle thee Whan I first my lady say? I was right yong, the sooth to sey, 1090 And ful gret need I hadde to lerne; Whan my herte wolde yerne To love, it was a greet empryse. But as my wit koude best suffyse, After my yonge childly wit, 1095 Withoute drede, I besette hit To love hir in my beste wise, To do hir worship and servyse That I tho coude, be my trouthe, Withoute feyning outher slouthe; 1100 For wonder fayn I wolde hir see. So mochel hit amended me, That, whan I saugh hir first a-morwe, I was warished of al my sorwe Of al day after, til hit were eve; 1105 Me thoghte nothing mighte me greve, Were my sorwes never so smerte. And yit she sit so in myn herte, That, by my trouthe, I nolde noghte, For al this worlde, out of my thoght 1110 Leve my lady; no, trewely!' 'Now, by my trouthe, sir,' quod I, 'Me thinketh ye have such a chaunce As shrift withoute repentaunce.' 'Repentaunce! Nay, fy,' quod he; 1115 'Shulde I now repente me To love? nay, certes, than were I wel Wers than was Achitofel, Or Anthenor, so have I Ioye, The traytour that betraysed Troye, 1120 Or the false Genelon, He that purchased the treson Of Rowland and of Olivere. Nay, why! I am alyve here I nil foryete hir never mo.' 1125 'Now, goode sir,' quod I right tho, 'Ye han wel told me here before. It is no need reherce hit more How ye sawe hir first, and where; But wolde ye telle me the manere, 1130 To hir which was your firste speche -- Therof I wolde yow be-seche -- And how she knewe first your thoght, Whether ye loved hir or noght, And telleth me eek what ye have lore; 1135 I herde yow telle her-before.' 'Ye,' seyde he,'thow nost what thou menest; I have lost more than thou wenest.' 'What los is that, sir?' quod I tho; 'Nil she not love yow? Is hit so? 1140 Or have ye oght y-doon amis, That she hath left yow? Is hit this? For goddes love, telle me al.' 'Before god,' quod he, 'and I shal. I saye right as I have seyd, 1145 On hir was al my love leyd; And yet she niste hit never a deel Noght longe tyme, leve hit weel. For be right siker, I durste noght For al this worlde telle hir my thoght, 1150 Ne I wolde have wratthed hir, trewely. For wostow why? she was lady Of the body; she had the herte, And who hath that, may not asterte. 'But, for to kepe me fro ydelnesse, 1155 Trewely I did my besinesse To make songes, as I best koude, And ofte tyme I song hem loude; And made songes a gret del, Al-thogh I coude not make so wel 1160 Songes, ne knowe the art al, As coude Lamekes sone Tubal, That fond out first the art of songe; For, as his brothers hamers ronge Upon his anvelt up and doun, 1165 Therof he took the firste soun; But Grekes seyn, Pictagoras, That he the firste finder was Of the art; Aurora telleth so, But therof no fors, of hem two. 1170 Algates songes thus I made Of my feling, myn herte to glade; And lo! this was the alderfirst, I not wher that hit were the werst. -- "Lord, hit maketh myn herte light, 1175 Whan I thenke on that swete wight That is so semely on to see; And wisshe to god hit might so be, That she wolde holde me for hir knight, My lady, that is so fair and bright!" -- 1180 'Now have I told thee, sooth to saye, My firste song. Upon a daye I bethoghte me what wo And sorwe that I suffred tho For hir, and yet she wiste hit noght, 1185 Ne telle hir durste I nat my thoght. 'Allas!' thoghte I, 'I can no reed; And, but I telle hir, I nam but deed; And if I telle hir, to seye sooth, I am adrad she wol be wrooth; 1190 Allas! what shal I thanne do?" 'In this debat I was so wo, Me thoghte myn herte braste a-tweyn! So atte laste, soth to sayn, I me bethoghte that nature 1195 Ne formed never in creature So moche beautee, trewely, And bountee, withouten mercy. 'In hope of that, my tale I tolde, With sorwe, as that I never sholde; 1200 For nedes, and, maugree my heed, I moste have told hir or be deed. I not wel how that I began, Ful evel rehercen hit I can; And eek, as helpe me god withal, 1205 I trowe hit was in the dismal, That was the ten woundes of Egipte; For many a word I over-skipte In my tale, for pure fere Lest my wordes misset were. 1210 With sorweful herte, and woundes dede, Softe and quaking for pure drede And shame, and stinting in my tale For ferde, and myn hewe al pale, Ful ofte I wex bothe pale and reed; 1215 Bowing to hir, I heng the heed; I durste nat ones loke hir on, For wit, manere, and al was gon. I seyde "mercy!" and no more; Hit nas no game, hit sat me sore. 1220 'So atte laste, sooth to seyn, Whan that myn herte was come ageyn, To telle shortly al my speche, With hool herte I gan hir beseche That she wolde be my lady swete; 1225 And swor, and gan hir hertely hete Ever to be stedfast and trewe, And love hir alwey freshly newe, And never other lady have, And al hir worship for to save 1230 As I best koude; I swor hir this -- "For youres is al that ever ther is For evermore, myn herte swete! And never false yow, but I mete, I nil, as wis God helpe me so!" 1235 'And whan I had my tale y-do, God woot, she acounted nat a stree Of al my tale, so thoghte me. To telle shortly as hit is, Trewely hir answere, hit was this; 1240 I can not now wel counterfete Hir wordes, but this was the grete Of hir answere: she sayde, "nay" Al outerly. Allas, that day The sorwe I suffred, and the wo! 1245 That trewely Cassandra, that so Bewayled the destruccioun. Of Troye and of Ilioun, Had never swich sorwe as I tho. I durste no more say therto 1250 For pure fere, but stal away; And thus I lived ful many a day; That trewely, I hadde no need Ferther than my beddes heed Never a day to seche sorwe; 1255 I fond hit redy every morwe, For-why I loved hir in no gere. 'So hit befel, another yere, I thoughte ones I wolde fonde To do hir knowe and understonde 1260 My wo; and she wel understood That I ne wilned thing but good, And worship, and to kepe hir name Over al thing, and drede hir shame, And was so besy hir to serve; -- 1265 And pite were I shulde sterve, Sith that I wilned noon harm, y-wis. So whan my lady knew al this, My lady yaf me al hoolly The noble yift of hir mercy, 1270 Saving hir worship, by al weyes; Dredelees, I mene noon other weyes. And therwith she yaf me a ring; I trowe hit was the firste thing; But if myn herte was ywaxe 1275 Glad, that is no need to axe! As helpe me God, I was as blyve, Reysed, as fro dethe to lyve, Of alle happes the alderbeste, The gladdest and the moste at reste. 1280 For trewely, that swete wight, Whan I had wrong and she the right, She wolde alwey so goodely For-yeve me so debonairly. In alle my youthe, in alle chaunce, 1285 She took me in hir governaunce. Therwith she was alway so trewe, Our joye was ever yliche newe; Our hertes wern so even a payre, That never nas that oon contrayre 1290 To that other, for no wo. For sothe, yliche they suffred tho Oo blisse and eek oo sorwe bothe; Yliche they were bothe gladde and wrothe; Al was us oon, withoute were. 1295 And thus we lived ful many a yere So wel, I can nat telle how.' 'Sir,' quod I, 'where is she now?' 'Now!' quod he, and stinte anoon. Therwith he wex as deed as stoon, 1300 And seyde, 'Allas! that I was bore, That was the los, that here before I tolde thee, that I had lorn. Bethenk how I seyde here beforn, "Thou wost ful litel what thou menest; 1305 I have lost more than thou wenest" -- God woot, allas! Right that was she!' 'Allas! sir, how? What may that be?' 'She is deed!' 'Nay!' 'Yis, by my trouthe!' 'Is that your los? By god, hit is routhe!' 1310 And with that worde, right anoon, They gan to strake forth; al was doon, For that tyme, the hert-hunting. With that, me thoghte, that this king Gan quikly hoomward for to ryde 1315 Unto a place ther besyde, Which was from us but a lyte, A long castel with walles whyte, Be seynt Johan! on a riche hil, As me mette; but thus it fil. 1320 Right thus me mette, as I yow telle, That in the castel was a belle, As hit had smiten houres twelve. -- Therwith I awook myselve, And fond me lying in my bed; 1325 And the book that I had red, Of Alcyone and Seys the king, And of the goddes of sleping, I fond it in myn honde ful even. Thoghte I, 'this is so queynt a sweven, 1330 That I wol, be processe of tyme, Fonde to putte this sweven in ryme As I can best, and that anoon.' -- This was my sweven; now hit is doon.
<urn:uuid:fa6640ac-25c4-48ab-98df-3a887e507da7>
CC-MAIN-2020-16
https://dev.ancient.eu/article/1374/chaucers-the-book-of-the-duchess-full-text--summar/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.905332
17,957
3.203125
3
Sporting a sooty attire from a previous voyage, SpaceX’s Falcon 9 rocket successfully lifted the fourth Dragon mission of 2017 into orbit on Friday to deliver science gear, systems hardware, crew supplies and two external payloads to the Space Station that will study the population of micro-sized debris in Low Earth Orbit and measure a critical climate parameter to continue a decades-long data record of total solar energy input to Earth. Friday’s Falcon 9 launch was the first to use a flight-proven first stage and previously used Dragon cargo spacecraft as SpaceX continues its drive toward making re-use of rockets and space vehicles routine. Liftoff from Space Launch Complex 40 at Cape Canaveral Air Force Station occurred at 15:36 UTC and Falcon 9 needed ten minutes to dispatch Dragon into orbit for a two-day rendezvous with the International Space Station while the first stage booster only needed eight minutes for its round trip, landing at the Cape’s Landing Zone 1 to become the first Falcon 9 to manage two land-based recoveries. Friday’s launch marked the 17th successful flight by the Falcon 9 rocket in 2017 including four re-use mission, making Falcon 9 the most-flown launch vehicle with more missions than the Russian Soyuz and China’s Long March family. The successful return of the first stage extended SpaceX’s streak of uninterrupted recovery successes to 16. Dragon SpX-13 – using the C108 Dragon that spent 37 days in orbit on the SpX-6 mission in 2015 – sets a new record for most Dragon flights in a calendar year, adding to a year that already saw SpaceX shatter its previous record for the number of Falcon 9 missions. Booked for a month-long stay at the orbiting laboratory, Dragon is delivering 2,205 Kilograms of cargo, including 1,560kg of pressurized cargo and 645kg of external hardware riding in the Trunk Section of the vehicle. In Dragon’s Trunk are two high-profile payloads: TSIS, the Total and Spectral Irradiance Sensor, will take up residence on ISS to measure the total energy input from the sun to extend a vital climate record of what is considered one of the most critical climate variables that has been continuously tracked since 1978. The Space Debris Sensor, set for installation outside the Columbus laboratory, is a large-area debris tracker combining different detection methods to provide various properties of micro-debris strikes in Low Earth Orbit to help assess a debris population that can not be measured from Earth. The third Trunk Payload manifested for SpX-13 was the MISSE-FF, Materials on ISS Flight Facility that builds on and expands earlier MISSE materials science experiments that exposed various samples to the unique space environment to inform designers of satellites on how different materials fare in orbit. MISSE-FF could not be readied in time for the SpX-13 and has therefore been de-manifested and will have to queue up for a future flight opportunity. The pressurized cargo riding on Dragon SpX-13 is also mostly utilization-related, comprising 711kg of science gear, 490kg of crew supplies, 189kg of maintenance hardware and 165kg of EVA hardware in the form of a refurbished space suit as ISS gears up for a series of EVAs in the January/February time frame. Science riding on Dragon includes the seventh Rodent Research mission, involving forty mice aboard two Rodent Transporter units for a study of a nanochannel drug delivery system for combating muscle atrophy in astronauts on long-duration missions as well as Earth-bound patients. Dragon is also carrying a plant study attempting to reveal previously unknown pathways for gravity sensing, a novel technology demonstration for the production of optical fibers in microgravity with superior optical qualities than those produced at 1G, a ‘Synthetic Bone’ study evaluates a new bone adhesive that could aid bone repair and augment bone structure in Osteoporosis patients, and new hardware is flying up for the Station’s small-sized SPHERES robots to use them as a test bed for developing algorithms needed when maneuvering defunct satellites as part of future space debris clean-up efforts. As had been the case with the three previous Dragon missions reaching ISS this year, the SpX-13 mission is heavy on the utilization side as NASA’s makes use of the unique capabilities of its two Commercial Resupply Vehicles. Cygnus has been used for the heavy-lifting in the supplies department this year, delivering over three metric tons of cargo on each of its missions due to its larger internal volume than Dragon that also allow the craft to serve as a temporary extension to the Station’s laboratory modules and take out plenty of trash when departing. Dragon’s unique capabilities come in handy for utilization payloads – late cargo loading just 24 hours before launch allows time-critical payloads to be flown, including biology samples in double cold bags and rodents while the return capability of Dragon is readily utilized to fly experiments back to Earth for detailed laboratory analysis. Friday’s launch marked the grand re-opening of Cape Canaveral’s Space Launch Complex 40 after fifteen months of downtime following the September 1st, 2016 explosion of a Falcon 9 rocket when counting down to its Static Fire Test – caused by a complex failure mechanism that led one of the rocket’s Helium pressure vessels to burst. SLC-40, SpaceX’s first Falcon 9 launch complex, suffered extensive damage to its above-ground systems in the explosion and ensuing fire. SpaceX began re-build efforts in February after Launch Complex 39A could be activated for service to handle Falcon 9 east coast launch operations while SLC-40 was down. A new Transporter, Erector, Launcher (TEL) was built and the pad received a number of upgrades as part of the re-build effort including improved automation systems and data handling architecture, a new hold-down system, and additional reinforcements designed to reduce the wear and tear suffered by the pad in order to reduce the turnaround time between launches. The final push toward returning SLC-40 to service was not without trouble – as one could expect given the majority of cross-country propellant lines, data systems, ground computers and the entire TEL were brand new components. To that end, SpaceX had to slip the Static Fire Test from December 2 to the sixth to provide sufficient time to iron out teething issues of the pad, also causing the launch to slip from an original target of December 4th. No issues were immediately apparent in data collected at the Static Fire and Falcon 9 returned to the pad on Monday in preparation for launch on Tuesday; however, liftoff was initially delayed to Wednesday and then to Friday when foreign objects were discovered on the rocket’s second stage. Clean-up work was put in motion and analysis began where the particles were introduced since any foreign objects on a space launch vehicle are a potentially fatal problem when occurring in flight. It had been uncertain whether Friday’s launch could take place until the early morning hours, local time, and press photo opportunities after midnight were canceled since Falcon 9 had not yet gone into its vertical position. To protect the launch opportunity, Dragon had received its late cargo load items by Thursday evening, including forty mousetronauts, powered laboratory freezers, cold stowage samples and, possibly, Christmas presents for the ISS crew. With Dragon fully loaded and work on Falcon 9 complete just in the nick of time, SpaceX was able to raise the 65-meter tall launcher to its vertical position Friday morning and initiate power-up ops as the first step in the countdown. A clean bill of health was awarded to Falcon 9 after several hours of checkouts and weather was looking good for the day’s instantaneous launch opportunity – allowing Launch Controllers at the Cape to proceed into the Automated Countdown Sequence at T-70 minutes with Rocket Propellant 1 load, feeding some 155 metric tons of chilled fuel to the two-stage rocket. Liquid Oxygen loading picked up at T-35 minutes on the first stage and 15 minutes later on the second stage as Falcon 9 received around 360 metric tons of the sub-cooled oxidizer. Propellant load was still in full swing when the final countdown sequence kicked off with the conditioning of the Merlin 1D turbomachinery at T-7 minutes followed by a fast-paced set of operations to transition Falcon 9 to internal power, align the flight control system, put engine actuators and valves through final hydraulic tests and priming the Strongback structure for rapid retract at T-0 – a new feature for SLC-40. The Autonomous Flight Termination System was armed and final propellant loading milestones were called out inside T-3 minutes when the first and second stage reached flight levels. Falcon 9 assumed control of the count at the one-minute mark, a final GO was voiced by the Launch Director and both stages headed into full pressurization. Flames erupted from the base of the rocket at T-3 seconds when the nine Merlin 1D engines fired up to soar to a collective launch thrust of nearly 700-metric-ton-force to lift the 550t vehicle off the ground. Liftoff was marked at precisely 15:36:09 UTC, marking the first Falcon 9 blasting off from SLC-40 after 488 days. Falcon 9 climbed vertically for 15 seconds before pitching over onto a departure path to the north east to boost Dragon into the orbital plane of the International Space Station, burning 2,500 Kilograms of propellant per second to push the vehicle skyward. The ascending rocket passed the speed of sound just over a minute into flight followed by Maximum Dynamic Pressure at T+78 seconds with the engines throttling back briefly to reduce stress before ramping up again for another minute of full throttle. MECO – Main Engine Cutoff – occurred two minutes and 22 seconds into the flight after Booster #1035 accelerated the vehicle to 1,658 meters per second. Four seconds later, Falcon 9 had reached 65 Kilometers in altitude and four pneumatic pushers sent the two stages on their separate ways with no time wasted on the first stage for its rocket-powered U-turn and the second stage immediately heading into start-up mode. The 95,000-Kilogram-force MVac engine ignited two minutes and 33 seconds into the flight on a burn of six minutes and 27 seconds to inject the Dragon, weighing over ten metric tons, into Low Earth Orbit. Just over three minutes into the mission, when climbing through 110 Kilometers in altitude, Dragon jettisoned its protective Nose Cover as aerodynamic forces were no-longer a danger to the delicate Common Berthing Mechanism on its top side. For Booster #1035, the return trip to Cape Canaveral began split seconds after stage separation when it fired the cold gas thrusters on the interstage to pitch up and swing the business end around into a tail-first orientation. The center engine re-ignited two minutes and 38 seconds into the mission to assist in finishing the turn and two outer engines joined in four seconds later when the booster was flying level, pointing its thrust toward the velocity vector. The 54-second boost back successfully reversed the first stage and accelerated it back toward Cape Canaveral, passing its high point around 120 Kilometers in altitude and re-orienting again to prepare for re-entry. Falling back to Earth at hypersonic speed, the booster re-lit at T+6 minutes and 7 seconds, again firing up its center and outer engines in staggered fashion. The 18-second entry burn slowed the vehicle by over 300 meters per second. After shutdown of the engines, it was up to the four actuated grid fins to keep the booster stable and modify its angle of attack to fly toward Landing Zone 1 just around eight Kilometers south of Falcon’s CCAFS launch pad. The 47-meter tall booster made its way through the sound barrier in reverse direction and lit up its center Merlin 1D seven minutes and ten seconds into the flight for the final landing burn. Falcon 9 entered a vertical descent toward its concrete landing pad and the four landing legs deployed seconds before the booster made contact with the ground and shut down its engine after a round-trip time of seven minutes and 47 seconds. This marked SpaceX’s first time landing a Falcon 9 booster on land twice, following B1035’s successful LZ-1 landing back in June. Overall, SpaceX now stands at 20 successful landings out of 25 tries, recovering 16 different boosters (four have launched & landed twice). For land-based recoveries, SpaceX has a perfect 8-of-8 record. The future for B1035 is not entirely clear, but it would be the best candidate yet for a third flight given its first two missions involved Low Earth Orbit deliveries with relatively benign re-entry environments. While the first stage aced SpaceX’s 14th recovery of the year, Stage 2 was in the final minute of its burn, continuing to travel north east over the Atlantic and aiming for an orbit around 200 by 355 Kilometers, inclined 51.6°. Shutdown of the MVac engine was confirmed right at the T+9-minute mark and flight controllers noted a nominal orbit was achieved. Dragon was sent off on its journey exactly ten minutes after taking flight, stabilizing its orientation with its Draco thrusters and jettisoning it its two solar array fairings to initiate the deployment of the power-generating solar arrays. Several hours of functional checks and the deployment of the GNC bay door 140 minutes into flight are the next milestones for Dragon before the spacecraft can begin the process of raising its orbit to link up with ISS for a Sunday capture by the Station’s robotic arm, planned at 11 UTC.
<urn:uuid:5da71bff-0c12-4f5c-8b9c-f81167f6245f>
CC-MAIN-2020-16
https://spaceflight101.com/iss/falcon-9-launches-dragon-spx-13/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.944683
2,845
2.953125
3
On September 10, 2017, as Hurricane Irma drowned the Florida Keys with a five-foot storm surge and shredded houses with 130 mph winds, David Vaughan, a 65-year-old marine biologist, and Frank Slifka, a 67-year-old maintenance man, huddled inside the Elizabeth Moore Center for Coral Reef Research and hoped for the best. There were not many places to hide on the tiny spit of sand called Summerland Key, but the research center was one of them. The $7 million facility was built to withstand a Category 5 hurricane and resembles a cinder block on burly concrete stilts. From the second floor, Vaughan peered into the storm to check on his house and boat next door. All he could see was the wind itself, a roaring wall of gray. When the storm’s eye passed directly overhead, the wind died and the storm surge sucked back out to sea. Vaughan could see that his house’s roof had begun to collapse. His boat had smashed into his Prius. He had 40 minutes to save what he could before the back wall of the hurricane hit and another storm surge rushed in. He and Slifka rushed downstairs, turned their backs on everything Vaughan owned, and got to work in the laboratory’s ground floor, rescuing thousands of tiny plaster plugs capped by dark dots the size of a pencil tip—genetically hacked coral polyps that the storm threatened to wash away. Without them, Vaughan knew, the Florida Keys might not survive the next century. When I drove into Summerland Key three months after the storm, debris still lined the main road, piled almost as high as the three-axle trucks rumbling in to retrieve and burn it. Just 20 miles east of bustling Key West, the island remained a ghost town. Boats and trailers sat marooned on front lawns, their carcasses spray painted with the redundant tag “trash.” Many residents hadn’t returned to clean up. The Elizabeth Moore Center's parking lot, however, was packed with cars. The building had survived the storm. Inside its thick concrete walls, offices and dorm rooms thrummed with the paperwork doldrums of scientific life. Down in the open-air ground floor, the plastic holding tanks that had overturned in the storm once again brimmed with the corals Vaughan and Slifka had saved, plus thousands of others, submerged in bubbling seawater. Grad students slowly circulated among them, staring down into the troughs, gliding suction hoses along their bottoms. When I wondered aloud about their job, one perked up and removed his headphones. “We’re removing detritus from the bottom,” he said. “Snail shit,” said another. Suctioning snail shit is where the rubber meets the road for the facility’s main mission: saving coral from extinction via a groundbreaking technique of genetic modification and cloning. Corals are strange creatures, invertebrate organisms made up of individual tentacled polyps that, under a microscope, each look like a miniature Sarlacc pit. Inside each polyp are tiny marine plankton that photosynthesize food, giving the polyp enough energy to build a calcium carbonate reef structure around itself and its neighboring polyps. They’re also fragile. Without grad students to suction up snail shit at this stage of their lives, the polyps would be strangled by too much algae. Without carefully monitored water temperatures, the polyps would overheat and expel all their algae and bleach, a much greater danger that leads to wide-spread die offs. Vaughan, the executive director of the Elizabeth Moore Center, has a graying castaway’s beard and cloudy blue eyes. He commutes to work every day by paddling a canoe 50 yards across Summerland Key’s canal from the dock at the back of his house, which is still standing. “People say, ‘You’re the best low-carbon-footprint commuter,’” Vaughan said. “They don’t even know that I hold my breath going across, so I’m not emitting anything at all.” Vaughan giggles—he does that—but he’s getting at something. Since the 1970s, the greenhouse effect from the atmosphere’s absorption of carbon dioxide has raised average ocean temperatures by almost two degrees Fahrenheit. In the next 100 years, that temperature could rise by between two and six degrees more. Worse, the sea has absorbed about half of humanity’s total CO2 output, which has chemically reacted with the main substrate of the ocean, calcium carbonate—a compound that all sea animals with exoskeletons, like crabs, shrimp, clams, and coral, depend on to live—to make oceans 30 percent more acidic than they were in the 19th century. That higher acidity makes it harder for coral to build its reef structure. If ocean acidity continues to increase into the next century, it could mean reefs will begin eroding faster than they are being built—or, literally, start melting away. The combination of warming and acidification has been devastating to coral. Since the 1970s, scientists estimate 20 to 40 percent of the world’s coral has been killed off by bleaching events caused by high water temperatures. In certain areas, it’s been worse. In 2015, 22 percent of the Great Barrier Reef, one of the world’s largest living structures, died off in a mass bleaching event. A 2008 study estimated that only 2 percent of Florida’s native staghorn and elkhorn corals remain alive. And bleaching events worldwide are happening more often as earth’s average temperature climbs. Florida’s reefs have experienced bleaching events in 12 of the past 14 years. The effects of this mass extinction are catastrophic. Never mind that reef tourism generates $5 billion annually in Florida and $36 billion worldwide. Across the globe, hundreds of millions of people depend on fish stocks that are supported by the coral reef ecosystem, without which they’ll starve. What’s more, if reefs disappear, millions of people living in these low-lying coastal regions, including the Keys, could be displaced—or drowned—by megastorms like Irma, which the National Oceanographic and Atmospheric Administration (NOAA) believes will only get stronger in coming years due to warming ocean surface temperatures. These communities depend on fringe and barrier reefs, where corals rise like a wall from the seafloor, beating back the strength of incoming waves like defensive linemen breaking up an oncoming blitz. A study during Hurricane Wilma in 2005 found that barrier reefs attenuated 99 percent of the height of the storm’s 42-foot waves before they hit the shoreline. But the reefs pay a price for their work. Before Irma smashed into the Keys, many of its fringe and barrier reefs had been covered in hard and soft corals. Now, said Robert Nowicki, a postdoc research fellow at the Mote Marine Laboratory, the organization that runs the Elizabeth Moore Center, some of them had been “scoured almost to nothing, like the surface of the moon.” If there’s no new coral to replace the old, life as we know it along the world’s tropical coasts will almost certainly change. “Twenty-five-to-30-foot waves were hitting our reef during Irma,” Vaughan told me. “If those waves had not been smashed on the reef, then they would have smashed on our island, right here. I think our tallest buildings are 33 feet. So where would anybody run to?” In the past five years, all these disastrous consequences for reefs have pushed coral reef restoration to the forefront of marine science. The field is expensive and controversial, but today, it’s considered the tip of the spear in the fight to help coral survive into the next century. Scientists like Ruth Gates, director of the Hawaii Institute of Marine Biology, have recently made major strides in identifying and crossbreeding the genotypes, or genetic families, of each coral species that can survive the higher temperatures and acidification we can now expect in the coming years—temperatures and pHs that will kill and then dissolve many of the world’s less-hardy corals. The goal is to create a “super coral” that will survive an increasingly inhospitable ecosystem. Vaughan and his team are part of this search for genetically superior corals. But their main contribution is what Vaughan calls his microfragmentation program, which both clones corals and hacks the mechanisms for their growth rates. “We can fix things that we thought impossible ten years ago,” Gates told me when I asked her about Vaughan’s work. “Really, his techniques are at the center of the question, ‘How do we build a reef?’” Vaughan’s technique is absurdly simple: He uses a saw to chop healthy hard coral pieces into much smaller fragments; these grow back extremely quickly atop small concrete plugs and are then replanted in the sea. In essence, he’s created a sea-life version of Mickey Mouse’s broomsticks in the Sorcerer’s Apprentice. Smash them up, then watch them come roaring back with a vengeance. The technique is a vital one for the field. Coral’s biggest problems might be warming seas and rising acid levels, but those are magnified by a sad fact of life for corals: They aren’t very good breeders. “We actually didn’t know how corals reproduced until the 1980s,” Vaughan said. That’s because, as if adhering to some dirty fairy tale, corals breed only a few days a year, en masse, for around 30 minutes, shortly after the full moon in August, when they simultaneously fill the sea with their white, snowy-looking gametes in a single, very unkinky orgy. Because of this sex tactic, only one in a million potential baby corals is successfully fertilized and survives to become a juvenile. That means it takes some corals 25 or even 50 years to successfully reproduce. Given the rate of the ocean’s decline, that’s not going to produce the genetically superior corals nearly fast enough. “We’ve probably got 50 to 100 years to act with these resistant strains of coral,” Vaughan said. “If we still don’t change in 100 years, and it keeps getting hotter and hotter—there’s certainly a limit to everything.” Vaughan stumbled on his procedure five years ago when he accidentally broke a piece of coral in his lab and left it in the bottom of the tank. When he returned two weeks later, it and the other fragments had regrown to their original size. He’s still not sure exactly why this happens, but his closest analogy is our skin cells, which regrow quickly to cover a fresh wound but otherwise lay dormant. Using jewelry saws, Vaughan and his team started fracturing their lab-fertilized corals. Within three to six months, they could turn a single coral into 60 to 100 new organisms the same size as the original. The fractured corals continued to grow between ten and 40 times faster than coral in the wild, depending on their species. Then Vaughan made a much more important discovery. Because the polyps were technically all part of a single organism before they were fragmented, they were clones—and they would willingly reconstitute back into a larger organism, skipping ahead into maturity. “Usually, when corals touch each other, they start fighting, and they can kill each other,” Vaughan said. “But when we put 100 of the fragmented pieces next to each other that had come from a single original piece, they didn’t fight. They recognized each other as themselves. And they would actually start to fuse together, like skin grafting.” A piece of coral the size of a golf ball, fractured into 20 pieces replanted side by side, could produce a single large coral the size of a pizza just four to five years later. It worked in the wild, too. In four years, Vaughan could have a sexually mature coral the size of a football or a table—depending on how many individual pieces of coral he decided to combine—which would have taken a natural coral 25, 50, or even 100 years to grow. These quick-growing fragmented corals could be planted near one another in the wild to cross-breed and create uber-corals resistant to high water temperature, ocean acidification, and disease. When paired with the work of genetics-focused scientists like Gates, it would be like replanting a rainforest that could continue to proliferate, with offspring that grew bark strong enough to break a logger’s chainsaw. Vaughan set a goal to plant a million corals before he retired. He and his team grew their coral output exponentially, planted multiple offshore nurseries, began making their reef-growing techniques cost-efficient, and started working to score the major state grants needed to rebuild Florida’s reef industry. Then the hurricane hit. Working quickly, Vaughan and Slifka saved the vast majority of the coral plugs outside the Elizabeth Moore Center—some 5,000 out of nearly 7,000. Inside the lab, another 14,000 corals rode out the storm, along with a gene bank holding the most promising genotypes of all 28 coral breeds found in the Keys. Out in the field, acres of wild corals were sandblasted by the storm’s waves. One of the lab’s field nurseries for lab-fractured elkhorn and staghorn corals—more fragile, branching corals that look like antlers and are endangered in Florida—was almost entirely wiped out. “It was pretty disheartening,” said Erich Bartels, a staff scientist. “That coral was the result of 500 hours of work per person, per year, for seven years.” But another field nursery for the lab’s elkhorn and staghorn farther south fared much better, with only minimal losses. And the lab’s hardier boulder corals also had a higher survival rate. “All we can do is plant as many good corals as we can," said Nowicki, "use the numbers game, and spread everything out so that a single storm can’t destroy everything we’ve done.” Vaughan still says he won’t retire until he plants his million corals worldwide. Upscaling the process is beginning to pay off. The cost per coral has dropped from around $1,000 a piece to only $20 a piece, thanks to more efficient methods. The lab already has grants to plant between 25,000 and 50,000 corals in 2018, and by spreading his techniques to local coral restoration labs worldwide, Vaughan hopes to quickly catapult those numbers into the hundreds of thousands per year. He and his team are hoping to change the public’s attitude toward saving reefs, which, since the Great Barrier Reef’s die-off in 2015, has shifted toward hopelessness. “One of the things that disheartens me the most is people saying, ‘Oh, we’re screwed. Planet’s over. There’s nothing we can do,’” Nowicki said. “There are things we can do. But you have to have the courage and the resources to go out and try.” On my last day at the lab, I found Frank Slifka, the maintenance man who stayed behind to weather Irma with Vaughan. Slifka was working in the bowels of the facility, where the tidal surge had swept through during the storm, cleaning up and keeping track of diving equipment in metal wire cages. “People ask why we stayed behind,” Slifka told me, shaking his head. “We weren’t trying to be brave or heroic or anything like that. We just decided that if we were really here to save the coral, then that’s simply what we needed to do.”
<urn:uuid:2ef48932-772c-49e0-ab0c-7473897315fd>
CC-MAIN-2020-16
https://www.outsideonline.com/2278926/coral-lab
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.961139
3,426
2.609375
3
In 2012, 5,560 people ages 65 and older were killed and 214,000 were injured in motor vehicle crashes. These older individuals made up 17% of all traffic fatalities and 9% of all people injured in traffic crashes during that year. Compared to 2011, fatalities among seniors and injured people in this age group increased by 16%. 9 Summer Driving Safety Tips for Seniors: - 1.Plan ahead: check weather conditions to make sure you feel comfortable driving in the predicted conditions. - 2.Give yourself extra time and take regular breaks - 3.Be prepared for emergencies: travel with a first-aid kit and the essentials if you get into an auto accident. - 4.Pull over in emergencies wherever it is safe. - 5.Check your tires before heading out - 6.Keep a safe distance from the car in front of you to give yourself time to react if necessary. - 7.Get your eyes checked regularly to make sure you can drive safely. - 8.Avoid distractions such as the radio, cell phone, eating and or drinking. - 9.Look out for motorcyclists and bicyclists. These tips aren’t just for seniors. All motorists should follow the above simple safety tips for safe driving!
<urn:uuid:204ba6bb-c76f-4444-a064-bef36be90986>
CC-MAIN-2020-16
https://www.jmlawyer.com/blog/2014/07/25/9-tips-senior-drivers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.940037
259
2.953125
3
The Anthesteria celebrated two seemingly disparate things: wine and the dead. Both Dionysos and Hermes Chthonios (Hermes of the Underworld) were celebrated as part of this festival. In many ways, the Anthesteria is similar to our modern Halloween. The festival took part over three days, from the 11th-13th of the month of Anthesterion (late February to early March by our calendar), with each day being given a special name. Both ‘Anthesteria’ and ‘Anthesterion’ derive from the Greek word anthos (flower), relating to their springtime setting. It should be noted that women, children, and slaves participated in this festival, too. 11th Anthesterion: the Pithoigia The name of this day relates to its events and literally means, ‘the opening of the pithoi (storage jars)”. On this day people gathered at the Sanctuary of Dionysos in Limnais, but did not enter it, and opened the pithoi that contained the wine made from the last autumn’s grapes. The wine was then drunk. The drinking of the new wine on this day was quite sociable and moderate compared to the drinking which occurred on the second day. 12th Antheseterion: the Choes The Choes was the main day of the Anthesteria. The name of the second day refers to the shape of the vessels from which the wine was drunk, the chous. On this day city-wide drinking of wine at private parties occurred. There was even a drinking competition that the Archon Basileus oversaw. Aristophanes recalls the opening words of this contest: “Listen-up, people! In accordance with the ways of our ancestors, drink the chous on the sound of the trumpet! And he who downs it first will take away a wineskin…" Aristophanes, Acharnians, 1000-1002 This contest was no mean feat, as a chous could contain around three litres of wine. It is supposed that the custom of drinking wine during this day of the Anthesteria, with each man taking his own vessel and drinking it in silence, was based on the myth of Orestes. According to this mytn, when Orestes entered Athens after killing his mother, no one wanted to offer him their hospitality because he was polluted. But, feeling shame for him, they invited him in with a solitary hospitality, giving every diner an individual wine cup to drink from and enforcing silence throughout the dinner so as to distance themselves from Orestes. The normal custom when drinking at a dinner party would be to share wine from the host’s vessels while partaking in conversation and word games. At Euripides’ dinner party Orestes recalls his role in such traditions in no uncertain terms in Euripides' Iphigenia in Tauris: “I hear that my misfortunes have become a religious rite in Athens, And that they still maintain this custom, And that the people of Pallas honour the cup of the Feast of Pitchers [in reference to the chous and the Anthesteria].” Euripides, Iphigenia in Tauris, 958-960 The sacred marriage of the King Archon’s wife to Dionysus was enacted on this day in a staged ritual that began by bringing Dionysus into the city. It was also on the Choes that the Sanctuary of Dionysus in Limnais was opened up for secret rites (though it is possible the temple was open for slightly longer than a strict 24 hours). However, it was also believed that on this day the ghosts of the deceased walked the city. This meant that the Choes and the Chytroi were ‘unlucky’ days, and all other temples and business were closed during them. To protect themselves from these wandering spirits, the Athenians covered the doors of their houses with pitch and chewed hawthorn leaves. The ghosts would stick to the pitch if they tried to enter the house and the hawthorn had apotropaic qualities. 13th Anthesterion: the Chytroi The Chytroi was named after the pots that were filled with a porridge-like mixture (made from seeds and grains) that were dedicated to Hermes Cthonios by individual families on this day. At the end of this day, families would go round their household rooms and shout “‘Out the door [spirits]! Anthesteria is over.” Generally speaking, we do not know who these ghosts were or why they entered the world of the living during the Anthesteria. However, one specific sacrifice which took place on the Chytroi helps us to better understand the connection between the new wine of the season and the placating of the dead. On the last day of the Anthesteria, a meal was offered to Erigone, the mythological daughter of Icarius. Icarius was the mortal to whom Dionysus had famously given the gift of wine. However, after the death of Icarius, Erigone killed herself, hence giving a mythological precedent for the joint worship of wine and the dead. The Anthesteria was not as grand in its public processions and rituals as other Athenian festivals, such as the Great Dionysia or the Great Panathenaea. Much of the festival seems to relate to personal or familial activities, such as drinking in silence and not sharing one’s wine and the household sacrifices of porridge. Underlying the Anthesteria is the importance of wine in ancient Greece (while this definition relates to the Athenian festival, it should be noted that other Athensteria were celebrated by other Ionian cities). Wine was so important that Dionysos was celebrated each year for the creation of new wine. Furthermore, because the spirits of the dead roamed the city on the ‘unlucky’ 12th and 13th Anthesterion, the festival also reminds us that the Athenians, and the ancient Greeks more generally, were very superstitious.
<urn:uuid:0957b695-5524-42fd-b9d7-d491c5c6289e>
CC-MAIN-2020-16
https://dev.ancient.eu/The_Anthesteria/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.979703
1,282
3.15625
3
In many ways thinking of marketing as a tool to improve peoples lives especially in terms of healthier eating, more exercise and preventing illnesses doesn’t come easy. In fact, many people would argue that aggressive commercial marketingis the cause of many of the social problems we face today: from people eating less healthily, taking less exercise to taking up occupation in high stress environments or choosing high risk lifestyles. In this context, marketing, therefore, acts as a powerful “tool box” that may be usedto manipulate behaviour to achieve specific commercial and social outcomes. The true vale of social marketing lies in achieving “positive” goals in relation to health outcomes and other social and public aspects. In effect social marketing is the systematic application of marketing and other concepts and techniques to achieve specific behavioural goals for a social good Social marketing as a discipline started in the 1970s, and originally was based on the idea to use commercial marketing techniques in the public sector, often competing with the communication efforts already underway. Not surprisingly, the relationship was sometimes slightly rocky, with commercial marketing organisations often underestimating the complexity of achieving sustained behaviour change, while many practitioners in the health sector often underestimated the importance of communication. However, in the last decade, social marketing has evolved to a much more integrative approach for tackling social and health-related issues, often drawing on many disciplines to develop a holistic campaign to tackle a given issue. Using such a multi-disciplinary approach, social marketing has been successfully used in a variety of settings: from health related issues, such as smoking cessation, increasing uptake of health screening programmes, reducing alcohol use, encouraging healthier eating habits and more exercise to many other issues, such as increasing seat-belt usage, decreasing energy and water usage in homes, tackling low-level anti-social behaviour and reducing car usage. With its MA in Health & Social Marketing, Middlesex University is the first university in the UK to offer a dedicated degree in this exciting area of marketing. The programme draws on a variety of theoretical and practical backgrounds that engagesthe concept of value added social marketing. The department of Marketing in the Business School is unique in having expertise in this area of study. An additional strength of the programme is the wide mix of students with a varied background participating in the programme: many coming from a health or charity-related background and others joining from a public sector or commercial marketing background, both from the UK and overseas. This mix makes the programme valuable to students, in that they can take full advantage of their prior knowledge and share their experiences, build upon them and synthesise a unique integrative approach to social marketing issues. As the programme is also recognised by the Chartered Institute of Marketing (CIM), students have the opportunity to gain an additional CIM Professional Diploma in Marketing after they have graduated. In addition to the MA, Middlesex University also offers stand alone and tailor made Continuing Personal or Professional Development (CPD) programmes. For more information, please contact Dr Stephan Dahl by email: email@example.com
<urn:uuid:16bad37f-e214-4f50-bc1d-d54a526277ce>
CC-MAIN-2020-16
http://dahl.at/wordpress/research-publications/what-is-social-marketing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00355.warc.gz
en
0.956041
622
2.546875
3
- Budrus: Budrus is an award-winning feature documentary film about a Palestinian community organizer, Ayed Morrar, who unites local Fatah and Hamas members along with Israeli supporters in an unarmed movement to save his village of Budrus from destruction by Israel’s Separation Barrier. - Children of the Nakba: For Palestinians, the events between 1947 and 1949 are remembered as a time when Israeli military forces destroyed over 500 Palestinian villages and expelled between 700,000 and 900,000 Palestinians from their lands. Today Palestinians represent one-third of the global refugee and internally displaced population. Learn about the Palestinians, who call these events the Nakba, an Arabic word meaning catastrophe. - Encounter Point: Encounter Point follows a former Israeli settler, a Palestinian ex-prisoner, a bereaved Israeli mother and a wounded Palestinian bereaved brother who risk their lives and public standing to promote a nonviolent end to the conflict. - With God on Our Side: With God on Our Side examines the theology of Christian Zionism and demonstrates a biblical alternative that promotes peace and reconciliation for both Jews and Palestinians. - The Stones Cry Out: For more than 60 years the Palestinians, Christians and Muslims, have suffered displacement, expulsion, wars, occupation and oppression. The voices of Palestinian Christians have all too often been drowned out in the turmoil of events. This is their story, in their voices, from the Nakba of 1948 until today. - Occupation 101: Focusing on the current and historical root causes of the Israeli-Palestinian conflict, the film covers a wide range of topics, from the first wave of Jewish immigration from Europe in the 1880’s to the second Intifada of 2000, the separation barrier and the Israeli withdrawal from Gaza, as well as many heart rending testimonials from victims of this tragedy. - Peace, Propaganda, and the Promised Land: This film provides a striking comparison of U.S. and international media coverage of the crisis in the Middle East, zeroing in on how structural distortions in U.S. coverage have reinforced false perceptions of the Israeli-Palestinian conflict. *Taken from the MCC Palestine Update blog.
