text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Post prepared by Dr Anna Petersen, Assistant Curator of Photographs
Hocken Album 512 has seen a busy time these past few weeks with University of Otago Art History students opting to study it for an assignment and images copied for an exhibition at Fraser Island in Australia to commemorate the part the hospital ship ‘Maheno’ and its crew played in World War One.
The album first became available to the public in 2001 when it was purchased for the Hocken Photographs Collection at a local auction. Some years later, Sandy Callister featured whole pages from it in her book The Face of War: New Zealand Great War Photography, Auckland University Press, 2008, partly singling it out from the many war albums dominated by images from the Gallipoli Campaign because of the excellent quality of the images. Callister also found the content and arrangement of the photographs revealing in her quest to uncover the public understanding of the sacrificial cost of the war.
The four different pages shown below include rare snapshots of life on board the HS Maheno, glimpses of people from other countries who toiled to provide coal for the mighty, steam-powered ship as it traveled to the other side of the world, and images of soldiers at ANZAC Cove.
No supplementary information came with the album regarding its creator or provenance but clues contained within it have led researchers to conclude it was most likely compiled from photographs taken by Lieutenant Howard Beecham Pattrick (1884-1962). Pattrick first enlisted as a medic in 1915 when living as a student at Knox College, Dunedin. He later became part of the New Zealand Rifle Brigade and suffered a serious wound on the Western Front in 1917. According to the Honours and Awards to the New Zealand Expeditionary Force (p.251)
During operations lasting several days, he displayed conspicuous gallantry and devotion to duty. On one occasion he was blown up by a shell and badly shaken, but he declined to retire, and carried on with his men. When all the officers had become casualties, he took command of the company, and it was largely owing to his fine and resolute leadership that the objective was quickly reached. He set a splendid example to his men.
Pattrick was awarded the Military Cross in August 1918 for the acts described above, and was finally discharged from service on 25 November 1919.
Album 512 is available to patrons upstairs in the Pictorial Collections Reading Room under the accession number P2001-009/2.
|
<urn:uuid:0fedc353-a575-4bcd-8bb5-75d0d12846e5>
|
CC-MAIN-2021-39
|
https://blogs.otago.ac.nz/thehockenblog/busy-lead-up-to-anzac-day/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056578.5/warc/CC-MAIN-20210918214805-20210919004805-00128.warc.gz
|
en
| 0.971052 | 509 | 2.75 | 3 |
A research team from the Public University of Navarra has started a study of the design and development of absorbent materials that enable the storage of hydrogen, a clean fuel that can be used as an alternative to those derived from fossil fuels, such as petrol and diesel. The storage of this element is, in fact, a key process in the change over from internal combustion engines – contaminating and not very efficient, to cars with hydrogen fuel cells.
The project, entitled, Development of materials for storage of hydrogen by means of physical adsorption.
At present, hydrogen production "is not a problem". For some years now, hydrogen has been obtained by means of catalytic reforming or by the electrolysis of water. However, the question hanging over the use of hydrogen as a fuel is its generation or storage in the quantities required for a means of transport and without it being dangerous – as we are dealing with a highly inflammable gas. Under normal conditions hydrogen is in a gaseous state and thus has to be kept under high pressure or, if we wish to reduce the pressure, the storage temperature has to be lowered. These two circumstances give rise to technological difficulties, apart from the added safety ones.
There are various ways to store hydrogen: pressurised, liquid, absorbed into metals (as hydrides) and physiadsorbed in suitable materials. This last method, involving the "physical adsorption onto porous materials", is what is being developed in this current research project, the end of which is projected for next year. In concrete, the study is being carried out employing nanoporous materials the pore size of which is in the range of 0 to 10-6 metres.
The mentioned research team has commenced work on three families of materials: activated carbons, zeolites and stacked clays. These materials fulfil four requisites: they have mechanical resistance and are safe, apart from being light and cheap.
Storage based on physiadsorbtion provides a potentially higher energy efficiency than the rest of the mentioned storage options, given that the hydrogen is retained at a low temperature and 100% of the hydrogen adsorbed can be recovered. The low boiling point of hydrogen (-253ºC) makes it necessary to employ temperatures pf about -196ºC in order to attain sufficient amount of adsorbed hydrogen. The freeing of the physiadsorbed hydrogen can be, moreover, a rapid process and can be carried out easily with small changes of pressure and/or temperature.
Source: Elhuyar Fundazioay
Explore further: Science magazine retracts study on voters' gay-rights views
|
<urn:uuid:39ee4fe8-399e-4003-90ea-c89be4e0c386>
|
CC-MAIN-2015-22
|
http://phys.org/news/2005-06-adsorbent-materials-hydrogen-storage.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929656.4/warc/CC-MAIN-20150521113209-00308-ip-10-180-206-219.ec2.internal.warc.gz
|
en
| 0.948951 | 534 | 4.03125 | 4 |
Project Ready Middle School Program
The focus of the Project Ready-Middle School track is to prepare students for the transition to high school. Middle school students move through four modules designed to prepare them for high school and build the early foundation for college readiness.
Module 1 – High School Preparation: a six-week module designed to help students navigate high school, build supportive relationships, respond to peer pressure and bullying and overcome personal and environmental obstacles to success.
Module 2 – Financial Literacy: a six-week module using the Junior Achievement “It’s My Business” curriculum.
Module 3 – Health and Wellness: a four-week module that introduces students to healthy living behaviors (healthy eating, exercise, healthy food preparation).
Module 4 – STEM: Following a two-week summer camp to build interest and enthusiasm in STEM topics, the twelve-week academic year module is designed to introduce students to STEM academics and career paths. Each year’s activities and guest speakers are based on a rotating theme, beginning with “science,” then moving to “technology,” “engineering” and finally “math.”
This school based program currently operates out of the Deneen School of Excellence, the Harvard School of Excellence and Benjamin E. Mays Academy. The program operates during the school year.
|
<urn:uuid:9c8fd44f-26fd-4e20-b6ed-1e5ef2c5aa21>
|
CC-MAIN-2015-11
|
http://www.thechicagourbanleague.org/page/384
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464088.46/warc/CC-MAIN-20150226074104-00296-ip-10-28-5-156.ec2.internal.warc.gz
|
en
| 0.939036 | 276 | 2.625 | 3 |
Freedom Fought For and Denied - Woven With Words
Slaves and Free African Americans in the Eighteenth Century
Records suggest that African American slaves in Berks County were treated better than slaves in other parts of the nation and that the “people of early Berks were, in the main, against the idea of slavery” (Johnson 1972, I: 18). Slaves at Hopewell Furnace, for example, were allowed to establish their own villages. However, other slave owners created “slave pens,” thick wooden cages that were most often located in cellars (Johnson 1971-72, 12). Particularly as the century neared its end and anti-slavery attitudes in Berks were increasing, some farmers believed it wise to keep their slaves thoroughly contained.
Due to the varied treatment they received, slaves responded in a variety of ways. According to Richard G. Johnson, “Black enslaved people reacted to their servitude in one of three ways: they appeared satisfied with their ‘good treatment’ where such treatment was forthcoming, they ran away, or they killed their masters and caused an insurrection” (1971-72, 12-13). In Berks, escape was a common option. Johnson asserts, “The belief that slaves were happy and satisfied with the good treatment by their masters is a myth and should be exploded once and for all” (1972, I: 34).
How much was a slave worth in Berks County? One slave, Cuff Dix, was advertised with a reward of three pounds for his capture and return, but that was hardly standard. Other slaves were advertised for thirty shillings, fourteen shillings, and four pistols (Smith and Wojtowicz 1989; 66, 113). Still others were advertised for three dollars, ten dollars, and sixteen dollars. As Johnson states, ten dollars was a lot of money in 1800, equivalent to two days of a congressman’s salary (1972, I: 36-37). Rewards were given monetarily or through bartering.
There was also an unusually strong anti-slavery culture in Berks in the eighteenth century. Germans held sway in the area, and they quickly developed an abhorrence for the enslavement of people. Rev. Henry Melchior Muhlenberg, a German Lutheran leader, and his grandson, Henry A. Muhlenberg, a Berks County congressman in the 1830s, were two of Berks’ most staunch opponents of slavery. Rev. Muhlenberg accepted African Americans into his church, and his grandson was brought up on charges in the U.S. Circuit Court for helping a slave escape; the case was settled out of court for one hundred and seventy dollars (Johnson 1972, I: 19-20).
Three Berks County legislators, Joseph Murray, George C. Andrews, and Joseph Gardner, opposed the successful attempt at the Pennsylvania State Convention of 1837-38 to reform the Pennsylvania constitution to insert the words “free white male” into Article III, Section I, thereby limiting African American suffrage until the passage of the 15th Amendment. Fifty-two Berks Countians signed a petition against the change, and several other similar petitions were circulated in Berks County (1972, I: 21).
Berks Quakers had studied the actions of the Philadelphia-based Friends of Germantown, the first group in the country to stage a formal protest against the institution of slavery. In 1779, the Friends collectively decided to free all their slaves, compensate the slaves monetarily for labor done, and urge others to follow their lead (Schaeffer 1941, 110). One year later Pennsylvania passed the “Act for Gradual Abolition of Slavery,” which was amended in 1788 to “prohibit the transfer of pregnant slave women or slave children out of Pennsylvania and to stop the outfitting of slave ships in Philadelphia” (Zagofsky 2005).
The Act of 1780 was not flawless. In order to get around the law, some slave owners would simply sell a slave approaching the age of freedom to an owner in an area where no gradual abolition rules applied. They could then use that money to buy new, younger slaves. Furthermore, if they purchased a slave from out of state, the Act of 1780 did not apply (Schaeffer 1941, 112).
Due to these loopholes, the slave trade continued after 1780. There is evidence of an active slave broker, William Bell, operating in Berks in the last decade of the eighteenth century (Johnson 1972, I: 31-33) and advertisements from the time reveal a flourishing trade (Smith and Wojtowicz 1989). An ad for a captured slave in The Weekly Advertiser on June 9, 1798, for example, appeared as follows:
READING BERKS COUNTY
State of Pennsylvania
June 8, 1798
On the first day of May last, was committed to my custody: A NEGRO or MULATTO MAN, named Abraham Johnston, appearing about 24 years of age, about 5ft 7 or 8 inches, well made, and says he understands the Blacksmith trade. The owner of said Mulatto is desired to take him away on or before the 10th day of July next, otherwise he will be discharged on paying the Goal Fees.
CHRISTIAN MADEIRA, GOALER (Johnson 1972, I: 30)
Although the rights of slaves changed very little after 1790, Berks Countians grew more and more sympathetic to anti-slavery causes and often helped slaves escape to Philadelphia or other desirable locations. According to Johnson, the first record of free African Americans in Berks County is the 1790 census, which lists the following:
Sambo (Negro) with a household of three in Heidelberg Township;
Ben (Negro) with a household of two in Douglas Township;
Cato (Negro) with a household of two in Alsace Township (1972, I: 27).
|
<urn:uuid:6c6d0052-0c74-49b4-b775-dbb76c21c83d>
|
CC-MAIN-2023-23
|
https://www.readingnaacp.org/woven-freedom
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00205.warc.gz
|
en
| 0.971442 | 1,244 | 4.125 | 4 |
Far before the terms Native American or Indian were created, the tribes were spread all over the Americas. Before any white man set foot on this territory, it was settled by the forefathers of bands we now call Sioux, or Cherokee, or Iroquois.
For centuries, the American Indian grew its customs and heritage without disturbance. And that history is fascinating.
From Mayan and Incan ruins, from the mounds left in the central and southern parts of what’s currently the U.S. we have learned much. It’s a tale of beautiful art and deep spirituality. Archaeologists have unearthed highly elaborate buildings and public works.
While there was inevitable tribal conflict, that was just a slight blemish in the tale of our ancestors. They were at peace with this beautiful continent and intensely plugged into nature.
The European Settler Arrives
When European leaders dispatched the first ships in our direction, the objective was to discover new resources – however the quality of environment and the bounty of everything from timber to wildlife subsequently changed their tune. As those leaders learned from their explorers, the motivation to colonize spread like wildfire.
The English, French and Spanish rushed to slice up the “New World” by sending over poorly prepared colonists as fast as they could. At the outset, they skirmished with the alarmed Indians of America’s eastern seaboard. But that soon gave way to trade, since the Europeans who landed here knew their survival was doubtful with no Indian help.
Thus followed years of relative peace as the settlers got themselves established on American soil. But the pressure to push inland came soon after. Kings and queens from thousands of miles away were impatient to find additional resources, and some colonists came for freedom and adventure.
They wanted more space. And so began the process of forcing the American Indian out of the way.
It took the form of cash arrangements, barter, and famously, treaties which were almost consistently neglected after the Indians were forced away from the territory in question.
The U.S. government’s policies towards Native Americans in the second half of the nineteenth century were influenced by the desire to expand westward into areas inhabited by these Native American tribes. By the 1850s almost all Native American tribes, approximately 360,000 in number, lived to the west of the Mississippi River. These American Indians, some from the Northwestern and Southeastern territories, were confined to Indian Territory situated in present day Oklahoma, while the Kiowa and Comanche Native American tribes shared the land of the Southern Plains.
The Sioux, Crows and Blackfeet dominated the Northern Plains. These Native American groups encountered hardship as the steady flow of European immigrants into northeastern American cities pushed a stream of immigrants into the western lands already inhabited by these diverse groups of Indians.
Find Native American Indian Jewelry in Bowdon, Georgia
The early nineteenth century of the United States was marked by its steady expansion to the Mississippi River. However, due to the Gadsden purchase, that lead to U.S. control of the borderlands of southern New Mexico and Arizona along with the authority over Oregon country, Texas and California; America’s expansion would not end there. Between 1830 and 1860 the United States pretty much doubled the amount of acreage under its control.
These territorial gains coincided with the arrival of hordes of European and Asian immigrants who wanted to join the surge of American settlers heading west. This, combined with the discovery of gold in 1849, presented attractive possibilities for those ready to make the huge journey westward. Therefore, with the military’s protection and the U.S. government’s assistance, many settlers started establishing their homesteads in the Great Plains and other parts of the Native American tribe-inhabited West.
Native American Tribes
Native American Policy can be defined as the regulations and procedures established and adapted in the United States to outline the relationship between Native American tribes and the federal government. When the United States initially became an independent country, it adopted the European policies towards the local peoples, but throughout two centuries the U.S. adapted its own widely varying policies regarding the evolving perspectives and necessities of Native American supervision.
In 1824, in order to execute the U.S. government’s Native American policies, Congress made a new bureau inside the War Department referred to as Bureau of Indian Affairs, which worked directly with the U.S. Army to enforce their policies. At times the federal government recognized the Indians as self-governing, separate political communities with numerous cultural identities; however, at other times the government attempted to compel the Native American tribes to abandon their cultural identity, surrender their land and assimilate into the American traditions.
Find Native American Indian Art in Bowdon, GA
With the steady flow of settlers in to Indian controlled land, Eastern newspapers printed sensationalized reports of cruel native tribes carrying out massive massacres of hundreds of white travelers. Although some settlers lost their lives to American Indian attacks, this was in no way the norm; in fact, Native American tribes repeatedly helped settlers cross over the Plains. Not only did the American Indians offer wild game and other necessities to travelers, but they served as guides and messengers between wagon trains as well. Despite the good natures of the American Indians, settlers still feared the risk of an attack.
Find Native American Jewelry in Georgia
To quiet these anxieties, in 1851 the U.S. government organised a conference with several local Indian tribes and established the Treaty of Fort Laramie. Within this treaty, each Native American tribe accepted a bounded territory, allowed the government to construct roadways and forts in this territory and pledged not to ever attack settlers; in return the federal government agreed to honor the boundaries of each tribe’s territory and make total annual payments to the Indians. The Native American tribes responded quietly to the treaty; in fact the Cheyenne, Sioux, Crow, Arapaho, Assinibione, Mandan, Gros Ventre and Arikara tribes, who entered into the treaty, even consented to end the hostilities amongst their tribes in order to accept the conditions of the treaty.
Navajo Jewelry is Celebrated Worldwide by American Indian Art Collectors
This peaceful accord between the U.S. government and the Native American tribes didn’t hold very long. After hearing testimonies of fertile acreage and tremendous mineral wealth in the West, the government soon broke their promises established in the Treat of Fort Laramie by permitting thousands of non-Indians to flood into the area. With so many newcomers moving west, the federal government established a policy of limiting Native Americans to reservations, modest areas of land within a group’s territory “” set aside exclusively for their use, in order to grant more territory for the non-Indian settlers.
In a series of new treaties the U.S. government forced Native Americans to give up their land and move to reservations in exchange for protection from attacks by white settlers. In addition, the Indians were allocated a yearly payment that would include money in addition to food, livestock, household goods and agricultural tools. These reservations were created in an effort to clear the way for increased U.S. growth and administration in the West, as well as to keep the Native Americans isolated from the whites in order to reduce the chance for friction.
History of the Plains Indians
These deals had many challenges. Most of all many of the native people did not altogether understand the document that they were finalizing or the conditions within it; furthermore, the treaties did not respect the cultural norms of the Native Americans. In addition to this, the government departments responsible for administering these policies were overwhelmed with poor management and corruption. In fact many treaty provisions were never implemented.
The U.S. government rarely held up their side of the accords even when the Native Americans migrated quietly to their reservations. Unethical bureau agents frequently sold off the supplies that were intended for the Indians on reservations to non-Indians. Moreover, as settlers needed more property in the West, the government continually reduced the size of the reservations. By this time, many of the Native American peoples were unhappy with the treaties and angered by settlers’ endless hunger for land.
A Look at Native American Symbols
Angered by the government’s dishonorable and unfair policies, some Native American tribes, including bands of Cheyennes, Arapahos, Comanches and Sioux, battled back. As they struggled to defend their lands and their tribes’ survival, more than one thousand skirmishes and battles broke out in the West between 1861 and 1891. In an effort to push Native Americans onto the reservations and to end the violence, the U.S. government reacted to these conflicts with significant military operations. Clearly the U.S. government’s Indian regulations were in need an adjustment.
Find Native American Indian Music in Bowdon, GA
Native American policy shifted dramatically following the Civil War. Reformers believed that the scheme of forcing Native Americans into reservations was too harsh even while industrialists, who were concerned about their property and resources, viewed assimilation, the cultural absorption of the American Indians into “white America” to be the lone long-term strategy for assuring Native American survival. In 1871 the government passed a critical law proclaiming that the United States would not treat Native American tribes as autonomous nations.
This law signaled a significant shift in the government’s working relationship with the native peoples – Congress now viewed the Native Americans, not as nations outside of its jurisdictional control, but as wards of the government. By making Native Americans wards of the “” government, Congress presumed that it was better to make the policy of assimilation a broadly recognised part of the cultural mainstream of America.
More On American Indian History
Many U.S. government administrators viewed assimilation as the most practical solution to what they deemed “the Indian problem,” and the sole lasting means of guaranteeing U.S. interests in the West and the survival of the American Indians. In order to accomplish this, the government urged Native Americans to move out of their traditional dwellings, move into wooden buildings and become farmers.
The federal government enacted laws that required Native Americans to abandon their usual appearance and way of life. Some laws outlawed traditional religious practices while others required Indian males to cut their long hair. Agents on more than two-thirds of American Indian reservations established courts to enforce federal regulations that often restricted traditional cultural and spiritual practices.
To hasten the assimilation course, the government established Indian facilities that tried to quickly and vigorously Americanize Indian children. As per the founder of the Carlisle Indian School in Pennsylvania, the schools were developed to “kill the Indian and save the man.” To be able to accomplish this goal, the schools compelled students to speak only English, dress in proper American fashion and to replace their Indian names with more “American” ones. These new regulations helped bring Native Americans nearer to the conclusion of their classic tribal identity and the start of their existence as citizens under the absolute control of the U.S. government.
Native American Treaties with the United States
In 1887, Congress approved the General Allotment Act, the most important part of the U.S. government’s assimilation program, which was created to “civilize” American Indians by teaching them to be farmers. In order to achieve this, Congress needed to establish private title of Indian property by splitting up reservations, which were collectively held, and allowing each family their own block of land.
In addition to this, by forcing the Native Americans onto limited plots, western developers and settlers could purchase the left over acreage. The General Allotment Act, also referred to as the Dawes Act, required that the Indian lands be surveyed and every family be given an allotment of between 80 and 160 acres, while unmarried adults were given between 40 to 80 acres; the remaining territory was to be sold. Congress hoped that the Dawes Act would break up Indian tribes and inspire individual enterprise, while reducing the expense of Indian administration and providing prime land to be purchased by white settlers.
Find Native American Indian Clothing in Bowdon, GA
The Dawes Act proved to be disastrous for the American Indians; over the next generations they lived under regulations that outlawed their traditional way of living but didn’t provide the necessary resources to support their businesses and households. Splitting the reservations into smaller parcels of land caused the significant reduction of Indian-owned land. Inside three decades, the people had lost over two-thirds of the region that they had controlled before the Dawes Act was passed in 1887; the majority of the remaining land was sold to white settlers.
Usually, Native Americans were cheated out of their allotments or were forced to sell off their land in order pay bills and feed their own families. Consequently, the Indians were not “Americanized” and were routinely not able to become self-supporting farmers or ranchers, as the makers of the Act had intended. It also created animosity among Indians for the U.S. government, as the allotment process sometimes ruined land that was the spiritual and cultural focus of their days.
Native American Culture
Between 1850 and 1900, life for Native Americans changed tremendously. Through U.S. administration regulations, American Indians were forced from their living spaces because their native lands were parceled out. The Plains, which they had previously roamed alone, were now filling with white settlers.
The Upshot of the Indian Wars
Over these years the Indians ended up cheated out of their territory, food and lifestyle, as the “” government’s Indian plans coerced them into reservations and attempted to “Americanize” them. Many American Indian bands did not survive relocation, cultural destruction and military defeat; by 1890 the Native American population was reduced to less than 250,000 people. Due to generations of discriminatory and ruthless policies instituted by the United States government between 1850 and 1900, life for the American Indians was altered forever.
[google-map location=”Bowdon GA”
|
<urn:uuid:be5ee6da-8cca-4543-84af-2edbea12746f>
|
CC-MAIN-2021-21
|
https://americanindiancoc.org/native-american-tribes-the-indian-history-in-bowdon-georgia/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991224.58/warc/CC-MAIN-20210516140441-20210516170441-00488.warc.gz
|
en
| 0.970067 | 2,895 | 3.640625 | 4 |
How Is a Hernia Diagnosed?
A physical exam by your health care provider is often enough to diagnose a hernia. Sometimes hernia swelling is visible when you stand upright; usually, the hernia can be felt if you place your hand directly over it and then bear down. Ultrasound may be used to see a femoral hernia, and abdominal X-rays may be ordered to determine if a bowel obstruction is present.
What Are the Treatments for a Hernia?
In babies, umbilical hernias may heal themselves within four years, making surgery unnecessary. For all others, the standard treatment is conventional hernia-repair surgery (called herniorrhaphy). It is possible to simply live with a hernia and monitor it. The main risk of this approach is that the protruding organ may become strangulated -- its blood supply cut off -- and infection and tissue death may occur as a result. A strangulated intestinal hernia may result in intestinal obstruction, causing the abdomen to swell. The strangulation can also lead to infection, gangrene, intestinal perforation, shock, or even death.
Conventional Medicine for a Hernia
Hernia surgery is performed under either local or general anesthesia. The surgeon repositions the herniated tissue and, if strangulation has occurred, removes the oxygen-starved part of the organ. The damaged muscle wall will frequently be repaired with synthetic mesh or tissue.
Increasingly, herniorrhaphy is being performed using a laparoscope, a thin, telescope-like instrument that requires smaller incisions and involves a shorter recovery period and less post-operative pain. Hernia repairs are usually performed as an outpatient procedure. There are usually no dietary restrictions, and work and regular activity may usually be resumed in one or two weeks. Complete recovery usually takes three to four weeks, with no heavy lifting for two to three months. Ask your surgeon for specific instructions after your surgery.
Hernias may return after surgery, so preventive measures are especially important to help avoid a recurrence.
|
<urn:uuid:247aac6e-58c7-457a-8cd0-c019fb5e1b19>
|
CC-MAIN-2018-47
|
https://www.webmd.com/digestive-disorders/understanding-hernia-treatment
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742968.18/warc/CC-MAIN-20181116004432-20181116030432-00130.warc.gz
|
en
| 0.937884 | 431 | 2.9375 | 3 |
Shirley was the first woman and black American woman to have ever run for presidential nominations under the United States Democratic party in 1972.
In 1968, she became the first African-American woman elected to the United States Congress and represented New York’s 12th Congressional District for seven terms from 1969 to 1983 (Wikipedia).
Shirley Chisholm’s political significance was rekindled in 2008. It was during the Obama-Clinton presidential/political tussle. Shirley Chisholm had been cited at the time as she represents both parties – Barrack as an African-American and Hillary as a woman.
“In the end, anti-black, anti-female, and all forms of discrimination are equivalent to the same thing – anti-humanism.”- Shirley Chisholm
It’s been 44 years since the black American amazon made public her bid to run for the presidency of the United States of America. Shirley’s dream to be president did not come true but the very essence of running has motivated a lot in the United States, blacks and women alike.
According to the daring and intelligent woman, winning was not paramount on her list. She simply wanted to “change the face and future of American politics.” To show it was possible for blacks and women.
“I ran because most people thought the country was not ready for a black candidate, not ready for a woman candidate. Someday, it was time in 1972 to make that someday come.”Loading...
Sadly, the Black American woman and political icon has become ‘easily forgotten’. She only comes into the picture in political history and rare occasions. Nevertheless, those who have come to know her have been inspired by her personality.
Kimaya Davis is a 22-year-old who works for a congressional committee. She testifies to the impact of the life and history of Shirley in her choice of career.
“She paved the way for me to be able to set foot on Capitol Hill… It’s because of her that I was able to get that internship – it helps young black students. A lot of kids like me, we don’t have family connections and privilege.”– Kimaya Davis
Shirley Chisholm founded the Congressional Black Caucus where Davis worked as an intern. The Caucus represents black members of Congress.
She is famous for saying,
“If they don’t give you a seat at the table, bring a folding chair”.
This literally suggests determination and tenacity in life’s pursuit. In one word, guts. She has said that she would love to be remembered as the woman who “had guts.” Her famous slogan was “Unbought and Unbossed”.
Shirley fought and defended underprivileged and minority groups. She was instrumental to the setting up of the Special Supplemental Nutrition Program for Women, Infants and Children (Wic), which provided support for pregnant women.
Shirley Chisholm defended the rights of domestic workers; thus pushed through with a bill to that effect. She made significant contributions to improved and accessible education, childcare for women and protecting the interests of immigrants.
Thanks to Shirley, such initiative as the national school lunch bill was realized. She helped to establish the national commission on consumer protection and product safety.
Last year, Chisholm was awarded the Presidential Medal of Freedom. President Obama had this to say about her during the occasion:
“There are people in our country’s history who don’t look left or right – they just look straight ahead. Shirley Chisholm was one of those people.”
Shirley Chisholm served 7 terms in Congress. She retired in 1982 and returned to teaching. In 2005, the political icon and role model especially for the black community passed away at the age of 80.
|
<urn:uuid:e79951a8-a66c-419e-82ac-611e53f612ae>
|
CC-MAIN-2020-50
|
https://howafrica.com/shirley-chisholm-black-woman-blazed-trail-hillary-clinton/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141201836.36/warc/CC-MAIN-20201129153900-20201129183900-00704.warc.gz
|
en
| 0.971973 | 823 | 2.890625 | 3 |
One of my favorite stories about any composer goes like this. According to Carl Czerny, the pupil of the great Ludwig van Beethoven, a young composer named Anton Halm once brought a sonata he had written to Beethoven. Beethoven pointed out Halm’s sonata had a few violations of standard music theory rules in the Classical era. Halm retorted that Beethoven had violated those rules himself. To which Beethoven answered, “I may do it, but not you.”
Why do I love this story so much? I once had the same argument with my own father. While working on a chorale harmonization (as so many music students are forced to do over and over again), my father spotted some parallel fifths. I pointed out that composers from Handel to Tchaikovsky used parallel fifths for effect. He responded that “you have to know the rules before you can break them.”
Throughout the history of music, it seems the greatest groundbreakers in every case familiarized themselves with earlier work before creating something new. One of the founders of the Classical era, with its emphasis on simplicity and elegance, was Johann Christian Bach, the son of the greatest and most complex composer of the Baroque period. He studied with his father, mastering the Baroque form before solidifying the style galant that would lead to the Classical era. His sonatas were elegant and approachable enough that it is no wonder he was a great influence on Wolfgang Amadeus Mozart.
Ludwig van Beethoven studied under the Classical master Joseph Haydn, and the music of his early period is still in a very symmetrical Classical styleIt wasn’t until people already considered him the undisputed heir to Haydn and Mozart that he began experimenting. His Symphony no. 3 “Eroica” vastly increased the size of the development and coda for the first movement and using a mournful funeral march form for the second. Upon beginning its composition, Beethoven said to a friend, “From this day on I shall forge a new path.” After mastering the old classical form, his new path led to such groundbreaking late-period works as his Piano Sonata no. 32, abandoning sonata form altogether, and the almost post-tonal Große Fuge.
Arnold Schoenberg began as a late Romantic composer, studying under the famed Gustav Mahler, said to be the heir of Brahms’ legacy. But Schoenberg wasn’t satisfied with the Romantic era tonality, and began expanding his tonal system into what he called “pantonality” – ignoring the old restrictions of seven-tone keys and extending his music into dodecaphonic, or “twelve-tone,” territory. But for all the rules he broke, Schoenberg insisted that his music was not abandoning, but merely expanding the realm of tonality, describing himself as “a natural continuer of properly-understood good old tradition!”
Although the previous examples were from the “Western art music” tradition, we can find similarities in all genres. Today we think of the Beatles as technically and musically groundbreaking, and laugh at quotes like “Groups of guitars are on the way out” from Decca Records executives in 1962. But in the early 1960s, many critics saw them as another bland example of rock and roll, music they considered to be “a bottomless chasm of vacuity” and “nothing more than noise.” And for the first few Beatles albums, many of their songs were covers, from successful (like “Twist and Shout“) to not so much (like “Mr. Moonlight”). They didn’t start stretching the bounds of popular music until 1965, around when they began recording Revolver. They had to master the popular music of the late 50s and early 60s before they broke new ground and created the psychedelic sound of Sgt. Pepper and Abbey Road.
The physicist Isaac Newton once wrote, “If I have seen further, it is by standing on the shoulders of giants.” This is just as applicable in music as it is in physics. Without Bach to stand on the Classical era wouldn’t have formed, upon which Beethoven stood. Schoenberg stood on Mahler, who himself stood on the shoulders of the entire Late Romantic era. The Beatles stood on the shoulders of 50s pop. Piccolos on the shoulders of contrabasses may look small, but their sound goes far.
|
<urn:uuid:42a365aa-25d1-412a-8865-c69becefae7e>
|
CC-MAIN-2019-47
|
https://isaacwritesaboutmusic.com/2017/01/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671260.30/warc/CC-MAIN-20191122115908-20191122143908-00010.warc.gz
|
en
| 0.971857 | 968 | 3 | 3 |
Earlier this month, the Coast Guard sank a 164-foot Japanese shrimping vessel, the Ryou-Un Maru, in the Gulf of Alaska about 195 miles south of Sitka after the vessel drifted for over a year across the Pacific Ocean. The vessel was dislodged in Hokkaido due to the March 2011 tsunami. Federal marine and environmental officials decided that sinking the ship, which had no power, lights or communication equipment, would be better than having it collide with another ship or run aground along the coast. “It’s safer to mitigate the risks now before there’s an accident or environmental impact,” said Coast Guard spokesman Petty Officer Charley Hengen.
The Ryou-Un Maru, dubbed the “Ghost Ship,” marks the beginning of what is likely to be a substantial amount of debris from the Tsunami reaching the west coast of North America. The Japanese government estimated that the tsunami swept about 5 million tons of debris into the ocean, but that 70 percent sank off shore, leaving 1.5 million tons floating. There no estimate of how much debris is still floating today. Many variables affect where the debris will go and when. Items will sink, disperse, and break up along the way, and winds and ocean currents constantly change, making it very difficult to predict an exact date and location for the debris’ arrival on our shores. A new NOAA modeling effort shows that some buoyant items may have reached the Pacific Northwest coast during winter 2011-2012. The bulk of the debris is likely still dispersed north of the Main Hawaiian Islands and east of Midway Atoll. Scientific forecasting models are only sophisticated guesses, so estimates vary as to debris arrival times, locations, and quantities.
What is clear, however, is that eventually our coast will be hit with some amount of debris from the Tsunami. As we move forward, some plan of action will need to be put in place to address the environmental impact on our shores and potential navigational hazards imposed by the debris.
Senators Maria Cantwell, D-Wash., and Mark Begich, D-Alaska, have said that tsunami debris spotted off islands in the Gulf of Alaska is a “wake up call” that the federal government must immediately work out an action plan to spot and predict what is coming and give coastal towns time to react. Pilots are reporting floats, buoys, insulation and plastics in the vicinity of Montague and Kayak Islands at opposite ends of the entrance to Prince William Sound. “We know the tsunami debris is on its way to our coast,” said Cantwell. “We cannot be caught by surprise: We need clear answers and the best science available to protect Washington’s billion-dollar coastal economy.” Senator Begich said, “I urge the Obama Administration to respond to our request from several weeks ago to free up funds and resources so we can effectively deal with debris and not be scrambling when this arrives.” Cantwell and Begich want the National Science Foundation to give instructions on tracking debris crossing the ocean from Japan’s March 2011 quake and tidal wave. Cantwell has asked the National Oceanic and Atmospheric Administration (NOAA) also to work with towns along the Washington and Oregon coasts, which are home to fishing fleets, refineries, working ports and recreation.
|
<urn:uuid:d5d5628c-1a8b-43e6-9c78-78cbe6a34316>
|
CC-MAIN-2020-16
|
https://www.seattleinjurylawyerblog.com/what-will-debris-from-japans-march-2011-tsunami-mean-for-the-pacific-coast-of-the-us-and-the-us-mari/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00249.warc.gz
|
en
| 0.952005 | 690 | 3.265625 | 3 |
LAREDO, TEXAS (KGNS) - You don't know where that's been! It's something grown-ups always told us as kids and it's a phrase to live by as we head into the cold and flu season. But we wanted to take it a step further and see just how dirty the things we touch every day really are. In this special report we work with a hospital to test 6 different objects and our results will shock you.
Brandi Mason has two boys, 8-year-old Jonas and 11-year-old Robert and it breaks her heart to see them sick. "It's very hurtful. I'm always by their bed, can barely sleep, checking on them every five minutes," she said.
But she knows it's a real risk as they head off to school. "Being around other children at school that are unsanitized, that do not wash their hands, that cough without covering their mouth," Mason said.
And she knows they're exposed to viruses, parasites, and bacteria.
"Many times you can't avoid it because someone sneezes or coughs, and doesn't cover their mouth," said Dr. Sigfried Pueblitz, a pathologist at Doctors Hospital.
He says while a lot of illnesses are airborne many are spread through surfaces and can be prevented. Harmful bacteria like E. coli or salmonella can make you very sick.
"You're going to experience abdominal pain, diarrhea, fever," Dr. Pueblitz told us.
So Dr. Pueblitz is showing us some of things we can touch exposing us to infection. He told us, "the most common way to get sick after touching a surface that has been contaminated is to touch your face or eyes or eat without washing our hands."
We chose and tested 6 objects. In this test we're looking specifically for bacteria. We went out and gathered some samples: first playground equipment, then a men's room door handle and an office keyboard. They're three things a lot of people touch, things common sense tells you may not be that clean. In the lab Dr. Pueblitz swabbed a cell phone, some spare change, and a tomato from a grocery store. He said, "we're going to see that some surfaces are much more contaminated than others, and sometimes surprisingly so."
Now the test begins. The swab samples are distributed on nutrient filled petri dishes to grow whatever bacteria we find. "The basic identification is from the colony formations," Dr. Pueblitz explained.
So which items do you think were dirtiest? The playground equipment, restroom room door handle, office keyboard, cell phone, spare change or the tomato. The results might make you cringe. You can vote in the poll on our KGNS homepage on the right side of your screen. Just pick your choice for the item with the most bacteria, and we'll have the results in part two of this story Tuesday on KGNS News@10.
|
<urn:uuid:1a04d1c4-fd67-41c6-84b7-831512c53812>
|
CC-MAIN-2018-09
|
http://www.kgns.tv/content/news/You-Dont-Know-Where-Thats-Been-Part-1-350816711.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813088.82/warc/CC-MAIN-20180220185145-20180220205145-00063.warc.gz
|
en
| 0.975556 | 619 | 2.609375 | 3 |
Ideas from books, articles & podcasts.
One of the most common questions I’ve received when talking about CI is, “what problems does each branch solve?” While I can appreciate this question, the branches are not segmented by which problems they solve.
The inspiration of the theories segments the branches. So, it’s impossible to segment into their applications. “But Bryce, what is a CI theory?” In a nutshell, each theory begins as a mathematical representation then implemented into an algorithm (something a computer can do). In their own right, each of the branches deserves many articles.
MORE IDEAS FROM THE SAME ARTICLE
Inspiration: “Using the human brain as a source of inspiration, artificial neural networks (NNs) are massively parallel distributed networks that have the ability to learn and generalize from examples.”
AI is ubiquitous. The term has flooded our lives, and it has lost its flavor. But, as a data scientist / ML engineer / AI engineer (whatever you call yourself), we can hold the community to a higher standard. We can be specific with our algorithms, so showcase our work is more than a series of pr...
What is Artificial Intelligence? Who knows. It’ s an ever-moving target to define what is or isn’t AI. So, I’d like to dive into a science that’s a little more concrete — Computational Intelligence (CI). CI is a three-branched set of theories along with their design a...
Inspiration: “Using the biological evolution as a source of inspiration, evolutionary computation (EC) solves optimization problems by generating, evaluating and modifying a population of possible solutions.”
Inspiration: “Using the human language as a source of inspiration, fuzzy systems (FS) model linguistic imprecision and solve uncertain problems based on a generalization of traditional logic, which enables us to perform approximate reasoning.”
created 4 ideas
created 7 ideas
created 5 ideas
While there are still challenges with Artificial Intelligence, we should not underestimate what AI can do. We know there are still many uncharted areas to be discovered in the coming years.
❤️ Brainstash Inc.
|
<urn:uuid:2640c9a0-5ac1-4633-b7f9-def43f564af1>
|
CC-MAIN-2022-27
|
https://deepstash.com/idea/148141/ci-theory
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103947269.55/warc/CC-MAIN-20220701220150-20220702010150-00235.warc.gz
|
en
| 0.934764 | 528 | 2.734375 | 3 |
How did coats of arm originate?
Coats of arms developed from the designs used on the coats and shields of knights for identification during battle.
Perhaps you know a family that has a coat of arms—a special emblem or design that distinguishes that particular family.
In the Middle Ages knights wore suits of armor that covered their bodies from head to toe. The armor made it difficult to tell friend from foe in battle, so knights began wearing loose coats over their armor.
They decorated their coats and shields with designs so they could identify each other. People began calling the coat a knight wore a ‘‘coat of arms.’ Eventually, the design on the coat or arm became the distinguishing sign of the knight and of his family.
When gunpowder and bullets appeared on the battlefield the knight and his armor became useless. Coats of arms were no longer needed as a means of recognition. But some people still like the distinction of having their own coat of arms to show which family they belong to.–Dick Rogers
|
<urn:uuid:745b09eb-1dc5-4f18-b6a7-3593a37d92de>
|
CC-MAIN-2017-47
|
https://askpari.wordpress.com/2012/12/17/how-did-coats-of-arm-originate/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806586.6/warc/CC-MAIN-20171122122605-20171122142605-00155.warc.gz
|
en
| 0.983417 | 207 | 3.765625 | 4 |
-- — Today is Thursday, July 25, the 206th day of 2013. There are 159 days left in the year.
Highlight in History
On July 25, 1963, the United States, the Soviet Union and Britain initialed a treaty in Moscow prohibiting the testing of nuclear weapons in the atmosphere, in space or underwater. The treaty was formally signed on August 5, 1963.
On this date:
In 1866, Ulysses S. Grant was named General of the Army of the United States, the first officer to hold the rank.
In 1898, the United States invaded Puerto Rico during the Spanish-American War.
In 1909, French aviator Louis Bleriot (bleh-ree-OH') became the first person to fly an airplane across the English Channel, traveling from Calais (kah-LAY') to Dover in 37 minutes.
In 1943, Benito Mussolini was dismissed as premier of Italy by King Victor Emmanuel III and placed under arrest. However, Mussolini was later rescued by the Nazis and re-asserted his authority.
In 1946, the United States detonated an atomic bomb near Bikini Atoll in the Pacific in the first underwater test of the device.
In 1952, Puerto Rico became a self-governing commonwealth of the United States.
In 1956, the Italian liner Andrea Doria collided with the Swedish passenger ship Stockholm off the New England coast late at night and began sinking; at least 51 people were killed.
In 1960, a Woolworth's store in Greensboro, N.C., that had been the scene of a sit-in protest against its whites-only lunch counter dropped its segregation policy.
In 1978, Louise Joy Brown, the first "test tube baby," was born in Oldham, England; she'd been conceived through the technique of in-vitro fertilization.
In 1984, Soviet cosmonaut Svetlana Savitskaya (sah-VEETS'-kah-yah) became the first woman to walk in space as she carried out more than three hours of experiments outside the orbiting space station Salyut 7.
In 1992, opening ceremonies were held in Barcelona, Spain, for the Summer Olympics.
In 2000, a New York-bound Air France Concorde crashed outside Paris shortly after takeoff, killing all 109 people on board and four people on the ground; it was the first-ever crash of the supersonic jet.
|
<urn:uuid:1b16895f-ec39-428e-9f84-3cd2622d4055>
|
CC-MAIN-2014-15
|
http://www.valdostadailytimes.com/todays-top-stories/x2088953863/Today-in-History-for-Thursday-July-14-2013
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521558.37/warc/CC-MAIN-20140416005201-00446-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.965586 | 502 | 3.203125 | 3 |
Following the unveiling of the African Continental Free Trade Agreement in Kigali, Rwanda, in March 2018, Africa is about to become the world’s largest free trade area: 55 countries merging into a single market of 1.2 billion people with a combined GDP of $2.5 trillion.
The shelves of Choithrams Supermarket in Freetown, Sierra Leone, boast a plethora of imported products, including toothpicks from China, toilet paper and milk from Holland, sugar from France, chocolates from Switzerland and matchboxes from Sweden.
Yet many of these products are produced much closer—in Ghana, Morocco, Nigeria, South Africa, and other African countries with an industrial base.
So why do retailers source them halfway around the world? The answer: a patchwork of trade regulations and tariffs that make intra-African commerce costly, time wasting and cumbersome.
The African Continental Free Trade Agreement (AfCFTA), signed by 44 African countries in Kigali, Rwanda, in March 2018, is meant to create a tariff-free continent that can grow local businesses, boost intra-African trade, rev up industrialization and create jobs.
The agreement creates a single continental market for goods and services as well as a customs union with free movement of capital and business travellers. Countries joining AfCFTA must commit to removing tariffs on at least 90% of the goods they produce.
If all 55 African countries join a free trade area, it will be the world’s largest by number of countries, covering more than 1.2 billion people and a combined GDP of $2.5 trillion, according to the UN Economic Commission for Africa (ECA).
The ECA adds that intra-African trade is likely to increase by 52.3% by 2020 under the AfCFTA.
Five more countries signed the AfCFTA at the African Union (AU) summit in Mauritania in June, bringing the total number of countries committing to the agreement to 49 by July’s end. But a free trade area has to wait until at least 22 countries submit instruments of ratification.
By July 2018, only six countries—Chad, Eswatini (formerly Swaziland), Ghana, Kenya, Niger and Rwanda—had submitted ratification instruments, although many more countries are expected to do so before the end of the year.
Economists believe that tariff-free access to a huge and unified market will encourage manufacturers and service providers to leverage economies of scale; an increase in demand will instigate an increase in production, which in turn will lower unit costs.
Consumers will pay less for products and services as businesses expand operations and hire additional employees.
“We look to gain more industrial and value-added jobs in Africa because of intra-African trade,” said Mukhisa Kituyi, secretary-general of the UN Conference on Trade and Development, a body that deals with trade, investment and development, in an interview with Africa Renewal.
“The types of exports that would gain most are those that are labour intensive, like manufacturing and agro-processing, rather than the capital-intensive fuels and minerals, which Africa tends to export,” concurred Vera Songwe, executive secretary of the ECA, in an interview with Africa Renewal, emphasizing that the youth will mostly benefit from such job creation.
In addition, African women, who account for 70% of informal cross-border trading, will benefit from simplified trading regimes and reduced import duties, which will provide much-needed help to small-scale traders.
If the agreement is successfully implemented, a free trade area could inch Africa toward its age-long economic integration ambition, possibly leading to the establishment of pan-African institutions such as the African Economic Community, African Monetary Union, African Customs Union and so on.
A piece of good news
Many traders and service providers are cautiously optimistic about AfCFTA’s potential benefits. “I am dreaming of the day I can travel across borders, from Accra to Lomé [in Togo] or Abidjan [in Côte d’Ivoire] and buy locally manufactured goods and bring them into Accra without all the hassles at the borders,” Iso Paelay, who manages The Place Entertainment Complex in Community 18 in Accra, Ghana, told Africa Renewal.
“Right now, I find it easier to import the materials we use in our business—toiletries, cooking utensils, food items—from China or somewhere in Europe than from South Africa, Nigeria or Morocco,” Paelay added.
African leaders and other development experts received a piece of good news at the AU summit in Mauritania in June when South Africa, Africa’s most industrialised economy, along with four other countries, became the latest to sign the AfCFTA.
Nigeria, Africa’s most populous country and another huge economy, has been one of the holdouts, with the government saying it needs to have further consultations with indigenous manufacturers and trade unions. Nigerian unions have warned that free trade may open a floodgate for cheap imported goods that could atrophy Nigeria’s nascent industrial base.
The Nigeria Labour Congress, an umbrella workers’ union, described AfCFTA as a “radioactive neoliberal policy initiative” that could lead to “unbridled foreign interference never before witnessed in the history of the country.”
However, former Nigerian president Olusegun Obasanjo expressed the view that the agreement is “where our [economic] salvation lies.”
At a July symposium in Lagos organised in honour of the late Adebayo Adedeji, a onetime executive secretary of the ECA, Yakubu Gowon, another former Nigerian leader, also weighed in, saying, “I hope Nigeria joins.”
Speaking at the same event, Songwe urged Nigeria to get on board after consultations, and offered her organisation’s support.
Last April, Nigerian president Muhammadu Buhari signalled a protectionist stance on trade matters while defending his country’s refusal to sign the Economic Community of West African States-EU Economic Partnership Agreement. He said then, “Our industries cannot compete with the more efficient and highly technologically driven industries in Europe.”
In some countries, including Nigeria and South Africa, the government would like to have control over industrial policy, reports the Economist, a UK-based publication, adding, “They also worry about losing tariff revenues, because they find other taxes hard to collect.”
While experts believe that Africa’s big and industrialising economies will reap the most from a free trade area, the ECA counters that smaller countries also have a lot to gain because factories in the big countries will source inputs from smaller countries to add value to products.
The AfCFTA has also been designed to address many countries’ multiple and overlapping memberships in Regional Economic Communities (RECs), which complicate integration efforts. Kenya, for example, belongs to five RECs. The RECs will now help achieve the continental goal of a free trade area.
Many traders complain about RECs’ inability to execute infrastructure projects that would support trading across borders. Ibrahim Mayaki, head of the New Partnership for Africa’s Development (NEPAD), the project-implementing wing of the AU, says that many RECs do not have the capacity to implement big projects.
For Mr. Mayaki, infrastructure development is crucial to intra-African trade. NEPAD’s Programme for Infrastructure Development in Africa (PIDA) is an ambitious list of regional projects. Its 20 priority projects have been completed or are under construction, including the Algiers-Lagos trans-Saharan highway, the Lagos-Abidjan transport corridor, the Zambia-Tanzania-Kenya power transmission line and the Brazzaville-Kinshasa bridge.
The AfCFTA could change Africa’s economic fortunes, but concerns remain that implementation could be the agreement’s weakest link.
Meanwhile African leaders and development experts see a free trade area as an inevitable reality. “We need to summon the required political will for the African Continental Free Trade Area to finally become a reality,” said AU Commission chairperson Moussa Faki Mahamat, at the launch in Kigali.
*This article first appeared in Africa Renewal which is published by the United Nations.
Original Article By Kingsley Ighobor at IPS
|
<urn:uuid:28c2e968-15d8-4f63-9347-75a63b91e060>
|
CC-MAIN-2019-51
|
https://www.africa.com/africa-set-for-a-massive-free-trade-area/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540517557.43/warc/CC-MAIN-20191209041847-20191209065847-00244.warc.gz
|
en
| 0.940093 | 1,768 | 2.859375 | 3 |
Learn something new every day
More Info... by email
A county grand jury is a group of people who are charged with determining whether a person should be formally charged in a criminal case or who provide oversight for the county government in civil matters. Grand juries were once commonplace in many legal systems; however, they are now all but non-existent outside of the United States. Within the United States, both the federal judicial system and many state and/or county judicial systems use grand juries. In California, for example, the state Constitution requires that all counties have a grand jury convened at all times.
When county prosecutors believe they have enough evidence to charge a suspect in a criminal case, they often take the evidence to a county grand jury. In most cases, a criminal county grand jury is made up of people randomly selected from the county voter registration list to serve on the jury. The idea is to get a representative cross-section of the community as would be present on a petit jury that is convened to hear a criminal trial. Jury members may be called to serve for a day, a week, or longer, depending on the county system.
Once the criminal county grand jury has been convened, the prosecutor or district attorney will present the evidence he or she has against the suspect to the jury members. Essentially, this is the evidence that the prosecutor would present at trial if the case were to go to trial right then. The jury members are not charged with deciding guilt, but whether or not there is a strong enough suspicion to formally require the suspect to stand trial. In some jurisdictions, the prosecutor or district attorney has a choice whether to charge the suspect directly or to present the case to a county grand jury for an indictment. In other jurisdictions, certain types of cases, such as serious felonies, are required by state law to be charged by a grand jury indictment.
Many county governments also use civil county grand juries. A civil county grand jury is very different than a criminal grand jury. Members are usually appointment or selected by the county government or county judges and frequently serve for a year or longer. A civil grand jury is charged with oversight of the county government and investigation of citizen complaints. All entities that receive county tax dollars are subject to investigation by the county civil grand jury. The members of the jury usually have great latitude to decide what entities they choose to investigate each year.
how the hell do i get a copy of my grand jury transcript?
One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK!
|
<urn:uuid:1766de0c-c2c4-46c3-893b-1bc9f027f27f>
|
CC-MAIN-2015-32
|
http://www.wisegeek.com/what-is-a-county-grand-jury.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987552.57/warc/CC-MAIN-20150728002307-00213-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.962461 | 547 | 3.15625 | 3 |
Engineering management is understood to be the area that pertains to the use of engineering concepts towards the planning and operational control over industrial and manufacturing operations. Engineering managers are outfitted using the know-planning and manage these kinds of operations. Engineering Management programs normally involve instruction in accounting, engineering economy, financial management, industrial and human sources management, industrial psychology, management human resources, mathematical modeling and optimization, qc, operations research, safe practices issues, and ecological program management.
An engineering manager will often need experience and training both in general management that will frequently include business and also the specific engineering disciplines that’ll be utilized by the engineering team that she or he will manage. Furthermore, an effective engineering manager must understand fully the factors that motivate a lot of people to pursue careers in engineering are usually completely different than individuals that motivate people who are strong business minded. Subsequently, the abilities which are necessary to coach, mentor and motivate technical professionals won’t be the same as individuals that are required for people in other fields. The engineering manager must basically be capable of connecting with the engineers she or he will manage.
There are numerous education and certification programs around that may provide Bachelor’s, Master’s and Ph.D levels in this subject. Undergraduate programs provide generalist levels which allow engineers to deal better in the industry atmosphere. Master of Engineering Management (MEM) supplies a technical-based option to the standard Master of business administration programs. Industrial and professional associations like engineers’ societies offer certification programs to help within the validation of engineering management understanding and skills. The specialization areas which may be noticed in both degree and certification programs might be made up of control over technology, product and process, quality, business management, operations management, program management, marketing and finance.
