text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Zakir Hussain Allaraka Qureshi was born March 9, 1951, in Bombay, India. He is the son of Ustad Allah Rakha Khan, a well-known Indian tabla player. Zakir started playing the tabla as soon as he could reach across the drums. His study with his father was intensive: "You grow up in the atmosphere of music twenty-four hours a day," he said, "and you don't have to do anything else." Hussain began playing concerts by age 7 and and started touring at 12.
The tabla was developed in the fourteenth century to accompany vocal, instrumental and dance music and is composed of two drums. One is called dayan (right), madeen (female), or tabla; the other is called bayan (left), duggi (male), or dhama. To play the tabla, the musician rests the instrument on the floor and sits behind it in a straight or bent position. He plays the left drum with his left hand and the right drum with the right hand. The left drum is made of wood, clay or copper hollowed out from the inside. Its shell is bored out of a single block of wood. The right drum is usually hollowed out of black wood. The bottom is broader than the top. Both are covered with skin fastened to leather straps, which are stretched over the body of drums by leather braces. These straps can be pulled to raise or lower the pitch. The musician plays well-established time cycles (talas) that are performed through drumming phrases (bols) called thekas.
The tabla is deeply rooted in Indian tradition. Hussain is known as an innovator but sees a need to balance innovation with continuity: "You have to stay very close to your tradition, but also be able to inject some of what the world has to offer. It is time for Indian music to look outside rather than just to have the outside world borrow from Indian music."
Tabla playing has hardly been static. Performing a raga involves improvisatory interplay with other musicians, which requires a keen intuitive sense. "The tabla player has an interesting job," Hussain said. "He is somewhat like a psychiatrist when he's onstage. He has no idea of what the main instrumentalist will do, so what he has to do is sit and wait onstage until the instrumentalist decides to initiate a composition. At that point, he finds out what he's going to do, what kind of mood he's in, what kind of temperament he has. In the first five to eight minutes, we must totally gauge what the musician is all about. We have to understand on the spot and analyze what he wants to express through his music. Or you might say I'm a catcher — but if the catcher didn't know what the pitcher was throwing, it would be a very different ball game."
Hussain made his American debut performing with Ravi Shankar at the Fillmore East in New York City. While in New York, he met guitarist John McLaughlin, and their friendship led to the formation of Shakti, a musical group that also included Indian violinist L. Shankar. Over the years, Hussain has accompanied some of the greatest Indian musicians and collaborated with such diverse performers as the London String Quartet and Van Morrison.
His 1992 album with Grateful Dead drummer Mickey Hart, Planet Drum, earned a Grammy Award and the Downbeat Critics Poll for best world beat album. He has contributed to the soundtracks of several films. He starred in the film Heat and Dust as well as playing music for it and was nominated for an award at the 1983 Cannes Film Festival for his musical contributions to that film. A year later, he started his own percussion ensemble, the Zakir Hussain Rhythm Experience. In 1991, he was awarded the Sangeer Natak Akademi by India's preeminent cultural institute, and in 1996 he was involved in composing music for the opening ceremonies of the Summer Olympics in Atlanta.
Ouellette, Dan. "Percussion Maestros of North & South India & Pharoah Sanders." Down Beat (August 1996) 63, 8: 69.
"Out of the Tradition." Down Beat (January 1993) 60, 1: 43.
Hussain, Zakir, and Ustad Alla. Tabla Duet. Moment Records MR 1001.
Hussain, Zakir, John McLaughlin, Jan Garbarek, and Hariprasad Chauraisa. Making Music. ECM 1349. Various artists. Saaz Tabla. Music Today, 2005. ____________. Saaz Tabla - Volume 1. Music Today, 2011. ____________. Saaz Tabla - Volume 2. Music Today, 2011.
Contributions to sound tracks, including Apocalypse Now and Vietnam: A Television History.
Zakir Hussain, 1999 National Heritage Fellowship Concert, Washington, D.C., courtesy National Endowment for the Arts
Ustad Zakir Hussain, 'Tal-Posta In 5 Beats. Raga Jhinjoti,' Essence of Rhythm, 1995, Polygram India LTD, 536 943-2
Zakir Hussain, 'Berkely (CA, USA) 1989 Solo,' Magical Moments of Rhythm, 2000, Eternal Music EM89003
Zakir Hussain, 'Ahmedabad (India) 1992 Solo,' Magical Moments of Rhythm, 2000, Eternal Music EM89003 | <urn:uuid:445c0c08-5b2c-4b7f-90ee-a432ebf8c2f1> | CC-MAIN-2021-49 | http://mastersoftraditionalarts.org/artists/148?selected_facets= | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358591.95/warc/CC-MAIN-20211128194436-20211128224436-00483.warc.gz | en | 0.963992 | 1,130 | 2.515625 | 3 |
Commercial Architect: Job Description, Duties and Requirements
Commercial architects apply artistic, construction and engineering skills to design a variety of commercial buildings and structures. They may take part in every step of the building process and work with a team of other professionals to complete projects. To practice in the U.S., architects must obtain licensure from their state's architect board, which usually requires formal education, an internship or training and passing a licensing exam.
Job Description of a Commercial Architect
Commercial architects are licensed professionals that design buildings and structures for non-residential use, such as retail and office buildings. Aside from aesthetics, architects must consider an array of factors during the design process, such as functionality, building codes, safety regulations and construction costs. Commercial architects typically work in offices, developing building plans and consulting with clients; however, they often visit building sites to monitor construction progress. Some architects work for architecture or building construction firms, while others are self-employed.
Duties of a Commercial Architect
Commercial architects participate in the entire building process. They typically begin by consulting with clients to determine factors such as design requirements, project site and budget. After creating the design and building blueprints, commercial architects coordinate the building process, collaborating with other professionals, such as engineers, interior designers, landscape architects and construction contractors. Commercial architects may also provide other post-construction services, such as ensuring that workers are paid and that buildings are tested and inspected.
Job Requirements of a Commercial Architect
All architects are required to obtain licensure from their state's architect registration board. While specific licensing requirements vary according to state, most registration boards require architects to hold a professional architecture degree, pass a licensing exam and complete an internship.
Aspiring architects often earn a Bachelor of Architecture from program accredited by the National Architectural Accrediting Board. Available at 117 colleges and universities across the U.S., these degree programs typically take five years and are intended for students with no prior education in architecture. Curricula may focus on practice and theory topics, such as building design, structural systems, computer-aided design and construction materials. Individuals who have earned an undergraduate degree in other areas may enroll in a Master of Architecture program.
All states require architects to complete an internship program or period of practical training that meets the guidelines of the Intern Development Program (IDP), which was established by the National Council of Architectural Registration Boards (NCARB). These programs usually last three years, during which interns work under the supervision of a registered architect.
Architect Registration Examination
Upon completion of an internship, prospective commercial architects may take the Architect Registration Examination (ARE). Developed by NCARB, the 7-part exam consists of multiple-choice and graphic vignette questions focused on topics such as site planning, schematic design and construction documents. Candidates must pass all seven sections of the exam to be eligible for licensure.
Salary Information and Employment Outlook
In 2013, the U.S. Bureau of Labor Statistics (BLS) revealed an average salary of $79,650 for architects in general, excluding landscape and naval architects. At that same time, those working in nonresidential building construction brought home $74,560 on average. According to the BLS, jobs for architects were predicted to increase by 17% from 2012-2022, which is slightly faster than average.
Related to Commercial Architect: Job Description, Duties and Requirements
- Recently Updated
Several postsecondary schools offer online courses in architecture; however, due to the hands-on nature of the field, many...
Students who want to become an architect online may begin their studies in an associate's degree program and progress all the...
Learn how to become a residential architect. Research the education requirements, training, licensure information and...
Both landscape architects and civil engineers make designs and may even work together on certain projects; however, the type of...
- Become a GIS Architect: Step-by-Step Career Guide
- How to Become a Data Architect: Education and Career Roadmap
- How to Become an Application Security Architect
- Top School for a Degree in Accounting - Fort Lauderdale, FL
- Career Information for a Degree in Marketing Management
- Top Accounting School - Omaha, NE
- Production Planner: Job Description, Duties and Requirements | <urn:uuid:60b2da9c-68c1-401d-9c98-50bc7a5b331e> | CC-MAIN-2014-52 | http://education-portal.com/articles/Commercial_Architect_Job_Description_Duties_and_Requirements.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802769374.67/warc/CC-MAIN-20141217075249-00082-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.942992 | 878 | 2.609375 | 3 |
If your pond is frozen over the fish will probably die. Then the dead fish will be sucked into the skimmer. Hydrogen disulfide will continue to be produced by decaying matter and will be trapped under the ice. Hydrogen disulfide is toxic in very small concentrations. Normally it will be released into the atmosphere, but it becomes trapped under the ice and lethal concentrations can form.
Either thaw the ice or cut it out to form breathing holes. Don't pound on the ice. Shock waves can rupture the fish's air bladder, killing the fish. I lost a pond of koi when the electricity went out for 12 hours and ice formed completely over the pond surface. | <urn:uuid:f38b1aa0-f520-468d-abeb-98b826279c51> | CC-MAIN-2014-42 | http://www.lawnsite.com/showpost.php?p=4655166&postcount=4 | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413558067214.90/warc/CC-MAIN-20141017150107-00086-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.936393 | 139 | 2.734375 | 3 |
The glycemic index connection
Macular degeneration attacks the part of the eye responsible for central vision. In its early stages, the disease may make straight lines appear wavy or make objects look fuzzy. As it progresses, reading, driving, and other activities that require sharp vision become more difficult.
In the new study, over 4,000 people between ages 55 and 80 had their diets categorized by glycemic index—a measure of food’s blood sugar—raising effects. A high-glycemic-index diet raises blood sugar levels after a meal more than a low-glycemic-index diet does.
Compared with people with diets that measured lowest on the glycemic index, people eating the highest glycemic index foods were almost 1 1/2 times as likely to have features of macular degeneration. The higher the dietary glycemic index, the more severe the disease. Further, people with a higher than average glycemic index diet had a 49% increased risk of advanced macular degeneration.
“We estimate that 20% of cases of advanced macular degeneration would be eliminated if people consumed diets that have dietary glycemic index values below the median,” the study’s authors concluded.
Tips to reduce your risk
- Choose foods with lower glycemic indexes—These are foods that have not undergone processing to remove the fiber-rich portions of the plant. Good options are whole wheat flour, brown rice, and legumes (beans, lentils, and peas).
- Limit foods with higher glycemic indexes—Examples of these foods include white bread, sugar, white rice, and potatoes. High-glycemic-index diets are implicated in many chronic diseases such as diabetes, heart disease, and cancer.
- Try whole grain versions of your favorite carbs—Look for whole wheat pasta, brown rice, and multigrain breads.
- Switch your sweetener— If you’re looking for a healthier way to sweeten your coffee or tea, stevia is a natural sweetener that has a value of zero on the glycemic index.
Choosing unprocessed, whole foods appears to be a wise choice for eye health. The researchers noted, “Our results also suggest that the quality, not the quantity, of dietary carbohydrates influences the risk of macular degeneration.”
(Am J Clin Nutr 2007;86:180–8) | <urn:uuid:5a6f6373-ff4b-440f-85e6-5ef11cb4d9e8> | CC-MAIN-2016-50 | https://www.luckyvitamin.com/HealthLibrary/us/assets/feature/eat-right-to-beat-eye-disease/~default | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540915.89/warc/CC-MAIN-20161202170900-00108-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.919389 | 492 | 3.046875 | 3 |
As a youngster Sam Armstrong exulted in the outdoor life that the Hawaiian Islands provided. A serious student first at the Punahou School and then at its collegiate branch, Oahu College, he was also a prankster who secretly lowered the flag of the American Consulate in tribute to the death of a family pet and hanged his sisters' dolls to thwart their "i-doll-try."
Armstrong's most important model in shaping his own life was his father, who had become a government servant as well as minister of the largest native church in Honolulu by the time Armstrong was an adolescent. Richard Armstrong was a member of the king's Privy Council, minister of education and, ultimately, superintendent of public instruction. In the schools that the senior Armstrong created for the people of Hawaii, he inculcated the principle of manual labor whereby students helped support the cost of their education and acquired useful skills by farming or practicing crafts such as blacksmithing, carpentry, and barrel making. For most of his teenage years Armstrong was his father's secretary, and the experience influenced his own approach to education.