<urn:uuid:c8686199-7c96-4713-953e-f53227c8aa81>
CC-MAIN-2020-16
https://mennopin.org/resources/sunday-school-curriculum/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.927697
444
2.796875
3
Alberta's Irrigation – A Strategy for the Future (the Irrigation Strategy) is intended as a guidance document to help focus the efforts of Alberta Agriculture and Forestry Irrigation and Farm Water Branch over the next 10 to 20 years. It outlines how the Branch will support the irrigation sector through research, information development, policy development, and programming. Although not a part of the South Saskatchewan Regional Plan, the Irrigation Strategy is intended as a companion document, and supports the goals of the SSRP. Most recent report: Alberta's Irrigation – A Strategy for the Future – 2016/17 Strategy Measures (PDF, 1.0 MB) Water storage and supply Water Storage Opportunities in the South Saskatchewan River Basin in Alberta Through funding from the Irrigation Council, a consultant was contracted to investigate the opportunities for developing additional storage to improve future water security in southern Alberta. After reviewing previous studies and doing additional modelling and analysis, this study determined there is limited opportunity for additional water storage in southern Alberta. The consultant (AMEC) reviewed existing studies and conducted modelling within the boundaries of current regulations and apportionment agreements. South Saskatchewan River Basin in Alberta Water Supply Study Water supply in the South Saskatchewan River Basin (SSRB) in Alberta is naturally subject to highly variable flows. Capture and controlled release of these flows is critical in the management of the available water supply. Expanding population, economic growth and climate variability add additional challenges to managing our limited water supply. Previous analysis in the SSRB in Alberta Water Supply Study (AMEC 2009) identified remanagement of existing reservoirs and the development of additional water storage sites as potential solutions to SSRB water management challenges. - Summary Report (prepared by Alberta Agriculture and Rural Development) (PDF, 1.7 MB) - Main Report (prepared by AMEC Earth and Environmental) (PDF, 3.9 MB) - Technical Memoranda (prepared by AMEC Earth and Environmental) (PDF, 2.5 MB) Nutrient Beneficial Management Practices Evaluation Project Nutrients and the management of nutrients are critical for crop and livestock production. However, when not managed effectively, nutrients from agricultural systems can be lost to surface water bodies resulting in reduced water quality. Many beneficial management practices (BMPs) have been promoted and adopted to improve environmental sustainability of agricultural practices in the province, though there is limited information about the effectiveness of BMPs under Alberta conditions. Development of a watershed approach to BMP implementation required the collective support of area residents and ongoing communication to share concerns and develop solutions. - Final Report—Executive Summary - Final Report, Volume 1—Summary and Recommendations - Final Report, Volume 2—Field Study - Final Report, Volume 3—Modelling Study Alberta Phosphorus Watershed Project: 2013 to 2017 Nutrients, such as nitrogen (N) and phosphorus (P), in manure and inorganic fertilizers benefit crop production; however, surface runoff can wash valuable crop nutrients into streams and water bodies if nutrients are not managed effectively. Excess nutrients in streams can lead to water quality concerns including excess plant and algae growth, fish kills, and odours. Livestock Manure Impact on Groundwater Quality in Alberta Agricultural manure management activities can contribute nitrogen, phosphorus, organic carbon, salts, and pathogens to groundwater. Recent reviews suggest that manure field application and storage facilities may pose a risk to groundwater quality in Alberta. However, little Alberta specific information exists. Alberta Agriculture and Forestry and partners implemented a 7-yr study to determine the potential risks of intensive livestock production to groundwater quality in Alberta. Water Quality in Alberta's Irrigation Districts Alberta has the largest irrigated area in Canada with nearly 680,000 hectares of irrigated land. More than 80% of this area is in 13 irrigation districts. Within Alberta's irrigation districts, there are more than 55 reservoirs and approximately 8,000 km of conveyance works, including canals and pipelines, which carry nearly two-billion m3 of water per year. Good quality irrigation water is needed for all uses. Irrigation water is not only essential for agricultural production, it provides municipal water for more than 40 communities plus thousands of rural residents in Alberta. The irrigation infrastructure also provides habitat for wildlife and numerous recreational activities such as fishing, camping, and golfing. Water Quality in Alberta's Irrigation Districts – 2011 to 2015 (Annual Report – 2014) Previous annual reports (PDF, 2011, 2012, 2013) are available upon request. Assessment of Water Quality in Alberta's Irrigation Districts 2006 and 2007 Economic Value of Irrigation in Alberta Irrigation in Alberta, which began in the late 1800s, now takes place on about 690,000 hectares. This represents almost 70% of Canada’s total irrigated area. The majority of Alberta’s irrigation (566,000 hectares) occurs within the 13 irrigation districts, which are in the South Saskatchewan River Basin. An additional 125,000 hectares are irrigated throughout the province as private developments. - Report (PDF, 7.5 MB)
<urn:uuid:09d24862-fa3b-4c8a-9e03-5a87ca6b763c>
CC-MAIN-2020-16
https://www.alberta.ca/irrigation-strategy.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.915237
1,061
2.5625
3
The city has never shifted location from its origins despite that the area & the style of her buildings from time to time changed due to many sad episodes. Our city must have been spacious & full of wonderful buildings in the period of her greatest splendour, and its worth stating that at first she was confederated as a colony & then as a Roman Municipality. (4). By the side of the Romans the Histonians fought against Pyrrhus, king of Epirus, at the command of their fellow townsman Osidio Oplaco, killed in battle by Macedonians allied to Pyrrhus. Its was again with the Romans against Hannibal, who for revenge destroyed the Campidoglio of Histonium, which was later rebuilt by the Romans at their expense, as shown on a stone found in 1771 and now preserved at the Museum. Concerning the language that the Istonians used we only have generic information until the period of the Lombards. In the countryside the local language continued to be used until they became Roman colonies. From that moment it was indispensable to adopt the Latin language.Into the Latin language there was the influence oif the Lombards. (4) The Municipalities originally were cities close to Rome in strong allied bonds, and their inhabitants that lived in the city enjoyed the “jus connubi et commercii”, the right to marry & do business. After the Latin war of 338 BC the Municipalities were incorporated with Rome, but several continued to subsist in the original conditions, others had full citizenship with the right to vote, extended later to all the “cives” – citizens.
<urn:uuid:51f725b7-1107-48fe-b7c9-c33a80d418b2>
CC-MAIN-2020-16
https://vastesiworld.org/history/roman/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.980075
343
3.078125
3
Black hole found spinning at such a speed it could BREAK the laws of physics A BLACK hole has been spotted spinning so fast it is almost BREAKING the laws of physics. Indian space agency Tata Institute of Fundamental Research (TIFR) reported a black hole within the Milky Way is spinning so fast it is changing the face of space around it. The black hole, found in the binary star system called 4U 1630-47, was spotted thanks to the X-rays it was emitting by India’s AstroSat and Nasa’s Chandra X-Ray Observatory. Albert Einstein theorised in his famous theory of relativity that nothing can move faster than the speed of light – 670 million miles an hour (299,792,458 metres per second). However, the black hole, which was originally observed in 2016, is close to breaking this universal limit as it spirals at 90 percent of this speed. The rapid movement of the black hole is causing gas, dust and other celestial debris to be sucked in by the entity at a more rapid pace than usual. However, this also meant it was spewing more materials out in the form of X-rays which made it easier to observed. Speaking to the Hindustan Times, Sudip Bhattacharyya of TIFR, and principal investigator of Astrosat’s Soft X-ray Telescope (SXT), said of the results which will be published in next month’s Astrophysical Journal: “As black holes get created, mass and spin rate are two properties that characterise them. “Mass can be measured more easily as it has a long-range effect because of gravity as the black hole gets created.” Simulation reveals what a journey into a black hole looks like Only four black holes have been found to spin at such an extreme pace. The first was discovered in 2008 using NASA’s Chandra X-ray Observatory. Lead author Rodrigo Nemmen said at the time: “We think these monster black holes are spinning close to the limit set by Einstein’s theory of relativity, which means that they can drag material around them at close to the speed of light. Black holes consumer everything in their wake “Conditions around a stationary black hole are extreme, but around a rapidly spinning one would be even worse.” Co-investigator Richard Bower of Durham University added: “Extremely fast spin might be very common for large black holes. “This might help us explain the source of these incredible jets that we see stretching for enormous distances across space.”
<urn:uuid:ff5dfdcb-e1c8-49ed-9843-b582638c8ea5>
CC-MAIN-2020-16
https://brucelandonblog.wordpress.com/https-www-express-co-uk-news-science-1042771-physics-news-space-black-hole-speed-of-light-nasa-tifr-albert-einstein/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.94809
542
3.4375
3
On Friday April 17th, five Bronx children were hospitalized after taking Excedrin under the impression it was candy. The second grader who passed out the pills also took one, believing it was candy. When the children were back in class, the effects ranged from stomach aches to passing out. It all started very innocently, giving out and accepting candy from friends. Yet this case of accidental poisoning could have been prevented if proper safeguards had been in place. Children Can Die From Being Poisoned According to the CDC, over 300 children between the ages of 0-19 are hospitalized every day due to poisoning. At least 2 children die every day from poisoning, nationwide. This is a devastating statistic, and might leads parents to feel very insecure about the issue. Meanwhile, the website Poisoning.org revealed in 2013 that nearly 1,500 children were exposed to poisoning from pain medications. That’s at least 4 children a day who are accidentally poisoned from pharmaceuticals like Excedrin. Preventing Accidental Poisoning An important thing to do with your own child to try and prevent this from happening them is to talk to them. Be clear about the difference between candy and medicine, and teach them not to accept food from others. In your own home, make sure to lock up and hide all medications, even over the counter drugs (like Excedrin.) The CDC also recommends that parents keep the number for the nationwide poison control center phone number, 1-800-222-1222 into their mobile phones in the event of an emergency. If the child is conscious and alert, call poison control, if the child is unconscious and unresponsive, take them to the emergency room at the nearest hospital.
<urn:uuid:f58e4040-130c-4c61-b6f8-ed1341089e25>
CC-MAIN-2020-16
https://pulversthompson.com/bronx-accidental-poisoning/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.970178
350
2.984375
3
of our learners would recommend us of learners say they have developed skills that help them in the workplace of employers would recommend us of Traineeship learners have developed their careers as a result of the programme Autism awareness week – how can you make a difference? We are marking World Autism Awareness Week 2019 by encouraging everyone to get involved in creating a better world for people with autism. There are around 700,000 people in the UK who are on the autism spectrum, and 1 in 10 young people are living with autism. Autism is a lifelong developmental disability that affects how people perceive the world and interact with others. This can mean they see, hear and feel the world differently to others. Autism is what is known as a spectrum condition, meaning it affects individuals in different ways. Some autistic people, for example, also have learning disabilities, mental health issues or other conditions. Here are some key facts about autism in the UK: - There are around 700,000 people on the autism spectrum in the UK – that’s more than 1 in 100. - 34% of children on the autism spectrum say that the worst thing about being at school is being picked on. - At least one in three autistic adults are experiencing severe mental health difficulties due to a lack of support - Only 16% of autistic adults in the UK are in full-time paid employment, and only 32% are in some kind of paid work - 17% of autistic children have been suspended from school; 48% of these had been suspended three or more times; 4% had been expelled from one or more schools At Aspiration Training, we believe that a little knowledge and understanding can go a really long way, and can help to improve some of the above statistics. Having a clear understanding of the misconceptions, diagnoses and support surrounding autism are just some of the essential skills needed when working in childcare, teaching or health and social care. We offer a fully funded and nationally recognised qualification ‘Certificate in understanding autism’ which can really help to start understanding autism.
<urn:uuid:4e978ccb-ca34-4d63-b420-73cf888659f3>
CC-MAIN-2020-16
https://www.aspirationtraining.com/autism-awareness-week-how-can-you-make-a-difference/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.973412
426
3.25
3
One-in-seven adults and one-in-five children in the United States live in poverty. Individuals and families living in poverty not only lack basic, material necessities, but they are also disproportionally afflicted by many social and economic challenges. Some of these challenges include the increased possibility of an unstable home situation, inadequate education opportunities at all levels, and a high chance of crime and victimization. Given this growing social, economic, and political concern, The Hamilton Project at Brookings asked academic experts to develop policy proposals confronting the various challenges of America’s poorest citizens, and to introduce innovative approaches to addressing poverty. When combined, the scope and impact of these proposals has the potential to vastly improve the lives of the poor. The resulting 14 policy memos are included in The Hamilton Project’s Policies to Address Poverty in America. The main areas of focus include promoting early childhood development, supporting disadvantaged youth, building worker skills, and improving safety net and work support.
<urn:uuid:eb8595e6-4034-4f05-bab3-58ad41e9d9a4>
CC-MAIN-2020-16
https://www.brookings.edu/book/policies-to-address-poverty-in-america/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.942735
195
3.359375
3
Community Based Programs Keeping healthy is easier when you don’t have to go it alone. Communities all over the world are coming together together to make health a community responsibility. A key idea behind the Nutrition Toolbox is to “Find the Good and Praise It”. In this section of the toolbox, we will highlight programs that connect food and health in ways that are innovative, effective, and sustainable. American Community Gardening Association American Community Gardening Association is a membership organization for urban and rural community gardening. The non-profit’s mission is to create and enhance community, food access, and nutrition through gardening. If you live in St. Louis, Missouri, a bus brimming with fresh produce may just turn up in your neighborhood or at your job. Public Health Advocates Public Health Advocates is a public health organization working towards the promotion of well-being in communities through the elimination of health disparities and advocating for public health driven policies. Their recent policy brief predicts that a majority of California adults (55%) now has diabetes or pre-diabetes. See their policy recommendations on overweight, obesity, and diabetes. Campaign for Food Justice The Campaign for Food Justice promotes food justice on the community and policy levels supporting the right to food. The organization works to improve public food access on the local level while advocating to end the exploitation of food and agriculture systems. The Suppers Programs There are so many great organizations around the country working to create change in the food system but one of them shines bright. The Suppers Program has been helping people with many different food-related challenges overcome these bumps and live a healthy life through eating real food and building a close-knit community. Founded by Dorothy Mullen and located in Princeton, New Jersey, the Suppers Programs envisions “a world free of suffering caused by processed food.” The mission of Suppers is “to provide safe and friendly settings where anyone — and especially people with food-related health challenges — can develop and manage their own personal transitions to a healthier life.” The Suppers Programs is a community based program that can be seen as a “social experience” and thrives on the currency of love and community. Participants in the program gather usually in a private home and cook a real meal together while a volunteer facilitator presides over the meal. A discussion, presentation, or reading may take place afterwards that help guide the participants through the right path. Mullen developed this concept after many pilot sessions to answer the question: How do people manifest healthy change in their lives given the tools of nourishing food and social support? The answer: “First practice non-judgment.” Practicing non-judgement is just one of the four principles that support the Suppers Programs’ mission. The other three are: whole food preparation, no commercial messages, and restoration of the family table. The program also focuses on the idea that “how you feel is data.” It is essentially the idea that whatever symptoms you are feeling such as fatigue, depression, or insomnia are all part of a bigger problem that you have the ability to change. They use the scientific data to translate what you are feeling into data that can be used to help you overcome these feelings, eating healthier, and living a healthier life. Dorothy is a champion in the world of food system change and it is exciting to see where she will go in the future. The Suppers Program is a model organization that should be followed by others and is creating necessary change in our food system that will benefit the lives of many people and improve the long-term health of those involved. “The Suppers Programs has figured out a way to put love back in the recipe for food and health, and the results are impressive.” – Wolfram Alderson The Suppers Programs’ 10 Points of Supported Change: - Learn to cook real food. - Develop a palate for real food. - Come to desire the foods that make you well while you… - Let go of the foods that keep you sick, fat, depressed, or addicted. - Come to understand that how you feel is data and that you can rely on your body to tell you which foods are the healthiest for you. - Give and get social support while you experiment and distinguish treats from triggers and… - Practice living according to your intentions instead of your impulses. - Make a habit of eating the foods that keep you on your path. - Live in the spirit of nutritional harm reduction because none of us lives in a perfect food world. - Provide the experience for others.
<urn:uuid:30267b42-a93b-48dd-a6bb-bca15fa4f093>
CC-MAIN-2020-16
http://www.nutritionhub.org/health/community-based-programs/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.942387
961
2.984375
3
Ages Three – Six In the original Italian, Dr Maria Montessori coined the words casa dei bambini, which translates to Children’s House. We use the term Children’s House to designate a Montessori preschool because we do not view it as “pre” school. We see it as a very relevant “school” that meets the child’s physical, emotional and intellectual needs between the ages of three and six. What are the elements of the Montessori approach that create a unique learning environment? Let us suggest a few… Liberty is essential to learning. Through free choice children express and strengthen their individuality, fostering the development of self confidence and integrity. Freedom of choice reinforces the construction of a healthy and vibrant will as well as independent thinking. Montessori explains, ‘”The child ‘constructs’ his (or her) own will by a process of self education … developing the will by making decisions.” Montessori learning strategies for all developmental stages call for the inclusion of purposeful activity – activity which connects the intellect with real to life experiences. The didactic materials that are found in Montessori environments are tools for reflective action. They are meaningful in that they draw the learner into relationship. They are not ‘tools for teaching’ as much as they are experiences upon which one constructs personalised theory. Knowledge is created through the transformation of experience. The boundary of liberty is the domain of the responsibility. Every child needs opportunities to acquire social, physical and moral responsibility. In the Montessori learning environment responsibility. In the Montessori learning environment responsibility is developed through experience and natural consequences. Children are provided opportunities through social life activity to align themselves with the highest values needed in a democratic society. Communion is a basic human need to belong. It is an act of sharing that creates a context for personal and group meaning. A healthy community that requires the nurturing of deep communication skills – skills that honour children as individuals and ones that create a safe space for listening, hearing and honest dialogue. Love is not only the attractive force that compels us to be with each other, it is a continuum of respect and reverence for life and the unfolding potential of humanity. Without love, learning is reduced to a method or a subject and the field of experience is limited. Montessori explains, “A teacher must not imagine she can prepare herself for this vocation simply by acquiring knowledge and culture. Above all else she must cultivate a proper attitude to the moral order.” In every school subject there is an activity of love. It is this spiritual component which differentiates a Montessori class from a class that uses Montessori materials. Children’s House Curriculum A Montessori three to six environment includes these general areas: Exercises having to do with care of self, the environment and concern for others. Concentration and co-ordination are developed. Grace and courtesy skills are practised. Exercises having to do with sense discrimination, observation and descriptive language. A clear approach fosters the continuing effort of children to categorise and organise the qualities of the world around them. Activities having to do with receptive and expressive language. Young children are interested in writing and reading. Given the opportunity, most children are ready to learn to read by age six. Activities having to do with counting and number relationships, including an overview of the function of the decimal system. Careful design of materials in the mathematics area and in the sensorial area lays the groundwork for the future learning in algebra and geometry. Experiences that provide children with information about geography, history, music, art, science and nature study. Other areas of interest or knowledge from the hobbies or occupations of our community are explored as well. Children attend core hours: 8.30am to 3.00pm, however depending on the individual needs of each child, especially the 3 year olds, there is the opportunity to start at ½ days and work toward full days. Lillard, Paula Polk. ‘Montessori, A Modern Approach’ Montessori, Maria. ‘ The Absorbant Mind’ Montessori, Maria. ‘The Secret of Childhood’
<urn:uuid:14a4f3d4-a73b-4436-9e59-ae43211799c1>
CC-MAIN-2020-16
https://www.novamontessori.school.nz/childrens-house/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.942877
892
3.8125
4
ALL >> Education >> View Article Why Education Is An Essential Aspect Of A Child's Life? As is a candle, the teacher burns itself to illuminate the world. The importance of education in the world, and more specifically in India, cannot be overstated. Education broadens our horizons and teaches us critical thinking; it expands our intellectual capacity and mental resilience. And so, organically, we arrive at the question: Why is education an essential aspect of a child’s life? Education trains us and challenges us in every aspect of our personality. It moulds our character by stone, it develops and pushes a child’s mind to its utmost capacity and instils in them a great love for lifelong learning and wisdom. Without education, a child could almost always never reach their full potential. Education opens up new opportunities for everyone and rewards the diligent. Education teaches us virtues in life such as: wisdom, justice, fortitude and temperance. Education teaches young kids how to be leaders and independent givers to society. It cultivates creativity and stifles ignorance. Child education in India teaches our young the importance of love. And as love grows within the soul, so does beauty. For love is the beauty of the soul. Moreover, education grows and builds the intellect of the individual. Success and service to society presupposes the maturity and wisdom of the mind. As we grow in knowledge and gain new perspectives, we consequently flourish in our intellect and in our ability to make better decisions, in wisdom and prudence. Knowledge precedes understanding, as such education brings us understanding not only of the external world, but also the understanding of ourselves and our wants in life. And with greater understanding, comes the ability to better lead our lives, to better know how to examine ourselves and know our direction in life. To better comprehend how to serve society better and realize the important things in life, and thus, be at ease with the ever-increasing pace of the world. It seems that a great many virtues in life can be ascribed to a great education. Thus, making child education in India and elsewhere a necessary element of early growth and development. Education makes us wise. No man becomes wise by accident, it can only be learned. Hence, it is abundantly clear to The Akshaya Patra Foundation that education is one of the most essential facets a child can possess early on. Success or a life worth living it seems, implied, or included, or even absolutely demanded education. And so, we have asserted the importance of education in India. Numerous NGO in India are enabling great strides for education in India, helping the government revamp the curricula and training better teachers. However, we shall not skip over the significance of the mid-day meal towards child retention rates in schools. With the food provided by The Akshaya Patra Foundation, everyday more than 17 lakhs children across 12 states in India can attend school and accumulate education in India. The organisation’s charity work is made possible by government subsidies and corporate and private donors alike. Donate to children today through Akshaya Patra’s website: https://www.akshayapatra.org/onlinedonations. Your contributions go towards investing in a brighter and more educated India. Invest in a better India today. I'm a social volunteer, lives in Bengaluru. I do work for NGOs to make society better. Currently I'm working for The Akshaya Patra Foundation. It's an NGO in India which provides wholesome nutritious mid-day meals to government school children to end classroom hunger. https://www.akshayapatra.org/ Education Articles1. Play Your Part So They Can Study Author: Daiko FHO 2. The 10 Most Recommended Overseas Education Consultants Author: insights success 3. What After An Mba? 4. Data Science Coaching With Spark And Scala 5. Analytical Or Interpretative Information About Ias Exam Author: fasal praveen 6. Think Of Us And We Tell You Why? Author: Roy Hudson 7. Degree Or College: Which One Matters More? Author: BGS Vijnatham School 8. 5 Traits Of A Professional And The Best Study Abroad Consultant In India Author: Geeta Pundir 9. Best Nursery School In Faridabad 10. Best Ielts Centre In Gta 11. Grow In Your Career With Online Degree - Blockchain For Business Author: Block chain council 12. Rpa With Blue Prism Training In Noida Author: AShok kumar 13. Interior Designing College In Vijayawada Of Kift 14. Interior Designing Course In Vijayawada 15. Tiktok Owner To Use Blockchain Technology Author: Block chain council
<urn:uuid:86b21f7b-27e5-4847-a061-f76bc851a3a9>
CC-MAIN-2020-16
https://www.123articleonline.com/articles/1133733/why-education-is-an-essential-aspect-of-a-childs-life
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.914819
996
3
3
It is increasingly clear that the thousands of different bacteria living in our intestinal tract - our microbiome - have a major impact on our health. But the details of the microbiome's effects are still fairly murky. A Weizmann Institute study that recently appeared in Science suggests approaching this topic from a new angle: Assess how fast the various bacteria grow. This approach is already revealing intriguing links between bacterial growth rates and such conditions as type II diabetes and inflammatory bowel disease. The new computational method can illuminate a dynamic process such as growth from a static "snapshot" of a single sample, and thus it may have implications for both diagnostics and new avenues of research. Tal Korem and David Zeevi, research students in the lab of Prof. Eran Segal of the Computer Science and Applied Mathematics Department, led this research and collaborated with Jotham Suez, a research student in the lab of Dr. Eran Elinav in the Immunology Department, and Dr. Adina Weinberger, a research associate in Segal's lab. The study began with the advanced genomic sequencing techniques used in many current microbiome studies, which sequence all of the bacterial DNA in a sample. From the short sequences, they construct a picture of the types of bacteria and their relative abundance. But the Weizmann Institute team realized that this sequencing technique held another type of information. "The sample's bacteria are doing what bacteria do best: making copies of their genomes so they can divide," says Segal. "So most of the bacterial cells contain more than one genome - a genome and a half, for example, or a genome and three quarters." Since most bacterial strains have pre-programmed "start" and "finish" codes, the team was able to identify the "start" point as the short sequence that was most prevalent in the sample. The least prevalent, at the other end of the genome, was the DNA that gets copied last. The researchers found that analyzing the relative amounts of starting DNA and ending DNA could be translated into the growth rate for each strain of bacteria. The group tested this formulation experimentally, first in single-strain cultures for which the growth rate could be controlled and observed, then in multiple animal model systems, and finally in the DNA sequences of human microbiomes, in their full complexity. Their method worked even better than expected: The estimated bacterial growth rates turned out to be nearly identical to observed growth rates. "Now we can finally say something about how the dynamics of our microbiome are associated with a propensity to disease. Microbial growth rate reveals things about our health that cannot be seen with any other analysis method," says Elinav. In their examination of human microbiome data, for example, the group found that particular changes in bacterial growth rates are uniquely associated with type II diabetes; others are tied to inflammatory bowel disease. These associations were not observed in the static microbiome "population" studies. Thus the method could be used in the future as a diagnostic tool to detect disease or pathogen infection early on, or to determine the effects of probiotic or antibiotic treatment. In addition, the scientists hope this new understanding of the microbiome will spur further research into the connections between the complex, dynamic ecosystem inside of us and our health. Also participating in this research were Tali Avnit-Sagi, Maya Pompan-Lotan, Nadav Cohen and Elad Matot in Segal's lab; Christoph A. Thaiss and Dr. Meirav Pevsner-Fischer in Elinav's lab; Dr. Ghil Jona and Prof. Alon Harmelin of the Weizmann Institute; Dr. Alexandra Sirota-Madi and Prof. Ramnik Xavier of Harvard Medical School and the Broad Institute; and Prof. Rotem Sorek of the Weizmann Institute. Dr. Eran Elinav's research is supported by the Abisch Frenkel Foundation for the Promotion of Life Sciences; the Gurwin Family Fund for Scientific Research; the Leona M. and Harry B. Helmsley Charitable Trust; the Crown Endowment Fund for Immunological Research; the Adelis Foundation; the Rising Tide Foundation; the Vera Rosenberg Schwartz Research Fellow Chair; Yael and Rami Ungar, Israel; John L. and Vera Schwartz, Pacific Palisades, CA; Alan Markovitz, Canada; Leesa Steinberg, Canada; Andrew and Cynthia Adelson, Canada; the estate of Jack Gitlitz; the estate of Lydia Hershkovich; and Mr. and Mrs. Donald L. Schwarz, Sherman Oaks, CA. Dr. Elinav is the incumbent of the Rina Gudinski Career Development Chair. Prof. Eran Segal's research is supported by the Adelis Foundation; the Cecil and Hilda Lewis Charitable Trust; the European Research Council; Mr. and Mrs. Donald L. Schwarz, Sherman Oaks, CA; and Leesa Steinberg, Canada. The Weizmann Institute of Science in Rehovot, Israel, is one of the world's top-ranking multidisciplinary research institutions. Noted for its wide-ranging exploration of the natural and exact sciences, the Institute is home to scientists, students, technicians and supporting staff. Institute research efforts include the search for new ways of fighting disease and hunger, examining leading questions in mathematics and computer science, probing the physics of matter and the universe, creating novel materials and developing new strategies for protecting the environment.
<urn:uuid:2e4aea8f-7ffd-418d-8436-8a44f4db04cb>
CC-MAIN-2020-16
https://www.eurekalert.org/pub_releases/2015-09/wios-hdy090215.php?src=organic&q=whether
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.923826
1,117
3.609375
4
The Golden Days of Truckee's Glorious Winter Carnivals By Guy H. Coates By Guy H. Coates Truckee has always known how to throw a party. Local history tells of winter carnivals in some form every year since 1909. C.F. McGlashan, teacher, newspaper editor, lawyer, scientist, author, politician and historian of the Donner party tragedy, masterminded the idea. He decided that the town needed a major tourist attraction. In the winter of 1893-1894, McGlashan supervised the construction of the first ice palace, smack dab in the center of town. It was made of chicken wire, which he repeatedly sprayed with water that would freeze and produce a solid wall of ice. The earliest ice palace was nearly a fifth of a mile around with walls 50 feet high. Inside was an oval ice skating course. At one end of the palace was a tower from which excited tobogganers could slide down to street level. Nobody seemed concerned that this monstrous creation covered more than half the main street, blocking horse and sleigh traffic. The success of the first ice palace resulted in similar edifices being fashioned in later years, becoming a major draw for thousands of visitors who passed through the town by train. The idea evolved into the earliest winter carnivals. In 1913 plans were made for the largest winter carnival ever held in Truckee. The event was so special that townspeople named it “Fiesta of the Snows.” The goal was to pump up the local economy by bringing thousands of winter tourists to Truckee. In November of that year, the chamber of commerce decided that a permanent ice palace was needed. Plans called for a massive structure, the grandest ever, to be constructed of expanded metal, so that when it became cold enough it could be sprayed with water to form ice which, when decorated with lights, created the illusion of a grand ice palace. A corporation was formed to acquire land at the west end of today’s southwest river street, below Hilltop. A new footbridge was built across the river so people could easily walk to the palace from town. A committee, composed of Bert A. Cassidy, Tim O’Hanrahan, P.M. Doyle, J.G. Kirchner, Ben Kiernam and Charles Siegle was appointed to make sure the project was completed before the first snowfall. The chamber of commerce provided $10,000 for the project, a tidy sum in those days. The new ice palace was gigantic. It included an ice-skating rink, a dance hall and a number of cozy rooms with fireplaces for people to rest after a day of playing and frolicking in the snow. Two new toboggan runs were constructed providing exciting rides of over a mile long from Hilltop down to the front of the ice palace. A special pull-back lift was already in place to lift the eager tobogganers back up the hill. Many old-timers still believe that this was the first mechanical lift of its kind in the country. On December 11, 1913, the new ice palace was completed. Diverting water into the building from a natural stream flooded the ice skating rink. As a final touch, the exterior walls were lighted up in brilliant colors and the interior was decorated with hundreds of fresh roses. A large “Ice Palace” sign was placed on top of the building and another sign over an arched entry greeted visitors with the words, “Glad-U-Kum.” Nearly every building in town was handsomely decorated with red and white ribbons, adding to the carnival atmosphere. Amid great fanfare, opening day was held on December 27th. Everyone who helped with the project attended the festivities. The chamber of commerce hired a special orchestra featuring six Hawaiian musicians dressed in colorful winter costumes and featuring a beautiful Hawaiian princess who sang in her native language. Members of the San Francisco Chamber of Commerce were invited and arrived on special trains. Every hotel in town was full while local merchants enjoyed record profits. Reporters from major newspapers were on hand to cover the event. By nightfall the festivities were enhanced by a huge lighted outdoor Christmas tree on top of the hill, which, along with the ice palace below, illuminated the landscape with a wonderful winter glow. Horse drawn sleighs jingled, as delighted visitors were taken on moonlight excursions from Truckee to Donner Lake and back. The Festivals Association of the Pacific Coast praised Truckee for its tremendous efforts. Newspapers in San Francisco provided extensive advertising and the Central Pacific had to increase the number of special trains. Large groups, including the Rotary and Eagles clubs, arrived in town on their own chartered trains. The new ice palace and winter carnival of 1913 was such a success that an even larger event occurred in 1914-1915. This event featured sled dog racing and a memorable visit by writer Jack London. Winter sports had become a major event in Truckee. Truckee’s last great winter ice palace burned to the ground in 1916. The pond that remained continued to be used for ice-skating, but was difficult to keep cleared of snow. In 1958, N.F. Dolley, president of the Truckee Chamber of Commerce, explored the possibility of erecting some sort of icy creation for the tourists expected to arrive for the 1960 Olympic Games, however his dream was never realized. Again, in 1994, much excitement arose when a marketing firm considered building a modern ice palace on land across from the C.B. White House, however, due to concerns over costs and liability, the idea never became a reality. Today, only a mountain meadow remains where the grand old ice palace once stood. In the summertime wildflowers grow alongside the stream, which once flooded the ice rink. Only a few old timers remain who can tell about the toboggan slide and those glorious winter days filled with youthful friendship and endless fun.
<urn:uuid:96245167-cef6-432f-8c45-e05b46bdc467>
CC-MAIN-2020-16
https://www.truckeehistory.org/winter-carnivals.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.976287
1,257
2.546875
3
You are here Do Black Holes Distort Time? Ten years after his theory of special relativity debunked the myth of the unchanging nature of time, Einstein repeated the feat with his theory of general relativity. In 1905, he showed that a clock on board a moving vehicle 'lost time' compared to a stationary one. And in 1915, he predicted that, in the same way as speed, the gravitational field generated by a massive body would slow clocks down, all the more so as the clock approached the body in question. More than forty years before the launch of the first satellites, this prediction, known as the "Einstein effect," was as daring as it was difficult to prove, especially as the effect seemed relatively negligible in the gravitational fields generated by the celestial bodies (stars, planets, etc.) observed by the astronomers of the time. And although black holes had been predicted by the equations of general relativity, it was only in the 1970s that their existence was actually proved. Increasingly accurate corroboration It wasn't until 1959 that two researchers at Harvard University, Robert V. Pound and Glen A. Rebka, provided the first empirical corroboration of the phenomenon of time dilation through a ground-based experiment. Further confirmation came in 1976, when the Gravity Probe A spacecraft, carrying an ultra-accurate atomic clock, was launched into space to an altitude of 10,000 kilometers. The data showed that, for the instrument, time had speeded up—by approximately 40 microseconds per day at its most distant point—compared with a stationary clock back on Earth. This effect also had to be taken into account when using geo-positioning systems such as GPS, which are based on the comparison of time-series data provided by atomic clocks on board a constellation of satellites. In fact, GPS not only corroborates the theory of general relativity but is also, for now, one of its only applications for the general public. However, since the slightest departure from Einstein's predictions could open the way to a new physics, physicists are keen to improve the accuracy of measurements as far as possible. It is with this goal in mind that the PHARAO atomic clock will be installed on board the International Space Station in February 2017, at an altitude of 400 kilometers. A core component of the ACES (Atomic Clock Ensemble in Space) experiment, it will be able to measure gravitational redshift with fifty times less uncertainty than that of Gravity Probe A. "This will be the first time that such an accurate clock has been put into orbit," enthuses Peter Wolf, in charge of analyzing ACES data at the SYRTE laboratory,1 who took part in the design of PHARAO. What makes this clock so accurate? Like all atomic clocks, PHARAO measures time according to the excitation of atoms, whose oscillations are the equivalent of the ticking of the second hand of a watch. However, in this clock, the atoms "are cooled down by a laser to a temperature close to a microkelvin, which is very near absolute zero," Wolf explains. "This slows their motion, enabling us to observe them better and providing us with a more accurate measurement of time." In addition, a system makes it possible to compare the PHARAO clock with its twins back on the ground via radio. As a result, this "cold-atom fountain" clock will be able to quantify time dilation with a margin of error of only one second in 300 million years. Black holes, the ultimate test of general relativity "Einstein's theory works extremely well in a weak gravitational field, for instance when it is studied in the vicinity of the Earth," explains astrophysicist Guy Perrin, "but it hasn't yet been tested in an extremely strong field, such as that found near a black hole." And yet at the heart of our Galaxy, a supermassive black hole called Sagittarius A* is four million times more massive than the Sun. This will give Perrin and his team at the Laboratory for Space Studies and Instrumentation in Astrophysics (LESIA)2 the chance to confirm the presence of a black hole and to measure its effects in a strong gravitational field, in other words, in the near-immediate vicinity of the object. Located 26,000 light years away, its apparent size in the sky can be compared with that of two one-euro coins on the Moon when seen from Earth. So, as Perrin says, "a very large instrument is the only solution to observe it." And this is where the GRAVITY interferometer comes in. By combining the light collected by the four telescopes of the Very Large Telescope (VLT) array in the Atacama desert in Chile, the instrument will, as of next November, be the equivalent of a super-telescope 140 meters in diameter. Designed and developed with the participation of LESIA, the instrument will provide a more accurate view of the stars orbiting around Sagittarius A*. GRAVITY will not only observe the motion of these stars, but also that of potential hot spots. These chunks of matter, heated by the tidal forces exerted by the black hole, emit bright flares near its event horizon. "Even though the resolution is not good enough to allow GRAVITY to map these hot spots, measuring their trajectories will enable us to analyze the space-time metrics in the region." explains Perrin. In other words, the researchers will be able to observe how the black hole distorts both space and time around it, since in Einstein's theory of relativity, space and time form a whole, called the space-time continuum. Towards a new theory of gravitation? In order to study the slowing of time caused by Sagittarius A*, the researchers are also investigating another way in which it manifests itself: gravitational redshift. Light waves are stretched out—that is, their frequency decreases—when they travel through the gravitational field of a massive body. "This shows up as a redshift caused by an apparent time dilation, as has been observed in the radiation emitted by iron nuclei in a disc of matter attracted by a black hole," says Éric Gourgoulhon at the Laboratory Universe and Theories (LUTH)3 "Although the theory of general relativity works very well when describing the event horizon of a black hole, it meets its limits when it comes to describing the central singularity, located beyond this horizon," points out Gourgoulhon, a specialist in the behavior of matter in a strong gravitational field and laureate of the 2012 CNRS Silver Medal. "We will therefore need to incorporate general relativity into a more sophisticated theory such as string theory or loop quantum gravity, which we'll be testing in the years to come." - 1. Systèmes de Référence Temps-Espace (CNRS / Observatoire de Paris / UPMC). - 2. Laboratoire d’études spatiales et d’instrumentation en astrophysique(CNRS / Observatoire de Paris / UPMC / Université Paris Diderot). - 3. Laboratoire univers et théories (CNRS / Observatoire de Paris / Université Paris Diderot). Share this article Simon Castéran is a journalist with a passion for science. For several years, he has devoted himself to the popularization of science, especially in the field of astronomy, space exploration, and exobiology.
<urn:uuid:cd1b6aed-e1e6-4fc4-b409-33a8c3395f5e>
CC-MAIN-2020-16
https://news.cnrs.fr/articles/do-black-holes-distort-time
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.945677
1,550
3.90625
4
We report the identification of LP 400-22 (WD 2234 + 222) as a very low mass and high-velocity white dwarf. The ultraviolet GALEX and optical photometric colors and a spectral line analysis of LP 400-22 show this star to have an effective temperature of 11,080 ± 140 K and a surface gravity of log g p 6.32 ± 0.08. Therefore, this is a helium-core white dwarf with a mass of 0.17 MꙨ. The tangential velocity of this white dwarf is 414 ± 43 km s-1, making it one of the fastest moving white dwarfs known. We discuss probable evolutionary scenarios for this remarkable object. The Astrophysical Journal Scholarly Commons Citation Kawka, A., Vennes, S., Oswalt, T. D., Smith, J., & Silvestri, N. M. (2006). LP 400-22, A Very Low Mass and High-Velocity White Dwarf. The Astrophysical Journal, 643(2). https://doi.org/10.1086/505143
<urn:uuid:02acd04c-a4e7-4198-9c09-aee578e430be>
CC-MAIN-2020-16
https://commons.erau.edu/publication/890/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.677004
229
2.546875
3
Samuel Lysons (1763-1819) was one of the first archaeologists to excavate and study Roman sites in Britain. He was a leading intellectual, Fellow of the Royal Society and was made Professor of Antiquity at the Royal Academy just before his death in 1818. A skilled artist, he exhibited at the Royal Academy and produced numerous illustrations of various antiquities and topographical scenes. An account of Roman antiquities discovered at Woodchester in the County of Gloucestershire was published in large folio format in 1797 and is lavishly illustrated with handcoloured etching and aquatint views of the village of Woodchester and the mosaic Roman pavement which Lysons found there. Several of these are spread over a double page and the largest are over 50 x 75 cm. Lysons, whom the Dictionary of National Biography describes as ‘an excitable, vigorous and ambitious man, with a loud voice and a penetrating eye’, initially studied Law but in 1803 was appointed Keeper of the Records at the Tower of London. During his lifetime he published several volumes of work on Roman antiquities in Britain, including his multi-volume Reliquiae Britannico Romanae, of which the Woodchester work was intended by Lysons to form the fourth volume.