Formal Engineering Management education is usually communicated at the graduate level and it is an instructional field that’s attaining more interest. Candidates for engineering management must possess an instructional undergraduate degree having a major in engineering, information technology, mathematics or even the sciences. The time period of study for this kind of degree is mainly from a year and 2 and also the completed degree might be designated like a Master of Engineering Management, MS in Engineering Management, MS in Technology or Innovation Management, Master of economic and Engineering or MS in Management Science & Engineering, with respect to the college that provides the amount. Engineering Management students are anticipated to experience a variable workload experience before enrolling, that is mostly based on program needs. The amount generally includes units covering Management, Entrepreneurship, Marketing, Finance, Optimization, Innovation, Operations and Project Management Software, among a number of other areas. Students in this type of program mainly decide to focus on a number of sub-disciplines for example Marketing, Finance and Healthcare.
|
<urn:uuid:c746196b-7c44-4b48-b44a-87855e504ff0>
|
CC-MAIN-2017-43
|
http://myteamperforms.com/engineering-management.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823309.55/warc/CC-MAIN-20171019141046-20171019161046-00792.warc.gz
|
en
| 0.950138 | 568 | 2.734375 | 3 |
" Ophisternon infernale is one of the 200+ troglobitic fish species worldwide, and one of the two cave-dwelling fishes endemic to the karstic aquifer of the Yucatán Peninsula, Mexico. Because of its elusive nature and the relative inaccessibility of its habitat, there is virtually no genetic information on this enigmatic fish. Herein we report the complete mitochondrial genome of O. infernale, which overall exhibits a configuration comparable to that of other synbranchiforms as well as of more distantly related teleosts. The KA/KS ratio indicates that most mtDNA PCGs in synbranchiforms have evolved under strong purifying selection, preventing major structural and functional protein changes. The few instances of PCGs under positive selection might be related to adaptation to decreased oxygen availability. Phylogenetic analysis of mtDNA comparative data from synbranchiforms and closely related taxa (including the indostomid Indostomus paradoxus) corroborate the notion that indostomids are more closely related to synbranchiforms than to gasterosteoids, but without rendering the former paraphyletic. Our phylogenetic results also suggest that New World species of Ophisternon might be more closely related to Synbranchus than to the remaining Ophisternon species. This novel phylogenetic hypothesis, however, should be further tested in the context of a comprehensive systematic study of the group "
Reference in bibliography for genera (1)
Reference in bibliography for species (1)
Mar-Silva, Adán Fernando & Jairo Arroyave, Píndaro Díaz-Jaimes. 2022. "The complete mitochondrial genome of the Mexican-endemic cavefish Ophisternon infernale (Synbranchiformes, Synbranchidae): insights on patterns of selection and implications for synbranchiform phylogenetics". Zookeys. 1089:1-23. DOI: 10.3897/zookeys.1089.78182 (ffm01125) (摘要)
|
<urn:uuid:9504cfca-baec-4611-9f29-a3cde864d10b>
|
CC-MAIN-2023-40
|
https://mexfish.info/reference.php?id=1125&lang=cn
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00564.warc.gz
|
en
| 0.855222 | 472 | 2.65625 | 3 |
Definition of massively parallel in English:
(Of a computer) consisting of many individual processing units, and thus able to execute many different parts of a program at the same time.
- These are also euphemistically called scalable parallel, massively parallel, or cluster computers.
- Hundreds of millions of cheap computers working together as massively parallel computers lead to scientific advances we can't even imagine.
- The challenge of developing codes for very complex, massively parallel computers has increased the emphasis on programming skills.
Definition of massively parallel in:
- British & World English dictionary
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
<urn:uuid:265fac87-69e0-417d-978d-77450417543a>
|
CC-MAIN-2015-22
|
http://www.oxforddictionaries.com/definition/american_english/massively-parallel
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207925917.18/warc/CC-MAIN-20150521113205-00097-ip-10-180-206-219.ec2.internal.warc.gz
|
en
| 0.92047 | 143 | 2.734375 | 3 |
Microsoft Internet Information Server (IIS) is a popular web server, providing support
for a variety of scripting languages, including ASP (active server pages). IIS 2.0 and 3.0
suffer from an issue allowing a remote user to retrieve the source code for any script
(that has read permissions on the server) via a web browser.
This is accomplished by appending a period (.) to the end of a URL requesting a specific script,
and applies to any file types in the "script-map list", including .asp, .ht., .id, .PL, and others.
Consequences of exploitation vary depending on the site design, but commonly include details of
directory structure on the web server, database passwords, and various other pieces of information
that could then be used to mount further attacks.
|
<urn:uuid:b07c8322-a9ff-4db2-aae9-56308eb872c4>
|
CC-MAIN-2022-40
|
https://www.rapid7.com/db/vulnerabilities/HTTP-IIS-0002/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336674.94/warc/CC-MAIN-20221001132802-20221001162802-00602.warc.gz
|
en
| 0.877756 | 174 | 2.546875 | 3 |
The concept of “authority” can be defined as the right to control someone. While the word is sometimes used in other contexts (i.e. “the leading authority on UFO sightings”), the relevant definition is “the right to control” rather than as an inexact synonym for “expert.” It is also improper to use the word to mean merely the ability to control something (you don’t have “authority” over your watch simply because you have the ability to set it.) The notion of authority is about the right to control, and this quite simply cannot actually exist because no one ever has the right to control anyone other than themselves.
If you insist upon using the word authority, use it exclusively to describe the unique relationship that one has with their own body. You have authority over you (because you own yourself), but you can never have legitimate authority over anyone else. It may appear that one has authority, but it is truly just an appearance, for while one may act like they have the right to control someone else, it is impossible for anyone to actually possess such a right.
Let’s talk for a moment about what authority isn’t. It isn’t the relationship that an employer has with an employee. An employer offers to trade consideration (typically money) in exchange for labor, but this is an ongoing cycle of voluntary trades which either party has the right to terminate at any point. An employer does not have a right to control his employee and the employee does not have an obligation to obey his employer. The employee chooses to do as his employer requests in exchange for consideration.
Authority is also not the relationship between a landlord and a tenant. A landlord allows the (typically conditional) use of his property in exchange for some type of consideration, often money but sometimes labor. Once again this is a voluntary trade. A landlord does not have a right to control his tenant and the tenant does not have an obligation to obey his landlord. Rather, the tenant chooses to live within the guidelines stipulated by the landlord up until such time as he chooses to vacate the landlord’s property. If the desires of the landlord and the tenant cannot be reconciled, the voluntary trade may be suspended and the two parties are free to go their separate ways.
The term “legitimate authority” is actually an impossible concept much like a square circle is an impossible object. It simply cannot exist. No one ever has a right to control another person and no one ever has an obligation to obey another person. This applies to the relationship between parents and children, it applies to the “relationship” between individuals and the state, and it applies to the relationships between all other individuals.
When one attempts to exercise authority, they are engaging in aggression against whoever they attempt to control. The distinction which must be made is whether the action in question is actually an attempt to control or merely an impolite request. The relevant factor is whether the person giving the order claims the right to enforce obedience. If I say “pass the salt” or “close the door,” chances are I’m not going to pull out a gun if you don’t comply. What I’m really doing is asking you to do something, but whether you do it or not is entirely up to you. Such requests (even if given as commands) are thus not aggression because noncompliance remains an option.
Conversely, if a state enforcer demands that you “get on the ground!” even as he draws his firearm, what is happening is most definitely an act of aggression because the attempt to control you is backed by lethal force. Unfortunately, life is not always so black and white. Those who attempt to exercise control over others don’t usually draw a gun in order to make it crystal clear that their presumed authority is indeed aggression.
How can you tell if someone’s demands constitute aggression rather than just rudeness? Ask yourself what will happen if you don’t obey. Will the person attempt to hurt you or take your stuff? If the answer is yes, the command is aggression. If the answer is no, they’re just being rude. If you don’t know, ask. Say, “What happens if I don’t comply?” In some cases, they may not have an answer. Most petty tyrants don’t really have an enforcement plan in place, they just rely on people acquiescing to their assumed authority.
You own yourself. You have the exclusive right to control your body, your actions, and your property. Others may try to persuade you to do or not do certain things, but they have no right to actually control you or your actions. Anyone who implicitly threatens you by attempting to control you (i.e. by attempting to exercise authority over you) is guilty of aggressing against your self-ownership. Such aggression warrants self-defense in order to protect yourself from their attempts to control you.
My advice to you is to start evaluating whose commands you’re afraid to ignore and why. Is it just because you’re a nice person who doesn’t want to make waves or is it because saying no creates a very real danger that the self-styled “authority” will use violence to enforce their will? Anyone who falls in the latter category is a dangerous aggressor against whom you must be prepared to use self-defense. No one has the right to control you. Keep repeating it to yourself: “No one has the right to control me; no one has the right to control me; no one has the right to control me!”
Now get out there and start saying NO!
|
<urn:uuid:53360a29-ddda-4936-aed1-f59f24f34da9>
|
CC-MAIN-2021-49
|
https://everything-voluntary.com/authority-illegitimate
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362571.17/warc/CC-MAIN-20211203000401-20211203030401-00232.warc.gz
|
en
| 0.963061 | 1,199 | 2.703125 | 3 |
are the simplest invertebrates. They live in water. They filter food from the water that surrounds them.
Also live in water. Animals in this group have a central opening surrounded by tentacles. They take in food and eliminate waste through this opening. Jellyfish, sea enamones hydras, corals are cnidarians.
Are animales with soft, tube-shaped bodies and a distinct head. Some worms live inside other animals. Others live in the water or on land.
have a muscular foot that allows them to move and hunt for food. Some mollusks live on land. Others live in water. Clams, snails, and octopuses or mollusks.
Are water animals that have a central opening for taking in food. Sea stars amd samd dollars are echinoderms.
|
<urn:uuid:282aa337-1063-45fe-9d13-bc621c0e9a7c>
|
CC-MAIN-2015-22
|
https://quizlet.com/852213/6-groups-of-invertebrates-flash-cards/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927767.46/warc/CC-MAIN-20150521113207-00094-ip-10-180-206-219.ec2.internal.warc.gz
|
en
| 0.913835 | 173 | 3.0625 | 3 |
Implementing Embedded Speed Control for Brushless DC Motors: Part 3
To summarize, Hall sensors are an integral part of 120-degree, six-step trapezoidal control. These sensors are used to detect rotor position and to make appropriate state changes (known as the commutation sequence). Using position and timing information, we can measure speed and implement appropriate control. Thus, Hall sensors provide all of the necessary feedback information for the rotor.
This method of control has several advantages. It is easy to use, the required code is simple, and switching is straightforward. The switching has built-in dead time and does not require a special timer. Commutation or switching can be directly connected to the Hall signals for simplicity. Moreover, this method implements effective speed control.
However, Hall-sensor based control does have its disadvantages. Hall sensors increase the cost of the motor and require that five more wires be connected. Also, the sensors add another source of EMI to the motor. Their behavior is noisy, too. They are susceptible to corrosion and are usually the first component in the system to fail. If the motor is a hermetically sealed system, Hall sensors will require extra seals.
As shown in Figure 21, below, using an R8C/13 series MCU, the 120-degree Hall-sensor control method incorporates a Timer C, which performs the modulation function at 20 kHz frequency. The R8C MCU has an internal structure that allows firmware to multiplex on the output pins as necessary to generate modulation. Firmware can connect the timer C output directly to a pin, or it can disconnect timer C from that pin and set the pin's state to either high or low. That is, the firmware can change the output to high, low, or modulation.
|Figure 21. R8C/13 based system configuration for six step control of a BLDC motor.|
Looking at Figure 21 above, notice that firmware also can connect the upper three pins, the lower three pins, or one pin at a time. Six outputs are directed to the integrated power module (IPM), which in turn connects to the three phases of the motor. Three Hall signals are received on three interrupt pins—INT1, INT0, and KI3—on the rising or falling edges.
Timer X, used as the speed measurement counter, measures time between two consecutive Hall signals and provides CountMeas for the speed-control loop. The INT3 pin is used as an emergency-shut-down interrupt when a high-current or a high-temperature alarm signal is received from the IPM.
The R8C MCU has eight ADCs that can be used to implement tasks such as measuring temperature, bus voltage, pressure, and current. Current measurement is particularly important, because measuring average current through several electrical cycles lets us compute torque and speed fairly accurately.
By combining speed measurement and current measurement, firmware can determine the point on the torque speed curve at which the motor is operating. Since the R8C MCU has several GPIO pins, the firmware can use an LED on/off scheme to alert us to the internal state of the algorithm and the performance of the motor.
Because the 16-bit R8C MCU runs at a 20 MHz CPU frequency and includes on-chip flash and SRAM, designers can use this device to create single-chip solutions. The MCU's peripherals include eight channels of ADC, three 8-bit timers with pre-scalars, and a flexible 16-bit input-capture and output-compare timer that can generate up to six PWM outputs.
The device also has a watchdog timer with ring oscillator, two serial interfaces, a power-on reset function, a low-voltage detect function (generally known as brown-out detect), and an internal clock-generation circuit. Additionally, the MCU has up to 22 I/O pins and 8, 12, or 16KB of flash plus 512 bytes, 768 bytes, or 1KB of on-chip RAM.
Data flash is an especially important feature of the MCUs in the R8C/13 family. The two extra 2KB blocks of data flash have high-endurance write/erase capability and can eliminate the need for external EEPROM for a true single-chip solution. An R8C-based BLDC motor control power board is shown in Figure 22 below with motor interfaces and IPM placement.
|Figure 22. R8C MCU and integrated power module based motor control reference platform.|
Sensorless BLDC control
As noted earlier, a significant disadvantage of Hall sensors is their cost. One way to reduce the overall cost of the motor is to eliminate them.
The 120-degree modulation, six-step method of control does allow the use of back-EMF signals to detect the rotor position. Recall that only two of the power switches are turned on at each state change; one is left off. In fact, one entire set of up-and-down switches is not powered on. This is best understood by looking at the Up and Un sequence shown in Table 1 and also looking at Figure 23, below.
First the Up switch is turned on for 120 degrees of rotation. Then for 60 degrees there is no power in the U phase. The Un switch is turned on for the next 120 degrees and again, there is no power for next 60 degrees. Thus, every 120 degrees there is a time period of 60 degrees during which we can observe the back-EMF generated by the rotating magnet.
When Up is energized, current is high in the U coil. When Un is energized, current is low in the U coil. At this point the current changes direction from positive to negative, thus creating a zero crossing. Detecting a zero crossing is equivalent to detecting the rotor position. However, instead of detecting 60 degrees, 90 degrees are detected.
Thus, we can use zero-cross detection to identify the rotor position and then wait until the proper angle is reached to change the state. For example, when a zero crossing is detected at 90 degrees, the firmware can wait another 30 degrees of rotation to perform a state change. The speed-control algorithm remains the same, but a wait period has been added.
|Figure 23. BLDC motor control without position sensor.|
Now let's compare the Hall-sensor based algorithm to the back-EMF based algorithm. Both methods use the 120-degree six-step method and perform a state change every 60 degrees. Both methods use the same trapezoidal technique to control speed. The difference between two methods lies in which signal is used for commutation.
The sensor-based method uses the Hall signal for commutation. As soon as the signal arrives, the state must be changed. The back-EMF method detects a zero crossing, waits for another 30 degrees of rotation, and then makes the state change. Again, in both methods, the speed-control algorithm and pattern recognition technique are the same.
|Figure 24. Back EMF detection for symmetric modulation of power switches.|
Since both methods use the same type of modulation and the same sequence for energizing phases, both have torque ripple, low efficiency, and high noise. Noise is particularly noticeable when a low carrier frequency is used. The response for speed control is acceptable when the sensor-based algorithm is used, but it is slow for the sensorless algorithm and in some cases inadequate.
Further, there are issues with zero-crossing detection. Zero crossing happens in between modulations, when a particular phase is not energized. As Figure 24, above shows, the MCU output is modulating each switch 60 degrees. Output for the inverter shows modulation from rail to rail on the voltage. When this voltage is compared to 1/2 Vcc, the zero crossing becomes visible and then is detected by the interrupt.
Proper implementation with comparators using an R8C/1A MCU is shown in Figure 25, below. Back-EMF is detected from the phase voltage, which is high. Thus, a resistor ladder is used to scale down the input into the MCU. Comparators are used to input high or low voltages in interrupt pins as they did in the Hall-sensor example.
In this case, when the interrupt is received, the timer X is read and its count is divided by 2. A second counter is then started that will be reset when it reaches one half the timer X count. When that reset occurs, the state change is made.
The example shown here uses Timer Y for this purpose. This construct is required because the state change must be delayed for a 30-degree rotation period. Since we have measured the 60-degree rotation time, it's easy to calculate the 30-degree period. Note that because this R8C MCU uses comparators instead of an ADC, it is an extremely cost-effective solution.
|Figure 25. R8C/1A based sensorless implementation with Back EMF detection.|
There is little difference between sensor and sensorless control in terms of MCU processing. The pattern calculation and speed processing are essentially the same. See Figure 26, below. When output stage calculations are done with zero-crossing detection rather than Hall sensors, however, one more timer is required to accommodate the waiting period. This may also change the input masks, which are similar to those used for the Hall 120-degree and 60-degree control methods.
Calculations for duty cycle and the bus voltage measurement and corrections are unchanged. Experience shows that proper signal conditioning is required for signals going into the comparators. Otherwise, errors can occur in detecting zero crossings, resulting in poor speed control and high torque ripple.
|Figure 26. Control flow for sensorless (Back EMF detection) implementation.<.b>|
Like the Hall-sensor method, the back-EMF based sensorless control approach has advantages and disadvantages. Back-EMF methods eliminate Hall sensors and thus reduce implementation costs. The motor is cheaper to build. However, the cost of new sensors is coming down and decreasing the economic advantage of sensorless motor controllers.
Furthermore, sensorless control has various implementation issues. The process of detecting zero crossings introduces extra noise and may cause poor state changes. Sensorless control methods also introduce more torque ripple. Worse, the speed control performance achieved is not acceptable in some applications.
|Figure 27. Aligning the rotor using Vp, Wn, Un coils.|
It's important to note that before a BLDC motor is commanded to attain a certain speed, its rotor must be aligned properly for smooth operation. This alignment can be done in various ways. One of the simplest is to command the Vp, Un, and Wn for a certain time period, giving a predetermined number of pulses to the rotor.
This procedure aligns the south pole of the rotor with the Vp coil,
as shown in Figure 27, above,
which shows a motor that has one pole pair. After the rotor is aligned,
it will rotate with a fairly predictable amount of torque, starting
with step 1 for a smooth start. The benefit here is that when the rotor
is aligned properly, the motor will consume significantly less current
during start-up than it would if the rotor had not been aligned.
To read Part 2, go to Brushless motor control using Hall sensor signal processing
Next in Part 4: 180 degree modulation in motor control
Yashvant Jani is director of application engineering for the system LSI business unit at Renesas Technology America.References
1. Power Electronics and Variable Frequency Drives Technology and Applications, Edited by Bimal K. Bose, IEEE Press, ISBN 0-7803-1084-5, 1997
2. Motor Control Electronics Handbook, By Richard Valentine, McGraw-Hill, ISBN 0-07-066810-8, 1998
3. FIRST Course On Power Electronics and Drives, By Ned Mohan, MNPERE, ISBN 0-9715292-2-1, 2003
4. Electric Drives, By Ned Mohan, MNPERE, ISBN 0-9715292-5-6, 2003
5. Advanced Electric Drives, Analysis, Control and Modeling using Simulink, By Ned Mohan, MNPERE, ISBN 0-9715292-0-5, 2001
6. DC Motors Speed Controls Servo Systems including Optical Encoders, The Electro-craft Engineering Handbook by Reliance Motion Control, Inc.
7. Modern Control System Theory and Application, By Stanley M. Shinners, Addison-Wesley, ISBN 0-201-07494-X, 1978
8. The Industrial Electronics Handbook, Editor-in-Chief J. David Irwin, CRC Press and IEEE Press, ISBN 0-8493-8343-9, 1997
This article is excerpted from a paper of the same name presented at the Embedded Systems Conference Boston 2006.
Currently no items
|
<urn:uuid:21ea8448-f9dc-4857-be74-00e997418e82>
|
CC-MAIN-2016-07
|
http://www.embedded.com/design/mcus-processors-and-socs/4006779/Implementing-Embedded-Speed-Control-for-Brushless-DC-Motors-Part-3
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701163663.52/warc/CC-MAIN-20160205193923-00017-ip-10-236-182-209.ec2.internal.warc.gz
|
en
| 0.899263 | 2,693 | 3.203125 | 3 |
- General Theory of Relativity
The Theory of General Relativity was developed by Swiss physicist Albert Einstein in 1915. In Einstein's
theory, time is treated as an extra dimension in addition to the three spatial dimensions -- height, width and
depth. Thus matter moves not only in space, but also in time. Nobody can stop time from ticking away,
right? So even when an object remains still in space, it still moves along in time.
Matter is always moving in space-time. However, in order to save energy, it always seeks the shortest
path to travel. Meanwhile, matter also bends space-time. If there were no matter in the universe,
space-time would be flat. The relation between matter and space-time is very complicated and is what
the general theory of relativity tries to solve.
It is the interplay between matter and space-time that leads to gravity. To understand this, let's look at the
following analogy. Suppose a particle wanders around the universe. If there is no object nearby, then
space-time is flat and the particle will travel in a straight line because it is the shortest route. However, if
the particle passes by another particle, the two particles will roll into each other because each particle is
moving in a curved space-time bent by the other. The two particles appear to be pulled together by
gravitation. This is how gravity works. Thus, the theory of general relativity is in fact the theory of
Fig.1 Space-time curved by a massive ball. A tiny ball that wanders nearby "falls" into the center
due to the curvature created by the massive ball. The tiny ball also bends space-time, but the curvature
is negligible compared to that made by the massive ball. Gravity works in a similar way.
Fig.2 Lack of gravity is what enables this astronaut to "fly" through space.
Fig.1 Z. H. Zhou; Fig.2 NASA.
- The Dominant Force
Although the other three fundamental forces play vital roles in a star, they are irrelevant when it comes to
the scale of galaxies. This is because weak and strong nuclear forces are only short range forces. Their
influence does not go beyond the nuclei of atoms. Electromagnetic force is a long range force like gravity.
However, unlike gravity, it not only attracts but also repels depending on what charges are
There are two kind of charges: positive and negative. Particles with the same charges repel each other;
those with opposite charges attract. Our universe seems to have an equal amount of positive and
negative charges. Therefore, the attracting and repelling forces cancel each other out when they are
spread out over a sufficiently large scale. The only force left to dominate the galaxies is thus gravity --
even though it is the weakest force. Gravity acts like an organizer that puts stars, galaxies, and clusters in
|
<urn:uuid:42ce81e3-167c-4cb0-a2cd-dfc272a0cc40>
|
CC-MAIN-2015-22
|
http://www3.actden.com/sky_den/gravity.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207926828.58/warc/CC-MAIN-20150521113206-00203-ip-10-180-206-219.ec2.internal.warc.gz
|
en
| 0.94233 | 611 | 3.96875 | 4 |
A new survey reveals a potential "innovation gap" in America. The 2011 Lemelson-MIT Invention Index discovered, among other things, that while many young American women have the characteristics of inventors--creativity, an interest in science, and altruistic leanings--they nonetheless didn't view themselves as "inventive."
The study surveyed both men and women, aged 16-25, and offers in a way a snapshot of how our nation's youth views innovation and invention. Though both men and women reported that they felt themselves to be "creative," and that they saw creativity as linked with inventiveness, relatively few identified themselves as "inventive." If "creativity" seems to lean toward the humanities, that clearly wasn't the hang-up; the young men and women alike indicated a great interest in science and math, with 42% of the women identifying those fields as their favorite subjects, and over half the men agreeing.
As for what fields men and women were most interested in contributing to, there was mostly parity, with two exceptions: Men skewed toward the web, women toward medicine and health care.
Other findings of the study:
- Most young people (61% of women, 54% of men) view Japan, not the U.S., as the leader in invention.
- Young women and men alike advocate more government funding and school invention projects to spark interest in innovation.
- More women appeared to be interested in the design and brainstorming phase of invention, while men took a greater interest in actually building or implementing an invention.
- About a third of the young men and women viewed inventors as "people who most often work at home or in their garage."
Of course, the particular words "invention" and "inventor" do conjure up, first and foremost, an image of Thomas Edison in his study--certainly for young people, to whom Edison is held up in class as a model of the inventive spirit. That the young men and women appeared to have misconceptions of what invention and innovation are like today may largely be a fault of the survey's terminology.
But the survey resonates with one from late last year, which touched on similar themes with an even more highly trained population. A researcher surveyed postdocs in the Washington, DC, area, and found that only two out of 126 individuals listed an entrepreneurial track as their top choice. Even in the most highly trained in America, there appears to be a hesitance to taking the plunge into an Edison-like entrepreneurial track.
That young women, in particular, are tentative about this is troubling. A recent report from the National Bureau of Economic Research identified a "mommy divide," wherein high-skilled women tended to see considerable wage decreases after child-bearing. Government, business, and the higher education community to work together to better incentivize innovation among young women--and to ensure that once they become highly trained, they aren't punished simply for wanting to raise a family, too.
[Image: Flickr user gregory-moine]
|
<urn:uuid:92245213-1a29-41bc-8203-08f28fb611b1>
|
CC-MAIN-2014-41
|
http://www.fastcompany.com/1719151/innovation-gap-chasing-spirit-edison
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657127285.44/warc/CC-MAIN-20140914011207-00336-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.97118 | 626 | 3.125 | 3 |
NATO was created due to the threat of an expanding Soviet Union and its communist neighbours. The Soviet Union created their own version of NATO - called the Warsaw Pact in retaliation. However, since the fall of the Soviet Union, the Warsaw Pact has been dissolved. Now there is only NATO, despite no Warsaw Pact and no Soviet Union. Further, despite agreements between Reagan (US) and Gorbachev (USSR) to not have NATO expand beyond Germany, it is still expanding to this day. Appeasement does not work. NATO will keep expanding. While Russia is far from being an angel, they too act in their national interest (just as the US does). Russia sees an expanding NATO and seeks to build up its military in retaliation. Without NATO creeping closer and closer to Russia's border, the US and Russia could be allies.
|
<urn:uuid:9c4bccbc-9c52-40a2-b5f9-c3264774869b>
|
CC-MAIN-2017-22
|
http://www.debate.org/opinions/should-nato-be-disbanded
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463615105.83/warc/CC-MAIN-20170530124450-20170530144450-00091.warc.gz
|
en
| 0.98054 | 169 | 3.1875 | 3 |
Though they look nothing like ours, roaches do have eyes. Although many parts of a cockroach’s anatomy are fairly primitive, their eyes are quite advanced, giving them almost 360-degree vision of the world around them. Though their eyes possess many remarkable features, they do have some limitations on sight.
Cockroach bodies are very flat, rounded on top and protected with thick armor. The eyes rest on top of the rounded head at the front of the body, and because they are nearly on the top of the head -- rather than the front, as in humans, or the side, as in many other mammals -- cockroaches have a near perfect view of what is happening around them. Their eyes are also compound, which means that they contain more than one lens.
Unlike human eyes, which possess only one lens, cockroach eyes each have over 2,000 lenses. Madagascar hissing cockroaches, for instance, have 2,400 to 2,500 hexagonal lenses per eye. The huge number of lenses not only ensure that cockroaches have excellent vision, they also make it possible to see more than one thing at a time. Whereas human vision involves seeing just one large picture, cockroaches may form multiple pictures of what is going on around them at any given time.
Although roaches do have excellent eyesight, they have some limitations. For instance, their lenses grow progressively more misshapen toward the outer edge of the eye. Lens irregularities can also affect vision in the middle of the eye, though that is less common, and since they have so many, usually not a big deal. Cockroaches also cannot see in red light, though they do see quite well in green light. As important as the eyes are, however, it is important to note that cockroaches, unlike most other animals, can live for some time without their heads.
Cockroaches have several other senses that they routinely draw on. Their antennae house their scent organs, and males have extra receptors to help them sense female pheromones when females are ready to mate. They also possess two appendages mounted on the underside of their shell, called cerci, which help them sense air currents and other movements around them that protect them from predators. Hairs along their legs perform the same function.
- Hemera Technologies/PhotoObjects.net/Getty Images
|
<urn:uuid:28507a0f-461b-49c3-8e5a-c02d8d5c05f6>
|
CC-MAIN-2019-18
|
https://animals.mom.me/roaches-eyes-9861.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528523.35/warc/CC-MAIN-20190420040932-20190420062932-00375.warc.gz
|
en
| 0.964683 | 487 | 3.625 | 4 |
Back when I was young, people were taught not to install or run software from untrusted parties, very much like not to accept candy from strangers, or not to let the Big Bad Wolf in. Prevention is better than cure. Then came along application macros and the World Wide Web of Execution, that embed software in data files and web pages, respectively, so that it is automatically executed when viewing the file or the web page. Such automatic execution of untrusted software paved the way for plenty of malicious software, from traditional trojan horses, that, standing as desirable programs or data files, contain executable code that grants malicious third parties control over the computer, to stealthy cryptocoin miners in web pages, that spend users' compute power to surreptitiously transfer wealth to third parties.
Meltdown and Spectre are not traditional attacks on software vulnerabilities that remotely take over control of computers: they rather enable even unprivileged software in sandboxed environments to access data in memory that is not and should not be directly accessible to such software. For example, while waiting for the completion of some slow operation, say checking whether access to a memory location should be granted, the processor may go ahead and tentatively perform likely subsequent operations. They might even use the data, from memory not yet known to be inaccessible, which may in turn bring to the cache other memory locations dependent on the data. Access time can determine whether memory locations are cached. Combined, these effects create the hardware side channel exploited by Meltdown and some Spectre variants to allow access to data in memory that should not be accessible. Other variants are already known, and it seems likely that more will be discovered and published, even involving other hardware features and side channels.
Now, really, how bad is that? Very bad, you might think, supposing you hold private data in your computer. But how bad would that be if all the software running on your computer was software you could trust, running under your control? Would it be a problem if one program, serving you, got access to internal data of another, also serving you? Surely you could have changed the latter program to grant the former direct access to the data it needed, instead of resorting to side channels. Why should you not do that? Maybe you're not allowed to make changes to one of the programs--but then could you still say the software is under your control?
Free Software is under community control, since users can cooperate to collectively audit the software and change it to suit their collective needs. It is also under individual control, as any user can, independently or with help from third parties chosen and trusted by the user, audit the software and adapt it so that the version on the users' computer behaves just the way the user wishes.
The Free Software movement has long defended the essential software freedoms as human rights grounded on ethics, and that users should perform their computing on computers under their control, using only software that respects their freedoms. This means using Free application software running on a Free operating system, avoiding any non-Free components that could interfere with the computing, be they applications, plugins, addons, libraries, or even peripheral, mainboard or cpu firmware. Non-Free Software fragments embedded in data files and web pages are not to be overlooked.
Even remote software services, being the users' computing, should be performed by Free Software running on computing devices under the users' control. This does not rule out hiring virtual computing devices from third parties, although it might require trusting the provider a little more than co-locating your own server, or keeping on premises a server that could grant third parties remote control through such preloaded firmware as Intel ME or AMD PSP. There is no ethical obstacle to using or offering such virtual computing devices, as long as the provider refrains from inspecting or interfering with customers' computing, and strives to not allow third parties to do so. For example, if the chosen hardware would allow one customer to access anothers' data, or interfere with anothers' computing, the provider should arrange for such separation, if not through software or hardware features, by assigning them to separate hardware.
While virtual server providers panicked as the features expected to enforce customer separation melted down, users who have refused to rely on non-Free Software or services as software substitutes for their own computing, relying on trustworthy Free Software on their own computers instead, have had little reason to worry about Spectre and Meltdown. When we can and do verify that all the software we use can be trusted to do just what we expect, the hardware side channels exploited by Spectre or Meltdown pose no threat, because the software we use serves us.
Any unwanted, deliberate features to obtain information through side channels, and to then transfer it to third parties, would most likely be noticed in individual or community code audits, if not caught as soon as their implementations are contributed to the software project.
Unlike elaborate features to exploit such side channels, that would be very hard to miss, coding mistakes might slip through, but those would still be caught by the existing if imperfect hardware features: despite the side channels, they still protect against accidental attempts to access directly data that should not be accessible.
Still, freedom doesn't magically repel each and every threat; rather, freedom, and control of our software, give us the opportunity to protect ourselves and each other. E.g., software freedom does not protect you from remote NetSpectre attacks, but if all the software running on computers under your control is Free Software, you can scan its source code for remotely-exploitable gadgets, modify them so that they are no longer exploitable, and be assured that none remain hiding in binary blobs, because such blobs do not belong in Free Software.
When it comes to software downloaded and run on a browser, absent better infrastructure to give users ultimate control, every single use may require a new audit. Meanwhile, blocking by default, even when the code is marked as Free Software, might be a safer policy. Trust isn't so easy to earn.
Software mitigations have been proposed to make it harder for malicious software to exploit Meltdown and Spectre. Some of the mitigations depend on modified cpu microcode. That amounts to throwing non-Free Software at the non-problem. Who knows what undesirable features would be brought in along with the promised mitigations? It is not like (non-Free Software) updates have never been abused to impose changes users would rather not have.
Indeed, most of these software mitigations, involving microcode or not, make the system run slower, in some cases a lot slower. Freedom-minded users have no need to incur that performance loss and additional power consumption, just to keep information from being obtained by other trusted programs running under our own control.
Copyright 2018 Alexandre Oliva. Who's afraid of Spectre & Meltdown? by Alexandre Oliva is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported license. Please copy and share.
|
<urn:uuid:c206be00-d96b-409e-af72-d4a4c42ff5d1>
|
CC-MAIN-2019-26
|
https://jxself.org/afraid.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999130.98/warc/CC-MAIN-20190620024754-20190620050754-00302.warc.gz
|
en
| 0.942339 | 1,431 | 2.796875 | 3 |
English educators are generally familiar with the topic of propaganda, as it is a theme of much of the literature that is emphasized in courses for high school and college students. For many teachers, it may seem as if dystopian young adult novels have become the default genre of a generation. Dystopian literature like Huxley’s Brave New World and other works critique mindless consumption, instant gratification, reliance on technology, and the resulting atrophy of language and critical thinking. When reading this novel, one teacher asks her students to reflect on these questions: “Is life easy for us today? Is it too easy? How do people escape from everyday life? Is it necessary to do so? Why or why not?” (Wilkinson, 2010, p. 24).
M.T. Anderson’s young adult novel, Feed is a popular work that considers the ubiquitous nature of advertising as propaganda. The novel uses satire, humor, and exaggeration to depict the world of the future, where the Internet is implanted into your brain as the Feed. As people grow up, their brains cannot function without the Feed. They attend a classroom run by corporations where students learn how to use technology, find bargains and decorate a bedroom. Through education, in this dystopic world, students are trained to be consumers.Continue reading “Media Literacy: Argument, Persuasion, and Propaganda in English Education”
|
<urn:uuid:cbc33da8-7105-4c07-90fe-f33c079880b7>
|
CC-MAIN-2022-33
|
https://k-12talk.com/tag/propaganda/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00490.warc.gz
|
en
| 0.943812 | 288 | 2.9375 | 3 |
The effects of stress are not limited to your head. Indeed, mental health and physical health are not two separate entities, rather they are entirely interconnected. A decline in physical health is often accompanied by pain which makes it hard to think clearly and leads to anxiety and depression, and stress brought on from outside sources can lead to complications in parts of the body not normally associated with emotions.
Many people express their stress with a mindless physical tic, tapping their feet, strumming their fingers, that sort of thing. Those two examples are pretty harmless, but, unfortunately, many people also manifest their stress by grinding their teeth.
Teeth grinding (also known as bruxism) is, obviously, bad for your teeth. Biceps, abs, and bulked-up shoulders get all the glory as far as being the image most people see first when they think about muscles, but by weight the strongest muscle in the human body is actually the masseter (jaw muscle). Your molars are capable of producing 200 pounds of force, so they can really do some damage when all that power is used on themselves.
Grinding will wear down your enamel (which can never be restored) and eventually result in chips or even complete breaks. It will also strain the joints that hold the jaw together, which often leads to pain, jaw tightness, earaches, and headaches.
This one is kind of cheating, because dentists don’t know for sure what exactly causes canker sores, which are small, painful, grey-blue ulcers that appear in the gums and other soft tissues inside the mouth.
A few factors have shown significant correlation with canker sores: age (people from 10 – 20 years old and more likely than anyone else to get canker sores), physical damage caused by braces, eating a lot of citrus, and a poor diet that lacks sufficient B-12, zinc, folic acid, or iron.
But more than any of those factors, stress has shown to be the most common thread that connects canker sore sufferers. Stress is bad enough alone, and when it brings on sores that send up waves of sharp pain every time you try to snack on something, it’s awful enough to make you dismiss any notion that there is a fair and just karmic balance to life.
Poor Hygiene Habits
Stress can lead to depression, and one symptom of depression is the cessation of standard hygienic practices. You just don’t care anymore. Brushing and flossing are done rarely, if at all. Without everyday dental hygiene, plaque builds up, hardens into tartar, and fosters bacteria growth that damages teeth and infects the gums.
As we stated in the introduction to this article, it’s been shown in study after study that your mental state affects your physical state, including how effective your body is at fighting off and recovering from diseases.
There are many techniques used to treat gum disease, everything from deep cleaning to medications to surgery if necessary. But if stress is severe enough to fester into full-blown depression, these treatments will not be as effective as they would be if you had a more healthy and positive outlook on life.
|
<urn:uuid:2c5a7fe2-d620-4637-801b-4e2c8788f7e1>
|
CC-MAIN-2017-04
|
https://www.healthable.org/how-stress-affects-your-oral-health/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280239.54/warc/CC-MAIN-20170116095120-00401-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.964783 | 667 | 2.984375 | 3 |
Directory of U.S. Military Rockets and Missiles|
Appendix 1: Early Missiles and Drones
|Copyright © 2003 Andreas Parsch|
The primary goal of the U.S. Navy's Bumblebee missile program (see also article on SAM-N-6/RIM-8 Talos) was to develop a ramjet-powered surface-to-air missile. Bumblebee was begun in 1944, and the Applied Physics Lab (APL) of the John Hopkins University and the initial research effort was directed to the propulsion system, because essentially no useful data on supersonic ramjets was available at the time.
The first 15.2 cm (6 in) diameter ramjet model, named Cobra, was made of out a P-47 exhaust tube and first tested in early 1945. The initial Cobras used only dummy ramjets and evaluated launching and flight stability issues. Later that year, development had progressed to larger vehicles with live ramjets, and in October 1945 a 25 cm (10 in) diameter model reached a speed of 2250 km/h (1400 mph) at an altitude of about 6000 m (20000 ft). The Cobra missiles were generally launched with the help of clusters of solid-fueled rocket motors.
|Photo: Smithsonian Institution|
|Cobra (10" ramjet)|
By 1947, the Navy was experimenting with larger 46 cm (18 in) ramjets, and by that time the Cobra vehicles were generally referred to as Burner or BTV (Burner Test Vehicle). In September that year, the Cobra/BTV was formally designated as the PTV-4 propulsion test vehicle (amended to PTV-N-4 in early 1948). The PTV-N-4 could reach a speed of Mach 2.4 and an altitude of about 9000 m (30000 ft), and was used to evaluate acceleration characteristics, throttleability and powered range of the ramjet propulsion system. When the BTV flight tests were successfully completed, Bumblebee work continued with even larger (60 cm (24 in)) ramjets in the RTV-N-6 Bumblebee XPM (Experimental Prototype Missile), which was the immediate predecessor of the XSAM-N-6 Talos tactical surface-to-air missile prototype.
Except for the performance data quoted in the text, I have no further data on the physical characteristics of the PTV-N-4 test vehicles.
James N. Gibson: "Nuclear Weapons of the United States", Schiffer Publishing Ltd, 1996
Norman Friedman: "US Naval Weapons", Conway Maritime Press, 1983
Frederick I. Ordway III, Ronald C. Wakeford: "International Missile and Spacecraft Guide", McGraw-Hill, 1960
Bill Gunston: "The Illustrated Encyclopedia of Rockets and Missiles", Salamander Books Ltd, 1979
P.J. Waltrup et.al.: "History of U.S. Navy ramjet, scramjet, and mixed-cycle propulsion development", AIAA (American Institute of Aeronautics and Astronautics), 1996
National Air and Space Museum Website
Back to Directory of U.S. Military Rockets and Missiles, Appendix 1
|
<urn:uuid:f2913290-81aa-4827-85e8-a4607cea65cd>
|
CC-MAIN-2016-36
|
http://www.designation-systems.net/dusrm/app1/ptv-n-4.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982297699.43/warc/CC-MAIN-20160823195817-00214-ip-10-153-172-175.ec2.internal.warc.gz
|
en
| 0.933337 | 666 | 3.515625 | 4 |
2.5. Superheavy Dark Matter
As discussed here by Kolb (2003), it has recently been realized that interesting amounts of superheavy particles with masses ~ 1014±5 GeV might have been produced non-thermally in the very early Universe, either via pre- and reheating following inflation, or during bubble collisions, or by gravitational effects in the expanding Universe. If any of these superheavy particles were metastable they might be able, as seen in Fig. 12, to explain the ultra-high-energy cosmic rays that seem (Takeda et al. 2002; Abu-Zayyad et al. 2002) to appear beyond the Greisen-Zatsepin-Kuzmin (GZK) cutoff (Greisen 1966; Zatsepin & Kuzmin 1966). Such models have to face some challenges, notably from upper limits on the fractions of gamma rays at ultra-high energies, but might exhibit distinctive signatures such as a galactic anisotropy (Sarkar 2002). Examples of such superheavy particles are the cryptons found in some models derived from string theory, which naturally have masses ~ 1012±2 GeV and are metastable (like protons), decaying via higher-order multiparticle interactions (Ellis et al. 1990; Benakli et al. 1999). The Pierre Auger experiment (Cronin et al. 2002) will be able to tell us whether ultra-high-energy cosmic rays really exist beyond the GZK cutoff, and, if so, whether they are due to some such exotic top-down mechanism, or whether they have some bottom-up astrophysical origin. Following Auger, there are ideas for space experiments such as EUSO (Petrolini et al. 2002) that could have even better sensitivities to ultra-high-energy cosmic rays.
Figure 12. Calculation of the spectrum of ultra-high-energy cosmic rays that might be produced by the decays (Sarkar 2002) of metastable superheavy particles.
|
<urn:uuid:14b39348-6022-4250-9eb3-216901f04da3>
|
CC-MAIN-2013-48
|
http://ned.ipac.caltech.edu/level5/March04/Ellis/Ellis2_5.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164928424/warc/CC-MAIN-20131204134848-00000-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.911773 | 420 | 2.71875 | 3 |
Something strange is happening in mathematics seminar rooms around the world. Words and phrases such as spider, birdtrack, amoeba, sandpile, and octopus decomposition are being heard. Drawings that resemble prehistoric petroglyphs or ancient Chinese calligraphy are being seen, and are being manipulated like the traditional numerals and symbols of algebra. It is a language that would have been alien to mathematicians of past centuries.
The words and symbols of mathematics are intended to stimulate thought, promote curiosity, or simply amuse. At times they ignite public imagination. Occasionally they interfere with understanding. Always they are evolving. Today, as the boundaries of mathematical inquiry expand, their evolution seems to be accelerating. The words and symbols of mathematics have helped bring the subject to its present, bountiful state. But the question remains: Can the symbols of mathematics stand up on their own, without any words to support them?
Is Mathematics a Language?
Josiah Willard Gibbs navigated confidently in a sea of mathematical words and symbols. Gibbs was a founder of statistical mechanics and a professor of mathematical physics at Yale University during the latter half of the 19th century. Colleagues knew this outwardly plain and unassuming scholar as someone who rarely made public pronouncements. Imagine their surprise when, during a faculty meeting about replacing mathematics requirements for the bachelor’s degree with foreign language courses, Gibbs rose and forcefully declared: “Gentlemen, mathematics is a language.”
Gibbs wasn’t the first notable scientist to call mathematics a language. Galileo Galilei beat him to it by more than 200 years. In Il Saggiator (The Assayer), published in Rome in 1623, the Italian astronomer wrote: “[The universe] cannot be read until we have learned the language and become familiar with the characters in which it is written. It is written in mathematical language.”
Galileo wrote in Italian rather than scholarly Latin, hoping to reach readers who were literate but not necessarily scientific. But just as students at Plato’s Academy were reputedly greeted with the warning “Let no one ignorant of geometry enter here,” so Galileo’s readers were being cautioned that the book before them had some language prerequisites. For Galileo, the letters of mathematics were triangles, circles, and other geometric figures. Gibbs, who is responsible for much of the vector calculus that we use, would have added a modern symbol or two of his own.
If mathematics is a language, then just as any ordinary language, such as French or Russian, does not rely on another one to be understood, so mathematics should be independent of ordinary languages. The idea does not seem so far-fetched when we consider musical notation, which is readable by trained musicians everywhere. If mathematics is a language, then we should be able to understand its ideas without the use of words. Let’s see how that might be done.
Consider the task of adding the first few integers, say 1, 2, 3, 4, 5. Easy enough. Their sum is 15. But what about adding the first 100 integers?
The figure at right displays 1 + 2 + 3 + 4 + 5 dots twice, once in black and again in red. By arranging all in rectangular fashion as we have, it is an easy matter to count the total, which is 5 × 6 = 30. In order to find our original sum, we need only divide by 2, thereby correcting for our double counting.
The novelty of the picture is that we can grasp the idea at a glance. Moreover, there is nothing special about 5 columns of dots. We could just as easily imagine 100. So 1 + 2 + . . . + 100 must be equal to 100 × 101 divided by 2, which is 5,050. Similarly we can find the sum of the first N integers, for any N whatsoever. The answer is N (N + 1) / 2.
Just as the 19th-century musician Felix Mendelssohn enjoyed writing Lieder ohne Worte (Songs Without Words), so mathematicians like to craft Proofs Without Words. Since 1975 the Mathematical Association of America has published a column devoted to them in its Mathematics Magazine. Its examples are intended to leave the reader speechless.
Despite the many proofs without words, mathematical thought ohne Worte might be impossible. Words come to us automatically when we view images. Images come to mind when we see words. It seems that we need words after all.
The role that words play in mathematics was on the mind of the French mathematician Jacques Hadamard when, during the 1940s, he asked colleagues around the world how they thought about their subject. Did they think in images or think in words? He summarized his findings in The Psychology of Invention in the Mathematical Field. One of the respondents was Albert Einstein, who wrote:
The words or the language, as they are written or spoken, do not seem to play any role in my mechanism of thought. The psychical entities which seem to serve as elements in thought are certain signs and more or less clear images which can be “voluntarily” reproduced and combined.
Even those mathematicians who would agree with Einstein recognize the severe limitation on thought imposed by the use of images alone. In 1983 the New Zealander and American mathematician Vaughan Jones made the point by reproducing the image of a big black dot to illustrate the projection lattice of II1 (read as “type two-one”) factors, a sophisticated algebraic object that Jones later used to create new tools for knot theory, which won him the prestigious Fields medal seven years later. Although the dot was not entirely gratuitous—it came about by thinking of factors in terms of concentric black circles—it was intended as a humorous commentary on the constraints of imagery. “Some people have enjoyed the joke,” Jones told me.
Whether or not mathematics is a language, its words share with ordinary language an important function: They transport essential images from one mind to another. For that reason the choice of words that we make is important.
In 1948, Claude Shannon, working on communication theory at Bell Telephone Laboratories, created a beautiful and useful algebraic expression for a measure of average uncertainty in an information source. Its similarity in form to the statistical mechanics notion of entropy, introduced by Rudolf Clausius in 1864, was noted with wonder by many, including the mathematician John von Neumann. Shannon is said to have told an interviewer the following anecdote in 1961:
My greatest concern was what to call it. I thought of calling it “information,” but the word was overly used, so I decided to call it “uncertainty.” When I discussed it with John von Neumann, he had a better idea. Von Neumann told me, “You should call it entropy, for two reasons. In the first place your uncertainty function has been used in statistical mechanics under that name, so it already has a name. In the second place, and more important, no one knows what entropy really is, so in a debate you will always have the advantage.”
Although von Neumann’s second reason presumably was intended as a joke, the exchange highlights the importance of careful language choice in fostering understanding. Like Shannon, many mathematicians agonize over the words they invent, hoping those they choose will survive for decades. Shannon’s choice proved to be brilliant for three reasons, two in addition to those proposed by von Neumann.
First, mathematicians enjoy the borrowed authority of words from science, especially from physics. Von Neumann was correct when he said that the use of entropy conferred an advantage on the speaker. Audience members either know the meaning of the term or else they feel that they should.
Second, Shannon’s appropriation of the term entropy provoked an insightful debate. Did his term in fact have a meaningful connection with statistical mechanics? The debate has been productive. Today Clausius’s entropy is regarded by many as a special case of Shannon’s idea.
Third, the wide popularity of Shannon’s information theory has been helped by his use of a word that is recognized, if not truly understood, by everyone. Its associations with disorder in everyday life evoke a sympathetic response, much like another popular mathematical word, chaos.
What’s in a Name?
“Must a name mean something?” asked Alice doubtfully. “Of course it must,” was Humpty Dumpty’s emphatic reply to Alice’s question in Lewis Carroll’s Through the Looking-Glass.
Mathematician James Yorke of the University of Maryland would have given Alice the same answer. In a recent discussion I had with him, Yorke recalled his decision to adopt the word chaos for a mathematical phenomenon associated with a type of unpredictable behavior found everywhere in the world, from the drip patterns of water faucets to long-range weather behavior. “Your terms should mean something,” he insisted. He dismissed the advice of colleagues urging him to choose a more dispassionate term. Yorke wished to capture the feelings that we all have about the randomness in our lives.
Mathematical monikers usually slip through the world quietly, recognized only by the researchers who use them. Chaos was an exception. In 1975 Yorke and his coauthor, mathematician Tien-Yien Li of Michigan State University, proved a surprising theorem about continuous functions on an interval, the sort of functions that students learn about in calculus. They wrote up their proof in a short paper titled “Period Three Implies Chaos.”
Mathematical monikers usually slip through the world quietly. The term chaos was an exception; it seized the public imagination.
What did Yorke and Li prove? Think of such a function as a machine: Insert a number a from the interval and get a value b. If we put b into our machine, then we get a third number c. Now insert c to get d. If it happens that d is equal to a, then we say that a has period three. In a similar way, a number might have period four, five, or any other number. What Yorke and Li proved, assuming continuity, is that if some number has period three, then one can find numbers of any period one chooses.
Yorke and Li also showed that many numbers have successive outputs that never return to their starting value. More surprisingly, pairs of such non-periodic numbers can be found as close together as desired, yet having successive outputs that move apart. It is an example of sensitive dependence on initial conditions. The situation is, well, chaotic.
Had Yorke and Li published their paper in a specialists’ journal in their field of dynamical systems, it is likely that chaos would never have caught the public’s imagination. Few people know that the word had already appeared with another meaning in the wonderfully oxymoronic title “The Homogeneous Chaos.” The author was Norbert Wiener, the creator of cybernetics.
Wiener published his article in the 1938 volume of the research-oriented American Journal of Mathematics. Instead Yorke and Li published in the American Mathematical Monthly, an expository journal published by the Mathematical Association of America, intended for a broad readership, from college students to researchers. When biologist Robert May read the article and wrote about its implications for population models a year later in the journal Nature, the word chaos appeared on top of the first page. According to Yorke, that is when the term took off.
How long does it take a mathematical word to seize the public imagination? Within 10 years, James Gleick’s Chaos: Making a New Science would become a bestseller. The book, which marks its 30th anniversary this year, celebrated its subject, beginning with the ideas of mathematician and meteorologist Edward Lorenz. In 1961 Lorenz had noticed that over extended periods of time, his model of weather patterns behaved differently when its initial conditions were varied only slightly. Although such a phenomenon was not new to mathematicians—the French mathematician Henri Poincaré had written about it at the turn of the 20th century—it came as a shock to many scientists. Storm conditions today, Lorenz suggested, might have been caused several weeks ago by a butterfly flapping its wings in Brazil. Butterfly effect was the term he coined to reinforce the metaphor.