Richard Armstrong was killed in a horseback-riding accident in 1860. His bereaved son followed his father's last wishes and journeyed to the United States for the first time to attend Williams College in Williamstown, Massachusetts. There he completed his last two years of college education. He was housed and given special training by the college president, Mark Hopkins, who became another important influence in Armstrong's life and career. Under Hopkins's tutelage he refined his concept of practical or useful education, which played down the academic benchmarks of a classical education in favor of teaching students how to make a living and be good Christians.
Hampton Institute emphasized practical knowledge. Students took courses in English, arithmetic, basic science, geography, and history, including what was then known of African history. In addition, all students were required to work in the school shops or on the school farm. Many critics have charged that Armstrong's program mirrored and even reinforced convictions that blacks were suited only for manual labor. Whereas some of this criticism of Hampton is justified, especially in Armstrong's last years and after his death, his initial design was strictly practical. Hampton had no endowment, and most of its early students were impoverished. Manual labor in the school's fields and shops subsidized their education. Furthermore, most graduates expected to go into teaching, and because most southern schools for blacks remained open for fewer than six months a year, teachers needed supplemental skills to support themselves and their families.
In 1878 Armstrong initiated a program for Native American students at Hampton. Many of the Indian students distinguished themselves, but with that program the nature of the school began to change. As the institute grew, so did its need for donors. Armstrong increasingly gave up supervision of day-to-day operations in order to raise funds to keep the school going. By the 1880s he was much celebrated among northern philanthropists. In 1887 his alma mater, Williams College, and in 1889 Harvard University each honored him with an LLD.
Armstrong married his first wife, Emma Dean Walker, of Stockbridge, on October 13, 1869. She died on November 10, 1878, after many long illnesses. Their two daughters, Louise H. Armstrong and Edith E. Armstrong, both taught briefly at Hampton Institute as adults, and the former married William Scoville, who served as secretary of Hampton's administrative board from 1918 to 1935 and as an institute trustee from 1941 until his death in 1943.
January 30, 1839 - Samuel Chapman Armstrong is born on the island of Maui in the kingdom of Hawaii, where his parents are missionaries.
1860 - Richard Armstrong, a Presbyterian minister and a secretary in the government of the kingdom of Hawaii, is killed in a horseback-riding accident.
April 1864 - By this date Samuel Chapman Armstrong is a lieutenant colonel in command of the 9th U.S. Colored Troops Regiment, stationed in South Carolina.
October 11, 1864 - By this date Samuel Chapman Armstrong is colonel of the 8th U.S. Colored Troops Regiment, part of the Union army's Twenty-Fifth Corps.
April 3, 1865 - Union troops occupy Petersburg.
1866–1868 - Samuel Chapman Armstrong serves as assistant subcommissioner of the Freedmen's Bureau for the district covering the lower peninsula between the James and York rivers as well as Surry and Isle of Wight counties and portions of the Eastern Shore.
April 1868 - The Hampton Normal and Agricultural Institute, a coeducational school for African Americans, is founded in Hampton.
October 13, 1869 - Samuel Chapman Armstrong marries Emma Dean Walker, of Stockbridge. They will have two daughters.
1878 - The Hampton Normal and Agricultural Institute accepts Native American students, most of whom come not from Virginia but from the western United States and territories.
November 10, 1878 - Emma Dean Walker Armstrong, wife of Samuel Chapman Armstrong, dies after many long illnesses.
1887 - Samuel Chapman Armstrong receives an LLD degree from his alma mater, Williams College.
1889 - Samuel Chapman Armstrong receives an LLD degree from Harvard University.
September 10, 1890 - Samuel Chapman Armstrong marries Mary Alice Ford in Montpelier, Vermont. They will have two children.
1891 - Samuel Chapman Armstrong suffers a stroke but survives.
May 11, 1893 - Samuel Chapman Armstrong dies of a stroke. He is buried in the student cemetery on the campus of the Hampton Normal and Agricultural Institute.
Cite This Entry
- APA Citation:
Engs, R. F., & the Dictionary of Virginia Biography. Samuel Chapman Armstrong (1839–1893). (2014, August 10). In Encyclopedia Virginia. Retrieved from http://www.EncyclopediaVirginia.org/Armstrong_Samuel_Chapman_1839-1893.
- MLA Citation:
Engs, Robert Francis and the Dictionary of Virginia Biography. "Samuel Chapman Armstrong (1839–1893)." Encyclopedia Virginia. Virginia Foundation for the Humanities, 10 Aug. 2014. Web. READ_DATE.
First published: April 14, 2014 | Last modified: August 10, 2014
Contributed by Robert Francis Engs and the Dictionary of Virginia Biography. | <urn:uuid:a2add21b-19ec-4d67-9cf0-7160c3e4759c> | CC-MAIN-2017-47 | https://www.encyclopediavirginia.org/Armstrong_Samuel_Chapman_1839-1893 | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807056.67/warc/CC-MAIN-20171124012912-20171124032912-00479.warc.gz | en | 0.967541 | 1,304 | 3.125 | 3 |
|> Other English exercises on the same topics: BE, HAVE, DO, DID, WAS... | Frequent mistakes [Change theme]|
|> Similar tests: - Placement test beginners: Check your spelling - Past simple or present perfect - Questions : how to ask them - Although / in spite of / despite - Again/ back - Differences between Like and As - FOR and its use - Do or Make?|
|> Double-click on words you don't understand|
Do - don't - does - doesn't
The words do, don't, does and doesn't, appear a lot in English.
This is because they can be used as verbs or modals (helping verbs).
They are used in making affirmatives (statements) and questions.
In making affirmatives (statements): DO / DON'T / DOES / DOESN'T comes AFTER the subject.
- THEY DO their chores when they arrive home.
- SHE DOES charity work when she has time.
- I DON'T speak Spanish.
- JAMES DOESN'T drive on Saturdays.
In asking questions : DO / DON'T / DOES / DOESN'T come BEFORE the subject.
- Where DO YOU live?
- DOES HE drive to work?
- Why DON'T WE visit the national park? It's so much fun!
- Lucina speaks Dutch, DOESN'T SHE?
So, is there any difference among these four little words? Of course not! DO / DON'T / DOES / DOESN'T are simple present tense form of the verb "to do". DON'T (do not) is the negative form of DO while DOESN'T (does not) is the negative form of DOES.
The tiny difference is:
- Use DOES / DOESN'T if the subject is third-person singular (he, she, it).
- Use DO / DON'T everywhere else. That is plural nouns and with the pronouns I, you, we and they.
> I / you / we / they - do / don't
> he / she / it - does / doesn't
You got it, didn't you? Now, complete the sentences with do, don't, does or doesn't.
English exercise "Do - don't - does - doesn't" created by anuesther with The test builder. [More lessons & exercises from anuesther]
Click here to see the current stats of this English test
Please log in to save your progress.
End of the free exercise to learn English: Do - don't - does - doesn't
A free English exercise to learn English.
Other English exercises on the same topics : BE, HAVE, DO, DID, WAS... | Frequent mistakes | All our lessons and exercises | <urn:uuid:a8d6cc70-9175-4557-a17c-f56e8c284d4b> | CC-MAIN-2021-04 | https://www.tolearnenglish.com/exercises/exercise-english-2/exercise-english-117595.php | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506832.21/warc/CC-MAIN-20210116165621-20210116195621-00585.warc.gz | en | 0.903041 | 591 | 2.59375 | 3 |
2Ok… what’s it all about?The poem puts us in the mind of a renaissance nobleman – A Duke who is showing of a portrait of his late wife.Showing off your art collection was basically the equivalent of rap stars today displaying their bling.
3Ok..what happens next?He tells us about her personality which was a sunny (foolish?) one – easily pleased by everything.She was VERY flirtatious…He explains the orders that he eventually decided to give…He reveals that the picture is normally hidden behind a curtain.
4Section 1That's my last duchess painted on the wall, Looking as if she were alive. I call That piece a wonder, now: Frà Pandolf's hands Worked busily a day, and there she stands.= There is the picture of my wife – painted by Fra Pandolfo – it’s good isn’t it!Notice that he doesn’t call her by name – why?
5Section 2Will't please you sit and look at her? I said "Frà Pandolf" by design, for never read Strangers like you that pictured countenance, The depth and passion of its earnest glance, But to myself they turned= Will you sit and have a look? I’m name dropping but it is by Fra Pandolf!= Doesn’t she have a strange look on her face? I bet you wonder why.Why is he name dropping the painter’s title?
6Section 3(since none puts by The curtain I have drawn for you, but I) And seemed as they would ask me, if they durst, How such a glance came there; so, not the first Are you to turn and ask thus.= You’re not the first to ask why she has such a strange look…Predict why her look is so very strange if you can…
7Section 4Sir, 'twas not Her husband's presence only, called that spot Of joy into the Duchess' cheek: perhaps Frà Pandolf chanced to say "Her mantle laps "Over my lady's wrist too much," or "Paint "Must never hope to reproduce the faint "Half-flush that dies along her throat": such stuff Was courtesy, she thought, and cause enough For calling up that spot of joy.=It wasn’t my presence that brought her a joyful expression – perhaps she had a compliment from the painter.Why doesn’t the woman look totally joyful – why is there ‘just a spot’ of joy?
8Section 5She had A heart how shall I say? too soon made glad, Too easily impressed; she liked whate'er She looked on, and her looks went everywhere. Sir, 'twas all one! My favor at her breast, The dropping of the daylight in the West, The bough of cherries some officious fool Broke in the orchard for her, the white mule She rode with round the terrace all and each Would draw from her alike the approving speech, Or blush, at least.= Unfortunately she was easily pleased and would flirt with and be flattered by everyone…
9Section 6She thanked men good! but thanked Somehow I know not how as if she ranked My gift of a nine-hundred-years-old name With anybody's gift. Who'd stoop to blame This sort of trifling?= She had an eye for favours from men but didn’t thank me for the honour of my ancient name.
10Section 6Even had you skill In speech which I have not to make your will Quite clear to such an one, and say, "Just this "Or that in you disgusts me; here you miss, "Or there exceed the mark" and if she let Herself be lessoned so, nor plainly set Her wits to yours, forsooth, and make excuse, E'en then would be some stooping; and I choose Never to stoop.= She didn’t respect me and I wasn’t going to put up with that!
11Section 7Oh sir, she smiled, no doubt, Whene'er I passed her; but who passed without Much the same smile? This grew; I gave commands; Then all smiles stopped together. There she stands As if alive.I had her killed…Or did I?...
12Section 8Will't please you rise? We'll meet The company below, then. I repeat, The Count your master's known munificence Is ample warrant that no just pretense Of mine for dowry will be disallowed; Though his fair daughter's self, as I avowed At starting, is my object. Nay we'll go Together down, sir. Notice Neptune, though, Taming a sea-horse, thought a rarity, Which Claus of Innsbruck cast in bronze for me!= Want to see some of my other trophies? Look there is a sculpture of Neptune!
13The Dramatic Monologue This is THE most important formal concern of the poem. You MUST mention it!A speaker (clearly not the poet) tells a story.There is a an audience, or other person listening – we don’t know who.The form is designed to reveal psychological truths or insights into the speaker.
14Issues that poem brings up… The ownership of women by men. He has his wife killed but keeps her portrait like a trophy.What does the end of the poem suggest about the attitudes of the time?What does Browning suggest is the same as his wife?Did the Duke have her killed or not?Why was he so bothered about his name? | <urn:uuid:047579ba-e64f-47b9-b95a-ea3320f7c38d> | CC-MAIN-2017-26 | http://slideplayer.com/slide/2342397/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323970.81/warc/CC-MAIN-20170629121355-20170629141355-00342.warc.gz | en | 0.973089 | 1,180 | 2.609375 | 3 |
Horn of Africa Drought & Famine 2011
Millions of children caught in food crisis need urgent aid.
More than 10 million people across the Horn of Africa are in dire need of humanitarian assistance due to a deadly combination of drought, escalating food prices and armed conflict. Hundreds of thousands of children are facing death due to starvation.
Among the most vulnerable to the drought and famine are 2 million children under the age of five in Somalia, Kenya, Ethiopia and Djibouti.
Malnutrition rates are at critical levels as the region suffers its worst dry spell in 50 years, compounded by rising food prices. The United Nations has declared famine in two regions of Somalia, and thousands of families are crossing the border into neighboring countries to escape starvation.
Refugees are streaming into neighboring countries, with many mothers being forced to leave their dying children and flee the drought-stricken areas. Many children are dying mid-journey on what have been called “roads of death.”