<urn:uuid:a523dcf2-bd44-441c-8d81-2dee0bc233e8>
CC-MAIN-2020-16
https://library.chethams.com/collections/101-treasures-of-chethams/lysons-woodchester/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.973523
263
2.796875
3
Samphire grows in abundance near water sources, namely on shorelines, in marshes or in salt-water mudflats. Described as a sea vegetable, samphire is a halophyte in formal terms, meaning it grows in or near waters with high salinity. This access to salt can come either through its roots or through sea spray, explaining why samphire can thrive in many different locations. There are a few different species of samphire, but in the UK this is whittled down to marsh samphire or rock samphire. Marsh samphire is the much-loved species that finds its way into culinary creations, with bright green stalks that look similar to baby asparagus. When lightly cooked, the taste is pleasantly salty. When cooking samphire, the best advice is to keep it simple, to really let the flavour sing. Either steaming it or lightly sautéing it with unsalted butter is typically how samphire is served and it goes best with white fish and other delicate flavours. This summer at The Lock Bar and Kitchen, samphire can be found accompanying many of our dishes. We’d also recommend trying our starter of a duo of scallops with panko cod cheek and roast pepper jam. This comes topped with salty fingers, another sea vegetable with a similar taste and texture to samphire. Rock samphire isn’t recommended for eating. Both the smell and flavour is considered by many to be unpalatable. It’s widely believed this is the species of samphire Shakespeare referred to in King Lear, when he describes the gathering of samphire as a “dreadful trade”. This is thought to refer to the dangers of collecting rock samphire from sea cliffs, but may have something to do with the smell too. Interestingly, the ashes of marsh samphire were previously used to craft soap and glass. The latter use explains the old English name for samphire: glasswort. It also explains why, in centuries past, glassmakers located their workshops in marshy regions where samphire grew. Marsh samphire is at its best in July and August and given the plethora of salt marshes in the UK, it’s no wonder it’s such a popular summertime ingredient. Harvesting it isn’t easy though. There is a limit to how much samphire can be harvested in a day in order to protect the environment. On top of that, the changing tide can affect when it’s physically possible to collect it. With a relatively short summer season too, there’s a limited window within which this bright green foodie treasure can be collected.
<urn:uuid:e35f7324-a3f6-4dd0-9c6f-63a0df2bd5bd>
CC-MAIN-2020-16
https://www.runnymedehotel.com/blog/samphire-the-ingredient-of-the-summer/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.956108
569
2.765625
3
Gain insight into the mind of a genius and the scientific and artistic principles he discovered. Another example of how the independent-world assumption creates untold difficulties for material science theory comes from the field of biology and concerns the origin of life. They are more focused towards the organizational aspects and need to co-ordinate their activities on issues like science education. The practice of open science is inextricably linked to the dissemination of that research to other scientists, and the public. They will also tell you all the things you need to know for your science fair project to be a success. Medical science is another field of material science that will have to undergo dramatic modification if the world turns out to be a dream. But both of these elements of scientific knowledge remain in place if the source of the external world is the united mind as opposed to some mysterious, energy-generating external force (whatever caused the Big Bang per the creation theory of material science.) Scientists can still assume the independent existence of external objects in order to study them. The Australian Curriculum: Science provides opportunities for students to develop an understanding of important science concepts and processes, the practices used to develop scientific knowledge, of science’s contribution to our culture and society, and its applications in our lives. The Scientific Visualization Studio works closely with scientists to create visualizations, animations, and images to depict NASA science. PLOS (Public Library of Science) is a nonprofit scientific and medical publishing venture that provides scientists and physicians with high-quality, high-profile journals in which to publish their most important work. The popularization of science is a positive feature that can be initiated by this group. Thousands of scientists are calling on the incoming Trump administration and 115th Congress to ensure that science continues to play a strong role in protecting public health and well-being. All Science Exchange Verified Providers are selected by our scientists and rated by the community, so you know exactly who you are working with before you start. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). In many institutes and colleges the incorporation of research projects as part of the curriculum has generated zeal amongst the young generation towards research and science. Here is a list of the names of the subjects you will need to read to get the guidance and the ideas you need.
<urn:uuid:98a093ff-5b48-4a5d-8975-68c9228cc5eb>
CC-MAIN-2020-16
https://www.spectravideo.org/faculty-of-science.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.938238
490
2.953125
3
Data Grammar, Part 4 Now that we’ve introduced binary (the computer alphabet), data types (computer words), and data structures (computer sentences), we're ready to take a leap and introduce a concept analogous to a library. A database can be thought of as a library - it contains a multitude of large or complex data structures, like books full of sentences, stored in specific locations in some sort of system (Dewey decimal, ISBN) that is - hopefully - well-documented and set up so that you can find books that answer your questions, or in database terms, “queries.” It's a technical detail but the collection of organized data is a database, and the technology used to organize and access the data is a database management system (DBMS). I, along with most data scientists, will get sloppy and use database to refer to DBMSs sometimes. Forgive me. Let’s discuss the three most popular types of database management systems: relational, document store and graph. Most people who have run some sort of business have run into a relational database management system (RDBMSs). Common software implementations are MySQL, Postgres, Netezza, Oracle, SQLite, and Microsoft SQL Server. Relational databases are collections of tables tied together by something called a schema, which is really just an organizational system that tells you what information can be found in which table and how the tables relate to each other. You can think of RDBs as filing cabinets with really good folder and drawer labels. Tables are really just lists of lists. Though large, optimized, relational databases might seem complex to think about, most are pretty straightforward. For example, you might have a list of customers, a list of those customers’ orders and a list of employees who serve those customers or fill the orders. You can access data in a Relational Database using a query language called SQL (pronounced Sequel or S-Q-L, depending on who you ask - it’s an epic battle most of us don’t like talking about). SQL is great because it lets you define the structure you'd like to format the data into, and then the language figures out how to extract and transform the underlying data tables into that format. Relational databases are the go-to for most data scientists. They are fast, easy to manage, and commonly found in businesses. Also, many machine learning algorithms rely on creating “feature vectors” for each example entity. "Feature vector" is a fancy way of saying row in a table. Since most data science models require transforming the data into a table, it can frequently be easy to just keep all the raw data stored in tables in a relational database. Document Store Databases The next database management system, the document store, is in the “NoSQL” family. Unlike relational databases, which all use some form of SQL, noSQL databases don’t always use SQL as a query language (hence Not Only SQL). There are several types of noSQL databases, but document store databases are probably the most common right now. Document stores are to map data structures as relational databases are to list data structures. The filing cabinet is still a great analogy for document store databases, but imagine that instead of housing folders that each contained a bunch of documents, the cabinet was packed with individual folders for each piece of information in each type of document. For example, a doctor’s filing cabinet might contain a “Patients” folder which in turn would house folders for each patient and each patient’s folder would have individual folders for the patient’s age, gender, AND a unique folder for every lab result and every insurance claim! That many folders might be overkill for your real-world filing cabinet, but computers are REALLY good at finding the right file folder fast! Data scientists might use a document store database if they are dealing with “unstructured" data like large amounts of text, or if each entity in the database might have different types of data elements. Document stores aren’t usually the main storage location data scientists use, but they are really useful for managing data flow through a web application as they are better suited to interfacing with programming languages commonly used on the web. The last database management system type is a graph database. You guessed it, it’s based on the graph data structure which is a collection of nodes and edges. Of the three databases I've introduced, the similarities between the simple data structure of a graph and a graph database is the strongest. It’s basically just a giant graph! The database characterization lies in the cataloging, or indexing, of the data so that when you query the database it knows where in the database’s memory it wrote each piece of data. Data scientists use graph databases primarily when the relationships between entities are important. For example, when building a recommendation engine to recommend products to customers a data scientist could use a graph database to illuminate relationships between people who buy the same items or among products that tend to end up in the same basket. DBMSs are, in theory, just souped-up data structures, but in practice they are complex software, and sometimes also hardware, systems. A good data scientist should be able to interact with most databases and maybe even set up small scale versions of these systems. However, installing, designing and managing a database of any real scale requires the skills of a Data Engineer or Database Administrator. We’ve now walked you through how data is stored, structured, and organized. The next post will focus on helping you develop a sense of what information is really in your data.
<urn:uuid:cc36869c-90da-4a68-9d6c-079d45004ad2>
CC-MAIN-2020-16
https://www.valkyrie.ai/post/data-grammar-part-4
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.92413
1,176
3.515625
4
Let’s explore the difference between CTC and Darjeeling leaf tea? Also let’s understand what makes Darjeeling Tea so expensive? Crush, tear, curl (CTC) is a method of processing black tea in which the leaves are passed through a series of cylindrical rollers with hundreds of sharp teeth that crush, tear, and curl the tea into small, hard pellets. This tea is mostly consumed by adding milk and sugar. This tea is mostly made in the plain areas of Assam and West Bengal in North India and in South India. Darjeeling Tea refers to the teas that are grown in the hilly areas of Darjeeling District. The plain areas of Darjeeling district continue to make CTC teas. These teas are mostly made by machines where the processing is very minimal preserving most of the characteristics of the plucked leaf. Sometimes the teas are even hand rolled and sometimes just dried. These teas are generally whole leaf teas which are mostly consumed in there pure form without adding milk and sugar. There are some points which will clear your doubts and will help you to distinguish between both the teas: Climate – In plains the tea bushes get an average sunshine of around 12 hours a day which makes it conducive for growth. However, in Darjeeling the bushes on an average receive sunshine for only 5 hours a day also the temperatures are much lower. These results in what we call stunted growth and development of unique flavors. Plucking – To produce the finest Darjeeling teas, quality of plucking is very fine. Because of stunted growth the size of the leaf is also very small. Workers choose the best leaves and pluck them. Most of the good Darjeeling teas are produced from two leaves and a bud alone. But to produce CTC fine plucking is not required. The leaf sizes in CTC are also very large as the conditions are conducive to growth. While plucking the leaves in Darjeeling, workers need to be very careful about the size of the leaf. The smaller the leaves, the better it tastes. But, for CTC workers doesn’t need to bother about the leaf size. Time of plucking – In Darjeeling plucking of tea leaves generally starts from March and ends in November. For very high elevation bushes, it starts in April and ends in October. Whereas, plucking for CTC in North India is done right from February to December. Flavor –Darjeeling teas are known to have what we call Muscatel flavor. The tastes are very fruity and sometimes flowery with a very pleasing character and a delightful and lingering aftertaste. There is no need to add milk and sugar to the better and well made Darjeeling Teas. CTC on the other hand have very strong and brisk character and can only be enjoyed after milk and sugar. Production – The tea estates of plains produces up to 3,000 Kilograms of CTC per hectare. The tea estates of Darjeeling produce up to 450 Kilograms of Darjeeling teas per hectare. Tea Estates both in Darjeeling and Dooars require 1 labour per acre. Since the tea made output per worker is much less in Darjeeling it makes the tea more expensive. Grades – CTC teas are generally graded in three categories, Leaf Fanning, and Dust. The leaf grade or the bolder CTC are graded in BOPL, BOPSM and BP. The fanning is mostly graded in BPSM, PF and OF. The Dust grades are PD and Dust. The price difference between the different grades are not much and BP and OF tend to command the highest prices. In Darjeeling there are four principal grades. Leaf, Broken, Fanning and Dust. The Leaf grades are mostly marked FTGFOP1 with acronyms like Wonder, Muscatel, Special, Classic, Autumn added to the special teas or some seasonal teas. The Brokens are BPS and, BOP. The fanning are TGOF, GOF and OF. The Dust is simply marked as Dust. The premium prices are only fetched for the Leaf Grade. The others grades do not fetch a premium and are mostly packed for packing in tea bags. An extra ordinary leaf grade could fetch a price anything from Rs. 3000 to Rs. 8000 at the wholesale market. The other grades generally are sold in the region of 500 to 100 depending on quality. In the rains the broken and fannings sell almost at the same price of CTC Teas. Since the other grades do not command a premium the prices of leaf grade are now on an upward trend as they need to cover most of the costs. To understand the gradation system of teas in Darjeeling Click Here
<urn:uuid:3ddc964b-1742-4d1b-806e-8c6cf00961df>
CC-MAIN-2020-16
https://gopaldharaindia.com/ctc-vs-darjeeling-leaf-tea/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.958422
1,001
2.984375
3
Images reveal stormy collision on Jupiter. The impact has forged a single vortex that has the same oval shape as its predecessors but is slightly larger and moves significantly faster. Although astronomers did not witness the collision--the merger apparently occurred in February, when Jupiter was hidden behind the sun--a variety of before and after images are helping to flesh out the story. The giant storms, or anticyclones, known as BC and DE, had persisted for 58 years at a latitude of 33 [degrees] S. Pictures taken Jan. 17 at the Pic du Midi Observatory in Bagneres-de-Bigorre, France, showed them close together but distinct. NASA's Infrared Telescope Facility atop Hawaii's Mauna Kea recorded images on March 27, after Jupiter had emerged from behind the sun, showing but a single oval. In a June 17 circular of the International Astronomical Union, a U.S.-French team reported that BC and DE had merged. The researchers dubbed the new storm BE. Some scientists, however, cautioned that the two storms might not have actually joined forces. Instead, one of them might simply have become too faint for ground-based telescopes to detect. Images taken with the sharp eye of the Hubble Space Telescope on July 16 confirmed that a merger had indeed taken place, says Amy A. Simon of New Mexico State University in Las Cruces. "We just wanted to make to make sure, without a doubt, that [the other storm] was gone," she says. The Hubble images reveal that BE is moving eastward at 2.5 meters per second. At 12,500 kilometers long and 8,400 km wide, the storm is second in size only to Jupiter's Great Red Spot. By comparing the data to vortex models, Simon and Reta F. Beebe, also of New Mexico State, hope to deduce the water content at the storm site, which determines the temperature and pressure across the vortex. It remains unclear, says Simon, how the storms managed to collide despite being separated by a vortex rotating in the opposite direction. That vortex appears unchanged, even though one of the storms must have plowed through it to merge with the other. A third anticyclone, known as FA, that traveled along with BC and DE persists with no visible changes. Another puzzle, notes Glenn S. Orton of NASA's Jet Propulsion Laboratory in Pasadena, Calif., is that the new storm lacks a dark ring like those that encircled BC and DE. The rings indicated that gas rising and cooling from the center of the storms had fallen back at the edges. A cloud layer may be covering the new storm's ring, Orton suggests. |Printer friendly Cite/link Email Feedback| |Title Annotation:||anticyclones collide on Jupiter| |Article Type:||Brief Article| |Date:||Sep 5, 1998| |Previous Article:||Common pesticide clobbers amphibians.| |Next Article:||Is the Pacific plate tearing itself apart?|
<urn:uuid:94959459-7067-4dbb-8962-91cadd86e285>
CC-MAIN-2020-16
https://www.thefreelibrary.com/Images+reveal+stormy+collision+on+Jupiter-a021239454
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.941069
626
3.53125
4
This day in history — Oct. 11 Today’s highlight in history On Oct. 11, 1932, the first American political telecast took place as the Democratic National Committee sponsored a program from a CBS television studio in New York. On this date In 1779, Polish nobleman Casimir Pulaski, fighting for American independence, died two days after being wounded during the Revolutionary War Battle of Savannah, Ga. In 1890, the Daughters of the American Revolution was founded in Washington, D.C. In 1958, the lunar probe Pioneer 1 was launched; it failed to go as far out as planned, fell back to Earth, and burned up in the atmosphere. In 1984, Challenger astronaut Kathryn D. Sullivan became the first American woman to walk in space as she and fellow Mission Specialist David C. Leestma spent 3½ hours outside the shuttle. In 1987, the NAMES Project AIDS Memorial Quilt was unfurled for the first time on the National Mall in Washington, D.C.; the 7,000-pound quilt bore the names, personal effects and, in some cases, the ashes of victims of AIDS. In 1991, testifying before the Senate Judiciary Committee, Anita Hill accused Supreme Court nominee Clarence Thomas of sexually harassing her; Thomas reappeared before the panel to denounce the proceedings as a “high-tech lynching.” In 2002, former President Jimmy Carter was named the recipient of the Nobel Peace Prize. Ten years ago: Cold medicines for babies and toddlers were pulled off shelves amid concerns about unintentional overdoses. Five years ago: Vice President Joe Biden and Republican opponent Paul Ryan squared off in their only debate of the 2012 campaign; the two repeatedly interrupted each other as they sparred over topics including the economy, taxes and Medicare. One year ago: Samsung Electronics said it was stopping production of Galaxy Note 7 smartphones permanently, a day after halting global sales of the ill-fated devices amid reports that batteries were catching fire. "Do what you feel in your heart to be right — for you'll be criticized anyway." American first lady, diplomat and activist, born on this date in 1884 (died in 1962 at age 78)
<urn:uuid:a9161aef-0960-4c09-8939-2b4c259bd140>
CC-MAIN-2020-16
https://www.jsonline.com/story/life/green-sheet/2017/10/11/day-history-oct-11/747018001/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.955931
454
2.5625
3
Nowadays, the IT industry’s prime focus is recovery and business continuity, better cloud services, and cost management. All of the three focuses are connected with virtual machines. The first task for a business is choosing from a physical server or a virtual machine. It is not at all simple to choose, you have to study the merits and demerits of both the type of machines. Along with this, you need to know the management, backup, and recovery procedures of the machines. How the physical servers are backed up? What is the process to back up a virtual machine? Answers to these questions will help you in selecting the right machine for your business. Let’s explore more about VM backup. What is a virtual machine? A virtual machine is computer software that makes an emulation of the physical server. It can be used for server applications, data storage applications, and others. A virtual server/machine functions in a multi-tenant environment. A single host machine (physical hardware) can host multiple VMs. This is all possible with the help of a special program designed for virtualization, called hypervisor. Virtualization is a new and evolving technology. So, for a non-technical individual, it is a little time-consuming process. Generally, all the businesses have server administrators and experts to assist them with the technicalities of the virtual machines. As we know, this is an evolving technology, various challenges and problems might arise. The might be related to performance, virtualization, network, costs, and storage space. Some of the common challenges are: - Resource depletion: A virtual machine is hosted on the physical hardware if the hardware resources deplete then the performance of the VM suffers. Simple I/O operations start malfunctioning and the data may get lost. - Application awareness: When you are migrating a VM instance to another physical or virtual machine, the running applications may fail. It can occur due to a lack of app availability. The data related to that application is lost in this process. - VM management: Virtual machine management includes various tasks. It includes managing the VM, data center, and all the constituents of it. The data center management tool does not include the hypervisor and host system solutions. A person with adequate knowledge of Virtualization and the VMs should be employed. - Congested network: A physical machine hosts multiple VM instances, so when there is data transfer happening on all of the virtual machines, then it can get congested. Congestion, bottlenecks, and flooding bring the network to an unprecedented halt. To overcome this common and some dangerous challenges, you have to create a backup virtual machine. A backup machine is a copy of your machine which acts as a spare in the time of attacks, failures, losses, etc. So, creating a backup machine is a crucial task. It makes migration easier if you have created a backup. The process is cost-effective and permanent data loss is prevented. You can save the backup file on an external pen-drive, on a cloud platform, tape drive, etc. You would want to include the most important data in your backups. Importance of backup virtual machine: - Averting Cyber-threats: Cyber-threats are consistently evolving and it will become fatal in the coming years. With the Artificial Intelligence market booming, attackers are using AI-powered hacking. One of the most terrifying attacks was Ransomware and there are more coming. Businesses with sensitive data are the primary targets but are not the least. As the doctors say “Prevention is better than cure”, creating a backup copy will help you combat. - Cost-saving: The importance of data is increasing with time. The unplanned disrupted systems, server downtime; VM failure will only cost you more. Also, the consumer base will decrease. Thus, creating a backup will protect your aspirations against any disruptions. Also, backup and recovery will save the downtime cost. - Reputation: Running a business means gaining the trust and support of the customers. What will happen if you are unable to serve them because you have not created a backup and recovery solution? The reputation of the company will come down like rain. - Protection against physical damage: It is easy to ignore traditional measures of physical damage in this Cyber-attack environment. Hard-drive failures and hardware accidents are rare but you have to be prepared for the worst. Even if the probability is very low, you have to address it. Also, you should keep in mind the physical disasters like – fire, flood, earthquake, etc. It is impossible to restore the machine in such instances. - Application data protection: The backup and recovery solutions also include data from the running applications. The running application encompasses the VM so backing up the application data becomes important. Data from emails, database system, internal files, etc are protected in backup and recovery. While choosing a company, you have to analyze them on several accounts which will be helpful in determining who the perfect fit is for you. You can analyze the simpler things like – the storage volume required, downtime tolerance, and budget. The storage volume required for the backup can affect the decision and the cost. Also, your budget plays an important role in the selection process. NAKIVO Backup and replication is one of the best products available in the market. They have a special blog dedicated to spreading the awareness on backup and recovery. The support team is pro-active and response time is 30 seconds. If you browse their webpage, you will see the demo link which is very instructive. The demo helps in understanding the solution in detail and if you want the company provides 15-day trial software with full features. The pricing of the products is competitive. You can see the mapping of the features with the charges. To implement a strong backup solution, you have to communicate with the software company. Communication will solve half of your problems. Design a rough model of your dream backup and recovery solution. Look for the features which best describe your model and accordingly select the company.
<urn:uuid:c613279d-eeb1-4c42-b255-ef4e956c8979>
CC-MAIN-2020-16
https://www.crazylearner.org/backup-virtual-machine/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.936499
1,240
2.875
3
“Sgr A* is the right object, VLBI is the right technique, and this decade is the right time.” So states the mission page of the Event Horizon Telescope, an international endeavor that will combine the capabilities of over 50 radio telescopes across the globe to create a single Earth-sized telescope to image the enormous black hole at the center of our galaxy. For the first time, astronomers will “see” one of the most enigmatic objects in the Universe. And tomorrow, January 18, researchers from around the world will convene in Tucson, AZ to discuss how to make this long-standing astronomical dream a reality. During a conference organized by Dimitrios Psaltis, associate professor of astrophysics at the University of Arizona’s Steward Observatory, and Dan Marrone, an assistant professor of astronomy at the Steward Observatory, astrophysicists, scientists and researchers will gather to coordinate the ultimate goal of the Event Horizon Telescope; that is, an image of Sgr A*’s accretion disk and the “shadow” of its event horizon. “Nobody has ever taken a picture of a black hole. We are going to do just that.” – Dimitrios Psaltis, associate professor of astrophysics at the University of Arizona’s Steward Observatory Sgr A* (pronounced as “Sagittarius A-star”) is a supermassive black hole residing at the center of the Milky Way. It is estimated to contain the equivalent mass of 4 million Suns, packed into an area smaller than the diameter of Mercury’s orbit. Because of its proximity and estimated mass, Sgr A* presents the largest apparent event horizon size of any black hole candidate in the Universe. Still, its size in the sky is about the same as viewing “a grapefruit on the Moon.” So what are astronomers expecting to actually “see”? (Read more: What does a black hole look like?) Because black holes by definition are black – that is, invisible in all wavelengths of radiation due to the incredibly powerful gravitational effect on space-time around them – an image of the black hole itself will be impossible. But Sgr A*’s accretion disk should be visible to radio telescopes due to its billion-degree temperatures and powerful radio (as well as submillimeter, near infrared and X-ray) emissions… especially in the area leading up to and just at its event horizon. By imaging the glow of this super-hot disk astronomers hope to define Sgr A*’s Schwarzschild radius – its gravitational “point of no return”. This is also commonly referred to as its shadow. The position and existence of Sgr A* has been predicted by physics and inferred by the motions of stars around the galactic nucleus. And just last month a giant gas cloud was identified by researchers with the European Southern Observatory, traveling directly toward Sgr A*’s accretion disk. But, if the EHT project is successful, it will be the first time a black hole will be directly imaged in any shape or form. “So far, we have indirect evidence that there is a black hole at the center of the Milky Way,” said Dimitrios Psaltis. “But once we see its shadow, there will be no doubt.” The ambitious Event Horizon Telescope project will use not just one telescope but rather a combination of over 50 radio telescopes around the world, including the Submillimeter Telescope on Mt. Graham in Arizona, telescopes on Mauna Kea in Hawaii and the Combined Array for Research in Millimeter-wave Astronomy in California, as well as several radio telescopes in Europe, a 10-meter dish at the South Pole and, if all goes well, the 50-radio-antenna capabilities of the new Atacama Large Millimeter Array in Chile. This coordinated group effort will, in effect, turn our entire planet into one enormous dish for collecting radio emissions. By using long-term observations with Very Long Baseline Interferometry (VLBI) at short (230-450 GHz) wavelengths, the EHT team predicts that the goal of imaging a black hole will be achieved within the next decade. “What is great about the one in the center of the Milky Way is that is big enough and close enough,” said assistant professor Dan Marrone. “There are bigger ones in other galaxies, and there are closer ones, but they’re smaller. Ours is just the right combination of size and distance.”
<urn:uuid:09d62017-f3e1-43d9-98e9-3ddac093f601>
CC-MAIN-2020-16
https://www.universetoday.com/tag/tucson/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.910749
961
3.203125
3
Bats with a hollow barrel have a trampoline effect which can improve bat performance. The following explains some of the technologies used to improve this effect, and a test method used to compare barrel stiffness. The response of hollow and solid bats is similar in many respects. A notable exception involves the deformation of the barrel in the vicinity of the ball impact. This is often referred to as the trampoline effect and was discussed above in Ball Compression. The contribution of the trampoline effect is limited by the strength of the barrel. It is for this reason that many high performing bats have relatively low durability and why bat manufacturers are keenly interested in stronger materials. Multi-wall bats were introduced in the 1990’s to increase both performance and durability. To illustrate how this occurs, consider two simply supported plates impacted by a ball at their center as depicted on Fig. 12.1. The plate on the left is solid, while the plate on the right has the same total thickness, but is made up of two un-bonded plates, each of thickness t/2. It is clear that the solid plate is stiffer than the layered plate (4 times) and would produce a slower rebound ball speed. Interestingly, the maximum stress would be the same in the solid and layered plates. If the total thickness of a multi-wall bat is slightly higher than a single wall bat, both durability and performance can increase. Fig. 12.1. Schematic of an ideal simply support solid plate (left) and layered plate (right) impacted by a ball. Because of the large effect that the barrel has on bat performance, simplified tests have been considered to describe its contribution. One method, termed barrel compression, has received interest and is described in Fig. 12.2. Steel cylinders of approximately 2 inches in diameter are brought in contact with the barrel. The barrel compression is the force required to radially displace the barrel 0.05 inches in this configuration. While bat performance is strongly affected by barrel compression, it is only one component of many. It is not clear, for instance, where along the length of the barrel it should be measured. Handle flex, MOI, and rate effects can also distort the comparison. For this reason barrel compression is typically used with a relatively large tolerance. It is nevertheless useful for quality control when comparing bats of the same model. It has also been used to identify doctored bats as will be described below. Fig. 12.2. Schematic of proposed bat barrel compression test.
<urn:uuid:83cef276-5788-4c55-a822-284140a361a4>
CC-MAIN-2020-16
https://ssl.wsu.edu/glossary/barrel-effects/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.959559
519
2.875
3
About our borders The Daily Mail ran an article promoting a map that shows how borders in Europe and the Middle East shifted over 1,000 years. We have mentioned a number of times that Poland vanished off the map from the late 1780s until 1918 – now you can see it for yourself. Also, see how recently Italy was divided and Germany was a patchwork of tiny kingdoms? And how Poland moves around? And the Commonwealth? Quick note added 22.5.2014 Matter of interest time. Given the uncertain future of independent Ukraine and questions over Russia’s intentions with regard to Belarus, Lithuania, Estonia and Latvia there has been some talk in Poland of the country offering mergers with all those states – in part to recover the territory lost at the end of WW2 (though no mention of returning the lands in the West to Germany) and perhaps more generally to give all those peoples an immediate membership of the EU and NATO. As well as the question mark over the land Poland GAINED from Germany at the end of WW2, there would also be an interesting question over the future of Kaliningrad – the Oblast (formerly East Prussia) – and the city – formerly Königsberg, once capital of Prussia.
<urn:uuid:0861aef0-585a-42fd-9ba9-962db3d05202>
CC-MAIN-2020-16
https://1904loghouse.wordpress.com/4046-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00355.warc.gz
en
0.958394
258
2.5625
3
What is the Family Self-Sufficiency Program? Family Self-Sufficiency (FSS) is a voluntary program designed to assist families in becoming economically independent and self-sufficient. With the support of local agencies, FSS combines case management, education, job training, and ongoing support through newsletters, workshops, support group meetings, and other appropriate services to aid the family in becoming self-sufficient. This program motivates and helps participants: Identify their career goals. • Identify the barriers which could prevent achievement of their goals. • Identify resources and services that are necessary for the participant’s success. • Develop a service plan to outline specific goals and objectives which are needed to achieve economic independence. • Obtain supportive services related to their plan. • Receive case management services, encouragement, motivation, and moral support. What are the Benefits of Participating in the FSS Program? • Obtaining higher education/job training that will result in living wage increases. • Receiving an escrow check upon successful completion of the Contract of Participation. • Support/community services to assist you in achieving your goals. • Economic independence by freeing yourself of Public Assistance. Comments from Graduates of the FSS Program “I would of never been a homeowner if I hadn’t been given the opportunity to become self sufficient.” – Jeanette E. “I never knew that at the age of 36 I could receive my high diploma. Someone believed in me. Now I’m enrolled at community college and I know now that I can do anything. Thanks, Erma.” – Rosalinda L. “I got my GED certificate and graduated from college with a Associate Certificate in Office Technology and have a great job. Anything is impossible if you want to become economic independence by freeing yourself from government assistance.” – Elisa Q. For more information, please contact: Section 8 FSS Coordinator 806.762.1191 ext 207 Who Can Participate in the FSS Program? If you are: • Currently a Section 8 Certificate or Voucher Participant or a Public Housing Resident. • 18 years of age or older. • Determined to make changes in your life circumstances. • Interested in obtaining more education, job training and employment. • Determined to free yourself from all welfare assisted programs, including TANF, food stamps and medical. Participating FSS families are required to sign a Contract of Participation with the Housing Authority. An FSS family has up to five (5) years to complete specific goals and objectives, which they help to identify in their service plan. The Contract of Participation outlines the rights and responsibilities of the family and the Housing Authority, during participation in the FSS program.
<urn:uuid:9a0fd181-2f07-433d-b6a6-47efe5d11079>
CC-MAIN-2020-16
https://lubbockha.org/moving-to-success-and-independence-with-hcv-section-8-fss/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.938976
587
2.71875
3
Become a virologist Every year the influenza virus changes a bit. Sometimes it changes a lot. That is because it is what is called an emerging virus. That’s why it is possible to catch the flu year after year. Every year the body needs to create a new set of antibodies to fight the virus in its new form. Until recently it has taken scientists around six months to create a vaccine against each new strain. This is a problem because a lot can happen in the viral world in half a year. Even though a group of scientists do a pretty good job of predicting which strain will be most prevalent the following winter. A totally unexpected variant of the virus may emerge. Ervin Fodor and three fellow scientists, have developed a technique which makes it possible to create a flu vaccine in a matter of days. This is great news for vulnerable people who may have found themselves previously unprotected from this potentially fatal disease. I met Ervin Fodor, Professor in Virology, and one of the world’s leading experts on the flu virus, at the Sir William Dunn School of Pathology in Oxford. It is a surprising piece of modern architecture hidden behind a Queen Anne style façade where the clinically useful form of penicillin was first developed. Ervin first came to study here from his home of Czechoslovakia in the early 1990s under the supervision of Professor George Brownlee. The professor was impressed with the young student’s scientific ability, although wondered how he would manage to write up his research with such terrible English! They overcame their communication barriers to make this major breakthrough in vaccine technology, along with two colleagues from the US: Peter Palese and Adolfo García-Sastre. By the time I met Ervin, his English was perfectly fluent. He was able to explain with fantastic clarity the process by which the flu virus replicates itself within the human body and how scientists create vaccines to stimulate the production of antibodies that will protect us from the illness. Ervin developed a fascination with the flu from an early age. As a secondary school student in the 1980s an enthusiastic teacher sparked his interest in the emerging science of biochemistry. This continued through university until he took up his first research position at the Slovak Academy of Sciences in Bratislava: “Finally I got down to all these technologies, growing viruses, injecting embryonated chicken eggs..”. After a few years of working for his PhD there, history intervened and the Iron Curtain came down. Opportunities suddenly grew and Ervin won a Soros studentship to come to Oxford for 9 months and study with Professor Brownlee. Professor Brownlee was able to give Ervin his dream project. “I worked on a machine looking at how the flu virus copied its genetic information. I was already fascinated by this in Bratislava, but we didn’t have the technology there.” Brownlee decided to gamble on Ervin’s English improving and enrolled him on a PhD. “I was lucky, I hit on an interesting problem. I wrote a few papers that became rather high profile about how the copying of the genetic information was regulated at a molecular level.” Ervin puts a lot of his story down to luck, but I suspect hard work and determination have something to do with it as well. Once his PhD was finished Ervin tried returning to what was now Slovakia, on a Wellcome Trust International Development Fellowship. However, he quickly realised that the infrastructure was still lacking and work was difficult. “I got spoilt here”, he told me. So he said “Yes” to an offer from Peter Palese to go to the Mount Sinai School of Medicine in New York. That’s where he started work on creating the influenza virus from scratch using a plasmid DNA. After less than a year, Ervin was offered a five year Post Doctoral Fellowship in Oxford by Professor Brownlee which was too good to turn down. So, he took the influenza virus research with him and made a breakthrough shortly after arriving back in Oxford. It was the late 1990s and they had worked out how to genetically modify the influenza virus to create a vaccine in a matter of days rather than months. Of course that is nowhere near the end of the story. The patent offices of the academic institutions involved took over. A company in the US bought the patent to the technology and is using it in a nasal spray and has been for about 7 years. It has also made its way to Japan and the Far East and has recently been approved by the EU. Ervin says that at the time he was absolutely obsessed about resolving the conundrum that would enable this artificial creation of virus. “What drives me is the understanding. Understanding how the virus really works at the molecular level.” He says he is feeling a similar drive to resolve his current flu related puzzle. He and his team of about ten researchers are now trying to understand how the genetic information within the influenza virus replicates itself and therefore allows the virus to spread throughout the cells of our body. This structural knowledge will enable the creation of more effective drugs to treat influenza. It’s important stuff and fortunately Ervin says he has a trust in himself to succeed. Watch this space and we can all hope for far fewer flu induced aches and pains in winters to come.