If a mathematical term is to catch fire with general readers, it must spark their imagination. A powerful image helps. In the case of chaos, Lorenz himself had supplied it. It was a bundle of curves, today called the Lorenz attractor, suggesting the infinite number of solution curves to a system of three differential equations. And it resembled the two wings of a butterfly. Start at any point of one of its solution curves and follow around, and you visit the two wings successively in some infinite pattern. Start at a nearby point on a different curve and the pattern might become wildly different after some time. The Lorenz attractor became the emblem of a new and lasting field, chaos theory.
Choosing Words, Sometimes with Care
Poorly chosen words and phrases can interfere with the progress of mathematics. René Descartes showed us how.
While pondering solutions to algebraic equations, Descartes was compelled to consider the possibility that some numbers when multiplied by themselves could give a negative result. Certainly no “real numbers,” that is, no numbers on the familiar number line, behave that way. Descartes called the numbers imaginaire (imaginary). In La Géométrie, his effort in 1637 to unify geometry and algebra, he explained that “true or false roots can be real or imaginary.”
The expression imaginary number caught on. Carl Friedrich Gauss, one of the greatest mathematicians of all time, despised it. In 1831 Gauss wrote, “If this subject...[has been] enveloped in mystery and surrounded by darkness, it is largely an unsuitable terminology which should be blamed.”
Gauss preferred the less censorious term complex numbers, which includes both ordinary (real) numbers and imaginary numbers appearing together in a single expression, such as two plus the square root of negative three. Regrettably, Descartes’s coinage remains in circulation, adding to the handicap that mathematics teachers endure as they try to convince some students that complex numbers are more than imaginary, having significant applications throughout the sciences.
In 1670 Isaac Newton contributed the intensely bothersome words fluents, fluxions, and even ffluxions. They were intended to describe the path and velocity of fluid in motion, but defining them rigorously proved too difficult even for the Cambridge genius. For more than a century mathematicians tried and failed to clarify the meanings of these words with their implied metaphysical notions of time. During the 1800s, rigorous and effective definitions, those of limit and derivative, were finally developed without the mention of time, and mathematicians stopped using Newton’s f-words.
British mathematicians of the 19th century loved inventing new words and phrases for mathematical concepts. Unfortunately, they got off to a rather bad start.
In 1801 a book by Cambridge professor John Colson, who held the Lucasian Chair of Mathematics (earlier held by Newton and later by Stephen Hawking) was published as an English translation of Instituzioni analitiche ad uso della gioventú italiana (Foundations of Analysis for the Use of Italian Youth), a textbook about calculus written by Maria Agnesi in 1748. It is a pity that Colson didn’t know much Italian. He learned just enough to follow the path of translation, dropping a hazardous rock onto the road along the way.
In her book Agnesi had described a particular curve, referring to it as “la curva...dicesi la Versiera.” The word versiera was an adaptation by another Italian author, Guido Grandi, from the Latin word versoria, meaning “a rope that turns a sail.” It was a helpful image. Colson could not find Agnesi’s “la versiera,” because it was not in any dictionary. He used the closest word that he could find, l’avversiera.
In Italian l’avversiera means “the witch” or “the she-devil.” Colson’s text thus referred to “the equation of the curve to be described, which is vulgarly called the Witch.” Today’s calculus textbooks continue to use the term Witch of Agnesi, and students continue to stare at the curve and wonder what demonic forces shaped it. It is ironic that Agnesi was a devout woman who spent most of her adult life aiding the poor.
No British mathematician was a greater wordsmith than James Joseph Sylvester. Born in London in 1814, he attended Cambridge University but could not be awarded a degree because, as a Jew, he did not subscribe to the Thirty-Nine Articles of Religion of the Anglican Church. He managed to support himself by teaching at the secular University College London and working as an actuary. Finally, in 1876, Sylvester’s career reached its full promise when he was appointed to a professorship at the new Johns Hopkins University in Baltimore, Maryland. There he began the United States’ first mathematics research department and its first mathematics research journal, the aforementioned American Journal of Mathematics.
Sylvester loved language almost as much as mathematics. He composed unappreciated poetry, and in 1870 he proudly self-published a slim volume, The Laws of Verse, in which he proposed rules for effective versification. Not surprisingly, Sylvester coined many mathematical words. At the end of his article “On a Theory of the Syzygetic Relations of Two Rational Integral Functions,” published in 1853, he attached a glossary of “New or unusual Terms, used in a new or unusual sense in the preceding Memoir.” It began with allotrious, apocopated, bezoutic, sprinkled monotheme, perimetrical, rhizoristic along the way, and finished up with umbral, weight, and zeta.
Most of Sylvester’s words have been forgotten, but some have survived. Perhaps his most notable contribution to mathematic’s lexicon is matrix, a square or rectangular arrangement of terms in rows and columns. It is a Latin word that means womb. Sylvester was most interested in the case of a square matrix, one for which the numbers of rows and columns are equal. Because a rectangular matrix can give birth, so to speak, to a square matrix by striking out unwanted rows or columns, matrix, with its suggestion of fertility, seemed appropriate.
The word matrix lives on in mathematics at all levels. And like chaos, it has captured popular imagination. Sylvester would have been delighted to know that at the end of the 20th century both a Hollywood science-fiction film and a compact car would carry the name.
A Picture Worth 1,000 Symbols
The symbols of mathematics appear to be separate from the words alongside them. In fact, they have evolved from words. The 19th-century German philologist and historian Heinrich Nesselmann was the first to recognize this concept. He identified three stages of their evolution: rhetorical, syncopated, and symbolic.
An illustration of Nesselmann’s theory is furnished by the humble minus sign that we use for subtraction. In medieval Europe the operation of subtraction was written out; we find it recorded as minus (Latin), moins (French), or meno (Italian). However, by the 15th century, the word had been syncopated, shortened to m–. The symbol – began to replace m– as early as 1489, the year that Johannes Widmann published a book of commercial arithmetic with the phrase (in translation): “What – is, that is less, and the + is more.”
It is a common and uncomfortable experience for someone presenting a pictorial argument to hear a skeptic ask, “Is that really a proof?”
No matter what their origin, symbols have been a source of mystery for mathematicians. They do more than merely stand in for words. Gottfried Wilhelm Leibniz, who shares with Newton credit for discovering calculus, believed it. Leibniz was so smitten by symbols that he dreamed of a purely symbolic language, one with which nations might someday settle arguments, using computation rather than swords and cannon. He imagined an alphabet of ideas.
Leibniz never found his universal language, but others have had success searching for ideographic languages with more specialized functions. The German mathematician and philosopher Gottlob Frege thought that he had found a way to communicate with just symbols. In 1879 he published Begriffsschrift, an 88-page booklet in which the quantifiers of formal logic first appeared. Frege described his work as “a formula language, modeled on that of arithmetic, of pure thought.” Diagrams stretched not only across its pages but up and down them as well.
Today Frege’s work is regarded by many as the most important single work in logic. However, in its day, the book was derided. Logician John Venn (remembered today for his eponymous diagrams) described Begriffsschrift as “cumbersome and inconvenient.” Another influential logician, Ernst Schröder, called it a “monstrous waste of space” and complained that it “indulges in the Japanese custom of writing vertically.”
Frege faced resistance not just from readers. His two-dimensional formulas and other exotic symbols precipitated complaints from his typesetter. “After all, the convenience of the typesetter is certainly not the summum bonum [highest good],” Frege argued some years later. Costs associated with typesetting, once a bane for mathematicians, have disappeared today thanks to effective software that enables authors to create camera-ready manuscripts for journals and periodicals. Nevertheless, the mathematical community’s reluctance to adopt pictorial arguments has slowed their acceptance.
Pictures have accompanied mathematical proofs since the days of Euclid. But a picture can mislead us by suggesting that the special case it illustrates is sufficiently general for our argument. Beginning in the late 19th century, intuition-defying examples from the expanding subject of topology reinforced doubts about our spatial intuition and proofs that rely on them. Giusseppe Peano’s space-filling curve was one such example: Try to imagine an unbroken curve inside a square that does not miss a single point. Few can, but Peano could. He constructed such a curve using an infinite recursive process. No picture can fully describe it. (More about Peano can be found in “Crinkly Curves,” Computing Science, May–June 2013.)
Mathematicians’ reluctance to accept images in place of words has softened but not vanished. It is a common and uncomfortable experience for someone presenting a pictorial argument to hear a skeptic ask, “Is that really a proof?” Predrag Cvitanović of Georgia Institute of Technology knows the experience. He recalls the taunt of a colleague staring at the pictograms that he had left on a blackboard: “What are these birdtracks?” Cvitanović liked the ornithological term so much that he decided to adopt it for the name of his new notation.
So what are these birdtracks? Briefly, they are combinations of dots, lines, boxes, arrows, and other symbols, letters of a diagrammatic language for a type of algebra. They were inspired by the famous paper about QED, written in 1948 by physicist Richard Feynmann, and also later articles by mathematical physicist Roger Penrose. As Cvitanović explained in his 1984 book, Group Theory: Birdtracks, Lie’s, and Exceptional Groups, the diagrams represent an evolution of language. They are not merely mnemonic devices or an aid for computation. Rather, they are “everything—unlike Feynman diagrams, here all calculations are carried out in terms of birdtracks, from start to finish.” Could one perform the calculations without them? Yes, but as Cvitanović warns the reader, it would be like speaking Italian without using your hands.
Birdtracks are not the only picture-language game in town. Others have been, and are being, invented for different purposes. Louis H. Kauffman, a mathematician at the University of Illinois at Chicago and one of the most inventive and influential topologists of our time, uses a variety of new diagrammatic languages for the study of knots. An algebraist familiar with birdtracks would recognize much but not all of what she might read in Kauffman’s book Formal Knot Theory, much as a traveler might understand spoken cognates of a foreign tongue.
Planar algebras are another significant picture language. Jones (the one with the big black dot mentioned earlier) introduced them in 1999, and they provide a general setting for important quantities in the study of knots. The basic pictures of the language are planar tangles—disks with smaller disks inside them—connected by line segments and decorated with stars and shading. Planar tangles can be combined to form new characters. The properties they exhibit mirror those of different algebraic and topological structures that are already familiar to researchers. Consequently, planar algebras have a variety of applications.
Birdtracks and planar algebras are picture-languages that draw their initial inspiration from physics. Yet another is quon language, first introduced in December 2016 on arXiv.org, a repository of online research-paper preprints that is used by scientists throughout the world. Quon language, created by Harvard University mathematicians Zhengwei Liu, Alex Wozniakowski, and Arthur M. Jaffe, is derived from three-dimensional pictorial representations of particlelike excitations and transformations that act on them. An earlier, simpler version has much in common with the languages of Cvitanović and Kauffman.
According to its inventors, the quon language can do more than aid in the study of quantum information. It is also a language for algebra and topology, with the ability to prove theorems in both subjects. In an interview with the Harvard Gazette, Jaffe remarked, “So this pictorial language for mathematics can give you insights and a way of thinking that you don’t see in the usual, algebraic way of approaching mathematics.” He added that “It turns out one picture is worth 1,000 symbols.”
Not Just Another Language
Something strange is indeed happening in mathematics seminar rooms today, but it amounts to more than amusing sights and sounds. Mathematicians are attempting to break through the barriers of traditional language in order to think more deeply about fundamental questions. Their strange words and images are attracting attention, motivating all of us to learn more about them.
Leibniz was so smitten with symbols that he dreamed of a purely symbolic language, one with which nations might someday settle arguments, using computation rather than swords and cannon.
In a series of lectures at Cornell University in 1965, Richard Feynman contemplated the effectiveness of mathematics in science. He sympathized with the lay reader who asked why it was not possible to explain mathematical ideas with ordinary language. Correcting Gibbs, who started our discussion, Feynman replied that it is “because mathematics is not just another language.” Simply put, mathematics is more general than any language that tries to express it.
Traditional methods of learning mathematics are discursive, demanding a sequential, step-by-step understanding. Assuming that a lesson succeeds, there is a moment of “aha!” when lights turn on and the room is illuminated for us. One day it might become possible to flip on the light switch as soon as we enter the room. Philosopher and logician Susanne K. Langer once called for a revolution in our modes of communication, moving beyond our “tiny, grammar-bound island.” Our journey from words to symbols to picture language is bringing Langer’s revolution just a bit closer.
- Cvitanović, P. 2008. Group Theory: Birdtracks, Lie’s, and Exceptional Groups. Princeton, NJ: Princeton University Press.
- Feynman, R. 1965. The Character of Physical Law. London: Cox and Wyman.
- Gleick, J. 1987. Chaos: Making a New Science. New York: Penguin.
- Hadamard, J. 1945. The Psychology of Invention in the Mathematical Field. Princeton, NJ: Princeton University Press.
- Jones, V. F. R. 1999. Planar algebras, I. arXiv:math/9909027v1.
- Kauffman, L. H. 1991. Knots and Physics. Singapore: World Scientific.
- Langer, S. K. 1942. Philosophy in a New Key. Cambridge, MA: Harvard University Press.
- Li, T-Y. L., and J. A. Yorke. 1975. Period three implies chaos. American Mathematical Monthly 82:985–992.
- Liu, Z., A. Wozniakowski, and A. M. Jaffe. 2017. Quon 3D language for quantum information. Proceedings of the National Academy of Sciences of the U.S.A. 114:2447–2502.
- Sylvester, J. J. 1853. On a theory of the syzygetic relations of two rational integral functions. Philosophical Transactions of the Royal Society of London 143:407–548.
|
<urn:uuid:520c7664-c1f1-4e10-a542-446bc160327a>
|
CC-MAIN-2020-16
|
https://www.americanscientist.org/article/the-new-language-of-mathematics
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370526982.53/warc/CC-MAIN-20200404231315-20200405021315-00331.warc.gz
|
en
| 0.956136 | 6,254 | 3.328125 | 3 |
Set formed by 4 metallic boards (plastic frame). Size: 30 x 26cm.The white side is for the felt pen use and the black side is for the chalk. The magnetic numbers andRead More
A set of three models of progressive puzzles with a different number of pieces to stage the level of difficulty and develop skills and attention. Each puzzle has a different pictureRead More
To discover in a pleasant way notions of balance, equivalence and first notions of maths: The term by term correspondences. Number decomposition. The approximation to first maths’ operations: adding upRead More
Abacus formed by 5 columns and with a complete assortment of balls and colors.Accompanied by interesting activities to exercise the identification and learning in the child. From 3 years.
This abacus incorporates colors and geometric shaped solid blocks. This toy supports both physical and intellectual development; such as improved attention and logical reasoning. The solid blocks help to improve dexterity.
Geometric Disks / Stacking & Sorting. This abacus has 5 columns and an assortment of 10 different geometric-shaped disks in different colors. This toy includes activity patterns that promote eye-hand coordination asRead More
Abacus formed by 5 columns and with a complete assortment of forms and colors.Accompanied by interesting activities to exercise the identification and learning in the child.
Made up of 6 columns and 90 cubes.This helps to understand the concept of numbers and basic mathematical operations.It can be completely taken apart for better versatility.
|
<urn:uuid:7354f0b4-a702-4f86-bf3e-b85de8767557>
|
CC-MAIN-2021-31
|
https://schoolboxplus.com/product-category/publishers/miniland-toys-and-gadgets/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154053.17/warc/CC-MAIN-20210731043043-20210731073043-00011.warc.gz
|
en
| 0.923529 | 308 | 2.78125 | 3 |
Proceedings from the WHO Conference on the Health Aspects of the Tsunami Disaster in Asia
Phuket, Thailand, 4-6 May 2005
The key role of voluntary bodies in preparedness and response
35. Voluntary bodies - including civil society organizations, the Red Cross and Red Crescent movement, and nongovernmental organizations - make a major contribution to international and local humanitarian responses. They have been a driving force in defining both humanitarianism and the standards that govern its application. The major international and national voluntary agencies are professional, committed and well resourced, have extensive networks of partnerships and collaborations with civil society, and operate at the local level, often in remote areas, frequently working with groups that tend to be marginalized. Indigenous voluntary bodies also have cultural and social knowledge that is crucial in the planning and implementation of ethically sound humanitarian operations. Professionals from the Red Cross and Red Crescent movement, as well as well-functioning NGOs, can make crucial contributions to preparedness and response efforts. Coordination among NGOs and other groups should be time-efficient and result in the needs-based deployment of available resources. WHO should work with NGOs to agree on more efficient and effective means for health coordination.
36. However, voluntary bodies are also relatively lightly regulated and many lack the essential expertise, and professional codes of conduct, that are essential to minimize the likelihood that their actions will be counterproductive. This lack of codes may be compounded by high staff turnover: in such circumstances, lessons may not be institutionalized.
37. The interface between the voluntary and government sectors is sometimes tense, with lack of clarity on mutual roles, obligations, and accountabilities. While much more can be done to strengthen the capacity of voluntary agencies and the standards to which they adhere, their autonomy also needs to be respected. At the same time, government capacity to monitor performance standards of NGO partners needs to be enhanced.
|
<urn:uuid:dd8aca7d-f5ce-4099-99a5-a5068795c63c>
|
CC-MAIN-2016-30
|
http://www.who.int/hac/events/tsunamiconf/proceedings/en/index7.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824757.8/warc/CC-MAIN-20160723071024-00067-ip-10-185-27-174.ec2.internal.warc.gz
|
en
| 0.953747 | 385 | 2.8125 | 3 |
An important aspect of every child’s well-being is participating in some sort of sport activity which can promote health and social benefits for them. Parents should consider which sport will benefit their child the most, depending on their personality and preferences. Many other factors can also play a role in that decision. Certain benefits will be more prominent in some sports activities than others, as well as risk factors that should also be carefully considered.
Most practiced popular sports
Soccer is widely popular within the youth in America, Europe, Asia and Australia. It represents the most commercial sport worldwide these days. A child practicing soccer will benefit in improving their endurance, and maintaining good cardiovascular health. This is mostly because of the constant movement and running when playing soccer. Other significant benefits is the balance and the foot dexterity improvements. Risk factors are the common ankle twists and even concussions due to ball-heading. Safety tips to consider are prohibiting ball-heading, and being sure to require 2-3 days’ rest between each game played.
Cheerleading may be more common amongst girls, but boys participate as well. It builds up the feeling of teamwork, as well as flexibility and agility in a child. It is a sport requiring movement of the whole body, as all of the muscles are occupied. Risk appears in more advanced phases where the sport demands more gymnastics, and in turn, more muscles, tendons and ligaments may suffer. Falls and concussions may also occur. Secure your child’s safety by choosing the right, certified coach and make sure your child lets you know if they experience any pain or injury.
Football is a team sport that teaches the importance of discipline as a result of the intense and long trainings. It helps build up team spirit and gives kids a sense of belongingness. Problems occurs with concussions and deep bruises, sometimes even with temper management on the field. Keep your children safe by purchasing quality pads and helmets and making sure that they are supervised by qualified staff.
Basketball is a great sport that helps improves the eye-to-hand coordination and endurance. The most common injuries are hamstrings being pulled, occasional eye pokes, and knee problems. It is advised for the player to stretch properly before playing, and to learn how to land properly after a jump.
Less popular, but equally beneficial sports
Although a less mainstream group sport, lacrosse builds up confidence in children. Injuries are rare, and the most common are bruises or an occasional ankle twist or shoulder injury. The quality of the helmets and the pads used is important. Hockey requires some extra equipment and conditions, but gives back a great deal in weight-loss, endurance, and strength. With the thick pads and proper body pads, a lost tooth will probably be the worst you can expect. Again, good equipment secures good results here as well. With occasional elbow and shoulder injuries, baseball teaches a sense of focus and patience, with relatively minor injuries such as a few scrapes and bruises.
What sports do your children participate in? What are some of the benefits or risks involved? Please leave your comments below:
|
<urn:uuid:1124cc0d-743c-4b08-ae36-e878263b12b3>
|
CC-MAIN-2018-34
|
http://www.saferchild.org/sports-for-children/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213508.60/warc/CC-MAIN-20180818075745-20180818095745-00344.warc.gz
|
en
| 0.960783 | 633 | 3.234375 | 3 |
Thyristor power-control devices must be accompanied by a circuit that provides pulses of current to the gate terminal to cause the thyristors to turn on.
The UJT is one of the more common trigger devices used in conjunction with thyristor power-control devices.
The UJT is the simplest of all the trigger devices. It is a three-terminal silicon device with only one semiconductor junction, hence the term ‘unijunction’.
The UJT consists of a lightly doped n-type wafer of semiconductor material known as the ‘channel’. A small current flow is established in this channel to set up internal voltage drops that are the key to the operation of the UJT.
Diffused into the channel is a heavily doped p-type region known as the ‘emitter’. It provides the current carriers for the current pulse produced by a UJT. The construction and graphical symbol are shown in Figure 1.
Figure 1 UJT construction and symbol
The UJT is used extensively as a triggering device for thyristors.
A simple way to examine the operation of the UJT is to consider it to be a voltage divider and a p–n diode. The manner in which the device is manufactured is such that the interbase resistance, that is, the resistance between base 1 and base 2, is high. This value will be in the range 5 to 10 kΩ. The interbase current will therefore be very low, only a few milliamps. This current establishes a voltage drop across the internal resistance of the device (rB1 and rB2).
The relative values of rB1 and rB2 are dependent on the physical location of the emitter region in relation to the ends of the channel. The polarity of these voltage drops is shown in Figure 2.
Figure 2 UJT internal voltage drops diagram
The relative values of the voltage drops in the UJT are dependent on the relative values of the internal resistances. The ratio of rB1 to the total interbase resistance (rB1 + rB2) will fix the value of the voltage at the cathode terminal of the emitter base junction.
This voltage will be between 0.5 and 0.85 of the base-to-base voltage (VBB). The ratio of rB1 to (rB1 + rB2) is known as the ‘intrinsic standoff ratio’ (η). This value is fixed at manufacture and cannot be altered.
Under the bias conditions specified above, a very small leakage current flows out of the emitter terminal and returns to the negative of the supply. This current is very small and is usually ignored.
If a supply is connected to bias the emitter with respect to base 1, this leakage current will decrease as the emitter base voltage increases. When the emitter base voltage is equal to the internal voltage drop across rB1 the emitter current will be zero.
As the emitter voltage becomes more positive, the emitter becomes forward biased. When the emitter voltage is 0.5 V greater than VrB1, the emitter conducts heavily. This results in very large numbers of current carriers being injected into the channel.
The resistance of the channel (rB1) decreases rapidly to a value that may be as low as a few hundred ohms. The emitter voltage at which this conduction takes place is termed the ‘peak point voltage’ (Vp).
The current flow under this set of conditions is shown in Figure 3 overleaf.
Figure 3 UJT emitter current configuration circuit diagram
The peak point voltage will be determined by the supply voltage (VBB) and the standoff ratio (η).
Assume that the UJT in Figure 3 has a standoff ratio of 0.65 and the supply voltage is 20.0 V. Determine the peak point voltage for the UJT.
It is important to remember that the standoff ratio is fixed and that the peak point voltage is determined by the supply voltage. If a different peak point voltage is required, the supply voltage may be altered or a UJT with a different standoff ratio substituted.
The characteristics of the UJT make it ideal for use in a circuit intended to trigger thyristor power-control devices. If the UJT is used in conjunction with an RC timing circuit it will produce an output that consists of short duration pulses with a very fast rise time, ideal for the triggering of SCRs, GTO thyristors and triacs.
From the emitter characteristic (V–I) curve shown in Figure 4 it can be seen that the resistance of the UJT (emitter to base B1) decreases significantly once the peak point voltage is reached. The decrease occurs quite rapidly.
Figure 4 UJT emitter characteristics curve
UJT Relaxation Oscillator
The circuit shown in Figure 5 is applicable to low-level power-control applications with SCRs and triacs. The only modification to the circuit may be to use a pulse transformer.
Figure 5 UJT relaxation oscillator circuit diagram
The circuit consists of the UJT and an RC timing circuit. When the supply to the timing circuit is first turned on, the voltage across the capacitor will increase at a rate determined by the values of the resistor and the capacitor.
The time taken for the capacitor voltage to reach 63 per cent of the supply voltage is referred to as the time constant (τ) of the circuit. The time may be modified by varying either the value of the resistor or the value of the capacitor. In practice it is found that it is easier to alter the value of the resistor.
UJT Relaxation Oscillator Operation
The operation of a UJT relaxation oscillator is straightforward and may be summarized as follows:
- When the supply is first turned on, the capacitor charges via the variable resistor RV1 at a rate deter-mined by the setting of the resistor and the size of the capacitor.
- When the capacitor voltage is equal to the peak point voltage, the emitter conducts. The emitter will conduct heavily, with the internal resistance of the UJT falling to a very low value.
- When the emitter conducts, the capacitor will discharge through the UJT and R1. The resistance of the discharge path is much lower than that of the charging path, so the capacitor will discharge much more quickly than it charges.
- The resulting current through R1 develops the output voltage pulse required to trigger an SCR or a triac. Since the discharge time for the capacitor is very short, the current will have a relatively high peak value and a fast rise time.
- Altering the value of RV1 will only change the time it takes for the capacitor to charge to the peak point voltage. It does not alter the peak point voltage. Altering the time constant of the circuit will alter the frequency of the output pulses from the oscillator.
- When the capacitor has discharged, the UJT will relax back to the off state, hence the name relaxation oscillator. The cycle then recommences.
If VBB is equal to 15 V in the circuit in Figure 5, and the standoff ratio is 0.63, determine the peak point voltage.
The frequency of the pulses from this circuit will depend on the time constant. The actual calculation of frequency can be complex but if the standoff ratio is equal to, or near, 0.63, the frequency may be determined from a simplified expression:
In the circuit in Figure 5, determine the output frequency if the standoff ratio is 0.63, the value of RV1 is 10 kΩ and the capacitance is 0.1 μF.
Determine the frequency if RV1 is set to 7.5 kΩ.
It is worth noting that in most cases when a relaxation oscillator is used as a trigger circuit for thyristors, the calculation of frequency is not important.
What is more important is the time delay from the start of a cycle to the point where a trigger pulse is delivered to the thyristor. This time delay will determine both the average value and the RMS value of load voltage, and hence the load power.
The waveforms produced by the relaxation oscillator are shown in Figure 6.
Figure 6 Relaxation oscillator waveforms
The amount of energy in the output trigger pulse is an important consideration in the triggering of thyristors. The energy in the trigger pulse produced by a UJT relaxation oscillator may be increased by increasing the value of the capacitor in the RC timing circuit. However, there is a practical limit to the current that the UJT can carry. If the capacitance is too high, the UJT might be damaged.
The UJT relaxation oscillator has two major disadvantages:
- The standoff ratio is fixed and can only be changed by changing the UJT itself. However, this will produce only limited changes.
- The UJT might not be able to deliver sufficient energy to trigger large, high current thyristors.
|
<urn:uuid:1136c11c-c513-4169-8b35-fd658204a4f0>
|
CC-MAIN-2021-21
|
https://electricalacademia.com/electronics/unijunction-transistor-ujt-construction-operation-characteristics-relaxation-oscillator/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990551.51/warc/CC-MAIN-20210515161657-20210515191657-00488.warc.gz
|
en
| 0.904601 | 1,906 | 3.484375 | 3 |
Why have cultures developed similar strategies, architecture, and stories in different places across
the globe? Author Don Landis presents a diffusionist model that traces the lines back to the Genesis creation account. Interpreting
why Biblical Christian symbols such as mountains, rainbows, and the Sun (Son) have been used in "pagan" religious
practices, discover how their use of such natural objects is part of Satan's "counterfeit" of God's plan.
108 pages, hardcover.
Answer in Genesis's "The True Account of Adam and Eve" integrates modern
issues into this foundational story at an age-appropriate level. Referencing Creationist scholars will provide some level
of scientific credibility to children; evolutionist beliefs are highlighted as untrue in the face of the Bible account; and
Adam and Eve are used as a reason why marriage is only for male & female, specifically noting that God did not make two
men. Linking the sin in the garden to sin in the world today, parents will find many of the key issues they want to teach
their children embedded in this re-telling of Genesis. 55 pages, hardcover. Ages 12 & up.
With World Religions at Your
Fingertips, readers can quickly learn anything they need to know about Buddhism, Christianity, Hinduism, Islam, Judaism,
Mormonism, Shinto, Sikhism, Taoism and more. From reincarnation to resurrection, the Four Noble Truths to the Ten Commandments,
this book covers the gamut of religious concepts and beliefs throughout the world in concise bites that are easy to find and
simple to understand.
Growing up, Nabeel Qureshi never thought he would consider
turning from his family's deeply held beliefs in Islam. It was his whole world, his identity. Yet, as he grew
into a young man earnestly seeking for God to speak into his life, he was surprised by what he found. What he found
was a growing question about the divinity of Jesus, which ultimately lead to his conversion to Christianity. In Seeking
Allah, Finding Jesus, Nabeel shares the powerful story of his journey from faith in Allah to faith in Jesus
Christ. Along the way, he gives valuable insight into Islam, sharing cultural, intellectual and theological barriers
that often stand in the way of Muslims accepting Jesus. However, despite his objections to Christianity, it was the
friendship of Christians, the historical facts of the life of Jesus, and divine revelation that convinced Nabeel of the truth
of the Gospel. Nebeel's testimony will deepen your understanding of American Muslims and draw you closer to Jesus
as you consider the amazing ways He works today.
Many people, even Christians,
fear growing older. We don't like to think about losing independence and control in our lives, but perhaps learning to
accept these changes is the first step in dealing with them. Graham also discusses the importance of building strong foundations
in relationships, facing life's transitions with trust, and understanding our glorious hope in Jesus. Join Billy as he
shares the challenges of fading strength, but still standing strong in his commitment to finishing life well.
In wartime Holland,
the Ten Boom family quietly sheltered Jews in their small house---until Nazis discovered the "hiding place." This
is the remarkable true story of Corrie and her sister Betsie's endurance of the death camp, and their sure hope that God
alone is our true refuge. Starring Julie Harris, Eileen Heckart, and Arthur O'Connell. 2 hours, 20 minutes.
|
<urn:uuid:e171cc6b-046b-418f-8e05-95e9db05c73a>
|
CC-MAIN-2015-11
|
http://hallmarkbaptist.org/id26.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462577.56/warc/CC-MAIN-20150226074102-00276-ip-10-28-5-156.ec2.internal.warc.gz
|
en
| 0.950803 | 743 | 2.75 | 3 |
What Is It?
Cogan's syndrome is a rare, rheumatic disease characterized by inflammation of the ears and eyes. Cogan's syndrome can lead to vision difficulty, hearing loss and dizziness. The condition may also be associated with blood-vessel inflammation (called vasculitis) in other areas of the body that can cause major organ damage or, in a small number of cases, even death. It most commonly occurs in a person's 20s or 30s. The cause is not known. However, one theory is that it is an autoimmune disorder in which the body's immune system mistakenly attacks tissue in the eye and ear.
The most common symptoms of Cogan's syndrome include:
|
<urn:uuid:0f8d8003-d695-45fe-9bb4-50032c3bc472>
|
CC-MAIN-2018-17
|
https://www.health.harvard.edu/hearing/cogans-syndrome
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948064.80/warc/CC-MAIN-20180426031603-20180426051603-00060.warc.gz
|
en
| 0.970106 | 143 | 3.234375 | 3 |
Sail Boat - Know Of The Sail Boat9776280
Whenever a boat floats on water, there are many ways of keeping it moving. Oars, Paddles and Engines are one of the ways of pushing a boat forward on water. A sail boat uses the wind as the primary engine to advance throughout the water. Since a sail boat uses the wind, you will find no noisy engines with out smelly fumes. The sail boats appear in different sizes, covering anything from an individual craft to the luxury yacht.
Precisely What Is A Sail Boat Manufactured From?
Whatever be the size of a sail boat, all sail boats have certain common features. You may want to get aware of these essential parts of a sail boat as well as their functions. A sail boat has eight principal parts which helps in getting an exciting, but safe, sailing experience. The eight areas of a sail boat are;
1. Bow - The top area of the croatia charter
2. Stern - The back area of the sail boat
3. Tiller - The part that steers the sail boat
4. Deck - An portion of the boat where one can stand while sailing
5. Sail - A sheet that can help in capturing the wind to put the boat moving
6. Hull - Our bodies of the boat
7. Mast - The vertical pole structure that spreads the sail
8. Rigging - A host of ropes of lines that are connected to the sail and mast to aid in trimming and hoisting the sail, plus in governing the direction of your boat while sailing
The sail should indeed be the main section of the sail boat because this is what propels the boat over the waters. The direction from the boat is controlled through the swivelling in the sail while capturing the wind to relocate the boat forward.
What Should You Really Know To Set Sail?
Sailing is actually a skill which is earned through practice. It is additionally important that you are aware of the various areas of the boat and the way they help with your sailing expedition. You might sail solo (alone) or sail plus a number of 4 or 5 persons dependant upon the scale of the sail boat. In case you are sailing in the group, it will be of your advantage if some of them knew about handling the sail boat as much as possible. This is very important in the event the sea gets suddenly rough so you struggle to handle the sail boat alone.
You might should also ascertain the water conditions before you decide to set sail. The machine that you employ has to be checked for wear and tear or damages in order to ensure a safe and secure sailing.
|
<urn:uuid:716433cd-ea30-4771-882e-48bec6f6d5a0>
|
CC-MAIN-2020-50
|
http://winterer.ru/w/index.php?title=Sail_Boat_-_Know_Of_The_Sail_Boat9776280&oldid=13730
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141681524.75/warc/CC-MAIN-20201201200611-20201201230611-00198.warc.gz
|
en
| 0.952122 | 544 | 3.203125 | 3 |
Allied leaders at the Potsdam Conference (1945) divided Germany into four occupation zones—French in the southwest, British in the northwest, U.S. in the south, and Soviet in the east. Berlin which had been taken by the Red Army and surounded by the Soviet zone, was also divided into four sectors. In the Soviet or Eastern Zone there were numerous rapes of German women in the first days of occupation. This was rape on a massive scale and included children and elderly women. [Naimark] Large numbers of pregnacies must have occurred. I am not sure if the women involved sought abortions or how they viewed the resulting children. After the first days of occupation Red Army brought their soldiers under control. Looting continued for some time. An early priority of the Soviet occupation, as it was of the Western occupation, was to comb Germany for NAZI military technology and experts. The Government persued a policy of reparations which included shipping whole factories to Russia. Soviet occupation forces were not supplied like the Western forces and there was much more living off the land. [Dulles] Trading arrangements and bater deals during the occupation were heavily waited in the Soviets favor durig the occupation era. After Stalin died (1953) and the Soviets began the
de-Stalinization process with the 20th Party Congress, East German Communisyts began to complain to the Soviets that there policies were adversely affecting the DDR state and were in part responsible for people fleeing to the West. From 1945-1954, the Soviet forces based in Germany were titled the Group of Soviet Occupation Troops. From 1954-1989, they were designated the Group of Soviet Forces in Germany and from 1989-1994 they were known as the Western Group of Troops. The Soviets set up the German Deutsche Demokratische Republik (DDR), often referred to as East Germany (1949). The DDR was controlled by the Communist Party and governed until the fall of the Berlin Wallb(1989) brought about the collapse of the Communist state (1990). The GDR was proclaimed in the Soviet sector of Berlin (October 7, 1949). The Soviets announced they granted full sovereigty (1954), although Soviet troops remained in strength. The DDR joined the Warsaw Pact.
Berlin which had been taken by the Red Army and surounded by the Soviet zone, was also divided into four sectors. In the Soviet or Eastern Zone there were numerous rapes of German women in the first days of occupation. This was rape on a massive scale and included children and elderly women. [Naimark] Large numbers of pregnacies must have occurred. I am not sure if the women involved sought abortions or how they viewed the resulting children. This occurred in Berlin and other areas of the Reich conquered by the Soviets. I'm not sure to what extent this continued after the NAZI capitulation and VE Day (May 8, 1945).
Allied leaders at the Yalta and Potsdam Conference (1945) agreed on the division of Germany. The basic division was made at Yalta and further defined at Postdam. There woild be four occupation zones-—French in the southwest, British in the northwest, U.S. in the south, and Soviet in the east. The NAZIs leared that the Soviet Zone would obviously be in the east and the Elbe River would separate the Soviet and Western zones, at the time still three individual zones. Thus the Wehrmacht and many civilians during the last days of the War attempted to reach the Western Zone. The Germans had attempted to surrender to the Western allies, but Eisenhowe made it clear that only an unconditional surrender to all fout powers would be accepted.
The victorious allies adopted a plan to administer occupied Germany through a four-power Allied Control Council (ACC) composed of the United States, United Kingdom, France, and the Soviet Union. The plan was to adopt common policies for all four occupation zones. Apparently Roosevelt though this possible. It is unclear if Truman did also, but he had little time before Posdam to think it through or diplmatic experiences with the Soviet. Churchill is aifferent mtter. He has a better grasp on Stalin's character, but the realities of Soviet power meant that the effort had to be made. Stalin is a fifferent matter. He not doubt understood clearly that the joint policies could never be reached. We believe his assessment that the americans would leave shortly as they had sone after world war I and the reality of soviet power would mean a Soviet dominanted Europe. This is just our assessment. As far as we know, he did not reveal his calculations tgo anyone. At least there is no record of such discussions.
After the first days of occupation and rapant rape of German Union and looting, the Red Army brought their soldiers under control. Looting continued for some time. Soviet soldiers were well known for demanding “uru, uru” from all German people around; “uru” is a misspelling and mispronounsation of the German word “Uhr”, which means wrist-watch or pocket-watch. The Soviet Zone included the Länder (states) of Mecklenburg, Brandenburg, Saxony, Saxony-Anhalt, Thuringia, as well as the eastern part of Berlin.
An early priority of the Soviet occupation, as it was of the Western occupation, was to comb Germany for NAZI military technology and experts. The Allies were even able to do this in the Soviet Zone because Western armies had reached areas in the east there were to be part of the Soviet Zone. The Americans thus got many of the top German scientists, many of which were smart enough to know their future was more promising with the Americans. Many scientists decided to maintain ties with family and friends and thus retuned hime. Their furure would thus depend on where home was located. The NAZI arms industry and scietific establishmentwas so massive, that both the Americans and Soviets got many highly competent scientists. The British fewer.
After the NAZI surreder (May 1945), the different occupation powers quickly assumed authority in their respective zones (by June 1945). The initial plan was fir Allied and Soviet powers to adopt and pursue a common occupation policy, focused. Some policy goals were shared by Allies ans Soviets, such as denazification and demilitarization. The Allies and Soviets had, however, very different objectives. Allied policy as it developed was to prepare Germany to eventual joining Europe as a responsible, independent and democratic nation. Nothing could have been more different than Soviet (meaning stalin's) objectives. The allies were not in complete areement on occupation policies, but all three of the Allies were differed fundamentally with Soviert objectives. It did not take long for the idea of a unified occupation policy to collapse. The Soviets and Allies developed theor own policies. Besides the political differences, one of the major differences was the issue of reparations. The Soviet Government persued a policy of reparations which included shipping whole factories to the Soviet Union. The NAZIs had devestated the western Soviet Union, Along with apauling attrocities, the NAZIs implemented a scorched earth policy, destroying factories, schools, hospitals, public buildings, as wekll as homes as they retreated west. The Soviets sought to use German factory equipment to help rebuild the Soviet economy. TThis is not to say there were no reparations in the Western zones, but the Soviet used reparations to a far greater extent than the Allies. They began disassembling the German industry that had survived the Allied bombing and shipping it back to the soviet Union. They focused on arms industries and industries owned by the NAZI state. Also targeted were factories owned by NAZI party members and by war criminals were confiscated. One estimate suggesta that the industries seized by the soviets consisted of approximately 60 percent of the total industrial capacity in the Soviet occupation zone. The remaining heavy industry (some 20 percent of total production) was claimed by the Soviet authorities.
The new Sowjetische Aktiengesellschaften -- SAG (Soviet joint stock companies) were created for many industries not shipped to the Soviet Union. The remaining industries not confiscated were was nationalized, some 40 percent of total industrial production was left in private hands. It is unclear how beneficial the disassembled factories were to the Soviets. A German reader tells us, "It is said that then in Russia the machines got rusty as the Russians were not able to resettle them anymore." Soviet occupation forces were not supplied like the Western forces and there was much more living off the land. [Dulles] Trading arrangements and bater deals during the occupation were heavily waited in the Soviets favor durig the occupation era. The Soviet Zone (the future DDR) would have had seriously problems competing with the Western Zone (future DFR). The Sovit Zine was a largely agricultural area and the Soviet reparations further reduced the industrial sector. The East Germans during the Cold War would blame their economic performance on the Soviet reparations. This was certainly part of the problem, but it does not seemed to have dawned on dedicated Communiusts that Communism itself was at the heart of their pronlems.
Much of the retail trade in the Soviet sector was turned over to two state-owned concerns (Konsum and Handelsorganisation -HO-) which were given a range of preferences.
The Soviets implemented a Bodenreforman (agrarian reform). It was interestingly different than standard Foviet lines. Not all the land was collectivized. We are not sure why a degree of peasant agriculture was allowed. The Soviets expropriated the land belonging to former NAZIs and identified war criminals. Private land ownership was restricted to a maximum of 1 km². About 500 Junker estates were converted into the Landwirtschaftliche Produktionsgenossenschaft (people's collective farms --LPG). Some 30,000 km² were distributed among 500,000 peasant farmers, agricultural laborers, and refugees. This mean very small, subsistence plots. The land owners received no compensation. Only active anti-Nazis were compensated and this mean a very small number. Soviet military authorities completed the agrarian reform through their zone (September 1947). A Soviet report detailing their accomplishments detailed 12,355 estates, totaling 6,000,000 acres (24,000 km2) which they seized and redistributed to 119,000 families of landless farmers, 83,000 refugee families, and some 300,000 in other categories. State farms were set up and called Volkseigenes Gut (People's Owned Property). We are not sure yet how the Bodenreforman affected farm productivity. Normally productiviy dclined, but we do not yet have any data.
The Soviets began introducing a range of democratic and free market institutions in the Western (US, UK, and French) Zone. These reforms were unacceptable to the Soviets and German Communist leaders they were installing in their sector. As a result, the Soviets withdrew from the ACC (1948).
The status of West Berlin set deep in the Soviet sector became an especially contentious issue. Soviet and German Comminists objected to the obvious display of West German prosperity and political democracy. This led to many East Germans to flee to the West through Berlin. The Soviets deciced to force the West out by blockading West Berlin. Denied food and fuel, the Soviets assumed the West would have to abandon Berlin. President Truman's response was the Berlin Air Lift.
The Soviets set up the German Deutsche Demokratische Republik (DDR), often referred to as East Germany (1949). The DDR became a a socialist republic and was accepted into the Warsaw Pact. The first DDR leader was Walter Ulbricht. The East German Constitution defined the country as "a Republic of Workers and Peasants." The term socialist republic is misleading as socialism is an economic theory. he DDR was essentially a police state maintained by a very effective secret police the Stazi. There were sham elections, but power was in the hands of the Communist Party which appointed governing officials. The governing party was the “Sozialistische Einheitspartei in Deutschland” (SED). Germant today still has the successor-- “Partei des demokratischen Sozialismus” (PDS). They have in 2005 three parliament members in the Federal Parliament – Bundestag - in Berlin and even with some ministers in the government of Eastern states. The Einheitspartei” (United Party) was formed about 1950 when the Soviets and the East-German communists forced the eastern Social Democratic Party to unite with the Communists. Not only could DDR citizens not elect government officials, but basic civil rights were resticted, especially freedom of speech. Free trade unions were not allowed. The judicial system was also controlled by the Communist Party meaning there was no rule of law. The DDR did, however provide a range of social services, including education and healt care and a guaranteed job. Access to education was affected by a person's social-class background. Many in Eastern Germany today have found it difficult to adjust to a free market and the more narrow range of social services.
The DDR governed East Germany until the fall of the Berlin Wall (1989) brought about the collapse of the Communist state (1990). The GDR was proclaimed in the Soviet sector of Berlin (October 7, 1949). he Western Occupation Zones were united to form the Federal Republic of Germany (FRG), commonly referred to as West Germany. West Germany became a liberal parliamentary democracy and was accepted into NATO.
The working class in Germany before the NAZIs had been heavily politicied by left-wing politicians. Thus many workers in the Soviet occupation zone were willing to give socialism a chance. There were many true believers. Many would have acceoted Communist political control if they delivered on material benefits. Communists throughout Eastern Europe believed that they would be able to unleased the productive engine of socialism. By the early-1950s, it was clear, however. that this was not happening. And it is notable that the first real opposition to the Communists camed from workers in whose named the Communisrs y claimec to represent. The DDR raised the production quotas 10 percent for workers building the Stalinallee in East Berlin. It was to be a new showcase boulevard. The workers began demonstrating in protest. These demonstrations also occured in other cities. Soviet troops and tanks immediately intervened to stop the demonstrations. I am not sure if there has ever been a reliable account of the casualties. One reports suggests that the Soviets killed 125 demonstrators.
Many Soviet citizens hoped that the relaxation of political repression that occurred during the Great Patriotic war would continue and expand after the war. This did not occur. Instead Stalin aided by by fellow Georgian NKVD Chief Lavrentiy Beria began to retigten his grip. Bolstered by victory over Hitler and the NAZIs, that grip was unasiable. And the NKVD was an instrument of repression unparalleled in history, more formidable even than Hitler's SS. The Doctor's Plot was to usher in a sweeping repression of Soviet Jews and preceived opponents as well as a more agressive confrontation with the America and the West. Unfortunately for Stalin and fortunately for the world, one of the Jewish dictors arrested was Stalin;s own personal dictor. And while he was being beaten in the Lubyanka prison, Stalin suffered cebreal hemmorage that led to his death. Only then was a reform process possible, although not guaranteed. The struggle for power that followed was not over policy, but who would replace Stalin. Khruschev's sucess made deStalinzation possible. This began with the Soviet 20th Party Congress (1956). East German and other Eastern European delegates were at the Congres. They were as shocked as the soviet delegates. Assessments varied. Some were optimisytiv about a more humane form of Communism. Others were uneasy, understanding that only Soviet military force kept their regims in power. East German Communists began to complain to the Soviets that there policies were adversely affecting the DDR state and were in part responsible for people fleeing to the West.
The Soviet forces based in Germany were titled the Group of Soviet Occupation Troops (1945-54). The Soviets in 1954 after granting what they called "full soverignity" to the DDR, redesignated their forces the Group of Soviet Forces in Germany (1954-89). The Soviet troops remained in strength. The DDR joined the Warsaw Pact. The Soviets redesignated their forces again after the fall of the Wall to the Western Group of Troops.
Dulles, Allen W. "That was then: Allen W. Dulles on the occupation of Germany" Foreign Affairs (November/December 2003).
Naimark, Norman M. The Russians in Germany: A History of the Soviet Zone of Occupation, 1945-1949.
Navigate the Boys' Historical Clothing Web Site:
[Return to Main World War II German occupation page]
[Return to Main World War II German aftermath page]
[Return to Main Cold War page]
[Aftermath] [Biographies] [Campaigns] [Children] [Countries] [Deciding factors] [Diplomacy] [Geo-political crisis] [Economics] [Home front] [Intelligence]
[POWs] [Resistance] [Race] [Refugees] [Technology] [Totalitarian powers]
[Bibliographies] [Contributions] [FAQs] [Images] [Links] [Registration] [Tools]
[Return to Main World War II page]
[Return to Main war essay page]
[Return to CIH Home page]
|
<urn:uuid:2c355026-6f82-463a-a65e-5bacbcd21e65>
|
CC-MAIN-2016-18
|
http://histclo.com/essay/war/ww2/after/ger/occ/occ-sov.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860110372.12/warc/CC-MAIN-20160428161510-00168-ip-10-239-7-51.ec2.internal.warc.gz
|
en
| 0.979234 | 3,687 | 3.59375 | 4 |
Where are the Lilacs? Santosh Bakaya
When one begins to read the first section of Santosh Bakaya’s poetic offering ‘Where are the Lilacs?’ one can be pardoned if one thinks that this is a litany of peace poems, poems that could have been showcased in the Romantic era of Wordsworth, Keats and Shelley. Nature is seen at her beautiful best, as she conspires to sing songs of peace in her myriad forms. The joy of the rain, “the delectable petrichor”, adds a new essence even as the moon hums a peace song. Various species of birds – sparrows, goldfinches, love birds, canaries and doves continue “their litany of freedom” as dolphins cavort with the mermaids. The poet calls the moon her friend, guide and philosopher as she “hugged the moonbeams as they beamed/in my tiny heart”. The chubby five-year old savours the thrill of a rain holiday even as a desolate farmer grieves at his savaged fields.
The Lidder is a motif that stirs dreams within the heart of the poet, as it tickles her feet. The motif meanders on to a young girl who gazes at the river’s immensity with her blue eyes. There is intense joy in this set of poems as playful verbs dance across the pages... sparrows hop, a young lad dances in the rain, laughing doves chortle, squirrels slither and “a girl in a boat/...catches the raindrops on her face/And laughs and laughs”. The strains of peace sound in many of the poems, as even the trees sway and sing of peace.
However, there are moments when one is reminded of Tennyson’s “Nature, red in tooth and claw” when a happy child sleeps eternally after an explosion as “the lullaby freezes on petrified lips” or a vicious gale shatters the peace somewhere.
One of the most poignant poems sings of ‘The Petite Flautist’ “unleashing melodies of magic by his flute/In his dreary corner”.
In Part 11, the mood turns a trifle militant as young and old march on, “fleeing war and poverty” as “the bombers bombed/ And dreams were entombed”. Here, the references are connected to the real world, with references to little Aylan who drowned on the beach (“the child’s heart-rending screams”), the courage of Rosa Sparks (“a woman of spark”), a dirge to Gowhar who fell victim to a tear gas shell in Kashmir, and a paean to David Martello who soared his performance of Lennon’s ‘Imagine’ against the backdrop of the Paris violence.
Santosh Bakaya reveals a tender heart that weeps at a grave new world that is cacophonous, filled with resentment and riddled with corroded idealism. One discerns shades of Maya Angelou as she sings, “Let the bird in the cage serenade us with its notes of peace.” She goes on to beseech it to stay safe in its cage for “outside insane humanity is on the rampage”.
There are also cadences of Matthew Arnold’s “darkling plain” and Wordsworth’s “Bliss was it in the dawn to be alive”. Each of these strengthens the robust ideas that tumble out of the sparkling mind of the poet, as she continues to plead for peace. “Why should our battle cry be Hate? /Let the songs of/Peace/Resound and echo in the valley and dale,” and “My pen grows wings and sails with the feathered friends/Trying to forget a world gone berserk by its violent trends.”
This volume, replete with poems so relevant to the world today, and always, ends on a note of hope.
“Let us be together, little dove
All that the world needs is you
And a handful of love.”
|
<urn:uuid:9de880bc-39ab-4953-823e-4668ee41a003>
|
CC-MAIN-2018-09
|
http://deepties.blogspot.com/2016/09/where-are-lilacs-santosh-bakaya_18.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814290.11/warc/CC-MAIN-20180222200259-20180222220259-00629.warc.gz
|
en
| 0.942715 | 896 | 2.578125 | 3 |
The Great Rift Valley, which runs the length of Kenya, was formed twenty million years ago; it was created when the earth's crust ripped apart. Many volcanic mountains were formed and there are hot springs along the Rift.
Mount Kenya (5,199 m) is the second highest mountain in Africa. (Mount Kilimanjaro, which is in Tanzania along the Kenyan border, is the highest peak on the continent).
At the end of the nineteenth century the Aberdare Mountains were named after the President of the Royal Geographical Society, Lord Aberdare.
East Africa has been called The Cradle of Mankind.
Evidence of the use of fire dating back to around one and a half million years ago has been found in Chesowanya and Koobi Fora.
The famous Leakey family of paleontologists discovered many early human fossils in Kenya and Tanzania.
Lamu, Kenya's oldest town, is an example of a Swahili settlement.
Mombasa, East Africa's largest port, has been a major port since the fifteenth century.
The Omani ruler, Seyyid Said, took control of the Kenyan trade routes in the eighteenth century. The slave trade flourished and slaves were shipped to plantations on Zanzibar (now part of Tanzania).
The British East African Protectorate was established in 1895.
In 1887 Count Teleki, the Hungarian explorer, reached Lake Turkana which he named Lake Rudolf.
Karen Blixen, the Danish writer who lived in Kenya between 1913-31, wrote Out of Africa about her experiences.
Elspeth Huxley's book, The Flame Trees of Thika, is based on her childhood on a coffee plantation in Kenya.