A top concern for aid workers now is to make sure enough supplies are available along the roads where Somalis are evacuating and where so many children are being tragically left for dead.
Reports say that at present, food distribution points are overwhelmed, with the highest price being paid by children whose bodies are not able to withstand the hunger and malnutrition.
Amsha Africa Foundation and its partners are working to send over 10 tonnes of meals ready to eat, water, and relief supplies to the affected areas in Northern Kenya.
Each Meal, Ready to Eat (MRE) provides about 1,200 Calories (1,200 kcal or 5,000 kJ). They are intended to be eaten for a maximum of 21 days, and have a shelf life of three years.
We have dispatched these food supplies from Nairobi and transported them to various locations in Northern Kenya, where it is most needed.
AAF supplies being loaded into a truck to be transported to areas in Northern Kenya hit by dought and famine.
Refugees lining up to receive food aid delivered by AAF outside the Ifo refugee camp outside Daadab,Kenya.
AAF volunteers distributing food aid to refugees outside the Ifo refugee camp outside Daadab, Kenya.
A Somali refugee quenching thirst from bottled water distributed by AAF.
The situation in the Horn of Africa is the world's worst humanitarian disaster and is deteriorating daily.
Help us continue this critical lifeline. Food is scarce, and over 2 million children's life are at risk. $10 can feed a child for 10 days.
AAF and its partners is urgently trying to raise more money right now in order to address this problem and prevent more people from dying. That’s where you and a handful of Amsha Africa Foundation supporters can make a difference right now.
Click on the link below to help save kids and families from starvation!
Donate to save children in the Horn of Africa drought crisis | <urn:uuid:1637b300-2011-4d2d-a20a-6465eae8d660> | CC-MAIN-2013-20 | http://www.amshaafrica.org/projects-and-clients/current-projects/drought-a-famine-relief.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00099-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.957336 | 605 | 2.9375 | 3 |
MISSISSIPPI TOURIST INFORMATION: (800) 647-2290
State Capitol, Jackson ((601) 359-3114
Completed in 1903 the Mississippi Capitol is patterned after the nation's capitol in Washington, DC. It exemplifies the Beaux Arts Classical style of architecture and features an eight-foot, solid copper eagle covered in gold leaf. The eagle, with its 15 foot wing span, perches on the top of the dome. The Rotunda walls inside are made of Italian white marble with black cast iron balustrades encircling it.The dome in the Senate Chambers is Belgian stained glass. (Note: unlike other statehouses, Mississippi's Senate and House chambers place the Speaker's podium in the rear of the room, rather than the front, so when visitors walk in, they must turn around to face the speaker.) Today the Mississippi Capitol is often referred to as the "New Capitol" to distinguish it from the 1850 capitol described below.
Check it out . . . In front of the building's entrance is an elegant statue dedicated to "Confederate Women." Inscribed on each of the four panels is a poem dedicated to: "Our Mothers" (facing east), "Our Daughters" (facing west), "Our Sisters"(facing north), and "Our Wives" (facing south).
Old State Capitol Museum of Mississippi History, Jackson (601) 359-6920
The Old State Capitol, built in 1839, reflects the democratic sweep acros the country as a result of the Jackson presidency where the "common man" reigned supreme. As a result of this national mood the legislative chambers of this state Capitol were intentionally given more architectural style and grace than the governor's office. It was in these legislative chambers in 1861 where the papers for the Ordinance of Secession were signed. The focal point of the building is its center staircase, suspended from three floors circling the elaborate Rotunda like a large curlicue ribbon. The Rotunda rises 94 feet from the polished limestone floor to top of the elegant dome adorned in Gilt rosettes at its base. The Old Capitol is now a museum featuring exhibits on Mississippi's history from 16th century Native Americans to the award-winning exhibit of the African Americans' Civils Rights struggle in the 20th century -- the first Civil Rights exhibit in the US. Admission is Free.
Check it out . . .We were delighted to find another 1948 French "Merci Train" boxcar, restored and permanently displayed on the Capitol grounds. The "Merci Train" was a train of 48 boxcars (one for each state at the time) filled with gifts given to the American states from the French people in appreciation of the 1945 American "Friendship Train" boxcars which had been filled with food, given by the American people to war-ravaged France. Inside the museum are some of the gifts France offered to the State of Mississippi.
Vicksburg National Military Park, Vicksburg (601) 636-2199
The Military Park museum shows a film about General Grant's six-week Siege of Vicksburg and General Pemberton's desperate defense of the last Confederate bastion on the Mississippi River. More than 100,000 Gray & Blue soldiers occupied the city, overcrowding its 3000 residents, or "noncombatants," who were forced to live in hurriedly arranged cave dwellings built into the city's clay bluffs. After exploring the museum, visitors are encouraged to drive around the various battlefield sites within the park. Blue markers show Union advances, Red markers show Confederate defenses. A quick scan of the area, dotted in hundreds of red and blue markers, shows how close the enemies were and how dreadful a battle it must have been. And yet the park is so serene today. Beautiful green lawns trimmed in honeysuckle and white Japanese Pinchette bushes perfume the battlefield park in a heady smell of thick, sweet fragrance. Elegant memorial buildings and statues donated from each state, pay a special honor to this tragic time.The driving tour of the battlefield ends at the Vicksburg National Cemetery where 17,000 Union soldiers are buried, only 4,000 of whom are identified. Those whose names are known have standard gravestones, the numerous, nameless dead have just a round stub of a stone marking their final resting place.Very sad. Just beyond the National Cemetery is the USS Cairo Museum which houses the artifacts collected from the Civil War ironclad gunboat, raised in 1961, one hundred years after the it was sunk. Just outside the museum is the restored skeleton framework of the ironclad itself where visitors can walk the deck and learn, firsthand, about these incredible, "unsinkable" warships.
Vicksburg Old Courthouse Museum, Vicksburg (601) 636-0741
This exquisite pre-Civil War public building is a majestic structure that overlooks the city from Vicksburg's highest hill. Easily seen from boats on the river below, the massive building dominates the scene in many pre-Civil War illustrations and photos of Vicksburg. The interior rooms feature an ornate cast iron staircase, railings and an intricately designed judge's dais. From the clock tower of this historic building Union troops raised the Stars and Stripes on July 4, 1863, signifying the end of the 47-day siege. Having survived Grant's siege, this building where Jefferson Davis had launched his political career now houses rare Confederate artifacts such as, a never-surrendered Confederate battleflag, the inaugural tie worn by Jefferson Davis, as well as portraits, china, silver and antique furniture from the period.
McRaven Mansion, Vicksburg (601) 636-1663
Built in three different periods, this unusual Southern mansion holds the unique distinction of having preserved three types of architecture in one private dwelling: the 18th century Frontier style, the early 19th century Empire style, and the mid-19th century Greek Revival style. One of the most unusual artifacts is a portable sewing kit that belonged to Mrs. Bobb, a former mistress of the home. The sewing kit looks like a big key ring that might have hung from a jailer's beltloop during medieval days, but instead of holding keys to a jail, the brass ring holds dangling sewing tools: a pair of scissors, needles, thimbles, and thread. Mrs. Bobb carried this brass ring of sewing instruments under the folds of her skirt, ever ready to make a quick, discreet repair when necessary.
Natchez Trace Parkway, (Nashville to Natchez) (800) 305-7417
This scenic highway may well be the most historic road in America. First appearing about 8,000 years ago as a buffalo trace, it became a favorite footpath and trade route for early Native Americans, and was also used by explorer Hernando de Soto and his men in 1540. By the late 18th century farmers from the Ohio River Valley began floating their goods down the Mississippi River to markets in New Orleans, and after selling everything --including their flatboats -- would walk home on this trail laden with their earnings. These heavy pursed, peripatetic merchants were easy targets for swindlers and highway robbers who populated the thickly wooded,unpoliced trail. Many a farmer never returned home. Even Meriwether Lewis met his mortal fate on this treacherous roadway. Now managed by the National Parks Service this 500-mile road has fascinating Historical Markers that tell frightening tales of disease, crime and espionage at various points along its north-to-south path. From the road's highest point north, in Nashville to it's final stop in New Orleans, the road is filled with interesting tales.
Tip: A book entitled, "The Devil's Backbone" is a great way to learn more details about some of the horrendous tales associated with this historic road.
Natchez Visitor Center, Natchez (800) 996-2824
Begin your tour of Natches here. This enormous Visitor Center features a fabulous film about this old Southern town, one of the most famous for its fantastic collection of antebellum mansions. After the film, help yourself to a free soda or coffee and tour the photo exhibits and topographical map of the area. Plan your visit well, for the town is full of colossal mansions, riberboat casinos, museums, churches, and the bawdy antebellum redlight district, "Natchez-Under-the-Hill," now a respectable riverfront restaurant and shopping area.
Tip: There are so many exquisite antebellum mansions in Natchez, but time limited us to visiting only three. These are the three that most appealed to us, either for their historic significance or for their unusual style. Study the different brochures, and talk to the representatives at the center to help you determine which mansions will best satisfy your goals for learning more about Natchez's antebellum estates. Of course you could always opt to take a bus tour for a quick curbside viewing of all of them, and then visit the interiors of the mansion that best piqued your interest.
Natchez National Historical Park, Natchez (800) 305-7417
Good climate, inexpensive fertile land, readily available credit, slave labor, and its location on the Mississippi River made Natchez a major center of the South's cotton culture and economy and the National Historical Park has preserved many of the buildings and recreated the gardens that showcase this vanquished lifestyle. The 1848 Greek Revival mansion, Melrose Estate, is the centerpiece of the park, representing an era of wealth and luxury. Preserved as a plantation, this spacious estate contains formal gardens, outbuildings, cisterns, slave quarters, privies, stables and a carriage house.
Stanton Hall, Natchez (601) 446-6631
One of the most visited National Historic Landmarks in America, this enormous townhouse is located on a tree-shaded hill in the center of town. From the immensive Corinthian columns on the front gallery, to the marble fireplaces, goldleaf mirrors and Sheffield silver knobs and hinges that accentuate that handmade rosewood furnishings found throughout the interior, it's obvious that no expense was spared when building this 1857 white stucco mansion. With a hotel and restaurant on the premises, visitors can tour the mansion, have a meal, and spend the night in a state of sheer elegance.
Rosalie, Natchez (601) 446-6631
Located on a high bluff overlooking the Mississippi River, Rosalie was first a French fort in 1716, named after the beautiful Duchess de Ponchartrain. In 1820 a wealthy lumber mill owner purchased the property and erected an elegant private residence for his family. The large mansion, built in the popular Federalist style, retained it's lovely name, Rosalie, and remained in the family until the Civil War when it was used as Union Headquarters. (General Ulysses S. Grant was a frequent lodger.) This Federal style mansion is enhanced by a wide, white column, double gallery with Colonial fanlights above the exterior doors.
OUR CAMPSITE FOR THE WEEK
Isle of Capri Casino Campground, Vicksburg (601) 636-5700
This campground is wonderful! Only $88 per week, for a free telephone hookup at every site, cable TV, pool, jacuzzi and free shuttle bus to casino. The hosts are friendly and efficient. The facilities are sparkling clean, and the office provides free coffee all day long. They also provide a swimming pool -- with comfortable cushioned, swivel poolside chairs under a lovely shade arbor. A jacuzzi, by the pool completes this delightful retreat. The grounds are parking lot style, with patches of grass between each RV site. However, newly planted trees promise a bit more atmosphere in the future. The RV Park is across the street from the overlook of one of the most beautiful and most photographed sections of the Mississippi, where two parallel bridges head west toward Louisiana. A free shuttle bus transports gamblers or buffet enthusiasts down the road to the Isle of Capri Casino, a coral colored festive place where a real live parrot greets each visitor. The RV Park offers coupons for discounts on some of the buffets, so check with them before going to the casino. Also, if you stop at the casino -- before going to the campground -- you can apply for a free Isle of Capri Gold Card which offers other incentives and discounts -- including a 20 percent discount on the RV Park. | <urn:uuid:b6856a50-186a-4cf1-822f-851137d28c37> | CC-MAIN-2018-34 | http://www.postcardsfrom.com/travt/travt-ms.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210304.2/warc/CC-MAIN-20180815200546-20180815220546-00450.warc.gz | en | 0.939208 | 2,610 | 2.6875 | 3 |
IF YOU WANTED to write a history of the Internet, one of the first things you would do is dig into the email archives of Vint Cerf. In 1973, he co-created the protocols that Internet servers use to communicate with each other without the need for any kind of centralized authority or control. He has spent the decades since shaping the Internet’s development, most recently as Google’s “chief Internet evangelist.”