<urn:uuid:0401bacc-00dc-428c-a26b-9072789c8b62>
CC-MAIN-2020-16
http://howtomakeadifference.net/2013/07/ervin-fodor/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.980215
1,106
3.046875
3
Earlier this week one of my blogs looked at some recent research which links walking with improved ‘connectivity’ in the brain. This finding, appears to have particular significance for the ‘ageing brain’, as walking appeared to mitigate changes in brain activity that can come with ageing and may impair experience of life. One simple reason that exercise may enhance brain function is that it likely helps boost blood supply to the brain. Generally, tissues, including brain tissue, function more optimally when there’s more blood getting to it. But of course another part of this is what the blood is bringing. Good levels of oxygen and nutrients will also help ensure optimal function of whatever it is the blood is being delivered to. I was interested to read about a recent study which tested the impact of taking a multivitamin and mineral on certain aspects of brain function and the effects of mental testing on mood and fatigue. The study, published in the journal Human Psychopharmacology, took 215 women aged 25-50 and randomised them to take a multivitamin and mineral preparation (brand name Supradyn) or placebo over a period of nine weeks . At the start and end of the study, the women had their brain function assessed through a variety of tasks, including those assessing the ability to ‘multi-task’. The impact of these tests on mood and energy levels was also assessed. The women who had been taking the multivitamin and mineral were found, overall, to perform better in terms of multi-tasking, and also performed better on other assessments of brain function too including mathematical processing. Also, these women fared better in terms of their mood and energy levels after performing the mental tests. This research provides good evidence that nutrient supplementation has the potential to enhance brain function. Here, in no particular order, are some other things that can help keep our brains in good working order: 1. Hydrate properly In practice, dehydration can cause a serious dropping off in mental energy. Drink enough water each day to keep urine colour pale yellow. 2. Eat a ‘primal’ diet That’s a diet rich in meat, fish, seafood, nuts, seeds, non-starchy veg and some fruit. This will help ensure a steady supply of fuel for the brain. Plus, the protein provides amino acids that are the building blocks of ‘neurotransmitters’ in the brain. 3. Keep up a good intake of omega-3 fats The omega-3 fats such as EPA and DHA appear to be important for optimal brain function. They can be found in fish (particularly oily fish such as mackerel, herring, sardine, salmon and trout) and as supplements. 4. Get plenty of sleep Sleep deprivation can cause quite-rapid deterioration in brain function. Aim for about 8 hours (depending on need) and consider getting into bed a bit earlier whenever possible. 5. Be active A walk once or twice a day, particularly in some ‘green space’ can be enough to improve mood and boost brain function. 6. Get plenty of sunlight Lack of sunlight in the winter is a major cause of low mood and low mental energy. Even on a dull day it makes sense to get some sunlight directly into your eyes. Some may consider investing in a device which simulates the sun’s rays. 1. Haskell CF, et al. Effects of a multi-vitamin/mineral supplement on cognitive function and fatigue during extended multi-tasking. Human Psychopharmacology 2010;25(6):448-61
<urn:uuid:46c8e44d-4851-4e5f-a65d-397aa3044603>
CC-MAIN-2020-16
http://www.drbriffa.com/2010/09/02/a-few-simple-strategies-for-boosting-brain-function/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.934802
750
2.71875
3
General Issues on Immigration In the United States of America, immigration reform is a term widely used to describe proposals to maintain or increase legal immigration while decreasing illegal immigration, such as the guest worker proposal supported by President George W. Bush, and the Border Security, Economic Opportunity, and Immigration Modernization or “Gang of Eight” bill which passed the U.S. Senate in June 2013. Illegal immigration is an extremely controversial issue in the United States that has received a lot of attention in recent decades without any forward action in response to the issue.In the past, proposed comprehensive immigration reform plan had bipartisan support as one of its goals, and included six sections designed to have “something for everyone”. These six sections were: - To fix border enforcement. - Strong “interior enforcement”, such as preventing visa overstays, and similar violations. - Preventing people from working without a work permit. - Creating a committee to adapt the number of visas available to changing economic times. - A program to provide a path to legal status for illegal immigrants. - Programs to help immigrants adjust to life in the United States. The Fourteenth Amendment reads- “All persons born or naturalized in the United States and subject to the jurisdiction thereof, are citizens of the United States and of the State wherein they reside.” You know there is a huge battle in America on this issue. You are part of that battle even if you do not want to be. So how does it affect YOU in the 2nd District? The facts are that illegal immigrants intentionally come to America just to have their babies so they are automatically legal American citizens (called birthrights) under a very old law/policy. But why is that problem for the 2nd District and YOU? Once the new born child is declared a legal citizen the case is made to allow all of the mother and various relatives be allowed to come to and stay in America too. Basically “Family-Based Immigrant” Visas. “Chain migration” — officially known as “family reunification” under federal law — is the process by which green card holders or legal U.S. residents may sponsor a family member for immigration to the United States. (Wikipedia) The practice of giving automatic citizenship to everyone except for children of diplomats has created a magnet for foreign nationals who want their children to have U.S. citizenship and spawned creation of a cottage industry devoted to helping pregnant “tourists” illicitly enter this country for the purpose of giving birth. In 2010, “there were 4.5 million U.S.-born children whose parents were unauthorized [illegal],” according to the Pew Hispanic Center (Pew Hispanic Research Trends Project, “A Nation of Immigrants: A Portion of the 40 Million, Including 11 Million Unauthorized,” Pew Hispanic Center, Jan. 29, 2013.) The Center for Immigration Studies (CIS) has estimated that nearly 200,000 children are born annually “to foreign women admitted as visitors, that is, tourists, students, guest workers, and other non-immigrant categories.” Eight percent of all U.S. births (approximately 350,000 a year) come from at least one illegal-alien parent, according to the Pew Hispanic Center. (source- https://www.numbersusa.com/solutions/reform-birthright-citizenship) Catch and Release “I am 100% against the so called ‘catch and release’ program and practice that is currently being used. This policy is dictated by current U.S. Laws and is wrong. Under the law the U.S. Border Patrol is forced to use this program. It is time to change the law.” “These masses of alien people are the result of the encouragement of friends, family, human traffickers, criminals and the current policies and conditions on our borders. There have been decades of “lack of attention” on the borders and our borders have been easy to penetrate. It is important to note that it is unclear how the mass of aliens were organized and funded. Hmmmmm. As long as the word is out that our borders are easy to cross and aliens can dissolve into America never to be seen again these large groups will continue to come. Technology on the Border - “Technology means drones, cameras, trip wires, night vison equipment, monitoring devices, airplanes, helicopters, and similar to me. I live 60 miles from the border and worked on the border for 10 years while with the USDA and I have seen the technology now in place and it is extensive. - While very useful, technology is over rated when it comes to people sneaking and running across the border either north or south. Unless the boots on the ground Border Patrol Officers are with in a very short distance from the illegal crossers of the border the ‘chase is on’! Officers will have to rush to the point of crossing and begin tracking the violators through the terrain. - I have personally watched, while on the job, as a group of violators vanished into the underbrush in southern Arizona while no less than 4 trucks of Officers and a helicopter tried their best to find them. They never did and I was within one mile of them back in the brush myself. In fact I am the one that called it in when I saw the group of about 10 to 15 violators traveling on a well-used trail near me. - To me it takes all of methods of deterrents, lots of technology, and many boots on the ground to properly secure our borders. Deterrents mean good understandable and enforceable immigration laws, fast processing of applications, swift prosecution of violators, and proper humane holding facilities.” This means some type of barrier like a physical wall or fence that is a sufficient deterrent to stop anyone or anything from entering an area for whatever reason for the protection of the area attempting to be entered OR for the protection of those trying to enter an area. - “Walls work all across America! Millions of homes, business, public buildings, public and private property, air fields, schools, highways, bridges, and more all use some type of barrier to keep trespassers or dangers out successfully each day. Using a physical WALL reduces the amount of ‘boots on the ground’ patrolling requirements. The WALL will save money in the long run. A WALL is safer, intimidating, and a good deterrent too. A good WALL will save lives in the long run. - As long as America has easy access points on the borders violators will continue to use them. Much of Cochise Counties southern border is just 3 or 4 strains on a barbwire fence. Not much of a deterrent! Modern updated barriers’ are necessary to stop this penetration by unknown people.” - Is a Wall immoral? “Not in any way and actually not having solid deterrents like a well-built Wall is immoral.”im·mor·al – i(m)ˈmôrəl – adjective Immoral-“Not conforming to accepted standards of morality; an immoral and unwinnable war.” Unethical, bad, morally wrong, wrongful, wicked, evil, foul, unprincipled, unscrupulous, dishonorable, dishonest, unconscionable, iniquitous, disreputable, corrupt, depraved, vile, villainous, nefarious, base, miscreant; sinful, godless, impure, unchaste, unvirtuous, shameless, degenerate, debased, debauched, dissolute, reprobate, lewd, obscene, perverse, perverted; licentious, wanton, promiscuous, loose.Synonyms: Informal, shady, lowdown, crooked, sleazy. “The legality of the fugitive slave laws does not alter the fact that they were deeply immoral.” “This needs lots of work but can work and benefit both the aliens described and America. It is a worthwhile effort”.The DREAM Act (acronym for Development, Relief, and Education for Alien Minors Act) is an American legislative proposal for a multi-phase process for qualifying alien minors in the United States that would first grant conditional residency and, upon meeting further qualifications, permanent residency. The beneficiaries of the proposed DREAM Act would have had to meet the following requirements to qualify: - Be inadmissible or deportable from the United States, or be in Temporary Protected Status (Sec. 3(b)(1)). - They were younger than 18 years old on the date of their initial entry to the United States - Have proof of having arrived in the United States before age 16 (Dream Act of 2017, S.1615, Sec.3(b)(1)(B), and HR3440, Sec.3(b)(1)(B)). - Have proof of residence in the United States for at least four consecutive years since their date of arrival - If a male born in 1960 or later, have registered with the Selective Service - Be between the ages of 12 and 35 at the time of bill enactment - Have graduated from an American high school, obtained a GED, or been admitted to an institution of higher education - Be of good moral character The bill was first introduced in the Senate on August 1, 2001, S. 1291 by United States Senators Dick Durbin (D- Illinois) and Orrin Hatch (R- Utah), and has since been reintroduced several times but has failed to pass. (Wikipedia) On June 15, 2012, President Barack Obama announced that his administration would stop deporting undocumented immigrants who match certain criteria included in the proposed DREAM Act. On August 15, 2012, the U.S. Citizenship and Immigration Services (USCIS) began accepting applications under the Obama administration’s new Deferred Action for Childhood Arrivals (DACA) program. Thousands applied for the new program. Because DACA was designed in large measure to address the immigration status of the same people as the DREAM Act, the two programs are often debated together, with some making little distinction between them and others focusing on the difference between the DREAM Act’s legislative approaches in contrast to the implementation of DACA through executive action. As of January 2017, 740,000 people have registered through DACA. On September 5, 2017 the Trump administration rescinded the program. (Wikipedia) The official definition is;n“A person who owing to a well-founded fear of being persecuted for reasons of race, religion, nationality, membership of a particular social group or political opinion, is outside the country of his nationality and is unable or, owing to such fear, is unwilling to avail himself of the protection of that country; or who, not having a nationality and being outside the country of his former habitual residence as a result of such events, is unable or, owing to such fear, is unwilling to return to it.” The United States recognizes the right of asylum for individuals as specified by international and federal law. A specified number of legally defined refugees who either apply for asylum from inside the U.S. or apply for refugee status from outside the U.S., are admitted annually. Refugees compose about one-tenth of the total annual immigration to the United States, though some large refugee populations are very prominent. Since World War II, more refugees have found homes in the U.S. than any other nation and more than two million refugees have arrived in the U.S. since 1980. In the years 2005 through 2007, the number of asylum seekers accepted into the U.S. was about 40,000 per year. This compared with about 30,000 per year in the UK and 25,000 in Canada. The U.S. accounted for about 10% of all asylum-seeker acceptances in the OECD countries in 1998-2007. The United States is by far the most populous OECD country and receives fewer than the average number of refugees per capita: In 2010-14 (before the massive migrant surge in Europe in 2015) it ranked 28 of 43 industrialized countries reviewed by UNHCR. Asylum has two basic requirements. First, an asylum applicant must establish that he or she fears persecution in their home country. Second, the applicant must prove that he or she would be persecuted on account of one of five protected grounds: race, religion, nationality, political opinion, or particular social group. (Wikipedia) “America depends on and needs continuous legal immigration to support its economy and to continue its reputation and practice as a humanitarian caring Country. Today our rules and regulations require updating just like so many other practices and policies require in our government. Our asylum polices should be very very clear, openly circulated thorough out the world, and must be firmly enforced for all trying to use asylum. We should encourage asylum seekers to apply in their home country at our official embassy. Our embassy staff must be well trained on the policies, the process, and be required to conclude quickly AT the embassy. This may require humane holding facilities being built at the embassy. We must recognize the dangers of offering false hope to asylum seekers and encouraging them to travel to our border rather than go to our embassy.” According to the U.S. Citizenship and Immigration Services- Many people want to come to the United States to work. To work in the United States, you must have one of the following: - A Permanent Resident Card (also known as a Green Card), - An Employment Authorization Document (work permit), or - An employment-related visa which allows you to work for a particular employer. Each of the documents listed above has different application requirements. To apply for one of the documents above, you must meet different requirements. If your application is approved, the conditions you must meet and how long you can work in the United States will depend on whether you receive a Green Card, work permit, or visa. It is important that you adhere to all the conditions of your particular work authorization. If you violate any of the conditions, you could be removed from or denied reentry into the United States. - Temporary (Nonimmigrant) Worker A temporary worker is an individual seeking to enter the United States temporarily for a specific purpose. Nonimmigrants enter the United States for a temporary period of time, and once in the United States, are restricted to the activity or reason for which their nonimmigrant visa was issued. - Permanent (Immigrant) Worker A permanent worker is an individual who is authorized to live and work permanently in the United States. - Students and Exchange Visitors Students and exchange visitors may, under certain circumstances, be allowed to work in the United States. They must obtain permission from an authorized official at their school. The authorized official is known as a Designed School Official (DSO) for students and the Responsible Officer (RO) for exchange visitors. - Temporary Visitors For Business To visit the United States for business purposes you will need to obtain a visa as a temporary visitor for business (B-1 visa), unless you qualify for admission without a visa under the Visa Waiver Program. For more information on the topics above, select the category related to your situation to the left. The description of this comes from the U.S. Department of State. Generally, a citizen of a foreign country who wishes to enter the United States must first obtain a visa, either a nonimmigrant visa for temporary stay, or an immigrant visa for permanent residence. You must have a student visa to study in the United States. Your course of study and the type of school you plan to attend determine whether you need an F visa or an M visa. |To enter the United States to attend:||You need the following visa category:| |University or college||F| |Private elementary school||F| |Another academic institution, including a language training program||F| |Vocational or other recognized nonacademic institution, other than a language training program||M| Students cannot travel on the Visa Waiver Program or with Visitor Visas A student visa (F or M) is required to study in the United States. Foreign nationals may not study after entering on a visitor (B) visa or through the Visa Waiver Program (VWP), except to undertake recreational study (non-credit) as part of a tourist visit. For more information on the VWP, see Visa Waiver Program. For short periods of recreational study, a Visitor (B) visa may be appropriate A visitor (B) visa permits enrollment in a short recreational course of study, which is not for credit toward a degree or academic certificate. Learn more about Visitor Visas. Study leading to a U.S. conferred degree or certificate is never permitted on a visitor (B) visa, even if it is for a short duration. For example, a student in a distance learning program that requires a period of time on the institution’s U.S. campus must obtain a student (F or M) visa prior to entering the United States. Student Acceptance at a SEVP Approved School The first step is to apply to a SEVP-approved school in the United States. After the SEVP-approved school accepts your enrollment, you will be registered for the Student and Exchange Visitor Information System (SEVIS) and must pay the SEVIS I-901 fee. The SEVP-approved school will issue you a Form I-20. After you receive the Form I-20 and register in SEVIS, you may apply at a U.S. Embassy or Consulate for a student (F or M) visa. You must present the Form I-20 to the consular officer when you attend your visa interview. If your spouse and/or children intend to live with you in the United States while you study, they must also enroll in SEVIS, obtain individual Form I-20s from the SEVP-approved school, and apply for a visa (but they do not pay the SEVIS fee). Visit the U.S. Immigration and Customs Enforcement (ICE) Student and Exchange Visitor Program (SEVP) website to learn more about SEVIS and the SEVIS I-901 Fee. Visit the Department of State EducationUSA website to learn about educational opportunities for undergraduate and graduate study, and an overview of the application process. You can also visit the DHS Study in the States school search page to search for SEVP-certified schools. - Tucson’s specific issues- (map and pictures of Tucson) - Cochise Counties specific Issues- (Map of Cochise County) - 2nd Districts Infrastructure- (Show map of the 2nd District of Arizona) - Bridges- (pictures of bad roads and bridges)
<urn:uuid:24409170-8c33-4e5a-b81e-faa5ee727c04>
CC-MAIN-2020-16
http://jschmidt.us/immigration/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.948068
3,913
2.71875
3
Subject and Keywords: The phenomenology of Edmund Husserl proposes a new way of understanding the basics of research methodology. It analyzes the world of everyday experience and survive thanks to reveal permanent and unchanging structure of reality. The design of such research includes the fact that so far it was often denied, rejected as unscientific and without scientific basis. Meanwhile, Husserl indicates that a positivist thought of abandoning the world of everyday experience and the experience made a fundamental error. There is no knowledge of the world without the world - the surrounding world and directly experienced by the knowing subject. The world is not a world of disorder and chaos. Therefore, the purpose of phenomenological research is unveiling its permanent structure.
<urn:uuid:38b418b4-aaf7-4457-8fb4-e7b44f78217a>
CC-MAIN-2020-16
https://repozytorium.uni.wroc.pl/dlibra/publication/94672/edition/89341/content?ref=%2Fpublication%2F101571%2Fedition%2F94402
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.900984
146
2.5625
3
Looking back over red flags from the EU Rapid Alert System for Food and Feed (RASFF) over the past few years, labelling issues relating to allergens declarations certainly stand out. But a food label contains many other pieces of information. Recalls due to expiry dates, traceability and language use, for example are less widely reported, but still just as important for labelling compliance. ‘Use by’ dates are used on highly perishable foods that could be unsafe after the date and constitute an immediate danger to human health. ‘October’ was recently erroneously used in place of ‘September’ on beef tartare from Italy, thus extending the ‘use by’ date by a month and causing a recall. With such a long difference in date on a short shelf-life product, it’s easy to see why that happened. Yet, a far shorter extension of two days for chilled beef from Belgium produced a similar outcome. The global sourcing of ingredients means that traceability throughout the supply chain is more important than ever and it is a vital tool when a problem is identified. For this reason, products must, by law, carry traceability information. The absence of a lot code or an identification mark hampers traceability, but there are a surprising number of rapid alerts where essential traceability information is missing from the pack: peanuts from China, frozen octopus from Peru, rice noodles from China and eggs from Spain are a few examples. While goods can move freely between EU Member States, numerous RASFFs have been caused by language errors on-pack. Mandatory food information needs to appear in a language easily understood by the consumers of that country. So, chocolate candies sold in the Netherlands but not labelled in Dutch were subject to a rapid alert in July 2019, for example. In an ever-changing regulatory environment, simple labelling errors can result in major food safety implications and costly product recalls.
<urn:uuid:9d3db3fd-157c-4478-a006-7d184116ab77>
CC-MAIN-2020-16
https://www.foodmanufacture.co.uk/Article/2019/12/10/Label-compliance-issues-extend-beyond-allergens
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.948573
403
2.984375
3
Warren Public Library – a History by Sylvia G. Buck The Town of Warren (initially called Western) was established in 1741 and for many years there was no public library. Books were highly valued, however, though most people owned few of them. They bequeathed their books in their wills along with other family valuables. As some people’s personal wealth increased, they were able to establish their own private libraries. In 1802 (before Warren was renamed from its original name of Western), the Western Library was formed, a privately held institution in which borrowers had to be members and pay dues to belong. In 1831 this library, which was now called the Western Social Library, joined with the Western Lyceum which had been formed in 1829. Lyceums were first founded in Millbury in 1826. These popular lecture programs became a national movement in 1831. Warren (Western) was right in step with the times. In years to come, the Western Library absorbed the Lyceum and continued until 1841. During the Civil War, (1861-1865) people’s attention was diverted from their library and it may have become dormant. Public Library Established Following the Civil War, the need for a public library was recognized. In 1876 Warren Public Library was established as a corporation by an act of the Massachusetts Legislature. It was to be free and open to the public. But where to place it? They had to wait until the new Town Hall was completed in 1879 to gain a home. And what to do for books? Nathan Richardson, a Warren real estate broker, donated $500. for books, followed by an appropriation from the Town at the next Town Meeting. Some books were also given from the old Quaboag Seminary private high school collection. Others books were donated by Nathan Richardson’s niece, Mrs. Hastings of New York. Clara Adelphia Powers was the first librarian. In the 1880s, the town was growing quickly, with the cotton, wool and pump industries needing many workers. It wasn’t long before the library had outgrown its Town Hall quarters. Nathan Richardson led a Building Committee and contributed the first gift of $5,000. Businesses and industries added substantial donations and many other residents also subscribed to the Building Fund in large and small amounts. The total cost of the building was $15,000. Senator Wilson H. Fairbank, who lived in the home just east of the library, purchased the corner lot and arranged for the house to be moved from it. It went down Main St. and turned the corner onto Old West Brookfield Road where it still stands. Mr. Fairbank paid to have the lot graded and the stone wall built. His total contribution was valued at $4,000. Architect Amos P. Cutting of Worcester was engaged to design this Richardson Romanesque building, using Monson pink granite and Longmeadow brownstone. The firm of Patrick Beston of Springfield did the construction. The new Library building was dedicated July 4, 1890 with appropriate exercises, involving Officers of the Town and the Warren Public Library corporation and Building Committee. Inscribed in the granite over the door are the words “Free too All.” A plaque on the wall to the right reads “WPL – A Gift of Friends.” New Building Opened One of the features of the building was many dark portraits of Warren and Library notables. When the library was re-oriented to become more kid friendly in the 1950s, these were considered frightening to small children and were removed to the second floor. When it first opened, the library was first piped for gas illumination. Around 1898 John Chadsey paid to install electricity. This wiring served the building until it was replaced in 1980. When the library opened, it was in the days of closed stacks. The public needed to present their requests to the librarian, who greeted them under the green lampshade in the window of the lobby. The front section of the first floor was open only as a reading room. Visitors frequently came to read the daily papers and magazines here. Children’s area created In 1954, three units of low shelving designed as a peninsular divided this room in half. The right side of this front room was devoted to the newest titles of adult books and several easy chairs. The left side became the first designated children’s area. Shelves were built along the walls and a low table and chairs installed. Story Hour programs were begun. Open access to stacks Perhaps around the same time (mid 1950s), the service area was moved inside from the lobby. A table opposite the main inside entrance door served as the charge desk. With the public allowed inside, the fence that had prevented library visitors from accessing the full library until the 1920s was removed to encourage library visitors to take advantage of the stacks. New Charge Desk In the 1960s, a beautiful charge desk was built with contributions by library users, in memory of Anita Zalis, a long time library volunteer and assistant librarian. The original plan for the building was to have a Village Hall in the front of the second floor and a Portrait Gallery at the back. A Museum was added to the plan and glass cases were purchased. Lectures and other programs were held here, including after school programs given by Miss Christine Holman. Not long after the library was opened, the first floor ran out of shelving space. The architect was asked to design a staircase within the library operations area and to add shelving upstairs. The Portrait Gallery idea was abandoned and 2000 books were moved upstairs to what now was called the Stack Room. During the years of World War II, the second floor was closed off from downstairs to conserve heating oil which was needed for the war. A temporary ceiling was set in at the top of the stairs. While the upstairs was not being used, the roof leaked and stained the ceiling and walls. The roof was repaired, but the ceiling damage was not. By the 1980s, shelf space in the first floor was totally full. Funds were raised to repair and repaint the second floor space and in 2001 once again 2000 books were moved to the shelves upstairs. Circulation goes automated In 1994 computers were purchased and the card catalog became automated. Furnishings such as computer desks have been added as needed. The materials collection has evolved as popular taste demanded. In the 1990s, videocassettes were added to the collection, requiring their own shelf space. Cassette books were added, needing more shelf space. DVDs were added, needing even more shelf space. Compact disc books were added, needing more shelf space. Young Adult collection goes upstairs The Young Adult collection moved into the former Reference Room area. Shelves were purchased for the videos and the DVDs and the YA paper backs. Book shelves became full again. More shelving units were purchased and the Young Adult Non-Fiction collection moved to the second floor. Space still needed The building was initially planned for 6,000 books. As early as 1909, the library Board of Directors were investigating ways to enlarge the building. The building now (2009) holds more than 30,000 items. A Building Program has been written describing space needs for now and the future. It awaits action. The dark style being common during those years.
<urn:uuid:3befb4de-ccd9-4078-a435-c17d6e8d5c74>
CC-MAIN-2020-16
https://warrenpubliclibrary.org/about-warren-public-library/history/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.98809
1,532
2.953125
3
Populations of monarch butterflies and bees are facing significant challenges in North America. As a landowner or manager, you can do something simple to help: Plant pollinator habitat. Little spots and forgotten corners — from the size of a kitchen table to a kitchen itself, or even an acre — make a huge difference for pollinators on the landscape. And, other wildlife benefit, too. “If you’re going to seed-in a plot, autumn is the best time to do it,” said Drew Larsen, director of habitat education for fellow conservation organizations Pheasants Forever and Quail Forever. “The majority of what you’ll be planting will be wildflower seeds. They have a hard coat that requires winter’s freeze-thaw cycle to break down that coat so the seed can sprout.” Think October to late November, depending on where you live, until the ground is frozen. You can also seed in spring, but seeds need to have gone through a winter cycle. Getting seed onto the ground is a simple three-step process. First, remove existing vegetation, Larsen said. “Mow it first, then use a herbicide,” he said. “On really small plots, you can weigh down black plastic on the ground for a couple weeks after mowing to kill what’s underneath.” Next, remove any remaining vegetation so seed can contact open ground and bare dirt. “There’s no need to till, as that could encourage weeds.” Finally, broadcast your seed. “Wildflower seeds are tiny,” Larsen said. “You can hand toss them. Or use a hand-held spreader. You want to work to get a nice, even distribution.” Consider rolling or tamping lightly so seed assuredly makes contact with the ground. NWTF partner Mossy Oak Native Nurseries is a good source for native wildflower seed. Most products are available at the NWTF Seed Store (seedstore.nwtf.org). Try their Pollinator Package or Full Bloom packets, or a combination of individual species packets such as purple coneflower, swamp milkweed, butterfly milkweed, black-eyed Susan (rudbeckia), blanket flower (garillardia), prairie clover, cardinal flower and lupine. “Any good pollinator plot seed mix, whether you buy a pre-mix or build your own, should contain at least two species of milkweed and three species that will bloom in each of the three bloom periods —spring, summer and fall,” Larsen said. “Those are minimums. More is better. No matter where you shop and buy, the key is to get certified seed from wildflowers native to your area. They will grow best.” In really small plots, you may choose to plant living, started plants. Results certainly come faster. Do it in early fall, or in spring after the last frost. Costs will be higher, but in a small space, the quick results and rewards may be worth it. Plus, those perennial plants will spread and seed themselves. Some common milkweed may well “volunteer” on its own and that’s good. You can also get milkweed seeds and scatter them when you plant live plants. In addition to pollinators, songbirds thrive, cotton-tailed rabbits find haven and whitetails browse in the habitat. “And gamebirds love pollinator plots for nesting and brood-rearing,” Larsen said. “The bare ground beneath the stems is better than grass for young birds to move around and hunt insects, which also thrive in the habitat. I have seen successful wild turkey nests in pollinator plots as small as a half-acre.” Got an oddball corner, forgotten swale, roadside ditch or section of backyard yearning to be wildlife-friendly? Plant a pint-sized pollinator plot.
<urn:uuid:0828d676-89e6-45f8-b93d-dd50c6d26eaf>
CC-MAIN-2020-16
https://www.nwtf.org/conservation/article/pint-sized-pollinator-plots
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.922905
834
3.203125
3
Want to build software that works on any machine, any configuration? Use Docker. Bridging the gap between programmers and other stakeholders involved in producing a software product for desktop, enterprise, web, or mobile (i.e. testers, system admins, the DevOps team, management and even customers!), Docker is what is known as a containerization management tool that is a unique new twist on traditional virtualization. Today’s article gives you a brief introduction to Docker. Docker counts heavyweights such as PayPal, Indiana University, Business Insider, eBay, and General Electric amongst its userbase, so you know that if it’s working for them, then it might just work for you, too. It’s a relatively new tool that has made inroads into reducing the amount of resources required for software production, testing, management, and deployment, by the use of containers. Containerization has quickly become a more popular alternative to traditional virtualization, for many reasons. Why containerization over virtualization*? Virtualization imports a guest operating system onto a host operating system. This means that you can run multiple different operating systems at the same time, on one machine. Binaries and libraries are then loaded into each of these virtual machines. However, this compromises machine performance, and compromises efficiency of the virtual machine, due to the influence of the hypervisor, which negotiates between the host machine and the virtual machine/s. Containers do away with the hypervisor and the virtual machines, instead, replacing it with a container engine. This makes for a leaner, more efficient set up. Binaries and libraries of each container, unlike virtualization, are run on the host kernel, which means that the processing speed is fast. You cannot, however, use straight containers on a different platform, for instance, a Windows application on a Linux box. Docker requires the underlying architecture to be the same (e.g. x86, ARM), unless there is a virtual machine also running. *You should note that containerization is not completely different to virtualization, it is a new way to do virtualization that is more portable and lightweight than running up virtual machines. What is Docker? Docker is a way to package your application, its dependencies, and structure into a container, so that it can run, as well as be developed, or tested, under any environment. Each container may contain multiple applications, if these applications share the same environment. It packages a runtime environment all into one neat little container, for use almost anywhere. Docker is considered a DevOps tool, as it is used throughout the continuous testing and continuous deployment phases of DevOps. How does Docker work? Docker works as a client-server process, by running up a Docker host (which hosts the containers) via a daemon, and a Docker client, which communicate between each other via a Rest API, Socket.IO and TCP. This can be all run up and configured via the terminal in Linux systems, however in Mac and Windows you’ll need to use the extra Docker tools that come with the Docker installation to set everything up. To create containers, you will use a Docker Image, or multiple images, which are templates from which a Docker container can be created. You can either use someone else’s image, or build your own. Docker Registries, where these images can be stored, are in a public or private cloud. The images that are used for your containers are pulled from the registry to the Docker host, so they can be run to facilitate your containers. How does Docker benefit non-developers? For testers, the dev ops team, management, and customers, Docker makes for a great way to transport applications that are not in bundled application form yet. - No need to install dependencies, set up environment variables, etc. - Saves time and effort in setting up - Evaluate software quickly, without overheads - Application environment the same for all stakeholders in the project - Can be deployed on a large number of systems quickly - Can be integrated with other DevOps tools, such as Jenkins, Vagrant, Ansible, AWS, and more How does Docker benefit developers? While the advantages of Docker for non-developers carry over to developers, too, there are some distinct advantages of developers using Docker: - Can easily work on projects on any machine - Can share workload with others, without sharing machines or setups - No need to think about how you are going to deploy the code on other machines, just write it Other benefits of Docker There are multiple other advantages of using Docker, that benefit everyone from a wider perspective: - Docker will allocate memory on the fly, unlike virtual machines, where memory needs to be allocated before the virtual machine is started (and unused memory within the VM cannot be reused elsewhere) - Docker deployment is easily scalable - Docker is fast to boot - Docker can run on all major cloud computing - Docker has in built version control - Docker isolates resources - Docker containers can run multiple instances of tools like Jenkins and Puppet, or share them easily with other containers Looking to integrate Docker into your development cycle? Let us help set you up with using Docker infrastructure and the training needed to take full advantage of this powerful and resource saving tool. At iRonin, we are providers of quality, cutting edge web and mobile application development solutions, as well as DevOps resourcing and management to drive your business further. Experts in software development We are a 100% remote team of software development experts, providing web & mobile application development and DevOps services for international clients.
<urn:uuid:3b9c4588-4462-459e-9c9a-a85dad31cb2f>
CC-MAIN-2020-16
https://www.ironin.it/blog/docker-quick-and-easy-alternative-to-virtualization.html?articles
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.926736
1,166
2.953125
3
(Download full-sized image here.) Life 73: 1900 March 27, 1919 The National Prohibition Amendment was ratified by the United States in 1919 and took effect at midnight 16 January 1920 (one year to the day after achieving ratification). It was repealed by amendment in 1933. The amendment banned the "sale, manufacture, and transportation" of alcoholic beverages. Opponents of Prohibition argued that American soldiers were returning from Europe as victorious veterans, and even though they had fought against the forces of totalitarianism, making "the world safe for democracy," their liberties were being curtailed by anti-liquor interests in America.
<urn:uuid:a45a0897-96e4-4d1a-a4c2-577ad703b90f>
CC-MAIN-2020-16
https://hti.osu.edu/opper/lesson-plans/prohibition/images/returned-soldier-i-should-have-stayed-home-and-fought-for-liberty
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.982328
126
2.890625
3
Online learning continues to impact higher education for a number of reasons. It is a way to reach students in lieu of a traditional brick and mortar setting, the students it seeks to help are more comfortable with technology and desire its incorporation in their learning (Wooten & Hancock, 2009), and it allows for pedagogical techniques that are not possible in a traditional classroom. For teacher educators, online learning also has an impact in that these emerging professionals often imitate the instruction they see modeled. Indeed, online learning is finding its way into K-12 curricula throughout the country as schools struggle with budget concerns. Examples include offering advanced placement courses in rural communities, expanding foreign language offerings, and providing alternatives to the traditional school settings for marginalized students. The unfolding body of research into preservice teacher preparation is, therefore, vital to developing the next generation of teachers and, subsequently, the next body of K-12 learners. This article helps answer the research question about preservice teachers’ perceptions toward online learning after completing an elementary science methods course. Data were collected by surveying and interviewing preservice teachers at the end of a course that was anchored around an electricity module. The module was developed by a curriculum company as part of a National Science Foundation (NSF) grant that investigated the incorporation of online modules in teacher training. The modules included webpages and PDF files describing subject matter on the module’s content, embedded videos of elementary students’ in situ learning of the module’s content, and webpages and PDF files about pedagogical skills seen as best practices in an elementary classroom (i.e., helping identify students’ misconceptions, using analogies, and writing effective lesson plans) that are connected to the module’s content and videos of elementary student learning. The desire for and occurrence of online learning will continue to impact the profession of teaching. Many school districts are already using distance education in the professional development programs for practicing teachers as a way to decrease time and distance. As such, they expect preservice teachers to have existing schemata to learn and excel in this type of professional development model. By gathering preservice teachers’ perceptions, their voices can be added to the recent growing body of knowledge in exploring the best way to integrate online learning into the training of these emerging professionals (Annetta & Dickerson, 2006; Annetta & Shamansky, 2008; Sawchuk, 2009; Shin & Lee, 2009; Topcu & Ubuz, 2008; Wooten & Hancock, 2009). The percentage of U.S. universities offering distance education courses has increased dramatically over the last decade. In the 1997-98 academic year 34% of all U.S. universities offered distance education coursework (Lewis, Snow, Farris, & Levin, 1999). By 2001 49% of all U.S. universities provided distance education offerings (Waits & Lewis, 2003). By the end of the 2006-07 academic year 66% of all U.S. universities offered distance education coursework (Parsad & Lewis, 2008). Public 2-year and public 4-year universities led the way with 97% and 89%, respectively, of all such institutions providing distance education offerings in 2006-07. Private 2-year and 4-year nonprofit universities, while offering distance education, currently do not do so to the extent of their public counterparts. One facet of distance education includes online offerings via the Internet. These types of offerings represent about 75% of all credit-bearing distance education experiences (Parsad & Lewis, 2008). Perhaps the decadal-increased emphasis is due to the fondness of, desire for, and expressed comfort level using technology with today’s emerging professionals. Indeed, Prensky (2001) described how today’s college students are “natives” when it comes to using technology in their learning. As technology availability increased around this time, other researchers in science education began exploring how it could be used in preservice teacher development. Flick and Bell (2000) outlined guidelines to successfully incorporate technology into the preparation of preservice teachers. College students over the past decade have spent much of their lives using cell phones, computers, and sophisticated gaming systems to occupy their time, education, and leisure. Students and other professionals similarly not only want but demand this type of experience in their university coursework and professional development (Wooten & Hancock, 2009). Recent studies have highlighted the potential of online experiences to impact preservice and in-service teacher development, such as an ability to learn the same amount of content information as compared to a traditional lecture-based course, participants’ expressing a more positive experience, and increasing connections to participants’ demands and accommodations to integrate their lifestyle and coursework/professional development (Annetta & Dickerson, 2006; Annetta & Shymansky, 2008; Coffman & Riggs 2006; Kaplan, Rupley, Sparks, & Holcomb, 2007; Shin & Lee 2009; Stephen & Barford, 2005; Topcu & Ubuz, 2008; Veal, Kubasko, & Fullagar, 2002; Wooten & Hancock, 2009). These and other studies also indicate that the nature of participants’ experiences need to be carefully planned and implemented so that a lack of face-to-face time does not have a negative impact upon participants’ successes (Bore, 2008; O’Neal, Jones, Miller, Campbell, & Pierce, 2007; Shin & Lee, 2009; Stephen & Barford, 2005; Topcu & Ubuz, 2008). As the existing demand continues to impact curricular offerings for undergraduate students, ongoing discussions are important about the validity and appropriateness of online offerings as a substitute for traditional hands-on experiences (Sawchuk, 2009). This discussion may be especially significant in the case of the sciences or science teacher training, where the incorporation of hands-on laboratory work is seen as vital for modeling the processes of science as called for by the National Science Education Standards (National Research Council, 1996) and Project 2061 (American Association for the Advancement of Science, 1993). Previous studies have shown that elementary preservice teachers in science can successfully utilize video and online learning (Dietz-Uhler & Bishop-Clark, 2001; Li, 2003; Robertson, 2007; Rovai, 2000). Yerrick, Ross, and Molebash (2005) studied the use of editing software and summarized that preservice teachers can effectively use video to identify students misconceptions while creating digital videos of their teaching. Indeed, much of the current generation is comfortable with technology, and they have been learning on the Internet since they began school and learned to read. This article seeks to present the perceptions of preservice teachers using video vignettes, called video cases, during an online component of their undergraduate elementary science methods course. These perceptions guide the research question about what are preservice teachers’ perceptions toward online learning after completing an elementary science methods course. Organization of the Modules The video cases were included in modules produced by a curriculum research company in the western United States as part of a NSF grant. The company recruited universities to serve as pilot sites to field test developmental versions of four topical modules. The modules included plants, inquiry, water, and electricity. Each module’s basic structure includes a series of preassessments about the science concepts to be learned in a module, embedded PDF files with information about the concepts, online video cases of elementary students exploring activities and being taught the concepts by their classroom teachers, prompts that require reflections from preservice teachers about the elementary students’ learning experiences, and a postassessment about the concepts. Prior to serving as a pilot site for the NSF study, 25 instructors from across the U.S. were flown to the company’s location for training and insight toward using the online modules. Instructors then identified online modules for which they could serve as a pilot site. The group of pilot instructors trained for 3 days in troubleshooting the online module, exploring preservice teachers’ preconceptions, and discussing pedagogical strategies that might be useful while incorporating the online modules during the pilot semester(s). Teacher training videos have often been used to showcase a classroom teacher working with elementary students while teaching a lesson. The purpose often is to model specific teaching methods, assessment strategies, or management techniques. Preservice teachers or other observers, such as practicing teachers, might then be better able to use this modeling to design lessons, prepare for field experiences, and discuss how they might handle specific classroom scenarios. The video cases addressed this modeling using two themes. The first theme explored the content material found in the module. This theme led to the exploration of central concepts about the topic, how elementary students understand and learn these concepts, and strategies for teaching these concepts. These tasks were aided by providing files in PDF format for preservice teachers to read and understand concepts as they explored typical teaching activities associated with the content. Journaling prompts in the module required them to elaborate on their content knowledge and its development before and after exploring the activities. The second theme in the module explored elementary students’ expressed understanding of the topic. This was accomplished by requiring preservice teachers to reflect on observations from video cases of classroom teachers teaching the concepts, elementary students’ verbalized answers to questions during the recorded lessons, and elementary students’ answers to questions during interviews about the concept being explored. To bind the two themes together the modules require that preservice teachers investigate, explore, and reflect upon (a) teaching techniques modeled to teach the science concepts and (b) ways elementary students’ expressed understanding can be analyzed by the technique(s). Examples include writing focus questions to ignite a lesson, using analogies while teaching concepts, and using effective questioning techniques. Preservice teachers completed reflective online journals about these strategies as well. To address the research question about preservice teachers’ perceptions toward online learning after completing an elementary science methods course, this study utilized and analyzed an end-of-term survey and focus group answers. The survey was given and focus group conducted at the end of a semester that incorporated an online module about electricity. The preservice teachers were a convenience sample selected because their experience was related to selection of this site as a pilot for the larger NSF study previously described. The end-of-term survey was not part of the NSF study, but followed institutional protocol and IRB approval. The electricity module was used for two semesters before the data was gathered in the study described here. As part of the larger NSF study, preservice teachers’ answers to questions, prompts, and content-based assessments were simultaneously collected by the curriculum research company, and anonymous surveys about the experience were collected by a third-party assessor for a blind review about preservice teachers’ perceptions of the electricity module. Therefore, the survey was used as the instrument for the study described here. In this study preservice teachers worked with the electricity module because it integrated well into the program curriculum they were completing. The science methods course is targeted to teaching grades 4 through 6. It utilizes a Full Option Science System (FOSS) electricity kit. The online electricity module contained lessons targeted to, video cases from, and reflective prompts centering on learning in grades 4 and 5 elementary students. Therefore, the two curriculum pieces coincided with one another. The electricity module was divided into folders that explored (a) series and parallel circuits, (b) conductors and insulators, (c) switches and bulbs, (d) building science lessons, and (e) assessing students and their learning. During the online module implementation (10 weeks in the sections of science methods) preservice teachers’ reflections into the video cases were assessed for insight about elementary students’ concept development and thinking while learning as part of their semester grade. The 38 preservice teachers in this study were in two difference sections of courses (20 in Section 1 and 18 in Section 2), had been accepted to a Department of Teacher Education program accredited by the National Council for Accreditation of Teacher Education in the midwest United States, and were in the last academic year of their undergraduate program. To be accepted by the program they must have passed the Praxis I examination meeting state cutoff scores, possessed a 2.75 GPA, passed a criminal background check, and successfully completed all coursework applying toward their degree with at least a C or better. Approximately 50% of the preservice teachers participated in a full semester practicum (often called student teaching) in the subsequent semester. The remaining 50% completed their full semester practicum in the second semester following their participation in the course in which this study occurred. The course seeks to emphasize the inquiry-based practices of the basic and integrated process skills promoted by science education professional organizations. Modeling of inquiry-based science through FOSS teaching kits, cognitive discourse, and practical strategies for elementary classrooms are emphasized. The general format for teaching the module was that users completed a preassessment on the concepts found in the module to allow them to better understand what they knew and did not know about the concepts before reporting to class, where they then explored an activity from the FOSS kit addressing the concepts. The prompts were open ended in nature and not used for measuring preservice teacher achievement. In the interval between the activity and the following class period users were given an assignment to watch the video cases of classroom teachers teaching the same or similar lessons to elementary students and answer reflective prompts about elementary student learning and observations of the teachers’ performances. Prompts focused on issues such as teacher-student interaction, student expression of content knowledge, and strategies to teach content knowledge. Examples include (a) how elementary students expressed content knowledge of the flow of electricity (preservice teachers identified whether students expressed knowledge correctly or expressed misconceptions in the video cases), (b) strategies utilized by teachers to help elementary students learn content of circuits (using visuals, using analogies, and pedagogical techniques for asking questions to students), and (c) strategies utilized by teachers to plan inquiry-based science instruction (developing focus questions and asking probing questions). In the next class meeting preservice teachers discussed the video cases of elementary students’ learning while comparing their online responses to the reflective prompts with one another. The creators of the modules produced the electricity module under the premise that the entire module could be completed without any in-class communication or participation. At the end of the module a survey was administered that included nine Likert-scale questions and three open-ended responses to collect information about their perceptions of the experience. The survey used a 4-point scale (1 = strongly disagree, 2 = disagree, 3 = agree, 4 = strongly agree). Additionally, preservice teachers were matched with a number from one through 38 and a random number selector was used to select six participants for an interview group. This group provided additional feedback about the end-of-term survey and overall semester experience. The interview, along with the data collected from the survey, helped provide insight into the perceptions of preservice teachers toward online learning after completing the electricity module and methods course. Results from the Likert-scale, open-ended questions, and interview group follow. Results (see tables 1 and 2) indicate relatively high agreement that the modules were easy to use and well organized, with averages of 3.5 and 3.4 on questions 1 and 2, respectively. Note that perceptions of these two items may have been enhanced by the fact students could ask questions during face-to-face class sessions. A scavenger hunt activity was completed to begin the module to explore its layout as well. Preservice teachers said that online learning was beneficial (3.7 on Question 3) and realistic to them (3.7 on Question 4). A notable perception of students is observable in questions 5 and 6. Students recognized the differences (2.9 on Question 5) in the types of reflective prompts the module utilized to support its themes versus the traditional ones they often complete about their observations of a typical classroom environment. Average Score for Each Question About Online Module Learning in an Elementary Science Methods Course |1. The online modules were easy to use.| |2. The online modules were well organized.| |3. The online modules were beneficial to my learning.| |4. The online module video cases provided realistic versions of classroom life.| |5. The online reflective prompts were similar to offline reflections that I complete in other college level courses.| |6. The online reflection prompts were beneficial to my learning.| |7. Overall, I would prefer more online learning as part of my traditional methods courses.| |8. Overall, I would prefer more online learning in place of my university courses.| |9. Overall, I would prefer more online learning in place of my traditional methods courses.| |[a] 1 = strongly disagree, 2 = disagree, 3 = agree, 4 = strongly agree| Top Three Responses for Open-Ended Survey Questions Most Frequent Responses |10. What were the strengths of the online module and why?||1. To have opportunity to watch a teacher teach a lesson and then discuss this teaching and elementary students’ answers with other preservice teachers during the following class meeting.| 2. Completing their journals online versus traditional paper/print. 3. Seeing that actual teachers make mistakes. |11. What were the weaknesses of the online module and why?||1. Much of the information was repeated.| 2. The modules were too lengthy. 3. Occasionally there were technical glitches that prevented them from completing their work. |12. If you were redesigning the online module what changes would you make?||1. Reduce the amount of redundant information.| 2. Omit the preassessment and postassessment quizzes. The process and incorporation of them became burdensome, repetitive, and unhelpful. 3. Decrease the amount of information over the entire module and focus on targeted areas for learning. Importantly, they believed the prompts were beneficial in their learning (3.8 on Question 6). Results indicate a desire for inclusion of more online delivery as part of their methods coursework (3.7 on Question 7) and as part of their university coursework (3.8 on Question 8). However, they were somewhat less likely to view online experience as a replacement for their traditional methods courses (3.0 score on Question 9). Conclusions and Implications An inference can be drawn that preservice teachers still appreciated the opportunity to talk with one another about what they were experiencing during their science methods course. In addition to completing the module, preservice teachers were also completing a traditional field experience where they were traveling to a local school and teaching lessons to elementary students. Perhaps the positive expression for a traditional methods experience is attributable to the fact that most of the preservice teachers were scheduled to become student teachers the following semester. The immediacy of student teaching may have influenced a desire to discuss learning with peers because they would be standing in front of elementary students in a couple of months. The video cases allowed the same point of reference for discussion, and preservice teachers were able to use this point of reference to unify discussion and learning. To this extent they support findings of Robertson (2007) that preservice teachers value the shared perspective of others to benefit from online learning. One interesting finding arose from the focus group as the group reflected upon the dissimilarity between the module’s reflective prompts and the traditional prompts preservice teachers typically answer in their program’s courses (questions 5 and 10). During the interview preservice teachers explained that the traditional prompts they often answer are basic and ask them to reflect about what went well and what did not go well. The traditional prompts might also report about the physical layout of a classroom or on some type of classroom management or discipline issue. The reflective prompts in the module often focused on what elementary students expressed knowing about a concept. As preservice teachers discussed what elementary students expressed knowing, they said that the reflective prompts helped them better verbalize and grasp what they did or did not comprehend about content they might be teaching in the future. Using the video cases made improved comprehension possible because all preservice teachers could watch the same learning experience. Further, preservice teachers valued observing that in-service teachers can rush and make mistakes (Question 10) in addressing student learning, as was sometimes highlighted in the videos. The interview group repeatedly stated that it was helpful for all of them to observe the same learning experience through the video cases. This common focal point among all preservice teachers would not likely be possible in a traditional field experience, where each preservice teacher is assigned to a different location. Preservice teacher field experiences come in several varieties. A methods course may be taught concurrently along with its own field experience. Many universities have moved to a model that requires preservice teachers to participate in fewer but deeper field experiences. These field experiences are often connected with a course or set of courses. Sometimes the course is methods based, and sometimes it is linked to a more general course, like classroom management. The result is that some methods courses’ linkages with field experiences might be diminished. In such setups, some teacher development programs may view video cases as a way to supplement this loss. For programs able to maintain the linkage, video cases may be viewed as a way to enhance and support the experiences of preservice teachers. They can discuss how the elementary classroom environments and elementary students’ learning experiences are similar to and different from what they are observing in field experiences in which are participating. Online video cases will likely continue to provide instructors with the ability tangentially to capture elementary classroom learning environments and elementary student learning while working with preservice teachers. Online access and journal prompting may cause university programs to consider yielding to preservice teacher demand for more online learning. If so, then a hybrid methods course delivery may be applicable. When integrated appropriately the video cases allow instructors to create learning environments centered upon traditional curricular issues found in a science methods course (using probing questions, identifying misconceptions, and structuring lessons). However, with this gain is a potential loss for methods courses that explore the nature of science by linking class time between hands-on exploration of science and science concept development. This study supports the findings of Dietz-Uhler and Bishop-Clark (2001), Li (2003), and Rovai (2000) that an effective use for the incorporation and use of video cases can be made as a pre-instructional tool for subsequent class meetings. I have taught the science methods course for about 10 years and offer the following qualitative statement. During the semester of this study, observations of preservice teacher interactions when discussing elementary student learning seemed to indicate that class was more purposeful and effective than in semesters where the video cases were not utilized. Because preservice teachers had all watched the video cases and posted their responses as evidence of this, they appeared better prepared for in-class activities. Future studies might incorporate the use of techniques to explore validation of this statement. With their background preparation more apparent, the opportunity to focus learning more quickly on in-class objectives is possible. Students have a better common experience (their online work) for initiation of concept discussion and elementary classroom application. The alternative that many instructors know all too well is to assign a reading with the hope that preservice teachers complete the exercise. Although this article focused on the perceptions of using video cases with preservice teachers, their use with practicing teachers is already being implemented in professional development centers across the nation. Continued research into their impact upon pedagogical and content knowledge is needed. For now, user perception from this study indicates that they are enthusiastically desired. American Association for the Advancement of Science. (1993). Benchmarks for science literacy. New York, NY: Oxford University Press. Annetta, L., & Dickerson, D. (2006). Integrating point-to-point videoconferencing into professional development of rural elementary school science teachers. Contemporary Issues in Technology and Teacher Education, 6(4). Retrieved from https://citejournal.org/vol6/iss4/science/article1.cfm Annetta, L., & Shymansky, J. (2008). A comparison of rural elementary school teacher attitudes toward three modes of distance education for science professional development. Journal of Science Teacher Education, 19(3), 255-267. Bore, J. (2008). Perceptions of graduate students on the use of web-based instruction in special education personnel preparation. Teacher Education and Special Education, 31(1), 1-11. Coffman, M., & Riggs, L. (2006). The virtual vee map. Journal of College Science Teaching, 36(1), 32-39. Dietz-Uhler, B., & Bishop-Clark, C. (2001). The use of computer-mediated communication to enhance subsequent face-to-face discussions. Computers in Human Behavior, 17, 269-283. Flick, L., & Bell, R. (2000). Preparing tomorrow’s science teachers to use technology: Guidelines for Science educators. Contemporary Issues in Technology and Teacher Education (1)1. Retrieved from https://citejournal.org/vol1/iss1/science/article1.htm Kaplan, D., Rupley, W., Sparks, J., & Holcomb, A. (2007). Comparing traditional journal writing with journal writing shared over e-mail list serves as tools for facilitating reflective thinking: a study of preservice teachers. Journal of Literacy Research, 39(3), 357-387. Lewis, L., Snow, K., Farris, E., & Levin, D. (1999). Distance education at postsecondary education institutions: 1997–98 (Report No. NCES 2000–013). Washington, DC: National Center for Education Statistics, U.S. Department of Education. Li, Q. (2003). Would we teach without technology? A professor’s experience of teaching mathematics education incorporating the Internet. Educational Research, 45(1), 61-77. National Research Council. (1996). National science education standards. Washington, DC: National Academy Press. O’Neal, K., Jones, W., Miller, S., Campbell, P., & Pierce, T. (2007). comparing web-based to traditional instruction for teaching special education content. Teacher Education and Special Education, 30(1), 34-41. Parsad, B., & Lewis, L. (2008). Distance education at degree-granting postsecondary institutions: 2006–07 (Report No. NCES 2009–044). Washington, DC: National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Prensky, M. (2001). Digital natives, digital immigrants. On the Horizon, 9(5), 1-6. Retrieved from http://www.marcprensky.com/writing/Prensky%20-%20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1.pdf Robertson, A. (2007). Development of shared vision: Lessons from a science education community collaborative. Journal of Research in Science Teaching, 44(5), 681-705. Rovai, A.P. (2000). Building and sustaining community in asynchronous learning networks. Internet and Higher Education, 3, 285-297. Sawchuk, S. (2009). Education schools expand web-only offerings. Education Week, 28(26), 23-25. Shin, M., & Lee, Y. (2009). Changing the landscape of teacher education via online teaching and learning. Techniques, 83(9), 32-33. Stephen, V., & Barford, J. (2005). A journey through cyberspace: technology and course adaptation. The Delta Kappa Gamma Bulletin, 71(4), 47-52. Topcu, A., & Ubuz, B. (2008). Effects of the asynchronous web-based course: Preservice teachers’ achievement, metacognition, and attitudes towards the course. Journal of Educational Technology & Society, 11(3), 181-197. Veal, W., Kubasko, D., & Fullagar, P. (2002). Web based course on earth and environmental science for preservice and inservice teachers. Journal of Science Teacher Education, 13(2), 131-146. Waits, T., & Lewis, L. (2003). Distance education at degree-granting postsecondary education institutions: 2000–2001 (NCES 2003–017). Washington, DC: National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Wooten, B., & Hancock, T. (2009). Online learning offers flexibility and convenience for teacher education. Momentum, 40(1), 28-31. Yerrick, R., Ross, D., & Molebash, P. (2005). Too close for comfort: Real-time science teaching reflections via digital video editing. Journal of Science Teacher Education, 16(4), 351-375. University of Southern Indiana 219 total views, 1 views today
<urn:uuid:454be74e-c47e-4343-9354-35e370247be6>
CC-MAIN-2020-16
https://citejournal.org/volume-11/issue-3-11/science/preservice-teachers-perceptions-of-learning-science-methods-through-hybridizing-asynchronous-and-traditional-experiences/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.932761
6,094
3
3
As a Community Health Psychologist working with small children (ages 2-9), parents often asked me about my views on childhood vaccines. You can be sure that today, as a Clinical Epidemiologist and Medical Research Scientist, I am asked the same questions even more often. I find that, sadly, the average person asking about vaccines fall into one category: anti-vaccine looking for agreement. Unfortunately, I have yet to be able to offer any. It’s not that I know everything, but as a medical scientist, I have read the arguments on both sides, I have reviewed the latest studies, examined the biostatistics (most people fail to understand how statistical association works, let alone multiple regression biostatistics), and objectively weighed the evidence. And I have read and reviewed the evidence against vaccines, which is virtually nonexistent, albeit with the exception of emotionally charged anecdotal stories that often prove to be just that: stories. Case in point, Jenny McCarthy, whose son she now admits never had autism. She continues to rail against vaccines and still claims that her son had become autistic from the MMR. And the anti-vaccine folks continue to rally around her. When you obtain your child’s healthcare advice from a B-movie star and former playboy bunny, you are playing right into the hands of the anti-vaccine camps. And into Darwin’s hands as well. Since vaccines were first discovered in China some 1,200 years ago to treat Smallpox, there have been those who do not comprehend the basic principles of vaccination and out of ignorance, criticize against the process. When Edward Jenner demonstrated how his “Cowpox” vaccine could drastically reduce Smallpox in 1796, there were a few who decried the act as “Ungodly” and demanded an end to vaccines. In 1885, Louis Pasteur’s rabies vaccine made an unimaginable impact on human disease. Yet even at the dawn of bacteriology, when scientific developments rapidly followed, doctors and health officials had to battle ignorance and superstition from those claiming “Miasma” or gases caused disease. Progress marched on, and Antitoxins and vaccines against diseases like diphtheria, tetanus, cholera, plague, typhoid, and tuberculosis, claiming hundred’s of thousand’s of children’s lives were developed through the 1930s. Childhood diseases, once eradicated in the US or very nearly so have begun to emerge once again, and have begun to claim children’s lives. The reason is almost completely the blame of a charlatan and “researcher” by the name of Andrew Wakefield. Wakefield was a British medical doctor who, along with colleagues, submitted a paper to the medical journal The Lancet in 1998, reporting a statistical link between the MMR vaccine and the appearance of autism and bowel disease. That is hardly the end of the story, but rather, just the beginning. The first basic logical rule of research is the ability for other researchers to reproduce your findings. If I replicate your experiment, then I should be able to replicate your findings. If I cannot, then I have to call into question either your results, or your process. Other researchers, unable to reproduce Wakefield’s findings or even confirm his hypothesis of an association between the MMR vaccines and autism began to question the research. In 2004, an investigation by the Sunday Times identified undisclosed financial conflicts of interest on Wakefield’s part, and by then most of his co-authors withdrew their support for the study results. As you might imagine, this sparked a great deal of interest within the British General Medical Council, who conducted an inquiry into the allegations of misconduct against Wakefield and two of his former researchers. The investigation centered on numerous findings, including the children with autism were subjected to unnecessary invasive medical procedures including colonoscopy and lumbar puncture, and further, that Wakefield acted without the required ethical approval from an institutional review board or IRB. January 2010, the British General Medical Council found three dozen charges proved against Wakefield and his co-conspirators, including four counts of dishonesty and 12 counts involving the abuse of development and mentally challenged children. According to the panel, Wakefield had “Failed in his duties as a responsible consultant” acting against both the best interest of his patients, and had performed with “dishonesty and irresponsibility” in the conducting of his research. Wakefield had been paid and paid handsomely to “discover” what he discovered: that the current vaccine was “unsafe.” How handsomely you might ask? According to information obtained under the Freedom of Information Act, Wakefield was paid £435,643 in fees, plus £3,910 expenses. Over $700,000 US dollars. The Lancet immediately issued a full retraction of the original publication on the basis of these findings, noting that elements of the manuscript had been clearly falsified. As a result, Andrew Wakefield was removed from the Medical Register in May 2010, for identifying deliberate falsifications in research and is barred from practicing medicine in the UK. Sadly, the damage had already been done. Armchair scientists and those embracing an “anti-medicine” bent had rallied around the results and were willing to ignore the findings of fraud. Further investigation and testimony showed that Wakefield had planned to launch a venture on the back of an MMR vaccination scare that would profit from new medical tests and “litigation driven testing.” Lawyers had decided that suing pharmaceutical companies for damages would be lucrative, but only with medical support. Finally, in November 2011, a report in the British Medical Journal revealed the original raw data of Wakefield’s study, indicating that Wakefield’s claims were patently false; children in his research did not have Inflammatory Bowel Disease, and Wakefield knew it. Even today Wakefield’s study and his now disproved claim that the MMR vaccine might cause autism has directly led to a significant decline in vaccination rates in the United States, United Kingdom and Ireland. As a result, the incidence rates of measles and mumps have dramatically increased, resulting in serious illness and even fatalities. Wakefield has continued to defend his research and conclusions, saying there was no fraud, hoax or profit motive despite the overwhelming evidence to the contrary. So now, in 2014, what are we to make of this anti-vaccine scare? Unless you understand how immunity works, have even a basic microbiology understanding, and understand statistical association, get your healthcare from actual health scientists and physicians rather than from reality TV starlets. If you want to educate yourself, and you should, ignore TV talk shows, popular media, and talk radio hosts, and read up on the science from peer-reviewed relevant journals. For example, if a journal of culinary arts makes a proclamation on medicine, you should be naturally suspicious. There are significant advantages to the peer-review process, including establishing the legitimacy of research based upon the expert information of different specialists in the field. Peer review provides significant criticism with the intention that scientists can revise and enhance their papers before Publication for accuracy and clarity. Peer review enables Journal editors to select the most important research findings for publication in their journals, based upon the subject, and independent reviews of an expert group. Finally, the peer review process ensures that the research study is comprehended and acknowledged by the majority of researchers in that field. Be suspicious of claims made by non-researchers, or arguments to emotion based on ignorance and opinion. For example if someone says that if vaccines worked no one would get the disease. Or, if they try to convince you that vaccines cause this issue or that issue, ask for some evidence. By evidence I am not talking about a paper published in a non-peer reviewed online journal. I am talking about legitimate science. Many claims are made by ignorant persons as to nonessential childhood vaccines, and that children do not need them as their “natural” or “Organic” systems will “learn” to combat the disease. If this were true, humanity would have “naturally learned” to combat all such diseases millennia ago. Homeopathy and naturopathic treatments are unregulated, not because they are “alternative medical treatments” but because they are not actual medicine. Keep this in mind when one tells you that adding a single drop of some flower oil to a gallon of distilled water, or by applying a certain colored crystal to your child’s head you can prevent disease. We should always want the best for our children. The chances of a child becoming ill from a vaccine are minute (approx. 0.002) compared to the same child becoming ill, or worse, from an infectious disease. To better understand the risks, speak candidly to your pediatrician. Ask the hard questions, demand answers. Remember, just because you can find it on the internet, doesn’t make it true.