Richard Dawkins, author of The Selfish Gene and The Blind Watchmaker, was born in Nairobi in 1941.
George and Joy Adamson lived in Kora on the Tana River. Born Free is Joy's book about Elsa the lioness.
After many years of campaigning for independence for Kenya Jomo Kenyatta became the country's President (1963-1978).
Tom Mboya, a trade unionist and civil rights leader, was assassinated in 1969.
Kenya is a member of the Commonwealth.
A bomb attack against the US embassy in Nairobi (August 1998) resulted in thousands of casualties. Over two hundred people were killed.
In November 2002 sixteen people were killed by suicide bombers at the Israeli-run Paradise Hotel near the port city of Mombasa. Minutes before, a missile attack on a Boeing 757 plane returning to Israel missed its target.
Wangari Maathai, the Kenyan environmentalist, was awarded the Nobel Peace Prize in 2004. Professor Maathai is the first African woman to win the award.
On 26 December 2004, a quake occurred under the sea near Aceh in north Indonesia (8.9 on the Richter scale); this produced tsunamis causing flooding and destruction in Bangladesh, India, Indonesia, Malaysia, Maldives, Myanmar, Thailand, Seychelles, Sri Lanka and the east coast of Africa (Kenya and Somalia).
Presidential and parliamentary elections at the end of December 2007 sparked a wave of unrest and violence. Many people lost their lives and many more had to leave their homes.
In 2009 around one third of the population was in need of food aid.
|
<urn:uuid:c1a6485c-7c66-4de7-af9e-67def1f0d6dc>
|
CC-MAIN-2018-09
|
http://www.worldinfozone.com/facts.php?country=Kenya
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812405.3/warc/CC-MAIN-20180219052241-20180219072241-00399.warc.gz
|
en
| 0.967198 | 697 | 3.296875 | 3 |
Judaism: The Wise Son: The Missing Answer
Among the Four Sons listed during the Seder, we identify most with the Wise Son.
We don't really accept the premise of the Wicked Son (we might criticize children today for acting badly, but we don't identify them as "bad" or wicked children), and we like to hope that our children grow out of being either Simple or that they Don't Know to Ask.
Which leaves us with the Wise Son. Who among us don't really, deep down in our heart, consider our children "Wise"? Moreover, looking at his question, we recognize that his question is excellent:
חָכָם מָה הוּא אוֹמֵר? מַה הָעֵדוֹת וְהַחֻקִּים וְהַמִשְׁפָּטִים אֲשֶׁר צִוָּה ה' אֱלֹקינוּ אֶתְכֶם?
What does the Wise Son say? "What are the testimonies, statutes and dictates that the Lord our God commanded you?"
In fact, we find this exact question in the Torah, as Moshe instructs the Jewish people,
כִּי-יִשְׁאָלְךָ בִנְךָ מָחָר, לֵאמֹר: מָה הָעֵדֹת, וְהַחֻקִּים וְהַמִּשְׁפָּטִים, אֲשֶׁר צִוָּה ה' אֱלֹקינוּ, אֶתְכֶם.
When your son asks you in time to come, saying: 'What is the meaning of the testimonies, and the statutes, and the ordinances, which the Lord our God has commanded you? (Devarim 6:20)
Ibn Ezra explains that the word מה – does not mean "what", but instead means למה – "what is the reason". In essence, the Wise Son asks, "Why do we do keep of these commandments?" It's not just an ancient question found in the Chumash. Rather, it's an eternal question, asked by children – good, wise children – throughout Jewish history.
Every Jewish parent should not only expect this question, but should hope for it. We want our children to ask. We want them to inquire about why we do what we do. But, if we want them to ask good questions, we better be ready with good answers. What indeed do we tell them when they ask us, "Why should I keep the Torah? Why do you keep the Torah?" (Because I said so only works for the first few years. After that, you'll need to provide a better answer.)
The Hagaddah provides an answer – and that's where we begin to run into problems.
וְאַף אַתָּה אֱמָר לוֹ כְּהִלְכוֹת הַפֶּסַח: אֵין מַפְטִירִין אַחַר הַפֶּסַח אֲפִיקוֹמָן.
You, in turn, shall instruct him in the laws of Passover, [up to] `one is not to eat any dessert after the Passover-lamb.
What is the relevance of the answer we give him to his question? He's asking why we keep the commandments, and we're talking about dessert and the Korban Pesach? This isn't my own question, either. Ritva, is his commentary to the Hagadah writes,
וקשה, מה ענין תשובה זו לשאלה זו?
This is difficult, as what is the relevance of the answer to the question?
Moreover, we ourselves need not search for an answer to this great question, as Moses, Moshe Rabbeinu, has already provided us a wonderful, powerful answer. Right after telling us what our children will ask us in the future, Moshe teaches us how to answer them.
וְאָמַרְתָּ לְבִנְךָ, עֲבָדִים הָיִינוּ לְפַרְעֹה בְּמִצְרָיִם; וַיֹּצִיאֵנוּ ה' מִמִּצְרַיִם, בְּיָד חֲזָקָה. וַיִּתֵּן ה' אוֹתֹת וּמֹפְתִים גְּדֹלִים וְרָעִים בְּמִצְרַיִם, בְּפַרְעֹה וּבְכָל-בֵּיתוֹ--לְעֵינֵינוּ. וְאוֹתָנוּ, הוֹצִיא מִשָּׁם--לְמַעַן, הָבִיא אֹתָנוּ, לָתֶת לָנוּ אֶת-הָאָרֶץ, אֲשֶׁר נִשְׁבַּע לַאֲבֹתֵינוּ. וַיְצַוֵּנוּ ה', לַעֲשׂוֹת אֶת-כָּל-הַחֻקִּים הָאֵלֶּה, לְיִרְאָה, אֶת-ה' אֱלֹקֵינוּ--לְטוֹב לָנוּ כָּל-הַיָּמִים, לְחַיֹּתֵנוּ כְּהַיּוֹם הַזֶּה. וּצְדָקָה, תִּהְיֶה-לָּנוּ: כִּי-נִשְׁמֹר לַעֲשׂוֹת אֶת-כָּל-הַמִּצְוָה הַזֹּאת, לִפְנֵי ה' אֱלֹקֵינוּ--כַּאֲשֶׁר צִוָּנוּ. (דברים ו:כ-כה)
Then you shall say to your son: 'We were Pharaoh's slaves in Egypt; and the Lord brought us out of Egypt with a mighty hand. And the Lord showed signs and wonders, great and sore, upon Egypt, upon Pharaoh, and upon all his house, before our eyes. And He brought us out from there that He might bring us in, to give us the Land which He swore to our fathers. And the Lord commanded us to do all these statutes, to fear the Lord our God, for our good always, that He might preserve us alive, as it is at this day. And it shall be righteousness to us, if we observe to do all this commandment before the Lord our God, as He has commanded us.' (Devarim 6:20-25)
This is a wonderful answer, especially when we read the text with care. In his answer, Moshe emphasizes our collective history, and our connection to our Forefathers and the Promised Land. More importantly, he describes the Torah and a life of adherence to the Mitzvot as "good", and the giving of the Torah as an eternal act of kindness that God did for us.
That's the true answer to this all-important question. We follow the Torah because we know that God wants goodness for us, and transmitted to us the ideal way to achieve that ultimate Good. While we don't always understand every detail, and cannot always perfectly answer each question, when we do answer the Wise Son, we must convey that sense of Goodness inherent in a Torah-true life.
This only makes the answer in the Hagadah all the more perplexing. Where's the connection to our history? What about the mitzvot? There isn't any mention of God! All we hear about is the Afikomen. Is that really a good answer for the Wise Son? Couldn’t the Hagadah have given us a better answer?
Ritva explains that the key word in the answer to the Wise Son is the word אף – "even". The answer provided here isn't the whole answer. Rather, it's the very end of the answer.
Of course we must provide the complete answer. and any Seder that doesn't address these critical questions, and focuses only on the minutia of the practical aspects of the Seder (How much Matzah to eat; how quickly to eat it, etc.) misses the most important element of the Seder.
The very essence of the Seder is answering the underlying question of the Wise Son: "Why are we sitting here tonight?"
Only when we have finished answering his questions – all of them! – can we then proceed to the more intricate aspects of the Seder. Only then, וְאַף אַתָּה אֱמָר לוֹ כְּהִלְכוֹת הַפֶּסַח – "even teach him about the halakhot of Pesach".
As parents, we sometimes fail in this critical mission. Sadly, we're good at details and minutia and "do it because I told you to," but fail miserably to convey the sense of goodness, fulfillment and love that the Torah brings into our lives. We fail to address the deeper questions, somehow afraid that we might say something wrong, give an incorrect answer, and mislead our children away from the truth.
Yet, the opposite is true. We must simply do our best and answer these challenging questions as best we can. We can start by studying the answers that appear in the Torah.
But then we can and should answer the question our children really want to know: Not "why should they be Jewish?", but "Why are we Jewish, and why do we keep the Torah?"
|
<urn:uuid:2a9c84f6-3396-4b4d-8392-20a5663492c2>
|
CC-MAIN-2014-42
|
http://www.israelnationalnews.com/Articles/Article.aspx/14843
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637899124.21/warc/CC-MAIN-20141030025819-00230-ip-10-16-133-185.ec2.internal.warc.gz
|
en
| 0.903028 | 2,750 | 2.84375 | 3 |
Definitions for peta-
This page provides all possible meanings and translations of the word peta-
In the International System of Units and other metric systems of units, multiplying the unit to which it is attached by 10. Symbol: P
Origin: Based on penta- with the middle letter removed, but the previously coined prefix tera- came from Greek teratos, which means monster.
Peta is a unit prefix in the metric system denoting multiplication by 1015. It was adopted in the International System of Units in 1975, and has the symbol P. Peta is derived from the Greek πέντε, meaning "five". It denotes the fifth power of 1000. It is similar to the prefix penta, but without the letter n. Examples: ⁕1 petametre = 1015 metres ⁕1 petasecond = 1015 seconds ⁕1 petabyte = 1015 bytes ⁕the mass–energy equivalence is 89.9 PJ/kg ⁕1 light-year = 9.461 Pm
Find a translation for the peta- definition in other languages:
Select another language:
|
<urn:uuid:977d1cea-59a9-4a77-93ba-ada60a1579eb>
|
CC-MAIN-2015-06
|
http://www.definitions.net/definition/peta-
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122086930.99/warc/CC-MAIN-20150124175446-00112-ip-10-180-212-252.ec2.internal.warc.gz
|
en
| 0.859104 | 242 | 2.9375 | 3 |
Rocket wreckage found in outback
Surveyors on the Northern Territory/Queensland border believe they have discovered a rocket launched at Woomera in the 1960s.
Simon Fanning and his geological survey team were flying over the Simpson Desert when they saw what they believed was part of satellite in the scrub.
"It turns out this wreck is not in fact a satellite but a rocket - at least a chunk of one anyway" he said.
"I'd seen ET as a kid, Star Wars and all that stuff, but to actually find something was really different."
Dr Alice Gorman of Flinders University in Adelaide believes the rocket could be one of 10 blue streak rockets launched at Woomera in South Australia in the 1960s by the European Launcher Development Organisation.
"The blue streak's very distinctive and the location in the Simpson Desert and the details on the rocket indicate it's most likely from one of the two 1966 launches" she said.
Mr Fanning is reluctant to disclose the precise location of the find, but the ABC has found an eBay site offering the GPS coordinates for sale.
There is private collector interest in blue streaks, but Dr Gorman says this discovery belongs in a museum.
"There was only a handful of them launched here in Australia," she said.
"I think it would be appropriate to put this one in a museum."
Topics: space-exploration, community-and-society, 20th-century, history, air-and-space, science-and-technology, astronomy-space, nt, darwin-0800, adelaide-5000, sa, port-augusta-5700, port-pirie-5540, woomera-5720
|
<urn:uuid:606799bd-23f9-43d9-9721-b9abbcd8b702>
|
CC-MAIN-2014-49
|
http://www.abc.net.au/news/2008-06-04/rocket-wreckage-found-in-outback/2460640
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931003959.7/warc/CC-MAIN-20141125155643-00239-ip-10-235-23-156.ec2.internal.warc.gz
|
en
| 0.954342 | 359 | 2.609375 | 3 |
Campaign medals were given to individuals who saw service in the First World War. An individual, male or female, could be issued with a maximum of three medals, although there are a small number of exceptions to the rule. Service medals were issued automatically to other ranks, but officers or their next of kin had to apply for them. Medals were impressed with the name of the recipient and usually included some or all of the following: service number, rank, first name or initial, surname and military unit (Regiment or Corps). This was either on the rim of the medal or in the case of a star, on the reverse. In addition to the campaign medals, a badge was available to officers and men who had been honourably discharged or had retired as a result of sickness or wounds from war service.
This bronze medal award was authorized by King George V in April 1917 for those who had served in France or Belgium between 5th August 1914 to midnight on 22nd November 1914 inclusive. It was popularly known as the “Mons Star”. As far as we know, Private William Capener, Colour/Sergeant Charles Robbins, Sergeant James Thomas Cox, Sergeant John Henry Cox, Lance Corporal Joseph Thomas Perks, Private Alfred Porter, Private Thomas Morton Taylor and Private Frederick Smith were the only local men to be awarded the 1914 Star.
This is very similar to the 1914 Star but it was issued to a much wider range of recipients. It was awarded to all who served in any theatre of war against Germany between 5th August 1914 and 31st December 1915, except those eligible for the 1914 Star.
British War Medal
The silver or bronze medal was awarded to officers and men of the British and Imperial Forces who either entered a theatre of war or entered service overseas between 5th August 1914 and 11th November 1918 inclusive.
Each of the allies issued their own bronze victory medal with a similar design, similar equivalent wording and identical ribbon. Eligibility for this medal was more restrictive and not everyone who received the British War Medal also received the Victory Medal.
The Star, British War Medal and Victory Medal were affectionately known as “Pip, Squeak and Wilfred” after well-known cartoon characters of the time in The Daily Mirror. If only the British War Medal and Victory Medal were awarded, they were known as “Mutt and Jeff”, from an American comic strip in The San Francisco Chronicle.
The Silver War Badge
This was issued in the United Kingdom to service personnel who had been honourably discharged due to wounds or sickness during World War I. The badge, sometimes known as the Discharge Badge, Wound Badge or Services Rendered Badge, was first issued in September 1916, along with an official certificate of entitlement. The badge bears the royal cipher of GRI and around the rim, "For King and Empire; Services Rendered". Each badge was uniquely numbered on the reverse. It was to be worn on civilian clothing, not military uniform.
The Memorial Plaque
This was issued after the First World War to the next-of-kin of all British and Empire service personnel who were killed as a result of the war. Each had the name of the individual on the obverse. Early plaques did not have a number stamped on them but later ones have a number stamped behind the lion's back leg. The plaques were made of bronze, and hence popularly known as the "Dead Man’s Penny", because of the similarity in appearance to the somewhat smaller penny coin. 1,355,000 plaques were issued from 1919 and continued to be issued into the 1930s to commemorate people who died as a consequence of the war.
|
<urn:uuid:540e42ad-1149-477d-964a-8ca7abb8ac80>
|
CC-MAIN-2017-26
|
http://badseysociety.uk/world-war-one/world-war-i-service-medals
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323730.30/warc/CC-MAIN-20170628185804-20170628205804-00625.warc.gz
|
en
| 0.98873 | 753 | 2.953125 | 3 |
For a quarter-century after the end of the Cold War, the United States had a clear aim for Europe: to bring the former communist world into the liberal international order and build a Europe whole, free, and at peace. After containing the Soviet threat for four decades (and intervening in two World Wars before that), the United States and its allies focused on enlarging the community of market democracies eastward to eliminate sources of conflict that had bedeviled Western leaders throughout the 20th century.
In November 1999, when President Bill Clinton spoke at Georgetown University to commemorate the 10th anniversary of the fall of the Berlin Wall, it seemed the United States and its allies were well on their way to accomplishing these goals. America began the decade supporting Germany’s unification, with a united Germany remaining fully in NATO. In the mid-1990s, the United States began pushing for NATO to include a first wave of new members from the East and supported the European Union’s steps toward enlargement. The United States, bilaterally and multilaterally through international financial institutions, provided Russia billions of dollars in the 1990s, as Clinton’s top adviser, Strobe Talbott, put it, “to help Russia complete the destruction of one system and the building, virtually de novo, of a new one.” Although Russian President Boris Yeltsin made clear that NATO expansion created political headaches for him at home, he had sought integration with the West from the start of his presidency. In 1997, he went along with plans to create a formal NATO-Russia framework (the Permanent Joint Council) for dialogue with the West. The Group of Seven advanced industrialized countries added Russia to their membership roster in 1998 to further enhance relations. NATO conducted airstrikes that paved the way for the Dayton Accords to end the war in Bosnia in 1995 and engaged in a 78-day bombing campaign in 1999 against Slobodan Milošević’s Serbia without suffering any NATO combat casualties. And as concerns emerged about the threat from radical Islamic extremists, the United States pushed Europe to take more seriously the idea of Turkish membership in the European Union in the hopes that the country could set an example for the Middle East as a secular Islamic democracy.
It was not an understatement when Clinton remarked in 1999, “Now we are at the height of our power and prosperity.” After 40 years of containing communism during the Cold War, it seemed the first ten years after communist regimes began collapsing in Eastern Europe had gone about as well as they could. The idea that any country could challenge America’s global leadership was laughable. Europe seemed on its way to overcoming its historic divisions.
Since then, however, America’s ability to promote the idea of a Europe whole, free, and at peace has eroded considerably. After the Iraq war and the global financial crisis, the United States lost not only its standing but also its self-confidence as global leader. Although the Eurozone economies are growing again, structural problems continue to cast doubt on the Euro’s future. The United Kingdom is negotiating its exit from the European Union, and authoritarian populism has surged in Central Europe. Russia has emerged as a power intent on undermining the Western order: It invaded Ukraine in 2014 and has launched information operations designed to disrupt electoral democracy across Europe and in the United States. And then came the election of Donald Trump, whose attitudes toward Europe have created tremendous uncertainty since he entered office.
With the Russian invasion of Ukraine, the Brexit vote, the rise of authoritarianism in Central Europe, and the continuing challenges of maintaining the Eurozone, the vision of a Europe whole, free, and at peace no longer serves meaningfully as a framework for America’s Europe policy. The optimism underpinning the 1989 strategy — that the West won the Cold War and could set the terms for the integration of the East, including Russia — has given way to pessimism now that Russia is bent on undermining Western institutions and populist politicians in Europe are doing the same.
Formulating a new U.S. strategy for Europe takes place in a Washington much less Euro-centric than it was during the 20th century. That was a time when the United States viewed Europe — the source of conflict in World War I, World War II, and the Cold War — as the region most vital to American strategy.
But it would be wrong to believe Europe is no longer central to American prosperity and security. The United States should reconceptualize its strategy for and with Europe along two tracks. The first has formed the core of its approach since 2014 and echoes America’s Cold War strategy: working with European allies once again to contain Russian aggression. This cannot consist of only reassuring NATO allies they will be protected against military attack, but should also include the development of serious U.S.-European collaboration in the face of Russian propaganda operations.
The second requires a true understanding of America’s foreign policy needs as it looks toward Asia. Under President Barack Obama, the United States rightly sought to respond effectively to the rise of China, the greatest geostrategic challenge facing the United States in the coming decades. But the more time, energy, and resources America focuses on the China challenge, the more it requires a Europe capable of managing threats and challenges in its own neighborhood. The new transatlantic agenda’s second track, therefore, should focus on developing a collaborative division of labor that allows the United States to continue turning its attention toward Asia. Europe, under the leadership of France and Germany and with the participation of the United Kingdom, should develop greater capacity to respond to challenges in Eastern Europe and the Middle East and North Africa region, all the while cementing the transatlantic alliance through a strong NATO.
A Spent Strategy
It was on a visit to Mainz, West Germany, in May 1989 that George H.W. Bush articulated the strategy to promote a “Europe whole and free.” Communist regimes were beginning to collapse in Eastern Europe and Cold War-style containment of the Soviet Union was no longer necessary. The goal of overcoming Europe’s historic divisions and conflicts was not only for the continent’s benefit but to enhance American national security. U.S. strategists had learned from two world wars and a Cold War that the United States should actively promote European unity. As Bush put it in Mainz, “The Cold War began with the division of Europe. It can only end when Europe is whole.”
The Clinton team evolved that approach to promoting “a Europe whole, free and at peace,” primarily (but not only, as noted above) through the enlargement of NATO. George W. Bush continued his predecessor’s policies, bringing much of the rest of Central and Eastern Europe into NATO, but it was crystal clear that Western policy was in trouble with the 2008 Russia-Georgia war. The Obama administration put on hold the idea of promoting NATO membership to Ukraine and Georgia in the hopes of resetting the relationship with Russia, but the Russian invasion of Ukraine in 2014 and the imposition of Western sanctions in response spelled clear doom for the post-Cold War hopes for an undivided continent.
The enlargement of Western institutions in the immediate aftermath of the Cold War was made possible due to four key features of that era. First, the United States enjoyed complete global military and political superiority in the wake of the Soviet collapse, and the George H.W. Bush and Clinton administrations viewed NATO as the primary instrument for maintaining U.S. dominance of European security affairs after the Cold War ended. Second, in a period of uncertainty, Western European countries believed in the importance of ongoing U.S. commitment to their security through NATO and established processes to enlarge the European Union to the east to promote greater European unity. Third, for the first time in centuries, Russia was unable to shape events in Europe. Finally, Central and Eastern European nations sought protection from the United States in case the Russian (or German) threat reemerged and committed themselves to implementing political and economic reforms in order to join NATO and the European Union.
The United States undermined its global standing and legitimacy as the world’s leading power by shooting itself in the foot going to war in Iraq in 2003 and creating a global financial crisis in 2008. Russia, disillusioned and resentful over the direction of American leadership and what it saw as offenses against its core interests, began to push back on many fronts. Britain voted to leave the European Union. Poland and Hungary, two countries that had entered the Western fold, began to take on an authoritarian character. NATO and E.U. enlargement have run their course, and those countries in the gray zone between the West and Russia, such as Georgia and Ukraine, have no foreseeable prospect for membership. Nor are good relations with Russia on the horizon.
The Steady Decline of American Influence and Russian Opportunism
With the 9/11 attacks, the world and American power entered a new era. The conventional wisdom at the time was that it would be defined by the “War on Terror,” but looking back, an important part of the story was the clear erosion in America’s ability to sustain its post-Cold War vision with its European allies. A variety of factors contributed to this. First, the United States undermined its own standing and legitimacy with the invasion of Iraq and the associated chaos and human rights abuses associated with it. Second, the “own goal” of the U.S. financial crisis, which eventually afflicted the whole world, left many disillusioned with American leadership, undermining the “Washington consensus.” The financial crisis also exposed longstanding problems with the Eurozone and a debt crisis flowered throughout southern Europe. Third, Moscow became more and more angry over Washington’s leadership of the international order. The Kremlin was especially displeased by Russia’s place in the global pecking order as well as what Russian leaders saw as a disregard of their country’s interests and its status as a great power. Russian President Vladimir Putin came into office determined to reverse the humiliation of the 1990s and set about ensuring that Russia had the ability to prevent Western institutions from penetrating into the non-Baltic territory of the former Soviet Union.
There is no small irony that Iraq, where America displayed its unrivaled hegemony in defeating Saddam Hussein in 1991, became the symbol, over a decade later, of America’s eroding power. After Iraq’s invasion of Kuwait in August 1990, the United States and its partners under U.N. authorization responded in 1991 with a spectacular show of military power demonstrating American domination of the global stage. For the next dozen years, U.S.-led patrols of no-fly zones over Iraq kept Saddam contained.
But in the aftermath of 9/11, those in the George W. Bush administration who had long argued for regime change in Iraq seized the chance to promote their agenda. The Bush administration took America to war without an international consensus to eliminate what turned out to be a nonexistent weapons of mass destruction program. France and Germany, two staunch American allies, vocally opposed this use of American power.
Coming just four years after NATO’s bombing campaign in the Balkans that — in Moscow’s view — encroached on Russian interests, Vladimir Putin was enraged at what he saw as the U.S. effort to unilaterally force its will onto the rest of the world.
America’s standing took a big hit not just with Russia but globally when the Iraq War turned into a quagmire. The world was aghast when photos were released of the torture that took place at Abu Ghraib, and Europeans argued vociferously that the U.S. facility at Guantanamo Bay should be closed. America lost tremendous credibility through both its incompetent occupation and its defense of waterboarding.
Meanwhile, Russian grievances against the United States and NATO grew increasingly bitter. They were rooted in a certain narrative of the 1990s. Many Russians (and many American scholars) believed the West had provided assurances to Soviet leader Mikhail Gorbachev during the discussions over German unification in 1990 that NATO would not take advantage of Soviet weakness to expand into Central and Eastern Europe. Since the late 1990s, Moscow saw Washington doing exactly that. In 1999, the United States led the NATO air war against Serbia. It was fought without U.N. authorization since the Clinton team knew Russia would veto the operation. Fearing NATO might send ground troops, Yeltsin warned of another possible world war.
Putin turned his anger at the ties between Western institutions like the U.S. Agency for International Development and domestic civil society groups that, in his mind, fomented the so-called “color revolutions” that ousted pro-Russian governments in Georgia, Ukraine, and Kyrgyzstan from 2003 to 2005. While he exaggerated the amount of outside influence on these domestic events, Putin feared the West was further encroaching on what he deemed Russia’s sphere of influence and even had designs on regime change in Russia.
At the 2007 Munich Conference on Security Policy, Putin made clear his unhappiness with U.S. global dominance, arguing that a unipolar world, a “world in which there is one master, one sovereign…is pernicious not only for all those within this system, but also for the sovereign itself because it destroys itself from within.” And he expressed particular ire for NATO:
I think it is obvious that NATO expansion does not have any relation with the modernization of the Alliance itself or with ensuring security in Europe. On the contrary, it represents a serious provocation that reduces the level of mutual trust. And we have the right to ask: against whom is this expansion intended?
Then came the 2008 financial crisis, which began in the U.S. housing and banking sectors. The world had come to expect the United States to solve financial crises, not start them. In the winter of 1994-95, the Clinton administration intervened to stave off a currency crisis in Mexico. At the end of the decade, Time’s Feb. 15, 1999, cover dubbed Federal Reserve Chair Alan Greenspan, Treasury Secretary Robert Rubin, and Deputy Treasury Secretary Lawrence Summers as the “Committee that Saved the World” for their role in managing the financial crisis that began in Asia in 1997 and soon engulfed countries across the globe. In the aftermath of the collapse of the Soviet Union, the United States had developed what was known as the “Washington consensus” — prescriptions for building a successful market economy. Now, given the U.S. role in creating the financial crisis (in large measure a result of the deregulation policies promoted by the “Committee that Saved the World” — Greenspan, Rubin and Summers), along with the continued economic rise of China, the United States no longer seemed to have all the answers.
Although the Iraq War and the financial crisis weakened U.S. standing, America in the Bush years did not give up on a Europe whole, free, and at peace. In advance of NATO’s 2008 Bucharest summit, Washington even lobbied its allies to provide Membership Action Plans (established for earlier NATO aspirants) to Ukraine and Georgia. But too many allies feared Russia’s reaction, particularly given Putin’s angry, headline grabbing remarks at the previous year’s Munich Conference on Security Policy regarding NATO expansion. Failing to achieve its objective, the Bush administration successfully fought to include in the summit declaration a statement that Ukraine and Georgia would become members someday. As Ivo Daalder and I argued at the time, stating that countries would become members before they showed they could fulfill a Membership Action Plan made a mockery of the enlargement process. Even more importantly, it signaled to Putin that he had to act.
In August of that year, Russia went to war with Georgia and recognized two breakaway provinces, Abkhazia and South Ossetia. Putin had enforced a red line with respect to the non-Baltic former Soviet countries joining Western institutions.
When Putin returned to the Russian presidency in 2012 after a term as prime minister, he was obsessed with what he believed was an American effort to foster regime change in Russia. He blamed the United States, and Secretary of State Hillary Clinton in particular, for fomenting street protests during Russia’s parliamentary elections in 2011. But unlike the closing years of the George W. Bush presidency, Putin was now dealing with a U.S. president who sought a “reset” with Russia amid a broader effort to emulate the realism of George H.W. Bush rather than the more expansive interventionism of his son. Barack Obama made clear in his first year in office that NATO membership for Ukraine and Georgia was off the table, and relations were much improved during his first term. By the start of his second term, however, the relationship was headed into a downward spiral once again.
Beginning in 2013, Ukrainian President Viktor Yanukovych, a Putin ally, tried playing the European Union and Russia off one another, but after raising hopes at home and in the West that he was flirting with closer ties to Europe, he reneged under pressure from the Kremlin, leading to street protests that toppled him from power. Russia moved quickly, invading Ukraine, annexing Crimea, and supporting the Russian-speaking population of Eastern Ukraine in what became a bloody civil war.
Cold War containment was born of necessity in the face of the Soviet threat, and the idea of a Europe whole, free, and at peace was a response to the opportunity provided by the Soviet collapse. Yet by 2014 the United States and its allies were no longer thinking about expanding the zone of European democracy and once again refocused on containing the threat from Moscow. The West imposed economic sanctions on Moscow elites close to Putin, and NATO began increasing its capabilities in the East, first by stepping up air and sea patrols in the Baltic and Black Sea regions, later deploying troops on a rotating basis to the territory of NATO’s eastern members, and ultimately creating a European Deterrence Initiative.
Europe’s Internal Fracturing: Less Whole and Less Free
A Europe whole, free, and at peace never depended on the United States alone, even if it was the lone superpower, and neither was it simply about America’s relationship with Russia. The strategy depended on Europe’s own success in promoting a more unified continent to create greater peace and prosperity and potentially to develop a common foreign and security policy. While tremendous progress was made, inspiring heady rhetoric, dreams for what Europe could achieve faltered early in the 21st century due to the Eurozone debt crisis; the emergence of authoritarianism in Poland, Hungary, and Turkey; and Britain’s decision to leave the European Union.
In the early 1990s, France and Germany led the way in transforming the European Economic Community into a closer European Union, and Central and Eastern Europeans responded to Western incentives to foster democracy, the rule of law, and market economics hoping to join not just NATO but the European Union.
From the start, there were signs that the path ahead might not be so easy. To calm fears over German unification, Chancellor Helmut Kohl embraced the creation of a common currency for Europe. But as economists feared at the time, without a European finance ministry to set fiscal policy across the continent and thus lacking the ability to implement necessary redistributive policies, problems were bound to emerge.
By 2010 a full-blown crisis had erupted, as southern European countries demonstrated the system’s vulnerabilities to overloading on debt. The Euro crisis was exacerbated in 2015 as Greece missed a payment due to the International Monetary Fund and found itself in a showdown with its major creditor, Germany. The austerity programs the European Union imposed on debtors like Greece hammered their populations, increasing anti-E.U. populism, which threatened to undermine the European project.
After the Soviet Union collapsed, populist politicians in Central and Eastern Europe complained that newly liberated states were preparing to trade one form of imperial control (the Soviet military) for another (the European Union bureaucracy). Slovakia took a non-democratic, anti-E.U. turn under Vladimir Meciar as early as the mid-1990s, causing a delay in its accession to NATO and almost derailing its bid for E.U. membership before it returned to a democratic path. More recently, populist sentiment across the continent has been fueled by politicians seeking to take advantage of the refugee crisis that emerged from the wars in Libya and Syria. While Germany initially welcomed these individuals with open arms, others in Central Europe were not as hospitable, and politicians have used the threat of immigration effectively to stoke fears of loss of identity and to clamp down on democratic institutions.
Viktor Orbán returned as prime minister of Hungary in 2010 openly touting his goal of creating an illiberal state despite his country’s membership in NATO and the European Union. Orbán shut down the main opposition newspaper and targeted the Central European University, which received its initial funding from George Soros and symbolized the West’s embrace of the former Soviet bloc countries. In Poland, the Law and Justice Party came to power in 2015, seeking to restrict press freedoms and taking an attitude toward the constitution and judicial system that belied the party’s name. Recent elections in the Czech Republic and Austria have brought to power governments that, like those in Poland and Hungary, are stoking anti-immigrant sentiment and undermining the European Union’s democratic values. The growing success of nationalist politicians makes it far easier for Putin to make mischief in the heart of the European Union.
Turkey, the object of America’s dream in the 1990s to showcase a secular Muslim democracy, is under the boot of an authoritarian leader, Recep Tayyip Erdoğan. While not an E.U. member, Turkey is a NATO ally. Its clampdown on the media, jailing of university leaders, and government purge in the wake of the failed 2016 coup are leading many to wonder if the alliance needs a provision for expelling a member country to complement its provisions for including new ones.
Finally, in 2016, Britain voted to leave the European Union. The loss of sovereignty inherent in E.U. membership had long been a political issue in the United Kingdom, which never joined the Euro, and pro-Brexit politicians used the migrant issue to convince a majority of voters that their country should set a new course. But the Brexit vote also highlighted another new feature of European politics: Russia’s use of information warfare to undermine democratic institutions. Since Brexit, there has been more and more evidence of Russia’s brazen interference in Western elections, from France and Germany to Catalonia. And of course, Moscow’s efforts on behalf of Donald Trump created an explosive political issue in the United States.
The Trump Effect
Trump himself does not seem to care whether Europe is whole and free. At the time he was elected, Europe was already becoming less whole, less free and had a war in the East. His electoral victory meant a new presidential attitude that strikes at the heart of the European Union’s efforts to unify the continent. During his presidential campaign, he supported the British referendum to leave the European Union. Early in his presidency, Trump had kind words for French presidential candidate Marine Le Pen, who sought a similar path for her country. Speaking in Poland in July 2016, despite paying lip service to the notion of a “Europe strong, whole and free,” Trump put forth a vision for Europe consistent with what he has long favored for the United States — an approach that emphasizes the divisive nationalism the European Union was founded to overcome.
Since Trump’s inauguration a year ago, European Council President Donald Tusk has called the United States a threat to Europe, and German Chancellor Angela Merkel has argued that Europe can no longer rely on the United States. For the first time since the development of its Cold War containment policy in 1947, the United States has no clear strategy for what it wants in Europe and with Europe.
How has the Kremlin seen all this? Putin likely hoped Trump’s election would signal greater accommodation in U.S. policy toward Russia. With respect to the U.S. response to Russian meddling in the 2016 U.S. elections, Trump has given the Russian president what he wanted. While Congress overwhelmingly passed legislation in 2017 to impose new sanctions, Trump has stalled on implementation. On Ukraine, however, while Trump appointed a special representative for Ukraine negotiations, Washington’s terms for solving the crisis have not changed. Furthermore, the president signed off on the sale of lethal military assistance to Ukraine, something Obama was reluctant to do over fears that it might only lead to an escalation of the war in that country. The United States has continued to stand firmly with its NATO allies to counter the threat of aggression from Russia, and the sanctions regime already in place remains so.
Overall, though, Trump’s foreign policy attitude is a radical departure from his post-World War II predecessors. Frustration with the bureaucratic, often sclerotic, European Union is nothing new for American elites. But actively seeking to undermine European unity is. Speaking in Warsaw, Trump did refer to the importance of a Europe whole and free, but it was overshadowed by his broader articulation of the nationalist vision Stephen Bannon helped him promote — a vision Trump adhered to again when laying out his National Security Strategy in December. The president has similarly undermined European unity in favor of nationalism, arguing that the United Kingdom and United States would emerge with a stronger relationship once Britain left the European Union, and praising Le Pen, who campaigned on an anti-E.U. platform for France.
Regarding Russia, Trump has often spoken of his admiration for Putin’s strongman tactics at home, and has sought publicly to downplay the threat Putin poses to the United States and Europe. Trump accepts the Russian leader’s denials of meddling in the U.S. election and rejects any effort to cast doubt on the legitimacy of his own victory, including the work of the U.S. intelligence community to expose the danger of Moscow’s information warfare operation.
Concerns existed before Trump entered office. But now the United States has a president who has made clear he does not believe in the value of the liberal world order Washington created, sustained, and then enlarged after the Cold War — an order that the Europe whole, free, and at peace strategy rested on.
Was There Another Way?
Was this all an inevitable result of overly ambitious U.S. policy, and particularly the effort to bring Central and Eastern Europe into NATO, as some have argued? A number of Western analysts, led by legendary diplomat George F. Kennan, opposed NATO enlargement from the start, and critics such as John Mearsheimer have argued that the policy is the root cause of the breakdown of relations with Russia over Ukraine. Enlargement certainly created tradeoffs: Using NATO to promote greater stability in Central and Eastern Europe made any cooperation with Moscow that much more difficult. But a failure to enlarge would have come with its own costs, something critics of enlargement generally do not address. Most notably, Russia, which has defined its security through the insecurity of its neighbors, would have been tempted over time to interfere in the affairs of Central and Eastern Europe, particularly in the Baltics, as it has in Georgia, Moldova, and Ukraine, creating instability and insecurity across a wider swath of Europe.
As I have previously argued, Russia’s self-image since the end of the Cold War and particularly since the rise of Putin has played a key role in the tensions that have emerged. From the days of Gorbachev’s notion of a “Common European Home,” Russia has envisioned itself playing a co-equal role to that of the United States in managing European security. But the Central and Eastern Europeans were looking for protection, not renewed influence, from Russia, and the United States, viewing itself as the Cold War victor, was not prepared to treat Russia as an equal. As Kimberly Marten has stated:
Russia mourned its lost status more than it feared a new security danger, and no realistic alternative to NATO’s geographic enlargement would have restored Russia’s status in the system, especially given the expansion of NATO’s mandates and the growth of US unilateralism….As long as Russia was not getting into Western security institutions, as long as those institutions were not subsuming themselves to the CSCE/OSCE or the UN, and as long as Russia was denied the right to veto the use of US and NATO force, Russian elites would not be satisfied.
The United States in the Clinton years believed it could use NATO as the primary driver of its European agenda while still maintaining good relations with Russia. Yeltsin seemed to go along with enlargement even while making clear it was hurting him at home. In May 1995, eight months after explaining to Yeltsin that NATO would be moving forward with enlargement (after the Russian elections in 1996), Clinton convinced the Russian president to join NATO’s Partnership for Peace program and the following year, Russian forces served alongside NATO forces in the military implementation force in Bosnia.
The United States was right to be ambitious for Europe, and with Europe, after the Cold War ended. Bringing Central and Eastern Europe into Western institutions in order to provide opportunities for those populations to live in peace and prosperity was a worthwhile goal after decades in which security eluded large parts of Europe due first to German and then to Soviet military invasion and occupation. The problem was less the strategy for countries like Poland and Hungary, but rather the lack of a meaningful plan for including countries like Russia, Ukraine and Georgia in the European security framework. Clinton and his top advisers spoke to Yeltsin about the possibility of Russia joining NATO someday and sought to ease Russia’s pain regarding enlargement through invitations to join the World Trade Organization, the Paris Club of Creditors, the OECD, and the G-7 (which became the G-8). At the end of the day, however, neither the United States nor the Europeans nor Russia figured out how to create an acceptable place for the latter in the post-Cold War European security framework. Partnership for Peace proved short-lived as a solution. Enlargement provided security for most of Central and Eastern Europe, but the NATO-Russia Founding Act (and its successor, the NATO-Russia Council) were insufficient mechanisms for cooperation between the West and Moscow. The Organization for Security and Cooperation in Europe was too weak, and once it began serious election monitoring and oversight of human rights abuses, it clashed with Moscow’s interests.
While the United States had a stake in promoting a united Europe (one that included Russia), and still has a stake in promoting a strong and democratic Europe, the future of the continent will be defined by Europeans. Some of the seeds of Europe’s current challenges were sown in the 1990s, such as the creation of a common currency absent a European finance ministry. Others arose more recently, such as the failure to recognize soon enough the impact of the war in Syria on European security. The United States has little role to play in helping Europe solve its internal problems, but it can at least refrain from fostering further divisions within the European Union.
A New Strategy Based on a Transatlantic Division of Labor
Containment as an organizing principle for American strategy arose after World War II as a response to the threat posed by European weakness and potential Soviet aggression against Western Europe. By 1989, a stronger Europe and a weaker Soviet Union offered an opportunity to pursue a Europe whole, free, and at peace. Now, America has come full circle, responding once again to the threat posed by renewed Russian aggression. In a December 2017 speech on “The U.S. and Europe: Strengthening Western Alliances,” Secretary of State Rex Tillerson focused almost exclusively on the threat posed by a “recently resurgent Russia.” He reminded his audience that NATO was defending its eastern members against Russia as it did during the Cold War.
Responding to Russian aggression, while a necessary pillar, is not a comprehensive Europe strategy, and it does not provide the kind of positive vision that fostering a Europe whole and free did in the heady days after the fall of the Berlin Wall. The United States needs to recognize that Europe, for so many decades an object in itself for U.S. strategists, can serve as a means to enable the continued rebalancing of American foreign policy.
And while containing Russian military aggression is important, the United States and its European allies should focus far more on thwarting Russia’s non-military means of realizing its aims and specifically Moscow’s efforts to sow chaos among Western democracies. Russian information operations aimed at undermining Western democracies and transatlantic unity should be galvanizing more cooperation amongst allies to enact real and resourced policies that can protect foundational democratic institutions. To date, this has not occurred. Obama largely ignored the threat in his last year in office, and Trump does not even want to admit the threat exists.
Mustering the political will to counter Russian behavior in the information warfare space will be hard, particularly given Trump’s aversion to confronting the facts and the difficulties of finding meaningful ways to respond. But even so, building a Europe strategy around countering Russian aggression is insufficient. The greatest geopolitical challenge the United States will face in the coming decades is the rise of China, which is the only country that could threaten the United States as a peer competitor in that timeframe. And America’s ability to focus more resources and attention on the rise of China depends on Europe taking on a larger role vis-à-vis Eastern Europe and the Middle East and North Africa.
The United States and Europe have a stake in a rule-based democratic order that limits the ability of countries like China and Russia to undermine that order. A greater division of labor between the two, with the United States focusing more of its attention on Asia, while Europe steps up to manage places like Ukraine and Syria, would be in the interests of both sides of the Atlantic.
America’s unipolar moment has passed, in part because of self-inflicted wounds and in part from the natural rise of the rest. A forward-looking strategy would recognize that the United States needs to work with Europe to maintain and strengthen a liberal order built on a belief in the importance of democracy, markets, and respect for the rule of law. Over the long run, the more significant challenge to this order will come from an illiberal China rather than from an illiberal Russia given the former’s likelihood of becoming a competitive global power.
Though most associate the “Asia pivot” with the Obama administration, the effort to rebalance U.S. foreign policy toward Asia began long before. Clinton came into office believing in the need to do so, but he became embroiled in the Balkans. Bush and his team entered office recognizing the need to respond to China’s rise, but Sept. 11, 2001 forever changed their focus. Obama recognized that U.S. foreign policy was weighted too heavily toward Europe and the Middle East and publicly promoted a rebalancing, but Russia’s actions in Ukraine and the rise of ISIL led him to increase America’s commitment in Eastern Europe, including the deployment of additional troops and more training exercises, and to return to Iraq after believing the United States had accomplished its mission there.
An underappreciated reality about the long-sought Asia rebalance is that it will be much more successful if the United States can coordinate a division of labor with a stronger Europe that can better address the challenges to its East and South. As the name implies, rebalancing means shifting some time, energy, and resources away from areas America has heavily invested in previously toward new challenges. If the United States has to lead the response to Russia in Ukraine while also serving as the primary country investing in Middle East stability, it will be less able to devote time and resources to the Asia-Pacific region.
America’s new long-term Europe strategy should seek a strengthening of relations with a more capable Europe to support a division of labor that upholds the liberal order (a strategy consistent with that called for by a group of German security analysts in a “Transatlantic Manifesto”). The United States would continue to rebalance toward Asia to counter the threat from China, while Europe develops the capacity to better manage the conflicts arising with Russia and to help stabilize the Middle East. This does not mean the United States would “leave” Europe but would rather seek to work with a more capable Europe to uphold an order that serves common Transatlantic interests. Several colleagues and I provided an example of this “division-of-labor” approach in a 2011 report for the Transatlantic Academy:
The division of labor will entail a new pattern of commitments. …[T]he EU should assume the leading role in engaging Russia to resolve conflicts in its neighborhood. In pursuing these objectives, Europe should employ and enhance a full panoply of instruments, ranging from economic associations and assistance for the development of civil society and democracy to peacekeeping forces. Europe should also build on its Mediterranean presence and past efforts in places such as Cyprus and Lebanon to advance economic, political, and social development in societies undergoing rapid transformation.
The United States will remain NATO’s leading military power, and there will be times when those capabilities are required. But as Daniel Hamilton and Stefan Meister have suggested, the European Union has a variety of institutional mechanisms to foster stability and peace to the East and South. They note that this could include a revamped Eastern Partnership that, for example, invests in institution-building efforts such as border management to address separatist conflicts.
A division-of-labor strategy depends above all not on America, but on Europe. We have seen Europe work toward this in recent years: The United Kingdom and France took the lead in the war in Libya (although unfortunately no one took the lead after the war ended), while France and Germany have been key players in attempting to negotiate an end to the war in Ukraine. The President of France Emmanuel Macron has sought greater involvement in the Middle East, and his government has announced its ambition to develop the capabilities to play a more important role in the region. The German Transatlantic Manifesto is a healthy sign that security analysts in that country are thinking along these lines. Though Merkel emerged from Germany’s recent elections in a weaker position than many had hoped, she remains a formidable force in shaping the future of her country and the continent. The recent coalition agreement forged with the Social Democrats, suggests former German government official Thomas Kleine-Brockhoff, “signals to President Macron in France that we are ready” to tackle the kinds of E.U. reform necessary to rejuvenate the institution.
A more proactive Europe is not simply about spending more on defense, but rather about formulating the common foreign and security policy that has eluded it over the past two decades. The beginnings of another such effort has emerged recently through the European Union’s Permanent Structured Cooperation (PESCO), as well as Macron’s proposed European Intervention Initiative, which would include the United Kingdom. Europe will not replace the U.S. militarily, but it doesn’t need to. The European Union should continue to build the capacity for small-scale operations and can use its leverage as an economic institution to invest in stability in fragile states along its periphery. Any efforts the European Union undertakes should complement what NATO does, and allies should make this a central feature of the July 2018 NATO summit agenda.
The European Union will have to sort out its relationship with the United Kingdom and manage the authoritarianism, secessionism, and backsliding emerging across the continent. The United States should encourage Macron and Merkel as they pursue the reforms necessary to address Europe’s political and economic challenges. And when America encourages more European defense spending, it should do so not, as Trump often argues, to get allies to pay back the United States but to more proactively promote European efforts to provide stability and security in the broader region.
While it may be hard to imagine Europe being more able to step into this role in the face of many internal challenges, Charles Grant and his colleagues at the Centre for European Reform argue that this is in fact a propitious moment for European reform. They suggest that continental European solidarity is more likely to finally emerge with the Eurozone in its current period of overall economic growth and because of the reaction to the illiberal policies of Trump, Putin, and Erdoğan. In this scenario, the United Kingdom and the European Union will manage to reach a satisfactory agreement on the terms of Britain’s departure, and Macron and Merkel will successfully work together to move Europe forward, including making the necessary adjustments for the Eurozone. Critical to the success of European reform, however, will be the ability of France and Germany to stem the tide of rising authoritarianism in countries like Poland and Hungary. And while a serious European effort to build greater capacity could be a positive result of the Trump presidency, a coordinated division of labor to manage global challenges is preferable to the two sides of the Atlantic pulling away from one another.
A 21st Century Case for a Strong Europe
The United States needs a stronger Europe not for 20th century reasons of preventing conflict arising in the center of the continent, but for 21st century reasons of managing the threat posed by a rising China. The Clinton, Bush, and Obama administrations all sought to focus on the challenge from Asia but they continued to get dragged into (or in one disastrous instance, initiated) conflicts in Europe and the Middle East. While the United States will always play a key role in those traditional areas of American interest, a stronger Europe can and should take on more of the load in its neighborhood. The United States and Europe both have a stake in a rule-based democratic international order. A greater coordinated division of labor would enable the West to continue to promote its common interests in the face of the illiberal challenges arrayed against it.
Nearly 30 years after George H.W. Bush spoke at Mainz, the European project of the last several decades appears to be faltering. The continent today is in many ways neither whole, nor free, nor at peace.
This is no time for the United States to encourage Europe’s divisions. The United States should hope that Brexit is managed in a way that does as little damage to the United Kingdom and Europe as possible, and that France and Germany are more successful promoting European democratic values than Poland and Hungary are in espousing illiberalism. It’s sad to see the West back to containing Russia after the high hopes of the early 1990s, but the United States still has a stake in a strong Europe successfully limiting its internal fracturing and taking on more burdens to its East and South, so that the United States can turn more of its attention toward China and the rest of Asia over the course of the 21st century.
James Goldgeier is Professor of International Relations at American University and Visiting Senior Fellow at the Council on Foreign Relations. You can follow him on Twitter @JimGoldgeier.
|
<urn:uuid:4fb58e26-0a44-4d34-8917-146f05920fa5>
|
CC-MAIN-2018-34
|
https://warontherocks.com/2018/02/less-whole-less-free-less-peace-whither-americas-strategy-post-cold-war-europe/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210249.41/warc/CC-MAIN-20180815181003-20180815201003-00527.warc.gz
|
en
| 0.961854 | 8,861 | 3.03125 | 3 |
1. "Of the eighth," seems here obscure. For the rest of this title is more clear. Now it has seemed to some to intimate the day of judgment, that is, the time of the coming of our Lord, when He will come to judge the quick and dead. Which coming, it is believed, is to be, after reckoning the years from Adam, seven thousand years: so as that seven thousand years should pass as seven days, and afterwards that time arrive as it were the eighth day. But since it has been said by the Lord, "It is not yoursto know the times, which the Father hath put in His own power:" and, "But of the day and that hour knoweth no man, no, neither angel, nor Power, neither the Son, but the Father alone:" and again, that which is written, "that the day of the Lord cometh as a thief," shows clearly enough that no man should arrogate to himself the knowledge of that time, by any computation of years. For if that day is to come after seven thousand years, every man could learn its advent by reckoning the years. ...
3. In fear of which comdemnation the Church prays in this Psalm, and says, "Reprove me not, O Lord, in Thine anger" (ver. 1). The Apostle too mentions the anger of the judgment; "Thou treasurest up unto thyself," he says, "anger against the day of the anger of the just judgment of God." In which he would not be reproved, whosoever longs to be healed in this life. "Nor in Thy rage chasten me." "Chasten," seems rather too mild a word; for it availeth toward amendment. For for him who is reproved, that is, accused, it is to be feared lest his end be condemnation. But since "rage" seems to be more than "anger," it may be a difficulty, why that which is milder, namely, chastening, is joined to that which is more severe, namely, rage. But I suppose that one and the same thing is signified by the two words. For in the Greek qumoj, which is in the first verse, means the same as orgh, which is in the second verse. But when the Latins themselves too wished to use two distinct words, they looked ...
2. Be we then willingly ignorant of that which the Lord would not have us know: and let us inquire what this title, "of the eighth," means. The day of judgment may indeed, even without any rash computation of years, be understood by the eighth, for that immediately after the end of this world, life eternal being attained, the souls of the righteous will not then be subject unto times: and, since all times have their revolution in a repetition of those seven days, that per-adventure is called the eighth day, which will not have this variety. There is another reason, which may be here not unreasonably accepted, why the judgment should be called the eighth, because it will take place after two generations, one relating to the body, the other to the soul, For from Adam unto Moses the human race lived of the body, that is, according to the flesh: which is called the outward and the old man, and to which the Old Testament was given, that it might prefigure the spiritual things to come by ope...
Indignation. Literally, "fury. "(Haydock)
Such strong expressions were requisite to make the carnal Jews fear God's judgments, though a being of infinite perfection can have no passion. (St. Chrysostom)
David does not beg to be free from suffering, (Haydock) but he requests that God would chastise him with moderation, Jeremias x. 24., and xlvi. 28. (Calmet)
Justice without mercy is reserved for the last day. (St. Gregory)
Wrath. This regards those who have built wood, on the foundation. They shall be purified by fire. (St. Augustine) Purgatory was then believed in the 4th Century. (Berthier)
Let me not be condemned either to it, or hell. (St. Gregory, hic. and Psalm xxxvii.)