Thankfully, Cerf says he has archived about 40 years of old email—a first-hand history of the Internet stretching back almost as far as the Internet itself. But you’d also have a pretty big problem: a whole lot of that email you just wouldn’t be able to open. The programs Cerf used to write those emails, and the formats in which they’re stored, just don’t work on any current computer you’d likely be using to try to read them.
As fragile as paper is, written documents and records have long provided historians with a wealth of insight about that past that often helps shape the present. And they don’t need any special technology to read them. Cerf himself points to historian Doris Kearns Goodwin’s 2005 bestseller Team of Rivals, which she based on the diary entries and letters of Abraham Lincoln and his cabinet members. The book influenced how President Obama shaped his own cabinet and became the basis for the Steven Spielberg film Lincoln. In short, old records are important. But as Cerf’s own email obsolescence shows, digital communications quickly become unreadable.
Don’t believe it? What would you do right now if you wanted to read something stored on a floppy disk? On a Zip drive? In the same way, the web browsers of the future might not be able to open today’s webpages and images–if future historians are lucky enough to have copies of today’s websites at all. Says Cerf, “I’m concerned about a coming digital dark ages.”
That’s why he and some of his fellow inventors of the Internet are joining with a new generation of hackers, archivists, and activists to radically reinvent core technologies that underpin the web. Yes, they want to make the web more secure. They want to make it less vulnerable to censorship. But they also want to make it more resilient to the sands of time.
The Permanent Web
Today, much of the responsibility for preserving the web’s history rests on The Internet Archive. The non-profit’s Wayback Machine crawls the web perpetually, taking snapshots that let you, say, go back and see how WIRED looked in 1997. But the Wayback Machine has to know about a site before it can index it, and it only grabs sites periodically. Based on the Internet Archive’s own findings, the average webpage only lasts about 100 days. In order to preserve a site, the Wayback Machine has to spot it in that brief window before it disappears.
What’s more, the Wayback Machine is a centralized silo of information—an irony that’s not lost on the inventors of the Internet. If it runs out of money, it could go dark. And because the archives originate from just one web address, it’s relatively easy for censors, such as those in China, to block users from accessing the site entirely. The Archive Team–an unrelated organization–is leading an effort to create a more decentralized backup on the Internet Archive. But if Internet Archive founder Brewster Kahle, Cerf, and their allies who recently came together at what they called the Decentralized Web Summit have their way, the world will one day have a web that archives itself and backs itself up automatically.
Some pieces of this new web already exist.Interplanetary File System, or IPFS, is an open source project that taps into ideas pioneered by the decentralized digital currency Bitcoin and the peer-to-peer file sharing system BitTorrent. Sites opt in to IPFS, and the protocol distributes files among participating users. If the original web server goes down, the site will live on thanks to the backups running on other people’s computers. What’s more, these distributed archives will let people browse previous versions of the site, much the way you can browse old edits in Wikipedia or old versions of websites in the Wayback Machine.
“We are giving digital information print-like quality,” says IPFS founder Juan Benet. “If I print a piece of paper and physically hand it to you, you have it, you can physically archive it and use it in the future.” And you can share that copy with someone else.
Unlike the early web, the web of today isn’t just a collection of static HTML files. It’s a rich network of interconnected applications like Facebook and Twitter and Slack that are constantly changing. A truly decentralized web will need ways not just to back up pages but applications and data as well. That’s where things get really tricky–just ask the team behind the decentralized crowdfunding system DAO which was just hacked to the tune of $50 million last week.
The IPFS team is already hard at work on a feature that would allow a web app to keep trucking along even if the original server disappears, and it’s already built a chat app to demonstrate the concept. Meanwhile, several other projects– such as Ethereum, ZeroNet and the SAFE Network—aspire to create ways to build websites and applications that don’t depend on a single server or company to keep running. And now, thanks in large part to the Summit, many of them are working to make their systems cross-compatible.
Even if the web winds up in a new, better of digital archive, plenty of problems still remain. Today’s web isn’t just a collection of static HTML files; it’s dynamic apps like Facebook, Twitter, and Slack. The operating systems and hardware of the future might not be able to read or run any of those. The same holds true for videos, photos, maybe even text.
Many efforts are afoot to right those weaknesses. But why bother?
After all, if anyone really cares about a specific file or site, can’t they just transfer the files to newer media and convert the most important files to newer formats? The problem with that line of thinking, Cerf says, is that people often don’t always know what’s important right away. For example, sailors have kept meticulous records of weather and temperatures in locations all over the world for centuries. That sort of information probably seemed useless, the sort of thing geeks of old preserved out of a vague sense of historical purpose. But guess what: climate scientists may find all that weather data very valuable. (TheOld Weather project is now hard at work digitizing those old ship logs.)
Still: some websites just shouldn’t last forever. Does anyone in the future really need to see old drunken college photos or inadvisable Facebook rants? Meanwhile, activists and law enforcement are trying to stop web publishers from posting nude photos of people without their consent–a practice known as “revenge porn.” These same preservation tools that could make it harder for governments to censor the web could make it harder for people to scrub content from the web that shouldn’t be there anyway. People like Snapchat for a reason.
Cerf suggests possible technical workarounds to this problem. Web publishers, for example, could specify whether other people can automatically archive their sites. Bennet says the IPFS team has been considering a feature that would enable the original publisher of a page to un-publish it by sending a beacon to all other servers hosting a page asking for its removal. The IPFS servers could also host blacklists to remove copyrighted material. Still, those blacklists themselves become a reminder of the things we’re trying to forget.
But the biggest problem facing the decentralized web is probably neither technical or legal. And that’s getting people to care in the first place. At a time when people spend most of their time in closed-off platforms like Facebook and Snapchat, so much of what humans digitally produce stays locked up anyway. Bringing people back to the open web is going to mean creating user experiences that are fun enough and easy enough to persuade people to venture out of the confines of today’s app-centric
But Tim Berners-Lee, the creator of the original web, isn’t worried. After all, the open web already beat out walled gardens with names like America Online, Compuserve, and Prodigy. “You can make the walled garden very very sweet,” Berners-Lee said at the summit. “But the jungle outside is always more appealing in the long term.”
source: wired.com by | <urn:uuid:115a7c90-2b9d-4273-b66d-4351ac977840> | CC-MAIN-2021-39 | https://thafcc.wordpress.com/2016/06/21/the-inventors-of-the-internet-are-trying-to-build-a-truly-permanent-web/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058415.93/warc/CC-MAIN-20210927090448-20210927120448-00363.warc.gz | en | 0.934294 | 1,862 | 2.75 | 3 |
Is that Real honey you're eating?
Predominantly the honey on the shelves in retail outlets is rarely pure honey. This means they may contain additives and are usually heat treated. Our honey is cold extracted, hand spun and pure.
There are NO additives in our honey. We practice artisan style beekeeping, being old fashioned, hand crafted with no heat treatment, additives, chemicals or antibiotics. The honey is hand spun using cold extraction. All the techniques and processes from assembling the hives to making the honey frames and harvesting are all done by hand.
"Truth Theory" reported:
Just because those cute little bear-shaped bottles at the grocery store say “honey” on them does not necessarily mean that they actually contain honey. A comprehensive investigation conducted by Food Safety News (FSN) has found that the vast majority of so-called honey products sold at grocery stores, big box stores, drug stores, and restaurants do not contain any pollen, which means they are not real honey.
For the investigation, Vaughn Bryant, one of the nation’s leading melissopalynologists, or experts in identifying pollen in honey, and director of the Palynology Research Laboratory at Texas A&M University, evaluated more than 60 products labeled as “honey” that had been purchased by FSN from ten states and the District of Columbia. FULL ARTICLE CLICK HERE
In "How to recognise real honey" SteadyHealth.com outline a series of tests that you can use to determine whether your honey is "real". FULL ARTICLE CLICK HERE
For further information see: | <urn:uuid:d14581bc-77c4-4b55-b0c2-a93ad5ff0d0e> | CC-MAIN-2017-51 | http://adoptabeehive.com.au/adopting-a-beehive/is-that-real-honey-you-re-eating | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948544124.40/warc/CC-MAIN-20171214124830-20171214144830-00780.warc.gz | en | 0.940682 | 326 | 2.734375 | 3 |
A flag that arose in the colonies as they sought to separate
themselves from the British Empire, the Bunker Hill Flag
was a distinct new banner raised and flown at the Battle
of Bunker Hill. It still contained St. George’s
cross in the canton, but the color of the field was changed
to blue. It was also one of the first American flags
to include the Pine Tree, which would become a lasting symbol
of New England and the Colonies. | <urn:uuid:4747ba37-24da-42a7-aec8-a7cfa4ae563d> | CC-MAIN-2017-09 | http://annin.com/products/flag_hist_bunker_hill.asp | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00541-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955539 | 100 | 3.4375 | 3 |
Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Hawaiian Mythology!
By Nina :)
There are 4 Major gods:
Kane- the father of the living, the most important of the 4
Ku- the "creator"
Lono- the director of the elements
Kanaloa- controls the Underworld and ocean, close companion of Kane
Kanaloa- god of underworld, ruler of ocean
Other Mentionable Gods:
Pele- goddess of volcanoes and fire
Rangi- god of sky
Papa- goddess of earth
Haikili- god of thunder
Kamohoali'i- god of sharks
Nu'akea- goddess of milk
Paka'a- god of wind
Hina- goddess of moon
Pele- goddess of volcanoes and fire
Po- great void in time of darkness, before memory
Mana- spiritual energy inside everybody, you can gain and lose mana in everything you do
Nightmarchers- ghosts of Hawaiian warriors
Paliuli- equivalent of the Garden of Eden
La'ieikawai and twin La'ielohelohe- princesses who lived in Paliuli
Pele- goddess of volcanoes and fire
The Nightmarchers- ghosts of Hawaiian warriors
The Creation Story
In the Beginning, there was always 4 main gods (Kane, Ku, Lono, Kanaloa) who fought the power of Po (chaos).
By the power of the four, light was brought to Po. After this, Kane took a gourd and threw it high in the air where it broke in two. One piece curved into a bowl and became Sky. The seeds scattered and became stars. The remainder of the gourd fell down and became Earth.
Kane gave the sky to god, Rangi and the Earth to Rangi's love, Papa. To the god, Kanaloa, did Kane give the domain of the sea. To Ku, Kane gave the forests and to Lono he gave food and plants to eat.
Kane proclaimed he was going to create a great Chief to rule all of Earth. To prepare, he filled Earth with living things: caterpillars to make butterflies, eggs to make birds and fish.
Once Kane finished, he told the gods they must find the material to construct the Chief so they searched far and wide. One day, they found a mound of rich, red earth. Kane took the earth and fashioned a man from it, breathing life into it as he did so.
The man walked about and spoke. Kane was pleased. They called him Kumu-honua and proclaimed him the first son of Rangi Sky and Papa Earth. Afterwards, a woman was created. They called her Ke-ola-ku-honua.
The newly created pair was placed in a paradise called Paliuli. It was filled with everlasting waters that if you sprinkled it on the dead, they would be restored to life.
Kumu-honua and Ke-ola-ku-honua soon had a son, Wakea, and his wife, Lihau'ula. It is said that all priests and chiefs have descended from them.
Hina- the goddess of the moon
The Menehune were a mischievous group of small people, or dwarfs, who lived in the forests of Hawaii. They were said to be as big as 2 feet tall, or as tiny as the palm of your hand. They enjoyed dancing, singing, archery, and their favorite foods were bananas and fish.
The Menehune were known to use their magic arrows to pierce the heart of angry people, igniting their feelings of love instead. They also enjoyed cliff diving, according to local lore, and were excellent craftsmen. They were rarely seen be human eyes.
The Menehune used their great strength to build great temples and other structures throughout Hawaii. One famous creation is the Alekoko Fishpond that was built in only 1 night. It is said that the fishpond was built for a princess. The Menehune worked at night, so as not to be seen.
The Menehune warned everyone to not watch them at work. However, one night the princess and her brother snuck up after dark and watched the thousands of Menehune at work, only to fall asleep. At sunrise, the Menehune discovered them and turned them into twin stone pillars that can be seen today. Because of this, the Menehune didn't finish the fishpond and left two gaps in the wall. Many generations later, Chinese settlers filled the gaps, but the stonework that closed the gap was far worse to that of the mystical Menehune.
Even though the Menehune were said to have scattered when the first settlers arrived in Hawaii, some people still believe that the Menehune are always roaming the islands, carrying out tricks on people.