<urn:uuid:abd7eb30-6c0d-45ca-8cc4-9149e572e96e>
CC-MAIN-2020-16
https://adventuresinclinicalepidemiology.com/2016/07/26/vaccines-the-unemotional-reality/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00355.warc.gz
en
0.968853
1,869
2.65625
3
Most barn types have a link to American culture. Each has its own unique purpose and charm. Here in Oklahoma, we see various styles of barns, old and new. The reason for this is that our history indicates that many different types of people settled here in the Tahlequah area, from farmers to horse enthusiasts to tradesman and even large families needing extra storage. The most common type of barn in green country now seems to be pole barns (or post frame / metal barns). This type of barn offers practical cost of construction, sturdy frames, flexibility and are able to last a very long time. Pole barns in Oklahoma seem to have risen in popularity over the years, and can be seen in most of the countryside that you see today. Post frame construction barns are our specialty at Legacy Barn Company, but it’s important to be familiar with the various styles and frames of common barns here in the United States. Bank barns are quite popular here in the Midwest. Ideally, they are rectangular buildings with two levels. The first bank barns were built in the 1800s and gave farmers access to storage areas with wagons loaded with hay or wheat. They are constructed mainly with their axis parallel to the south side. In some regions, barn walls are made of rock or wool. These types of barns are not as popular here in Oklahoma, but are quite common in northeast states such as New Jersey and New York. They are the oldest and the rarest barns known for their corner stock doors, gabled roofs, center wagon doors, and clapboarding. They have a unique H-shape that provides core support to the gabled roof. Quite popular throughout the East and South, they serve unique functions since they were created about four centuries ago. Their primary purpose was to create a place for the tobacco farmers to dry and their tobacco after harvesting. They are designed to allow maximum ventilation because airflow was required to cure tobacco leaves. The traditional tobacco barns have long, vertical doors made of timber or oak. Besides the Dutch barn, the English barn was one of the first to be built in America. These types of barns have a simple design that was used during colonial times, especially Vermont. They borrow a lot from barns found in England. The barns are made from wood and have hinged wagon doors. Interior of the barn has a threshing floor and a center aisle. Livestock were placed on one side and the feed on the other. To learn more about our affordable and efficient pole barn specials, please visit our Oklahoma pole barn gallery.
<urn:uuid:82796280-5906-472e-85d2-0be03fc79243>
CC-MAIN-2020-16
https://www.legacybarnco.com/oklahoma-barns/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.973733
533
2.703125
3
Date Originally Written: November 9, 2018. Date Originally Published: December 10, 2018. North Atlantic Treaty Organisation (NATO) forces deployed to the Baltic States are severely unprepared to fight a conventional war with Russia. Their presence in the Baltic States is merely a token gesture of support. The gesture is not only a paper tiger, but exposes the deployed forces to the possible risk of annihilation by Russia. Despite this, there are valid arguments to suggest that a paper tiger is enough to deter hybrid warfare. In late 2016 NATO coalition members decided that they would send troops to support the Baltic States. This decision was in light of the recent invasion of Crimea by Russian Federation troops in 2014 and the Russian invasion of Georgia in 2008. At this time the Baltic States were left in a vulnerable position, being both former members of the Soviet Union and current members of NATO and the European Union. The NATO troops sent to the Baltic States came largely from the United Kingdom, Canada, America, Germany, Denmark and France. The United Kingdom sent a force to Estonia, consisting of 800 British troops with handheld drones, which were accompanied by four Challenger tanks and Warrior armoured fighting vehicles. Both the German and Canadian expeditions consisted of similar numbers and equipment. The vulnerability of the Baltic States position in 2015 is highlighted by David Blair, a writer for the Telegraph. Mr Blair indicates that Latvian troop numbers consisted of 1,250 troops and three training tanks, Lithuanian forces consisted of 3200 troops and Estonian forces consisted of 5300 troops. Opposing these Baltic forces were 1,201 Russian aircraft, 2,600 tanks and 230,000 troops. It is clear militarily that the combined forces of the Russian Federation far outweigh that of the Baltic States, both in numbers and equipment. Altogether the coalition forces reinforced the Baltic States with 3,200 troops, with an additional 4,000 U.S. troops deployed just south in Poland. These troops pose little threat to the Russian forces. This lack of threat to Russia is especially true in light of Russian operations in Ukraine, were they almost entirely wiped out the Ukrainian 79th airmobile brigade in the space of a three-minute artillery strike. This situation begs the question to why these NATO countries have chosen to expose some of their most capable troops and equipment, leaving them in a vulnerable position far from their familiar training grounds in Western Europe? The most evident argument for exposing vulnerable NATO troops to a Russian threat is that these troops are used as a deterrent; it’s a message to the Russian Federation that Western Europe will support its neighbours to the east. If this token force in the Baltic States were to be attacked, the western powers would be compelled to retaliate and that they would likely nationally mobilise to fight. After the invasion of Crimea, it could be suggested that NATO was slow and unsure on how to react to a threat on its border. By sending these troops, it rids any notion that the Western Powers will sit back and allow their borders to be chipped away in order to avoid full-scale conflict. This view can be compared to that of Argentina during the Falklands war; they believed that the British would not sail across the sea in order to fight an expensive war for a small group of islands. Certainly, this argument can be justified with conventional warfare rearing its ugly head in recent years. Despite conventional warfare becoming apparent, it has been accompanied by destabilisation tactics. Acknowledging the conventional threats posed by NATO, the Russian Federation over the past few years has been successful in fighting a new type of hybrid warfare This warfare employs conventional, political, irregular and cyber warfare and all under a single banner. Hybrid warfare seeks to first destabilise a country or regime before engaging through irregular or conventional fighting. Destabilisation takes many forms from cyber attacks to inciting civil unrest; this is what the world initially saw in Ukraine. During the initial Russian attacks, there was so much initial confusion within the Ukrainian government and the military that an effective response couldn’t be coordinated. The deployment of foreign forces into to the Baltic States helps to mitigate confusion in a crisis. NATO troops would help deter and then stamp out early signs of the hybrid warfare and could be easily trusted by the Baltic States to help organise a response. The main advantage of having foreign NATO forces is that they are organised from outside of the Baltic States. So, during a period of confusion or instability within the Baltic States, NATO’s own organisation and loyalty will remain intact. This then allows the Baltic State countries to employ the help of these troops however they wish. Whether it is policing their streets, or moving to secure their borders to stop foreign forces and support causing further internal instability. This is highly advantageous for the Baltic States because a significant proportion of their population is of Russian descent and could therefore be coerced into action by Russia as was seen in Crimea. In a conventional war scenario, the forces sent to the Baltic States are weak, but in hybrid warfare their influence is expanded. An added advantage to the deployment of foreign NATO troops in the Baltic States is the legitimacy it gives to the government. In a time of instability and confusion, the civilian population can become confused with multiple actors rising up in order to gain local control. It would be clear to the local population that NATO troops will ultimately support the legitimate government. This helps to stop the population being coerced through propaganda onto the side of the aggressor in hybrid warfare. NATO troops would ensure that the legitimate government acts correctly and within the confines of law, making it the more desirable faction to follow. In conclusion, it can be clearly seen that the NATO forces sent to the Baltic States are insufficiently equipped to fight a conventional war and threaten the Russian Federation with attack. Nor is the force much of a conventional deterrence, with its position being far away from sufficient reinforcement from the western countries. In this aspect the force is a paper tiger, although in the face of hybrid warfare, the detachments sent are sufficient for the task at hand. The NATO alliance has successfully acknowledged the latest threat and has acted accordingly. By David Blair. (19 Feb 2015). How do we protect the Baltic States? https://www.telegraph.co.uk/news/worldnews/europe/russia/11423416/How-do-we- protect-the-Baltic-States.html Tom Batchelor. (5 February 2017). The map that shows how many NATO troops are deployed along Russia’s border. https://www.independent.co.uk/news/world/europe/russia-nato-border-forces-map-where-are-they-positioned-a7562391.html Shawn Woodford. (29 March 2017). The Russian artillery strike that spooked the US Army. http://www.dupuyinstitute.org/blog/2017/03/29/the-russian- artillery-strike-that-spooked-the-u-s-army/ Peter Biles. (28 December 2012). The Falklands War ‘surprised’ Thatcher. https://www.bbc.co.uk/news/uk-20800447 David Blair. (19 Feb 2015). How do we protect the Baltic States? https://www.telegraph.co.uk/news/worldnews/europe/russia/11423416/How-do-we-protect- the-Baltic-States.html Courtesy of InfoIntelligenceFusion 2019 –
<urn:uuid:17ac6ce2-09d4-42ff-bb37-14f9887bd776>
CC-MAIN-2020-16
https://appealpower.com/2019/02/23/nato-forces-in-the-baltic-states-credible-deterrent-or-paper-tiger/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00355.warc.gz
en
0.94803
1,531
2.609375
3
An accidental discovery within a Long Island, N.Y., health system has led to the creation of a medical treatment that has the potential to replace billions of dollars of drugs with less expensive implantable devices. The still-experimental treatment involves the transmission of electrical pulses in the nerves and, if proven effective and safe, could transform the care of patients who suffer from such conditions as rheumatoid arthritis and inflammatory bowel disease. It’s all part of the emerging field of bioelectronics. The devices also could eat into the costs of treating various diseases, which in the case of rheumatoid arthritis alone has been estimated to total $22 billion per year. “I think it is likely that in our lifetime — not in some distant future tense — many drugs used today will be either supplemented or replaced by bioelectronic devices,” says Kevin Tracey, M.D., president and CEO of the Feinstein Institute for Medical Research and the scientist who made the discovery. Working at the institute, part of the North Shore-LIJ Health System, Tracey’s neurological research on the human brain unexpectedly led in 1998 to the identification of a physiological relationship between the brain and the body that previously was unknown. The nervous system is hardwired to the immune system, and the brain is in control, Tracey says. So, in the case of a person with rheumatoid arthritis, the brain likely is sending electrical impulses that activate the immune system improperly or unnecessarily — for whatever reason — leading to the swollen joints caused by the disease. The way to treat the disease would be to electronically tell the spleen to not cause the inflammation. A procedure to do that is being commercialized by a company Tracey co-founded, SetPoint Medical, and its scientists have shown some success in implanting devices that manipulate those electrical signals to prevent or limit the inflammation for rheumatoid arthritis. Trials began last year to treat inflammatory bowel disease. The first round with humans involved eight patients, two of whom experienced remission from rheumatoid arthritis and six of whom had a positive response, according to SetPoint. An alternative to drug therapy couldn’t come too soon for the 1.3 million Americans who have rheumatoid arthritis. They suffer from what can be a painful and disruptive condition and often have to pay large co-payments for access to some of the stronger drug treatments, known as biologics. The biologic medicines can lead to skin reactions at the site of injection, and they increase the risk of all types of infections, including tuberculosis, according to the American College of Rheumatology. Costs also are a major issue. A recent study found that Medicare patients who start using a single, biologic disease-modifying, anti-rheumatic drug, or DMARD, face an average co-pay of $2,700 each year under Medicare Part D for prescriptions that can cost close to $20,000 or more a year. Published in the ACR journal Arthritis & Rheumatology, the study found that patients are on the hook for 29 percent of the costs until the costs reach the catastrophic coverage breakpoint in Part D, creating a barrier to treatment. “High drug costs are a significant problem, because they may limit adherence and put an enormous financial strain on patients,” says the study’s lead author Jinoos Yazdany, M.D., associate professor in the division of rheumatology, department of medicine, at the University of California, San Francisco, in an email. GBI Research estimated in a report that the cost of treating rheumatoid arthritis in the United States would climb to $9.3 billion per year in 2020 from $6.4 billion in 2013. At the same time, the number of people with the disease is expected to rise to 1.68 million by 2020. So, if the device proves to work for just a portion of the broader RA patient population, billions of dollars could be saved by reducing the use of specialty biologic drugs, according to ACR. The college also is trying to curb an apparent trend by physicians to prescribe biologics for RA more frequently than they should. The college in 2012 updated its treatment guidelines to recommend the use of the cheaper, more established class of rheumatology drugs before turning to the more costly biologics. In 2013, it made a similar recommendation as part of its participation in the Choosing Wisely campaign, which aims to limit unnecessary procedures or treatments. A different approach Before any savings can be reaped, researchers have to finish trials to make sure the technology works and is safe. They are not starting from scratch. The broader field of neuromodulation has existed for years, but its application has been limited to procedures in which little is understood about the mechanics, says Christopher Czura, vice president of scientific affairs at Feinstein. The medical community has known for some time that pain can be relieved by blocking nerve conduction and that stimulating the brain can relieve symptoms of Parkinson’s disease, he says, but the reasons they work have been mostly a mystery. In bioelectronic medicine, a subset of neuromodulation, the why is crucial. “We bring the pharmaceutical rigor of drug development to the concept of stimulating nerves to treat disease,” Czura says. “We understand the full molecular pathway of why it works.” The federal government also aims to expand knowledge in neuromodulation. The National Institutes of Health has committed $240 million over six years to encourage different scientific communities to collaborate, focusing first on why an approach might work before asking if it would work. “The purpose of the NIH program really is to produce a culture change for the neuromodulation community,” says Grace Peng, technology team leader for the program, called Stimulating Peripheral Activity to Relieve Conditions, or SPARC. Peng also is program director for disovery science and technology, National Institute of Biomedical Imaging and Bioengineering. “The field is recognizing now that we need to understand the mechanisms behind why some of these devices work or don’t work. We want to facilitate more successes in clinical trials.” As both a neurosurgeon and an immunologist, Tracey has a rare combination of skills in the research world and just the type of expertise needed for this research. Getting researchers with different skills to collaborate is a goal of the SPARC program, which is part of a larger push for cooperative research efforts across the National Institutes of Health called the NIH Common Fund. “We’re hoping to engage a number of communities,” Peng says. Given the complicated nature of the nervous system, gaining the desired understanding will take time. The vagus nerve, a major area of focus, runs out of the brain and has 80,000 to 100,000 nerve fibers. “The idea going forward will be to have extremely precise, extremely small electrodesthat can stimulate a few nerve fibers at a time,” Tracey says. SetPoint’s research involves the use of a modified stimulator that originally was designed to treat depression and epilepsy. The epilepsy version of the device pulses for about 30 seconds, every five minutes, 24/7, Czura says. SetPoint recalibrated the device to run in the rheumatoid arthritis trial for just 30 seconds once a day, and that has shown to be enough to work, he says. In addition to the implantable nerve regulator, the treatment requires a wireless charger and an Apple iPad prescription app. Late last year, the company announced it was launching a similar trial to treat Crohn’s disease, an inflammatory bowel disease. Will it work? Like any treatment in the trial phase of development, the experimental SetPoint devices or the approach in general may not prove to be viable. “It’s a long road between here and there,” says Mark Genovese, M.D., James W. Raitt Professor of Medicine and co-chief in the division of immunology and rheumatology, Stanford University School of Medicine. Using the nervous system to modulate inflammation is a totally new concept, so ensuring that it’s safe and effective for patients might not be straightforward. “This approach is so unique and novel it’s going to require some degree of replication and additional data to know what it can or can’t do,” Genovese says. “The [trial] data is early. We need to see a lot more of it to feel comfortable about the potential benefits and the risks of this approach.” Kevin Tracey, M.D., is president of the Feinstein Institute for Medical Research, part of the North Shore-LIJ Health System and one of the few academic-affiliated medical research organizations to operate separately from the teaching side of an academic health system. Tracey, who led research on what could become an electronic cure for such inflammatory diseases as rheumatoid arthritis, argues that research is suffering from a lack of federal support and that the health care system should pick up some of that slack. What happened with the federal funding? We have lived through an economic collapse, which changed the way research is supported in the United States. The classic model for supporting biomedical research was focused on National Institutes of Health money going to support molecular medicine research. And what happened was that the economy recovered, but the NIH budget has not. How drastic is the change for NIH-supported funding? We’re currently looking at a 20 to 25 percent decrease in our real buying power from 12 to 13 years ago. What are the consequences? For whatever reason, the decisions have been made that research is not valuable. That’s exactly the wrong decision, particularly when the upside of research — whether it’s to improve quality of life, life span or value to society, or because it creates jobs and produces new industries — has never been higher. To cut research in a down time is like sending the firemen home because the first floor is no longer on fire, it’s only the second floor. It just doesn’t make any sense. Why should health systems back medical research? North Shore-LIJ has stepped up and supported research at a high level. The phrase we like to use here is: “Research is the process of creating the future.” Health systems right now have a very important role in creating the future of health care. To not engage the research side is a mistake. Health systems have an obligation, because it’s the right thing to do and the country needs it. The Rheumatoid Arthritis Drug Problem inoos Yazdany, M.D., associate professor in the division of rheumatology, department of medicine at the University of California, San Francisco, led a study regarding Medicare Part D funding of biologic drugs used to treat rheumatoid arthritis, and determined that patients face an annual co-payment of $2,700 per year. She answered some questions about the problem via email. How big is the issue of RA medicine affordability? Medicare patients with Part D pharmacy coverage face very high out-of-pockets for biologic drugs. High drug costs are a significant problem because they may limit adherence and put an enormous financial strain on patients. Would a device that reduces the need for the high-cost drugs have an impact financially? If so, how? Any new advance, whether a drug or a device, that improves outcomes in RA at lower cost will have a significant impact by reducing the patient out-of-pocket burden. Why are some of the RA drugs expensive? There are complex reasons behind high drug costs in RA, including that it is expensive to develop and make biologics, that there are not yet biosimilar versions available, and that Medicare does not have policies to stabilize or reduce costs, such as negotiating drug prices. Do any of the costs for those drugs compensate physicians or prescription therapy or is the bulk of that cost for the drug only? In the Medicare Part D program, the cost of the drug is divided so that Medicare and patients pay the bulk of drug costs, while pharmacy insurance plans and manufacturers (through Part D manufacturer discounts) pay a relatively smaller proportion of costs. In Part D, the revenue for drugs does not reach physicians.
<urn:uuid:b65d0caa-c528-4e85-a5e4-9a7811ade00a>
CC-MAIN-2020-16
https://www.hhnmag.com/articles/3407-bioelectronic-device-could-revolutionize-care-for-inflammatory-disease
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.947459
2,584
2.890625
3
- Year Published: 1609 - Language: English - Country of Origin: England - Source: Shakespeare, W. The sonnets. In R. G. White (Ed.), The complete works of William Shakespeare. New York: Sully and Kleinteich. - Flesch–Kincaid Level: 11.0 - Word Count: 118 Shakespeare, W. (1609). Sonnet 33. The Sonnets (Lit2Go Edition). Retrieved April 03, 2020, from Shakespeare, William. "Sonnet 33." The Sonnets. Lit2Go Edition. 1609. Web. <>. April 03, 2020. William Shakespeare, "Sonnet 33," The Sonnets, Lit2Go Edition, (1609), accessed April 03, 2020,. Full many a glorious morning have I seen, Flatter the mountain tops with sovereign eye, Kissing with golden face the meadows green; Gilding pale streams with heavenly alchemy: Anon permit the basest clouds to ride, With ugly rack on his celestial face, And from the forlorn world his visage hide Stealing unseen to west with this disgrace: Even so my sun one early morn did shine, With all triumphant splendour on my brow, But out alack, he was but one hour mine, The region cloud hath masked him from me now. Yet him for this, my love no whit disdaineth, Suns of the world may stain, when heaven’s sun staineth.
<urn:uuid:eec688b3-ec21-4b78-b685-f88ab6278bec>
CC-MAIN-2020-16
https://etc.usf.edu/lit2go/179/the-sonnets/3538/sonnet-33/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.845844
330
2.75
3
Could depositing menstrual blood on plants be the new organic miracle grow? I can feel the raising of eyebrows as I type this. But the reality is a) yes, menstrual blood can bring dying plants back to life, and b) menstrual blood really isn’t that gross. Let’s go back to 6th grade health class for a moment for a brief review of the reproductive system. Each month, a woman’s ovaries release an egg into her womb. If the woman’s egg is fertilized by a man’s sperm, the egg will rest in the soft tissues and blood that line the uterine wall. If all goes as planned, that fertilized egg will make its grand appearance into the world as a human baby in roughly nine months – but, when a woman’s egg is not fertilized, her body sheds the lining that would have become the placenta; this process of elimination of the unfertilized egg and its temporary surroundings is known as menstruation. Then, the process starts over again with fresh blood and a new egg. Despite the fact that every human mammal on earth (unless she has an illness preventing her from doing so) will menstruate many, many times in her life, menstruation is in many cultures seen as taboo. For example, in some traditions of India, menstruating women are seen as impure and more susceptible to being the targets of black magic, including that touching a cow while menstruating will render that cow infertile. In some cultures in Africa, largely due to the unavailability of feminine sanitary products, menstruation is seen as a time of uncleanliness. In Shintoism of Japan, women are seen as impure simply because they have the ability (or duty, as it would seem) to menstruate. However, there are other cultures that view menstruation not as a curse, but rather as a gift. In Sikhism, menstruation is sacred as it is the blood of a mother, which is necessary to life. Alma Gottlieb, professor of anthropology and gender and women’s studies at the University of Illinois and author of “Blood Magic: The Anthropology of Menstruation,” spoke to National Public Radio about some cultures in which menstruation is revered or at the very least, not reviled. “Yurok, a native tribe from the northwest coast of the United States stratified by class, had a group of aristocratic women who saw their periods as a time for purifying themselves,” she said in an interview with NPR. “They were on a shared menstrual cycle and did a series of rituals during the cycle that they said was a period of their most heightened spiritual experience” Gottlieb has studied menstruation around the world in present day and in the distant past. On the Beng culture of Africa’s Ivory Coast, she notes: “An older man, a religious leader in the local religion, told me menstruation is like the flower of a tree. You need the flower before the tree can fruit. That’s a very different ideology than the ideology of sin, dirt, pollution.” OK, so now that we’ve cleared that up … what is period blood actually made of and how can it be of use to you? Sure, you can easily go all out and get wild like homegirl Jen Lewis, creating art with her menses. Or, you can be a bit more discreet about it. Full disclosure: I put my period blood on some dying plants and they miraculously came back to life. OMG – am I like, magic? I have a few fanboys who think so, but mostly the answer is no. There’s a logical explanation for why putting menstrual fluid into the dirt around your plants could help rejuvenate them. Menstrual fluid contains all of the following (the quantity of which depends greatly on the diet and age of the individual woman): blood, uterine tissue, cells, healthy bacteria which keep the vagina clean, water, sodium, potassium, iron, nitrogen, phosphorus, cholesterol, and blood clotting elements such as prothrombin and fibrinogen, etc. If these contents could help bring a human life into the world, as they do in the case of the unfertilized egg, then why wouldn’t they be relevant to other forms of life as well? So, how do you go about this? First, you need to be using a menstrual cup. Not only does the menstrual cup limit waste (the average woman will use at least 10,000 tampons or pads in her lifetime, which take up to 500 years to degrade naturally), but it also shortens the period by opening the uterine walls to allow free flow of the fluid, aren’t responsible for any deaths (unlike tampons), are completely clean and hygienic, and totally scentless. Next, some women like to store their fluid in a jar, collecting larger amounts before using it as fertilizer. That’s fine and good if you (or your partner, or housemates) don’t mind a Mason Jar full of human blood in the fridge, however I prefer to simply dispose of the blood each day into a plant that needs extra attention. The first plant I tried this on was a potted rose. It had somehow contracted a plague, leaving a white film on a few of the remaining leaves, and the others had fallen. It was basically ceasing to grow. I’ve listened to my fair share of Fleetwood Mac and am pretty tight with the Divine Feminine, so when my period came, I figured why the hell not. I dumped the contents of my Diva Cup into the dirt around the plant for three nights in a row. A few weeks later, I couldn’t help but notice the plant had come back to life. There was now an abundance of verdant, bright leaves sprouting and even a few red buds. Interesting. I had not moved the plant. It was receiving the same amount of water and sunlight as before my experiment. So the next month, I tried it again, on a gardenia bush that refused to bloom. Basically it’s fragrant white flowers were trapped in a limbo of some sort for more than a month. About a week after unleashing the womb juice, the flowers popped open in their pure, white glory. Currently, the process is being attempted on a tropical hibiscus that has been quite unhappy. We shall see how that goes. In the meantime, I agree with Georgina Terry, another unashamed female writer who put the theory to the test: “It feels pretty cool to find a use for something I’ve been throwing down the toilet for 20 odd years.”
<urn:uuid:a0c057b2-66b5-4b16-ab2b-c4a33e437808>
CC-MAIN-2020-16
http://www.evolveandascend.com/2017/03/01/giving-yourself-back-to-mother-earth-toppling-menstruation-taboos-and-discovering-the-magic-in-blood/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.967826
1,420
2.765625
3
This article is written by Sarah Godfrey. Psychologist and Director of Moving Mindsets. You can read the original article on their website. If there is one life changing event we choose to have it must be the decision to have a child. The excitement, responsibility, hope, changes to lifestyle, time, impact on our existing relationships and self-conceptions, ensures that one of the happiest times in your life can also be one of the most complex. It is pretty common that some mum’s, up to 80 per cent, may develop low mood (often termed the baby blues), between day three and day ten after the birth of their baby. Giving birth is a huge physical and emotional experience and it would be reasonable to expect a little emotional turbulence. Low mood levels where you experience feeling flat, tired or a little teary generally pass in a day or two. The baby blues is quite different from postnatal depression (PND) which extends beyond the first week or so and persist for weeks or months after the baby has been born. The most important message is that PND is a serious illness and not a character flaw or weakness on the mum’s behalf. It does not discriminate between socio-economic status, religion, culture, educational background or family of origin. It can develop at any time after the birth of the baby and may present suddenly or over an extend period of time. It can develop after the first child or second, third or seventh child. It can be present in all new births or only in one. In other words it is random and unpredictable. PND (or often called postpartum depression) is one of the most prevalent mood disorders associated with childbirth, affecting up to 15% of mum’s (or around 1 in 7 to 10 new mum’s). The definition of PND is when a mum, following childbirth, suffers from a combination of hormonal changes, psychological adjustments to motherhood, and fatigue. It is a combination of factors that include shifts in her mental, physical and social well-being. There are, like most psychological and physical illnesses, some factors that may predispose someone to experiencing PND. Some of these are: - Having a history of depression. - Experiencing depression during or before pregnancy (antenatal depression). - Difficulties in the relationship or marriage. - Significant stress such as the death of a loved one or moving house. - A complicated or prolonged delivery. - Problems with the baby’s health or a very unsettled baby. - The absence of emotional and family support. - A family history of mental disorders. - Inability to breastfeed. These events can be a warning sign for some mum’s to begin a conversation with their doctor. Being mindful of past and current issues that could impact a mum is recommended as it can help with self-care and awareness. It helps the family to be watching for the onset of symptoms. These factors are not, however, predictors of someone having PND, merely contributing issues known to be common with mums experiencing PND. PND symptoms vary from mum to mum but there are a few themes we should be aware of. These are: An overwhelming sense of inadequacy or failing as a mum. This can include feelings associated with the care of the baby to the upkeep of the home and normal day to day activities they previously coped with. A sense of hopelessness about the future. - Feelings related to anxiousness, panic, emptiness, sadness and exhaustion. - Irrational fears for the baby or of the baby. - Changes in appetite, sleep (insomnia beyond the normal disruption of feeding and nursing a baby), or nightmares or over sleeping. - Thoughts about suicidal or self-harm. - Any of these symptoms could be a sign that you are struggling to cope and PND is setting in. Talking to your partner, family and doctor can help give you perspective. However if the symptoms persist it is important you seek psychological treatment to help you overcome the fears and negative thinking associated with PND. But let’s not forget the new dad’s. Just as it is for women, watching your partner change as the baby becomes a physical realty and an awareness of the changes you are about to experience throughout pregnancy, can be a very anxiety provoking moment for men. Men often have fears about their ability to be a good dad and partner and whether they can do the selfless job of fatherhood. Normal levels of antenatal and postnatal anxiety are felt by most dads at some time during the pregnancy. As with the baby blues, the symptoms generally subside as the adjustment to, and excitement of, parenthood begins. However statistics suggest that around 3-10% of men may experience more significant symptoms of depression after the birth of their baby. PND in the partner of a new dad is the biggest predictor of a man experiencing paternal postnatal depression (PPND). Although this is not always the case. Men can and do develop depression independently from their partner’s mental health condition, after the birth of their baby. PPND can occur later than the onset of PND with the depression increasing between six weeks and six months after childbirth. An issue with PPND is that too often dad’s don’t recognise their symptoms until they are in crisis mode or their partners have emerged from their own illness. They rarely seek support and discuss their emotional struggles. In the article Men Don’t Like Talk Therapy: Myth or Fact, Chloe Della Costa reported that research over the years repeatedly indicates that men don’t recognize the symptoms of depression and other mental disorders. Alternatively men can often be aware they have a problem but allow it go untreated. Many researchers attributed this reluctance to men being socialised to view asking for help as a sign of weakness. The added stigma surrounding mental illness likely acts as an added deterrent. Yet even for those new dad’s seeking help, there are very limited supports for men. Unlike the community and social supports available to new mums (such as child and family health nurse or maternal health centres and mother’s groups), little is available for dads. These community based support services usually identify PND in new mums quite early, assisting them for prompt intervention. For men PPND often develops over a longer period of time, remains unseen and untreated. PANDA (Perinatal Anxiety and Depression Australia) have listed some issues related specifically to PPND which include: The impact of changing social roles for fathers in the family. - Attitudes towards fatherhood and masculinity – men are less likely to talk about how they feel, and it’s important to them that they seem like they’re coping. - A change in family dynamics – some men might feel excluded from the parenting role or from the relationship with their partner, which can result in resentment towards the baby - Worries about extra responsibilities, financial burdens and managing the stress of work. - Unmet expectations about having sex again, in the early postnatal period. - Pregnancy, particularly early on – this appears to be the most stressful period for a man in the transition to fatherhood. This might be because of the changes in his partner’s body, how supported and included he feels, concern about the impending changes to his life, and feelings of uncertainty about his role in caring for his partner - A lack of opportunities to bond with the baby until after birth, unlike mothers, who can bond during the pregnancy. The symptoms for PPND are a little different to PND and include; - Tiredness, headaches and pain - Loss of libido - Changes in appetite - A tendency to take risks - Changes to sleep patterns, especially a lack of sleep - Feelings of isolation and disconnection from partner, friends or family Withdrawal from intimate relationships and from family, friends and community life - Increased hours of work as a part of the withdrawal from family - Increased use of alcohol and other drugs instead of seeking treatment for depression and anxiety. If you are concerned PANDA and Beyond Blue have some good resources including an online assessment (The Edinburgh Postnatal Depression Scale-EPDS), that can help you and your health professional get a better sense of how you’re feeling. The good news is that PND and PPND are treatable. As always early intervention yields the quickest path to recovery. If a new mum or dad is feeling low for any extended length of time support them to seek help, offer kindness and compassion. Most of all, be non-judgmental as they work their way back to experiencing the joys and excitement of having a baby and becoming a parent to a new life. Career Money Life offers a wide range of services to help working parents. This includes parenting support, newborn support, child care, counselling, parental leave and return to work coaching, and more. Contact us to learn more about our Parental Leave and Return to Work Program.