For the octave. That is, to be sung on an instrument of eight strings. St. Augustine understands it mystically, of the last resurrection, and the world to come; which is, as it were, the octave, or eighth day, after the seven days of this mortal life; and for this octave, sinners must dispose themselves, like David, by bewailing their sins, whilst they are here upon the earth. (Challoner) (Worthington)
It may also signify, that this psalm was to be sung by "the eighth "of the 24 bands, 1 Paralipomenon xv. 21. David might compose it after sickness, with which he had been punished for his adultery; (Calmet) or under any distress: he expresses the sentiments of a true penitent, (Berthier) with which he was ever after impressed. (Haydock)
It is applicable to penitents of the new law. (Worthington)
|
<urn:uuid:5c476aaf-261f-4fff-8f5a-aec822e45db0>
|
CC-MAIN-2022-49
|
https://catenabible.com/ps/6/1
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711121.31/warc/CC-MAIN-20221206225143-20221207015143-00854.warc.gz
|
en
| 0.977563 | 1,108 | 2.515625 | 3 |
Blue Ridge is a small city situated in Fannin County in the northern portion of the US State of Georgia. The city is located approximately 1 hour from the state capital, Atlanta, and sits between the Tennessee and Alabama Rivers. Blue Ridge covers a total area of 6.2 sq. km, all of which is occupied by land. Blue Ridge experiences an annual average high temperature of 21 degrees Celsius and an average low of 6 degrees Celsius.
History Of Blue Ridge
The area that is now Blue Ridge is the traditional territory of the Cherokee Nation. Fannin County had a notable pro-Union population during the Civil War of 1861-65, within a state that voted to join the Confederacy. The modern town of Blue Ridge was founded in 1886 when the Marietta and North Georgia railroad lines were built. Blue Ridge was then made the county seat of Fannin County in 1895. Fannin County saw the creation of a dam on the Toccoa River in the 1930s. The dam created the Toccoa Lake Reservoir, which became a tourist attraction, and was later renamed "Lake Blue Ridge." Fannin County also had a distinguished moonshining ring, which was eventually hunted down by the ATF in 1983.
The Population And Economy Of Blue Ridge
According to the latest US Census, Blue Ridge has a population of 1,253 people, the vast majority of which were white at 89%. The second-biggest demographic is the Hispanic population at 5%. The rest, 5%, is made up of various peoples, such as African-Americans, mixed-race people, and Asians. Approximately 64% of Blue Ridge is religious, and 45% follow the Baptist tradition of Christianity.
Blue Ridge being a small town means that the employers of the town are not too plentiful. The nearby dam on Lake Blue Ridge creates considerable energy and income. Lake Blue Ridge itself is considered a good spot for tourists. There is also the Blue Ridge Scenic Railway, which opened in 1998 and brought some outsiders to the town. Another prominent employer is the Fannin County School District. Furthermore, there is a growing LGBT business community in the town, though the said community is not without its opposition in the conservative county. One can find refreshments at Grumpy Old Men Brewing. There are also a good amount of spots that nature-lovers will enjoy, such as the Long Creek Falls, Morganton Point Recreation Area, Aska Trails, and Mercier Orchards. There is also a vibrant downtown area to go shopping or to interact with the community.
|
<urn:uuid:8410c86a-0c22-478e-9b41-8b3f0bd14a62>
|
CC-MAIN-2023-50
|
https://www.worldatlas.com/cities/blue-ridge-georgia.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100146.5/warc/CC-MAIN-20231129204528-20231129234528-00498.warc.gz
|
en
| 0.977973 | 522 | 2.609375 | 3 |
Paul Maruyama grew up in Tokyo with three other brothers who were always fighting each other. His mother, a Seattle-born Nisei, was fed up and said, “if you’re going to fight, then fight at the dojo.” She dragged the brothers to a neighborhood judo dojo, where the brothers all started their journey to black belt. For Paul, his journey would continue as member of the US Judo Olympic team in 1964, and Head Coach of the 1980 and 1984 US Judo Olympic Teams.
Competing at the Olympic level is a challenge. But Paul Maruyama readily acknowledges that his efforts and accomplishment pale in comparison to those of his father.
After the United States dropped an atomic bomb on Hiroshima on August 6, 1945, the Soviet Union invaded Manchuria, where the Japanese had a significant colonial population. The Soviet army captured Japanese Imperial Army soldiers and sent them to labor camps in Siberia, while non-combatant Japanese who were in many cases pioneer families who volunteered to cultivate farmlands in Manchuria, were trapped on the Asian continent, denied exit by the Soviet Union.
Maruyama’s father, Kunio Maruyama, had made his way to Japan with two other men, Hachiro Shinpo and Masamichi Musashi. As Paul Maruyama describes in his book, Escape from Manchuria, the three men maneuvered covertly out of Manchuria. They were on a mission to inform the government in Japan that some 1.5 to 1.7 million Japanese were unable to leave the former Japanese colony, where thousands were dying daily due to disease and starvation, as well as at the hands of Soviet soldiers, and revenge-seeking Chinese and Manchurian mobs.
The three then had to convince the head of the Supreme Commander of the Allied Powers (SCAP), General Douglas MacArthur, that an urgent rescue was needed. It took over two years, but by August 1948, three years after the end of the second world war, American warships had repatriated over a million Japanese. So many more remained – children abandoned or taken in by Chinese families, Japanese women married to Chinese and their children who were not considered Japanese citizens, as well as men who were imprisoned in Siberia.
What a legacy! Think about it. The greatest growth in Japan’s population was the 1950s, at 15.6%. Not only were a million Japanese returned, there were likely another 150,000 born of that million. And then there’s the grand children born in the 1970s and 1980s, and the great grandchildren born in the new millennia…
Paul Maruyama was one of those children rescued. His achievements as an Olympian, and as an a lecturer in Japanese at Colorado College, and as a cultural bridge between the US and Japan was recognized by the Japanese government when he was awarded “The Order of the Rising Sun, Gold Rays with Rosette” in May of 2013. His father, Kunio, received a similar recognition 30 years prior posthumously. But Paul does not believe there is any basis of comparison. “I don’t consider myself worthy to follow in my father’s footsteps.”
|
<urn:uuid:0104219c-17ad-462a-9771-84c7f664a5b1>
|
CC-MAIN-2023-06
|
https://theolympians.co/2015/07/27/escape-from-manchuria-how-the-father-of-an-olympian-left-a-legacy-beyond-olympic-proportions/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499713.50/warc/CC-MAIN-20230129112153-20230129142153-00659.warc.gz
|
en
| 0.98835 | 665 | 2.71875 | 3 |
For better understanding the mechanism of the occurrence of pipeline span for a pipeline with initial embedment, physical and numerical methods are adopted in this study. Experimental observations show that there often exist three characteristic phases in the process of the partially embedded pipeline being suspended:
local scour around pipe;
onset of soil erosion beneath pipe; and
complete suspension of pipe.
The effects of local scour on the onset of soil erosion beneath the pipe are much less than those of soil seepage failure induced by the pressure drop. Based on the above observations and analyses, the mechanism of the occurrence of pipeline spanning is analyzed numerically in view of soil seepage failure. In the numerical analyses, the current-induced pressure along the soil surface in the vicinity of the pipe (i.e. the pressure drop) is firstly obtained by solving the N-S equations, thereafter the seepage flow in the soil is calculated with the obtained pressure drop as the boundary conditions along the soil surface. Numerical results indicate that the seepage failure (or piping) may occur at the exit of the seepage path when the pressure gradient gets larger than the critical value. The numerical treatment provides a practical tool for evaluating the potentials for the occurrence of pipe span due to the soil seepage failure.
When a submarine pipeline is laid upon seafloor, there always exists some embedment into the soil. In severe ocean environments, the soil beneath the pipeline may be scoured, and the pipeline will thereby be suspended above the seafloor. The occurrence of pipeline span is proven to bring much potential for vortex-induced vibrations of pipelines. Therefore, to efficiently avoid the occurrence of pipeline span is highly desired in the pipeline engineering.
|
<urn:uuid:491d50a5-44d7-4a7e-8daf-943273f35aae>
|
CC-MAIN-2023-40
|
https://onepetro.org/ISOPEIOPEC/proceedings-abstract/ISOPE07/All-ISOPE07/ISOPE-I-07-567/10611
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510368.33/warc/CC-MAIN-20230928063033-20230928093033-00688.warc.gz
|
en
| 0.929097 | 352 | 2.796875 | 3 |
SRC’s two Climate Reference Stations (CRS), in Saskatoon and at the Conservation Learning Center (southeast of Prince Albert, Sask.), provide high quality and consistent climatological observations that track the increased climate variability on the Prairies.
Both sites are classified as principal climatological stations with supplementary climatological observations. Both follow World Meteorological Organization and Environment Canada standards.
Annual and Monthly Weather Summaries
SRC provides monthly and annual weather summaries for both stations, which include temperature, precipitation, relative humidity, pressure, wind speed, bright sunshine hours and soil temperatures and moisture.
Please fill in the information below to access our monthly and annual weather summaries.
|
<urn:uuid:6390a1b6-e309-45df-af45-2a6e5b90a25a>
|
CC-MAIN-2019-43
|
https://www.src.sk.ca/climate-reference-stations/crs-weather-summaries
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987841291.79/warc/CC-MAIN-20191024040131-20191024063631-00456.warc.gz
|
en
| 0.888936 | 144 | 2.796875 | 3 |
In a particularly nasty move, the company that supplies water to the Occupied West Bank, Mekorot, has cut supplies to the Palestinians. It is ironic that the state owned company would restrict the Palestinians living in the Occupied West Bank yet not cut the flow to the illegal Israeli settlers there.
The Palestinians in cities obtain their water from the Mountain Aquifer which runs under both countries. Some water surfaces as springs or dug wells, but the majority is used by Israel. It is an important source of drinking and irrigation water. Israeli citizens depend on the Mountain Aquifer for about 50% of their drinking water and about 40% of the irrigation water also comes from this aquifer. The River Jordan is another very important water source. The Palestinians are left with about 20% of the Mountain Aquifer flow.
For a relatively few years Israel had an abundance of water, augmented by desalination plants, but it is beginning to experience a shortfall in its needs. Palestinians complain that when water is rationed, they are always hit the hardest. Water usage varies greatly depending on which side of the fence you dwell on. Per capita consumption in Israel is about 350 litres per day, in the Occupied West Bank about 60 litres per day.
According to the UN, 7.5 litres per capita per day is the minimum requirement for most people under most conditions but in some areas of Palestine - where temperatures exceed 35 degrees celsius - the minimum requirement is much higher. Al Jazeera
To add to the water problems in the area, the Mountain Aquifer is vulnerable to surface contamination. Both Israeli and Palestinians contribute pollution in the form of solid waste and sewage. More water is being drawn out than is being replenished.
This is the month of Ramadan which is observed by those of the Muslim Faith. It continues until July 5th. During Ramadan followers are required to refrain from eating and drinking, as well as refrain from personal indulgences during daylight hours instead focussing on their faith and their duty to one another. When daylight fades, they may eat and drink. To deny people in their own land access to adequate water especially during Ramadan, seems very mean spirited.
Eco Peace Middle East
Robert Mugabe is the president of Zimbabwe, the former Southern Rhodesia. He has been president of the country since it achieved independence from Britain. He has ruled the country since 1980. His rule has been marked with vote rigging, mass emigration, human rights abuses and economic decline.
Shortly after achieving independence, Mugabe initiated land seizures from the predominately white farmers. Land was seized or acquired at bargain prices. Under the guise of land reform, many of the farms were turned over to Mugabe cronies. Some land was given to the landless, but lacking the experience and capital, many agricultural enterprises failed. The country moved from a food exporting country to one that imported food.
The country’s staple food crop has failed this year. The super El Nino has caused a drought which has resulted in a 75% failure of the maize crop. Many are poorly fed.
This has not discouraged the ruling elite from throwing a lavish birthday party for the president. Saturday February 27 marked his 92nd birthday celebrations. Mugabe turned 92 in office. A million dollar party was held at the site of Great Zimbabwe. Approximately 50 000 guests were feted. A photo published in The Guardian shows Mugabe and his wife, both very well fed eating cake during the celebration.
The country has declared a state of emergency due to the crop failures. The president has asked the international community to contribute at least USD$1.6 billion to help feed the starving. He has announced that he will only accept aid if it is “no strings attached”. That is in reference to many countries’ objections to his human rights record.
If Mugabe is a normal human, he will not live forever. No doubt many are speculating about who will succeed him. It is unlikely that it will be a smooth transition to a real democracy. Speculation abounds that Mugabe is pushing for his wife, Grace, to succeed as head of state. He elevated her to the head of the Zanu PF women’s wing in 2015. Others are not keen on her.
The pictures of the head of state and his wife eating cake while millions are teetering on starvation brings to mind the famous words of Marie Antoinette.
News Dze Zimbabwe
The building of massive settlements for Jewish people while building massive walls to keep Palestinians from their land has been condemned by the UN.
The nastiness is not confined to the terrorists living in the occupied territories. In September, Prime Minister Netanyahu made it clear to the world that Israel will not allow people fleeing the Syrian civil war. He announced the building of another massive barrier wall construction to keep the people out. He is quoted below:
"We will not allow Israel to be flooded with illegal migrants and terrorists." Common Dreams
It would behoove those in power in Israel to look to the growing number of fascists within their ranks and extirpate them.
Guided and instigated by far-right ideologues such as Benzion Gopstein and Baruch Marzel, the crowds chanted their usual “Death to Arabs,” “A Jew has a soul, an Arab is a son of a whore,” and other similar malicious slogans. Mondo Weiss
Military personnel were sent to camps in Turkey, Lebanon and Jordan to interview prospective immigrants. They were assisted by UN personnel and numerous checks of identity and background were conducted before the refugees were given the green light to emigrate to Canada.
Canada Border Services Agency(CBSA) has worked closely with Pearson Airport officials to bring online a vacant terminal separate from the commercial part of the complex to enhance the ability to further screen new arrivals.
"With our many partners, we have worked to make new arrivals as comfortable as possible, while protecting the integrity of the arrival process," said the CBSA's Regional Director General Goran Vragovic in a news release.
As well as finalizing the paperwork, the new arrivals will be given warm clothing appropriate for their destination.
It may come as a surprise to many that many of the people who live in the camps do not wish to emigrate. Their wish is to return to their own country when peace is achieved.
Those that arrived on Thursday were personally greeted by PM Justin Trudeau who was filmed helping new residents with warm clothes.
Blogger, gardener, farmer. Working toward food security and a 30 foot
diet. Addicted to reading. Love this planet, especially my little corner
on Vancouver Island, Canada
Running a news based website is fun, time consuming and can be costly. If you would like to help the site keep afloat please use the donate button
|
<urn:uuid:3bb365c0-0f7f-49b8-bfb7-0a0bc003bd70>
|
CC-MAIN-2020-16
|
https://www.newtekjournalismukworld.com/bmcpherson/category/human-rights
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371807538.83/warc/CC-MAIN-20200408010207-20200408040707-00171.warc.gz
|
en
| 0.969571 | 1,397 | 2.671875 | 3 |
It is not news that we live in a 24/7 world. For the majority of us, it seems there is always too much to do and not enough time to do it. In light of those realities, the idea of taking a whole day for worship, rest, and relaxation seems rather anachronistic. Yet, perhaps it is because life goes at such a frantic pace today that observance of the sabbath rest deserves a second look. The sabbath has its roots in the Jewish faith. The commandment to “Keep Holy the Sabbath” referred to the seventh day of the week. On the seventh day, God rested after the work of creation had been completed. “The sabbath is at the heart of Israel’s law. To keep the commandments is to correspond to the wisdom and the will of God as expressed in his work of creation” (Catechism of the Catholic Church, 348). In the Christian tradition, however, this observance has moved to the eighth day. “For us a new day has dawned: the day of Christ’s Resurrection. The seventh day completes the first creation. The eighth day begins the new creation… The first creation finds its meaning and its summit in the new creation in Christ, the splendor of which surpasses that of the first creation” (CCC, 349).
So, then, how are we called to observe this holy day of each week? First and foremost, we are called to worship. By gathering with others of our faith at Mass, we join in communal celebration of the paschal mystery and engage in praise of God. It is also meant to be a day of grace and rest from work. “Human life has a rhythm of workand rest. The institution of the Lord’s Day helps everyone enjoy adequate rest and leisure to cultivate their familial, cultural, social, and religious lives” (CCC, 2184). Sunday is a day that can be dedicated to service, by “devoting time and care to families and relatives”. It is also a day for “reflection, silence, cultivation of the mind, and meditation” (CCC, 2186).
Those are high standards for this day! The reality often comes up short. Many people are required to work on Sundays. Even those of us who do not need to work on Sundays may have other demands put on our time on that day. Mothers, who may be able to arrange a respite from most housework on Sundays by getting their chores done the rest of the week, nevertheless still need to engage in the service of childcare on Sundays. Rest may be a very elusive goal. Attending Mass, which should be a time of reflection and prayer, can often feel more like an ordeal to be endured if one has infants and toddlers in tow. The benefit is still there, but it is certainly not always a prayerful, meditative experience! Yet, in spite of these obstacles, God, Who sees what is in our hearts, knows if we do try to set this day apart. It may not be possible to set aside the whole day, but perhaps a few hours are within reach. Perhaps it is possible to slow down the pace of life for a little bit, to really consider the activities we engage in on Sunday and decide whether they add or detract from the spirit of the day.
There is also something to be said for allowing sabbath moments to be observed throughout all the days of the week. Sunday is the holy day, but all days are holy. Time spent in prayer throughout the week can serve as a mini-sabbath. Time spent with relatives or at a family dinner can foster increased emphasis on the ties that bind. Time spent in service to others or in creative pursuits can help us to relax and rejuvenate ourselves and the world around us. We all need rest. We all need a break from the pressures of work and the focus on money. We need to remember what truly matters in life. Charlotte Ostermann in Souls at Rest: An Exploration of the Idea of Sabbath encourages us “to think of creative ways — on Sundays, and in Sabbath moments through the week — to quiet the place where you dwell… ‘dwell’ implies an at-home-ness — a leisurely sense of spending time at home just being — in contrast to home as a way-station for distracted, disconnected family members stopping off en route to a scattering of separate doings elsewhere.” Our world and our families are in desperate need of rest and a renewed focus on God. Perhaps a renewed appreciation and observance of the sabbath is just what we need.
|
<urn:uuid:e7f65b62-15af-4330-878d-0583fbbed903>
|
CC-MAIN-2014-52
|
http://catholicexchange.com/time-for-sabbath-rest
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802769642.136/warc/CC-MAIN-20141217075249-00159-ip-10-231-17-201.ec2.internal.warc.gz
|
en
| 0.969138 | 960 | 2.671875 | 3 |
By Nicholas Kalaitzandonakes & Jayson Lusk
On November 6 Californians will be asked to cast their ballot on Proposition 37, which would require mandatory labeling of foods containing genetically modified ingredients. Although opponents and proponents disagree on the exact cost consequences of the Proposition, there is little doubt food prices paid by California consumers will rise. A question that seems to have received little attention is who suffers most from such price hikes? This is unfortunate because it would be difficult to devise a more regressive food tax on the poor and the elderly than the one promised by Proposition 37.
The Proposition seeks to mandate labels for foods containing more than 0.5 percent of ingredients from GMO commodities, such as corn and soybeans, and will likely be costly. But with enough exceptions on what foods will actually need the GMO labels, Proposition 37 promises to transfer most of the implied costs to those who can least afford them.
It is hard to know just how expensive a mandatory GMO-labeling law could prove for California households. Much would depend on how food companies would choose to respond to such a mandate. Our research from different countries suggests that instead of using GMO labels, most food companies prefer to buy more expensive non-GMO ingredients and pass the added costs to the consumers.
A couple of recent research reports have put the potential costs of Proposition 37 in the hundreds of dollars per year for each California household. But these are averages and they do not tell the whole story.
Lower income households across the United States spend a larger portion of their income on food than higher income households. Lower income households also spend most of these dollars for food at home. High income individuals spend more at restaurants and eateries. Similar trends exist for older relative to younger consumers.
The data shows that Western households with annual income of $10,000-$20,000 spend between 21 and 26 percent of this income for food. Two out of three such dollars are spent at the grocery store for foods cooked and consumed at home. By contrast, affluent households with annual income of more than $70,000 spend less than 8 percent of their income for food and only about half of that at the grocery store.
Similarly, households headed by consumers 65 or older have, on average, less than $40,000 in annual income, spend more than 12 percent of that for food and two out of three such dollars are spent for food at home. Younger households headed by consumers 35-54 years old have, on average, 50 percent more income, spend about 10 percent of it for food and almost half of such food dollars are spent away from home.
Moreover, research has shown that younger, richer consumers spend more on organic food than older, poorer ones.
Interestingly, Proposition 37 calls for mandatory GMO labeling of foods bought at the grocery store and consumed at home, but does not require the same for foods consumed in restaurants, cafeterias, catering, schools, and the like. It also excludes all organic foods from mandatory GMO labeling irrespective of where they are consumed and of their GMO content.
Given these rules and exclusions, younger and more affluent consumers who spend more on organics and on food away from home would be less affected by Proposition 37. Poorer and older consumers could instead be called to foot the bulk of the bill implied by the Proposition while spending a larger portion of their limited income in doing so.
Our recent research on the attitudes of California consumers toward Proposition 37 suggests that there are no significant differences in the way high and low income or younger and older households would vote for the Proposition. Whether those most likely to be affected appreciate the potential economic implications of Proposition 37, we do not know. Nevertheless, the distributional consequences of the Proposition should not be ignored.
Dr. Nicholas Kalaitzandonakes is MSMC Endowed Professor of Agricultural and Applied Economics at the University of Missouri and can be reached at [email protected]; Dr. Jayson Lusk is Professor and Willard Sparks Endowed Chair in the Department of Agricultural Economics at Oklahoma State University and can be reached at [email protected].
|
<urn:uuid:e9c9c53a-22f1-4608-9968-3f43ae253f81>
|
CC-MAIN-2018-22
|
https://www.forbes.com/sites/realspin/2012/11/02/who-will-cover-the-costs-of-californias-prop-37/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867559.54/warc/CC-MAIN-20180526151207-20180526171207-00468.warc.gz
|
en
| 0.958515 | 841 | 2.8125 | 3 |
China is currently building more coal plants than it needs and in doing so is misallocating capital at an unprecedented rate.
As of July 2016, China had 895 GW of existing coal capacity being used less than half of the time – and perversely has 205 GW under construction and another 405 GW of capacity planned, with a total overnight capital cost of half a trillion US dollars.
This misallocation of capital is a microcosm of wider structural woes within the Chinese economy. China’s rapid economic growth, demographic profile and geographical size has meant it often made sense for the government to build power infrastructure first and ask questions later.
The days when China could grow at a fast pace by accumulating capital, safe in the knowledge that this capital would achieve high returns, appear to be over.
China’s coal power investments have reached an important juncture: keep pouring capital into increasingly unviable projects and put the financial system under additional pressure from the risk of large-scale defaults, or stop investing and promote efficiency.
As power demand growth slows from a historical average of 10 percent to 3 percent or less per year, the coal capacity in the pipeline, as well as some existing coal capacity, risks becoming stranded due to low carbon capacity targets, ongoing reforms in the power sector and carbon pricing.
A new report, Chasing the Dragon? China’s coal capacity crisis and what it means for investors, presents analysis which finds China no longer needs to build any additional coal plants and therefore it makes sense to act with conviction to contain its coal overcapacity crisis.
To prove this, Carbon Tracker Initiative developed a short-term scenario analysing the 2020 targets in the 13th five-year plan (13 FYP) and a long-term scenario analysing the implications of limiting the average global temperature increase to 2°C.
Carbon Tracker Initiative also develop a 2020 reform scenario which models the potential impact of power market reforms and a national emission trading scheme (ETS) on the gross profitability of each operating coal plant in China.
Investors who fail to understand the immediacy of China’s energy transition could find themselves chasing fossil fuel demand that is not there.
13th five-year plan doesn’t add up for coal generation
Low carbon capacity targets in the 13 FYP coupled with a low power demand environment will likely strand coal capacity. Additional capacity beyond existing plants is only required by 2020 if power generation growth exceeds 4% per year and coal plants are run at a capacity factor of 45% or less. If plants under construction are built and existing capacity are run at a 45% capacity factor, then 210 GW of coal capacity is unneeded in 2020 in an environment where power generation growth is 3% per year. Indeed, even in the most optimistic scenario (i.e. sub 45% capacity factor and above 5% power generation growth) there would still be a surplus if capacity under construction is built and operated alongside existing capacity.
Half a trillion US dollars of wasted capital could be avoided
To remain consistent with the IEA’s 2°C scenario (2DS) China can avoid building any new coal plants from now until 2032 by marginally increasing the utilization of their existing fleet. After 2032, the existing fleet becomes inconsistent with the 2DS due to rapidly declining capacity factors and therefore units will need to be progressively retrofitted with Carbon Capture and Storage (CCS) or retired prematurely.
Since China can rely on its existing units to generate the power allocated to unabated coal plants in the 2DS, all units currently under construction and planned are not needed and pose a significant financial risk. Based on a capital cost of US$800 million per kW, US$490 billion of capital could be wasted on plants under construction and planned.
2°C carbon budget bust in 2030s without further policy reform
If no new coal plants are built and each existing unit is retired when it turns 40 years old, the 2°C carbon budget will still be exhausted by 2040. After 2040, coal capacity would need to emit no carbon to remain consistent with the 2°C budget. This is currently technically impossible as existing CCS-equipped coal plants still emit around 100 grams of carbon per kWh. If under construction capacity is built alongside existing capacity with a 40-year lifetime, the 2°C budget will be exhausted by 2036.
Given it would not be practical to phase-out a large amount of generation in a single year, the transition away from coal will obviously require retirements before this date. It is important to note that this scenario analysis uses a capacity factor of 50% and is based on a 50% chance of limiting the average global temperature increase to 2°C.
he following factors will both reduce the 2°C budget and consume it more quickly: (i) holding temperate rise to well below 2°C as described in the Paris Agreement; (ii) a higher probability of limiting temperature rise; and (iii) a higher capacity factor.
Reforms on the rise
Whether through an economic, air quality or climate lens, the Chinese government has every reason to contain its coal overcapacity crisis. The National Development and Reform Commission (NDRC) and other government institutions are aware of the overcapacity crisis and the need for policy interventions to return coal generation investments to equilibrium.
The reforms from the government have increased in frequency and severity in 2016. A policy proposal was released in April to halt the construction of 372 GW of planned capacity – greater than the entire US coal fleet. Even plants under construction are not safe: more recently, the NDRC made the decision to halt 17 GW already under construction, setting a legal precedent that will likely be repeated in the future.
Power market reforms, in combination with the national ETS, could strand coal units with higher operating costs by promoting least cost units and low carbon generation.
Carbon Tracker Initiative developed a 2020 reform scenario to illustrate the impact of a national ETS and power market reforms.
Incorporating a carbon price of $US10/tCO2 to reflect the introduction of a national ETS in 2017 and a 15 percent reduction in coal power tariffs from ongoing power market reforms, the gross profitability of the operating fleet halves by 2020, with 27 GW becoming cash flow negative and 140 GW making a gross profit of US$5 per MWh or less.
The NDRC put – China to become a net exporter of coal again
The Chinese government are like the central bank of the seaborne coal market. The stellar gains in thermal coal prices this year are entirely a result of China’s NDRC. It’s becoming harder to see how these gains can be sustained.
The NDRC has intervened to supress prices by relaxing its production cuts. By restarting mothballed capacity seaborne investors are actively challenging the effectiveness of Chinese policy.
If history is any guide, betting against the efficaciousness of Chinese policy is not sensible. With China acting as the marginal buyer on the seaborne coal market, investors should prepare themselves for a world where China is a net exporter.
Given the expected coal generation levels by 2020 under the 13 FYP, Carbon Tracker Initiative expects thermal coal demand to be lower than 2015 levels. Even if Chinese domestic supply is curtailed somewhat during this period, it could still result in China no longer being a net importer.
The technology race
The bilateral agreements between China and the US administrations to make efforts to reduce emissions to prevent dangerous levels of climate change sent several signals. One key section related to how both of the world’s largest economies would be investing in the technologies to deliver a low carbon future.
Clearly there are huge opportunities to export the solutions for the companies that win the race.
Questions have been raised as to whether the US will still be in the race under its incoming President – hopefully the economic opportunities and energy independence offered by new energy technologies will make them attractive to the new administration.
Regardless, we believe China will keep racing forward either way for all the reasons outlined above.
The basic maths of continued growth in China’s coal capacity does not add up, and the 13 FYP marks the point where this cannot be ignored any longer. The changing generation mix, the slowdown in power generation growth and existing coal plant overcapacity combine to present a different challenge for China.
With coal generation set to peak, there is no need for further coal capacity, whilst on the supply side, there is the potential for China to become a net exporter of coal again.
|
<urn:uuid:3fd1be98-c893-4756-896b-5a7dd58d6aac>
|
CC-MAIN-2019-04
|
https://asiapacificreport.nz/2017/01/18/china-coal-plant-building-at-crossroads-amid-carbon-pricing-reforms/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584431529.98/warc/CC-MAIN-20190123234228-20190124020228-00088.warc.gz
|
en
| 0.934099 | 1,748 | 2.671875 | 3 |
In September 2015 the United Nations Sustainable Development Goals (SDG) were adopted. Through the 17 goals and corresponding targets all member States of the United Nations are committed to work to secure global sustainable development. The SDGs are not only relevant for developing States, they are directly relevant to the member States of the Council of Europe. Several of the goals are within the scope of what the Council of Europe is working for. This is especially true for the goal on peace, justice and strong institutions, as well as the goals on ending poverty, education, gender equality and climate change.
Co-operation between the Council of Europe and the United Nations is important, and it is the topic for a report under preparation in the Parliamentary Assembly. It is of great importance that this co-operation contributes to the SDGs being met. The Council of Europe is working to contribute to meeting the SDGs, and the member States should be compelled to follow up as well.
National parliaments play an important role in meeting the SDGs. Parliaments represent the people and oversee and scrutinize what governments do. For the SDGs to succeed, the national parliaments of the Council of Europe member States must contribute to putting the SDGs on the agenda in their countries and put pressure on their governments to follow up their SDG-commitments.
On this basis the Assembly should prepare a separate report on how the Assembly, national parliaments and member States can contribute to achieving the SDGs in their own countries.
|
<urn:uuid:c052cd81-07fe-4eb3-96fe-e7b5c988863b>
|
CC-MAIN-2021-49
|
https://pace.coe.int/en/files/23912/html
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359037.96/warc/CC-MAIN-20211130141247-20211130171247-00607.warc.gz
|
en
| 0.963018 | 304 | 3.453125 | 3 |
You May Be at Increased Risk if You're of Native American Descent
It's usually assumed that Caucasians are at highest risk for conditions related to sun exposure. That's generally a good rule of thumb. In fact, being fair-skinned is known to put a person in jeopardy of sun rash. But the condition can affect all races. In particular, people of Native American descent can have a hereditary predisposition for developing polymorphous light eruption (PMLE). Unlike general sun rash, which usually only lasts a few days, hereditary PMLE can plague a person throughout the summer.
Hereditary PMLE is also known to affect women twice as often as it does men. In general, women are more susceptible to any kind of sun rash.
Other risk factors for sun rash include being under the age of 30 and living in a northern climate. Because inhabitants of northern areas usually have less overall time in the sun, they're more likely to experience an allergic reaction when they're exposed to intense or prolonged sunlight, such as when they visit a tropical or sub-tropical region.
Perhaps the most common cause of sun rash is addressed on the next page.
|
<urn:uuid:c6ca58b4-dbc5-4aec-badf-530e03c13c71>
|
CC-MAIN-2018-17
|
https://health.howstuffworks.com/skin-care/beauty/sun-care/5-things-about-sun-rash2.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948549.21/warc/CC-MAIN-20180426203132-20180426223132-00488.warc.gz
|
en
| 0.970205 | 235 | 3.765625 | 4 |
The most abundant macromineral in the human body is calcium, accounting for approximately 1.5% of total body weight.
In addition to being the most plentiful, it is also one of the most important minerals. Its main functions are in the growth, maintenance and reproduction of the human body. An astonishing 99% of calcium can be found in the bones and teeth with the remainder of calcium residing in both intra- and extracellular fluids.
Calcium, Diet, and Health
Sir Humphrey Davy of England was the first researcher recognized as isolating the impure metal form of calcium in 1808. However, calcium’s history is far older, with records dating from 975 AD, indicating the use of plaster of paris to set broken bones, and from the first century AD, when Romans prepared a lime mixture of “calx”. As a nutritional mineral, calcium is now known to play many essential roles in the body’s everyday functions.
One of its most important functions, is its action in muscular contractions which in turn helps to regulate the heartbeat and assist in the transmission of nerve impulses. Additionally, calcium has been found to be an integral component of proper blood clotting, of maintaining the walls of blood vessels, and in specific enzyme activation.
One of the current debatable topics on calcium questions the best sources of the macro-mineral. Calcium is naturally occurring in a variety of common foods including all dairy products, sardines, clams, oysters, tofu, turnip and mustard greens, broccoli, kale, legumes, and dried fruits. Although meats, grains and nuts do contain some calcium, they are considered poor sources. Looking at this list, one would assume that it would an easy task to obtain the recommended daily calcium levels. It turns out though, all calcium sources are not created equal, or so the research has shown.
One school of thought touts that dairy can contribute the recommend daily dietary calcium amounts, while others feel that dairy sources cannot be assimilated by the body as completely or as easily as the calcium from greens and legumes. To add to the difficulty of crowning one source the leader over the rest, other factors must be considered. For example, Vitamin D plays a role in calcium’s absorption, as does fiber, phytate, oxalate, magnesium, unabsorbed dietary fatty acids and phosphorous. Although the debate will rage on, especially as special interest groups continue to pay for the research being done, the terrible consequences of not getting the required calcium amounts is taking its toll on the western world.
Calcium deficiencies are a major public health concern for the aging population, osteoporosis being the most serious. According to the National Osteoporosis Foundation, an estimated 10 million Americans have the disease. Meanwhile, 55 percent of people 50 years of age and older are at risk of developing osteoporosis. This disease afflicts four times the number of women than men, probably due to changes in the body during menopause.
In conclusion, it makes sense to attempt to incorporate 1000 mg of calcium daily, the recommended dietary allowance (RDA) for adults aged 19-50 years old, by eating a wide variety of foods from the above list. Also, be sure to continue to monitor the latest research for changes and additions to the calcium story.
Iron is found in the human body in amounts of two to four grams with variations occurring depending on body weight, age, gender, pregnancy and state of growth. It is considered one of the microminerals of the body and is essential, meaning it must be obtained through the diet.
The recommended dietary allowance of iron for adult males, between 25 and 50 years old, is 10 mg. It is 15 mg for adult females, 19 to 50 years of age. During pregnancy, the requirement for women increases to 27 mg per day, while the recommendation for infants and children varies between 8 and 15 mg per day depending on their age and sex.
Iron, Diet, and Health
The human body’s need for iron is crucial. Without it, we would not survive. Over 65% of the body’s iron is found in hemoglobin, the protein in red blood cells. Iron is the center atom of this heme molecule and works to bind, and thus transport, oxygen molecules to all of the cells in our body. Iron also helps to store oxygen in the tissues and aids in energy production by taking part in the electron transport chain. Another function of iron is to be a part of many enzymatic reactions required by the body on a daily basis.
Iron in the body is found in two separate forms, the heme form and the non-heme form. The heme form is the “active” component helping with oxygen transport while the non-heme form is how iron is stored in the body tissues. Each form is best derived from different food sources. Heme iron can be found in animal meat products such as beef, chicken, turkey, pork and some fish and shellfish. The body gets its non-heme from plant sources – nuts, beans, fruits, vegetables, and grains. The heme form of iron is more easily absorbed by the body than the non-heme form.
There are numerous molecules that can decrease or increase the amount of iron absorbed by the body when consumed through the diet. For example, to increase iron absorption, it is recommended that foods containing iron be eaten jointly with foods containing vitamin C (ascorbic acid). The same goes for citric acid, lactic acid and tartaric acid (found in grapes, wine, cream of tarter and other fruits). Some sugars such as fructose and sorbitol also enhance absorption. Research is also showing that animal products containing cysteine, such as meat, fish and poultry, may increase the body’s absorption of iron.
On the other hand, foods that may hinder iron absorption include phytate (found in maize and whole grains), soy protein, oxalic acid (found in spinach, chard, chocolate, tea and other foods), phosvitin (a protein found in egg yolks), and several other nutrients such as calcium, zinc, manganese and nickel. In fact, there may be an astonishing 60% reduction in iron absorption if tea (containing phenolic compounds) is consumed after a meal while drinking coffee during or after you eat may reduce iron absorption by 40%, also due to its content of polyphenols.
Due to the increased production of red blood cells during pregnancy, the expectant mother’s demand for iron also rises. If the amount of iron consumed in the diet is not proportionally increased, a form of pregnancy induced anemia can result. Anemia can be detected through symptoms and/or routine blood tests. During pregnancy, a woman’s doctor may suggest taking an iron supplement in addition to augmenting the diet with good sources of iron.
Besides pregnancy, other lifestyle conditions may also cause iron deficiency anemia. Classic anemia symptoms include pale skin, fatigue, dizziness, shortness of breath, rapid breathing on exertion, heart palpitations, weakness and the inability to maintain a proper body temperature. Anemia can be caused by pregnancy, heavy blood loss such as trauma, internal bleeding, or heavy menstrual bleeding, poor absorption, interactions with foods or medications and lack of adequate iron in the diet. Women are more prone to anemia for several reasons, one being they have a smaller iron store than men, and second they lose blood through menstruation and have an increased need for iron during pregnancy. Anemia can be treated through decreasing any abnormal bleeding, providing adequate quantities of iron, folate and B-12 in the diet and monitoring any interactions that may be decreasing iron absorption.
|
<urn:uuid:02ecd3eb-0fe1-47e4-b011-bc15bf4c4382>
|
CC-MAIN-2022-49
|
https://content.moneyinstructor.com/2074/calcium.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711394.73/warc/CC-MAIN-20221209080025-20221209110025-00477.warc.gz
|
en
| 0.946887 | 1,614 | 3.3125 | 3 |
Catalyzing Women’s Entrepreneurship
Women’s entrepreneurship is a key pathway to advance women’s economic participation with positive ripple effects on decent employment, poverty eradication and economic growth. Indeed, in Asia and the Pacific, entrepreneurship is one of the main pathways for women’s economic empowerment and equality, which can in turn have a ‘multiplier effect’ on family well-being, poverty reduction and sustainable economic growth. Thus, creating enabling entrepreneurial ecosystems where women can freely participate to their full capacity can yield expansive socio-economic gains stretching from building better livelihoods at the household level, to thriving communities, inclusive societies and progressive economies.
However, women entrepreneurs face a number of barriers or disadvantages which hold them back from achieving their full potential. Among these, research consistently points to their limited access to finance. Access to finance is the biggest obstacle for women-owned small and medium enterprises, with 69 per cent underserved by financial institutions in developing countries. Innovative technology could be deployed to reduce gender barriers and promote digital inclusion, especially with respect to women’s access to a wide range of services and economic opportunities.
ESCAP actively supports its member States in efforts to enhance women’s economic empowerment and entrepreneurship as a strategy for poverty reduction, social wellbeing and sustainable economic growth, in fulfillment of SDG 5 on Gender Equality and multiple related goals of the 2030 Agenda for Sustainable Development
ESCAP’s new regional initiative on ’Catalyzing Women’s Entrepreneurship’ deploys a multi-pronged approach, including an enabling environment for women to build and grow their businesses, improved access to financial services and capital, as well as increased use of ICT tools and innovative technology in their business operations. Funded by the Government of Canada, this regional initiative brings together Governments, civil society organizations, the private sector and development partners to galvanize support for scaling up investments toward closing gender gaps in economic participation, and unleashing women’s creative potential.
The project aims to strengthen entrepreneurial ecosystems that foster women’s entrepreneurship, enhance women entrepreneurs’ access to capital through innovative financing mechanisms, and increase women entrepreneurs’ use of ICT through relevant training and tools. These results are envisaged to be achieved through the following project components:
- Gender-responsive entrepreneurial ecosystem capacity development: focusing on policy development and improving legal/regulatory frameworks, and other barriers that discourage women-owned enterprises.
- Innovative financing mechanisms: mobilizing capital by developing innovative financing instruments to crowd in public and private funding, and supporting piloting of innovative digital or FinTech solutions for MSMEs by piloting innovative digital solutions to improve the operational efficiency of and/or increase access to finance for women-owned, managed or led MSMEs.
A Women Micro, Small and Medium-sized Enterprises (MSME) Fintech Innovation Fund has been launched to support companies to pilot innovative digital and financial solutions that improve access to finance and/or enhance operational efficiency of women-led MSMEs. It will prove successful applicants with technical assistance, mentorship and early stage co-funding to pilot and upscale their solutions. For more info: https://mailchi.mp/uncdf/innovation-fund
- Women ICT Frontier Initiative: strengthening capacity of government leaders and policy makers to create an enabling environment for ICT-empowered women entrepreneurs, and enhanced capacity of women entrepreneurs to utilize ICT tools in support of their businesses.
The project will be formally launched in its six target countries over the coming months:
- Cambodia: 29 – 30 April 2019
- Viet Nam
|
<urn:uuid:b532c02c-18cc-4a49-aa82-9058c746ebdb>
|
CC-MAIN-2019-39
|
https://www.unescap.org/our-work/social-development/gender-equality/catalyzing-women-s-entrepreneurship
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573465.18/warc/CC-MAIN-20190919081032-20190919103032-00470.warc.gz
|
en
| 0.928467 | 743 | 2.5625 | 3 |
Species of Thailand
Horsfield's fruit bat
Cynopterus horsfieldii, John Edward Gray, 1843
Horsfield's fruit bat (Cynopterus horsfieldii) is a species of megabat native to South East Asia. It is named for Thomas Horsfield, an American naturalist who presented the type specimen to the British Museum.
Horsfield's fruit bat is a medium-sized megabat, intermediate in size between flying foxes and pygmy fruit bats. Adults weigh around 55 to 60 g, and have light grey to brown fur, with a reddish brown or orange mantle around the shoulders. In some males the mantle extends across the chest, and the fur is often brighter in colour than in females. The rim of the ears and the skin overlying the metacarpals and phalanges within the wing are white. Juveniles have a more bland coat pattern, with uniformly dull buff or grey fur.
The bats have a short, broad snout, ending in a pair of almost tubular nostrils. Both the eyes and ears are large, although the latter have a simpler structure than in most other bats, and lack a tragus. The wings have a low aspect ratio and high wing loading, typical of many megabats, and indicating a relatively slow flight speed and moderate manoeuvrability.
Distribution and habitat
Horsfield's fruit bat is found in Thailand, Indonesia, Malaysia, and Brunei. Within this region, it inhabits a broad range of lowland habitats, from dense primary rain forest to agricultural land and suburban gardens.
(See further down in subspecies section for distribution data)
Biology and behaviour
Horsfield's fruit bats eat the fruit of strangler figs, Elaeocarpus, and Payena, and the flowers of bitter beans. They have been reported to pluck fruit from trees and carry it to roosts elsewhere in order to feed. During the dry season, hen fruit is in short supply, they instead feeds on pollen, which they take from a wide variety of different plants.
They live in small groups, consisting of a single adult male and up to five females and their young. Although these groups are maintained year round, individual females often move between different groups, and may spend some time nesting alone between leaving one group and joining another. They roost in trees and cave mouths, reportedly favouring banana trees. They often modify their roosting sites by constructing tents from the leaves, partly cutting through them to make an inverted "V" shape.
They breed throughout the year, but most commonly give birth at two times of the year: between February and March and between July and August. They have been reported to live for at least 31 months.
This article uses material from Wikipedia released under the Creative Commons Attribution-Share-Alike Licence 3.0. Eventual photos shown in this page may or may not be from Wikipedia, please see the license details for photos in photo by-lines.
- Cynopterus horsfieldii
- Codot horsfield
- Horsefield's fruit bat
- Horsfieldâs fruit bat
Cynopterus horsfieldii harpax, Michael Rogers Oldfield Thomas & Robert Charles Wroughton, 1909
Range: Thailand, peninsular Malaysia, Sumatra
Cynopterus horsfieldii horsfieldii, John Edward Gray, 1843
Range: Java and islands east to Sumbawa
Cynopterus horsfieldii persimilis, Knud Christian Andersen, 1912
Cynopterus horsfieldii princeps, Gerrit Smith Miller, Jr, 1906
- Cynopterus horsfieldi, John Edward Gray (1843)
Least Concern (IUCN3.1)
|
<urn:uuid:7c3470ab-4f2f-4c1e-ab6c-46c1b0256d16>
|
CC-MAIN-2022-33
|
https://www.thainationalparks.com/species/horsfields-fruit-bat
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00427.warc.gz
|
en
| 0.897495 | 873 | 2.859375 | 3 |
kentoh - Fotolia
Both Simple Network Management Protocol and Common Management Information Protocol were designed to provide a method to manage networks, but their origins differ.
SNMP is an application-layer protocol designed by the individuals that worked to develop the internet -- i.e., the TCP/IP family of protocols. CMIP was designed by committees of the Open Systems Interconnection (OSI) organization during roughly the same period as SNMP in the late 1980s.
SNMP vs. CMIP: Different goals
SNMP and CMIP reflect the differing development philosophies of the internet and OSI communities. The internet community deemed simplicity as most important, especially in the early days when devices had limited memory and processor capacity. The OSI community, however, believed each protocol must be designed to be extremely flexible and to initially address future requirements.
When SNMP and CMIP were being developed in the 1980s -- and continuing into the 1990s -- individuals in the two communities felt they were in competition. Many in the OSI organizations believed internet protocols, like SNMP, would collapse under load, while internet developers often felt OSI's protocols were too complicated, difficult to implement and expensive in terms of memory and processor resources.
The goal of SNMP developers was to provide a simple but useful protocol. SNMP initially had just two commands: GET and SET. SNMP managers use these two commands to access and modify device parameters.
The application-layer protocol initially had no security, but developers added security in later revisions. Developers also designed additional commands -- such as GETBULK and RESPONSE -- to access more than one parameter at a time and for a device to signal the SNMP manager that a problem had occurred.
The exchange between management stations and managed devices is simple. They simply exchange datagrams that contain commands and responses. No connection between manager and device is maintained with SNMP.
OSI developers believed a more flexible and comprehensive management protocol was needed. In addition to retrieving and modifying network parameters, a CMIP manager can direct a remote application to create or delete a software entity that can then be managed.
CMIP management stations maintain connections to devices using the Remote Operations Service Element (ROSE) protocol to communicate with devices. ROSE is the OSI remote procedure call protocol, and it is used to carry CMIP commands between management stations and managed devices. All parameters are encoded using Abstract Syntax Notation One. Security features protect configurations from modification by hackers.
Although the OSI protocols are used for some applications today, the success of the internet has proven that the internet protocols -- including SNMP -- are able to carry today's traffic, a load far beyond anything imaginable in the 1980s and 1990s.
Dig Deeper on Network Infrastructure
Related Q&A from David Jacobs
Connectivity over longer distances and higher data rates are some of the major differences that separate Carrier Ethernet from traditional wired ... Continue Reading
Network load balancing and application load balancing both handle traffic requests. But they process and direct those requests with different levels ... Continue Reading
Slow network speeds, weak Wi-Fi signals and damaged cabling are just some of the most common network connection issues that IT departments need to ... Continue Reading
|
<urn:uuid:4778344c-9456-4a29-9900-26c53b171f9f>
|
CC-MAIN-2023-40
|
https://www.techtarget.com/searchnetworking/answer/SNMP-vs-CMIP-Whats-the-difference
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00226.warc.gz
|
en
| 0.948571 | 664 | 3.59375 | 4 |
It’s unbelievable, but Monsanto and Co. are at it again. These profit-hungry biotech companies have found a way to exclusively ‘own’ something that freely belongs to us all – our food! According to activist organisation Avaaz, they’re trying to patent away our everyday vegetables and fruits like cucumber, broccoli and melons, forcing growers to pay them and risk being sued if they don’t.
But we can stop them from buying up Mother Earth. Companies like Monsanto have found loopholes in European law to get away with this, so we just need to close them shut before they set a dangerous global precedent. And to do that, we need key countries like Germany, France and the Netherlands – where opposition is already growing – to call for a vote to stop Monsanto’s plans. The Avaaz community has shifted governments before, and we can do it again.
Many farmers and politicians are already against this – we just need to bring in people power to pressure these countries to keep Monsanto’s hands off our food. Sign now and share with everyone to help build the biggest food defense call ever.
Changing the status quo
Once a patent exists in one country, trade agreements and negotiations often push other countries to honour it as well. That’s why these food patents change everything about how our food chain works: for thousands of years, farmers could choose which seeds they’d use without worrying about getting sued for violating intellectual property rights.
But now, companies launch expensive legal campaigns to buy patents on conventional plants and force farmers to pay exorbitant royalty fees. Monsanto and Co. claim that patents drive innovation – but in fact they create a corporate monopoly of our food.
But luckily, the European Patent Office is controlled by 38 member states who, with one vote, can end dangerous patents on food that is bred using conventional methods. Even the European Parliament has issued a statement objecting to these kinds of destructive patents. Now, a massive wave of public outcry could push them to ban the patenting of our everyday food for good.
The situation is dire already – Monsanto alone owns 36% of all tomato, 32% of sweet pepper and 49% of cauliflower varieties registered in the EU. With a simple regulatory change, we could protect our food, our farmers and our planet from corporate control – and it’s up to us to make it happen.
The Avaaz community has never been afraid to stand up to corporate capture of our institutions, from pushing back the Rupert Murdoch mafia, to helping ensure that telecoms keep their hands off our Internet. Now it’s time to defend our food supply from this corporate takeover.
|
<urn:uuid:699ad7f2-65c9-40d5-b32a-afda9c6fa869>
|
CC-MAIN-2016-50
|
http://thegreentimes.co.za/monsanto-vs-mother-earth-its-on/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542323.80/warc/CC-MAIN-20161202170902-00321-ip-10-31-129-80.ec2.internal.warc.gz
|
en
| 0.946669 | 552 | 2.515625 | 3 |
National Science Foundation (NSF), $201,000, 2010 – 2013
Investigator: Dr. Gang Quan
This project is in collaboration with Dr. Shangping Ren from the Illinois Institute of Technology.
As transistor feature size continuously shrinks and is approaching its physical limit, hardware and software developers are now facing great challenges, one of which is the manufacturing yield problem, that is, the reduced feature size (down to nanometers) has increased the number and density of devices on a single die, resulting in, once again, a decreased fabrication yield. For example, without considering defect tolerance during the architecture design phase, the yield of Cell processors can be as low as 20% to 10%. Another serious concern is the process variation as it can cause maximum clockable frequency and power dissipation to vary from the target design from core to core and chip to chip. For example, Intel circuit research lab showed in 2004 that for 1000 sample chips using 180nm technology, the frequency variation can be as much as 30% while the leakage difference can be 20X among different chips. Precise manufacturing control becomes quite difficult, if not impossible.
In addition, the manufacturing defects and process variations further exacerbate the difficulty of software development and maintenance complexity, especially for mission-critical real-time embedded applications. In the presence of defects and process variations on many-core chips, software developers can no longer assume the underlying hardware architecture is unified and deterministic under the same design. Therefore, a paradigm shift is required in the way we design and develop real-time embedded systems.
Figure 1 With virtualization, hardware defects and performance variances in the many-core platforms are transparent for the OS and application software. Reconfiguration for virtualization is done using the advanced built-in self test module which includes both test and configuration phases.
The goal of this project is to develop efficient and effective many-core virtualization techniques for real-time embedded applications to tackle the problem of hardware non-determinism caused by manufacturing defects and process variations. Virtualization refers to the techniques for hiding the physical characteristics of computing resources from the way in which they are used by other systems, applications, or end users. The virtualization not only provides operating systems and programmers with a unified interface, but also maintains the feasibility of real-time applications. As shown in Fig. 1, we envision that future many-core processors will be equipped with advanced built-in self test and reconfiguration module, which not only detects the defective architectural components, but also reconfigures the physical chip to mirror the virtualized architecture, based on information such as real-time system characteristics, run-time profiling (including power, temperature) information from previous runs, and other design constraints. Through the virtualization, the physical architecture is isolated from the OS and applications, it hence shields OS and applications from physical layer variations. In this project, we plan to
- develop quantitative methods to evaluate the similarity between virtualized system and reference system for real-time applications;
- develop virtualization methods and techniques for given real-time embedded applications and given many-core platforms that takes into account the trade-offs between different design considerations (feasibility, reliability, and power/thermal, etc.) and objectives; and
• validate and evaluate the above techniques through both theoretical simulations and practical hardware implementations.
|
<urn:uuid:b493b6c2-9688-482a-adb4-34c7603068e6>
|
CC-MAIN-2022-40
|
https://arcs-lab.eng.fiu.edu/research/collaborative-research-application-aware-many-core-virtualization-for-real-time-embedded-computing/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00649.warc.gz
|
en
| 0.920679 | 680 | 2.578125 | 3 |
An interesting article I have found on the BBC webpage:
The brain has a critical window for language development between the ages of two and four, brain scans suggest.