How Hawaiian Mythology shapes their culture
According to legend, the first hula occurred when Pele (goddess of fire and volcanoes) asked her sisters to entertain her. Only Pele's youngest sister, Hi'iaka obeyed. Hi'iaka performed a graceful dance for Pele. Today, the Hula is an art form and significant practice that embraces and perpetuates Hawaiian history, legend, and culture.
Aia la o Pele
(Pele is at Hawaii)
Today, Hawaiian elders still sing a traditional chant, Aia la o Pele. It describes Pele (goddess of volcanoes and fire) as the Hawaiians saw her, a beautiful creator. It expressed their love for her and for the land that they lived on.
Aia lä `o Pele i Hawai`i, `eä
Ke ha`a mai la i Maukele, `eä
`Ühï`ühä mai ana, `eä
Ke nome a`e la i`ä Puna, `eä
Ka mea nani ka i Paliuli, `eä
Ke pulelo a`e la i nä pali,`eä
Aia ka palena i Maui, `eä
`Äina o Kaululä`au, `eä
I hea käua e la`i ai, `eä
I ke alanui a`e li`a nei, `eä
Ha`ina `ia mai ka puana, `eä
No Hi`iaka nö he inoa, `eä
Pele is at Hawai`i
She is dancing at Maukele
She surges and puffs this way
Devouring the land of Puna
It makes Paliuli beautiful
Fire tongues leaping at the cliffs
It is heard at Maui
Land of Kaulula`au
Where will we find peace?
Oh, how we yearn on the road
The end of my song
A name song for Hi`iaka
Hawaiian Mythology's View On...
Death and Dreams
Hawaiians believe that the soul is very separate from the body, that it almost has its own life. They think that when you die, your soul goes to the Underworld but your body stays on Earth. Also, when you dream, your body sleeps but your soul drifts though space. However, Hawaiians believe that if your soul drifts too far, it could be captured and prevented from returning to its body. So some people perform ancient rituals where they place a wreath around your head, not allowing that person to dream.
Happiness and Success
Here's a myth to explain what not to do to be happy/successful
The Greedy Chief Hala'ea
There once was a greedy chief named Hala'ea. Every day, the local fishermen would set off in the early morning to go to work. They worked very hard to get the fish to their families. But every evening when they returned to shore, the chief demanded to give him all their fish that they had caught. Then he would hold a feast, wasting the food with no regrets. As for the hardworking fishermen, they had to return home to their families with nothing for them to eat.
Eventually, the people decided that they could not let the chief continue to help himself to all their fish, so they came up with a plan to rid themselves of this misery. It was the fishing season of 'ahi (yellowfin tuna), and one morning the fishermen woke up early to prepare their canoes for their sneaky expedition.
Then they paddled out to sea, much earlier than usual and started to fish. They returned that evening and again, the greedy chief shouted to give them the fish. The fishermen obeyed and separated the canoes so that they were on both sides of the chief's canoe and began dumping the fish inside. The chief was so overcome by the large amount of fish that he didn't even notice the men poking holes in his canoe and it was beginning to sink!
When the fisherman unloaded all their fish, they quickly paddled away without looking back. By the time Hala'ea saw that he was sinking, it was too late. He looked for help, but nobody was there. Some say that the chief was lost under the waves. Others claim that he was swept away from the current that carried his name, Hala'ea. Nonetheless, the chief perished and the fishermen rejoiced and lived long happy lives eating all their fish.
Don't take the lava rock home with you!
Every stone in Hawaii belongs to Pele (goddess of volcanoes and fire). If you go to Hawaii, you better not take a rock home because you will have (dun dun dun!) Pele's Curse! Pele will unleash her wrath by sending you loads of bad luck. So don't take anything! Besides, it's illegal!
Be careful if you plan on doing any night hikes or midnight beach strolls!
The night marchers are ghosts of ancient Hawaiian warriors and they're said to roam the islands at night visiting old battlefields and sacred sites. If you hear chanting, drums or marching, you're best bet is to run indoors or to lie quietly on your stomach -- if you make eye contact with the night marchers, you'll die and be forced to march with them for all of eternity. If you happen to have an ancestor marching, however, no one in the procession can harm you.
Go look for the Naupaka flower!
The naupaka is one of Hawaii's most common plants. Observers may notice that the flowers appear to have been torn in half. According to Hawaiian legend, Naupaka was a beautiful princess who fell in love with a commoner named Kauai. The star-crossed lovers could never marry so Naupaka vowed to stay in the mountains while Kauai remained along the ocean. Before parting for the very last time, Naupaka took the flower from her hair and tore it in half, giving it to Kauai. The very next day the nearby plants began to bloom only half flowers in honor of the separated lovers.
Wait! Don't leave! Remember these five things and i will be happy :)
1.) There are four major gods
2.) Man was created in Kane's image
Play us Out!
3.) The first man was named Kumu-honau
5.) The Hula was influenced by Hawaiian Mythology
4.) All chiefs and priests are said to be descendants of Rangi (sky) and Papa (earth)
Haikili- god of thunder
Wait! One more thing... | <urn:uuid:f417de92-3bce-482c-8b68-610b7e9079d1> | CC-MAIN-2017-30 | https://prezi.com/zl_d7uecnpl1/hawaiian-mythology/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426086.44/warc/CC-MAIN-20170726082204-20170726102204-00173.warc.gz | en | 0.955602 | 2,575 | 2.640625 | 3 |
Africans & Cell Phone Usage
NAIROBI, Kenya 16 September 2005
AFRICANS ADAPT CELL PHONE TECHNOLOGY TO SUIT CONTINENT'S HARSH REALITIES
Putting cell phone technology into the hands of Africans has resulted in ingenious solutions to everyday problems on the world's poorest continent - and in huge growth in the telecommunications business. Kenyan and South African researchers have used cell phones to monitor wildlife.
Fishermen and farmers can quickly gather information from several areas to help determine where and when they can get the best prices for their produce. Africans have even found a way to turn airtime into a virtual currency. All this on a continent whose people were long considered too poor to afford cell phones.
"We all misread the market," said Michael Joseph, chief executive officer of Safaricom, one of two service providers in Kenya. Joseph said the market was underestimated because entrepreneurs relied on data about the formal economy, such as GDP figures. That ignored a "very strong and informal economy, which allows Africans to live beyond the figures indicated by official statistics," said Martin de Koning, corporate communications chief for Celtel, one of Africa's leading cell phone companies.
The relatively low use of landlines may also have fooled entrepreneurs. But Africans didn't pass up land lines because they didn't want phones. The problem was that getting connected was difficult for the unemployed or informally employed, people without the cash deposit and patience to wait months for a connection. Landlines are also often out of service because of poor maintenance and theft of copper cables.
Cellular subscribers accounted for 74.6 percent of all telephone subscribers in Africa in 2004, according to the U.N.'s International Telecommunication Union, which is responsible for standardization, coordination and development of international telecommunications. Africa now has the fastest growing mobile phone industry in the world -with some 100 million of its estimated 870 million people listed as subscribers, Celtel's Chairman Mo Ibrahim said. Last year, the number of subscribers in Africa south of the Sahara increased by 67 percent, compared to 10 percent in Western Europe.
There were more new mobile phone customers in Africa than in North America, Ibrahim said. The growth is being realized even as African governments seek to reap huge revenues from subscribers and service providers in the form of high license fees, customs duties, special mobile call taxes and other charges. In Africa, mobile communications have created a US$25 billion (?20.3 billion) industry that did not exist 10 years ago. Of this, some US$2 billion (?1.62 billion) from hundreds of thousands of indigenous entrepreneurs selling calling credit, Celtel's Ibrahim said. The uses to which Africans have put all those phones offer insight into life on their continent.
Cash-strapped wildlife researchers in Kenya and South Africa have put no-frills cell phones in weatherproof cases with a GPS receiver, memory card and software to operate the system. The unit, placed on a collar, is then tied around the neck of an elephant. As the elephants roam, "the GPS receives coordinates, downloads them onto the memory chip - and then every hour, the phone wakes up and sends a (short text message) of the last hour's coordinates to a central server," said Safaricom Joseph.
Then the phone goes to sleep until it's needed again, preserving battery power. The technology has enabled South Africa's researchers to save up to 60 percent in costs for tracking wildlife, said Professor Wouter van Hoven of the University of Pretoria's Center for Wildlife Management. Fisherman Omar Abdulla Saidi, standing beside a fishing boat propelled by a triangular sail in Zanzibar, an Indian Ocean archipelago off Tanzania, uses his cell phone to track markets.
The same is true for farmers, said Amina Harun, 45, who has grown and sold mangoes, oranges and other fresh fruits for 18 years in neighboring Kenya's port city of Mombasa. Harun said cell phones ended the days when she had to walk for hours, searching for a working public phone to call traders in various markets to find the best prices for produce from her six-acre (2.43-hectare) farm.
Thanks to cell phones, "we can easily link up with customers, brokers and the market," Harun said, seated between two piles of watermelons at Kenya's largest fresh fruit and vegetable trading center, the Wakulima Market. Wilson Kuria Macharia, head of the traders' association at the market, said he no longer has to spend between two weeks and a month traveling across Kenya and neighboring Tanzania in search of fresh vegetables. "A few mobile phone calls take care of what used to be the most grueling part of the business," Macharia, 61, said as workers offloaded a truckload of carrots.
Good communications have also brought stiffer competition between traders - translating to better prices for farmers, said Macharia who has been in the business for 41 years. People have opened public telephone centers linked to cell phone networks across Africa, creating much-needed employment. One service allows subscribers to transfer prepaid call credit, or airtime, from one phone to another through short text messages.
"Airtime is a currency of sorts. You can sell airtime and you can get real money. Or you can trade that airtime for something else to somebody else, who can then sell that airtime again," Safaricom's Joseph said. The ability to trade in airtime is useful in Africa, where the costs of transferring small amounts of money through banks or other financial institutions are relatively high, he said. "We are developing unique ways to use the phone, which has not been done anywhere else or is unique in Africa," Joseph said. "I always think that (cell phone technology) was designed for Africa, not for Europe - because it is such a perfect fit" for the impoverished continent.
Internet magazine on telecommunications in Africa: http://www.mobileafrica.net
International Telecommunication Union: | <urn:uuid:442c1b12-daab-4137-9a9f-98d1be6c93a2> | CC-MAIN-2021-10 | https://panafricannews.blogspot.com/2005/09/africans-cell-phone-usage-nairobi.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358203.43/warc/CC-MAIN-20210227054852-20210227084852-00293.warc.gz | en | 0.951538 | 1,239 | 2.65625 | 3 |
|Mature Bed Bug
|Tropical Bed Bug
Bed bugs are parasites that preferentially feed on humans. If people aren't available, they instead will feed on other warm-blooded animals, including birds, rodents, bats, and pets.
Bed bugs have been documented as pests since the 17th century. They were introduced into our country by the early colonists. Bed bugs were common in the United States prior to World War II, after which time widespread use of synthetic insecticides such as DDT greatly reduced their numbers. Improvements in household and personal cleanliness as well as increased regulation of the used furniture market also likely contributed to their reduced pest status.
In the past decade, bed bugs have begun making a comeback across the United States, although they are not considered to be a major pest. The widespread use of baits rather than insecticide sprays for ant and cockroach control is a factor that has been implicated in their return. Bed bugs are blood feeders that do not feed on ant and cockroach baits. International travel and commerce are thought to facilitate the spread of these insect hitchhikers, because eggs, young, and adult bed bugs are readily transported in luggage, clothing, bedding, and furniture. Bed bugs can infest airplanes, ships, trains, and buses. Bed bugs are most frequently found in dwellings with a high rate of occupant turnover, such as hotels, motels, hostels, dormitories, shelters, apartment complexes, tenements, and prisons. Such infestations usually are not a reflection of poor hygiene or bad housekeeping.
Bed bugs are fairly cosmopolitan. Cimex lectularius is most frequently found in the northern temperate climates of North America, Europe, and Central Asia, although it occurs sporadically in southern temperate regions. The tropical bed bug, C. hemipterus, is adapted for semitropical to tropical climates and is widespread in the warmer areas of Africa, Asia, and the tropics of North America and South America. In the United States, C. hemipterus occurs in Florida.