<urn:uuid:8ff02acb-2d4a-423a-b0f2-dafb4ca3502b>
CC-MAIN-2020-16
https://blog.careermoneylife.com/2018/07/09/after-the-birth-of-your-baby-post-natal-depression-in-women-and-men/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00355.warc.gz
en
0.95289
1,870
2.875
3
A V12 engine is a twelve-cylinder piston engine where two banks of six cylinders are arranged in a V configuration around a common crankshaft. V12 engines are more common than V10 engines, however they are less common than V8 engines. The first V12 engine was built in 1904 for use in racing boats. Due to the balanced nature of the engine and the smooth delivery of power, V12 engines were popular in early luxury automobiles, boats, aircraft and tanks. V12 engines reached their apogee during World War II, following which they were mostly replaced by jet engines. In Formula One racing, V12 engines were popular during the late 1960s and early 1990s. The most common use of V12 engines in the 21st century has been marine engines, large stationary engines and European sports/luxury cars. Each bank of a V12 engine essentially functions as a straight-six engine, which by itself has perfect primary and secondary engine balance. By using the correct V-angle, a V12 engine can therefore have perfect balance. The even firing order for a four-stroke V12 engine has an interval of 60 degrees, therefore a V12 engine can be perfectly balanced if a V-angle of 60 degrees, 120 degrees or 180 degrees is used. Many V12 engines use a V-angle of 60 degrees between the two banks of cylinders. V12 engines with other V-angles have been produced, sometimes using split crankpins to reduce the unbalanced vibrations. The drawback of a V12 engine is the extra cost, complexity and friction losses compared with engines containing fewer cylinders. At any given time, three of the cylinders in a V12 engine are in their power stroke, which increases the smoothness of the power delivery by eliminating gaps between power pulses. A V12 engine with a 180 degree V-angle is often called a flat-twelve engine (or a 'boxer twelve'), however this terminology is incorrect for the majority of 180-degree V12 engines, since they use shared crankpins and are therefore not configured as flat engines. Theoretically, the rotating parts of a V12 racing engine could be lighter than a crossplane V8 engine of similar displacement, due to the V12 engine not requiring counterweights on the crankshaft or as much inertial mass for the flywheel. In addition, the exhaust system of a V12 engine is much simpler than would be required for a crossplane V8 engine to achieve pulsed exhaust gas tuning. However, use of V12 engines in motor racing is uncommon in the 21st century. A 60-degree V12 engine is typically narrower than a 90-degree V6 or V8 engine of similar displacement. However, the V12 engine is usually longer than V6 and V8 engines. The added length often makes it difficult to fit a V12 engine into a passenger car, however the length is not typically a problem for trucks engines and stationary engines. Due to its narrower width, the V12 is common in locomotive, armoured tank and marine engines. In these applications, the width of the engine is constrained by tight railway clearances or street widths, while the length of the vehicle is more flexible. In twin-propeller boats, two V12 engines can be narrow enough to sit side-by-side, while three V12 engines are sometimes used in high-speed three-propeller configurations. Large, fast cruise ships can have six or more V12 engines. In historic piston-engine fighter and bomber aircraft, the long, narrow V12 configuration used in high-performance aircraft made them more streamlined than other engines, particularly the short, wide radial engine. The first V-engine (a V-twin design) was built by Daimler in 1889, then the first V8 engine was built by Antoinette in 1903. These were followed by the first V12 engine in 1904, which was built by Putney Motor Works in London for use in racing boats. Known as the "Craig-Dörwald" engine after Putney's founding partners, the V12 engine was based on Putney's existing two-cylinder engine with a flathead design, a V-angle of 90 degrees and an aluminium crankcase. As in many marine engines, the camshaft could be slid longitudinally to engage a second set of cams, giving valve timing that reversed the engine's rotation to achieve astern propulsion. The engine had a displacement of 18.4 L (1,120 cu in) a weight of 430 kg (950 lb) and developed 110 kW (150 bhp). The engine was intended for use in 40-foot hull racing boats, however little is known of its racing achievements. Two more V12s appeared in the 1909-1910 motor boat racing season. The Lamb Boat & Engine Company in the United States built a 25.5 L (1,559 cu in) engine for the company's 32-foot 'Lamb IV' boat. The Orleans Motor Company built a massive 56.8 L (3,464 cu in) flathead V12 engine with a power output quoted as "nearly 400 bhp (298 kW)". In 1914, Panhard built two 38.6 L (2,356 cu in) V12 engines with four valves per cylinder, which were designed for use in racing boats. Large V12 diesel engines are common modern cruise ships, which may have up to six such engines. An example of a currently produced V12 marine engine is the Wärtsilä 46F engine, where the V12 version has a displacement of 1,157 L (70,604 cu in) and a power output of 14,400 kW (19,300 hp). Five years after the first V12 engine was introduced, Renault introduced the first V12 engine for aircraft in 1909. This engine had a V-angle of 60 degrees, air cooling and an intake over exhaust (F-head) valve arrangement. It had a displacement of 12.2 L (740 cu in), a weight of 350 kg (772 lb) and produced 103 kW (138 hp) at 1,800 rpm. The propeller was driven from the front end of the camshaft, thus spinning the propellor speed at half the speed of a typical crankshaft driven propellor, in order to improve the propellor efficiency. The Renault engine was closely mimicked by the RAF 4 and its derivatives, which was used by various British military aircraft during World War I. The RAF 4 engine had a displacement of 13.2 L (806 cu in), weighed 289 kg (637 lb) and produced 104 kW (140 hp) at 1,800 rpm. In March 1914, a prototype version of the Sunbeam Mohawk V12 engine was unveiled in the United Kingdom, based on the 'Toodles V' motor racing engine. The production version was rated at 168 kW (225 hp) at 2,000 rpm, making it the most powerful airplane engine in Great Britain at the outbreak of World War I. During and after World War I, various companies in the United States produced the Liberty L-12 engine. In Austria, the Austro Daimler V12 engines were used by the large flying boats of the Naval Air Force and produced up to 257 kW (345 hp). By the end of World War I, V12s were well established in aviation, powering some of the newest and largest fighter and bomber airplanes. After World War I, many Zeppelins used V12 engines built by Maybach and Daimler. V12 engines powered the first transatlantic crossings by the Curtiss NC flying boats (using four Liberty L-12 engines), the first non-stop transatlantic crossing in a Vickers Vimy (using two Rolls-Royce Eagle engines) and the first transatlantic crossing by an airship in the R-34 class airship (using five Sunbeam Maori engines). V12 engines reached their apogee during World War II with engines such as the British Rolls-Royce Merlin and Rolls-Royce Griffon, the Soviet Klimov VK-107 and Mikulin AM-38, the American Allison V-1710, and the German Daimler-Benz DB 600 and Junkers Jumo. These engines generated about 750 kW (1,000 hp) at the beginning of the war and over 1,100 kW (1,500 hp) at their ultimate evolution stage. This rapid increase in power outputs was due to technology such as multi-speed superchargers and high octane fuels, and the V12 layout was commonly adopted due to its low vibrations so that the powerful engines did not tear apart the light airframes of fighters. The Allied forces used V12 engines with an "upright" design, however many German engines (aside from the BMW VI, which was designed prior to World War II) used an inverted engine design, which had a lower centre of gravity and improved pilot visibility for single-engined designs. The only American-design inverted V12 engine of any type to see even limited service in World War II was the air-cooled Ranger V-770, which was used in aircraft that were only used for training purposes within the United States, such as the Fairchild AT-21 Gunner. The Rolls-Royce Merlin V12 engine was used in several British aircraft including the Hawker Hurricane and Supermarine Spitfire fighters, and the Avro Lancaster and de Havilland Mosquito bombers. The Hurricane and Spitfire playing a vital role in the Battle of Britain. The long, narrow configuration of the V12 contributed to good aerodynamics, while its smoothness allowed its use with relatively light and fragile airframes. In the United States, the Rolls-Royce Merlin engine was produced under license by Packard Motor Car Company, which was used in the P-51 Mustang fighter. This engine was also incorporated into some models of the Curtiss P-40, specifically the P-40F and P-40L. Packard Merlins powered Canadian-built Hurricane, Lancaster, and Mosquito aircraft, as well as the UK-built Spitfire Mark XVI, which was otherwise the same as the Mark IX with its British-built Merlin. The Allison V-1710 was the liquid-cooled V12 engine designed in the United States that was used on active service during World War II. It was initially used in the P-38 Lightning, however the turbosupercharger system required bulky ductwork and had poor high-altitude performance. In 1943, a version using a more conventional mechanical supercharger began production. In automobiles, V12 engines are less common than engines with fewer cylinders, due to their size, complexity and cost. They have been mostly used in expensive sports and luxury cars thanks to their power, smooth operation and distinctive sound. One of the earliest recorded uses of V12 engines in automobiles was in October 1913, when a custom-built racing car competed at the Brooklands circuit in the United Kingdom. The car was entered by Louis Coatalen, who was chief engineer of the Sunbeam Motor Car Company. It was named 'Toodles V' (after Coatalen's pet name for his wife) and achieved several speed records in 1913 and 1914. The V12 engine had a displacement of 9.0 L (549 cu in), an aluminum crankcase, iron cylinders with L-shaped combustion chambers, a cam-in-block valvetrain and a V-angle of 60 degrees. Each bank of the engine consisted of two cylinder blocks with three cylinders each. Valve clearance was set by grinding the relevant parts, the engine lacking any easy means of adjustment. This reflected the intention for the engine to be later used in aircraft, since any adjustment method that could go wrong in flight was to be avoided. As initially built, the V12 was rated at 150 kW (200 bhp) at 2,400 rpm and weighed approximately 340 kg (750 lb). Amongst the first production cars to use a V12 engine were the 1915 Packard Twin Six, the 1915 National V12 engine and the 1917 Weidely Pathfinder; all of which were built in the United States. Usage of V12 engines in luxury cars increased from the 1920s,[page needed] including cars such as the 1921 Fiat 520 'Superfiat', the 1926 Daimler Double-Six 50,[page needed] the 1931 Hispano-Suiza J12, the 1931 Cadillac 370A V-12, the 1932 Auburn V-12 Speedster, the 1931 Lincoln K series, the 1932 Franklin V-12, the 1936 Rolls-Royce Phantom III and the 1936 Pierce-Arrow Twelve. A key benefit of V12 engines during this period was their smoothness, since vibration isolating engine mounts were rarely used prior to the 1930s. In the United States, V12 engines began to decline in popularity from the 1930s as improvements in combustion chamber design and piston form enabled lighter V8 engines to become more powerful than the V12 engines. The last American V12 engine of the era, the H-Series Lincoln V12 engine, was replaced by a V8 engine in 1949. In Europe, V12 engines were seen as excessive in the aftermath of World War II, therefore production of cars with V12 engines was very limited until the 1960s. The 1948 Ferrari 166 Inter sports car (Ferrari's first road car) was powered by a 2.0 L (122 cu in) SOHC V12 engine. Lamborghini's first car, the 1964 Lamborghini 350 GT was powered by a 3.5 L (211 cu in) DOHC engine. These engines began long histories of V12 engines for the two Italian companies, which continue to the present day. In Europe, several manufacturers added V12 engines to their line-up, as listed below: In the United States, no mass-produced V12 engines have been built since the 1940s, with U.S. manufacturers preferring to use large displacement V8 engines instead. Japanese manufacturers rarely produce engines with large displacements, therefore V12 engines are very rare. The sole Japanese V12 engine is the 1997-2016 Toyota GZ engine, a 5.0 L (305 cu in) SOHC design which was used in the Toyota Century limousine. V12 engines have often been used if Formula One, particularly during from the 1966 season to the 1969 season. The first V12 engine used in Formula One was in the 1964 Honda RA271 racing car, and continued through to the 1968 Honda RA301 racing car. The 1966 season saw V12 engines become popular, with new V12 engines from Ferrari, Maserati and Weslake. Ferrari's engine debuted in the Ferrari 312 racing car and was used up to the 1975 Ferrari 312B, after which Ferrari switched to a flat-twelve engine. Maserati's engine was introduced in the Cooper T81 and was used until the 1969 Cooper T86. The Weslake V12 engine was used from 1966-1968 and was introduced in the Eagle Mk1 racing car. BRM produced V12 engines from the 1968 BRM P133 racing car until the 1977 BRM P207. The Matra Sports V12 engine was introduced in the 1968 Matra MS11 racing car and used until the 1978 Ligier JS9. Few V12 engines were used in the following decade, with the exception of the Alfa Romeo V12 which was first used by the 1979 Brabham BT48 and used by Alfa Romeo until the 1982 Alfa Romeo 182. A resurgence of V12 engines in Formula One began in 1989, with the introduction of the Ferrari 640 racing car. Ferrari continued to use V12 engines until the 1995 Ferrari 412 T2 became the last Formula One car to use a V12 engine. The Lamborghini LE3512 engine was used by various teams between 1989 and 1993. The Honda RA122-E engine was first used in the 1991 McLaren MP4/6 and was raced until the 1992 McLaren MP4/7A. The Yamaha OX99 engine was used in the 1990 Brabham BT59 through to the 1992 Brabham BT60. In prototype sports car racing, the highly successful 2006-2008 Audi R10 TDI used a diesel twin-turbo V12 engine. The Peugeot 908 HDi FAP, introduced in 2007, also used a diesel twin-turbo V12 engine. Several truck manufacturers have produced V12 diesel engines at various times. For example, the 1967-1982 Tatra T813, built in Czechoslovakia, used a 17.6 L (1,074 cu in) naturally aspirated V12 diesel engine, and the 1983-present Tatra T815 is available with a 19.0 L (1,159 cu in) V12 diesel engine in both naturally aspirated and turbocharged forms. In the United States, V12 versions of the 1938-1995 Detroit Diesel Series 71, the 1967-1999 Detroit Diesel Series 149 and the 1974-1995 Detroit Diesel Series 92 were produced. Trucks using V12 gasoline (petrol) engines are rare, however several were produced in the United States from the 1930s until the 1970s. In 1931, American La France began producing firetrucks with V12 gasoline engines based on the Lycoming BB motor. In 1935, the V12 engine used by the Pierce Arrow luxury car was fitted to firetrucks built by Seagrave (with production continuing until 1970, since Seagrave purchased the equipment to manufacture the Pierce Arrow engines themselves). The 1960-1965 GMC Twin Six 11.5 L (702 cu in) gasoline V12 engine was basically the GMC 351 V6 engine, doubled, with four rocker covers and four exhaust manifolds. Peak power was only 250 hp (186 kW), however peak torque was 793 N?m (585 lb?ft). |MTU||R43||170 mm (6.7 in)||195 mm (7.7 in)||53,113 cc (53.113 L)||1800||2400||6000| |MTU||2000||130 mm (5.1 in)||150 mm (5.9 in)||23,892 cc (23.892 L)||1800||600||3000| |EMD||710||190 mm (7.5 in)||210 mm (8.3 in)||71,449 cc (71.449 L)||950||2500| |GE||7FDL||220 mm (8.7 in)||230 mm (9.1 in)||104,917 cc (104.917 L)||1050||2400| |Cummins||Qs||170 mm (6.7 in)||190 mm (7.5 in)||51,751 cc (51.751 L)||1800||2200| |MAN||2842||128 mm (5.0 in)||145 mm (5.7 in)||22,390 cc (22.39 L)||2800||580| |CAT||3512||150 mm (5.9 in)||170 mm (6.7 in)||36,050 cc (36.05 L)||1800||1500| The V12 is a common engine configuration for tanks and other armoured fighting vehicles. Some examples are:
<urn:uuid:d3fe718f-4d4b-4dbf-82bd-984aa9a8be62>
CC-MAIN-2020-16
http://www.popflock.com/learn?s=V12_engine
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00355.warc.gz
en
0.962595
4,028
3.59375
4
Following the recent invasion of bovine tuberculosis (BTB) into the Kruger National Park, South Africa, we conducted a study on the maintenance host, African buffalo, to investigate associations between BTB prevalence and calf:cow ratio, age structure, body condition, and endoparasite load. Statistical analyses compared herds of zero, medium (1–40%), and high (>40%) BTB prevalence. To control for ecological variation across the park we collected data in northern, central, and southern regions and restricted some analyses to particular regions of the park. Body condition declined over the course of the 2001 dry season, and buffaloes in the southern region of the park, with the highest BTB prevalence, were in worse condition than buffaloes in the northern region (which receives less annual rainfall but is still virtually BTB-free). Herd-level analyses of the entire park, the south and central regions, and just the southern region all indicated that herds of higher BTB prevalence were in worse condition and lost condition faster through the dry season than herds of lower BTB prevalence. Fecal endoparasite egg counts increased during the dry season and were associated with both decreased body condition and increased BTB prevalence. Although we did not detect any obvious effect of BTB on the age structure of the buffalo population, our findings indicate early symptoms of wider scale BTB-related ecological disturbances: buffalo herds with high BTB prevalence appear more vulnerable to drought (because of a decrease in body condition and an increase in endoparasite load), and because lions selectively kill weak buffaloes their prey base is accumulating a disproportionately high prevalence of BTB, to which lions are susceptible. Rea10.1890/02-5266d More: http://www.esajournals.org/doi/abs
<urn:uuid:7de40443-df4a-4df6-b0e2-844f8c79b3dc>
CC-MAIN-2020-16
https://pubs.er.usgs.gov/publication/70160017
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.934304
373
2.796875
3
Wildlife Bans must be strictly Enforced In a move hailed by conservationists as a major milestone, CITES has imposed a total worldwide ban on the sale of pangolins. Does that mean pangolins, including Malaysia’s own Sunda pangolins, are saved? That depends. A ban will only work if it is enforced vigorously in countries like Malaysia. And in that regard, we have so far come up sorrowfully short. “[A] trade ban is only as effective as its enforcement,” Wong Ee Lynn, coordinator of the Green Living Special Interest Group, Malaysian Nature Society observes, and rightfully so. “According to the International Union for the Conservation of Nature (IUCN), the numbers of wild Sunda pangolins have decreased by half in the last 15 years.” Make no mistake, in other words: Malaysia’s endearing ant eaters are at risk of being driven largely extinct in their home forests. In Peninsular Malaysia, pangolins are already extinct or very thin on the ground. They will be driven extinct in their last refuges in Sabah and Sarawak too unless drastic measures are taken to arrest poachers in their tracks. Sadly, it’s not as if poachers themselves did not know that what they were doing was illegal and harmful. “According to [a] report by [the anti-trafficking watchdog] TRAFFIC, interviews with pangolin hunters in Sabah reveal that the hunters are aware of the illegality of hunting pangolins, and the critically endangered status of pangolins,” Wong Ee notes. “However, the hunters admitted that the lucrative price made it difficult for them to stop hunting pangolins.” Therein lies a problem: the lure of easy money often entices locals, including members of Orang Asli communities, into causing grave harm to the environment. Just the other day several youths, believed to be Orang Asli in Pahang, posted pictures of themselves online with the carcass of a mature tiger they had allegedly just killed, thereby driving the majestic animals (which number a mere 35o or so in Malaysia) further to the brink of extinction in the wild. Animal lovers and conservationists across the nation were duly outraged. The only way to stop such wanton destruction of wildlife is to educate locals about the need for environmental protection. Once they understand that by protecting pangolins, tigers and other wildlife they ultimately protect themselves, they might well be less likely to harm the animals. Such educational programs in local communities have long been ongoing, of course, but they have borne mixed results thus far. They will need to be stepped up by wildlife agencies with the help of nongovernmental organizations. Local Orang Asli communities also need to be further involved in coordinated protection initiates aimed at preserving local forests and their wildlife. “We hope they will be able to take on a more proactive role in helping authorities stop poachers, especially since their lives are intertwined with the forest ecosystem,” suggests Dionysius Sharma, CEO of WWF-Malaysia. “The Orang Asli have deep knowledge of forests. They would be excellent ‘eyes and ears’ for the authorities to combat wildlife crime,” he adds. “There is no single solution to these problems. Intelligence gathering, anti-poaching patrols and other measures must be used in combination.” Wong Ee agrees. “In order for the pangolin trade ban to be effective, enforcement agencies must treat wildlife trade as a serious international crime that threatens not only wildlife populations and the natural environment, but also ultimately human survival,” notes the conservationist. “Wildlife law enforcement agencies and prosecution bodies must cooperate with environmental organisations and monitoring bodies to eradicate corruption, stop wildlife trade, incapacitate wildlife trafficking syndicates and mete out the most severe punishments possible for wildlife offenders.” To their credit, senior Malaysian officials, like Sarawak’s Chief Minister Adenan Satem, are aware of the need to improve enforcement measures when it comes to crimes against the environment. “Enforcement, not the law, is the deterrent,” he stressed recently. “The law itself is not a deterrent [if culprits are not afraid] of being caught. We must stop this as soon as possible – the sooner, the better.” Agreed. Yet eradicating poaching on the ground may not succeed unless we also tackle at source the unceasing demand for wild animals like pangolins and tigers; namely, in China and Vietnam, where people consume the meat of these animals as delicacies and believe in the curative properties of pangolin scales, tiger bones and rhino horns. Needless to say, there are no curative properties to be had in any such parts – certainly none that could not be obtained from modern pharmaceuticals. Convincing many people of this fact, however, may prove to be a futile effort, at least in the short term. Old beliefs and traditions tend to die hard, after all. What to do then? We will need to go after the unscrupulous merchants of such quack remedies by imposing severe penalties on anyone found to be selling “medicine” made from the parts of pangolins, tigers, rhinos or any other endangered animals. Enough is enough. The slaughter and sale of endangered animals must stop once and for all.
<urn:uuid:c63b3b37-a4e0-410c-ae86-e97b724b7f5e>
CC-MAIN-2020-16
https://cleanmalaysia.com/2016/10/20/wildlife-bans-must-strictly-enforced/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.954589
1,152
2.734375
3
Overhead cranes are commonly used in the refinement of steel and other metals such as copper and aluminum. At every step of the manufacturing process, until it leaves a factory as a finished product, metal is handled by an overhead crane. Raw materials are poured into a furnace by crane, hot metal is then rolled to specific thickness and tempered or annealed, and then stored by an overhead crane for cooling, the finished coils are lifted and loaded onto trucks and trains by overhead crane, and the fabricator or stamper uses an overhead crane to handle the steel in his factory. The automobile industry uses overhead cranes to handle raw materials. Smaller workstation cranes, such as jib cranes or gantry cranes, handle lighter loads in a work area, such as CNC mill or saw. Almost all paper mills use bridge cranes for regular maintenance needing removal of heavy press rolls and other equipment. The bridge cranes are used in the initial construction of paper machines because they make it easier to install the heavy cast iron paper drying drums and other massive equipment, some weighing as much as 70 tons. In many instances the cost of a bridge crane can be largely offset with savings from not renting mobile cranes in the construction of a facility that uses a lot of heavy process equipment.
<urn:uuid:cb5602b1-e731-4654-a5ee-6823e24d479e>
CC-MAIN-2020-16
https://www.nucleoneot.com/faq/240.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.948347
263
3.03125
3
In 2016, the Walk Free Foundation noted that 124 countries had criminalized human trafficking in line with the UN Trafficking Protocol, 96 had National Action Plans (NAPs) to coordinate responses and 150 governments were providing some form of support for victims of modern slavery. The introduction of national legislation is an indication that governments are beginning to address the domestic and reputational implications of modern slavery in business on a grand scale. However, existing legislation and reporting requirements, such as the UK’s Modern Slavery Act of 2015, represent merely a baseline. It is simply not sufficient for companies just to abide by the letter of the law. Companies will also need to exercise prudent judgment to fulfil the moral expectations of society, carefully analyzing whether transactions would be considered legitimate in the eyes of a socially active and connected public, not to mention clients and other partners. Defining modern slavery It is important to understand the nuanced vocabulary of “modern slavery” in terms of defining slavery, forced labour and the economic exploitation of individuals or groups. Likewise, it is prudent for a business to insist that its partners and supply chains take all reasonable and practical steps to conform to a common understanding of slavery, to comply with relevant legislation and regulations in the countries in which they operate. On the other hand, it’s important to account for global wage and expectation differentials that form the basis for competitive advantage and socioeconomic mobility, which vary by society and country. Indeed, these differentials support the logic of outsourcing and multinational corporations. Prudent companies and institutions should focus on ensuring that business practices are assessed in relation to regional contexts and what is considered legitimate in exchange for the service that is being provided. Within this context, a fair day’s wage for a fair day’s work can be reasonably set at different levels in countries as culturally, economically and commercially diverse as, for example, Denmark and Bangladesh. To a large extent, the issue of “what the market will bear” will determine what is acceptable to both sides of an agreement. However, organizations have a legal duty to drive out poor labor practices in their business and could be considered to have a moral commitment to incentivise continuous improvements in supply chains. Anti-slavery policy: Best practices Companies need to introduce and maintain a business-wide, zero-tolerance approach to modern slavery in their procurement processes, supply chains and partnership networks. Guidance about policy formulation and implementation should include: - A clear definition of what constitutes modern slavery in relation to those countries where a company conducts business - A statement of zero tolerance for the procurement of goods and services from sources associated with modern slavery and human trafficking - Prohibitions and approval mechanisms to ensure that the procurement of goods and services from sources involved in forced labour is avoided - A requirement for annual reports, approved by the company’s board, demonstrating the integrity of supply chains by publishing identification, minimisation and mitigation measures in relation to modern slavery - Guidance for investment and procurement personnel about best practice and reporting requirements with regard to both anti-slavery legislation and company policy - With respect to third parties and partners, obtaining formal assurance that they comply with both relevant legislation and company policy - The appointment of a champion officer to maintain assurance on all matters relating to modern slavery and associated practices - Plans for training and capacity-building within the business - A response mechanism in the event that examples of slavery, forced labor or unfair employment practices are discovered within the company or its supply chain - A provision for auditing procedural and system integrity by externally trained, internal company members or by third-party independent auditors Anti-slavery provision: Advantages Not only are company brands and reputations protected by having rigorous anti-slavery provisions, but an increasing number of investment funds and businesses are specifically seeking to associate themselves with demonstrable ethical standards. With these provisions in place, increasing transparency and resilience are established within supply chains and partnerships, allowing for more efficient business relations. Conversely, modern slavery often has links to other forms of illicit activity, notably involving money laundering, drug trafficking and prostitution. In addition, almost half of the world’s illegal deforestation is slave-based, making criminal slaveholders responsible for 2.54 billion tons of carbon dioxide entering the atmosphere annually, more than any country except China and the US. This means that the consequences for businesses associated with modern slavery can include severe sanctions and penalties across several areas of operation. Therefore, it is essential that compliance professionals be able to differentiate between what is – and what is not – slavery or trafficking, and be equipped to fervently combat modern slavery wherever it is discovered. This is an abridged and adapted version of the original article written by Rear Admiral Chris Parry CBE PhD “Modern Slavery – What it seems, more or less.” To read the full article, visit: bit.ly/modern-slavery-whitepaper.
<urn:uuid:df07b270-b578-42c0-b10c-09145b7827a7>
CC-MAIN-2020-16
https://blogs.thomsonreuters.com/answerson/combating-modern-slavery-through-legislation-and-regulation/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.951836
1,023
3.09375
3
If we're all going to be living with robots in the near future, wouldn't it be great if they were furry or cuddly or cute? Here are some that you will enjoy. Each has a variety of different purposes, but they all have one thing in common: Widespread appeal to the humans they may one day be working and “living” alongside. Leonardo is a robot designed to interact with people — a social robot. Completed in 2002, Leonardo is two and a half feet tall and has a suite of sensors to communicate with people. A camera mounted in the robot’s right eye captures faces and recognizes them. Approximately sixty motors in the small space of the robot body make expressive movement of the robot possible. Leonardo can interact with people and learn new tasks. Such a cute little Gremlin! Source: MIT Personal Robots Wonder Workshop's Dash and Dot (formerly Bo and Yana) robots are quite warm and inviting in appearance to get toddlers interested in figuring out how they work. The goal is to introduce youngsters to computer programming. Source: Wonder Workshop French company Aldebaran Robotics developed the NAO robot for education and research. The human-like machines are being used in the RoboCup robotic soccer competition. Sony’s famous robot dog, AIBO, is no replacement for man’s best friend, but he can play fetch and respond to being petted with the best of them. AIBO was designed for home use as ‘entertainment' robots. They are also used in universities for education and research into human-robot interaction.
<urn:uuid:0a0c6138-07c8-49c3-88f6-84047948930e>
CC-MAIN-2020-16
http://www.supercoolrobots.com/the-cutest-robots-in-the-world/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.958145
329
2.8125
3
Holding a tea ceremony in China The tea ceremony is an ancient tradition that originated in China in the second century before our era. Over time, the basic rules for its conduct were established, and special tableware was defined. Today, a tea ceremony is a real action that will be remembered for a long time and will also help you find inner balance. The tea ceremony is special. At the moment of the action, participants can fully enjoy the delightful aroma of tea, the color of brewing, interesting forms of tea leaves. In order for the tea to reveal its flavor in the most accurate way, only the purest water from springs is used to brew it. This is the water that reveals the entire taste of tea and has a sweetish flavor. The water is prepared on an open fire. The duration of the process is about an hour. The number of people who participate may vary. But often their number does not exceed 5-6 people. Only in such conditions a person is completely relaxed and can burst into that extraordinary atmosphere. A person must come to the ceremony with pure intentions and thoughts. That’s why he must leave everything evil, bad things behind the door. Often the event is held in very beautifully decorated halls, where quiet relaxing music sounds. Brewing tea at the ceremony For this purpose, clean water is used, which only boils. In China it is believed that if water boils for a long time, it loses all its healing properties and cannot fully reveal the taste of tea. The first water that is poured into the tea is immediately poured. It is designed to wash the tea leaves and remove dust from them. The other water is already suitable for brewing the tea that is being consumed. Tea is brewed very quickly. It doesn’t take more than one minute to brew it. After that, tea is poured into special bowls. Each guest from his bowl inhales a couple of teas, slowly drinking them, focusing on his thoughts. The tea leaves can be brewed several times. Of course, the brewing becomes weaker each time, but the tea acquires new flavours and flavours. The main thing is that the water that is poured into the tea is not too much. After all, in China it is believed that moderation leads to wealth, and abundance leads to trouble. It’s not accepted to talk to each other during the whole action. You can only speak and address the tea itself and the god of the tea ceremony. His images are an obligatory attribute of the action, which is placed next to the tea equipment. A tea ceremony is a process that helps a person to find inner peace, tranquillity and tranquility. Everyone who wants to relax, to know himself should visit it. Pages: 1 2
<urn:uuid:d1d80dd4-e99c-4f4b-8dea-d1cf7c6da359>
CC-MAIN-2020-16
http://shopmazama.com/tea-information/2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.977166
566
2.890625
3
|Part of a series on| |Part of a series on| |Part of a series on| The vipassanā movement, also called the Insight Meditation Movement, refers to a number of branches of modern Theravāda Buddhism which stress insight into the three marks of existence as the main means to attain awakening and become a stream-enterer. It finds its origins in modernist influences on the traditions of Burma, Laos, Thailand and Sri Lanka, and the innovations and popularizations by Theravāda teachers as Mahasi Sayadaw ("New Burmese Method"), Ledi Sayadaw (the Ledi lineage), Anagarika Munindra and Pa Auk Sayadaw as well as nonsectarian derivatives from those traditions such as the movement led by the late S. N. Goenka (with his co-teacher wife Illaichi Devi) who studied with teacher Sayagyi U Ba Khin. - Meditation techniques 1 - History 2 Schools and traditions 3 - The Mahasi ("New Burmese") Method 3.1.1 - The Ledi lineage 3.1.2 - Pa Auk Sayadaw 3.1.3 - Mogok Sayadaw 3.1.4 - Anagarika Munindra 3.1.5 - Thai Forest Tradition 3.2 - United States 3.3 - Burma 3.1 Prominent women 4 - Dipa Ma 4.1 - Ilaichidevi Goenka 4.2 - Shambhavi Chopra 4.3 - Vipassanā in prisons 5 - Famous masters 6 - Notable living teachers 7 - See also 8 - References 9 - Sources 10 - Further reading 11 - External links 12 The vipassanā movement emphasizes the use of vipassanā to gain insight into the three marks of existence as the main means to attain awakening. According to Lance Cousins the primary source of the Insight meditation movement's practice "is the commentarial writings of Buddhaghosa, particularly the Visuddhimagga." In the 19th and 20th century the Theravada traditions in Burma, Thailand and Sri Lanka were rejuvenated in response to western colonialism. They were used as a banner in the struggle against western hegemonism, asserting traditional values and culture. But the Theravada-tradition was also reshaped, using the Pali scriptural materials to legitimize these reforms. Ironically, the Pali canon became widely accessible due to the western interest in those texts, and the publications of the Pali Text Society. A major role was also being played by the - Theravada reinvents meditationDavid Chapman, - The King of Siam invents Western BuddhismDavid Chapman, - Theravāda Spirituality in the West - of the use of jhana in some traditions of the Vipassana-movementrejection, a critical analysis of the A Critical Analysis of the teaching of JhanaJeffrey S. Brooks, - Seeking the Heart of Wisdom: The Path of Insight Meditation. Joseph Goldstein & Jack Kornfield (2001< Reissue) Shambhala. ISBN 1-57062-805-X - Beyond the Breath: Extraordinary Mindfulness Through Whole-Body Vipassana. (2002) Marshall Glickman. Tuttle Publishing. ISBN 1-58290-043-4. - Journey to the Center: A Meditation Workbook. Matthew Flickstein and Bhante Henepola Gunaratana. (1998) Wisdom Publications. ISBN 0-86171-141-6. - In this Very Life Sayadaw U Pandita, In this Very Life - Chapman, David (2011), Theravada reinvents meditation - McMahan, David L. (2008), The Making of Buddhist Modernism, Oxford University Press, - Sharf, Robert H. (1995-B), "Buddhist Modernism and the Rhetoric of Meditative Experience", NUMEN, vol.42 (1995) - McMahan 2008. - Cousins, Lance. The Origins of Insight Meditation - Sharf 1995-B, p. 252. - Sharf 1995-B, p. 253. - Sharf 1995-B, p. 255. - Sharf 1995-b, p. 255. - Fronsdal, Gil. Insight Meditation in the United States: Life, Liberty, and the Pursuit of Happiness, 1998 - Robert H. Sharf, Division of Social and Transcultural Psychiatry, Department of Psychiatry, Faculty of Medicine, McGill University - Chapman 2011. - 'Vipassana Meditation: As taught by S. N. Goenka in the tradition of Sayagyi U Ba Khin''"'". Torana.dhamma.org. Retrieved 2014-01-07. - Analayo, The Dynamics of Theravāda Insight Meditation - "Yogini: Sarah Powers, Shiva Rea & Lama Tsultrim Allione Speak About the Path of Women Teaching Yoga & Buddhism.". elephant journal. 2012-01-20. Retrieved 2014-01-07. - Schmidt, Amy. Dipa Ma: The Life & Legacy of a Buddhist Master Blue Bridge Books, 2005, p. 120. - Schmidt, Amy. Dipa Ma: The Life & Legacy of a Buddhist Master Blue Bridge Books, 2005, p. 146. - Doing Time, Doing Vipassana - Chopra, Shambhavi. Yogini: The Enlightened Woman, Wisdom Tree Press, 2007. - "Doing Time, Doing Vipassana review". Prison.dhamma.org. Retrieved 2014-01-07. - "Saya Thet Gyi". Vridhamma.org. Retrieved 2014-01-07. - Fronsdal, Gil (1998) Insight Meditation in the United States: Life, Liberty, and the Pursuit of Happiness from Charles S. Prebish and Kenneth K. Tanaka, The Faces of Buddhism in America, p. 1. - "Mohnyin Sayadaw". Thisismyanmar.com. Retrieved 2014-01-07. - "Our Teacher -". vipassanadhura.com. Retrieved 2008-05-04. - "Dhamma Web, ''Ven. Sayadaw U Kundala (1921-)''". Dhammaweb.net. 2004-01-01. Retrieved 2014-01-07. - "Singapore Dharma, ''Sayadaw U Rajinda''". Buddha.sg. Retrieved 2014-01-07. - Mother Sayamagyi - U Pandita - Sayadaw U Tejaniya - Sayadaw U Kundala - Sayadaw U Rajinda - Sayadaw U Pandita, Junior - Sayadaw U Lakkhana - Sayadaw U Janaka - Sayadaw U Jatila Notable living teachers - Mohnyin Sayadaw (1873–1964) - Sunlun Sayadaw (1878–1952) - Ajahn Naeb (1897–1983) - Taungpulu Sayadaw (1897–1986) - Mogok Sayadaw (Venerable Sayadawgyi U Wimala) ("Mogok Sayadaw PayarGyi") (1900–1962) Burmese monk and meditation master - Mahasi Sayadaw (1904–1982) Burmese monk and meditation master - S. N. Goenka (1924-2013) - Sayadaw U Silananda (1927–2005) Burmese monk and meditation master - Ledi Sayadaw (1846–1923) Burmese monk and meditation master - Ajahn Buddhadasa (1906–1993) - Luangpor Teean Jittasubho (1911–1988) - Nani Bala Barua Dipa Ma (1911–1989) Indian meditation master teacher, mother, trained in Burma - Ajahn Dhammadharo (1913–2005) - Ajahn Chah (1918-1992) brought the Thai Forest Tradition to the West Thai Forest Tradition Vipassanā movement traditions have offered meditation programs in some prisons. One notable example was in 1993 when Kiran Bedi, a reformist Inspector General of India's prisons, learned of the success of vipassanā in a jail in Jaipur, Rajasthan. A ten-day retreat involved officials and inmates alike was then tried in India's largest prison Tihar Jail near New Delhi. This program was said to have dramatically changed the behavior of inmates and jailers alike. Inmates who completed the ten-day course were less violent and had a lower recidivism rate than other inmates. This project was documented in the documentary film, Doing Time, Doing Vipassana. Vipassanā in prisons Indian Shambhavi Chopra, a former textiles designer and divorced mother of two who is now co-director of the American Institute of Vedic Studies, writes of her 10 day vipassanā meditation training at a retreat center in Germany in her book Yogini: The Enlightened Woman, and encourages students to explore vipassanā practice and mastery as a devotion to the Divine Mother of all. Indian teacher Ilaichidevi Goenka, wife of the Burmese-trained S. N. Goenka and mother of six children, began practicing adhittan vipassanā when her youngest child was four years old, eventually joining her husband on the teaching platform as co-teacher to thousands of students at retreat centers and prisons all over India as well as internationally. Prisoners who do vipassanā meditation reportedly experience less behavior problems while incarcerated and have lower rates of recidivism. "Mataji", as she is lovingly referred to by her students, also leads chants with her husband. Let me be free of enemies Let me be free of dangers Let me be free of mental anxieties Let me pass my time with good body and happy mind. Dipa Ma's mettā (loving-kindness) meditation instruction was a core component to be practiced after each vipassanā session. It involves five stages, the first of which was the mastery of self-compassion in mind and heart, then continuing to the other stages. The prayer of the first stage, given in English is as follows: The modern Indian teacher Dipa Ma, a student of Anagarika Munindra, was one of the first female Asian masters to be invited to teach in America. As a widowed, single mother, Dipa Ma was a householder (non-monastic) who exemplified liberation and taught vipassanā as not only a retreat practice but also a lifestyle. Her message to women and men was you don't have to leave your family to reach high states of spiritual understanding, and she taught a radical inclusiveness. She encouraged women who were mothers of young children to practice vipassanā through the daily activities of mothering. She once said to Joseph Goldstein that "Women have an advantage over men because they have more supple minds... It may be difficult for men to understand this, because they are men." When asked if there was any hope for men, she replied "The Buddha was a man, and Jesus was a man. So there is hope for you." Women have been quite prominent as teachers in the vipassanā movement. Though the formal Theravāda vipassanā tradition has been maintained by an almost exclusively male monastic tradition, nuns and non-monastic female adepts have played important roles, despite being completely absent or only noted in the background of the historical record. These teachers and practitioners expand the framework of vipassanā to incorporate the immanence of the female body and its innate opportunities for enlightenment through the cycles of its physiology and the emotions of marriage, childlessness, childbearing, child loss, and widowhood. We wanted to offer the powerful practices of insight meditation, as many of our teachers did, as simply as possible without the complications of rituals, robes, chanting and the whole religious tradition. A major feature of the western Vipassana movement is that it is a lay movement, practiced by non monastics. The Vipassana movement also generally tends to de-emphasize the religious elements of Buddhism such as "rituals, chanting, devotional and merit-making activities, and doctrinal studies" and focus on meditative practice. According to Jack Kornfield, The two major institutions in the USA are the Insight Meditation Society (IMS) in Barre, Massachusetts and its sister center, Spirit Rock Meditation Center in Marin County, California. Insight meditation practices have also influenced the discipline of psychotherapy. This is especially prominent in Jon Kabat Zinn's MBSR. Since the early 1980s, insight meditation has been one of the fastest growing Buddhist meditation practice in the United States. Apart from the major centers of IMS and Spirit rock, there are the various centers teaching SN Goenka's vipassana practice and various independent teachers. The movement began when Jack Kornfield and Joseph Goldstein taught a series of classes at Naropa University in 1974 and began teaching a series of retreats together for the next two years. The retreats were modeled on 10 and 30 day Goenka retreats, and the technique taught was mainly based on Mahasi Sayadaw's practice (with the inclusion of Metta meditation). In 1976 Kornfield and Goldstein, along with Sharon Salzberg and Jacqueline Schwartz founded the Insight Meditation Society in Barre, Massachusetts. Perhaps its most widely known representative was Ajahn Chah. Jack Kornfield, one of the main western teachers of Insight meditation, trained as a monk under Ajahn Chah. Ajahn Sumedho is the senior Western representative of the Thai forest tradition, he was the abbot of Amaravati Buddhist Monastery (1984-2010). A well-known American monk in this tradition is Ṭhānissaro Bhikkhu, abbot of Metta Forest Monastery in San Diego County. Western representatives of the Thai forest tradition are known to teach lay practitioners at the monasteries and to visit lay meditation centers to teach. While not a lay movement, the Thai Forest Tradition has been influential in the development of the lay meditation movements. This is a tradition of Buddhist monasticism within Thai Theravāda Buddhism which was in part a reaction against this perceived dilution in Buddhism. Practitioners inhabit remote wilderness and forest dwellings as spiritual practice training grounds. It is widely known among Thai people for its orthodoxy, conservatism, and strict adherence to monastic rules (vinaya). Thai Forest Tradition Mogok Sayadaw taught the importance of the awareness of noticing the 'arising' and 'Passing away' of all experience as to way to gain insight into impermanence. Mogok Sayadaw emphasized the importance of right understanding and that a meditator should learn the theory of Dependent Origination (Paticcasamuppada) when practicing vipassana. The Mogok vipassana Method focuses on meditation of Feeling (Vedanannupassana) and meditation on Mind states (Cittanupassana). The method of Pa Auk Sayadaw is closely based on the Visuddhimagga, a classic Theravada meditation manual. Pa Auk promotes the extensive development of the four jhanas, states of meditative absorption and focus. The insight element is based on surveying the body by observing the four elements (earth, water, fire and wind) by using the sensations of hardness, heaviness, warmth and motion. Western teachers who work with this method include Shaila Catherine, Stephen Snyder and Tina Rasmussen. Pa Auk Sayadaw In the tradition of S.N.Goenka, vipassanā practice focuses on the deep interconnection between mind and body, which can be experienced directly by disciplined attention to the physical sensations that form the life of the body, and that continuously interconnect and condition the life of the mind. The practice is usually taught in 10-day retreats, in which 3 days are given to the practice of calming meditation through anapanasati and the rest of the time is given to vipassanā in the form of "body sweep" practice in which the meditator moves through the body in sections, paying attention to the various sensations that arise without reacting to them. According to Bhikkhu Analayo, "this form of meditation has by now become what probably is the most widely taught form of insight meditation world-wide." The Ledi lineage begins with Ledi Sayadaw (1846 – 1923) and his student Saya Thetgyi (1873 -1945). S. N. Goenka (1924 - 2013) was a well-known teacher in the Ledi-lineage who was taught by Sayagyi U Ba Khin (1899-1971). According to S. N. Goenka, vipassanā techniques are essentially non-sectarian in character, and have universal application. One need not convert to Buddhism to practice these styles of meditation. Meditation centers teaching the vipassanā popularized by S. N. Goenka exist now in Nepal, India, Asia, North and South America, Europe, Australia, Middle East and Africa. The Ledi lineage Mahasi’s technique did not require familiarity with Buddhist doctrine (notably abhidhamma), did not require adherence to strict ethical norms (notably monasticism), and promised astonishingly quick results. This was made possible through interpreting sati as a state of "bare awareness" — the unmediated, non-judgmental perception of things "as they are," uninflected by prior psychological, social, or cultural conditioning. This notion of mindfulness is at variance with premodern Buddhist epistemologies in several respects. Traditional Buddhist practices are oriented more toward acquiring "correct view" and proper ethical discernment, rather than "no view" and a non-judgmental attitude. Robert H. Sharf notes that Buddhist practice is aimed at the attainment of "correct view", not just "bare attention": An important feature of the “Mahasi approach” is its dispensing with the traditional preliminary practice of fixed concentration or tranquilization (appana samadhi, samatha). Instead, the meditator practices vipassana exclusively during intensive periods of silent retreat that can last several months with a daily schedule of meditation from 3:00 a.m. to 11:00 p.m. Two key elements in Mahasi’s method for developing mindfulness are the careful labeling of one’s immediate experience together with the cultivation of a high level of sustained concentration known as “momentary concentration”(khanika samadhi). According to Gil Fronsdal: The "New Burmese method" was developed by U Nārada and popularized by his students Mahasi Sayadaw (1904-1982) and Nyanaponika Thera (1901–1994). Most senior western vipassana teachers (Goldstein, Kornfield, Salzberg) studied with Mahasi Sayadaw and his student Sayadaw U Pandita. Another prominent teacher is Bhikkhu Bodhi, a student of Nyanaponika. The Mahasi ("New Burmese") Method Contemporary Burmese Theravāda Buddhism is one of the main creators of modern vipassanā practice, which has gained popularity from the 1950s onward. Schools and traditions .Vipassana This method spread over South and Southeast Asia, Europe and America, and has become synonym with of Vipassana practice, as developed by U Naradah and popularized by Mahasi Sayadaw. Most influential in this renewed interest was the "new Burmese method" Interest in meditation was awakened by these developments, whereas the main Buddhist practice in temples was the recitation of texts, not of meditation practice.