Environmental influences have their biggest impact before the age of four, as the brain’s wiring develops to process new words, say UK and US scientists.
The research in The Journal of Neuroscience suggests disorders causing language delay should be tackled early. It also explains why young children are good at learning two languages. The scientists, based at King’s College London, and Brown University, Rhode Island, studied 108 children with normal brain development between the ages of one and six.
Our work seems to indicate that brain circuits associated with language are more flexible before the age of 4, early intervention for children with delayed language attainment should be initiated before this critical age”; Dr Jonathan O’MuircheartaighKing’s College London
They used brain scans to look at myelin – the insulation that develops from birth within the circuitry of the brain.
To their surprise, they found the distribution of myelin is fixed from the age of four, suggesting the brain is most plastic in very early life. Any environmental influences on brain development will be strongest in infanthood, they predict. This explains why immersing children in a bilingual environment before the age of four gives them the best chance of becoming fluent in both languages, the research suggests. It also suggests that there is a critical time during development when environmental influence on cognitive skills may be greatest. Dr Jonathan O’Muircheartaigh, from King’s College London, led the study. He told the BBC: “Since our work seems to indicate that brain circuits associated with language are more flexible before the age of four, early intervention for children with delayed language attainment should be initiated before this critical age. “This may be relevant to many developmental disorders, such as autism, since delayed language is a common early trait.” Growing vocabulary Early childhood is a time when language skills develop very rapidly. Babies have a vocabulary of up to 50 words at 12 months but by the age of six this has expanded to about 5,000 words. Language skills are localised in the frontal areas of the left-hand side of the brain. The researchers therefore expected more myelin to develop in the left-hand side of the brain, as the children learned more language. In fact, they found it remained constant, but had a stronger influence on language ability before the age of four, suggesting there is a crucial window for interventions in developmental disorders. “This work is important as it is the first to investigate the relationship between brain structure and language across early childhood and demonstrate how this relationship changes with age,” said Dr Sean Deoni from Brown University, a co-researcher on the study. “This is important since language is commonly altered or delayed in many developmental disorders, such as autism.” Commenting on the study, Prof Dorothy Bishop of the department of Developmental Neuropsychology at the University of Oxford said the research added important new information about early development of connections in brain regions important for cognitive functions. “There is suggestive evidence of links with language development but it is too early to be confident about functional implications of the findings,” she said. “Ideally we would need a longitudinal study following children over time to track how structural brain changes relate to language function.” The study was funded by the National Institutes for Mental Health (US) and the Wellcome Trust (UK). Source: http://www.bbc.co.uk/news/health-24446292
|
<urn:uuid:b362ab18-1123-4457-8ceb-1b1ecd1b19e4>
|
CC-MAIN-2019-13
|
http://nanospanish.com/toddler-brain-scan-gives-language-insight/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201707.53/warc/CC-MAIN-20190318211849-20190318233849-00372.warc.gz
|
en
| 0.957739 | 746 | 3.1875 | 3 |
Fun Educational Board Games That Teach Kids Math
Playing board games with young children helps us to build positive memories and reinforces important family relationships, but they have another positive benefit: board games help a child develop early math skills. I once had a neighbor who had three grown children who were all going to top-notch universities in math and sciences. I asked her what her secret was. "Board games" she said. She believed that playing board games with her children gave them an edge over children that didn't spend much time in this activity.
Chutes and Ladders
Math skills: Number recognition up to 100, counting, adding numbers 1 through 6 to numbers up to 100, p rediction, spatial awareness.
Chutes and Ladders is the classic Milton and Bradley board game that parents first buy for their preschoolers. The game consists of a spinner, a board with 100 squares, and 4 game tokens that look like young children. During game play, children advance the number of squares they spin. As the players progress across the numbered squares on the game board, they may land at the bottom of a ladder or at the top of a chute (a slide). Pictures on the game board show children making both positive and negative choices. For good deeds like doing their chores, children get to advance up the ladder, and for bad deeds like pulling the cat's tail, children must slide down the chute.
Playing this game over and over can build number recognition for the numbers 1 through 100. In this game, players are constantly moving around the board. Each row of game spaces requires the player to progress in a different direction, so if you go up a chute or down a ladder, you will need to look at the number spaces you landed on to figure out which direction you need to move next..
This game also introduces children to the rudimentary gaming skill of moving pieces around a board. Moving from point A to point B on a game board is actually a skill that most preschoolers have to learn. Your preschooler will get plenty of practice counting from 1 to 6 during this game, and progressing the pieces forward the appropriate number shown on the spinner.
More Math Fun with Chutes and Ladders
With a little encouragement, you can help children practice their addition skills using the numbered squares on the game board. Encourage your child to identify the numbered space on the board where their game piece has landed. Add the number on the spinner to the number on the board to determine where they need to move their game pieces.
Ask your child to predict the number they need to spin in order to avoid a chute or get to the top of a ladder. Your child will count the number of spaces from her game token to the desired (or feared) spot on the board.
The fortunes of players in this game can quickly be turned. As players change their positions around the board, ask your child who is winning, and who is farthest behind. You can also ask your child to estimate how many spaces they need to move to catch up.
Playing the Game of Trouble teaches: prediction, estimation, counting, special awareness.
The Game of Trouble
Math Skills: Prediction, estimation skills, counting, spatial awareness
Trouble is another board game that is great for older preschoolers and early elementary-age children. This game is a little more complicated than Chutes and Ladders, though not by much. My son, who just turned four last week mastered this game after playing once. Trouble also has a "cool factor" that isn't included in Chutes and Ladders. Instead of a spinner, trouble has a single die in the middle of a plastic bubble that players push down. Two advantages of the bubble-die system are no more lost dice, and cheating is simply not possible.
The object of Trouble is to move several different colored pegs around the board; If your opponent lands on your peg, you're in trouble, because you have to move that piece back to the starting point. You must "roll" a 6 before you can move each of your pegs into position to start. It is helpful if players of this game have mastered the ability to move their pieces exactly the number of spaces shown on the dice, but a little bit of help from an adult or older sibling makes it possible for game play to move quickly along the board. This game is the most fun when it moves at a very rapid pace.
The strategy of this game requires players to assess which pieces they should move in order to avoid trouble or cause trouble for their opponents. Being spatially aware of your opponents' position on the board is a key component to the strategy of this game. Trouble also relies heavily upon estimation skills. Once several players' pieces are in play around the board, you will need to quickly determine which of your pieces to move after your die is cast.
War Card Game
Math Skills: Number recogntion, number values, greater than and less than
War is a simple game that can be played with any deck of cards, shuffled together well.
The cards are divided among two or more players. Each round the players toss a card into a middle pile, and whoever has the highest-numbered card gets to capture the other cards. This game is a very simple game to play with young preschoolers. I played this game with my son when he was three years old.
In the event that the players have the same card, a "war" is declared. Each player lays 3 cards face down in front of them, then places a fourth card face up. The face up card determines who captures the cards. The winner of the war gets to keep all of the cards put down on the table.
Undoubtedly there are many variations to this game. In the version of the game we play, during the war, the players lay down their cards one at a time saying or chanting the words "I -de-clare-war."
This game is very simple and can go on and on. You may want to end the game after you have played out all of the cards in your pile, and then count the captured cards to determine a winner. Another version of the game has players playing their cards against each other, replaying over and over, until one player captures all of the cards in the deck. Even as a child I found this version of the game tedious.
Math skills: single-digit and two-digit addition, prediction, multiplication
Math Skills: Single digit and two digit addition, prediction, multiplication
Yahtzee is yet another classic board game that is all about math. This time it's addition, estimation, prediction, and even multiplication. Yahtzee is a dice game played with 5 dice, a cup to hold the dice while playing a turn, and a game sheet for each player. Players must optimize their turns to score the most points in a number of categories. The highest total score at the end of the game is the winner. The traditional version of this game made by Milton Bradley is affordable and readily available almost anywhere. You can also purchase specialty versions of this game online, including NFL and Muppet-themed games. In truth, you don't actually need to purchase a game board for this game. All you need is a game sheet for each player, 5 dice, and a cup.
This game is more complicated than the previously-mentioned games and uses addition during each turn during game. The game is played through 13 rounds. Each player may throw any number of dice during three consecutive turns, saving out dice as they wish. Players need not declare what type of dice combination they are trying for. But as the game progresses, they'll have fewer choices to choose from.
Yahtzee Score Card Explained
On the game sheet, players score points in different categories. The first section of the scoring card shows numbers 1 through 6. In the Upper Section of the score card, Yahtzee players may not use their entire dice roll toward their scores. Only the numbers may be scored. For example, after three rolls you end up with two 4s, a 3, a 1, and a 6, you might choose to record your score in the Fours space. However, you may only count the two 4s, for a total score of 8.
On the Lower Section of the score card, players may enter scores for a variety of different types of dice combinations. Yahtzee borrows its terminology from card games, using well-known sets such as a full house (two of one number and three of another number, for example 3,3,3,5,5).
Yahtzee Score Card
More Elementary Math Fun
I am going to mention three more games here that I personally think should be part of every family's game collection. Each game uses math skills like number recognition, matching, and pattern recognition, and truly are math games. I recommend you check them out and add them to your personal collection, if possible.
This card game is so popular it probably needs no explanation. Players begin their hand with a certain number of cards. They try to discard cards by matching either the card's number or color to the top card on the discard pile. Reverse, Draw 2, and Draw 4 cards create havoc among players trying to be the first to elminate all of the cards in their hand.
Phase 10 is a card game where players try to collect various sets of cards through a series of rounds. In this game, each player may not successfully collect their set of cards before the round is ended. This game can take a long time and is probably not for very young children. However, it is a lot of fun and not too difficult for older elementary age students.
This final game is a crossover game that combines luck and strategy. It is one of my favorite games for younger players, though probably a little complicated for a preschool crowd. I'd skip the young players' edition of this game and get the full-fledged version for my elementary-aged game players.
- Ticket To Ride Board Game Review
A Ticket to Ride is the award-winning board game by Days of Wonder. USA and Europe versions are easy to find and most common. This game is easy to learn and fast paced, and has the added benefit of teaching a bit of geography while you play.
- How to Play Canasta
Canasta is a competitive game that uses 4-6 decks of playing cards (including the jokers), and is played by 4 players, divided into two teams. You'll love playing this fast-paced, easy to learn tournament game with friends and family.
© 2010 Carolyn Augustine
|
<urn:uuid:6691137d-622f-4466-9273-3bf9570c3049>
|
CC-MAIN-2018-43
|
https://hubpages.com/games-hobbies/Games-That-Teach-Early-Math-Skills
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516123.97/warc/CC-MAIN-20181023090235-20181023111735-00515.warc.gz
|
en
| 0.96845 | 2,188 | 3.9375 | 4 |
- Pages: 3
- Word count: 639
- Category: Economics
A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteedOrder Now
Question No. 1P: 219
Explain the difference between short run and long run production function; cite one example of this difference in a business situation. The short run production function shows the maximum quantity of a good or service that can be produced by a set of inputs, assuming the amount of at least one of the inputs used remains unchanged. While a long run production function shows the maximum quantity of a good or service that can be produced by a set of inputs, assuming the firm is free to vary the amount of all the inputs being used. Example for this difference
At furniture Manufacturer Company, the variable inputs are labor and row material while the fixed input is the machinery. It is a short-run production functions if the company change only the variable inputs but if the company change all the inputs including the fixed one it’s called a Long-run Production function.
Question No. 2P: 219
Define the Law of diminishing returns. Why this law is considered a short-run phenomenon? The law of diminishing stated that: As additional units of a variable input are combined with a fixed input, at some point the additional output starts to diminish. And it’s a short-run phenomenon because as stated earlier one of the inputs is fixed.
Question No. 3P: 219
What are the key points in a short-run production function that delineate the three stages of production? Explain the relationship between the law of diminishing returns and the three stages of production? Stage I occur at the range from zero to where the Average Product reaches its maximum where AP = MP. Also the diminishing of return take effect when MP reaches its maximum at stage one. Stage II occur at the range from the last of stage I to the point where Total Product is maximized and MP = 0. Stage III continues on from the last of stage II.
Problem No. 1P: 220
Indicate whether each of the following statement is true or false. Explain
why. a. When the law of diminishing return takes effect as firm’s average product will start to decrease (False) When the law of diminishing return takes effect, Average product will keep increasing until AP = MP “The end of stage I at diminishing return”
b. Decrease in return to scale occurs when a firm has to increase all its inputs at an increasing rate to maintain a constant rate of increase in its output. (True) because eventually the proportional increase in output will become less than the proportional increase in inputs as of the coefficient of output elasticity will be Eq < 1
c. A linear short run production function implies that the law of diminishing return does not take effect over the range of output being considered. ??? (I do not know the answer)
d. Stage one of production processes ends at the point where the low diminishing return occur (False) Stage one of Production Processes ends where the Average Product reaches its maximum as of AP = MP. After the law of diminishing take effect.
Problem No. 2P: 220
The oceanic Pacific fleet has just decided to use a pole-and-Line method of fishing instead of gill netting to catch tuna. The latter method involves the use of miles of nets strung out across the ocean and therefore entraps other sea creatures besides tuna. Concern for endangered species was one reason for this decision, but perhaps more important was the fact that the major tuna canneries in the United States will no longer accept tuna caught by gill netting. Oceanic Pacific decided to conduct a series of experiments to determine the amount of tuna that could be caught with different crew sizes. The results of these experiments follow. a. Determine the point at which diminishing returns occurs.
|
<urn:uuid:3175aaab-3254-46eb-8d17-d880dadfe8a4>
|
CC-MAIN-2023-23
|
https://blablawriting.net/production-function-essay
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649986.95/warc/CC-MAIN-20230604125132-20230604155132-00296.warc.gz
|
en
| 0.922277 | 803 | 3.828125 | 4 |
The magic school bus inside a beehive / by Joanna Cole ; illustrated by Bruce Degen.
By: Cole, Joanna.
Contributor(s): Degen, Bruce [ill.].Material type: TextPublisher: New York : Scholastic, 1998,c1996Description: 47 p. : col. ill. ; 20 x 24 cm.ISBN: 0590257218.Subject(s): Honeybee -- Juvenile literature | Beehives -- Juvenile literature | Honeybee | Bees | Beehives | Honey | Honeybee | Bees | Beehives | HoneyDDC classification: 595.79/9 Summary: Ms. Frizzle takes her class on a field trip to a beehive in her magic school bus.
|Item type||Current location||Collection||Call number||Status||Date due||Barcode|
|Paperback||Ayers General Stacks||Non-fiction||595.79 COL (Browse shelf)||Available||421790|
Elementary School Library Collection Brodart
Ms. Frizzle takes her class on a field trip to a beehive in her magic school bus.
|
<urn:uuid:c279bbc8-86b5-44b7-92ff-0e6be956258d>
|
CC-MAIN-2019-35
|
http://aylibrary.beverlyschools.org/cgi-bin/koha/opac-detail.pl?biblionumber=767
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313889.29/warc/CC-MAIN-20190818124516-20190818150516-00356.warc.gz
|
en
| 0.697364 | 244 | 2.59375 | 3 |
Link to Human Exposure to Radio Frequency Fields: Guidelines for Cellular Antenna Sites
See suggested [additions/comments] and
4G Gigabit LTE Roadmap
[Wire-USA: RF-EMR = pulsed, data-modulated, Radio-frequency Electromagnetic Microwave Radiation]
Primary antennas for transmitting wireless telephone service, including cellular and personal
communications wireless service are usually located outdoors on towers and other elevated structures like rooftops, water tanks and sides of buildings. The combination of antenna towers and associated electronic equipment is referred to as a “cellular or PCS cell site” [Wireless Telecommunications Facility (WTF) or Wireless] “base station.”
- Cell towers are typically 50–200 feet high (Vertical) [and typically 2,500–5,000 feet feet away (Horizontal) from residences; the third essential variable is Power]
- [VHP: Localities must regulate all three variables (Vertical • Horizontal • Power) to finally complete the cooperative federalism scheme set up by the 1996 Telecommunications Act (1996-TCA), which was confirmed by the US Supreme Court in 2005 in Palos Verdes v Abrams
- Antennas are usually arranged in groups of three, with
- one antenna in each group used to send signals to mobile devices
- two antennas used to receive signals from mobile devices.
- [Wire-USA: this sounds like a description of yesteryear (even though this FCC web page was updated in 2019); many of today’s 4G/5G antennas are phased arrays with steerable beams with send/receive handled by the same antennas]
On a WTF, the total radio frequency microwave (RF/MW) radiation that can be transmitted from each transmitting antenna depends on
- the number of radio channels that have been authorized by the Federal Communications Commission and
- the [maximum] Effective Radiated Power (ERP) of each transmitter. [Wire-USA: max ERP is calculated in this way: the sum of per channel Maximum Input Power × Antenna Gain]
[Wire-USA: Max ERP is what matters because the 2012 Spectrum Act (§6049(a)) says:
47 U.S. Code § 1455 (a) Facility modifications
“(1) In general. Notwithstanding section 704 of the Telecommunications Act of 1996 (Public Law 104–104) or any other provision of law, a State or local government may not deny, and shall approve, any eligible facilities request for a modification of an existing wireless tower or base station that does not substantially change the physical dimensions of such tower or base station.
(2) Eligible facilities request. For purposes of this subsection, the term “eligible facilities request” means any request for modification of an existing wireless tower or base station that involves—
(A) collocation of new transmission equipment;
(B) removal of transmission equipment; or
(C) replacement of transmission equipment.
(3) Applicability of environmental laws. Nothing in paragraph (1) shall be construed to relieve the Commission from the requirements of the National Historic Preservation Act or the National Environmental Policy Act of 1969.”
Although The FCC permits an effective radiated power (ERP) of up to:
- A: 500 Watts/channel × Antenna Gain × # of channels/antenna = # of Total Watts ERP
The majority of cell sites in urban and suburban areas operate at:
- B: 100 Watts/channel × Antenna Gain × # of channels/antenna = # of Total Watts ERP
- An ERP of 100 watts corresponds to an actual radiated power of 5-10 watts.
In urban areas, cell sites commonly emit an ERP of 10 watts/channel or less.
- C: [10 Watts/channel × Antenna Gain × # of channels/antenna = # of Total Watts ERP]
For PCS cell sites, even lower ERPs are typical.
As with all forms of electromagnetic energy, the power density from a cellular or PCS transmitter rapidly decreases as distance from the antenna increases.
[Wire-USA: It is also true, therefore, as the antenna moves
- from . . . a typical 2,500–5,000 feet from residences
- to . . . 25–50 feet from residences
. . . the power density from a cellular or PCS transmitter rapidly increases as distance from the antenna decreases . . . so the one true statement the FCC is not telling you is that distance is your friend; the only way to tolerate antennas closer than 2,500–5,000 feet from residences is to cap the power input/power output drastically and police this power 24/7 with City-installed-and-controlled fuses.]
Consequently, normal ground-level exposure [from typical antennas that are 2,500–5,000 feet from residences] is much less than the exposure that might be encountered if one were very close to the antenna and in its main transmitted beam.
[Wire-USA: Also, consequently, ground-level exposure [from antennas that are 25–50 feet from residences] is much greater than the example given above because people are very close to the antennas and, are too often, in its main transmitted beam (think second- and third-story bedrooms, seen here.].
Measurements made near typical cellular and PCS cell sites have shown that ground-level power densities are well below the exposure limits recommended by RF/microwave
safety standards used by the FCC.
[Wire-USA: Well, since compliance with the unscientific and unsound FCC RF-EMR Maximum Permissible Exposure (MPE) Guideline cannot insure public safety, the FCC RF-EMR MPE guideline is a commercial guideline only, not a safety guideline. We know this is true because . . .
- The FCC RF Guideline only considers the rate of exposure and not the total dose of exposure (this is unlike any other poison or toxic agent studied by the NIEHS’ National Toxicology program)
- The FCC RF Guideline is based on the average exposure readings which are 1/100th to 1/10,000th times lower than the peak exposure readings; The peak RF-EMR readings are the relevant bioactive components in pulsed, data-modulated, Radio-frequency Electromagnetic Microwave Radiation (RF-EMR).
- The FCC RF Guideline is based on average RF-EMR measurements over a six-minute averaging time for commercial exposures and a 30-minute averaging time for general public exposures, yet then the FCC says the public can withstand these RF-EMR levels 24/7, forever — which is nonsense.
- Actually, the FCC RF guideline does not consider the time of exposure at all, which is utter nonsense, once you consider exposure to other electromagetic radiation such as from the sun (tanning vs burning) and paying one’s electric bill (paying for Watts×Time-of-use, or kiloWatt-hours of electricity).
- The FCC RF Guideline was a scam from day one; a dirty trick to commercialize military technology in order to make make oodles of money, as explained here.]
In 1996, the FCC adopted updated guidelines for evaluating human exposure to RF fields from fixed transmitting antennas such as those used for cellular and PCS cell sites.
[Wire-USA:Yes, we have carefully studied the selection of the FCC RF-EMR MPE guideline
The FCC’s guidelines are identical to those recommended by the National Council on Radiation Protection and Measurements, a non-profit corporation chartered by Congress to develop information and recommendations concerning radiation protection.
[Wire-USA: Yes, we talked to the Director of the NCRP for an hour and then downloaded and read this 396-page publication from 1986, summarizing science through 1982: “NCRP Report No. 86 — Biological Effedts and Exposure Criteria for Radiofrequency Electromagnetic Fields [and Radiation]”
The FCC’s guidelines also resemble the 1992 guidelines recommended by the Institute of Electrical and Electronics Engineers (IEEE), a non-profit technical and professional engineering society, and endorsed by the American National Standards Institute (ANSI), a nonprofit, privately-funded membership organization that coordinates development of voluntary national standards in the United States.
[Wire-USA: Aah, yes, the same engineering organization that puts a filter in place to guarantee that the IEEE only looks at scientific evidence that has to do with the heating of biological tisssue, which is only one of the hundreds of scientifically-established harms from pulsed, data-modulated, Radio-frequency Electromagnetic Microwave Radiation (RF-EMR). We have the evidence that proves that the IEEE is merely cherry-picking the scientific evidence.]
In the case of cellular and PCS cell site transmitters, the FCC’s RF exposure guidelines recommend a maximum permissible exposure level to the general public of approximately 580 microwatts per square centimeter [for 850-900MHz only] [Wire-USA: This translates to 5,800,000 microwatts per square meter (µW/m²) . . . compare that to the recommended BioInitiative RF-EMR exposure guideline of 3 to 6 µW/m².
[Wire-USA:More specifically, the FCC RF MPE Guideline is frequency-specific this:]
FCC Guidelines for Maximum Public Exposure to
Radio-frequency Electromagnetic Microwave Radiation (RF-EMR)
Reported as Average RF-EMR
|Frequency range (MHz)||Electric field strength (V/m)||Magnetic field strength (A/m)||Average Power density (µW/m²)||Averaging time (minutes)|
*Plane-wave equivalent power density; f = frequency in MHz;
This limit is many times greater than RF levels typically found near the base of cellular or PCS cell site towers or in the vicinity of other, lower-powered cell site transmitters.
[Wire-USA: Not any more . . . see the evidence below . . .
- 2017: 21 U.S. Diplomats & Families in Cuba Evacuated After Microwave Weapon Attack and Illnesses and Brain Trauma
- 2017: RF-EMR Exposures from So-Called “Small Cells” — Metered at 1,000,000 μW/m² — in Palo Alto, CA
- 2018: RF-EMR Exposures — Metered at 3,626,000 μW/m² in Sebastopol, CA — Linked to Deaths and Illnesses
2020: RF-EMR Exposures — Metered at 1,280,000 μW/m² on the streets in Plumas County, CA
Calculations corresponding to a “worst-case” situation (all transmitters operating simultaneously and continuously at the maximum licensed power) show that, in order to be exposed to RF levels near the FCC’s guidelines, an individual would essentially have to remain in the main transmitting beam and within a few feet of the antenna for several minutes or longer.
[Wire-USA: The preceding sentence is a misleading statement, based on the false assumption that FCC RF-EMR Guideline (10,000,000 μW/m² for 1500 MHz and above) is actually protective of the biology of humans and all other living organisms. It is not. It is not a safety guideline. This has been scientifically established by tens of thousands of non-Wireless-Industry funded peer-reviewed scientific studies. There is no debate among serious scientists.
The debate is only perpetuated by the Wireless Industry, their purchased/captured experts and Governments which are salivating over the surveillance/control that Densified 4G/5G wireless infrastructure can achieve.]
Thus, the possibility that a member of the general public could be exposed to RF levels in excess of the FCC guidelines is extremely remote. When cellular and PCS antennas are mounted on rooftops, RF emissions could exceed higher than desirable guideline levels on the rooftop itself . . .
[Wire-USA: Not true. The occupants of top floors of building with roof-mounted antennas have metered RF-EMR well above even the ridiculously-high 10,000,000 μW/m² for 1500 MHz and above.]
even though rooftop antennas usually operate at lower power levels than free-standing power antennas.
[Wire-USA: They operate far too high for being that close to people. They only need to provide -85 dBm (0.002 μW/m² for 5-bars on a cell phone for telecommunications service — the only service for which the Wireless Industry can preempt local authority). They can do that with power hundreds of thousands of times lower than current levels.]
Such levels might become an issue for maintenance or other personnel working on the rooftop. Exposures exceeding the guidelines levels, however, are only likely to be encountered very close to, and directly in front of, the antennas. In such cases, precautions such as time limits can avoid exposure in excess of the guidelines. Individuals living or working within the building are not at risk.
[Wire-USA: Many Wireless Telecommunications Facilities installers — even those in their twenty’s — are getting sick and contracting cancer (evidence here). None of this FCC safety propaganda is based on real-world experience or evidence available to everyone 2020 — the jig is up. The public is informed.]
|
<urn:uuid:cf9db12b-9b8a-4665-88d5-a4ef1b2a5a48>
|
CC-MAIN-2022-27
|
https://wireamerica.org/fcc-guidelines-for-cell-antenna-sites/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104364750.74/warc/CC-MAIN-20220704080332-20220704110332-00113.warc.gz
|
en
| 0.896024 | 3,347 | 2.890625 | 3 |
Prior Experience The Past is Prologue
Each of us has learned about wine through our prior experiences. Who we have learned from, the wine regions weve visited and the wines weve tasted shape our opinions and beliefs. This knowledge is stored in memory and retrieved whenever we taste a wine, or even hear the name mentioned. It is impossible to imagine tasting wine without the use of memory; we are what we remember! Two tasters will inevitably have different information stored in memory and will therefore often interpret the same wine differently.
Cues such as ratings, type of closure (cork, screw cap), vintage and grape variety will activate related information stored in memory and interact with the flavor of the wine. The brain grabs this stored information, combines it with the wines sensory data and processes the whole thing as a unit. A mediocre wine can be perceived as interesting if handled by a prestigious importer.
Tasters are unaware how powerful this learned or cognitive component is in wine tasting. Dr. Pam Dalton, a researcher at the Monell Chemical Senses Center in Philadelphia comments, The sensors in your nose and mouth respond to specific chemicals in the wine. Aside from genetic differences, which make us more or less sensitive to certain aromas and tastes, there is a relatively uniform pattern of activation across different people. But how their brains organize and interpret that incoming information is going to depend a lot on what their previous experience has been.
When we drink a bottle of Domain de la Romanee Conti we filter the sensory information through everything we have know about Burgundy, Pinot Noir and our beliefs related to scarcity and high price. A novice lacks this warehouse of information and will experience the same wine differently. Even among experts, disagreement is common and at times profound. Is my internal representation of Chianti the traditional style made from 100% Sangiovese and aged in large casks or the newer version aged in French oak barrels with Merlot added?
Taste and Smell Illusions
Taste and smell illusions demonstrate the extent to which perception is influenced by past experience. Because past experience has taught us to associate certain tastes with aromas, when we smell one, we expect the other to follow. The cardamom seed smells bitter because of its bitter taste. Dalton points out, It is not uncommon that odors acquire such taste properties after countless pairings in foods and beverages. The effect appears to be so strong that in some cases the presence of the aroma alone can influence the perception of other 'tastes'. A dry wine with a fruity bouquet such as an Alsatian Muscat will seem to taste sweet because we are conditioned to associate fruit aromas with sweetness. If you pinch your nose and the effect disappears, the sweetness was perceived, not real.
Finding Whats Not There: The Role of Expectations
Non-sensory information introduced with the wine such as old vines, unfined, dry farmed and limited production has a symbolic value that can trigger preconceived notions. Dalton comments on the impact of these verbal cues, The moment you give me a label for something, anything I already know that is associated with that label will start to come into play. There is a tendency to find what you expect to find, sometimes when its not even there. For example, lets say the same wine is tasted from a screw cap bottle versus a cork-finished bottle (so that the tasters can see both closure types). The novice, unaware of the association between screw cap and jug wine, will probably say, they taste the same to me. More experienced tasters will likely prefer the cork-finished bottle, reporting differences that do not actually exist because they expect to find them. While this would be a cruel exercise, the results are reliable.
Novice vs. Expert: You Say Bad, I say Good
I attended a sit-down Pinot Noir tasting with fifteen novice to intermediate wine enthusiasts. The lineup included a Pinot whose slightly tawny-colored rim and mature bouquet indicated that the wine had aged prematurely and was therefore flawed. Yet, it received the highest number of first place votes. Was the wine good or bad? According to Dalton, it depends on whom you ask: Experienced tasters apply different criteria than novices, based on their expectations as to what state that wine should be in at that particular time. While novices judge a wine based on how it tastes at that moment, experts consider factors such as aging potential and whether the wine accurately reflects its growing region and grape variety. The Barolo expert will taste a young, traditionally made Barolo from a good producer and swooning over the aromas of tar, earth and truffles, will imagine how beautiful the wine will be in 10 years. The novice will taste a harsh, tart, tannic red wine.
The De-Evolution of Smell
The brain of early mammals was dominated by what is called the rhinencephalon or the smell brain. Smell was the primary sense early mammals relied on to obtain information from the environment. Dr. Joseph LeDoux, Professor of Neuroscience at New York University and author of two books on the brain explains how olfaction has, in a relative sense, receded in importance, As primates went from ground dwellers to tree dwellers, smell became less important and vision, especially color vision became more important. The relative amount of the brain devoted to olfaction was reduced while the amount devoted to vision has vastly increased.
As language developed the brain enlarged and the parts of the brain where speech and vision were processed remained separated from those that control smell. According to Dr. Richard Robertson, Professor of Neurobiology at the University of California at Irvine, The brain systems that handle language were formed many millions of years after those that control olfaction and there are relatively few connections between the parts of the brain that process smell and those that control language. (Unlike the way smell, memory and emotion are linked; See Smell, Memory and Emotion). Its one thing to detect an aroma, but finding the words to describe it is a separate task.
This explains a common occurrence in wine tasting called the tip of the nose phenomenon, when we detect an odor were familiar with, but just cant seem to come up with the name. Its not that our sense of smell is faulty; in fact from a standpoint of range and sensitivity, olfaction is powerful. But because the neural circuits that process odors are separated from those that underlie language, odors can be ambiguous, especially in a wine, which presents numerous aromas simultaneously. This lack of confidence we have in our sense of smell can make us tentative, forcing us to seek more reliable cues when evaluating odors; witness the blind taster fishing for cues that might narrow down the list of possibilities.
Context Revisited: Is it Parmesan Cheese or Vomit?
The most powerful cues are verbal and visual. Dr. Rachel Herz of Brown University gives a provocative example of how a verbal cue can create a smell illusion, The smell of Parmesan cheese and vomit are actually not that different. If I hand you something and tell you its Parmesan cheese, youll sniff it and say, sure, thats Parmesan cheese, yeah, I like that. Then I give you the exact the same stimulus and I tell you its vomit; youll believe that just as well. While this wouldnt work with Chanel #5 and pepperoni pizza, Herz explains how it is possible to interpret the same aroma so differently, Because odors are invisible and because we have a hard time naming them, we seek information about them from the outside context. She contends that is why language and visual signals in wine tasting can be so dominant, and supercede smell and taste information.
Visual cues such as color in wine are a context as well and wine tasters may be surprised at powerful role color plays in flavor perception. Color contributes to the tasters first judgment of a wine by activating stored information. An experiment was conducted in which researchers gave subjects a purple-colored, orange-flavored drink; the vast majority thought it was grape flavored. Increased color is associated with increased flavor. In other words, the same wine will be perceived as more intensely flavorful if it is darker in color.
A fascinating new wine study called The Color of Odors [Morrot, Brochet and Dubourdieu] has shown the impact color has in determining the adjectives we use to describe wines. A panel of 54 Enology students at the University of Bordeaux smelled a white Bordeaux wine and described it using appropriate white wine descriptors. When an odorless red dye was added, the tasters used red wine terms to describe it. The descriptors changed only because the color changed! The authors raise a provocative question: When we describe a wine, how much are we relying on our sense of taste and smell and how much on what we see?
The results of this experiment demonstrate how much people rely on the context for interpreting their odor experience. Herz explains why: People are totally tied to things outside of their olfactory system. Because we are so visually and verbally oriented, even experts who you would expect to be less susceptible to these context manipulations look for cues in their visual and verbal worlds. This revelation should be comforting to wine tasters who find it difficult to describe what they are tasting; I like it may be sufficient.
Attention Now You See It, Now You Dont
When I am driving to a new location and take a wrong turn, the first thing I do is turn off the radio. The removal of this auditory cue allows me to focus attention on visual cues. The multiple sensory inputs a wine presents - color, aroma, taste and texture not to mention the non-sensory cues previously discussed, are more than the brain can process at once. Attention is an important topic in Psychology and plays a fascinating role in allowing us to focus on a limited number of stimuli while tuning out the rest.
I was in Amagansett, New York with a with a retail buyer tasting a 1999 Chilean Cabernet Sauvignon with a distinctive herbaceous character. The buyer disappeared and returned five minutes later with a bottle in a brown paper bag. I tasted it and was not able to offer much in the way of description other than that it was an old wine that had lost much of its fruit character. He removed the wine from the bag revealing the same Cabernet Sauvignon we had tasted initially except from the 1976 vintage. I put my nose back in the wine and instantly, as if a switch had been turned on, smelled the herbaceous character! My initial reaction to this appearing act was that having been exposed to air, the wine opened up, revealing this aroma. But this would not happen in so short a time.
This experience illuminates two different phenomena: the importance of context and attention. Blind tasting removes all context (except color). Experts are often humbled trying to identify or describe a wine based on this raw sensory information. But as soon as the wine is revealed, information present on the label determines which sensory features we shine a spotlight on and which remain in the dark. If youve been told something about what youre going to experience, you start selectively attending to those aspects of the experience that are consistent with that information; and you may not even notice some of the other ones, Dalton says. For example, lichee nut aromas are easy to identify if you know youre tasting a Gewurztraminer. In a blind tasting, you may detect these aromas but have difficulty identifying them; but when that aroma is pointed out, you suddenly recognize it because youre paying attention to it. When we see 15.5% alcohol on a bottle of Zinfandel, we look for hotness or overripe flavors. Tasting a Napa Valley Cabernet Sauvignon from the dreaded 1998 vintage will likely yield descriptors such as herbal, under ripe, or lacking in concentration. These characteristics may be present, but to what extent would we notice them if we were not looking for them?
Identifying Aromas Practice Makes Perfect
The inability to identify what youre smelling is one of the frustrations of the aspiring wine taster, a shortcoming often attributed to a poor sense of smell. In reality, experienced wine tasters and perfumers do not necessarily have a more acute sense of smell, but can identify odors because they have a well-developed odor memory. When it comes to identifying unfamiliar smells, expert wine tasters do not perform any better than novices.
To develop an odor memory requires practice or repeated exposure. According to Dr. Charles Wysocki, a smell researcher at Monell Chemical Senses Center, Based on genetics, you either have the capacity to detect a particular molecule or you dont. With repeated experience however, individuals can become more adept at discriminating between different odors, or at smelling an odor that was originally thought was not there. He adds, We think of snow, but the Eskimos have over a dozen words for snow depending upon its texture and the size of the flakes. They have a greater appreciation for snow and can describe it many ways that we dont appreciate.
A fascinating finding from a new study shows that compared to men, women can more readily increase their sensitivity to odors with practice. With six to ten repeated exposures, women (of reproductive age), not men, increased their sensitivity to an odor by 1,000 to 10,000 times. These results support the conventional wisdom that women are better wine tasters than men. Wysocki comments, I would speculate that if you had a woman judging wine, early on she would be as sensitive as a man, but with repeated exposure to the same wines, the woman would become able to make finer distinctions.
Taste vs Smell Preferences: Innate or Learned?
WWhether taste and smell preferences are innate or learned represents a fundamental difference between these two senses. We know that humans have an inborn preference for sweet and an aversion to sour and bitter. Evidence comes from experiments, which monitored the facial expressions of infants. A drop of sugar placed on the tongue resulted in a slight smile and licking of the lips, while a drop of quinine (bitter) produced a grimace.
Pelchat explains how inborn aversions can be modified, We all know that were supposed to like dry wines, but many start out liking sweeter wines because were pre-wired that way. At first, people dont like bitter or astringent, but you can learn to accept less sweetness and more bitterness and astringency in a wine, but its a learning process often requiring repeated exposure. The bitterness of coffee and beer and the burn of chili peppers (not a taste) are examples of sensations that are normally considered unpleasant at first but with repeated exposure can result in liking, even craving. But Pelchat adds that exposure alone doesnt mean youll like the wine: I would say that it is more a question of temperament. When I go to the Philadelphia Academy of Music, some people walk out if they play a modern piece. Others are willing to stick it out and try to figure out what there is to appreciate. With wines, are you willing to put up with a few glasses of a tannic Cabernet so you learn to appreciate it? Some are thrill seekers saying, Im going to learn to like this, others draw the line.
While taste preferences are present at birth, there is less evidence that smell preferences are inborn. According to Dalton, Across every culture I have tested, the smell of human waste and rotting flesh appears to be universally repugnant. I would venture to say that if innate smell preferences exist they are more consistent at the negative end.
While preferences for taste can change, those for smell are even more modifiable by experience. This may be because we continue to learn novel odors through our entire life, whereas we experience the basic tastes early on. In any case, odors take on meaning when they are paired with experience because memory and smell (not taste) are processed in the same part of the brain [see next section]. When we encounter an aroma that has been previously paired with a positive experience, our response to that wine will be favorable and certainly different from someone without this experience.
An example of how we learn to like an aroma is the barnyard scent caused by the spoilage yeast Brettanomyces. Brett, as it is called, used to be more common in European wines and if you grew up tasting these wines (Chateau de Beaucastel, for example) you learned to associate the smell with a luxury wine. Due to the increased use of new oak barrels and stricter winery hygiene, brett is less common today. But when it is encountered, instead of being considered an attractive nuance, it is considered a flaw by tasters more attuned to the ripe fruit aromas of New World wines. Brett demonstrates a key point related to liking: familiarity is the most important determinant of preference. While there are personality types that seek out the unfamiliar, generally, you like what you know. However, repeated exposure to a strange, new wine, particularly in favorable contexts such as a fine restaurant, an endorsement from a respected friend, wine critic or social factors (Ill have a glass of merlot) can result in an increase in liking.
Smell, Memory and Emotion
If you have ever smelled an odor and been transported back to a specific time or place, you will agree that smelling a wine can evoke highly individual, even emotional reactions. Herz states, Odors may trigger a memory of uncommon emotional potency. And that emotional connection is rooted in the way that smell, emotion and memory are entangled within the brain. Because wine aromas go directly into the brains limbic areas where emotion is processed, your first response can be an emotional one, such as a tingle running down your spine.
Herzs findings show that memories evoked by odors, in contrast with memories triggered by sights or sounds, have an emotional quality, so much so that the same odor may evoke different feelings in each of us. Smell and emotion are so entwined with experience that each of us may perceive the same odor with far different feelings, an important source of variation between tasters. If you grew up on a farm, you may find the smell of earthiness in a wine pleasant, while someone else may find it objectionable or not even notice it.
The Imprecision of Language
Not only are tastes and aromas perceived differently by different people but there is further chance for disagreement when we use language to describe what were experiencing. Bartoshuk explains the potential communication problem; Comparisons of perceived intensities across individuals are valid only if ratings are made relative to a standard equally intense to each individual. How do we find such a standard? The answer is that there is no logically valid way to be sure that we have such a standard. Since there is no agreed upon standard for a given aroma or taste, we do not know the relative amount of tartness one tastes in a Muscadet or the level of astringency one feels in a tannic Cabernet Sauvignon. The adjectives used to describe what we taste are relative. For example, two people agreed they had a strenuous work out. The term strenuous is relative, because one ran a mile while the other ran five miles, did 100 sit-ups and jumped rope for 30 minutes. The California Chardonnay drinkers definition of oaky is different from that of the white Burgundy drinkers, yet adjectives are used as if they mean the same thing to all people.
I was reminded of this recently while tasting two German Rieslings. A fellow taster commented on the distinct petrol character of one. Having already tasted the wine and not found that character, I handed her the second wine which I found was loaded with the very same petrol character she found none. It would have been futile to debate because I had no idea if we were in agreement as to what this petrol aroma was, and even if we were, if we were equally sensitive to it. We have no way of knowing if we are sharing the same sensory experience; something to consider the next time youre debating the merits of a wine with a fellow taster.
Is there such thing as an objective quality rating? What is quality? Today, in most cases, quality is defined by the media scores a wine receives from Robert Parker and Wine Spectator. The system is not perfect but its easy for consumers to use and therefore, good for wine consumption. What users of scores should bear in mind is that numerical scores are not quality ratings, but liking or preference ratings. Based on their unique prior experiences, critics are converting their feelings about a wine into a number. A wine with a microbial nose such as Domaine Tempier Rouge may receive 80 points by a reviewer who does not like non-fruit aromas. The same character may be a positive to another critic who may give it 90 points. Is a wine that scores 90 points higher quality than one that scores 80 points? Its a difficult question to answer but it is clear that there is in fact, a psychology to quality.
|
<urn:uuid:86ce71c1-5354-4567-af81-760c34559098>
|
CC-MAIN-2016-50
|
http://www.enologyinternational.com/articles/senses2.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540839.46/warc/CC-MAIN-20161202170900-00445-ip-10-31-129-80.ec2.internal.warc.gz
|
en
| 0.959244 | 4,371 | 2.5625 | 3 |
The principles and regulations established in a community by some authority and applicable to its folks, regardless of whether in the kind of legislation or of custom and policies recognized and enforced by judicial choice. And just as the gardener needs axes, pruning hooks, saws, and shears to shape his trees, just so does the socialist writer require the force that he can locate only in law to shape human beings. As a consequence of this, there seems to be no country in the globe exactly where the social order rests on a firmer foundation. The mission of the law is not to oppress persons and plunder them of their property, even though the law could be acting in a philanthropic spirit. When law and force preserve a person inside the bounds of justice, they impose absolutely nothing but a mere negation. Our industrial law focus opens doors to a wide assortment of legal careers, providing you an edge on graduation. If such a law — which might be an isolated case — is not abolished right away, it will spread, multiply, and create into a system.
Max Weber in 1917, Weber began his profession as a lawyer, and is regarded as one of the founders of sociology and sociology of law. Mr. Considerant would sponsor the result in of the labor groups he would use the law to safe for them a guaranteed minimum of clothing, housing, food, and all other necessities of life. I am a novelist (living in Brooklyn, of course, which is the law), and am operating on a extremely Shakespeare-oriented project. Not till he, Robespierre, shall have accomplished these miracles, as he so rightly calls them, will he permit the law to reign once again.
But on the other hand, picture that this fatal principle has been introduced: Beneath the pretense of organization, regulation, protection, or encouragement, the law requires house from 1 person and gives it to another the law takes the wealth of all and provides it to a handful of — whether or not farmers, manufacturers, ship owners, artists, or comedians.
If this is accurate, then nothing at all can be a lot more evident than this: The law is the organization of the organic proper of lawful defense. Because law necessarily needs the support of force, its lawful domain is only in the areas where the use of force is required. It is only beneath this law of justice that mankind will achieve — gradually, no doubt, but undoubtedly — God’s design and style for the orderly and peaceful progress of humanity.
Therefore, when plunder is organized by law for the profit of these who make the law, all the plundered classes try somehow to enter — by peaceful or revolutionary indicates — into the creating of laws. Socialists, like all other monopolists, want to make the law their own weapon. The harmlessness of the mission performed by law and lawful defense is self-evident the usefulness is clear and the legitimacy … Read More
|
<urn:uuid:1137ff56-7dc2-4932-8abf-d6a76342605c>
|
CC-MAIN-2018-47
|
http://dojoblog.info/category/law-and-legal/divorce
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746227.72/warc/CC-MAIN-20181120035814-20181120061814-00228.warc.gz
|
en
| 0.957479 | 594 | 2.5625 | 3 |
Baltic amber – fossilised tree sap from Norway – has been known as a valuable item traded in Europe since the second millennium BCE.
But while its golden glow clearly became a treasured sight around the western Mediterranean, new research finds that it wasn’t the first bauble on the block – and not by a long shot.
Writing in the journal PLOS ONE, scientists led by archaeologist Mercedes Murillo-Barosso from Spain’s University of Granada, present evidence to show that amber from another source was in wide circulation 2000 years before the Nordic product reached the market.
In seeking to better understand the prehistory of ancient Spain – known as Iberia – the researchers collected 22 pieces of ancient amber and subjected them to Fourier Transform Infrared Spectroscopy (FITR) in order to determine their origin.
The oldest items, they discovered, dating to the fourth millennium BCE, came from Sicily. The result was unexpected.
“Interestingly, the first amber objects recovered in Sicily and identified as being made from the local amber there also date from the 4th Millennium BCE,” says Murillo-Barosso.
“However, there is no other evidence indicating direct contact between Sicily and Iberia at this time.”
Instead, the researchers suggest, the amber might have been traded by Sicily to markets in North Africa, from whence it was re-traded to the Iberian Peninsula.
The conjecture is supported by distribution. The ancient Sicilian amber pieces were all found in the southern part of the peninsula, and mirrored the distribution of ivory objects from the same period known to have arrived from Africa.
The study goes on to suggest that the later arrival of the more familiar Baltic amber might have followed the same route – arriving via Africa rather than through direct trade with Scandinavia.
The new issue of the print edition of Cosmos magazine features an article on the amazing world of fossils trapped in amber. The magazine will be available in Australia and New Zealand in early September. Overseas readers wishing to order a copy can do so here.
Read science facts, not fiction...
There’s never been a more important time to explain the facts, cherish evidence-based knowledge and to showcase the latest scientific, technological and engineering breakthroughs. Cosmos is published by The Royal Institution of Australia, a charity dedicated to connecting people with the world of science. Financial contributions, however big or small, help us provide access to trusted science information at a time when the world needs it most. Please support us by making a donation or purchasing a subscription today.
|
<urn:uuid:72b1836b-a02d-4940-ab60-d28c25aaa186>
|
CC-MAIN-2022-40
|
https://cosmosmagazine.com/history/archaeology/prehistoric-sicily-was-an-early-source-of-amber/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00491.warc.gz
|
en
| 0.953819 | 532 | 3.34375 | 3 |
Ask Mr. Donn
The Awesome Aztecs
Why did the Aztecs search for 200 years to find the Place of the Prickly Pear Cactus? What did conquered tribes have to pay in tribute? How did the Aztecs treat honored guests? How did the Aztecs grow food on top of a lake? What did the Aztecs consider good behavior? Welcome to ancient Mexico.
These are questions we created about The Aztec Empire that we believe you might find on a homework assignment, a unit quiz or an exam. Test yourself. See if you remember the answer (or guess the answer), then click the "Show Answer" button under each question to see if you are right!
|
<urn:uuid:7abf1204-df2e-4af6-bc5a-1b14e048d241>
|
CC-MAIN-2020-05
|
https://ask.mrdonn.org/aztecs/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251696046.73/warc/CC-MAIN-20200127081933-20200127111933-00113.warc.gz
|
en
| 0.952183 | 145 | 3.09375 | 3 |
Tensions remain high between Russia and Georgia, after Georgia released last month four military officers arrested on spying charges - an accusation rejected by Moscow. The Russian government retaliated by imposing economic sanctions against Georgia. In this background report from Washington, VOA Senior Correspondent André de Nesnera looks at one major problem between the two countries: the issue of the autonomous Georgian regions of Abkhazia and South Ossetia.
Abkhazia is located in the northwestern corner of Georgia while South Ossetia is situated in the north-central part of that country. Both areas border Russia.
Robert Legvold, a Russia expert with Columbia University, says both regions are de facto independent states, although no country has recognized their independence.
"They - in the case of Abkhazia, use the Russian ruble as the principal currency," he said. "If there is economic intercourse, it's more with Russia and elsewhere than it is with Georgia. Critical transport links are broken. And although Georgia has recently reasserted authority over a portion of Abkhazia - an area called the Kodori Gorge - for the most part, Georgia's authority, or writ, simply does not extend to the territory. And its basic position - the Abkhaz leadership - is that they wish independence from Georgia. In the case of South Ossetia, which is linked to an ethnically related region to the north in Russia called North Ossetia, their desire is for separatism that would lead to autonomy, allowing them to be integrated into Russia. So they are different on that score from Abkhazia."
A major source of friction between Moscow and Tbilisi is the presence of Russian troops in Abkhazia and South Ossetia. Ostensibly, they are there as peacekeepers, but Tbilisi says their presence only reinforces separatist sentiments there - a charge rejected by Russian officials. Georgian President Mikhail Saakashvili has called for Russian troops to be replaced by an international force, but the world community has been unresponsive.
Experts say Russian President Vladimir Putin has added a new twist to the debate by linking the issue of Abkhaz independence to the status of Kosovo - a province in southern Serbia currently under the administration of the United Nations.
"This is the most dangerous end game in the current crisis because by the end of the year, the United Nations is likely to pass some kind of resolution on the question of Kosovo independence," said Russia expert Robert Legvold. "And Putin for some time has been saying - because the Russians are opposed to doing so - has been saying that if that passes, then that changes the legal standing, or the potential legal standing, in how Russia would deal with these breakaway territories. Not just Abkhazia, but Trans-Dniestria in Moldova. And when Saakashvili was in the United States [in July], he was - in private meetings - was desperately concerned that the Russians in fact may use a Kosovo independence resolution as a cover for extending recognition to Abkhazia."
Experts say regions within Russia - such as Chechnya - could also push for international recognition following a U.N. resolution on independence for Kosovo.
But Olga Oliker from the RAND Corporation says not every region in the world can claim independence.
"Just because you have a clear ethnic base of a population doesn't necessarily mean that you should have national borders surrounding that ethnic base," she said. "Some regions are more sustainable and more viable than others for a host of reasons, some of them economic and some of them political. You could also look at Kurdish regions in Iraq, Iran, Turkey, Syria - and that same argument comes up. And the fact of the matter is there are good political reasons why these regions have not been independent in the past. And yes, it is fair to revisit them from time to time, but it's also fair to occasionally decide that no, it's not appropriate for these regions to be independent."
Georgian President Saakashvili has vowed to bring the secessionist regions of Abkhazia and South Ossetia back into the country. But experts say at this time, it does not seem that goal will be attained anytime soon.
|
<urn:uuid:81ed0978-b932-496f-87a8-fc0bed5e273e>
|
CC-MAIN-2017-13
|
http://www.voanews.com/a/a-13-2006-10-11-voa52/318975.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189130.57/warc/CC-MAIN-20170322212949-00207-ip-10-233-31-227.ec2.internal.warc.gz
|
en
| 0.968562 | 872 | 2.53125 | 3 |
7 May 2008
COMMISSION ON SUSTAINABLE DEVELOPMENT
Sixteenth Session, New York, 05 – 16 May 2008
Ms. Jasmina KARBA
on behalf of the European Union
It is an honour for Slovenia to present statement on behalf of the European Union.