Adult bed bugs are brown to reddish-brown, oval-shaped, flattened, and about 3/16 to 1/5 inch long. Their flat shape enables them to readily hide in cracks and crevices. The body becomes more elongate, swollen, and dark red after a blood meal. Bed bugs have a beaklike piercing-sucking mouthpart system. The adults have small, stubby, nonfunctional wing pads. Newly hatched nymphs are nearly colorless, becoming brownish as they mature. Nymphs have the general appearance of adults. Eggs are white and about 1/32 inch long.
Bed bugs superficially resemble a number of closely related insects (family Cimicidae), such as bat bugs (Cimex adjunctus), chimney swift bugs (Cimexopsis spp.), and swallow bugs (Oeciacus spp.). A microscope is needed to examine the insect for distinguishing characteristics, which often requires the skills of an entomologist. In Ohio, bat bugs are far more common than bed bugs.
Female bed bugs lay from one to twelve eggs per day, and the eggs are deposited on rough surfaces or in crack and crevices. The eggs are coated with a sticky substance so they adhere to the substrate. Eggs hatch in 6 to 17 days, and nymphs can immediately begin to feed. They require a blood meal in order to molt. Bed bugs reach maturity after five molts. Developmental time (egg to adult) is affected by temperature and takes about 21 days at 86° F to 120 days at 65° F. The nymphal period is greatly prolonged when food is scarce. Nymphs and adults can live for several months without food. The adult's lifespan may encompass 12-18 months. Three or more generations can occur each year.
Bed bugs are fast moving insects that are nocturnal blood-feeders. They feed mostly at night when their host is asleep. After using their sharp beak to pierce the skin of a host, they inject a salivary fluid containing an anticoagulant that helps them obtain blood. Nymphs may become engorged with blood within three minutes, whereas a full-grown bed bug usually feeds for ten to fifteen minutes. They then crawl away to a hiding place to digest the meal. When hungry, bed bugs again search for a host.
Bed bugs hide during the day in dark, protected sites. They seem to prefer fabric, wood, and paper surfaces. They usually occur in fairly close proximity to the host, although they can travel far distances. Bed bugs initially can be found about tufts, seams, and folds of mattresses, later spreading to crevices in the bedstead. In heavier infestations, they also may occupy hiding places farther from the bed. They may hide in window and door frames, electrical boxes, floor cracks, baseboards, furniture, and under the tack board of wall-to-wall carpeting. Bed bugs often crawl upward to hide in pictures, wall hangings, drapery pleats, loosened wallpaper, cracks in plaster, and ceiling moldings.
The bite is painless. The salivary fluid injected by bed bugs typically causes the skin to become irritated and inflamed, although individuals can differ in their sensitivity. A small, hard, swollen, white welt may develop at the site of each bite. This is accompanied by severe itching that lasts for several hours to days. Scratching may cause the welts to become infected. The amount of blood loss due to bed bug feeding typically does not adversely affect the host.
Rows of three or so welts on exposed skin are characteristic signs of bed bugs. Welts do not have a red spot in the center such as is characteristic of flea bites.
Some individuals respond to bed bug infestations with anxiety, stress, and insomnia. Bed bugs are not known to transmit disease.
A bed bug infestation can be recognized by blood stains from crushed bugs or by rusty (sometimes dark) spots of excrement on sheets and mattresses, bed clothes, and walls. Fecal spots, eggshells, and shed skins may be found in the vicinity of their hiding places. An offensive, sweet, musty odor from their scent glands may be detected when bed bug infestations are severe.
A critical first step is to correctly identify the blood-feeding pest, as this determines which management tactics to adopt that take into account specific bug biology and habits. For example, if the blood-feeder is a bat bug rather than a bed bug, a different management approach is needed.
Control of bed bugs is best achieved by following an integrated pest management (IPM) approach that involves multiple tactics, such as preventive measures, sanitation, and chemicals applied to targeted sites. Severe infestations usually are best handled by a licensed pest management professional.
Do not bring infested items into one's home. It is important to carefully inspect clothing and baggage of travelers, being on the lookout for bed bugs and their tell-tale fecal spots. Also, inspect secondhand beds, bedding, and furniture. Caulk cracks and crevices in the building exterior and also repair or screen openings to exclude birds, bats, and rodents that can serve as alternate hosts for bed bugs.
A thorough inspection of the premises to locate bed bugs and their harborage sites is necessary so that cleaning efforts and insecticide treatments can be focused. Inspection efforts should concentrate on the mattress, box springs, and bed frame, as well as crack and crevices that the bed bugs may hide in during the day or when digesting a blood meal. The latter sites include window and door frames, floor cracks, carpet tack boards, baseboards, electrical boxes, furniture, pictures, wall hangings, drapery pleats, loosened wallpaper, cracks in plaster, and ceiling moldings. Determine whether birds or rodents are nesting on or near the house.
In hotels, apartments, and other multiple-type dwellings, it is advisable to also inspect adjoining units since bed bugs can travel long distances.
Sanitation measures include frequently vacuuming the mattress and premises, laundering bedding and clothing in hot water, and cleaning and sanitizing dwellings. After vacuuming, immediately place the vacuum cleaner bag in a plastic bag, seal tightly, and discard in a container outdoors-this prevents captured bed bugs from escaping into the home. A stiff brush can be used to scrub the mattress seams to dislodge bed bugs and eggs. Discarding the mattress is another option, although a new mattress can quickly become infested if bed bugs are still on the premises. Steam cleaning of mattresses generally is not recommended because it is difficult to get rid of excess moisture, which can lead to problems with mold, mildew, house dust mites, etc.
Repair cracks in plaster and glue down loosened wallpaper to eliminate bed bug harborage sites. Remove and destroy wild animal roosts and nests when possible.
After the mattress is vacuumed or scrubbed, it can be enclosed in a zippered mattress cover such as that used for house dust mites. Any bed bugs remaining on the mattress will be trapped inside the cover. Leave the cover in place for a year or so since bed bugs can live for a long time without a blood meal.
Sticky traps or glueboards may be used to capture bed bugs that wander about. However, the effectiveness of these traps is not well documented.
Residual insecticides (usually pyrethroids) are applied as spot treatments to cracks and crevices where bed bugs are hiding. Increased penetration of the insecticide into cracks and crevices can be achieved if accumulated dirt and debris are first removed using a vacuum cleaner. Avoid using highly repellent formulations, which cause bed bugs to scatter to many places. Dust formulations may be used to treat wall voids and attics. Repeat insecticide applications if bed bugs are present two weeks after the initial treatment since it is difficult to find all hiding places and hidden eggs may have hatched.
Do not use any insecticide on a mattress unless the product label specifically mentions such use. Note that very few insecticides are labeled for use on mattresses. If using an appropriately labeled insecticide on a mattress, take measures to minimize pesticide exposure to occupants. Apply the insecticide as a light mist to the entire mattress, opening seams, tufts, and folds to allow the chemical to penetrate into these hiding areas. Allow the treated surface to completely dry before use. Do not sleep directly on a treated mattress; be sure bed linens are in place. Do not treat mattresses of infants or ill people. Alternatives to using an insecticide on a mattress are discussed in the 'Sanitation' and 'Trapping' sections.
No insecticides are labeled for use on bedding or linens. These items should be dry cleaned or laundered in hot water and dried using the "hot" setting. | <urn:uuid:5ec44dbf-efeb-4be2-8e87-b8adfb6a1281> | CC-MAIN-2017-17 | http://www.resteasy4bedbugs.com/About-Bed-Bugs_ep_7.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121453.27/warc/CC-MAIN-20170423031201-00149-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.939292 | 2,281 | 3.546875 | 4 |
Updated: Jan 27
By Dr. Elizabeth Yehuda
More and more people adopting a healthier lifestyle and are looking for more natural solutions to maintain their bodies. Astaxanthin can be the answer.
Astaxanthin has a broader medical effect on the body compared to most antioxidants, eliminating problematic mechanisms while strengthening the function of various organs in the body.
What is Astaxanthin?
Astaxanthin is a natural dark red pigment belonging to the carotenoid family and is classified as a xanthophyll. The molecular structure of astaxanthin having hydroxyl (OH) and ketone (C=O) ending on each ionone ring grants the molecule with unique properties among them its high antioxidant potency. It has the unique ability to quench free radicals and reactive species of oxygen and to inhibit lipid peroxidation. The natural astaxanthin is considered as “World’s Strongest Natural Antioxidant”. Astaxanthin is considered more potent than vitamin C, β-carotene and Vitamin E.
Astaxanthin can be found in plants, animals, fungi, and bacteria. It is most frequent in algae and phytoplankton. The freshwater microalgae Haematococcus pluvialis is the richest and the main natural source of commercial astaxanthin production. The producing process of astaxanthin occurs naturally as a defense mechanism against harsh environmental conditions.
The following properties and other properties combine to make astaxanthin the most potent antioxidant:
1. Crosses the brain and retinal blood-barrier providing antioxidant and anti-inflammatory protection to the eyes and the brain.
2. Works efficiently as neuroprotection to help prevent a variety of brain-related
illnesses such as dementia and age-related amnesia.
3. Moves efficiently throughout the body providing antioxidant and anti-inflammatory protection at a high-level activity to all the organs in the body and the skin.
4. It attaches itself to the cell membranes and spans the cell membranes bilayer of fat, where the free radical first attack and inhibits the destruction of fatty acids and proteins.
5. Bond with muscle tissue.
6. Works as a super-powerful antioxidant and quickly eliminate free radicals and neutralize singlet oxygen.
For humans, astaxanthin is one of the most powerful natural antioxidants known, with numerous health benefits that are supported by extensive scientific research, including clinical trials. Astaxanthin was shown to decrease the risks of certain chronic diseases related to oxidative stress, supports healthy cardiovascular activity, improves muscle strength, endurance and maintain joint health, and prevent premature skin aging. Additionally, astaxanthin protects the body under stress conditions and has anti-inflammatory and immune-stimulating effects. Astaxanthin has been shown to cross the blood-brain and blood-retinal barriers, therefore it can positively affect disorders related to eye, brain and central nervous system, among others.
For the past few decades, astaxanthin has important applications in the nutraceutical, cosmetics, natural food, and animal feed industries. Nevertheless, there is a huge potential that hasn't yet been exploited and can be expanded and deepened.
At Puremagics, we believe in spreading the magic to people looking for a healthier life, by developing and producing natural products containing Astaxanthin in a wide range of application. | <urn:uuid:8d78bfbe-7551-4f4c-9705-8cd3f6d2ad43> | CC-MAIN-2020-50 | https://www.puremagics.com/post/what-is-astaxanthin | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141735600.89/warc/CC-MAIN-20201204101314-20201204131314-00317.warc.gz | en | 0.905509 | 703 | 3.28125 | 3 |
Title: Heteromeles arbutifolia (Lindl.) M. Roemer: Christmasberry
Author: Meyer, Susan E.
Source: In: Bonner, Franklin T.; Karrfalt, Robert P., eds. The Woody Plant Seed Manual. Agric. Handbook No. 727. Washington, DC. U.S. Department of Agriculture, Forest Service. p. 585-587.
Publication Series: Miscellaneous Publication
Description: The genus Heteromeles has only a single species - H. arbutifolia (Lindl.) M. Roemer, also known as H. salicifolia (K. Presl.) Abrams (Phipps 1992). It is closely related to the large tropical genus Photinia Lindl., to which it has sometimes been referred. Christmasberry, also known as toyon, California holly, and hollywood, is a long-lived shrub or small tree, 2 to 10 m in height, that sprouts freely after fire from a subterranean burl. It has shiny, leathery, evergreen leaves that are sharply toothed along the margins. A common constituent of chaparral vegetation throughout California and Baja California, it is usually found on less harsh, more mesic microsites. Christmasberry is useful for erosion control, is a source of honey, and has leaves and fruits that provide food for wildlife. It has also been widely planted in California as an ornamental for park, freeway, and home landscape use (Magill 1974). The attractive foliage and fruits are cut and used for their decorative value.
Keywords: Heteromeles arbutifolia (Lindl.) M. Roemer, Christmasberry
- We recommend that you also print this page and attach it to the printout of the article, to retain the full citation information.
- This article was written and prepared by U.S. Government employees on official time, and is therefore in the public domain.
- You may send email to [email protected] to request a hard copy of this publication. (Please specify exactly which publication you are requesting and your mailing address.)
XML: View XML
Meyer, Susan E. 2008. Heteromeles arbutifolia (Lindl.) M. Roemer: Christmasberry. In: Bonner, Franklin T.; Karrfalt, Robert P., eds. The Woody Plant Seed Manual. Agric. Handbook No. 727. Washington, DC. U.S. Department of Agriculture, Forest Service. p. 585-587.