<urn:uuid:5cbee8f0-1a78-4f37-912e-db5afe69d113>
CC-MAIN-2020-16
http://community.worldheritage.org/articles/eng/Vipassana_movement
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.914493
4,292
2.90625
3
You’ve probably heard before that those who do not learn from history are doomed to repeat it. This saying holds true for many things, including investing. Looking back at stock market history provides a unique window into what causes the stock market to crash, helping us predict when the next crash might take place. Let’s take a look at some of the most famous market crashes throughout history and what we can learn from them. 1. Black Tuesday First, let’s talk about Black Tuesday, 1929. The Black Tuesday stock market crash that took place in 1929 remains the worst crash in US history. Over a four day period, the Dow Jones dropped 25% and lost $30 billion in market value – the equivalent of $396 billion today. It was this crash that kicked off the Great Depression in the United States. Experts agree that the cause of this crash was largely due to over-optimistic investors. Just a few years prior to the crash, margin investing was invented, allowing investors to borrow money to buy stocks. This ability combined with a strong bull market led most everyone to invest without caution, causing the market to rise about 20% a year from 1922-1929. When signs of a bear market started showing, though, the panic was swift and devastating. The danger of over-optimism in a bull market is the primary lesson that can be learned from the Black Tuesday crash. When investors trust the strength of the market without caution, the results are never good. 2. Black Monday On October 19, 1987, the Dow shed 22% in a single day, ending a five-year bull market. It was a drop that came out of nowhere, and experts are still largely in disagreement about what caused the stock market crash. While there were some ominous signs such as slowing economic growth and rising inflation, there was nothing in the economic climate that would have predicted such a sudden and significant drop. Surprisingly, the crash only lasted one day, and the market soon climbed back to its highs. However, investors were still left badly shaken by the sudden crash. What the Black Monday crash teaches us is that the market is a fickle beast, and sometimes crashes are almost impossible to predict. It does, however, also teach us a more optimistic lesson as well – the market tends to recover quickly from even the most dramatic crashes. 3. The Tech Bubble Crash The 1990s were a period of rapid technological development, and the commercialization of the internet caused valuations of internet-based companies to sore. Investors excited about the potential of investing in the “next big thing” threw their money into any company that had “.com” after it without abandon. However, the hard lesson they soon learned was that most of these companies were doomed to fail. In March of 2000, large companies began placing sell orders on their tech stocks, causing a panic that led to a 10% drop in the market within a few weeks. By 2001, the majority of new tech companies – no longer propped up by investor money – disappeared from existence, causing hundreds of millions of dollars of investor money to go to zero. The importance of carefully evaluating a company no matter how trendy they might be is the primary lesson we can learn from the tech bubble crash. Had investors taken more time to assess the fundamentals, management, moat, and other factors of these companies rather than blindly hoping they were investing in the next big thing, much of the pain of the tech bubble bursting could have been avoided. 4. The Housing Market Crash And finally, this is the one you probably remember — the housing market collapse of 2008. Over the course of 2008, the Dow fell almost 34%, and it wasn’t until early 2009 that it began to climb again. As the name suggests, it was the real estate market that led to this collapse. However, the exact factors at play are complex, and economists disagree over whether the banks or the fed share more responsibility for the crash. What we do know, though, is that financial institutions were taking on risky loans thanks to declining foreclosure rates and the fact that the Federal Reserve Bank was keeping the federal funds rate below 2%. Once real estate prices began to drop and the federal funds rate began to rise, credit in the US froze, leading to an economic collapse. The lesson behind the housing market collapse is that companies are often affected by factors outside their control, meaning that investors must keep an eye on all economic conditions. The real estate market and the stock market are two entirely different markets, yet the collapse of one quickly led to the collapse of the other. Nevertheless, most high-quality companies survived the crash and soon went on to climb to the highs we see today. If you’re worried about stock market crashes, odds are you need to learn a little bit more about how to invest. This Stock Market Crash Survival Guide will help you prepare for the next market crash and help you cash in when the market drops!
<urn:uuid:3e8cc0b3-5a48-4e85-8e80-9f20e7519836>
CC-MAIN-2020-16
https://www.ruleoneinvesting.com/blog/investing-news-and-tips/stock-market-history/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.973032
1,043
3.140625
3
“Oh no! I’ve got a ransomware notice on my workstation. How did this happen?” “Let’s figure that out later. First, apply the backup from a few minutes ago, so we can continue to work.” Now that wasn’t so painful, was it? Having a rollback solution or a recent backup could make this ideal post ransomware–infection scenario possible. But which technology could make this work? And is it possible today? As we have pointed out before, blockchain technology is not for cryptocurrencies alone. In fact, a few vendors are already offering to use the blockchain to create recent, secured backups. With ransomware still one of the most prevalent threats, having backups is one of the most advised strategies against having to pay a ransom. Paying ransoms not only fuels the ransomware industry, it is likely to become illegal in some states and countries. For backups to be as effective as possible: - They need to be recent. - They shouldn’t be destroyed in the same accident or incident as the originals. - They should be secure against tampering and theft. - They should be easy to deploy. To achieve these goals, creating backups in several locations, on different media, and encrypted if necessary goes a long way. This is exactly why using blockchain technology makes sense. A quick reminder about how blockchain works. Blockchain is a decentralized system that can keep track of changes in the form of a distributed database that keeps a continuously growing list of transactions. Every change in the block results in a different hash value. This provides the opportunity to add a digital signature to each set of data. So, ideally you can be sure that the backup you are about to deploy is recent and hasn’t been tampered with by unauthorized hands. How it should work Blockchain technology is a decentralized ledger. Each transaction keeps an identical copy of the previous one. The authenticity of the copies can be confirmed by any of the nodes. The nodes are the “workers” that calculate a valid hash for the next block in the blockchain. This means that if the first block would hold an encrypted copy of all the files you use today, each next block would include a copy of that set plus all the changes that have been made before the next hash that was accepted by the network of nodes. And each next block would hold all the information in the previous one plus all the changes since then. Since every node has access to the list of changes, this makes the process completely transparent. Every transaction is recorded, and adding a fingerprint hardens the process against tampering. The architecture of the blockchain makes it impossible to manipulate or change the outcome, and it takes consensus from the nodes to create a legal “fork.” “Fork” is the term used to describe the situation where two or more valid chains of blocks exist. Or better said, where two blocks of the same height, or with the same block number in the following order, exist at the same time. In a normal situation, the majority decides for one block as the foundation for the rest of the chain and the other fork is abandoned. Sometimes forks are used on purpose to split off a chain for a change in protocol. These are called “hard forks.” Possible additional features Timestamps: A backup method using this kind of blockchain technology could also be used as legal proof that a document has not been changed since the time it was included in the backups. History of changes: A similar method can also be used to keep track of the authorized changes that were made to a document, and record when they took place and who made them. Companies looking to deploy blockchain technology to create secure backups need to heed a few pitfalls, especially if they intend to limit the number of nodes to keep them inside the company. Small networks are vulnerable to attacks by the majority. Blockchain technology is constructed so that the majority decides. And if you can find a way to provide more than half of the computing power active on the network, you can create your own false fork. In cryptocurrencies, such an attack can allow double spending, which leaves one receiving end in the cold. Some cryptocurrencies like Bitcoin Gold (BTG) have found out the hard way that these so-called 51 percent attacks can work. It cost exchanges several millions of dollars. Another possible problem with keeping the number of nodes small is the Sybil attack. A Sybil attack happens when a node in a network uses multiple identities. This is a procedure that can allow an attacker to outvote honest nodes by controlling or creating a majority. Where a 51 percent attack would be solely based on computing power, some networks use a factor called “reputation” as an additional weighing factor for the influence of the nodes. Your node controls the Sybil nodes attempting to gain total control. Image courtesy of CoinCentral. User behavior is always a concern. You can create the safest backup system, but a disgruntled employee could frustrate the whole effort. And insiders do not even have to have bad motives to corrupt the system. They may do it out of ignorance or with the best intentions. They may want to sweep something under the rug and unwittingly remove or corrupt more than they expected. Deleted files could be a problem in some setups. This is something to keep in mind. Having the hash of the deleted file and the date when it was removed may not always be satisfactory. Even if you know when and by whom a file was deleted, that will not bring it back. Depending on the way the backup system is set up, this may be solved with some digging in old backups, or they may be lost forever. The underlying problem for this is: Do you want every version of every document to be available at all times, or is it okay to have the original and the latest version with a historical overview of when it was changed and by whom? Ideally there should be some middle ground, for example, complete backups once a year and incremental backups done by the blockchain. Large node networks To prevent any type of majority attack, companies could decide to use larger, established networks like the Ethereum Project, but this may collide with policies of not sharing any kind of data outside their own network. Even if it is only the hashes and timestamps of the filesystem, this could clue others into what’s going on. And the costs for the nodes calculating the hashes (the miners) could prove to be more expensive than current backup solutions. So when can we expect to see this happening? I think we will see more progress made in this field in the near future. Incremental backup and keeping track of changes has blockchain written all over it. But a viable solution should have a large network behind it. And there are some other pitfalls to keep in mind when designing and setting up such a backup system. It may not be ready yet to be your only solution, but it seems to be an ideal fix to have incremental backups on a blockchain combined with full backups at set intervals.
<urn:uuid:16bdf057-255a-4e23-aee0-7cc2784e5268>
CC-MAIN-2020-16
https://staging-blog.malwarebytes.com/security-world/2018/12/using-the-blockchain-to-create-secure-backups/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.956081
1,456
2.765625
3
A Study on Plastic Waste Management by Stakeholders Using Reverse Logistics - 26 Downloads Plastic has become a benefit for the mankind because of its functionality and it is a commonly used material in their day to day activities. The indispensable habit of using the plastic by the present society for various purposes like carry bags, storage bags, packing materials, and so on is leading to the large-scale production of such products. After its usage or the effective life, it is regarded as waste. The sustainable disposal of these waste plastic is a critical issue and the very essence of the present-day waste management. The role of stakeholders (waste generators, the municipal corporations, and manufacturers of plastic) in disposal, on responsible terms is very crucial. The annual waste generated in India is about 62 million tons of which the plastic waste is 5.6 million tons. If the plastic waste is not collected, this leads to haphazard dumping and clogging of the waste. If it is collected and dumped to landfill sites without any treatment, it causes underground water pollution and other consequences. This paper aims to study the role of reverse logistics in plastic waste management and to explore sustainable solution to the problem of plastic waste management by applying reverse logistics. The present study is mainly conceptual in nature. The study suggests the embracing of corporate social responsibility (CSR) for creating awareness and to educate the waste generators. The study also recommends that the municipal corporations can tag on the public–private partnership (PPP) for collecting and segregating such plastic waste. Extended Producer Responsibility (EPR) may be recommended for the manufacturers as an eventual tool for the efficient waste management. Thus, the proactive collection and source segregation of the locally generated plastic waste and the implication of the initiatives by the municipal corporations can act as a primary solution to this problem. KeywordStakeholders Reverse logistics Sustainability - Abeliotis, K. (2011). Life cycle assessment in municipal solid waste management. Retrieved from https://www.intechopen.com/books/integrated-waste-management-volume-i/life-cycle-assessment-in-municipal-solid-waste-management. - Banerjee, T., Srivastava, R. K., Hung, Y. T. (2014). Plastic waste management in India: An integrated solid waste management approach. https://www.researchgate.net/publication. - Bhattacharya, R. R. N. S., Chandrashekar, K., Deepthi, M. V., Roy, P., Khan, A. (2018). Challenges and opportunities: Plastic waste management in india. Google Scholar - Legal Issues on Municipal Solid Waste (MSW) PPPs; https://ppp.worldbank.org/public-private-partnership/sector/solid-waste. - Nair, S. (2009). Reverse logistics gaining ground in Indian market. Retrieved from https://www.livemint.com. - Plastic Waste Management Rules. (2016). www.envfor.nic.in. - Ruj, B., Pandey, V., Jash, P., Srivastava, V. K. (2015). Sorting of plastic waste for effective recycling. https://www.researchgate.net/publication/305503715. - Singh, P., Sharma, V. P. Integrated plastic waste management: Environmental and improved health approaches. https://www.sciencedirect.com/science/article/pii/S1878029616301578. - Science and Environment—Seven Charts that explain the plastic pollution problem. (2017). https://www.bbc.com/news/science-environment-42264788. - Valle, P. O. D., Menezes, J., Reis, E., Rebelo, E. (2009). Reverse logistics for recycling: The customer service determinants. International Journal of Business Science and Applied Management, 4(1).Google Scholar - Wilhelm, R., Resin identification codes. https://www.astm.org/newsroom/astm-plastics-committee-releases-major-revisions-resin-identification-code-ric-standard.
<urn:uuid:62c454d3-8194-4983-8f6f-9ab3ef51cfb3>
CC-MAIN-2020-16
https://rd.springer.com/chapter/10.1007%2F978-981-15-0532-4_31
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.853215
885
2.90625
3
Små barns tecken- och meningsskapande i förskola : Multimodalt görande och teknologi Sammanfattning: This thesis explores how activities that young children are engaged in within the preschool environment, can be understood in terms of early language and literacy processes. The overall aim is to construct knowledge about young children’s spontaneous sign processes as well as meaning making and early literacy processes in preschool. A wider aim is to contribute to the theoretical understanding of young children’s multimodal use of language. More specifically, there is an interest to show how preschool educators describe and analyse young children’s literacy and how young children construct language in interaction with other children and technology. The overall theoretical view of is a social constructionist perspective of language and knowledge. Young childrens’ early literacy is seen from Early Childhood Literacy and multimodal views. The results are presented in four studies that together construct knowledge about the overall aim. The first two studies, based on focus groups, give insight into preschool educators’ views, and professional language about young children’s literacy. Young children’s interactions with each other and an interactive board (IWB), were then explored by video recordings in the third and fourth studies. The interactions are discussed in relation to sign- and meaning making, imagination and creativity. The professional language of Swedish preschool educators is eventually discussed as a dialogism of earlier theoretical and leading voices. The use of concepts such as bodily alliterations and pictographic writing are proposed as ways to expand the theoretical approach to young children’s literacy processes in preschool.By observing childrens interactions and view their bodily activities and their use of resources as doing literacy- and language their literacy could be challenged in preschools in its own right, and seen as literacy education. KLICKA HÄR FÖR ATT SE AVHANDLINGEN I FULLTEXT. (PDF-format)
<urn:uuid:718ffbf6-22c3-409e-9366-9a22d7cbae21>
CC-MAIN-2020-16
https://www.avhandlingar.se/avhandling/c0b5beb72b/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.945487
411
2.71875
3
“Big Week” turned out to be the most traumatic event experienced by the German aviation industry in its history. The concentrated attacks caused great alarm in the German leadership and made it turn its full attention to the problems of aircraft production under strategic bombing. The concentrated attacks caused grave damage to some highly developed production facilities and severely disrupted important production programs. Karl Frydag, chairman of the Airframe Main Committee, claimed after the war that the Luftwaffe lost around 4,000 aircraft due to “Big Week” bombings.The impact of “Big Week” was deep enough to set in motion a general reorganization of the entire aviation industry and its management. It should be noted, however, that some of the dramatic measures taken after the February attacks were deeply rooted in earlier developments and trends. The main trend apparent after “Big Week” was to reinforce “two central premises of modern industrial management: control and standardization.” Udet tried to assert these two elements, so central to military related production, but failed miserably. Milch tried again, and although he succeeded in some areas, in early 1944 the German aviation industry was still badly in need of more efficient control and a higher degree of standardization. The problems the Germans faced in early 1944 were not only organizational in nature. “Big Week” proved the vulnerability of the German industry to concentrated bombing efforts. The Germans therefore urgently needed a solution to the protection of the aviation industry. Since the Luftwaffe was not in a position to challenge Allied air power in the air, other solutions had to be found on the ground. The reorganization of 1944 helped first to restore and then to increase aircraft production. Nonetheless, although output reached record figures in 1944, it did not prevent Germany from losing the war in the air. The aircraft produced in 1944 could not turn the tide and prevent Allied air power from roaming freely over the Third Reich. Hitler tacitly admitted the failure of German air crews and their aircraft in August 1944 when he ordered to dramatically increase the output of antiaircraft artillery and its equipment.This order signaled that from this point on Germany’s air defense would be primarily ground-based. However, the Germans never fully gave up the hope to regain air superiority over the Reich or at least to inflict heavy enough damage on Allied air power to force it to ease its aerial onslaught. Therefore, the Reich’s leadership viewed the reorganization of the aviation industry as the main means to this end.
<urn:uuid:41d72691-b983-441d-9b5c-aebd09f0f8df>
CC-MAIN-2020-16
https://de-construct.net/reorganization-of-aircraft-production/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.97143
527
3.3125
3
There is a difference between improving "energy efficiency" versus reducing "power consumption". Let's consider the average 100 watt light bulb, of which 5 watts generate the desired feature (light), and 95 percent generated as undesired waste (heat). In this case, it would be 5 percent efficient. If you delivered a new light bulb that generated 3 watts of light for only 30 watts of energy, then you would have an offering that was more energy efficient (10 percent instead of 5 percent) and use 70 percent less power (30 watts instead of 100 watts). This new "dim bulb" would not be as bright as the original, but has other desirable energy qualities. Nearly all of the output of data center equipment results in heat.In The Raised Floor blog [It's Too Darn Hot!], Will Runyon explains how IBM researcher Bruno Michel in Zurich has developed new ways to cool chips with water shot through thousands of nozzles, much like capillaries in the human body. This is just one of many developments that are part of IBM's [Project Big Green] But what if the desired feature is heat, and the undesired feature is light?In the case of Hasbro's toy[Easy-Bake Oven],a 100W incadescent light bulb is used to bake small cakes. This is generating 95W of desired heat, and onlywasting 5 percent as light (unused inside the oven). That makes this little toy 95 percent energy efficient, butconsumes as much energy as any other 100W light bulb lamp or fixture in your house. With manufacturing switchingfrom incadescent to compact flourescent bulbs, this toy oven may not be around much longer. While we all joke that it is just a matter of time before our employers make us ride stationary bicycles attached to generators to power our monstrous data centers, 23-year old student Daniel Sheridan designeda see-saw for kids in Africa to play on that generates electricity for nearby schools. [Dan won the "mostinnovative product" at the Enterprise Festival]. Another approach is to improve efficiency by converting previously undesirable outcomes to desirable. Brian Bergstein has a piece in Forbes titled["Heat From Data Center to Warm a Pool"].Here's an excerpt: "In a few cases, the heat produced by the computers is used to warm nearby offices. In what appears to be a first, the town pool in Uitikon, Switzerland, outside Zurich, will be the beneficiary of the waste heat from a data center recently built by IBM Corp. (nyse: IBM) for GIB-Services AG. As in all data centers, air conditioners will blast the computers with chilly air - to keep the machines from exceeding their optimum temperature of around 70 degrees - and pump hot air out. Usually, the hot air is vented outdoors and wasted. In the Uitikon center, it will flow through heat exchangers to warm water that will be pumped into the nearby pool. The town covered the cost of some of the connecting equipment but will get to use the heat for free." I see a business opportunity here. Next to every data center lamenting about their power and cooling, build a state-of-the-art fitness center for the employees and nearby townspeople. Exercise on a stationary bicyclegenerating electricity, while your kids play on the see-saw generating electricity, and then afterwards thewhole family can take a dip in the heated swimming pool. And if the company subscribes to the notion of a Results-Oriented Work Environment [ROWE],it could encourage its employees to take "fitness" breaks throughout the day, rather than having everyone there in the early morning or late evening hours, leveling out the energy generated. Laugh now, but this could actually work! technorati tags: IBM, energy, efficiency, power, consumption, electricity, Daniel Sheridan,Will Runyon, Bruno Michel, Hasbro, Easy-Bake Oven, heat, stationary, bicycle, generator, Brian Bergstein, Forbes, Uitikon, Switzerland, Zurich, see-saw, swimming, pool, ROWE As a consultant, I am often asked to help design the architecture for the information infrastructure. A usefulanalogy to gather requirements and preferences is the difference between area rugs and wall-to-wall carpeting . Arearugs are not secured to the floor and cover only a portion of the floor area. Carpets are generally tacked or cemented to the floor, often with an underlay of cushion padding, stretched across the entire floor surface, out to all four walls of each room. Each has its pros and cons, and often is a matter of preference. Some people like area rugs because they can choosea different style for each room, match the decor and color scheme of furniture, and use these to define each livingspace. Ever since paleolithic man put animal skins on the floor of their cave, people recognize that cold, hard andugly floors could be covered up with something soft and more attractive.Others prefer wall-to-wall carpeting because they want to walk around the house barefoot, have their young children crawl on their hands and knees, and give the entire house a unified look and feel. This is often an inexpensive option when compared against the cost of individual rugs. The same is true for an information infrastructure. For some, they prefer the "area rug" approach: this style ofstorage for their email, this other type of storage for their databases, and perhaps a third for their unstructuredfile systems. When customers ask what storage would I recommend for their SAP application, or their Microsoft Exchangeemail environment, or their Business Intelligence (BI) software, I recognize they are taking this "area rug" approach. Like area rugs, having different storage can focus on specific attributes of the workload characteristics. It alsoinsulates against company-wide changes, the dreaded "rip-and-replace" of replacing all of your storage with somethingfrom a different vendor. With "area rug" storage, you can support a dual-vendor or multi-vendor strategy, and upgrade or replace each on its own schedule. Thanks to open standards and industry-standard benchmarks, changing out one storage solution for another is assimple as rolling up an area rug, and putting another one in its place that is similar in size dimensions. |Others may prefer "wall-to-wall carpeting" approach: one disk system type, one tape library type,one network type, that provides unified management and minimizes the needs for unique skills. Generally, the choice of NAS, SAN or iSCSI infrastrucutre is done company-wide, and might strongly influence the set of products that will support that decision. For example, those with a mix of mainframe and distributed servers looking for SAN-attached storage may look at an [IBM System Storage DS8000] and [TS3500 tape library] that can provide support for FICON and FCP.| Those looking at NAS or iSCSI might consider the IBM System Storage N series products, "unified storage" supporting iSCSI, FCP and NAS protocols. If you want the "wall-to-wall" to stretch across all the sites in your globally integrated enterprise, IBM's scalable NAS product, Scale-Out File Services[SoFS], provides a global name spacein combination with a clustered file system that provides incredible scalability and performance based on field-proven technology used by the majority of the [Top 100 supercomputer] deployments. IBM can help you design an information infrastructure that fits either approach. technorati tags: IBM, DS8000, TS3500, NAS, SAN, iSCSI, FCP, FICON, mainframe, distributed, SoFS, supercomputer No, this is not an announcement about myself moving to Nepal. My friends over at OLE Nepal are [looking for a Super SysAdmin]willing to live in Nepal for five months and help out with their project to help the students in the localschools there. I think this might be a great opportunity for someone to help changethe world. Those of you who have read my past blog posts about the One Laptop per Child [OLPC], such as [Understanding the LAMP platform] and [Supporting OLPC Schools with LAMP stacks] may understand the type of work involved. - You dream in Bash - IPv4, IPv6, Wireless Mesh networking? No problem! You know linux networking inside and out - Extensive knowledge of BIND, DHCPD, Squid, Apache, security, etc. - Experience working with [Moodle] would be most excellent (it is basically a PHP web application that maintains MySQL databases for lesson plans, homework assignments and other school related information) - Adept with Python scripting or could learn it quickly. OLPC has standardized on Python for scripting (although knowledge in Perl and PHP won't hurt either) - You look to implement a practical solution that less skilled sysadmins can easily maintain over a cooler but more complicated solution. - You play well with others. You don’t alienate collaborators with rude e-mails that assert your technical superiority (even though you are) - Your primary concern is meeting the educational needs of kids and teachers. Your rate technical awesomeness a distant second to meeting those critical needs. I've been working with Dev, Bryan and Sulochan for the past three months (remotely here from Tucson, AZ)but we've come to a point where we need on-site expertise. I will continue to provide remote support. Given the number of readers who have contacted me over the past year looking for an IT job (or a different job because they are not happy where they are), this could be an amazing experience. technorati tags: OLE Nepal, OLPC, Bash, Linux, IPv6, Mesh, networking, Squid, Apache, security, Moodle, LAMP, PHP, Perl, Python On Tuesday, I covered much of the Feb 26 announcements, but left the IBM System Storage DS8000 for today so that it can haveits own special focus. Many of the enhancements relate to z/OS Global Mirror, which we formerly called eXtended Remote Copy or "XRC", not to be confused with our "regular" Global Mirror that applies to all data. For those not familiar with z/OS Global Mirror, here is how it works. The production mainframe writes updates to the DS8000, and the DS8000 keeps track of these in cache until a "reader" can pull them over to the secondary location.The "reader" is called System Data Mover (SDM) which runs in its own address space under z/OS operating system. Thanks to some work my team did several years ago, z/OS Global Mirror was able to extend beyond z/OS volumes and include Linux on System z data. Linux on System z can use a "Compatible Disk Layout" (CDL) format (now the default) that meetsall the requirements to be included in the copy session. IBM has over 300 deployments of z/OS Global Mirror, mostly banks, brokerages and insurance companies. The feature can keep tens of thousands of volumes in one big "consistency group" and asynchronously mirror them to any distance on the planet, with the secondary copy recovery point objective (RPO) only a few seconds behind the primary. - Extended Distance FICON Extended Distance FICON is an enhancement to the industry-standard FICON architecture (FC-SB-3) that can help avoid degradation of performance at extended distances by implementing a new protocol for "persistent" Information Unit (IU) pacing. This deals with the number of packets in flight between servers and storage separated by long distances, andcan keep a link fully utilized at 4Gpbs FICON up to 50 kilometers. This is particularly important for z/OS GlobalMirror "reader" System Data Mover (SDM). By having many "reads" in flight, this enhancementcan help reduce the need for spoofing or channel-extender equipment, or allow you to choose lower-costchannel extenders based on "frame-forwarding" technology. All of this helps reduce your total cost of ownership (TCO)for a complete end-to-end solution. This feature will be available in March as a no-charge update to the DS8000 microcode.For more details, see the [IBM Press Release] - z/OS Global Mirror process offload to zIIP processors To understand this one, you need to understand the different "specialty engines" available on the System z. On distributed systems where you run a single application on a single piece of server hardware, you mightpay "per server", "per processor" or lately "per core" for dual-core and quad-core processors. Software vendors were looking for a way to charge smaller companies less, and larger companies more. However, you might end up paying the same whether you use 1GHz Intelor 4GHz Intel processor, even though the latter can do four times more work per unit time. The mainframe has a few processors for hundreds or thousands of business applications.In the beginning, all engines on a mainframe were general-purpose "Central Processor" or CP engines. Based on theircycle rate, IBM was able to publish the number of Million Instructions per Second (MIPS) that a machine witha given number of CP engines can do. With the introduction of side co-processors, this was changed to "Millionsof Service Units" or MSU. Software licensing can charge per MSU, and this allows applications running in aslittle as one percent of a processor to get appropriately charged. One of the first specialty engines was the IFL, the "Integrated Facility for Linux". This was a CP designatedto only run z/VM and Linux on the mainframe. You could "buy" an IFL on your mainframe much cheaper than a CP,and none of your z/OS application software would count it in the MSU calculations because z/OS can't run on theIFL. This made it very practical to run new Linux workloads. In 2004, IBM introduced "z Application Assist Processor" (zAAP) engines to run Java, and in 2006, the "z Integrated Information Processor" (zIIP) engines to run database and background data movement activities.By not having these counted in the MSU number for business applications, it greatly reduced the cost for mainframe software. Tuesday's announcement is that the SDM "reader" will now run in a zIIP engine, reducing the costs for applicationsthat run on that machine. Note that the CP, IFL, zAAP and zIIP engines are all identical cores. The z10 EC hasup to 64 of these (16 quad-core) and you can designate any core as any of these engine types. - Faster z/OS Global Mirror Incremental Resync One way to set up a 3-site disaster recovery protection is to have your production synchronously mirrored to a second site nearby, and at the same time asynchronously mirrored to a remote location. On the System z,you can have site "A" using synchronous IBM System Storage Metro Mirror over to nearby site "B", and alsohave site "A" sending data over to size "C" using z/OS Global Mirror. This is called "Metro z/OS Global Mirror"or "MzGM" for short. In the past, if the disk in site A failed, you would switch over to site B, and then send all the data all over again. This is because site B was not tracking what the SDM reader had or had not yet processed.With Tuesday's announcement, IBM has developed an "incremental resync" where site B figures out what theincremental delta is to connect to the z/OS Global Mirror at site "C", and this is 95% faster than sendingall the data over. - IBM Basic HyperSwap for z/OS What if you are sending all of your data from one location to another, and one disk system fails? Do you declare a disaster and switch over entirely? With HyperSwap, you only switch over the disk systems, but leave therest of the servers alone. In the past, this involved hiring IBM Global Technology Services to implementa Geographically Dispersed Parallel Sysplex (GDPS) with software that monitors the situation and updates thez/OS operating system when a HyperSwap had occurred. All application I/O that were writing to the primary locationare automatically re-routed to the disks at the secondary location. HyperSwap can do this for all the disk systems involved,allowing applications at the primary location to continue running uninterrupted. HyperSwap is a very popular feature, but not everyone has implemented the advanced GDPS capabilities.To address this, IBM now offers "Basic HyperSwap", which is actually going to be shipped as IBMTotalStorage Productivity Center for Replication Basic Edition for System z. This will run in a z/OSaddress space, and use either the DB2 RDBMS you already have, or provide you Apache Derby database for thosefew out there who don't have DB2 on their mainframe already. Update: There has been some confusion on this last point, so let me explain the keydifferences between the different levels of service: - Basic HyperSwap: single-site high availability for the disk systems only - GDPS/PPRC HyperSwap Manager: single- or multi-site high availability for the disk systems, plus some entry-level disaster recovery capability - GDPS/PPRC: highly automated end-to-end disaster recovery solution for servers, storage and networks I apologize to all my colleagues who thought I implied that Basic HyperSwap was a full replacement for the morefull-function GDPS service offerings. - Extended Address Volumes (EAV) Up until now, the largest volume you could have was only 54 GB in size, and many customers still are using 3 GB and 9 GB volume sizes. Now, IBM will introduce 223 GB volumes. You can have any kind of data set on these volumes,but only VSAM data sets can reside on cylinders beyond the first 65,280. That is because many applications still thinkthat 65,280 is the largest cylinder number you can have. This is important because a mainframe, or a set of mainframes clustered together, can only have about 60,000disk volumes total. The 60,000 is actually the Unit Control Block (UCB) limit, and besides disk volumes, youcan have "virtual" PAVs that serve as an alias to existing volumes to provide concurrent access. Aside from the first item, the Extended Distance FICON, the other enhancements are "preview announcements" which means that IBM has not yet worked out the final details of price, packaging or delivery date. In many cases, the work is done, has been tested in our labs, or running beta in select client locations, but for completeness I am required to make the following disclaimer: All statements regarding IBM's plans, directions, and intent are subject to change or withdrawal without notice. Availability, prices, ordering information, and terms and conditions will be provided when the product is announced for general availability. technorati tags: IBM, z10 EC, DS8000, z/OS Global Mirror, XRC, SDM, CDL, RPO, FICON, dual-core, quad-core, Intel, MIPS, MSU, zAAP, IFL, zIIP, Hyperswap, DB2, Apache, Derby, UCB, VSAM, EAV Wrapping up my week on the Feb 12 announcements, I will finish off talking about thenew Half-High (HH) LTO4 drives available for our TS3100 and TS3200 tape libraries. Small and medium sized business (SMB) clients are looking for small, affordable tapesystems. Tape is inherently green, using orders of magnitude less energy than disk,and is very scalable by simply purchasing more tape cartridges. |When IBM first announced them, the TS3100 supported one drive with 24 cartridges,and the TS3200 (see picture at left) supported two drives and 48 cartridges. Unlike disk, that mentions RAWcapacity and then lowers it to indicate usable capacity in RAID configurations, tapeis just the opposite. LTO4 cartridges have 800 GB raw capacity, but with an average of 2:1compression, can hold a usable 1.6 TB of data. LTO4 also supports WORM cartridges fornon-erasable, non-rewriteable (NENR) types of data, and encryption capability.| As a follow-on to our HH LTO3 drives, IBM is the first major storage vendor to offerthe new HH LTO4 drives in entry-level automation, which directly attach via 3Gbps SAS connections to your host servers. The HH models allows you to have two drives in the TS3100, and four drives in the TS3200. You can mix and match, LTO3 and LTO4. Why would anyone do that? Well, the Linear Tape Open [LTO]consortium --made up of technology provider companies IBM, HP and Quantum--decided to support N-2 generation read, and N-1 generation read/write. So, anLTO3 can read LTO1 cartridges, and read/write LTO2 and LTO3 cartridges. TheLTO4 can read LTO2 cartridges, and read/write LTO3 and LTO4 cartridges. For SMBcustomers that still have some LTO1 cartridges they might want to read some day,mixing LTO3 and LTO4 is a viable combination. Of course, IBM still offers full-high (FH) versions of LTO3 and LTO4, which offer a bit faster acceleration, back-hitch and rewind times than their HH counterparts, and also offer additional attachment choices of LVD Ultra160 SCSIand 4 Gbps Fibre Channel as well. So, for SMB customers that are simply using their tape for backup and archive,and probably not driving maximum rated speeds, having twice as many slowerdrives might be just the right fit. For more information on IBM's Feb. 12 announcement, see the[IBM Press Release]. technorati tags: IBM, HH, LTO3, LTO4, TS3100, TS3200, SMB, WORM, NENR, FH, LVD, Ultra160, SCSI
<urn:uuid:8b3ce55d-3e97-4246-b575-801257aaaad9>
CC-MAIN-2020-16
https://www.ibm.com/developerworks/community/blogs/InsideSystemStorage?sortby=3&page=30&maxresults=5&order=desc&lang=en
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.928777
4,748
3.203125
3
After 20 years of democracy, South Africans celebrate that human rights have been realized and that society is transforming. While there is strong disappointment with the government and its leaders, South Africans retain their faith in the democratic system and do not transfer their discontent to the African National Congress (ANC). These are among the key findings of Freedom House's study of South African democracy, conducted through 27 moderated focus groups convened between June and October 2013 that included South Africans from all racial and income groups and from rural as well as urban areas. Other findings include: - South Africans take their human rights for granted and retain faith in the democratic system, with strong support for voting. - The ANC maintains strong voter support, despite considerable public cynicism about government and politicians. - Citizens expect the government to build on the substantial amount it delivered during the first two decades of democracy, even if they distrust many state institutions. - Citizens see legislative institutions as weak, unresponsive and corrupt. - There is an extreme lack of confidence in the police, fuelled by rampant crime and the belief that lawlessness prevails. - Although there are exceptions, most South Africans consign the experience of pervasive racism to history, and young people have moved beyond thinking along racial lines. The study generated an authoritative dataset that makes possible new understandings of contemporary South African democracy. This executive summary outlines and interprets the main findings of the accompanying detailed research report. South Africans maintain the ANC in power despite frequent criticisms of lack of accountability and self-serving behaviors amongst ANC leaders in government. To justify this support, citizens displace blame for the barrage of wrong-doings that they themselves cite. Thus, even as they find reasons to support the ANC, they condemn the government, or they exonerate government leaders while condemning those who are entrusted with implementation. Significantly, they believe that national government is more trustworthy than the local. A deep sense of identification with the ANC prevails; it is part of citizens' culture to support the ANC. A young man from Emalahleni equates ANC support with a 'car that was smashed up in an accident' which one repairs, not replaces. South Africans know their leaders have been enriching themselves; however, they believe that, should a new party come to power, the new leaders may also start amassing wealth, thus pushing citizens even further down the queue for gains from the democratic system. The ANC has forged a post-apartheid identity which helps build citizen loyalty. Society is racially transformed -- despite smaller contemporary reminders of racial indignities -- and the ANC is seen as the movement that delivered the country from apartheid. It has created a monopoly over associations with liberation. The voices in these focus groups talk about the main opposition party, the largely minority-supported Democratic Alliance (DA), as too reminiscent of the racial past. It is fine as an opposition party, they indicate, but they are uncertain whether the past may reoccur should they give this party their vote. They give credit to the DA for some racial transformation within the party, but they still believe, in the words of a woman from the rural village of Viking, that the party leader 'is going to come with some stunts'. They also recognize the DA's help in forcing the government to be more accountable, but they do not reward this by switching their vote. As for the Economic Freedom Fighters (EFF), a young man from Richards Bay says they speak the 'language of truth to power'. Many of the groups echo this sentiment. An older man from Khayelitsha argues that EFF leaders' past as part of the ANC means they represent 'loyal opposition'. Substantial societal transformation and policy implementation in the first two decades of democracy have helped the ANC build its continuous support. Political freedoms have become ingrained in South Africans' civic personalities. Few -- particularly black-Africans -- fail to see positive changes in housing, education, health, basic services and social grants. All of these services are recognized as flawed, if not seriously deficient. Nevertheless, citizens display immense patience; like an older man in Theunissen, they use the phrase 'Rome was not built in one day'. Many look at the government as a caring parent, accepting that this parent-government retains its benevolent status in the eyes of the people. In a notable paradox, however, citizens have also started to wonder how much this government really cares. They see the current leadership class as the new 'haves' of the post-apartheid system. In this view, the leaders care for their own pockets and those of their associates. The absence of political leaders from the communities they supposedly represent exacerbates the belief that they care more for themselves than for the people. 'This is the new inequality that is killing our democracy', said a man from Hammanskraal. Participants also expressed that the politically connected and unconnected are not equal before the law. The search for employment informs this new cleavage. Amidst very high levels of unemployment, citizens observe jobs being taken by those who are connected to the political elite. Despite the cynicism, however, they still see prospects for leaders reconsidering their current ways. In the words of a man from Khayelitsha, 'in my heart I hope that one day government will sober up and see the difference between those who are rich and those who are poor'. The realities of being continually disadvantaged are reinforced through deficiencies in the quality of life on the ground. Citizens are exposed to crime and to police whom they see as complicit with and sympathetic to criminals, leaving law-abiding citizens feeling vulnerable. They see suspected rapists and violent robbers roaming their streets, within a day or two of being charged. There is little prospect of a fair trial because 'the files get eaten by the dog', as a woman from the Barberton group remarked. Communities round up criminals themselves and beat them as a pragmatic alternative to the police taking an extended time to respond to calls. In the focus groups, citizens across all provincial, racial, class and party political lines stated that the government institutions designed to be accessible and responsive -- the local, provincial and national legislative institutions -- are instead distant and unresponsive. In their place, some citizens recommend protest: 'Cause chaos and get representation' is the advice from Richards Bay. Paradoxically, this form of direct action helps citizens remain loyal to the ANC because there is a perception that it produces results. Direct advocacy in the form of complaints to the government gives people another avenue to extract more services, rather than switch to an opposition party. Despite citizens relying on or supporting protest to improve representation, the report findings testify to the continued love affair with elections. Most citizens' disappointment with the institutions of democratic government and disillusionment with political elites do not mean that they disavow elections. Some will vote in order to make change -- either to strengthen an opposition party of choice, or in the belief that after further affirmation, the ANC will deliver more. Others vote for the ANC to protect the 1994 victory. They also support the ANC in tribute to what they see as Mandela's virtuous democracy.