The Candidate Country the former Yugoslav Republic of Macedonia*, the Countries of the Stabilisation and Association Process and potential candidates Albania, Montenegro, and Serbia as well as the Republic of Moldova, align themselves with this statement.
· The EU wishes to emphasise the key role of land use and management in ensuring sustainable development. Land policy represents one of the most critical and complex issues given its impact on peace and stability, economic growth, equitable access to land resources and social development, gender equality, poverty eradication and natural resources management.
· Fostering the sustainable use of natural resources and soil preservation are the main challenges identified by the Johannesburg plan of implementation (JPOI). To address these challenges, the EU sees a key role for integrated planning and management of land and other resources, inter alia, through the improvement of administrative systems. Thereby we take into account various aspects associated with land, such as agricultural, rural development, soil protection, forestry, biodiversity conservation and tourism as well as institutional and educational level of societies.
· Arable land and fragile rangelands especially in certain parts of the world are deteriorating at an alarming pace, which might jeopardise the food security. The world’s growing demand for food requires increased production on land. It is therefore critical to reverse this trend of land deterioration. Given the relationship between land and food security the EU would like to highlight the importance of the 2004 FAO Voluntary guidelines. These support the progressive realization of the right to adequate food in the context of national food security, combat hunger and poverty, and promote the attainment of the Millennium Development Goals.
· Degradation of land and soil through desertification, soil erosion and nutrition depletion, salinisation of water resources, contamination of areas by heavy metals or other undesired substances, together with accelerated development of human settlements requiring more and more land, is the most critical and increasing threat to sustainable land use. It has negative impacts on agricultural productivity and rural development and therefore directly affects the livelihoods of millions of people. It is crucial to reverse this trend, particularly in the light of the need to preserve production resources, such as soil and water. It is important to rethink the use of soil in agriculture since the availability of land for food production is again becoming strategically important, not only in developing but also in developed countries.
· Land and water use practices affect the state of land and water resources. Better soil and water management can increase land productivity, resilience of farming systems and availability of water resources. Enhancing – in a sustainable manner - the productivity of land and the efficient use of water resources in agriculture, applying good agricultural practices, such as organic farming, zero tillage and ensuring diversification of economic activities is of paramount importance.
· Certain uses of land can drive climate change, but soil can also mitigate it through carbon sequestration. Also, in our search for renewable energy and the focus on bio-energy sustainable use of land can be a defining factor in competing claims on land. Soil has to be perceived as a part of the solution to climate change. Climate change can be tackled by taking appropriate measures and avoiding unsustainable practices.
· Soil protection is a great challenge of the current EU land policy. Different EU policies (for instance on water, waste, chemicals, industrial pollution prevention, nature protection, pesticides, agriculture and rural development) contribute to soil protection. Since these policies are not sufficient to ensure an adequate level of protection for soil in all EU countries, the EU soil protection strategy has been prepared to support a coordinated approach for soil protection.
· The EU “Thematic Strategy for Soil Protection” addresses soil protection challenges and defines a coordinated and comprehensive approach. The strategy will not benefit only soil. Other environmental media such as water, air and nature will be improved as well. It aims to ensure that land users will benefit from a soil which can better perform the economic functions they expect and the environment, in general, will benefit from the ecological sevices that a healthy soil provides.
* The former Yugoslav Republic of Macedonia continues to be part of the Stabilisation and Association Process.
|
<urn:uuid:b77fedf4-bdac-4fb4-bfff-2cda39547898>
|
CC-MAIN-2016-07
|
http://newyork.predstavnistvo.si/index.php?id=1829&L=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701168065.93/warc/CC-MAIN-20160205193928-00016-ip-10-236-182-209.ec2.internal.warc.gz
|
en
| 0.913488 | 900 | 2.546875 | 3 |
Place value of a digit depends on its position or place in the number. Each digit's place has a value of 10 times the place to its right digit.
The numbers, we use today, 0 to 9 which are known as Hindu-Arabic numerals.
In any number, the right most number denotes the one's place. Next number denotes the tens place and left to tens denotes the hundreds.
To read easily the numbers in the standard form, commas are used to separate a group of three digits.
Example: Expand the number 94.
Solution: The number 94 has two digits. The right most number is 4. It denotes one's place. The next digit to the left of ones one's place is, tens' place.
So the expanded form is
= 9 tens + 4 ones
Example: Explain the value of the number 978.
Solution: 978 has three digits. The right most digit denote one's digit. The next one denotes the tens' place. The left most digit denote the hundreds' place.
So here we have 9 hundreds plus 7 tens plus 8 ones.
= 9 hundreds + 7 tens + 8 ones.
The table shows the value of digits in standard form.
|billion||hundred millions||ten millions||one million||hundred thousands||ten thousands||thousands||hundreds||tens||ones|
Example: In 876,050,975 what is the value of 6?
Solution: 6 represents 6 millions.
Example: Say the value of 5 in 75,000,875.
Solution: The first right most five is in one's place.
So it denotes 5 ones.
The next five is in millions' place.
So it denotes 5 millions.
Example: Write it in standard form.
Thirty five millions, eight thousands, nine hundreds and forty five.
Find the value of 3 in the following numbers.
Students can try the above practice problems on their own, so that they can master in place value. Teachers and parents can encourage the students to do the problems on their own. If you are having any doubt you can contact us through mail, we will help you to clear all your doubts.
|
<urn:uuid:4c860b15-9a93-495c-a30c-318e885927c9>
|
CC-MAIN-2018-39
|
https://www.onlinemath4all.com/place_value.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267162809.73/warc/CC-MAIN-20180926002255-20180926022655-00541.warc.gz
|
en
| 0.820067 | 454 | 4.375 | 4 |
From Darkness to Light
Finding Our Way through Challenges, by Dr. Brad Schwall
Crises bring darkness - the inability to see hope - difficulty seeing where to go and what to do. When faced with a crisis that seems to have no end, it's difficult to think. It's difficult to have hope. Not being able to understand what is happening and where to go is the result of a loss of balance and can also often be influenced by the physical components of mental illness - impaired executive functioning, a lack of energy, and a clouded mind preventing the ability to see past present circumstances.
Finding relief, recovering, and experiencing renewal is a long, complex journey with many twists, setbacks, and turns on the way. Some principles can serve as light on your way through confusing and challenging times.
- Accept weakness - We all struggle. Struggles push us to realize we can't survive or thrive by our own power.
- Do the next thing - When faced with many decisions to make, many directions we could go, do one thing. Do the next thing. We only have today on which we can focus. Problems take time. Our minds will clear. We will eventually see.
- Talk to others - Not sharing with others fuels shame - embarrassment that we are struggling. Sharing with others helps us be real, genuine and leads to understanding that others struggle too.
- Lean on your faith - It's often in times of the greatest struggle that we discover our greatest resource - our faith.
- Seek help - Mental health has a physical component and psychology and therapy offer knowledge of depression, anxiety, addictions, and mental illness that can inform us and provide us with tools we can use in finding our way.
- Take time to heal - Every time you cry, let yourself. Every time you ask "why," be patient. Reality, truth, and hope are gradually revealed.
- Grow - As you move from darkness to light, from losing your way to finding your way, continue to grow, learn, and gain awareness. Be grateful for what you're learning, remember the lessons, and seek deeper meaning and heightened understanding of yourself, your relationships, and your faith.
From the dark pits with no apparent way out, we eventually find a way. We might stumble along the way, but remembering God's provision in the past, seeking God's presence in the moment, and having hope for the future can lead to new ways of relating and living.
"When I thought, 'My foot is slipping,'
your steadfast love, O LORD, held me up.
When the cares of my heart are many,
your consolations cheer my soul."
|
<urn:uuid:5c7134fe-f1a4-405f-968e-f3c18999cb85>
|
CC-MAIN-2019-30
|
https://pccdallas.org/resources/pcc-insights/darkness-light/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525483.62/warc/CC-MAIN-20190718001934-20190718023934-00502.warc.gz
|
en
| 0.954812 | 546 | 2.6875 | 3 |
It's important to start saving early for college. Keep in mind that few students pay full sticker price for college. Most students pay for their education through a combination of savings, scholarships, grants, and loans.
Financial aid for college can come from a lot of different places, but the first three general sources to look into are the following:
- U.S. Government: Federal loans, scholarships, and more
- Ohio Government: Ohio Department of Higher Education and other state-sponsored sources
- Military: Financial aid for military personnel, veterans, and their families
Ohio offers the CollegeAdvantage 529 College Savings Program where the earnings on your savings are tax-free and withdrawals made for qualified higher education expenses are not taxed. Ohioans get even more advantages with a tax deduction for contributions up to $2,000 per year, per beneficiary. Whether you’re the parent of a young child, middle school student, or 12th grader, there are advantages to using a 529 Plan before you start paying for college.
And be careful! Make sure any financial aid search service is free - if it costs money, it could be a scam!
Financial aid eligibility varies by school and by program. Please check with the financial aid office of the school you are considering before making a final commitment.
Other online resources to help you find money for college:
- OhioMeansJobs: Search for Scholarships - Over 1.5 Million Scholarships are available using this search engine from OhioMeansJobs.
- Ohio Association of Student Financial Aid Administrators: College Aid Resources
- Funding Education Beyond High School: The Guide to Federal Student Aid - The U.S. Department of Education provides detailed information on federal financial aid programs and tells you how to apply for them. The guide is available in both English and Spanish and in PDF and HTML formats. Print copies may be requested from the U.S. Department of Education.
- Start Here, Go Further: Federal Student Aid for Students and Parents - This website can answer many of your questions about aid eligibility, types of federal aid, and how to apply. From this site you can get a personal identification number (PIN), which allows you to complete applications online.
- Federal Education Tax Credits - Tax credits can help offset education costs. The Hope Credit and the Lifetime Learning Credit are education credits you can subtract in full from the federal income tax. For more information, download the Tax Benefits for Education publication from the IRS.
|
<urn:uuid:cf14d424-ca5b-4c77-bbcf-7d328cca695c>
|
CC-MAIN-2018-13
|
https://www.ohiohighered.org/students/pay-for-college?alt-style=high-contrast
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648003.58/warc/CC-MAIN-20180322205902-20180322225902-00346.warc.gz
|
en
| 0.933435 | 506 | 2.546875 | 3 |
by Carol Bryant
Protein is a building block that is essential to dogs at all stages of life. Knowing how much protein to feed your dog according to its age is crucial information for dog parents to know. Always check with your pet's veterinarian before adding or making any nutritional changes.
Protein is an essential nutrient to dogs in all life stages, but it's important in proper amounts for puppies to help with development of their body tissues.
While in their formative months, puppies generally require about 22-28 percent of the calories in puppy food to be protein content. This ensures puppies will develop a healthy immune system, and it provides the essential building blocks for optimal growth. Growing bodies need more protein.
Not all protein in puppy food is equal, so knowing how to interpret a pet food label is important. Ingredients are listed in order of weight, so something like lamb meat or meal is a good source of quality protein.
Diets of adult dogs (older than 1 year of age) should contain anywhere between 10 and 18 percent protein.
Animal-based proteins -- including chicken, lamb, fish or beef -- are best for dogs.
The old adage that senior diets should include a reduced level of protein has proven to be inaccurate.
In fact, senior diets should maintain a steady, if not increased, level of protein so dogs can maintain good muscle mass. The extra protein a senior dog's system does not need will be excreted via urine, burned off in exercise, or stored as fat. Feeding quality protein in canines with kidney issues ensures the dog's kidneys will not work as hard. Generally, follow the same protein levels as an adult dog.
Working, pregnant, lactating and special-needs dogs should have their protein levels adjusted in conjunction with veterinary recommendation.
- Is Your Dog Cut out for Field Trials?
- Should You Crate-train Your Puppy?
- How to Play Soccer With Your Dog
- The Best Way for Your Dog to Ride in the Car with You
- Good Dog Park Etiquette
- What Is Freestyle Dancing With Dogs?
- Canicross: An Easier Way to Run With Your Dog
- Reading Your Dog's Body Language
- Kitten Kindergarten
- Tips to Keep Your Dog Safe While Flying
- Keep Your Dog Warm in the Winter
- Scottish Deerhound: The Ideal Exercise Buddy
- Teach Your Dog to Fetch
- Is Your Dog Bored?
- 7 Ways to Pamper Your Cat
- The Best Games to Play With Your High-Energy Dog
- Dog Feeding Mishaps Corrected
- How to Succeed at Off-Leash Dog Play
- ID Your Relationship With Your Cat
- Photographing Your Elusive Feline
- How to Keep Your Pet Safe During the Holidays
- When Good Dogs Turn Bad
- From Finicky Fido to Chowhound Charlie
- Insure Your Kitty's Health
- Unconditional Love: My Cat Forgives Me Every Day
- From Feline to Family Member
- Is Water From a Christmas Tree Stand Harmful to Cats?
- A Day in the Life of a Sheepherding Dog
- Go on a Desert Retreat With Your Dog
- Dog Food Goes Natural and Holistic
- Determining a Food Allergy
- Exercise Gone to the Dogs
- Find the Right Sport for Your Dog
- Make Your Dog a Part of Your Wedding
- Hydrotherapy Helps Dogs Get in Shape
- How Your Cat Says 'I Love You'
- Lost Cats Found
- De-stress Veterinary Visits for Your Cat
- Keeping Cat Food Fresh
- Second-Hand Cat, First-Rate Pet
Pets | Dogs: Optimal Protein Requirements for Dogs at Different Life Stages
|
<urn:uuid:c58fa07b-2969-40e5-9d20-719ba1dbc8ac>
|
CC-MAIN-2019-04
|
https://www.ihavenet.com/pets/Dogs_Optimal-Protein-Requirements-for-Dogs-at-Different-Life-Stages_dd.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659056.44/warc/CC-MAIN-20190117163938-20190117185938-00434.warc.gz
|
en
| 0.892871 | 780 | 2.703125 | 3 |
5 Amazing & Fun Sci Tricks with Common Household Items
Looking for some fun and educational activities for kids using common household items?
Children love to experiment. Whether it’s blowing bubbles in colored water or stacking blocks into a complex tower, they are always up to something. Their curiosity level increases as they grow older and start learning more things. They quickly become little researchers.
So, instead of preventing these small minds from experimenting, it’s best to encourage them so that those activities turn out to be constructive, educational, and fun at the same time.
One such type of activity that can help your kids grow academically while having fun is science experiments. Science is awesome, and you can experience its awesomeness even without leaving your house. Isn’t that amazing?
Yes, we’ve found some fun sci tricks that can be carried out with the stuff you already have. So, without any further delay, let the learning and fun begin as we bring you 5 fun-filled science experiments for your kids (of any age).
If you’re still looking for more science experiments after this article check out our, 9 Classic Science Experiments to Do with Your Kids.
Interesting Science Experiments for Kids to Try at Home
1. Create Eggshell Chalk
This is one interesting sci trick that can be tried using simple household ingredients. So, are you ready to create eggshell chalk? Let’s get started.
What Will You Need?
- 10 eggshells
- 4 tbsp hot water
- 2 tbsp plain flour
- Food dye
- Paper towel
The first step involves cleaning the eggs thoroughly. Make sure that the membrane is removed properly. Once done, leave them to dry.
After the shells have dried completely, place them in a mortar and pestle. Alternatively, you may also consider using a rock on concrete, whatever is feasible for you.
Grind the eggshells until they turn into a fine powder. This may take a while. But make sure to get a consistently fine powder in the end.
Transfer the eggshell powder into a bowl. Now, add 2 tbsp of flour and 4 tbsp of hot water (or, as required) to make a stiff paste.
Next, add food dye to your paste. You can use any color of your choice. Mix the paste properly so that the color gets evenly distributed.
Take a thick paper towel and place your eggshell paste over it.
Now, you want the paste to have a chalk-like shape. For this, roll the paper towel into a tube. Alternatively, if you’re in for some fun shape chalks, consider using silicone ice cube tray molds.
Leave the chalk to dry for a few days once you get the desired chalk shape.
After a few days, once your chalk stick has completely dried, it’s ready to be used. However, this eggshell chalk won’t work on regular blackboards, but at the same time, you can create a masterpiece by having lots of fun outdoors, either on driveways or footpaths.
Interested in trying other egg-related experiments? You might want to check this out from KiwiCo: Eggsperiments.
2. Make A Lava Lamp
This experiment teaches about liquid density. It’s fun for all ages and is easy to carry out with the stuff you probably will have in the house.
What Will You Need?
- A wide bottle (you may also consider a fancy drinking glass or wide glass vase, whatever is available)
- Vegetable oil
- Food coloring
- Alka-Seltzer tablet
You may choose your bottle/vase/glass size depending on how much vegetable oil you wish to use. Once chosen, fill your container about 3/4th with the vegetable oil.
Next, fill the remaining container with water. Don’t fill up to the brim; leave about 2-3 inches. See how the water passes through the oil while settling at the bottom. Did you know that water is denser than oil?
Now, pick your lava lamp color. The water may take around a minute to settle down. Once it does, add around 10 drops of your preferred food color. Observe how each drop makes its way through the oil while sitting on the top of the water layer. Do not proceed until you see the water droplets pass through the oil-water line while bursting into the water.
Let the fun begin by adding your last ingredient: the Alka-Seltzer tablet. When it mixes with water, the reaction produces carbon dioxide bubbles which will eventually stick to the water droplets. As the water-gas combination is less dense than the vegetable oil, they will begin rising to the top. The gas bubbles will then break by releasing into the air. The water will again go down and settle at the bottom.
Observe the reactions and repeat the process if you’d like to.
Isn’t this a fun activity to keep your kids entertained? We recommend you try this out with them.
Make sure to check out some other fun science experiments you can do at home with your kids in our article, 10 Best Science Kits for Kids (For Every Age!).
3. Make Homemade Slime
Every kid loves to play with slime, and what if you can make one of your own? Let’s find out how.
What Will You Need:
- White school glue
- Food color
- 2 bowls
For a basic slime, take a bowl and mix ¼ cup of white school glue and ¼ cup of water.
If you want your slime to be colorful, add a few drops of your preferred food color to the solution.
Now, take another bowl, and mix ½ tbs borax along with ½ a cup of water. Continue mixing until the borax has dissolved completely.
Next, mix this borax solution with the glue solution that we prepared in step 1. If not in a bowl, you may also consider mixing these solutions into a resealable plastic bag.
Once you mix, you’ll see a slimy texture forming. Continue to stir the mixture and then knead it until you get the desired consistency.
Your home-made slime is ready. Remove it from the bowl and enjoy.
You may get creative and try some advanced slime methods. For instance, to make glow-in-the-dark slime, all you need to do is add glow-in-the-dark paint to the glue solution. For glitter slime, use clear glue gel instead of white glue and then add glitter into it.
Don’t forget to check on this amazing slime kit from Amazon: Play-Doh Slime.
4. Make an Eggshell Disappear
This egg experiment is fun for preschoolers as well as older kids. So, why not give it a try?
What Will You Need:
- A mason jar with lid and ring (preferably 16-ounce)
- Fresh egg
- White vinegar
Place the egg gently into the mason jar.
Fill the jar with white vinegar while leaving ½ inch at the top. Don’t fill it to the brim, or the jar might burst from the carbon dioxide gas produced by the reaction.
Now, cover the jar loosely with the lid and ring. Again, be sure it’s not too tight. The gas should be able to escape the jar.
Allow the egg to sit for the next two days. Later, remove it from the jar and wash it off with water. Where did the eggshell go? Fun, right? Enjoy!
5. Make Water Float
Yes, you read it right. There’s no magic behind making the water float. It’s purely a sci trick. Would you like to know? Great! Let’s begin.
What Will You Need?
- A small glass of water
- An index card or a construction paper that is large enough to cover the glass opening
- A sink or a bathtub (or anywhere outside) – pick your spot
Fill the glass with water (there’s no such measurement here, take as much water as you like).
Turn the glass upside down. See what happens. The water spills out, right?
Again, fill the glass with water. Remember, the more you add, the more will be the difficulty level of this experiment. It’s safe to start by filling up half of your glass with water.
Now, put the index card or construction paper on the top while pressing it down firmly. Meanwhile, rotate the cup till it’s upside down. Next, remove your hand gradually in a way that the paper or card stays in place. What did you see? Did you make the water float without spilling it out? If not, try again with a larger piece of paper and less water. Observe how water stays in place.
Wrapping It Up
Aren’t these sci tricks worth trying? These fun and educational experiments are sure to make your kids’ day fun-filled and interesting. Need more such amazing ideas to keep your kids indulged with?
Check this out from Amazon: A kit of 21 exciting and interesting kid-friendly science experiments.
Which experiment are you going to start with? Have you already tried any of these science magic tricks? How was the experience?
Do you have any other such exciting kid-friendly science experiments using household items? Do share your best science trick with us in the comments.
Arthur ButlerPosted at 22:54h, 26 October
YouTube channel challenge content!
|
<urn:uuid:a651786e-f844-474f-af7a-6bae249cb9b6>
|
CC-MAIN-2023-14
|
https://stemeducationguide.com/fun-sci-tricks-with-common-household-items/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949107.48/warc/CC-MAIN-20230330070451-20230330100451-00244.warc.gz
|
en
| 0.916301 | 2,151 | 3.46875 | 3 |
Want to know your browser from your bandwidth, or your intranet from your ISP?
Here are some terms from the internet world that you might find useful:
Analytics software (the most popular free version is Google Analytics) allows you to track who visits your website and how they interact with it. No matter what your website is for, you should be using some form of analytics because without it you’ll be completely in the dark and won’t be able to make informed improvements to usability. If your website is for business purposes then analytics is absolutely essential. Browse our analytics articles to learn how you can use analytics to gain a greater understanding of your website visitors.
The alternative attribute (also known as the alt attribute) is html code used to describe images. While this description isn’t usually visible to users (unless the image does not load), they are used by screen readers to help the visually impaired to understand the content of an image. They are also used by search engines, so descriptive alt attributes can help images to appear in image search results.
The amount of data you can send through a network or modem connection. It is usually measured in bits-per-second.
Black Hat SEO
SEO allows us to improve website visibility in the search engines. While there are many natural ways to optimise a website, there have always been ways to cheat the system – these techniques are known as black hat and go against Google’s guidelines, so can result in a manual or algorithmic penalty, causing the website in question to lose visibility. For example, paying for links that pass link juice can result in a link penalty from Google, which would require work to remove the links and a reconsideration request.
Short for ‘web log’, this is a user-generated website where entries are made in a journal style, and usually displayed in reverse chronological order. A typical blog combines text, images, and links to other blogs, web pages, and other media related to its topic. The ability for readers to leave comments in an interactive format is an important part of many blogs. Discover how blogging can help grow your website traffic by reviewing our latest blogging articles. Short on time? Read our favourite guide to learn how to start a blog.
Broadband Internet access, often shortened to “broadband Internet” or just “broadband”, is a high data-transmission rate Internet connection.
A software application that enables you to display and interact with text, images, and other information typically located on a web page on a website. Text and images on a web page can contain hyperlinks to other web pages at the same or different websites. Web browsers allow you to quickly and easily access information provided on many web pages across many websites by traversing these links. The most popular web browsers include Internet Explorer, Mozilla Firefox, Safari, Google Chrome, and Opera.
A cache is a block of memory for temporary storage of data likely to be used again. A web browser uses a cache to store the pages and URLs of websites you visit on your computer’s hard drive. When you visit a web page you have recently viewed, everything doesn’t need to be downloaded to your computer again, just from your hard disk. As accessing your hard disk is much faster than accessing the Internet this speeds up web browsing significantly.
Content management system
A content management system (CMS) is the software used to create and manage digital content. Usually when we talk of a CMS, we are referring to the software that we use to manage content on a website. Popular examples include WordPress, Drupal, Joomla, and Magento.
This term is often used to refer to objects and identities that exist largely within the communication network itself: a website, for example, might be metaphorically said to “exist in cyberspace.”
The term cybersquatting refers to the practice of registering a third party’s intellectual property as a domain name with the sole intention of approaching them with an offer to sell it to them. The price of the domain name is often much higher than the cost of its purchase. In addition, some cybersquatters attempt to coerce the individual or company into buying the name at the asking price by posting material on the website linked to the domain name, which may either cause them embarrassment (e.g. pornographic images) or, if it is linked to a competitor’s website, financial loss. Cybersquatters sometimes register variants of popular trademarked names, a practice known as typosquatting.
A domain name that has been detagged is no longer hosted on two valid name servers. This stops any services associated with the domain name, for example email or a website from working. A registrar will detag a domain name if they no longer have a relationship with the customer to provide services for that domain name.
The domain name system (DNS) translates domain names into IP addresses. Because domain names are alphabetic they are easier to remember. The Internet is based on IP addresses and every time you use a domain name a DNS service must translate the name into a corresponding IP address. For example, the domain name www.example.co.uk might translate to 22.214.171.124. The DNS system is its own network. If one DNS server does not know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.
DNSSEC stands for Domain Name System Security Extensions. These extensions provide DNS with authentication of responses from DNS servers and thereby aim to prevent DNS spoofing, which is a common technique used by hackers.
All computers on the Internet have their own Internet Protocol (IP) address which consists of numbers. The domain name system connects unique domain names to the IP addresses so users do not have to remember a long string of numbers. Domain names are used in web addresses (http://www.nominet.org.uk) and in email addresses ([email protected]) among other things.
Domain names consist of a varying number of segments. The part on the far right of a domain name, to the right of the dot, is known as a top-level domain (TLD). For example, in the domain name theukdomain.uk the top level domain is .uk.
The part to the left of the top level domain is known as the second-level domain (SLD).
Looking to buy a domain? Get started by visiting our domain name search tool.
This term tends to refer to the purchase of goods and services over the Internet usually with secure connection using e-shopping carts and with electronic payment services, like credit card payment authorisations. Learn more by browsing our e-commerce articles.
Short for Electronic mail, this is a method of composing, sending, storing and receiving messages over electronic communication systems. An email system requires a messaging system that provides the store and forward capability and a mail program that gives you send and receive functions. Sent messages are stored in electronic mailboxes until the recipient fetches them. Interested in learning how you can harness email to grow your business? Browse our email articles to discover how.
Generic Top Level Domain (gTLD)
A Generic Top Level Domain (or gTLD) is a top level domain that is open to customers worldwide. In some cases country code top level domains are often restricted to people located in a particular country or region. Some of the more popular gTLDs include .com, .org and .net.
Header tags are used to define HTML headings. There are 6 header tags available – < h1 > to < h6 >, used to structure headings, with the < h1 > tag being the main title of the page (usually only one per page) and < h2 > to < h6 > tags used for subheadings in order of hierarchy. Search engines also use header tags to understand the topics and structure of the content on a page.
HTML stands for Hypertext Markup Language and is the programming language of the World Wide Web (WWW). HTML software turns a document into a hyperlinked web page. It provides a means to describe the structure of text-based information in a document – by denoting certain text as headings, paragraphs, lists, and so on – and to supplement that text with interactive forms, embedded images, and other objects.
Although many people think that the Internet and the World Wide Web are the same thing, they are actually different. The Internet is a collection of interconnected computer networks, linked by wires, fibre-optic cables and wireless connections. The Web is a collection of interconnected documents and other resources, linked by hyperlinks and URLs. The World Wide Web is accessible via the Internet, as are many other services including email, web pages and file sharing. So they work together to provide our online experience.
Internet Service Provider
An ISP (Internet Service Provider) is a company that provides individuals and other companies with access to the Internet and may also provide other related services such as website building website hosting and sometimes domain name registration.
A private network inside a company or organisation that uses the same kinds of software that you would find on the public Internet, but is only for internal use.
An Internet Protocol (IP) address is a unique numeric identifier used to specify hosts and networks. IP numbers are part of a global, standardised scheme for identifying machines that are connected to the Internet.
Links play a very important role in SEO, helping search engines to gauge the authority of websites. Link juice (also known as link equity or PageRank) refers to the value that can be passed between web pages through hyperlinks. The amount of link juice passed through each link is determined by the number of links on the page, as the total value is shared between each link.
Local SEO is a term used to describe a set of practices that allow websites to optimise pages to target local users by improving their visibility in the local search results. Local SEO works best for businesses with a physical location who service a specific area.
This is the short page description used within search engine result snippets. Search engines typically show the first 150-160 characters of meta descriptions.
A network server that provides a naming or directory service. For example, a Domain Name System (DNS) server might translate the domain name nominet.org.uk to the IP address 126.96.36.199. DNS is the protocol used by Internet name servers.
Before Nominet was formed in 1996, a voluntary Naming Committee was established in the mid-1980s to manage the registration of UK domain names. By the early 1990s commercial Internet suppliers became involved in the Naming Committee and started to register domain names for their customers. It then became clear that the voluntary Naming Committee could no longer cope with the growth in demand for registrations. After a series of meetings about establishing a separate organisation to manage the .uk Top Level Domain, the working model for Nominet was agreed.
Any time you connect two or more computers together so that they can share resources, you have a computer network. Connect two or more networks together and you have an Internet.
Nofollow (also known as the nofollow tag or rel=nofollow) is a link element that can be assigned to the rel attribute of any link in order to prevent value (or link juice) from being passed to the linked page. The nofollow attribute is commonly applied to links in blog comments, which was a common black hat link building technique.
We are the Internet registry for .uk domain names. We manage over ten million domain names making us one of the world’s largest Internet registries. We run the technology which locates a computer on the Internet hosting the website or email system you’re looking for when you type in a web address or send an email to an address that ends in .uk.
Portable Document Format – a file format developed by Adobe Systems for capturing formatted page layouts for distribution. It requires the proprietary software Adobe Acrobat Reader, which is available free. Many of the documents on our website are available to download as PDF files.
URL Redirects are used to redirect users and search engines from one URL to another. A common reason for implementing redirects is when a page moves to a new location. Adding a redirect will prevent users from landing on an error page, as well as passing value across from the old page, helping to prevent a drop in traffic. The most common redirect types are the 301 (permanent) redirect, and the 302 (temporary) redirect. As the names suggest, one should be used when the change in new location is permanent, and the other for a more temporary solution.
A registrar is the retailer, company or organisation that people register their domain name through. This may be an ISP or a domain name reseller or just a company that specialises in registering domain names. We used to refer to registrars as ‘Registration Agents’ or ‘Tag Holders’.. The registrar may be a member of Nominet, but they act on their customer’s behalf rather than our behalf.
An Internet domain name registry receives domain name service (DNS) information into a centralised database and transmits the information in Internet zone files on the Internet so that domain names can be found by users around the world via the world wide web and email. Nominet is the registry for the .uk country code Top Level Domain (ccTLD).
All domain name registrations made through Nominet a need to be renewed ideally before they expire on the anniversary of the registration date. UK domain names can be registered from between 1 and 10 years. If a domain name is not renewed after a period of time these domain names then become available to be registered by others. For more information on renewals please go to Renewing your domain.
This is the term used to describe the process for matching domain names with corresponding Internet Protocol (IP) numbers. ‘Resolution’ is accomplished by name servers that use the data in the Domain Name System to determine which IP numbers correspond to a particular domain name.
The robots.txt file is used to provide instructions to robots when crawling your website. The text file is placed at the root of a domain (example.com/robots.txt) and include details of which pages should be accessed, and which ones should be excluded from the crawl. While robots can ignore the robots.txt file, most search engines respect it, so it’s useful to ensure a website is crawled efficiently. It is also common practice to include the location of the XML sitemap using the ‘Sitemap:’ command.
The root is the top of the Domain Name System (DNS) hierarchy. Often referred to as the ‘dot’.
Second Level Domain (SLD)
In the Domain Name System (DNS) hierarchy, a second-level domain (SLD) is a domain that is directly below a top-level domain (TLD). SLDs commonly indicate the type of organisations that would register domains within them. For example, in the UK Domain Family, the .co SLD is generally for business, .org is for not-for-profit ventures and .me is for individuals.
Search Engine Optimisation (SEO)
SEO is a term used to describe an online marketing discipline covering a wide range of practices that can be followed to help websites gain organic (non-paid) visibility in the search engines. The higher a website is ranked in the search results, the more likely it is to gain clicks, so a well optimised website is more likely to rank better and therefore gain more traffic. Learn to boost your website traffic by browsing our SEO articles or read our beginners guide on SEO tips for new websites to dive right in.
This is a computer on a network that holds the information or provides the service that the user requires. As the name implies, a server serves information to computers that connect to it. When users connect to the server, they can access programs, files and other information from the server.
Site search refers to a search functionality within a website, used to search for content. This may include products for an ecommerce site, or content/topics on a blog. Information about the users’ search queries can be taken from Google Analytics by updating the view setting in the Admin section.
Spam is junk email. Some email clients or servers have spam filters, which try to delete or move the spam messages.
This is the identifying codename that Nominet assigns to a registrar.
For example a registrar Made 2Be An Example Ltd might have the tag MADE2BE.
A list of these tags is available from Nominet. Each Tag is unique so that our computers can recognise the different registrars.
This is the process that is now known as ‘registrar change’.
This is the term previously used for ‘registrar’.
This is the page title used as the link within search engine result snippets, as well as in browser tabs and bookmarks. Search engines typically show the first 50-60 characters of title tags.
Top Level Domain (TLD) is the last part of a domain name, which follows the final dot. For example, in the domain name example.co.uk, the top-level domain is .uk. Nominet is the organisation responsible for managing the .uk top-level domain.
Uniform Resource Locator (URL) is the global address of documents and other resources on the World Wide Web. In short, it’s a web address, like www.theukdomain.uk. If you type it into a web browser, you will reach the website hosted at that address.
User Experience (UX)
User Experience is a term used to describe the overall experience users have on a website. UX can help us to gather data about users to understand how they interact with a website, allowing us to identify distractions and unnecessary steps to improve the user journey.
Not to be confused with the XML sitemap, the user sitemap is a web page containing a list of links to pages on a website, often structured to reflect the hierarchical structure. While the user sitemap is designed to aid users when navigating a website, they have become less commonly used, instead being replaced by site search functionality.
WHOIS is a look-up service that is used to find information about domain names and whether they are available for registration. Nominet’s WHOIS service is located on the website and displays the information we hold about UK domain names that are currently registered.
The WHOIS2 service enables registrars to provide a WHOIS gateway service on their own websites for their customers to query the WHOIS database without being blocked for excessive use.
A wiki is a collection of web pages designed to enable anyone who can access it to contribute or modify content, using a simplified markup language. Wikis are often used to create collaborative websites. Wikipedia, the collaborative encyclopaedia is one of the best-known wikis.
Not to be confused with a user sitemap, the XML sitemap is a file containing a list of all the page URLs available for web crawlers to discover. Other optional information can also be added, such as ‘changefreq’ and ‘lastmod’ (how often a page is updated), and ‘priority’ (how important a page is), which allows crawlers to understand how often content changes and the hierarchy of web pages.
|
<urn:uuid:399b4b64-47d2-49c6-8029-01fdc1572e14>
|
CC-MAIN-2022-49
|
https://theukdomain.uk/glossary/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710409.16/warc/CC-MAIN-20221127141808-20221127171808-00747.warc.gz
|
en
| 0.908088 | 4,270 | 2.5625 | 3 |
The Clean Fuel Partnership’s initiatives focus on assisting transportation fleets to:
- Increase the use of cleaner fuels and alternative fuel vehicles
- Diversify our transportation fuel sources
- Reduce consumption of fuel and emissions by promoting fuel saving technologies and policies.
Read Our Southeast Louisiana Electric Vehicle Readiness Guide!
Download the Guide here
The Southeast Louisiana Electric Vehicle Readiness Guide (pub. January 2022) provides a comprehensive introduction to electric vehicle (EV) technology and how to transition to an electrified transportation system, informed by regional housing, income, and population data. The guide outlines identified barriers for adoption and showcases best practices to help develop strategies that will promote electrification of the region’s transportation systems, greater mobility access, and a cleaner environment – all of which leads to more opportunity for prosperity in Southeast Louisiana for generations to come.
As an accompanying tool to this guide, there is an online regional ArcGIS Mapping Viewer available to help visualize and analyze pertinent regional data that will assist local decision making processes for future electric vehicle charging infrastructure implementation.
|
<urn:uuid:14e6dd68-644b-4698-b90a-e502d4890312>
|
CC-MAIN-2023-23
|
https://www.norpc.org/environment/coalitions/clean-cities/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00664.warc.gz
|
en
| 0.874986 | 219 | 2.515625 | 3 |
History of the ketosis diet
Epilepsy has confounded humanity since its earliest manifestations in the individuals it plagued. Once attributed to supernatural attacks from evil spirits, the disease soon came under the scrutiny of Hippocrates. The Greek were the first to identify the reality of Epilepsy being biological and not spiritual. It was Hippocrates who would use fasting as a means of correcting the disease.
But Hippocrates wasn’t alone. As history unfolded after Hippocrates, other physicians cited fasting as a means for combating Epilepsy. This is what makes the Ketogenic Diet so incredible: it has been developed over centuries of time, and the physicians who were working to find a cure had no idea! Fortunately for the world, they were on the right track, and this track would lead to the Ketogenic Diet breakthrough of the 20th century.
Early in the 20th century, there was a worldwide interest in fasting as a means of treating epilepsy. It peaked when two doctors (Guelpa & Marie) from Paris helped 20 people minimize the effects of their epilepsy and recorded the entire process in a report.
Soon after, the same conclusions were drawn in the US when doctors from multiple fields used fasting to improve their patients’ situations. But we know that while fasting is a temporary cure, it’s unsustainable.
For more information here is our book:
|
<urn:uuid:ddedfe14-b29f-44cf-a41d-52a4f3940698>
|
CC-MAIN-2020-40
|
https://twk-publishing.com/history-of-the-ketosis-diet/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400212039.16/warc/CC-MAIN-20200923175652-20200923205652-00497.warc.gz
|
en
| 0.977283 | 279 | 3.15625 | 3 |
Updated and Expanded CAL SIOP Professional Development Manual Now Available
Using the SIOP Model: Professional Development Manual for Sheltered Instruction, 2nd Edition
CALís new and enhanced edition of our SIOP professional development manual is designed to assist teacher educators, staff developers, and leaders at the school, district, and state levels as they prepare teachers of English language learners to use the Sheltered Instruction Observation Protocol (SIOP) Model or its adapted version, the Two-Way SIOP Model.
As teachers work with professional developers in workshops, they learn about language and content objectives, meaningful activities, ways to teach and emphasize key vocabulary, techniques to make information comprehensible, and essential concepts for effective SIOP instruction.
The new manual includes
- Background information on SIOP components for SIOP facilitators.
- Updated information on ongoing SIOP Model research.
- Workshop sessions that include strategies, activities, and tools to help teachers implement the SIOP instructional model.
- Guidance on how to plan and implement SIOP Model professional development sessions, including content and language objectives, workshop activities, copies of participant handouts, PowerPoint slides, and suggested assignments for participants to complete between workshop sessions.
- Descriptions of approaches to ongoing SIOP professional development and development of effective SIOP lesson plans.
- Information on how to move teachers to higher levels of SIOP Model implementation once they are introduced to the Model.
- CD-ROM with all of the PowerPoint slides and handouts used in the professional development sessions.
Order online at the CAL Store.
|
<urn:uuid:87cf829d-78bb-4632-9f1e-6722d6dcc2c4>
|
CC-MAIN-2014-41
|
http://www.cal.org/siop/bulletin/archive/january-2012-special-edition.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663611.15/warc/CC-MAIN-20140930004103-00245-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.873338 | 318 | 2.546875 | 3 |
The Ethical, Legal and Social Implications (ELSI) Working Group was established for the development of the ELSI component of the Human Genome Project. The Ethical, Legal, and Social Implications (ELSI) program was founded in as an integral part of the Human Genome Project. The mission of the ELSI. ELSI grants also fund education in the science and the social implications of the genome project. A joint NIH-DOE working group has been established.
|Country:||Saint Kitts and Nevis|
|Published (Last):||22 January 2016|
|PDF File Size:||17.72 Mb|
|ePub File Size:||10.3 Mb|
|Price:||Free* [*Free Regsitration Required]|
Genome-wide association studies GWAS are used to analyze genetic differences between people with specific illnesses and healthy individuals.
Genetic research issue s – this area focuses on ethical issues such as “informed consent” written permission from the person being projeft and analyses genetic researchers’ aims, methods, and reports of their results. Among other topics, this guide covers gene patenting.
Genetic testing of adults, children and foetuses – the different methods of genetic testing for each type of individual raises different questions, such as “do parents have a right to screen a child for a disease if the result may affect ellsi child’s mental well-being?
Jan 25, 5: Ethical issues concern what is morally correct and good in the world, legal issues talk about how the law should protect the public’s rights and social issues outline how ALL of society will be affected by events.
The Human Genome Project – What are the consequences?
Psychological issues – those specifically associated with being diagnosed with a particular gene The purpose of GWAS is twofold: Explore the connection between specific genes genotype and their eli expression phenotype 2. Priject and equality of genetic data – this program looks into what prroject genetic information means as well as stopping information abuse or misinterpretation.
Help identify genetic risk factors for the development or progression of specific illnesses. ELSI of Genome Research This guide provides resources that will help the user understand the ethical, legal, and social implications ELSI of genome research–research into the genomes of humans, plants, and other organisms. Privacy of genetic information – it is unjust oc medics e. Genetic Variation – Self-perception and society’s perception of individuals based on genetic differences Genetic Privacy – Ownership and control of genetic information; use of genetic information by insurers or employers Gene Patenting – Effect of patenting of DNA sequences on accessibility of data and materials Genes and Illness – Individual susceptibility to specific illnesses, such as cancer Genetically Modified Organisms – Safety of genetically modified foods.
As long as the HGP information is being used in medical applications, ELSI will continue to play a large part in preparing that information with guidelines for use on the public and how to prevent abuse of that knowledge. New techniques in medicine – this looks at the effects of genetic testing on individuals, families and reports the latest results to medical services.
These potential ethical problems included: Is it possible to own something that is gejome in all humans – is a gene present in an individual theirs or does it belong to the person who discovered it? Does “improving” someone’s life include disease symptom reduction or cosmetic improvement e. Examples of topics that fall under such ELSI programs include: The purpose of GWAS is twofold:. Fairness in its use by the public – schools, employers and insurance companies must be sensitive to the genetic information humzn must not unfairly judge individuals based on their genetic status.
Ethical, Legal, and Social Implications (ELSI) of Genome Research: ELSI of Genome Research
This is called “genetic discrimination”. Examples of topics that fall under such ELSI programs include:. Home What is Genomics? Gene patenting – the issues surrounding the legal procedure of claiming “ownership” of a particular gene or region of DNA.
The HGP is often called the cure for many genetic diseases, because now they can use its information for treatment in medical care. However, there are many questions raised about the information it produces, such as Education – this provides ordinary people with knowledge on genetics and relates ELSI issues to health professionals, policy makers and the general public.
This program ensured that potential ethical problems could be resolved as early as possible, before the information was placed into medical applications.
Search this Guide Search. Explore the connection between specific genes genotype and their outward expression phenotype.
|
<urn:uuid:142280ee-e6ff-4286-978d-2f258a14a2be>
|
CC-MAIN-2021-10
|
https://eyetube.me/elsi-of-human-genome-project-45/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178367790.67/warc/CC-MAIN-20210303200206-20210303230206-00280.warc.gz
|
en
| 0.926206 | 982 | 3.125 | 3 |
We rely on farmers daily for our food, but did you know there are lots of other everyday items that come from the farm? As you begin to fill your backpacks for the new school year, consider how common crops contribute to school supplies:
One acre of soybeans can create more than 82,000 crayons. Corn byproducts also help crayons keep their shape and allow the labels stay in place while you work your imagination on the page.
One tree makes approximately 170,000 pencils.
Don’t let its nickname “pigskin” fool you: Modern leather footballs are made from cowhide. Just one cowhide can make 20 footballs.
Expect some horsing around in music class – if you play violin, bows are made with hair from a horse’s tail.
A single bale of cotton can make 215 pairs of jeans. For the rich blue color of jeans, you can thank the indigo plant. Some denim companies today still use dye from indigo plants.
Soybeans play a role every time you crack open a book. Soy ink is used to print textbooks.
|
<urn:uuid:a8acdedc-4673-45b9-814f-2025c7c0eea0>
|
CC-MAIN-2018-39
|
https://www.farmflavor.com/us-agriculture/from-the-farm-to-the-classroom/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155924.5/warc/CC-MAIN-20180919043926-20180919063926-00518.warc.gz
|
en
| 0.929022 | 236 | 2.96875 | 3 |
Web Sends Message
An anti-smoking program directed at teenagers is going high-tech to take its message beyond billboards and television spots.
The program hopes to reach high school students through a Web site loaded with animation, streaming video, music, and other multimedia.
Sixteen Houston public high schools have piloted the doctor-created program, called Project ASPIRE (A Smoking Prevention Interactive Experience), for two years. Preliminary results show that 2 percent of the students who used the program started smoking within 18 months, compared with 6 percent of their peers who had received only a self-help smoking-prevention booklet, said Dr. Alexandre V. Prokhorov, the lead researcher for the study and a professor in the behavioral-science department at the M.D. Anderson Cancer Center’s School of Health Sciences at the University of Texas at Houston.
“We tried to make this [Web site] as teen-friendly as possible,” he said. “It’s really interactive.”
The site, www.mdanderson. org/departments/aspire, can be integrated into health education classes. It features an animated teenage host and video-game-like components, shows video interviews of teenagers who have quit or are trying to quit smoking, and offers ways to combat withdrawal symptoms and deal with stress, which can trigger a desire to smoke—all set to a pulsating backbeat.
The Web site also gives smoking-related statistics that may interest young people. For instance, cigarettes made out of organic tobacco, which some teenagers think of as a healthy alternative, actually contain as much as, or even more, tar and nicotine as non-organic cigarettes, according to the American Lung Association.
Tobacco use among high school students has dropped in recent years, from 34.5 percent in 2000 to 28.4 percent in 2002, according to the federal Centers for Disease Control and Prevention, in Atlanta.
The Web site, curriculum, and research study was financed by a $2.8 million grant from the National Cancer Institute and a $75,000 grant from the George and Barbara Bush Endowment for Innovative Cancer Research.
Vol. 24, Issue 41, Page 8Published in Print: June 22, 2005, as Web Sends Message
|
<urn:uuid:b781087f-7003-4805-9f97-96343ae302f0>
|
CC-MAIN-2020-05
|
https://www.edweek.org/ew/articles/2005/06/22/41techcol.h24.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251687725.76/warc/CC-MAIN-20200126043644-20200126073644-00270.warc.gz
|
en
| 0.959058 | 472 | 2.78125 | 3 |
Assembling the puzzles of quantum materials is, in some ways, like dipping a wire hanger into a vat of soapy water, says CIFAR (Canadian Institute for Advanced Research) Fellow Joseph Thywissen (University of Toronto).
Long before mathematical equations could explain the shapes and angles in the soap foams, mathematicians conjectured that soap films naturally found the geometry that minimized surface area, thus solving the problem of minimal surfaces. They could be created simply by blowing soap bubbles.
At the University of Toronto's Ultracold Atoms Lab, Thywissen and his team strive to answer what he calls "soap bubble" questions—deep mysteries of the enigmatic quantum materials world that simulations can help us solve. Since the electrons within quantum materials, such as superconductors, zoom far too quickly for careful observation, Thywissen's team uses ultracold gases instead, in this way simulating one quantum system with another, more easily studied, quantum system.
"Simulation gives you the answers but not the theory behind them," says Thywissen.
Thywissen's lab has revealed some of these answers in a new paper about the magnetism and diffusion of atoms in ultracold gases, published in the journal Science. The researchers optically trapped a cloud of gas a billion times colder than air in a very low-pressure vacuum.
They oriented the ultracold atoms, which behave like microscopic magnets, to make them all point in the same direction in space, then manipulated the spins with an effect that's regularly used in hospitals for MRIs, called a spin echo.
Twisting up the direction into a corkscrew pattern and then untwisting it, they measured the strength of interactions between atoms. They observed that at first the atoms did not interact, but one millisecond later they were strongly interacting and correlated.
This rapid change suggested that something was happening to alter the atoms' magnetism as the process unfolded.
"The Pauli Principle forbids identical ultracold atoms from interacting, so we knew something was scrambling the spins at a microscopic level," Thywissen says.
What was happening, the researchers learned next, was diffusion—the same process that takes place when the smell of perfume fills the air of a room, for example.
"If I open a bottle of perfume in the front of the room, it takes a little while for those particles to diffuse to the back of the room," Thywissen says. "They bump into other particles on the way, but eventually get there. You can imagine that the more particles bump into each other, the slower diffusion occurs."
Cranking up interactions to their maximum allowed level, the Toronto team tried to see how slow diffusion could be. They lowered temperature below a millionth of a degree above absolute zero. You might guess that the speed of diffusion would eventually reach zero, but instead the experiment found a lower limit to diffusion.
"Whereas cars on the freeway need to drive below the speed limit, strongly interacting spins need to diffuse above a quantum speed limit," Thywissen says.
Ultracold atoms are just one of a larger family of strongly interacting materials, that also include superconductors and magnetic materials. Thywissen is a member of the CIFAR Quantum Materials program, which is developing an understanding of these materials' novel properties. Cold atoms offer a promising way to explore the mystery of how electrons self-organize to exhibit unusual and valuable properties, such as superconductivity. Quantum materials contain mysteries that have challenged physicists for decades.
"Our measurements imply a diffusivity bound whose mathematical simplicity is exciting: it hints at a universal principle about spin transport, waiting to be uncovered," he says.
Thywissen says CIFAR's support helped make this successful experiment possible.
"CIFAR enabled me to assemble a world-class team."
Explore further: Ground-breaking insights into quantum chaos in ultracold gas
"Transverse Demagnetization Dynamics of a Unitary Fermi Gas," Science, 2014.
|
<urn:uuid:7d834f68-8428-44f0-9970-1be485b68f90>
|
CC-MAIN-2018-13
|
https://phys.org/news/2014-05-quantum-simulator-clues-magnetism.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645280.4/warc/CC-MAIN-20180317174935-20180317194935-00367.warc.gz
|
en
| 0.934932 | 842 | 3.1875 | 3 |
Donald Rumsfeld (9 July 1932 – 29 June 2021) was the 21st United States Secretary of Defense, serving from 2001 to 2006, succeeded by Robert Gates. He also served as the 13th Defense Secretary in 1975–1977 under President Ford, and in other roles under various presidents.
- It's a difficult thing today to be informed about our government even without all the secrecy.
- As quoted in The Chicago Tribune (13 April 1966)
- Congress, the press, and the bureaucracy too often focus on how much money or effort is spent, rather than whether the money or effort actually achieves the announced goal.
- "Rumsfeld's Rules" January 12, 1974
- It is easier to get into something than to get out of it.
- Rumsfeld's Rules" January 12, 1974
- Be able to resign. It will improve your value to the President and do wonders for your performance.
- "Rumsfeld's Rules" January 12, 1974
- This war [in Vietnam] has been marked by so many lies and evasions... that it is not right to have the war end with one last lie.
- In April 1975, as quoted in "How 'Vice' Explains Trump's Appeal" (6 January 2019), by Matt Latimer, POLITICO
- Pearl Harbor Post-Mortem:
In some future hearing, I am going to say that I do not want to be sitting before this panel in a modern day version of a Pearl Harbor post-mortem as to who didn't do what, when, where and why. None of us would want to have to be back here going through that agony.
- Donald Rumsfeld's Unclassified Memo — July 23, 2001
- Reports that say that something hasn't happened are always interesting to me, because as we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns — the ones we don't know we don't know. And if one looks throughout the history of our country and other free countries, it is the latter category that tend to be the difficult ones.
- The absence of evidence is not evidence of absence, or vice versa.
- Department of Defense news briefing (12 February 2002)
- Now what is the message there? The message is that there are no "knowns." There are things we know that we know. There are known unknowns. That is to say there are things that we now know we don't know. But there are also unknown unknowns. There are things we do not know we don't know. So when we do the best we can and we pull all this information together, and we then say well that's basically what we see as the situation, that is really only the known knowns and the known unknowns. And each year, we discover a few more of those unknown unknowns.
- It sounds like a riddle. It isn't a riddle. It is a very serious, important matter.
- There's another way to phrase that and that is that the absence of evidence is not evidence of absence. It is basically saying the same thing in a different way. Simply because you do not have evidence that something exists does not mean that you have evidence that it doesn't exist. And yet almost always, when we make our threat assessments, when we look at the world, we end up basing it on the first two pieces of that puzzle, rather than all three.