Get the latest version of the Adobe Acrobat reader or Acrobat Reader for Windows with Search and Accessibility | <urn:uuid:f35ae259-ee74-4735-910c-ee2f38dea62f> | CC-MAIN-2014-41 | http://www.treesearch.fs.fed.us/pubs/32648 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663417.16/warc/CC-MAIN-20140930004103-00093-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.857866 | 566 | 2.5625 | 3 |
When looking for wheel online, you have probably noticed that some wheels are cast and others are forged? What is the difference? The term refers to the way wheels are manufactured. In fact, forging and casting are two main types of wheel production. Some countries have quality standards that regulate manufacturing of wheels. For instance, Japan and Germany have standards on governmental level, which oblige all wheel manufacturers to comply with certain criteria.
Casting is the process of wheel manufacturing when aluminum is heated until it is molten. In such condition it is poured into a mold where it acquires its final shape with the help of vacuum. When it is cooled, it is possible to make modifications like drilling or trimming. Casting wheels are considered to be quick and inexpensive in terms of manufacturing. However, they have a major disadvantage- the nature of its manufacturing results in occurrence of porosity. To eliminate this disadvantage manufacturers have to design heavier wheels that allows creating of structure integrity.
Forged wheel are manufactured from a solid piece of metal called billet. The billet is heated and undergoes intense pressure to be changed. In other words, forged wheels are one-piece wheels. Forged wheels are stronger because of grain refinement due to thermal cycle and process of deformation. Consistent forging allows achieving the same structural integrity with less material in comparison to cast wheels. However, considering the price of equipment needed to manufacture forged wheels, this type of wheels is more expensive than cast wheels.
Advantages of cast and forged wheels
It is difficult to say that one of the types of manufacturing wheels is the best as both are good and have their benefits.
Advantages of cats wheels:
- Wide range of alloy choice;
- Less expensive due to less expensive tooling process;
- No limits in casting weight;
- It is easy to produce complicated parts;
Advantages of forged wheels:
- Better performance and handle due to forging process;
- The manufacturing process excludes occurrence of cavities, porosity, and shrinkage;
- Mechanically stronger wheels because of tight grain structure. It also ensures better wear resistance.
Whether to choose forged wheels or cast wheels is only up to you. No matter what kind of wheels you buy, make sure they are genuine product of a reliable wheel manufacturer. | <urn:uuid:97a4f64f-bfd1-424f-94a4-e67c17117de5> | CC-MAIN-2021-39 | https://911weknow.com/cast-wheels-vs-forged-wheels-what-is-the-difference | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057598.98/warc/CC-MAIN-20210925052020-20210925082020-00631.warc.gz | en | 0.965436 | 468 | 3.078125 | 3 |
Why are the "A" and "E" smaller with firmware version 040 and higher?
PCD7.D23x with hardware version "F" with firmware version V040 has some "smaller" characters. The characters "A" and "E" are smaller, and the spacing between the characters is different.
The characters "A" and "E" are smaller on PCD7.D23x with firmware version 040, leading to the fact that the spacing between the characters is different.
PCD7.D23x terminals FW V040 with hardware version "F" are supporting extended characters such as cyrillic, greek etc. as well as extended west european characters. Some minor changes (difference in the size) had to be done in order to allow the usage of Central European fonts and to get an uniform representation.
Details (MAP CHANGE OVERVIEW)
PCD7.D23x with HW version "F" and firmware version 040 and higher support Cyrillic, Polish and other font maps. In the default map the following characters have been changed:
The A has mainly been changed to allow an uniform view in Polish with the A Ogonek*); with 5 Pixel wide the A Ogonek was not possible.
A ring above: code 0x8e, 0x8f
In accordance with the plain A. The modification has mainly been applied in order to allow an uniform view in Polish with the A Ogonek; with 5 Pixel width the A Ogonek was not possible.
Also the shape of the "E" has mainly been changed for having a uniformed view in Polish with the E Ogonek which was not possible before.
code 0x90: Not changed, was already 4 pixel wide
*) The ogonek (Polish) is a "little tail", a diacritic hook placed under the lower right corner of a vowel in the Latin alphabet used in several European and Native American languages.
PCD7 / D23x
Last update: 26.05.2015 11:07
First release: 13.10.2008 14:28 | <urn:uuid:246b747f-5ef9-4536-90f6-00a044e11aa2> | CC-MAIN-2019-22 | https://www.sbc-support.com/en/faq/101043/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257244.16/warc/CC-MAIN-20190523123835-20190523145835-00208.warc.gz | en | 0.945079 | 447 | 2.609375 | 3 |
Adolf Loos was born in Brno (Bruenn), Moravia, now Czech republic, on December 10, 1870. Adolf Loos was introduced to the craft of building at an early age while working in his father's stone masonry shop. At the age of seventeen. Adolf Loos attended the Royal and Imperial State College at Reichenberg in Bohemia. In 1889 Adolf Loos was drafted for one year of service in the Austrian army. From 1890 to 1893, Adolf Loos studied architecture at the Technical College in Dres den. As a student, Adolf Loos was particularly interested in the works of the classicist Schinkel and, above all, the works of Vitruvius. Adolf Loos 's developing tastes were considerably broadened during a three-year stay in the United States, which began in 1893. The 23-year-old architect was particularly impressed by what Adolf Loos regarded as the innovative efficiency of U.S. industrial buildings, clothing, and household furnishings. In 1896, Adolf Loos returned to Vienna where Adolf Loos began working in the building firm of Carl Mayreder.
Another point of contention decried by Adolf Loos was the masking of the true nature and beauty of materials by useless and indecent ornament. In his 1898 essay entitled "Principles of Building," Adolf Loos wrote that the true vocabulary of architecture lies in the materials themselves, and that a building should remain "dumb" on the outside. In his own work, Adolf Loos contrasted austere facades with lavish interiors. Much like Mies van der Rohe, Adolf Loos arrived at the reduction of architecture to a purely technical tautology that emphasized the simple assemblage of materials. This article was followed by the 1910 essay entitled "Architecture," in which Adolf Loos explained important contradictions in design: between the interior and the exterior, the monument and the house, and art works and objects of function. To Adolf Loos, the house did not belong to art because the house must please everyone, unlike a work of art, which does not need to please anyone. The only exception, that is, the only constructions that belong both to art and architecture, were the monument and the tombstone. Adolf Loos felt that the rest of architecture, which by necessity must serve a specific end, must be excluded from the realm of art.
In 1899, Adolf Loos designed the Cafe Museum, which proved to be one of the most notable projects of his early work. The austere interior was a mature architectural embodiment of his theorized renunciation of stylish ornamentation. The starkness of the "untattooed" facade that inspired the popular name Cafe Nihilismus asserted Adolf Loos 's developing theory of the predominance of technique over decoration. The cafe also affirms his aesthetic equation of beauty and utility by bringing every object back to its purely utilitarian value. To Adolf Loos, that which is beautiful must also be useful. Thus, the only elements Adolf Loos used to pattern the vaulted ceiling of the cafe interior were strips of brass, which also served as electrical conductors. A more refined work, the tiny Karntner Bar Vienna (1907), reveals in microcosm the architect's great sensitivity to spatial manipulation. Once again, Adolf Loos showed his fondness for the expressive use of natural materials as Adolf Loos skillfully manipulated classical materials including marble, onyx, wood, and mirror, into a careful composition of visual patterns.
Between 1909 and 1911, Adolf Loos designed and constructed one of his best known works, the controversial Looshaus in the Michaelerplatz, in the heart of old Vienna. This complex design enunciated theorems on the relationship between the memory of the historic past of a great city and the invention of the new city based on the modern work of architecture. The design was characterized by a mute facade from which all ornamental plastic shapes were absent. For Adolf Loos, the language of the environment of the metropolis was centered in the absence of all ornament. In 1910, a public furor spawned by the simplicity of the modernistic design resulted in a municipal order to suspend work; construction ceased and building permits were denied. Adolf Loos responded to the attacks in a public meeting attended by more than 2000 angry residents. The controversy ended with an agreement to add window boxes in an attempt to countrify and familiarize the unpopular design.
Adolf Loos 's private residential works were characterized by unembellished white facades. As a result, these buildings have routinely been associated with the work of Le Corbusier, J. J. Oud, and others. Among the more famous were the much published Steiner House (1910) and Scheu House (1912), both in Vienna. One of Adolf Loos 's best known projects was the entry for the Chicago Tribune Tower competition of 1922. Adolf Loos 's surprising combination of Doric columns at ground level with modern skyscraper technology indicated that Adolf Loos was less doctrinaire about ornament than his modernist colleagues believed. To Adolf Loos, the polished black granite columns, durable classical symbols in a building, were altogether useful and therefore beautiful.
architectural standards books
building types & styles books
drawing & modelling books
historic preservation books
interior design books
project planning & management books
study & teaching books
urban & land use planning books Also in 1922, Adolf Loos was appointed to the post of Chief Architect of the Housing Department of the Commune of Vienna. His projects during this time were primarily con structions modulated around simply-composed layouts utilizing basic construction technology. Flexible interior arrangements were achieved through the use of movable partitions. Exteriors were typical of suburban housing Vegetable gardens, which were considered essential extensions of the dwellings, were assigned high priorities. Adolf Loos soon grew disillusioned with his work as chief architect. As a result of his opposition to the then current ideology of Austrian Marxism, Adolf Loos resigned from his post the same year Adolf Loos was appointed.
Adolf Loos moved to France in 1922. Adolf Loos lived there until 1927, dividing his time between Paris and the Rivier with frequent journeys to Austria, Germany and Czechoslovakia. Adolf Loos was received enthusiastically by the French avantgarde. His work entitled "Ornament and Crime" was translated in 1920 in Esprit Nouveau, a publication edited by Le Corbusier, Paul Dermee, and Ozenfant. Adolf Loos also exhibited regularly at d'Automne, and became the first foreigner to be elected to its jury. Adolf Loos built some of his most significant works during this period. These included The Tzara House in Paris (1926-1927), Villa Moller in Vienna (1928), Villa Muller (1930), Villa Winternitz in Prague (1931-1932) and the Khuner Country House at Payerbach in lower Austria. Monolithic in nature, these works contrasted greatly with the glass architecture that dominated rationalist styles of the 1920s. Once again, Adolf Loos as in a posture of contentious indifference to fluctuations in current taste.
In 1930, on his sixtieth birthday, Adolf Loos was officially recognized as a master of architecture. Adolf Loos was bestowed with an annual honorific income by the president of the Czechoslovakian Republic. His collected essays were published the following year. Adolf Loos died on August 23, 1933 and was buried beneath a simple tombstone of his own design. His most significant contribution to architecture remains his literary discourse.
Café Museum, at Vienna, Austria, 1898 to 1899.
Wohnung Leopold Langer, at Vienna, Austria, 1901.
Villa Karma, Clarens, at Montreux, Switzerland, 1904 to 1906.
Wohnung Rudolf Kraus, at Vienna, Austria, 1907.
Schmuckfedern-geschäft Sigmund Steiner, at Vienna, Austria, 1907.
American Bar, at Vienna, Austria, 1907.
Wohnung Bellak, at Vienna, Austria, 1907.
Schneidersalon Knize, Vienna, Austria, 1909 - 1913.
House on the Michaelerplatz, at Vienna, Austria, 1910 to 1911.
Steiner House, at Vienna, Austria, 1910.
Scheu House, Vienna, at Austria, 1912 to 1913.
Horner House, at Vienna, Austria, 1921.
Rufer House, at Vienna, Austria, 1922.
Villa Stross, at Vienna, Austria, 1922.
Landhaus Spanner, at Gumpoldskirchen, Austria, 1923.
Big shop (project), at Alexandria, Egypt, 1924.
Tristan Tzara House, at Paris, France, 1926 to 1927.
Moller House, Vienna, at Austria, 1927 to 1928.
Wohnung Hans Brummel, at Vienna, Austria, 1929.
Wohnung Willy Hirsch, at Pilsen, Czech Republic, 1929.
Khuner Villa, at on the Kreuzberg, Payerback, Austria, 1930.
Villa Müller, Prague, Czech Republic, 1930.
Wohnung Leo Brummel, at Vienna, Austria, 1930.
Müller House, at Prague, Czech Republic, 1930.
Landhaus Khuner, Payerbach, Austria, 1930.
Bojko House, at Vienna, Austria, 1929 to 1930.
Mitzi House, at Vienna, Austria, 1931.