<urn:uuid:172b8de4-7a68-42db-bead-ddeac8aa28cf>
CC-MAIN-2020-16
https://www.issuelab.org/resource/twenty-years-of-south-african-democracy.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.961516
1,448
3.109375
3
2.6 ~ 2.8 billion years of animated rifts history Témiscamingue's first geological formation goes back to the continent's origin 2.6~2.8 billion years ago. Our geology includes: - Under water volcanic rocks; - 460 ~ 420 million years old fossil bearing limestone, which is relatively young relative to the events that brought together the North American continent; - A fault system taking a staircase form called RIFT played a major role in the safe keeping of those layers by protecting them from the erosion caused by glacier A small part of our main exhibition is dedicated to Témiscamingue's geology. Come see our galleries to learn more.
<urn:uuid:a81d51d0-3e41-4657-ac2d-691741f4ac0b>
CC-MAIN-2020-16
http://www.fossiles.ca/en/learn/temiscaming-s-geology/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.929513
142
3.265625
3
There is a lot of confusion around the industry about the difference between contactors and relays and many times the terms are used nearly interchangeably. The defining differences are not always clear, so we thought we’d try and help sort out the answer. According to the Institute of Electrical and Electronics Engineers: Relay – “A device by means of which contacts in one circuit are operated by a change in conditions in the same circuit or in one or more associated circuits” Contactor – “A device for repeatedly establishing and interrupting an electric circuit under normal conditions” What Makes Contactors Different from Relays? The textbook definitions are similar enough it doesn’t really help us. Both perform the same task of switching a circuit! So What really differentiates the two devices? 1. Load Capacity Relays are generally classified as carrying loads of 10A or less, while a contactor would be used for loads greater than 10A, but this definition, while simple, gives an incomplete picture. It leaves out any physical differences, or standards. 2. Open/Closed Contact Standards Contactors are almost exclusively designed to operate with normally open (Form A) contacts. Relays on the other hand can and often are both Normally Open and/or Normally Closed depending on the desired function. This means that with a contactor, when it is de-energized there is (typically) no connection. With a relay there very well could be. 3. Auxiliary Contacts To confuse things a bit, contactors are often fitted with auxiliary contacts which can be NO or NC however these are used to perform additional functions related the control of the contactor. For example, the contactor may transmit power to the motor, while the auxiliary contact is in the control circuit of the motor starter and commonly used to turn on a pilot light indicating the motor is operating. 4. Safety Features (Spring-Loaded Contacts) Because contactors are typically carrying high loads, they often contain additional safety features like spring-loaded contacts to help ensure the circuit is broken when de-energized. This is important because in high load situations contacts can weld themselves together. This can create the dangerous situation of a circuit being energized when it is supposed to be off. Spring-loaded contacts help to reduce this chance, as well as ensure all circuits are broken at the same time. Since relays are typically for lower power, spring-loaded contacts are much less common. 5. Safety Features (Arc Suppression) Another safety feature commonly included in contactors, due to the high loads they typically carry, is arc suppression. Magnetic arc suppression works by extending the path an arc would have to travel. If this distance is extended further than the energy can overcome, the arc is suppressed. Since relays aren’t designed for high loads, arcing is less of a concern and arc suppression is much less common on relays. 6. Safety Features (Overloads) Lastly, contactors are commonly connected to overloads that will interrupt the circuit if the current exceeds a set threshold for a selected time period, usually 10-30seconds. This is to help protect the equipment downstream of the contactor from damage due to current. Overloads are much less common on relays. Contactor vs Relay Applications Contactors are typically built for and used in 3-phase applications where a relay is more commonly used in single phase applications. A contactor joins 2 poles together, without a common circuit between them, while a relay has a common contact that connects to a neutral position. Additionally, contactors are commonly rated for up to 1000V, while relays are usually rated to only 250V. Choosing Between Contactors and Relays for Your Application When selecting between the two, some very general rules you can follow to help When to Use a Relay: - 10A or less current - Up to 250VAC - 1 phase When to Use a Contactor: - 9A or more current - Up to 1000VAC - 1 or 3 phase Always consult the specifications of the items you are considering using and discuss with a licensed electrician. This is for informational purposes only. In practice, you should be looking at the function as well. For any circuit where an overload condition could occur, and a failure to de-energize the circuit will create a dangerous condition, then a contactor is likely the best choice because of the additional safety features. For switching low power, when the additional safety features of a contactor are not necessary, a relay is typically the more economical choice.
<urn:uuid:0966a40f-944e-4336-a1e5-58277295f11d>
CC-MAIN-2020-16
https://www.springercontrols.com/news/contactors-vs-relays/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.946629
960
3.953125
4
Writing a nation: Should we start using Baybayin again? The pros and cons of Baybayin as a national writing system Oct 23, 2018 Last April, the House Committee on Basic Education and Culture approved a proposal to make Baybayin the country’s national writing system. This means that, once the proposal is enacted, Baybayin translations will be required for: street signs; names of public facilities like buildings, hospitals, fire and police stations, government halls, etc.; food product labels; and print mastheads. The responses to this were mixed. Many approved, but many still remained cautious. Because of this, it’s only appropriate to take a step back and examine Baybayin. Baybayin is a script developed by the early Tagalogs. To paraphrase Ma. Victoria Gugol’s “Ortography (Evolution)” from the NCCA website, the Baybayin script is syllabic and composed of three vowels and fourteen consonants. The vowels represented are a, i (or e), and u (or o). Being syllabic, each consonant is pronounced with the vowel a, unless a sign called the kudlit is placed over it. The kudlit, which is either a cross or a dot, signifies the use of another vowel: If the sign is written over the letter, the consonant is pronounced with an e or i, and if it is under the letter, the consonant is pronounced with an o or u. Unlike other alphabets, which are named after their first three letters, Baybayin is named after its convention of letters falling into succession. “Ang Baybayin…ay nangangahulugan ng ‘pagkakasunod-sunod ng mga bagay sa isang hanay’ (sucesion de cosas como en fi la),” Virgilio Almario writes in his introduction to Spanish clergyman Pedro Andres de Castro’s Baybayin: Ortograpiya at mga Tuntinin sa Pagsulat sa Wikang Tagalog. The early Tagalogs wrote on bamboos, tree barks, and leaves—all “perishable materials, hence no extant specimens exist today,” says Rosa M. Vallejo in “Books and Bookmaking in the Philippines,” on the NCCA website. When the Spanish colonizers first came to the Philippines, there was an attempt by the friar scholars to learn the language (hence Pedro Andres de Castro’s book), but that attempt was quickly superseded by them ultimately replacing the script with their own alphabet. “It is believed that replacement of the Baybayin by the Roman alphabet must have obliterated a significant aspect of indigenous Philippine literature,” says Dr. Lilia Quindoza-Santiago of the University of the Philippines Diliman in her article “Early Philippine Literature” on the NCCA website. This brings us to look at what Baybayin can do in terms of decolonizing our language. Of course, turning Baybayin into our writing system has deep implications for the Filipino identity. “Language is the house of being,” philosopher Martin Heidegger once said, meaning that the way we experience the world is through the language we use. Quoting Virgilio Almario: “Higit na lalaya at lulusog ang ating pananaw sa ating sarili kapag ibinukas natin ang ating sarili sa iba’t ibang perspektiba ng oryentasyong pangkultura at kapag higit nating pinagbuhusan ng tiyaga ang pagtitig sa natitira’t pira-pirasong gunita ng ating katutubo’t sinaunang sarili. Ang Baybayin ang isang dakilang halimbawa sa nakapagsasariling katangian ng wika at kulturang Filipino.” Some of the loudest critiques of the bill are that it’ll just be an aesthetic change; it should be taught in schools first before it’s used as a nationwide writing system; and what we need is to better educate children about the Filipino language more. Another is that it’s too late for us to have our own national writing system. I’ll start with the former: I think more time needs to be spent developing the writing system. I agree that Baybayin is still limited, and it should be taught in schools first. Educators should also have more time to learn up on it so they’ll be able to properly teach their students. However, if those changes are made, it could work well for the next generation. They’ll be learning the language alongside the script, and that’ll enrich their experience of the Filipino language. Here’s what I can offer on the latter: Even though it seems like our language and culture have moved on from Baybayin, it’s not too late to bring it back. After all, we’re still a relatively young country. The Koreans created Hangul in 1440 after centuries of using a modified classical Chinese script. Turkey adopted a Latin-style alphabet in 1927 after a thousand years of using a Perso-Arabic script. If the colonizers were able to impress upon us a foreign writing system, we can also do the opposite. I was careful to note that Baybayin was used by the Tagalogs because, contrary to what a lot of people might have been led to believe, it is not the only writing system developed by the Filipino people. There are, in fact, 16. Kapampangans, for example, have Kulitan, the Bisayas have Badlit, and the Mangyans have Hanunó’o. You can’t make a case that these scripts are more primitive than Baybayin. Whereas Baybayin was mostly used to codify merchant transactions, the Mangyans use Hanunó’o to write poetry. This takes us back to the age-old debate about the Filipino language. As a Mindanaoan Bisaya, I’ve heard pretty much all that there has to be said about this. “Filipino is pretty much just Tagalog.” “Filipino is an example of Manila imperialism.” “Filipino doesn’t account for all the many, many languages in the Philippines.” But one of the more enduring claims I’ve heard once I moved to Metro Manila is that while Filipino is flawed and Tagalog-centric, it’s serviceable and there’s enough intersection with Tagalog and the other Filipino languages anyway that people can understand it. And sure, that’s an easy thing to say—if you’re Tagalog. However, if you’ve lived with a “regional language,” then you know that there’s still a certain sense of disconnect. Filipino is home, but not as much as “uli na ka” (“go home” in Bisaya) is. And you might have also experienced feeling like your mother tongue is informal, maybe even inferior to the actual Filipino language, and has no place in school. I’ll put it in another way: Is it worth it to decolonize our writing system with a dominant, if still native, force? Honestly? I’m not so sure. This story originally appeared in Southern Living Discourse Issue Get more stories like this by subscribing to our newsletter here. Read more by Zofiya Acosta: Who’s afraid of the contractual workers? UP scientists are designing affordable ventilators for COVID-19 patients Hide the mess and noise at home during video meetings with these tools HEALTH & WELLNESS PLHIV can get HIV treatment from UP Diliman amid the enhanced community quarantine PICC, World Trade Center to be converted into COVID-19 quarantine facilities HEALTH & WELLNESS Provincial hospitals are calling out to DOH to protect them against COVID-19
<urn:uuid:019e17b2-1531-4aff-a035-0f2c91782a6e>
CC-MAIN-2020-16
https://nolisoli.ph/49937/writing-a-nation-zacosta-20181017/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.931598
1,763
2.65625
3
Marshmallow (Malva parviflora ) is an upright or sprawling, summer or winter annual that is thought of as a common weed throughout North America. Marshmallow is native to the Mediterranean region but has been introduced worldwide as an ornamental. Marshmallow is identified by its distinctive, cheese-wheel like fruits and kidney-shaped leaves. Marshmallow Toxic Components Marshmallow has been implicated as the cause of many cases of poisoning in livestock in Australia and a recently discovered cause of poisoning in horses in the United States. What Marshmallow Looks Like - Young plants: It initially appear as a basal rosette. - Root system: Straight taproot of varying lengths with a coarsely branched, secondary root system. - Stems: 4 to 34 inches in length, branched stems which are covered in short hairs. The stems will often trail along the ground initially, until they turn upright at the end. - Leaves: Green, wide, kidney-shaped and toothed edges with 5 to 9 shallow lobes. It has prominent veins that radiate from the center of each leaf, which are covered with short hairs on both sides. Leaves are alternative and attach to stems through long petioles. - Flowers: 5-petaled flowers appear from May through October, and are white to pink to purple in color, notched at their tip, and can arise alone or in clusters from stem axils. - Fruits: Fruits resemble cheese-like wheels, appearing as 10 to 20 rounded, flattened sections aggregated such that they form a ring. As fruits mature, they dry up and separate in segments, which each contain one reddish brown to black seed.
<urn:uuid:59cc61fb-1b6e-4634-a8c6-1c4d513a19d3>
CC-MAIN-2020-16
http://www.horsedvm.com/poisonous/mallow/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00355.warc.gz
en
0.959949
351
3.515625
4
Cancer. Why is it that so many of us dare even speaking this word aloud? It’s almost as if we think that we’ll become a victim if we say it. After all, cancer is NOT contagious.* Perhaps it should be referred to as ‘The Disease That Shall Not Be Named.’ The good news. Cancer detection is improving all the time. Treatments have advanced so much that many forms of cancer, which would once have considered to be fatal, can now be treated, with very high survival rates. But what about mouth cancer. Here are some facts: This year, 6000 people in the UK will be diagnosed with mouth cancer. Without early detection, half will die. Mouth cancers often don’t present with any symptoms at early stages. But, early detection improves survival chances to 90%. As dentists, we are ideally suited to screen for signs of mouth cancer. We perform a full screen on all of our members at regular intervals. And the even better news is that we have now invested in a Velscope early detection tool. The Velscope system has been officially recognised by the World Health Organisation (WHO) as an innovative device that addresses global health concerns and is the only dental product recognised. With a Velscope, a blue light fluoresces the tissues of your mouth which allows us to see diseases not visible with the naked eye. It helps us to discover oral diseases before they can be seen under normal light. There are no rinses or dyes involved. The whole procedure only takes a few minutes. So, from now on, we will be using the Velscope regularly for our practice members. But, what if you’re not a member? Just give us a call and we’ll happily give your mouth a full screen for the signs of any disease, including cancer. We can give you dietary advice and brochures with much more information about the causes of mouth cancer and how best to try to minimise the risks. And how much will this cost? Nothing! This one’s on us. Of course, if you want to, you can donate to the charities that we are currently supporting.
<urn:uuid:f38798d6-3ec8-4d7b-b38b-1fd7b8fe5b64>
CC-MAIN-2020-16
http://www.highstreetdentalpractice.com/blog/2012/07/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.957483
457
2.765625
3
Making Sense of it All LIFEGROUP NOTES Week 5 - Making Sense of it All In our study today, we will look at David, a man who had times of outright rebellion toward GOD characterized by sin and disobedience. We will be surveying a few passages, mostly from the Old Testament, about David’s life, David’s disobedience and rebellion, and then David’s repentance! The Life of David – Read 2 Samuel 5:1-3. 1. What characteristics do you think of a “Good” King as having? (these do not have to be spiritual characteristics...think secular.) 2. Read 1 Sam. 13:14. What characteristic is King Saul told that GOD wants in the King of Israel? 3. Now go back to 2 Sam. 5:2. What is it that the Lord told David? 4. What can we deduct from these two statements? If 1 Sam. 13:14 says that GOD will find “a man after His own heart” and then command him to be the prince of Israel...and 2 Sam. 5:2 says that David was commanded to be the prince of Israel. David’s Rebellion/Disobedience – 2 Sam. 11. 5. 2 Sam. 8 and 10 are accounts of David’s victories in battle, due to GOD’s favor! Then we get to 2 Sam. 11. Why do you think that chapter 8 and 10 are important to this story in ch.11 6. What in v1 communicates that something is wrong? Remember that David is “a man after GOD’s own heart”, but what we see next is a series of events that paint a picture of how far David’s heart has wondered. 7. 1st in this series of events: David sees Bathsheba bathing. Do you think that at this point David is in sin? 8. What do you think David’s purpose was for inquiring about Bathsheba? 9. As a result of these actions, Bathsheba becomes pregnant. In an attempt to cover up his adultery, David sends for Uriah. What does he seek by doing this? Why is this crucial in this story? 10. So, David still seeking to cover up his sin gets Uriah drunk in hopes that his conviction about going home and being with his wife would be eased. It does not work. So King David sends Uriah back into battle carrying his own death letter. This is a final attempt to cover up his sin and adultery. Read James 1:14-15. How does this verse fit the story of David and Bathsheba? There is no doubt that David acted in defiance and rebellion to GOD. But this story also has a great and biblical ending! In Ps. 51, David repents for his actions in an act of restoration that can only be wrought through a heart truly after God’s heart. David is now intimate with the dangers of sin and how it can affect his life. Thus, he repented and pleaded with GOD for mercy and forgiveness and for God to kill the sin in his heart. When we discover rebellion in our lives...is this the type of response that we see? Are we as broken as David in Ps. 51 about our rebellious attitudes toward GOD? ScheduleSchedule
<urn:uuid:9bc0ed48-fca5-463f-a865-0ffb0d98849e>
CC-MAIN-2020-16
https://www.crosspointechurch.cc/post/2019/02/03/making-sense-of-it-all
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.965718
699
2.953125
3
An Emerging Natural Paradise - Aogu Wetland Forest Park Master Plan Over the past decades, flat and spacious coastal areas have been seen various usages and development. The contention and conflict between human development and natural conservation along the coastal area occur all around the world. The project, Aogu Wetland and Forest Park, is located in the southwest area of Taiwan, and has experienced different stages of development before it eventually reverted to natural wetland. On the estuary of the Bei-Gang River, the site was a typical tidal mud wetland before 1964. The site began the C-shaped seawall construction and reclaimed over 1,000-hectare of lands from sea in 1964 because of the farming and livestock industry. Historically, the land was desalinated and prepared for a sugar plantation, a pig farm and a fish farm. After the land subsided and several serious inundation events by the sea occurred, the soil become saline and the production of sugar ceased on the site. In 2001, the site was selected as an afforestation area. The landscape and habitat have changed dramatically in the past 40 years, and the site now consists of a combination of natural wetland and artificial woodland. The Aogu Wetland and Forest Park comes from this changing process of environment. Aogu Wetland and Forest Park is the showplace of the process of natural systems. The site has been reclaimed and reverted back to a coastal wetland, which unexpectedly has become a refuge for migratory birds and other wildlife. The aim of this project focuses on establishing a series of conservation and re-habitation strategies on sites reclaimed for human development, and emphasizes the site as a seeding process for the natural systems, as well as environmental education, eco-tourism and cultural sustainability. 2011 ASLA Professional Award of Excellence (Analysis and Planning)
<urn:uuid:ee1b7a6a-17ed-430c-b20b-ab0881fdf00e>
CC-MAIN-2020-16
https://maev.nsysu.edu.tw/p/406-1261-184240,r3423.php?Lang=zh-tw
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.954013
376
3
3
|“||Aircraft carrier, Houshou. Though I'm inexperienced, I look forward to your guidance.||„| Hōshō (鳳翔?, literally "phoenix in flight") was the world's first commissioned ship that was designed and built as an aircraft carrier, and the first aircraft carrier of the Imperial Japanese Navy (IJN). Commissioned in 1922, the ship was used for testing carrier aircraft operations equipment, techniques, such as take-offs and landings, and carrier aircraft operational methods and tactics. The ship provided valuable lessons and experience for the IJN in early carrier air operations. Hōshō 's superstructure and other obstructions to the flight deck were removed in 1924 on the advice of experienced aircrews. Hōshō and her aircraft group participated in the Shanghai Incident in 1932 and in the opening stages of the Sino-Japanese War in late 1937. During those two conflicts, the carrier's aircraft supported Imperial Japanese Army ground operations and engaged in aerial combat with aircraft of the Nationalist Chinese Air Force. The small size of the ship and her assigned airgroups (usually around 15 aircraft) limited the effectiveness of her contributions to combat operations. As a result, the carrier was placed in reserve after her return to Japan from China and she became a training carrier in 1939. During World War II, Hōshō participated in the Battle of Midway in June 1942 in a secondary role. After the battle, the carrier resumed her training role in Japanese home waters for the duration of the conflict and survived the war with only minor damage from air attacks. She was used as a repatriation transport after the war, making nine trips to bring some 40,000 Japanese soldiers and civilians to Japan from overseas locations. Hōshō was scrapped in Japan beginning in 1946. Like some other carriers, her attire is based on kyūdo (Japanese archery) equipment. She wears a scarlet kimono, a dark hakama, and a matching tasuki (a rope to tuck up the kimono sleeves to prevent them from getting in the way). She holds a bow with her left hand, and she wears a yugake (deerskin glove) on the right hand. Her flight deck is attached to her left arm. She has a set of arrows on her back, with the Japanese aircraft insignia (red circle) on the arrow fletchings. PersonalityEdit Hōshō (Houshou) was the world's first commissioned ship that was designed and built as an aircraft carrier. (Other carriers of her days were conversions from other types of ships.) For this reason, she can be considered to be the "mother" of all the other carriers, and hence has a very motherly, caring personality and is more reserved than the other ships. Her quotes also suggest that she is a stereotypical "good wife" of the old days. You can bet she's a good cook too, and in fact Chitose Carrier Kai 2's hourly line on 7 pm indicates that she runs a restaurant or possibly an izakaya (something like a pub or a bar). - Her name literally translates as "phoenix in flight" (鳳=phoenix, 翔=soar/fly). - Weak and outdated (but this helped her to survive WWII). - Due to her comments regarding opening a little store with the admiral, JP players often refer to her as おかみさん (Okami-san, lit. "boss lady" or the female owner of a typical Japanese store). - Low consumption, which is good for expeditions. - Her arrows have orange-yellow fletching as apposed to the white and green arrow fletching of other carriers, this is a reference to her role as a training carrier as the IJN painted its training aircraft a bright yellow or orange. - Scrapped beginning 2 September 1946, after the mission of repatriation. - She served as a repatriation transport to retrieve Japanese serviceman and civilians station overseas and return them to Japan.During her repatriation mission she was modified to cut her hangars to carry more passengers to continue her repatriation trips before August 15 1946 and carries transported more of about 40,000 passengers before she was scrapped. - The original Houshou appeared in the animated movie "The Wind Rises", the aircraft carrier visited by Horikoshi Jiro and his supervisor Kurokawa. Nagato, with the serpentine funnel unique to her class, was shown as well, albeit briefly. - Participated in the Battle of Midway with her task being to provide modest air protection, scouting, and anti-submarine support to the Main Body (consisting of Yamato, Nagato, Mutsu). - A Yokosuka B4Y 'Jean' from Houshou took aerial photographs of a burning Hiryuu on June 5th 1942 after the Battle of Midway. - She makes a small appearance in the anime.
<urn:uuid:35affe63-d300-4c26-80c8-06c000b61a9b>
CC-MAIN-2020-16
https://hero.fandom.com/wiki/Houshou
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00035.warc.gz
en
0.972325
1,046
3.375
3
Creatine is among the most popular ergogenic aids for sports and exercise. As a nitrogenous organic compound, 95 percent of which is stored in muscle, it is proposed that large doses of creatine can enhance athletic performance by delaying muscle fatigue, particularly during high-intensity interval training. Claims have been made that creatine supplementation promotes gains in muscle strength and size, but this may be an indirect effect of increasing metabolic energy in skeletal muscle, allowing for a greater duration and intensity of training. Most high-intensity interval training relies on quick sources of energy including free ATP and ATP-creatine phosphate (ATP-CP), before moving into the glycolytic system. So, in theory, supplying extra creatine could extend the supply of ATP-CP, delaying muscle fatigue and the necessity for shifting toward glycolysis. The ATP-CP is short-lived and this has created questions regarding the true efficacy of creatine supplementation for exercise performance. Research indicates it’s an effective ergogenic aid, but the exact mechanism of action remains to be fully elucidated. In a two-group matched, double blind, placebo-controlled design of nineteen male soccer players randomly assigned creatine monohydrate supplementation or placebo, those consuming creatine monohydrate (0.03 g/kg/d for 14 d) had significant increases in muscle power output and total work. A meta-analysis showed that approximately 64 percent of studies measuring body mass and/or body composition noted a statistically significant increase in lean body mass due to creatine supplementation, but this effect was theorized to be a result of creatine’s osmotic properties increasing intracellular water. Research supports creatine supplementation to enhance performance and body composition, but only with short-duration, maximal-intensity resistance training. Creatine for Obesity The benefits of creatine go beyond its ergogenic effects. A recent in vivo study suggests a strong role for creatine metabolism in energy expenditure and diet-induced thermogenesis, potentially acting as a defense against diet-induced obesity. When the rate-limiting enzyme of creatine biosynthesis, glycine amidinotransferase (GATM), was inactivated in adipose tissue, energy expenditure was suppressed, leading to diet-induced obesity. Creatine for Cognitive Performance Creatine also plays a role in cognitive performance because the brain contains a significant pool of creatine. Many neurological and neurodegenerative conditions include impairments in oxygen supply to the brain, leading to compromised brain function. Creatine, however, is able to replenish ATP energy apart from an oxygen supply and has been shown to be neuroprotective against hypoxic damage. A study of 15 healthy adults given creatine for 7 days showed a 9.2 percent increase in creatine in the brain. When an oxygen deficit was created, impairing neuropsychological processes, creatine supplementation restored cognitive performance and increased corticomotor excitability. Other studies have shown creatine to be neuroprotective in traumatic brain injury, Huntington’s Disease, amyotrophic lateral sclerosis (ALS), cerebral ischemia, and Parkinson’s Disease. Creatine for Systemic Inflammation Creatine supplementation has been shown to have potent anti-inflammatory properties in animal models where acute and chronic inflammation was induced by multiple agents including carrageenan, serotonin, nystatin, and formaldehyde. Each model represented a different inflammatory pathway, and creatine was able to effectively suppress each pathway. Creatine is widely available through the diet in milk, red and white meat, fish, and mollusks. The typical diet supplies about 1 to 2 grams of creatine daily. It can also be synthesized from the amino acids arginine, methionine, and glycine. Creatine supplementation for sports performance is often taken in doses ranging from 0.07 grams per kg body weight per day to 5 grams per day. However, during a “loading period” of up to 7 days, large doses of 20 to 25 grams per day may be employed before decreasing to a maintenance level for several weeks. Past studies have shown supplemental creatine to increase muscle creatine concentrations by 20 percent. Creatine is clearly more than an ergogenic aid. Its additional benefits are still being explored and span into the territory of energy expenditure, brain health and immune function, making this a compound with broad applications for health and wellness.
<urn:uuid:3c3e8646-20a0-41b4-bc91-0e1458e8808a>
CC-MAIN-2020-16
https://mergemedicalcenter.com/blog/creatine-benefits-beyond-exercise/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00355.warc.gz
en
0.934271
882
2.9375
3
One among some significant duties of the Trainer is performing the educational administration (ranging from setting up, implementation and evaluation) to assist his/her college students reach highest Mastering aims. But there are occasions when lecturers are unable to guide The scholars to accomplish the most beneficial brings about Discovering as The scholars do not have the enthusiasm for Finding out. The students appear to be hesitant to become involved in the educational approach. So, what in case you do as a very good Trainer? This article will make clear the way you like a teacher might take some essential measures for making your college students appreciate Discovering while in the classroom. 1. Do generate the classroom atmosphere that evokes everyone The community has a strong affect on individual conduct. Similarly, the classroom ecosystem has a strong affect on the students’ conduct that is definitely in it. Therefore, the classroom surroundings really should be pursued as a way to really have good effect on the learners. To create students captivated with Discovering, the classroom environment needs to be cultivated in order to encourage pupils to like Finding out. Make sure you Be aware into the air, light, and color during the classroom. A lot less air and light will affect oppressive and exhausting eye. So, you would much better make full use of bright colours. Shows must be pursued, like terrific figures, inspirational words and phrases, Develop desires, poetry, and Other folks. Also, set over the Show the class regulations which were agreed Amongst the members of the class. 2. Regulate the educational course of action that amuses Every single scholar Learning ambiance during the classroom will have an effect on the mood of the students, in order that when the learning method is amusing, college students will be much more motivated and become additional drawn to Discovering. Take note: An amusing Studying approach is important, even so the evaluation is usually significant mainly because it will measure if the process is effective. Assessment techniques have to be organized, develop questions in accordance with what are to become calculated. To produce creativeness and originality of The scholars, you need to use open issues. Furthermore, issues should challenge the students to attain something more but nonetheless doable by The scholars. Thoughts that happen to be much too quick won’t elevate the spirit to work much more. As an alternative, In the event the questions are much too tough they are going to transform off The scholars’ energy. So, academics have to be Inventive. 3. Make an atmosphere of competition at school Basically, Absolutely everyone will really feel happy if he/she has just about anything more than the Other folks: much better, extra productive, a lot more smart, richer, and Some others. Furthermore, individuals will come to feel unhappy or maybe experience When they are in a very condition even worse than Some others. Hence, every person has an intuition to compete. Nonetheless, we as lecturers require to prepare a strategy to make sure that the competition in The category continues to be beautiful and college students are wanting to compete While using the classmates. How to get this? Put together a competition that can be accompanied by the entire class and every pupil has the chance to become a champion. Be sure that pupils who turn out to be winners diversified, not just specific college students who acquire the competition. Let Just about every university student turn into a winner in a specified time. This really is in accordance Together with the theory of “Each individual personal is really a champion in his industry”. So, lecturers must differ the type of Competitors held within the classroom. 4. Give suitable learning means as part of your class It frequently happens, learners tend not to want to understand as a result of lack of the educational resources or maybe due to the unavailability of the training assets. In order to make the students as part of your class delight in Understanding, deliver ample learning sources, that means that the training resources not just offered but will also may differ. With the availability of the training resources (which can be diversified and suitable), pupils might be determined to know. Studying sources are offered, To start with is that they support the curriculum, as well as related to self-development and/or vocation growth. Understanding resources furnished need to indeed be during the classroom, not only in the library. Mastering sources is often goods referred to printable resources, audio recording, and films. The more various plus more entire the educational means obtainable in the class, the higher the effect on the students’ curiosity in Mastering. Thus, students grow to be to delight in Discovering. 5. Deliver aid to learners who battle to master Another matter which will arouse pupils’ curiosity in Understanding is the availability of the assistance to Understanding. The help to Discovering can come from the classroom Trainer, or This might be from Yet another Trainer that is assigned to aid learners that are getting problems to discover or dealing with learning challenges.
<urn:uuid:b4df3995-b53e-49bc-b323-46d6115cbfa0>
CC-MAIN-2020-16
http://www.ironworkerslocal36.com/important-steps-to-make-your-students-enjoy-learning/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.966225
1,026
2.5625
3
Poitevin Marsh, the Green Venice Poitevin Marsh, the second largest wetland in France and Great Site of France The Marais Poitevin is a vast marshy area, a remnant of the Gulf of Poitou, a limestone plateau formed during the Jurassic. The sea that covered it retreated during the Würm glaciation; rivers and rain eroded it leaving behind the hardest rocks that formed a series of islets where men built villages and abbeys such as Mazillais, Saint Michel in Herm or Marans. The Poitevin Marsh stretches from the Baie d'Aiguillon on the Atlantic coast, to Niort to the east and Fontenay-le-Comte to the north. Over the centuries, marsh dwellers - maraîchins - drained and reshaped it in two zones; the dry marsh and the wetland. The Poitevin Marsh was classified Grand Site de France in 2010 ; it’s the 7th major natural site and 2nd largest marsh in France after the Camargue. It was labelled Regional Nature Park because of its exceptional natural landscapes, flora and fauna. The dry marsh represents 2/3 of the Poitevin Marsh; it spreads from the Bay of Aiguillon to Marans. This is where you’ll find the many rocky islets that once peaked above the wetland. Monks and villagers started to drain the marsh in the 13th century to convert it for agriculture and animal rearing. They created a vast network of straight waterways - conches - to delineate their plots, and built reservoirs, flood gates and locks to control water flow and irrigate them. Wetland - Green Venice The remaining third of the Poitevin Marsh is the wetland that floods during the winter. Men shaped it too, but in the 19th century; they dug hundreds of kilometers of waterways to transport their farm products to the various market places and communicate with the outside. They converted their plots of land into orchards, meadows and market crops and planted their banks with poplars and ash trees to stop soil erosion. The best way to discover the Poitevin Marsh? The best way to get around is by punt; you’ll slide silently over the waterways under the tree canopy. It’s a land of dense foliage, lush green meadows and water, hence its name of Petite Venise Verte - Green Venice. You’ll find 28 piers or embarcadères* - 10 in Vendée, 13 in Deux Sèvres and 5 in Charente Maritime. This is where you can to hire punts and set off on your own, or chose a punter-guide who will introduce you to the flora and fauna of the marsh. La Maison du Marais Poitevin museum in Coulon** will take you to the discovery of the marsh’ history and its ecological issues, but also of how man shaped it through the centuries. If waterways are not your favourite, you can set off on a horse drawn carriage***, but also on the many hiking and biking trails. The ornithological park (in Saint-Hilaire-la-Palud) will show you the Marsh’ natural fauna; the stunning kingfisher, the domesticated Poule de Marrans - a local breed of hens - but also nutria if you care to get up at the crack of dawn, to name a few. However, the emblematic animal of the marsh is the dragonfly, light and fragile, that land graciously on the water. Angelica, the emblematic flower of the Poitevin Marsh The flora is equally rich and varied, but the Angelica archangelica is the undisputed queen of the marsh. Man has used it for its virtues since ancient times; they used this superb umbillifere against the plague, and witches to prepare their magic potions... Today we use it for its medicinal virtues (digestive, disinfectant and nervous system), but also in confectionery and liquor production! Angelica has become the Poitevin Marsh's emblematic flower as it finds there optimum conditions to grow and proliferate. You’ll easily recognize its thick and hollow fluted stalk that grow up to 1.70 m and its unique aromatic scent. Niort has long been known as the capital of Angelica. Local nuns started to use it in the 18th century in confectionery and liquor production, triggering the city’s commercial expansion. Candied Angelica sticks even became a luxury product, thanks to Louis Napoleon Bonaparte who fell in love with it when visiting the city in 1852. Angelica has since been part of the Poitevin Marsh’ heritage and is mainly used to make candied sticks, jam, sweets and liquor; you’ll find the main plantations around the town of Prin-Deyrançon. Coordinates Coulon: Lat 46.362703 - Long -0.579729 The short video below will give you an overview of a boat trip from Coulon Sign up to our newsletter Travel France Online will use the information you provide on this form to keep in touch with you and to provide updates via our newsletter. By selecting the boxes on the form you confirm your acceptance to receive our newsletter. You can change your mind at any time by clicking the unsubscribe link in the footer of any email you receive from us, or by contacting us at firstname.lastname@example.org
<urn:uuid:f6f14f40-fb78-40c5-8780-d6a8ff925608>
CC-MAIN-2020-16
https://www.travelfranceonline.com/poitevin-marsh-the-green-venice/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz
en
0.906065
1,178
3
3
A serious problem in the Linux glibc library went unnoticed for almost 15 years. A simple coding mistake introduced into the code in November 2000 leaves servers including e-mail servers vulnerable to remote code execution. A buffer overflow in the GNU C Library function __nss_hostname_digits_dots(), which is called by the well used gethostbyname*() functions makes it possible to take over any type of server. In the case of e-mail servers — to take only one example — it is possible to take over a server remotely by sending a well-crafted e-mail exploiting the vulnerability. However, there are clearly security implications to the bug that was found. As illustrated in the picture, taking over an unpatched e-mail server is rather simple as it does not require special credentials whatsoever. It requires detailed knowledge of the bug itself (and as Glibc is open source, the code can be inspected) and a malicious person with exploit writing capabilities to craft an attack vector in order to exploit this vulnerability. It requires the malicious person to send the e-mail to the mail server, which then calls one of the gethostbyname*() functions which will in turn call the problematic __nss_hostname_digits_dots(). If the attack is correctly designed, the attacker will get a shell on (and control over) the machine. What we’ve learned from this vulnerability is that once again security issues can go unnoticed for a very long time. We often come across web-facing applications that feature code written years ago, sometimes over a decade old. A clear lesson is that these may no longer be considered safe, for the simple reason that new security issues have since emerged. Many organizations are addressing this issue by reviewing older code on critical and web-facing applications. We can only encourage everyone to do the same.
<urn:uuid:53955386-0c06-4743-abc8-33b45fe368a9>
CC-MAIN-2020-16
https://blog.nviso.eu/2015/01/28/the-ghost-vulnerability/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00435.warc.gz
en
0.934635
382
3.359375
3
By Charlene Porter IIP Staff Writer August 23, 2013 Analyses of dozens of tuberculosis genomes from disease strains gathered around the world offer clues on why TB is so prevalent and how it evolves to defend against human attempts to fight it. “It’s as though the bacterium places bets on human behavior,” said Caitlin Pepperell, a University of Wisconsin-Madison microbiologist who is the lead author on the work published in PLOS Pathogens. The TB bacterium “always bets that humans will go to war, send people to refugee camps and gather in miserable places. Historically, that’s been a winning bet on the bacterium’s part.” These are conditions in which TB thrives. The pathogen is transmitted only by humans and cannot survive in the environment on its own. TB has proven to be the greatest threat in the crowded conditions of prisons, slums and refugee camps. That survival technique has enabled TB to follow humans over the last several centuries and flourish in historical periods marked by urbanization, migration and expansion into new territories, the researchers find. The World Health Organization (WHO) calls TB the world’s second most deadly disease pathogen after HIV, causing 1.4 million deaths in 2011 and 8.7 million cases of illness. The research team — which included scientists from Stanford University, the University of Iowa, the University of Sydney and the Broad Institute, which is supported by the Massachusetts Institute of Technology and Harvard University — analyzed the genetic diversity of 63 TB strains and related pathogens. The scientists found that the disease strains had two common characteristics that contribute to longevity. They are very good at casting off mutations that are harmful to their survival, while they are tolerant of beneficial mutations that strengthen their defensive genes. Mutations that allow the organism to fend off attacks from the human immune system or resist the pharmacological onslaught of medications are readily adapted. Those traits have apparently contributed to TB’s great longevity, Pepperell said. “It must have some incredibly clever strategies and tricks to hang on.” These observations about the TB genome will provide the platform for further research, Pepperell expects, because they will help other researchers identify vulnerabilities that could be new drug targets. The U.S. National Institutes of Health provided funding for the work conducted by Pepperell and her colleagues. More than 95 percent of TB deaths occur in low- and middle-income countries, where it is among the top three causes of death for women aged 15 to 44. After concerted efforts to improve treatment access by the United States and other donor nations, the TB death rate is down by 41 percent between 1990 and 2011, WHO reports. Through this period, an estimated 20 million lives have been saved through use of a TB-stopping strategy recommended by WHO. The estimated number of people falling ill with tuberculosis each year is declining, although very slowly. Based on that trend, predictions indicate that the world is on the way to achievement of a goal to reverse the spread of TB by 2015. Under the Obama administration’s Global Health Initiative, the United States is committed to contributing to that goal, as well as supporting TB testing and treatment for millions of vulnerable individuals worldwide.
<urn:uuid:6b515b54-1bd6-4531-910d-fa47fc32f423>
CC-MAIN-2020-16
https://geneva.usmission.gov/2013/08/26/tuberculosis-genes-reveal-secrets-to-disease-success/
null
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00275.warc.gz
en
0.949368
673
3.21875
3