- Extending on his earlier comments in a press conference at NATO Headquarters, Brussels, Belgium (6 June 2002)
- I can't tell you if the use of force in Iraq today would last five days, or five weeks, or five months, but it certainly isn't going to last any longer than that.
- And it is not knowable if force will be used, but if it is to be used, it is not knowable how long that conflict would last. It could last, you know, six days, six weeks. I doubt six months.
- Then there are three or four countries that have said they won't do anything. I believe Libya, Cuba and Germany are ones that have indicated they won't help in any respect.
- Now, you're thinking of Europe as Germany and France. I don't. I think that's old Europe.
- I picked up a newspaper today and I couldn't believe it. I read eight headlines that talked about chaos, violence, unrest. And it just was Henny Penny -- "The sky is falling." I've never seen anything like it! And here is a country that's being liberated, here are people who are going from being repressed and held under the thumb of a vicious dictator, and they're free. And all this newspaper could do, with eight or 10 headlines, they showed a man bleeding, a civilian, who they claimed we had shot —one thing after another.
From the very beginning, we were convinced that we would succeed, and that means that that regime would end. And we were convinced that as we went from the end of that regime to something other than that regime, there would be a period of transition. And, you cannot do everything instantaneously; it's never been done, everything instantaneously. We did, however, recognize that there was at least a chance of catastrophic success, if you will, to reverse the phrase, that you could in a given place or places have a victory that occurred well before reasonable people might have expected it, and that we needed to be ready for that; we needed to be ready with medicine, with food, with water. And, we have been.
Freedom's untidy, and free people are free to make mistakes and commit crimes and do bad things. They're also free to live their lives and do wonderful things. And that's what's going to happen here.
- I don't believe anyone that I know in the administration ever said that Iraq had nuclear weapons.
- At a hearing of the Senate's appropriations subcommittee on defense (14 May 2003)
- You and a few other critics are the only people I've heard use the phrase immediate threat. I didn't, the president didn't. And it's become kind of folklore that that's what's happened.
- CBS Face the Nation (14 March 2004); in response Thomas Friedman quoted his previous statement from a hearing before the House Armed Services Committee (10 September 2002):
- But no terrorist state poses a greater or more immediate threat to the security of our people and the stability of the world than the regime of Saddam Hussein in Iraq.
- I'm not into this detail stuff. I'm more concepty.
- Look at me! I'm sweet and lovable!
- http://www.defenselink.mil/Transcripts/Transcript.aspx?TranscriptID=3516 Foreign Press Center (21 June 2002)]
- [ Osama bin Laden is] either alive and well or alive and not too well or not alive.
- DoD News Briefing October 07, 2002
- I stand for 8-10 hours a day. Why is standing limited to four hours?
- Written on a memo in reference to the treatment of Guantanamo prisoner and to the way he worked in his office as Secretary of Defense, 2002. Reported in The Washington Post, 24 June 2004.
- We're so conditioned as a people to think that a military campaign has to be cruise missiles and television images of airplanes dropping bombs, and that's just false. This is a totally different war. We need a new vocabulary. We need to get rid of old think and start thinking about this thing the way it really is.
- on CBS' Evening News, October 9, 2001
- We know where they [Iraq's WMD] are. They're in the area around Tikrit and Baghdad and east, west, south, and north somewhat....I would also add, we saw from the air that there were dozens of trucks that went into that facility after the existence of it became public in the press and they moved things out. They dispersed them and took them away. So there may be nothing left. I don't know that. But it's way too soon to know. The exploitation is just starting.
- I didn't advocate invasion...I wasn't asked.
- ...it seems to me that it's up to all of us to try to tell the truth, to say what we know, to say what we don't know, and recognize that we're dealing with people that are perfectly willing to, to lie to the world to attempt to further their case and to the extent people lie of, ultimately they are caught lying and they lose their credibility and one would think it wouldn't take very long for that to happen dealing with people like this.
- From the 2004 documentary film Control Room
- As you know, you go to war with the army you have, not the army you might want or wish to have at a later time. Since the Iraq conflict began, the Army has been pressing ahead to produce the armor necessary at a rate that they believe -- it's a greatly expanded rate from what existed previously, but a rate that they believe is the rate that is all that can be accomplished at this moment.
- "Troops put Rumsfeld in the hot seat". CNN. 2004-12-08. Retrieved on 2006-04-07.
- Responding to the question "Now why do we soldiers have to dig through local landfills for pieces of scrap metal and compromised ballistic glass to up armor our vehicles, and why don't we have those resources readily available to us?"
- I shouldn't get into ... this is diplomacy, and I don't do diplomacy.
- We do have a saying in America: if you're in a hole, stop digging ..... erm, I'm not sure I should have said that.
- What we are seeing is not the war in Iraq. What we're seeing is slices of the war in Iraq.
- Well, so be it. Nothing's perfect in life, so you have an election that's not quite perfect. Is it better than not having an election? You bet.
- Regards upcoming elections in Iraq, January 14, 2005.
- It recalls to mind the statement by Winston Churchill, something to the effect that: I have benefited greatly from criticism, and at no time have I suffered a lack thereof.
- During the Nomination of Robert Gates for the next U.S. Secretary of Defense, November 8, 2006
- It is pretty clear that the coalition can win in Afghanistan and Iraq in one way or another, but it will be a long, hard slog.
- referring to the ongoing War on Terrorism
- Those who follow orders to commit such crimes will be found and they will be punished. War crimes will be prosecuted. And it will be no excuse to say, 'I was just following orders.' Any official involved in such crimes will forfeit hope of amnesty or leniency with respect to past action.
- Pentagon briefing, March 20, 2003
- Oh, Lord. I didn't mean to say anything quotable.
- Interview with Associated Press Friday, September 7, 2001
- Let's hear it for the essential daily briefing, however hollow and empty it might be. We'll do it.
- Meeting with Media Pool Bureau Chiefs October 18, 2001
- There will be good moments, and there will be less good moments.
- April 7, 2004, in reference to the 2004 spring uprising in Iraq
- I don't know what the facts are but somebody's certainly going to sit down with him and find out what he knows that they may not know, and make sure he knows what they know that he may not know, and that's a good thing.
- Pieces of intelligence, scraps of intelligence...you run down leads and you run down leads, and you hope that sometimes it works.
- DoD News Briefing May 01, 2002
- And there is, I am certain, among the Iraqi people a respect for the care and the precision that went into the bombing campaign.
- DoD News Briefing April 09, 2003
- Stuff happens.
- DoD News Briefing on the issue of looting and chaos in Baghdad, Saturday, April 11, 2003
- I suppose the implication of that is the president and the vice president and myself and Colin Powell just fell off a turnip truck to take these jobs.
Bureaucracy to Battlefield: 9/10 Speech, (September 10, 2001)Edit
- The topic today is an adversary that poses a threat, a serious threat, to the security of the United States of America. This adversary is one of the world's last bastions of central planning. The adversary is closer to home. It's the Pentagon bureaucracy. Not the people, but the processes. Not the civilians, but the systems. Not the men and women in uniform, but the uniformity of thought and action that we too often impose on them.
- The technology revolution has transformed organizations across the private sector, but not ours, not fully, not yet. We are, as they say, tangled in our anchor chain. Our financial systems are decades old. According to some estimates, we cannot track $2.3 trillion in transactions. We cannot share information from floor to floor in this building because it's stored on dozens of technological systems that are inaccessible or incompatible. To that end, we're announcing today a series of steps the Department of Defense will take to shift our focus and our resources from bureaucracy to battlefield, from tail to tooth.
- Some might ask, how in the world could the Secretary of Defense attack the Pentagon in front of its people? To them I reply, Today, I have no desire to attack the Pentagon; I want to liberate it. We need to save it from itself.
- A new idea ignored may be the next threat overlooked. A person employed in a redundant task is one who could be countering terrorism or nuclear proliferation.
- But keep in mind the story about the donkey, the burro, and the ass. The man and the boy were walking down the street with the donkey and people looked and laughed at them and said, "Isn't that foolish—they have a donkey and no one rides it." So the man said to the boy, "Get on the donkey; we don't want those people to think we're foolish." So they went down the road and people looked at the boy on the donkey and the man walking alongside -- "Isn't that terrible, that young boy is riding the donkey and the man's walking." So they changed places, went down the road, people looked and said, "Isn't that terrible, that strong man is up there on the donkey and making the little boy walk." So they both got up on the donkey, the donkey became exhausted, came to a bridge, fell in the river and drowned. And of course the moral of the story is, if you try to please everybody, you're going to lose your donkey.
- It's about professionalism, and it's also about our respect for ourselves, about how we feel about seeing GAO reports describing waste and mismanagement and money down a rat hole. We need your help. I ask for your help. I thank all of you who are already helping. I have confidence that we can do it. It's going to be hard. There will be rough times. But it's also the best part of life to be engaged in doing something worthwhile.
- After he saw what happened to Saddam Hussein, he (Gaddafi) did not want to be Saddam Hussein. He gave up his nuclear program.
- Rumsfeld doesn't support sending U.S. troops into Libya March 9, 2011.
- The natural state of man is to want to be free. To have opportunities. To have choices.
- And the only way there's going to be followers, is if the leader is doing things that have merit, that are persuasive to others. Why else would someone follow somebody if they didn't think the individual was doing something worthwhile, going in the right direction?
- As quoted in "My Date With Rummy: Now 84, The Former Secretary Of Defense Is As Wily As Ever" (12 June 2017), by Adam Linehan, Task & Purpose
Quotes about RumsfeldEdit
- Cheney and Rumsfeld were inveterate schemers whose cynicism about going to war was exceeded only by their ineptitude in conducting it.
- Jacob Heilbrunn, "Why the United States Invaded Iraq" New York Times (28 July 2020)
- He's a ruthless little bastard. You can be sure of that.
- In the Vietnam War, the leaders of the White House claimed at the time that it was a necessary and crucial war, and during it, Donald Rumsfeld and his aides murdered two million villagers. And when Kennedy took over the presidency and deviated from the general line of policy drawn up for the White House and wanted to stop this unjust war, that angered the owners of the major corporations who were benefiting from its continuation. And so Kennedy was killed, and al-Qaida wasn't present at that time, but rather, those corporations were the primary beneficiary from his killing. And the war continued after that for approximately one decade. But after it became clear to you that it was an unjust and unnecessary war, you made one of your greatest mistakes, in that you neither brought to account nor punished those who waged this war, not even the most violent of its murderers, Rumsfeld.
- We are paying a very heavy price for the mismanagement — that's the kindest word I can give you — of Donald Rumsfeld, of this war. The price is very, very heavy and I regret it enormously. I think that Donald Rumsfeld will go down in history as one of the worst secretaries of defense in history.
- Here's what I can tell you about Don Rumsfeld. You're never going to get any credit. And you'll only know how well you're doing if he gives you more work. If that happens, you're doing fine.
- Rumsfeld told a group of senior Pentagon aides, “I never again want our army to arrive somewhere and meet the CIA on the ground.” To a gathering of top generals in “the tank,” the Joint Chiefs' secure conference room, he was even more succinct: “Every CIA success,” he told them, “is a DoD failure.”
- Ron Suskind, The One Percent Doctrine (2006)
- The Donald Rumsfeld "Library of Quotations" from Broadcasting House, a BBC Radio 4 current affairs show which used to run a "Donald Rumsfeld soundbite of the week".
- Other quotes from Slate.
- That's Life: The poetry of Donald Rumsfeld, Volume 2.
- Timeline of monthly quotes on the buildup of Iraqi security forces
|
<urn:uuid:b47e857a-e05f-4774-ad5c-001f48ede8f9>
|
CC-MAIN-2021-31
|
https://en.m.wikiquote.org/wiki/Donald_Rumsfeld
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154805.72/warc/CC-MAIN-20210804111738-20210804141738-00573.warc.gz
|
en
| 0.976438 | 3,976 | 2.890625 | 3 |
Introduction to Lighting
Properties of Light
-Hard Light/Soft Light
-Redheads & Blondes
-HMIs & Halogens
Three Point Lighting
-Natural Light, Bouncing
Appendix: Depth Perception
--Relative Size, Interposition
--Clarity, Motion, Light & Shadow
--Texture Gradient, Linear Perspective
About Phillips Mcintosh
“The best designers sometimes disregard the principles of design. When they do so, however, there is usually some compensating merit attained at the cost of the violation. Unless you are certain of doing as well, it is best to abide by the principles.”
-Lidwell, Holden & Butler. Universal Principles of Design. Paraphrasing William Strunk Jr.
An attractive style is created by flaunting the rules. To flaunt the rules, you must first know them. This book is written to give a brief introduction to some of the most basic rules of lighting for Film, TV and video production. As a student advances, they learn which rules can be bent and which rules can be broken, but they always remember that the rules exist because they provide consistent results in the ideal situation.
Copyright 2012-13. All rights reserved
|
<urn:uuid:e1ed61b4-6631-4507-aa81-74b957f3b39f>
|
CC-MAIN-2016-50
|
http://www.phillipsmcintosh.com/lighting/how-to-light-video-foreword.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542693.41/warc/CC-MAIN-20161202170902-00394-ip-10-31-129-80.ec2.internal.warc.gz
|
en
| 0.87128 | 253 | 2.59375 | 3 |
Everyone knows that world oil production has been running between 88 and 89 million barrels per day (mbpd) this year because government, industry and media sources tell us so. As it turns out, what everyone knows is wrong.
It's wrong not because the range quoted above can't be found in official sources. It's wrong because the numbers include things which are not oil such as natural gas plant liquids and biofuels. If you strip these other things out, then world oil production has been running around 75 mbpd this year. The main thing you need to know about the worldwide rate of production of crude oil alone is that it has been stuck between 71 and 75 mbpd since 2005 (calculated on a monthly basis). And, that has already had huge negative effects on the world economy and world society through high energy prices that are partly responsible for our current economic stagnation.
But because natural gas plant liquids production has been growing rather rapidly due to recent intensive drilling for natural gas and because those liquids are misleadingly lumped in with oil supplies, people have been mistakenly given the impression that world oil production continues to grow. Not true! What's growing is a category called "total liquids" which encompasses oil, natural gas plant liquids, biofuels and some other minor fuels. Total liquids are growing only because of large gains in natural gas plant liquids and minor gains in biofuels. And, this is why it is so important to understand what natural gas plant liquids are.
But first, an important question. Why do government and industry officials, oil analysts, and energy reporters equate total liquids and total oil supply? They claim that these other liquids are essentially interchangeable with oil. (I will discuss some of the not-so-savory motives behind this claim later.) In a recent report the U.S. Energy Information Administration put it this way: "The term 'liquid fuels' encompasses petroleum and petroleum products and close substitutes, including crude oil, lease condensate, natural gas plant liquids, biofuels, coal-to-liquids, gas-to-liquids, and refinery processing gains." Let's see why the "close substitutes" assumption is demonstrably false when it comes to most natural gas plant liquids and decidedly disingenuous when it comes to biofuels.
First, crude oil is what you think it is. It's a black, hydrocarbon-rich liquid that comes out of underground reservoirs. It can also be made synthetically from other hydrocarbons such as the bitumen found in the Canadian tar sands. Oil also includes something called lease condensate which refers to the light hydrocarbons that often occur in oil reservoirs. They are gaseous in the high-temperature environment of the reservoir, but condense to liquids when they escape the wellbore and are captured by special equipment located on the oil lease. These condensates become part of the crude oil stream. They are highly prized because of the ease in refining them, though they make only a small contribution to world oil supplies.
But what are natural gas plant liquids and are they good substitutes for oil? Unfortunately, confusion reigns because a very similar but more inclusive term, natural gas liquids or NGL, includes lease condensate, already discussed above and which we know is included in the crude oil stream. Usually, when people refer to NGL, what they really mean is natural gas plant liquids (NGPL).
NGPL are hydrocarbons other than methane that are separated from raw natural gas at a processing plant. They include ethane, propane, butane and pentane. The amounts vary. For example, raw natural gas extracted off the coast of Malaysia contains 11 percent ethane, 5 percent propane, 2 percent butane and about 2 percent of something called natural gasoline or drip gas, a low-octane fuel that is used today primarily as a solvent. Raw natural gas from the North Slope of Alaska contains a higher percentage of methane and correspondingly smaller percentages of ethane (7 percent), propane (4 percent), butane (1 percent) and other components including carbon dioxide and pentanes (2 percent). In these two cases you can see that ethane makes up about half of the NGPL, propane makes up about a quarter, butane makes up 10 percent of Malaysian NGPL and 7 percent of Alaskan slope NGPL.
So what is ethane used for? It's major use is as feedstock for the production of ethylene, one of the most widely used chemicals. Polyethylene is the world's most widely used plastic and found in such things as packaging film and trash bags. Other processes turn ethylene into automotive antifreeze. Yet others turn it into polystyrene which is used in insulation and packaging. Some ethane remains in the natural gas piped to our homes and factories, but not much. So far, it's hard to see how ethane, the most plentiful of the NGPLs, is a good substitute for petroleum-based liquid fuel products.
How about propane? Everyone is familiar with propane use in backyard barbeques and camping stoves. It's also used to heat rural homes. In addition, the Green Truck Association reports that there are 270,000 propane-powered vehicles in the United States. That's about one-tenth of one percent of the roughly 250 million vehicles registered in the country. Some claim that 17.5 million vehicles worldwide run on propane. If true, that would be about 1.7 percent of the billion vehicle worldwide fleet. Yes, propane is a viable substitute for petroleum-based fuels in transportation. But a lot more vehicles would have to be converted to propane for that substitution to be meaningful. And, then there is a ceiling on how much propane could actually be made available because as we've seen, it makes up only 4 to 5 percent of all raw natural gas production.
To the extent that propane displaces heating oil, it is a good substitute for oil. But again, limits on its production prevent it from being a panacea. Of course, natural gas itself is often a substitute for heating oil, especially given its comparatively low cost. So there can be a limited substitution effect where natural gas infrastructure is feasible.
How about butane? Everyone recognizes butane as the fuel for butane lighters. When it is mixed with propane, it is called liquified petroleum gas or LPG which is used for space heating. It's also used as a propellant in aerosol sprays. But no one can put butane into a vehicle. It's not a suitable liquid fuel for transportation. I suppose one could say that we'd have to use petroleum to make lighters if we didn't have butane. I'm not sure that's a good start for making intelligent energy policy based on the central role of oil in global civilization.
Pentanes have industrial and laboratory uses, but aren't used as liquid fuel.
The case for lumping NGPL with oil supply is not very strong. In fact, given that little substitution is possible and the growth in the substitutes that are available is limited, the merging of NGPL with oil seems more like a face-saving gesture on the part of those who have consistently been wrong on oil supplies and prices in the last decade. And, it seems to be a move of desperation by an industry that has been having trouble in recent years replacing its oil reserves. If investors caught on to the idea that oil companies are now essentially self-liquidating enterprises, valuations would be cut drastically. And that, of course, means that stock options and stock holdings for top executives would be devastated as would positions held by big investors.
NGPL currently constitutes about 9 mbpd of so-called total liquids. Biofuels, some coal-to-liquids, and a tiny amount of (natural) gas-to-liquids constitute another 2 mbpd. Turning coal into liquid fuels for vehicles is now done mostly in South Africa, a holdover from the days of apartheid when the South African government feared an oil embargo could leave the country without fuel for transportation. Turning coal into gasoline and diesel is extremely dirty and extremely expensive. But South Africa paid for the equipment to do so long ago and now must simply pay for domestic coal to supply its coal-to-liquids refineries. Only a relatively small amount of natural gas is currently being turned chemically into liquid fuels, mostly diesel. The process is capital intensive and expensive, and thought to be suitable for converting natural gas that might otherwise be flared.
As for biofuels, America is already approaching the current limit of its ability to absorb the supply of ethanol. Most cars can only run with a 10 percent mixture. Above that engine parts in the vast majority of vehicles start to degrade. Of course, we could continue to increase the ability of automobiles to burn ethanol. But the scale problem is the deciding factor. In North America it would take 1.8 billion acres to grow enough corn to supply enough ethanol to run the North American vehicle fleet. That's four and one-half times the amount of arable land available. And besides, corn ethanol takes more energy to produce than it provides. It's not an energy source so much as an energy carrier. Similar limitations apply to biodiesel which is made from vegetable oil.
The remaining volume of total liquids production, about 2 mbpd, is what is called refinery gain. Simply put, the total volume of crude oil increases once it is separated into its various fractions. This is not a source of oil so much as a consequence of spending energy to refine it.
Even when non-oil products are considered, total liquids have barely budged, up just 3.5 percent for the entire period from 2005 to 2011. Even if these liquids were interchangeable with oil, they would be making very little headway in substituting for it.
But because few of the non-oil products now being lumped in with oil supplies are genuine substitutes and the ones that are have serious limitations on the volume they could provide, we should consider the truth about oil. Its supply is stagnant which accounts for the record prices of recent years. And, the promise that high prices would bring on copious new supplies has proven to be nothing more than wishful thinking.
The limitations on oil supplies are now upon us. The salient issue is the rate of production, not the supposedly huge resources that optimists may conjure up in their imaginations. How much oil you can get out out of the ground on a daily basis is what counts, and it's getting harder and harder to extract the amount of oil we desire from the Earth's crust each day. We extracted the easy stuff first. We cannot now expect to extract the difficult stuff at the same high rates as the easy stuff. And, we cannot expect that total percentage recoveries from the smaller, more complex and challenging reservoirs which we are now forced to exploit will be as high as those we've gotten from large, simple, straightforward reservoirs in the past.
Facing up to this reality will be difficult because it will require so many changes in our thinking and our society. And, it would require the immediate markdown of the value of one of the world's largest and most powerful industries because it now faces contraction in the not-too-distant future. No wonder the powers that be decided to change the definition oil instead of accepting reality.
Kurt Cobb is the author of the peak-oil-themed thriller, Prelude, and a columnist for the Paris-based science news site Scitizen. His work has also been featured on Energy Bulletin, The Oil Drum, 321energy, Common Dreams, Le Monde Diplomatique, EV World, and many other sites. He maintains a blog called Resource Insights.
|
<urn:uuid:0d1ccf22-3e23-46f5-8f26-7c320b7bf3a6>
|
CC-MAIN-2016-36
|
http://resourceinsights.blogspot.com/2012/07/how-changing-definition-of-oil-has.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982290752.48/warc/CC-MAIN-20160823195810-00119-ip-10-153-172-175.ec2.internal.warc.gz
|
en
| 0.96392 | 2,427 | 3.125 | 3 |
Resting beneath the 1,000-foot cliffs of Scotland’s Aonach’s Beag mountain range, The Sphinx –one of the country’s proudest snowcaps—is on its deathbed.
“It’s a very sorry sight,” says Iain Cameron, a leading snow expert and arguably one of Edinburgh’s most dedicated “snow patchers,” a group of people who seek out and track the changes in the island’s coldest landmarks. These patches “tend to sit in the little gullies and corries below the peaks,” Cameron told Atlas Obscura. The Sphinx, which dwells between the higher points of the Garbh Choire Mor in the Cairngorms, is not only Scotland’s oldest snow patch, but is typically its most vigorous.
The island’s craggy and dynamic slopes offer a place for snow patches to nestle throughout the warmer spring months. Some, like The Sphinx, have even been known to endure until the end of summer. On average, there are nearly 100 patches left come September. These numbers, sadly, have plummeted in recent years, and continue to do so at a chilling rate.
Atrocious weather today on the walk to Garbh Choire Mor. Pinnacles patch has melted, and Sphinx has a matter of days left. I’m displeased. pic.twitter.com/sQgrPfspf8
— Iain Cameron (@theiaincameron) September 16, 2017
In 2016 there were approximately 82 patches remaining by the end of summer. This year, only two remain.
Cameron, who has been dutifully tracking the Sphinx’s final hours, is keeping vigil over the once proud patch, which could already be gone by the time of this writing. Should Cameron’s predictions hold true, this will be the first time in over 11 years that Ben Nevis, Scotland’s highest mountain range, is completely snowless.
As sad as it is to see these snow pockets circling the drain, their demise has led to an increasing level of awareness regarding these subtle but potent changes in climate. Cameron explained to The Guardian that, “a multitude of people are now aware of what I do.” His enthusiasm has also inspired a group of volunteers to conduct annual surveys, which have been providing the scientific community with valuable data since 2008.
|
<urn:uuid:62423c8e-6fd7-4c83-85b0-c201ea8577f4>
|
CC-MAIN-2019-39
|
http://blogs.discovermagazine.com/d-brief/2017/09/20/the-sphinx-scotlands-oldest-snow-patch-may-not-see-another-sunrise/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514578201.99/warc/CC-MAIN-20190923193125-20190923215125-00509.warc.gz
|
en
| 0.946968 | 517 | 2.546875 | 3 |
After the launch of the Sputnik satellite in 1957 by the Soviet Union, the United States would be in a race to catch up to the Soviet Cosmonauts as the U.S.S.R. racked up milestone after milestone. To Americans who had their faith in their nation’s technological prowess badly shaken, the humiliating second place finishes seemed like they would never end—until NASA Astronaut Ed White performed the first-ever spacewalk by an American.
White’s spacewalk was America’s first major achievement over the Soviet Union and marked a major turning point for the American space program, giving the American public a reason to cheer after years of false starts and second place finishes.
How the U.S. got caught flat-footed at the start of the space race and struggled to catch up
October 4, 1957 was a watershed moment in human history. The Soviet Union, long thought by the citizens of the world to be lagging behind the United States technologically, launched the first human-made satellite into orbit around the Earth. Named Sputnik-1, the satellite’s launch was announced by the Soviet Union’s state media the following day, setting off a national panic in the United States—whose nascent space program literally couldn’t get off the ground without blowing up on the launch pad.
After the Second World War, Americans generally believed that while the U.S.S.R. had the atomic bomb, they still couldn’t have recovered from the utter devastation of their country suffered during the war. 26 million people from the various Soviet Republics had been killed during the war, including more than 11 million working-aged soldiers—both men and women—and their industrial base had been bombed into rubble by either the Nazis or the retreating Red Army in a scorched Earth defense of the Motherland.
The Soviet launch of Sputnik-1 then simply couldn’t have been possible to the American consciousness and as a result the launch is often compared to the Japanese Attack on Pearl Harbor in 1941. The sudden vulnerability felt by the average American is understandable, after all, if the Russians could launch a satellite, why not a nuclear missile that could hit Topeka, Kansas?
This sense of insecurity was repeatedly compounded over the next several years as the Soviet space program continued to make steady progress while America’s newly formed National Aeronautics and Space Administration was in a seemingly losing race to catch up.
Soon after the first Sputnik, the U.S.S.R. launched Sputnik-2 into orbit, this time with a dog, Laika, on board making her the first living being to reach outer space—though she did not survive the mission.
In 1959, the U.S.S.R. launched the Luna-1 probe, becoming the first human-made object to fly past the moon. Later that year, the Luna-2 probe reached the lunar surface when it crashed into the moon’s Sea of Serenity. The Luna-3 probe orbited the moon and took pictures of the far side of the moon, the first time humans had ever seen it in the entire history of the species.
This was followed by two more dogs, Belka and Strelka, in 1960 aboard the new Vostok spacecraft. These animals survived a 24-hour orbit of the Earth and were returned safely.
In 1961, the U.S. was making progress in catching up to the Soviets, having launched a pair of primates into space for a sub-orbital flight in 1959 as well as the satellite Explorer 6 in the same year, which took the first photographs of Earth from outer space.
Still, the U.S. lagged behind the U.S.S.R.’s progress by a wide gulf and the Mercury program, designed to put an American in orbit around the Earth, was being fast-tracked as the race against the Soviet space program took on levels of industrial mobilization that was usually reserved for wartime.
Unfortunately for the Americans, the Russian cosmonaut, Yuri Gagarin, became the first human to reach outer space on April 12, 1961, spending 108 minutes in a single orbit around the Earth before returning safely.
Less than a month later, Alan Shepherd became the first American to reach space in a sub-orbital flight. It would be another nine months before John Glenn made the first orbit of the Earth by an American astronaut.
The U.S. managed to beat the Soviets in a successful flyby of Venus in 1962, after a successful launch of a Russian probe shortly before Gagarin’s flight, but the Soviet probe failed a week after launching. So even in this victory, it was still behind the pace of the Soviet program.
In 1963, the Soviet cosmonaut Valentina Tereshkova became the first woman to reach space, something the Americans wouldn’t accomplish for another two decades.
At this point, the race had become truly neck-and-neck but for most Americans, the Soviets still appeared to maintain a stubborn—and unnerving— lead.
Ed White scores a definitive victory for the U.S.
Edward White II took after his father in many ways. A West Point graduate and an accomplished U.S. Army pilot, White’s father brought him up into the air at age 12 in a T-6 trainer plane and let him take the control mid-flight.
He would later recall that even though “he was barely old enough to strap on a parachute…it felt like the most natural thing in the world to do.”
White would follow his father’s example and attend West Point himself, graduating in 1952 and enlisting in the U.S. Air Force. He distinguished himself flying F-86 and F-100 jet aircraft in Europe, but fate came calling in 1957 when he read an article about the prospective role of future astronauts in the new U.S. space program.
“The article was written with tongue in cheek,” he remembered, “but something told me: this is it—this is the type of thing you're cut out for. From then on everything I did seemed to be preparing me for space flight”
He applied to become an astronaut and was accepted into the program in 1962. He and eight other men underwent the rigorous training for the upcoming Gemini program, the successor of the Mercury program and the precursor to the program that would land a man on the moon, which was still in early planning.
Everyone was certain that Gemini would be the program that helped the U.S. take the lead, but again the Soviet Union beat the Americans to the next major milestone, the spacewalk. On March 18, 1965, Soviet cosmonaut Alexei Leonov left his Voskhod-2 capsule in orbit around the Earth and became the first human to ‘walk’ in the vacuum of space, spending 10 minutes outside of his spacecraft before returning.
White’s mark on history came three months later, on June 3, when his Gemini 4 spacecraft began orbiting the Earth. On their third orbit, as the capsule approached Australia, White and NASA astronaut James McDivitt readied White for his own spacewalk. As they passed over Hawaii, White opened the hatch on the capsule and, using a pressurized air gun to maneuver, became the first American to enter the vacuum of space.
Tethered only by a 25-foot long hose that supplied him with oxygen, White orbited the Earth outside the Gemini capsule at a speed of more than 17,000 mph, over 100 miles above the Pacific Ocean.
“This is the greatest experience,” White radioed back to NASA mission control in Houston, Texas, “it's just tremendous. Right now I'm standing on my head and I'm looking right down, and it looks like we're coming up on the coast of California. There is absolutely no disorientation associated with it.”
It took 15 minutes for White to travel the distance from Hawaii to Florida and out toward the Atlantic Ocean. With sunset approaching, Houston ordered White to return to the Gemini capsule before they reached the nightside of the planet. In total, White spent 23 minutes free-floating above the Earth, more than double the length of time the Soviets were able to achieve.
“Ed White might have been euphoric during his space walk, but whatever he felt was tame compared to the American public's reaction," said Chris Kraft, flight director for NASA’s Houston mission control during Gemini 4. "The country went wild with excitement over their space program. Ed's space walk completely eclipsed the Russians. For the first time I saw real optimism out there over our chances of winning the race to the moon.”
Ed White’s tragic death
With the success of the Gemini missions, Ed White was tapped as the senior pilot for the Apollo 1 mission in 1967. On January 27 of that year, the three-man Apollo 1 crew, White, commander Gus Grisson, and co-pilot Roger Chaffee, were testing the Apollo 1 capsule on a launch pad in Florida.
The tests were going poorly during the afternoon, but the test would turn tragic at 6:31 PM when a fire broke out in the capsule while the three men were inside. With the air in the capsule being pure oxygen, the fire spread quickly, engulfing the entire cabin before any rescue could be attempted. All three crew members died in the fire.
“This determination to make sure these men did not die without cause, I believe, gave us all the strength to continue our job landing men on the moon," Kraft said. "It also brought us all closer together and made our responsibilities crystal clear. For some, it was more than they could bear. The fire on the pad took its toll beyond the deaths of three brave men.”
White, Grissom, and Chaffee, were the only U.S. deaths during the U.S.-Soviet space race of the 1960s, but that maybe made their deaths more deeply felt by the public and were mourned by the nation and much of the world. Though his life came to a tragic end, Ed White’s tenacity and determination provided the first real achievement of the U.S. space program, which in turn helped the U.S. take the lead over the Soviets. That effort culminated with the successful landing of Apollo 11 on the lunar surface in July 1969, and the Apollo 1 mission patch bearing the names of the lost astronauts was left on the lunar surface as a token of gratitude for the sacrifice they made and extraordinary spacewalk of Ed White that helped lift the spirits of the nation when it was desperate for something to cheer for.
|
<urn:uuid:65e1e274-323b-4440-9839-433794b4c2be>
|
CC-MAIN-2020-05
|
https://interestingengineering.com/how-ed-white-the-first-american-to-spacewalk-gave-nasa-a-much-needed-boost
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250620381.59/warc/CC-MAIN-20200124130719-20200124155719-00087.warc.gz
|
en
| 0.971602 | 2,237 | 3.421875 | 3 |
France promotes responsible use of antibiotics as part of a holistic approach to global health, addressing human, animal and environmental health: the One Health approach.
The harmful effects of excessive antibiotic use are one of the 10 most serious threats to global health identified by the World Health Organization (WHO). To fight this major issue, France is committed to promoting essential interministerial positions on controlling antimicrobial resistance at European and international levels. As such, France supports World Antimicrobial Awareness Week, organized at the initiative of WHO from 18-24 November 2021, and European Antibiotic Awareness Day on 18 November 2021, promoted by the European Centre for Disease Prevention and Control (ECDC).
In the last three decades, infectious diseases caused by antibiotic-resistant bacteria have become increasingly common in France and the wider world, in a phenomenon known as antimicrobial resistance, linked to the excessive use of antibiotics on humans, animals and crops. Fighting this problem, identified by WHO as one of the 10 most serious threats to global health, is a global public health priority.
In this context, France promotes responsible use of antibiotics as part of a holistic approach to health, addressing human, animal and environmental health: the One Health approach.
In accordance with WHO recommendations, France implements an interministerial roadmap to limit antimicrobial resistance (2016) focused on five priorities: greater awareness among the public and health professionals, better use of antibiotics in practice, greater support for research and innovation, enhanced surveillance and, lastly, stronger intersectoral coordination of the fight against antimicrobial resistance, in synergy with European and international initiatives.
France promotes responsible use of antibiotics in negotiation of European norms (regulations and directives), as well as playing an active part in many expert groups in various fields (human medicines, veterinary medicines, environment, food safety, etc.). Internationally, France advocates for the adoption of ambitious measures to fight antimicrobial resistance in standard-setting forums like the Codex Alimentarius, as well as major political orientations within international organizations including WHO, the World Organisation for Animal Health (OIE), the Food and Agriculture Organization (FAO) and the United Nations Environment Programme (UNEP), in addition to the G7 and G20.
France supports many international initiatives on antimicrobial surveillance and research and innovation in the field, including the WHO Global Antimicrobial Resistance and Use Surveillance System (GLASS) and the EU-supported Joint Programming Initiative on Antimicrobial Resistance (JPIAMR). France also has research partnerships and cooperation projects internationally, particularly with developing country partners.
During World Antimicrobial Awareness Week, outreach campaigns are carried out by actors involved in antimicrobial resistance.
Last update: November 2021
|
<urn:uuid:349de90f-9ff1-4883-9006-5e723a3ce9d4>
|
CC-MAIN-2024-10
|
https://www.diplomatie.gouv.fr/en/french-foreign-policy/development-assistance/priority-sectors/health/news/article/world-antimicrobial-awareness-week-18-24-november-2021
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474852.83/warc/CC-MAIN-20240229170737-20240229200737-00506.warc.gz
|
en
| 0.917066 | 546 | 3.328125 | 3 |
From flower to fruit
In common parlance, the word "fruit" normally refers to a sweet-tasting, edible plant organ.
What is a fruit ?
In botany, a fruit is a plant organ that develops following the fertilization by pollination of one or more ovules, contained in a pistil. Each of the ovules fertilized by a grain of pollen will become a seed. The rounded part of the pistil, which contains the ovules (also called the ovary), will become a fruit.
A fruit is therefore a fleshy or dry organ containing one or multiple seeds. Once matured, it serves to propagate the species.
Berry or drupe ?
In drupes, the inner part of the ovary, called the endocarp, is thick and hard, forming a tought, stony pit around the seed.
In berries, on the other hand, the endocarp forms a thin, flexible envelope around the seed. The consumption of berries and drupes by animals allows their seeds and pips to be spread around. They are not harmed by the animal's digestion and are excreted a short distance away.
|
<urn:uuid:458a633b-3094-4ebf-9a66-c610e6073d22>
|
CC-MAIN-2023-40
|
https://www.kloranebotanical.foundation/en/botany/botany-lessons/flower-to-fruit
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510924.74/warc/CC-MAIN-20231001173415-20231001203415-00422.warc.gz
|
en
| 0.951013 | 240 | 3.828125 | 4 |
Biosand Water Filter Project in Jironkota, Bolivia
People in Jironkota, Bolivia are now using the biosand water filters built in collaboration with Mano a Mano earlier this year!
So far, 37 families have had water filters installed at their homes. 220 residents have been trained on the importance of clean water, along with 24 officials from three other municipalities (their interest in this project is likely to increase requests for training from their constituents).
Decreasing murkiness of their water is the primary benefit, and reducing bacterial count is the second benefit.
- The Mano a Mano agronomist assessed trainee’s learning about the benefits of clean water through simple post-training verbal questions (many trainees are not literate).
- The agronomist observed as trainees constructed their filters. She repeated the training process until trainees could construct filters correctly at the CEA site. Following the formal training, the agronomist traveled to the trainee’s community to observe additional training of other farmers and determine whether the filters were constructed and being used correctly.
- University of Minnesota students and other U.S. volunteers continue to complete an extensive literature search on diffusion of technology to both shape and affirm our approach to this project. Their findings thus far strongly support the method used by Mano a Mano to engage farmers as agents of the changes they seek.
- CEA interns from the U.S. sampled farmer’s drinking water prior to and three months following use of the filters. Analysis of the level of coliform bacteria for both sets of samples was completed at the Universidad Mayor de San Simon in Cochabamba, Bolivia.
Initial Lab Results of the Filters
After three months of filter use, the level of total coliform bacteria ranged from an 86-100% reduction and the level of fecal coliform bacteria ranged from a 92-100% reduction, a strong positive result. (Anything over 90% improvement is generally considered successful.) Also, the filters get better over time because the “good” bacteria continue to multiply at the top of the filter and “eat” the disease-causing bacteria.
Pictures from Installation of Water Filters
Center for Ecological Agriculture
This water filter project is a pilot project throught our Center for Ecological Agriculture (CEA). Special thanks to Oxford Development Abroad and the Pentair Foundation, who have supported this project!
|
<urn:uuid:c903cbb9-d959-4fbb-8ec3-3f50e6430bff>
|
CC-MAIN-2019-47
|
https://manoamano.org/blog/biosand-water-filter-project-in-jironkota-bolivia/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496672170.93/warc/CC-MAIN-20191122222322-20191123011322-00240.warc.gz
|
en
| 0.932779 | 508 | 2.734375 | 3 |
Instructor: Mark Seifter
We begin by discussing neural net formulas, including the sigmoid and performance functions and their derivatives. We then work Problem 2 of Quiz 3, Fall 2008, which includes running one step of back propagation and matching neural nets with classifiers.
This course introduces students to the basic knowledge representation, problem solving, and learning methods of artificial intelligence. Upon completion of 6.034, students should be able to develop intelligent systems by assembling solutions to concrete computational problems; understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering; and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective.
|
<urn:uuid:71bc3f7f-629a-43d4-91a4-92bde0d9bb33>
|
CC-MAIN-2023-06
|
https://cosmolearning.org/video-lectures/r4-neural-nets/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499654.54/warc/CC-MAIN-20230128184907-20230128214907-00032.warc.gz
|
en
| 0.912834 | 139 | 3.1875 | 3 |
Are you looking for some idioms using or related to the word blood? Well if so, check out these common blood idioms below.
34 Useful Blood Idioms (Meaning & Examples)
A blood brother
- Meaning: A man or boy who has given their loyalty to another, despite not being biologically related.
- Example Sentence: There is no question about it, Tom and Jack are blood brothers.
- Meaning: A bad relationship between two people because of past troubles.
- Example Sentence: Taylor and Katy had bad blood for years, but they have finally resolved their problems.
Be someone’s own flesh and blood
- Meaning: To be a relative of someone, many times used for one’s offspring.
- Example Sentence: I am the man’s own flesh and blood yet he will not help me out! I don’t know who to turn to anymore.
To be in your blood
- Meaning: To have some quality or characteristic ingrained in you
- Example Sentence: Jealousy is in her blood. She will not move on with the project until the teacher declares her as being number one.
Be out for blood
- Meaning: To seek vengeance on someone.
- Example Sentence: All I can say is Dexter is out for blood, so you better watch it!
Blood and guts
- Meaning: Violence and bloodshed, an idiom especially used in works of fiction.
- Example Sentence: That movie is just full of blood and guts. I don’t recommend it.
Blood and thunder
- Meaning: Unrestrained and violent action especially used when speaking of sports or fiction.
- Example Sentence: That movie had a lot of blood and thunder. I had to tell my neighbor not to bring his 8 year old to the theater with him. It was disturbing enough to me as an adult, I can’t imagine what it would be like for a kid.
Blood is thicker than water
- Meaning: Family loyalties are stronger than any other relationship.
- Example Sentence: Mike will certainly help you out. Remember, blood is thicker than water. He has and always will put his family first.
Blood on the carpet
- Meaning: An exaggerated way to describe a serious disagreement or the aftermath of it.
- Example Sentence: Louise and Lenny left blood on the carpet last night. I don’t know who won the argument but I am certainly interested in finding out.
(To make) someone’s blood run cold
- Meaning: To shock or horrify someone.
- Example Sentence: That movie made my blood run cold. I will never watch it again.
Blood sweat and tears
- Meaning: When someone works extremely hard.
- Example Sentence: Kit put her blood, sweat, and tears into getting the ranch ready for her horses. It all paid off though as she was awarded ‘Best New Ranch’ in the Calgary Times.
Blood will tell
- Meaning: Family characteristics can not be hidden or concealed.
- Example Sentence: Don’t worry James! Blood will tell that you and Dan are brothers.
- Meaning: The bloodline or family line of a noble family.
- Example Sentence: Bridget has blue blood. Her grandfather was a cop, her dad was a cop and now she is carrying on the family tradition.
Curdle someone’s blood
- Meaning: To frighten someone.
- Example Sentence: That man would curdle my blood if I saw him again. He was old, dirty and had an unnerving look in his eye.
- Meaning: To make a wound that bleeds.
- Example Sentence: I don’t like to watch boxing because someone always draws blood.
- Meaning: The first point or advantage gained in a competition.
- Example Sentence: The first blood goes to Johnny.
Out for blood
- Meaning: To be very angry with someone, to be determined to defeat or punish them.
- Example Sentence: Tommy is out for blood so watch your backs!
- Meaning: To sense an opponents vulnerability or weaknesses.
- Example Sentence: Sarah could smell blood, therefore she was able to defeat Maya at the wrestling match.
- Meaning: To be very anxious about something.
- Example Sentence: I’m so nervous about seeing my ex, I’m sweating blood. I hope it all goes well and we can be friends again.
- Meaning: To harm an opponent and thus want to continue to cause even more harm to them.
- Example Sentence: Chase could taste blood when he realized London’s weaknesses.
To scream bloody murder
- Meaning: To scream or yell in an angry and loud manner.
- Example Sentence: There is no doubt in my mind that when my mom screams bloody murder, the neighbors hear it.
To get blood from a stone
- Meaning: When something or someone is very frustrating and difficult.
- Example Sentence: It’s like getting blood from a stone with Richard, he drives me crazy!
To have someone’s blood on one’s hands
- Meaning: To be responsible for someone’s death.
- Example Sentence: Unfortunately after the car accident, Ms. Cline had blood on her hands and would likely do jail time.
In cold blood
- Meaning: To do something ruthlessly, without feeling.
- Example Sentence: It was obvious he had no remorse. He left her there in cold blood. What an awful ending to an already sad story.
In one’s blood
- Meaning: Something that someone is born with, such as a characteristic or personality trait.
- Example Sentence: No matter what he said, Jack had a competitive spirit. It was in his blood.
Like getting blood out of a stone
- Meaning: When it is very difficult to get something from someone.
- Example Sentence: Asking Ruth for a favor is like getting blood out of a stone. It’s nearly impossible to get what you want.
- Meaning: Referring to new members or people brought into a group or company.
- Example Sentence: We have some new blood at the company. John hired them yesterday.
Someone’s blood is up
- Meaning: When someone is in a fighting mood.
- Example Sentence: Watch out for Brooks! When his blood is up he is dangerous.
To go for the jugular
- Meaning: To aggressively attack someone.
- Example Sentence: I told him to go for the jugular, but I didn’t mean it.
To make someone’s blood boil
- Meaning: To infuriate someone.
- Example Sentence: My roommate Walter makes my blood boil. He is so unkind and selfish. I hope he finds a new place to live soon.
To rich for someone’s blood
- Meaning: When something is too expensive for someone’s budget.
- Example Sentence: That new motorcycle is too rich for my blood.
To sweat blood
- Meaning: To make a strenuous effort to do something.
- Example Sentence: Dylan sweat blood trying to fix his Dad’s truck the other day. The worst part was, after five hours, it still was not fixed.
To taste blood
- Meaning: To be successful at something that it motives one to continue pursuing a similar course.
- Example Sentence: Once Billy tasted blood, his whole mind set changed. He went from having a negative attitude about the sport, to feeling confident in himself and his ability to compete.
- Meaning: Young people. (often used to refer to young, new hires at a company)
- Example Sentence: My boss told me to find some young blood, so I hired a 22-year-old college graduate.
So there you have it! Thirty-four idioms to do with the word blood. Do you have any more we could add to the list? If so, please let us know below.
|
<urn:uuid:887121a4-9d37-4162-8502-dda67dd8d915>
|
CC-MAIN-2022-21
|
https://englishbyday.com/blood-idioms/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521041.0/warc/CC-MAIN-20220518021247-20220518051247-00702.warc.gz
|
en
| 0.945509 | 1,742 | 2.765625 | 3 |
The organisers of the Olympics wanted to create a “minimal impact Games”, through a series of steps outlined in the Tokyo 2020 Olympic and Paralympic Games Sustainability Plan.
The majority of venues that will host events already existed with several reused from the Tokyo 1964 Olympics and podiums and medals have been made from recycled materials.
The sustainability plan claims the games are moving “towards zero carbon” by “focusing on maximum energy savings and use of renewable energy”.
The Olympic torches, designed by Tokujin Yoshioka, were made up of recycled construction waste from temporary housing used in the aftermath of the Great East Japan earthquake and tsunami in 2011.
The designer used an extrusion technique to produce the 71-centimetre rose-gold torches, which resemble the national flower of Japan, the sakura flower. Both the relay torches and cauldron holding the Olympic flame are fueled by hydrogen instead of fossil gas.
The autonomous and electric e-Palette vehicle was designed to transport Olympic and Paralympic athletes around the Olympic Village without generating emissions.
Japanese car company Toyota modified its existing fleet of e-Palette vehicles to better suit the needs of athletes who required fuss-free and comfortable transport.
Some of the modifications include widening the doors, lowering the flor and adding electric ramps to enable passengers – particularly wheelchair users – to board easily and quickly.
Japanese designer Junichi Kawanishi extracted precious metal from old mobile phones and other e-waste donated by the public to create reflective, ribbon-like rings around the edge of the Tokyo 2020 Olympic and Paralympic medals.
Kawanishi’s winning medal design was selected from a competition that drew entries from more than 400 professional designers and design students. The medal cases which are manufactured from dyed Japanese ash wood, have been designed by Shinya Yoshida.
Japanese bedding company Airweave produced these lightweight recycled cardboard beds and customisable mattresses for athletes.
Of the 18,000 beds and customisable mattresses created for athletes at this summer’s Olympics, 8,000 will be repurposed for use by athletes at the Paralympics.
The brand claims that the mattresses, which are made from polyethylene fibres, can be recycled an unlimited number of times.
Japanese architect Kengo Kuma created a wooden lattice design for the Japan National Stadium, which will house the opening and closing ceremonies as well as the athletics events.
Recycled plastic bottles collected by Coca-Cola have been used in the white T-shirts and trousers worn by torchbearers carrying the Olympic flame at the Tokyo 2020 Olympic torch relay.
The Tokyo Olympic Association designed the unisex Olympic torchbearer uniforms under the theme “hope lights our way”.
The designs all feature a sash with a chequered pattern that is known in Japan as ichimatsu moyo. The same pattern can be found in the Tokyo 2020 logos.
Sportswear brand Nike used recycled polyester made from plastic bottles and recycled nylon as well as rubber and yarn waste from the company’s factories to create these uniforms.
Among them are soccer jerseys for the American, Korean and Nigerian teams, alongside kits for the USA’s men and women basketball teams.
The brand says that the uniforms will be the “most sustainable” and “highest performing” to date.
The winners at the Tokyo 2020 Olympics and Paralympics will receive their medals on podiums made from 24.5 tonnes of discarded household plastics.
Japanese artist Asao Tokolo gathered the plastics from the Japanese public before recycling the material and turning it into filaments, which were used to 3D-print the podiums.
The equivalent of 400,000 bottles of laundry detergent was collected to create all 98 podiums that will be used during the Games.
This temporary structure by Tokyo studio Nikken Sekkei was built using 40,000 pieces of Japanese wood. The pieces of cypress, cedar and larch were “borrowed” from local governments across Japan.
The timber space will be used as the central meeting and dining place for athletes, officials, guests and the media within the Olympic Village throughout the games.
Bright colours and geometric patterns adorn the skateboarding uniforms that Nike has designed for the first skateboarding competitors at the Olympic Games.
According to Nike, all of the skateboarding jerseys are made up of 100 per cent recycled polyester from “water bottles and other things that would go to waste”.
The sportswear company has created uniforms for the United States, France and Brazil. They will all be bringing teams to the Tokyo 2020 Olympics to compete in the sport’s first street and park competitions at the Olympic level.
From original article at dezeen.com
|
<urn:uuid:978a4b9e-1cbb-42fc-82e5-53f4da3c199d>
|
CC-MAIN-2023-14
|
https://www.citybin.com/latest/sustainability/most-sustainable-olympics-yet/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00295.warc.gz
|
en
| 0.94577 | 1,004 | 3.125 | 3 |
Recent tornadoes that devastated rural communities in Indiana, Kentucky and other states have spurred a national debate about whether school officials should send students home or shelter them at school when weather warnings are issued.
Unlike other natural threats, twisters pose a unique challenge because they develop so quickly and school officials have just 10 to 15 minutes to react, according to the National Weather Service.
Meteorologist Lance Goehring said tornadoes are highly unpredictable, developing out of
thunderstorms that themselves may form in a short time.
“You may go from clear skies to a thunderstorm to a tornado within an hour,” Goehring said.
He said there are about 20 to 30 severe weather warnings in the Texas Panhandle every year.
When the weather service issues a tornado warning, school officials in that area have mere minutes to assess the situation and scramble kids to safety.
Amarillo Independent School District spokeswoman Holly Shelton said each school campus has an individual plan to shelter in the safest place within the school building.
“Typically in that situation, the goal is not to send students out, but to get them into a safe place,” Shelton said.
Canyon Independent School District spokeswoman Christy Bertolino said similar systems are in place there.
“If parents are concerned, they can come check out their children, but because these things happen so quickly, the plan is to shelter in place,” she said.
Kevin Starbuck, emergency management coordinator for Randall and Potter counties, said the Office of Emergency Management works with school districts to help them determine the safest place for students and staff to take shelter.
Starbuck said his office also is available for consultation or to answer questions during emergency situations, although ultimately, the schools are responsible for making decisions.
“Obviously the safety of our children is the foremost objective,” Bertolino said.
The Associated Press contributed to this report.
|
<urn:uuid:7e58da27-413f-4bfa-9d1a-88ee38c52206>
|
CC-MAIN-2018-17
|
http://www.amarillo.com/news/local-news/2012-03-11/tornado-outbreak-highlights-schools-difficult-decisions?quicktabs_3=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945669.54/warc/CC-MAIN-20180423011954-20180423031954-00288.warc.gz
|
en
| 0.958092 | 397 | 2.734375 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.