House in the Vienna Werbund, Austria, 1930 to 1932.
Semler House, at Pilsen, Czech Republic, 1932. | <urn:uuid:15340830-344d-4023-9238-0983471ba593> | CC-MAIN-2015-14 | http://architect.architecture.sk/adolf-loos-architect/adolf-loos-architect.php | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131305484.69/warc/CC-MAIN-20150323172145-00183-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.956448 | 2,020 | 2.890625 | 3 |
Basic Concepts of Inverse Trigonometric Functions
• Inverse trigonometric functions are the inverse functions of trigonometric functions. While defining the inverse of a trigonometric function, its domain is restricted so that the function becomes both one-one and onto function.
• In other words, a function ‘f’ is called invertible if and only if the function ‘f ’ is one-one and onto.
• To check whether a function is a one-one function or not, the horizontal line test is used. A horizontal line intersects a one-one function at only one point. However, if it intersects the graph at more than one point, then the function is not one-one.
• The graph of a trigonometric function and the graph of its inverse are symmetrical about the line y = x. The domain of a trigonometric function is the range for its inverse function.
• Representation of inverse of a trigonometric function is as follows:
- Inverse of sin x is sin–1x.
- Inverse of cos x is cos–1x.
- Inverse of tan x is tan–1x.
- Inverse of cot x is cot–1x.
- Inverse of sec x is cot–1x.
- Inverse of cosec x is cosec–1x.
• The value of inverse trigonometric functions, which lies in the range of principal branch, is called the principal value of that inverse trigonometric function.
• Inverse trigonometric functions and its domains and ranges are listed in the following table.
Keywords: Inverse of trigonometric functions, Domain and range of Inverse trigonometric functions, Graphs of inverse trigonometric functions, Invertible functions, One-One functions, Onto functions, Principle values of Inverse of trigonometric functions
The domain of the function f(x) = sin-1x + cos-1x + cosec-1x + cot-1x + tan-1x isMarks:1
If graph of f(x) = tan(-x) is, then the graph of f-1(x) isMarks:1
If the graph of f(x) is given below, then the graph of f-1(x) is
Write the domain and range of the function given below:
f(x) = sin-1x.Marks:1 | <urn:uuid:b24cbd1e-5d3d-465a-9cce-206b30166962> | CC-MAIN-2021-04 | https://www.extramarks.com/study-material/icse-class-12/mathematics-inverse-trigonometric-functions-basic-concepts-of-inverse-trigonometric-functions | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519843.24/warc/CC-MAIN-20210119232006-20210120022006-00470.warc.gz | en | 0.820862 | 528 | 4 | 4 |
Check out the east-northeast sky after about 11 p.m. local time late Thursday and Friday evening (Oct. 4 and 5) for a changing celestial array involving the moon, a bright planet and a bright star, weather permitting.
The planet in question is Jupiter, usually the second brightest planet next to Venus. At a dazzling magnitude of -2.6 on the astronomers' brightness scale (the lower the number, the brighter the object), Jupiter shines three times brighter than Sirius, the brightest star. Whenever it's above the horizon, Jupiter, the solar system's biggest planet at 88,800 miles (143,000 kilometers) in diameter — always attracts immediate attention; to the eye it resembles a brilliant silvery white, non-twinkling "star."
Currently, Jupiter is 419 million miles (674 million km) from Earth. Although primarily an after-midnight sight right now, Jupiter is rising an average of just over 4 minutes earlier each night. By Dec. 3 it will arrive at opposition and be visible all night from sunrise to sunset.
Lately, Jupiter can be seen in the constellation of Taurus, the Bull. It's positioned between the Bull's horns, and not far from the Bull's V-shape face which is composed of the stars of the Hyades star cluster. [Gallery: October 2012 Night Sky Guide (Sky Maps)]
One star in the V stands out far more than the others. That's Aldebaran, marking the Bull's angry orange-red eye. This star seems like it's a member of the Hyades, but in reality, it's only an innocent bystander; it's lined up almost perfectly with the other neighboring stars to fill out the V-shaped pattern, but it's actually much closer to the Earth at a distance of 65 light-years, compared to the Hyades, which is more than double that distance at 153 light-years away.
The moon is currently on the wane, with full phase having occurred this past weekend; last quarter (or half phase) will come early on Monday (Oct. 8). So a gibbous moon will be interacting with Jupiter and Aldebaran late this Thursday and Friday nights.
Late Thursday night, the moon will form a right triangle with Aldebaran and Jupiter. The moon will stand about 5 degrees above Aldebaran, which in turn sits about 7 degrees to the right of Jupiter. Your clenched fist held at arm's length measures roughly 10 degrees.
Late on Friday night, the moon will have shifted noticeably past Jupiter, and will stand about 5 degrees to Jupiter's lower left — while at the same time the moon will be about 10 degrees ("one fist") to the left of Aldebaran.
In addition to our own moon, there are four other moons that you might want to look at, namely the famous Galilean Satellites, which were first seen by Galileo with his crude telescope in 1610.
These satellites of Jupiter are fun to watch as they change their position relative to their host planet from hour to hour and night to night. They can be glimpsed through 7-power binoculars (if you hold them steady) or better yet, a small telescope.
On both Thursday and Friday nights you can see all four moons — two on either side of Jupiter. On Thursday night, on one side, you'll see Europa and Ganymede, while on the side, spaced farther apart are Io and Callisto. On Friday night, Ganymede and Io will be relatively close to each other, while on the other side near to Jupiter will be Europa, with Callisto farther out from "Big Jupe."
Joe Rao serves as an instructor and guest lecturer at New York's Hayden Planetarium. He writes about astronomy for The New York Times and other publications, and he is also an on-camera meteorologist for News 12 Westchester, New York. | <urn:uuid:1e1f3c86-5369-4d41-b5f5-67ef561dbdd6> | CC-MAIN-2018-22 | https://www.space.com/17886-moon-jupiter-observing-night-sky.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794869272.81/warc/CC-MAIN-20180527151021-20180527171021-00579.warc.gz | en | 0.932466 | 805 | 3.15625 | 3 |
"Ships expend a great deal of energy pushing the water around them out of the way as they move forward," said Yaroslav Urzhumov, assistant research professor in electrical and computer engineering at Duke's Pratt School of Engineering. "What our cloak accomplishes is that it reduces the mass of fluid that has to be displaced to a bare minimum.
"We accomplish this by tricking the water into being perfectly still everywhere outside the cloak," Urzhumov said. "Since the water is still, there is no shear force, and you don't have to drag anything extra with your object. So, comparing a regular vessel and a cloak of the same size, the latter needs to push a much smaller volume of water, and that's where the hypothesized energy efficiency comes from."
The results of Urzhumov's analysis were published online in the journal Physical Review Letters. The research was supported by the U.S. Office of Naval Research and a Multidisciplinary University Research Initiative (MURI) grant through the U.S. Army Research Office. Urzhumov works in the laboratory of David R. Smith, William Bevan Professor of electrical and computer engineering at Duke.
While the cloak postulated by Urzhumov differs from other cloaks designed to make objects seem invisible to light and sound, it follows the same basic principles – the use of a man-made material that can alter the normal forces of nature in new ways.
In Urzhumov's fluid flow cloak, he envisions the hull of a vessel covered with porous materials – analogous to a rigid sponge-like material – which would be riddled with holes and passages. Strategically placed within this material would be tiny pumps, which would have the ability to push the flowing water along at various forces.
"The goal is make it so the water passing through the porous material leaves the cloak at the same speed as the water surrounding by the vessel," Urzhumov said. "In this way, the water outside the hull would appear to be still relative to the vessel, thereby greatly reducing the amount of energy needed by the vessel to push vast quantities of water out of the way as it progresses."
While the Duke invisibility cloak involved a man-made structure – or metamaterial – based on parallel rows of fiberglass slats etched with copper, Urzhumov envisions a different sort of metamaterial for his fluid flow cloak.
"In our case, I see this porous medium as a three-dimensional lattice, or array, of metallic plates," he said. "You can imagine a cubic lattice of wire-supported blades, which would have to be oriented properly to create drag and lift forces that depend on the flow direction. In addition, some of the cells of this array would be equipped with fluid-accelerating micro-pumps."
Urzhumov explained that when a regular vessel moves through fluid, it also pushes and displaces a volume of water that greatly exceeds the volume of the vessel itself. That is because in a viscous fluid like water, an object cannot just move a single layer of water without all others; the shear force effectively attaches an additional mass of water to the object.
"When you try to drag an object on a fishing line through water, it feels much heavier than the object itself, right?" he said. "That's because you are dragging an additional volume of water with it."
Based on this understanding of the flow cloaking phenomenon, Urzhumov believes that the energy expended by the micropumps could be significantly less than that needed to push an uncloaked vessel through the water, leading to the greatly improved efficiency.
Richard Merritt | EurekAlert!
Astronomers find unexpected, dust-obscured star formation in distant galaxy
24.03.2017 | University of Massachusetts at Amherst
Gravitational wave kicks monster black hole out of galactic core
24.03.2017 | NASA/Goddard Space Flight Center
Astronomers from Bonn and Tautenburg in Thuringia (Germany) used the 100-m radio telescope at Effelsberg to observe several galaxy clusters. At the edges of these large accumulations of dark matter, stellar systems (galaxies), hot gas, and charged particles, they found magnetic fields that are exceptionally ordered over distances of many million light years. This makes them the most extended magnetic fields in the universe known so far.
The results will be published on March 22 in the journal „Astronomy & Astrophysics“.
Galaxy clusters are the largest gravitationally bound structures in the universe. With a typical extent of about 10 million light years, i.e. 100 times the...
Researchers at the Goethe University Frankfurt, together with partners from the University of Tübingen in Germany and Queen Mary University as well as Francis Crick Institute from London (UK) have developed a novel technology to decipher the secret ubiquitin code.
Ubiquitin is a small protein that can be linked to other cellular proteins, thereby controlling and modulating their functions. The attachment occurs in many...
In the eternal search for next generation high-efficiency solar cells and LEDs, scientists at Los Alamos National Laboratory and their partners are creating...
Silicon nanosheets are thin, two-dimensional layers with exceptional optoelectronic properties very similar to those of graphene. Albeit, the nanosheets are less stable. Now researchers at the Technical University of Munich (TUM) have, for the first time ever, produced a composite material combining silicon nanosheets and a polymer that is both UV-resistant and easy to process. This brings the scientists a significant step closer to industrial applications like flexible displays and photosensors.
Silicon nanosheets are thin, two-dimensional layers with exceptional optoelectronic properties very similar to those of graphene. Albeit, the nanosheets are...
Enzymes behave differently in a test tube compared with the molecular scrum of a living cell. Chemists from the University of Basel have now been able to simulate these confined natural conditions in artificial vesicles for the first time. As reported in the academic journal Small, the results are offering better insight into the development of nanoreactors and artificial organelles.
Enzymes behave differently in a test tube compared with the molecular scrum of a living cell. Chemists from the University of Basel have now been able to...
20.03.2017 | Event News
14.03.2017 | Event News
07.03.2017 | Event News
24.03.2017 | Materials Sciences
24.03.2017 | Physics and Astronomy
24.03.2017 | Physics and Astronomy | <urn:uuid:76023da6-df57-4c78-8692-3bc96d2cc531> | CC-MAIN-2017-13 | http://www.innovations-report.com/html/reports/physics-astronomy/effortless-sailing-fluid-flow-cloak-180131.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188623.98/warc/CC-MAIN-20170322212948-00486-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.932877 | 1,400 | 3.671875 | 4 |
The brain and consciousness are domains that we really don't know much about scientifically, relatively speaking. So it is difficult to make hard claims and direct links among factors of cause and affect. From a holistic and systemic lens we do know that there are measurable correlations among neural activity, states of consciousness, and biophysical functions, as well as psychological and mental states. Its all related. There are many entry points to feel better, be happier, and increase performance, but at the root of all our thoughts, emotions and behaviors is the communication between neurons within our brains. Neurons communicate via brainwaves.
Different brainwave states are reflected as different states of consciousness, which are experiential, such as dreaming or wakefulness. Your brain is consistently generating an entire spectrum of brainwave frequencies. At certain times your brain generates dominant levels of a specific bandwidth. A dominant theta state occurs naturally twice a day. It is the dreamy, half asleep, half awake consciousness you experience just before drifting off to sleep or right as you wake up. Unfortunately a dominant theta-state is elusive, usually a fleeting experience as your brain transitions into higher or lower gear. Theta waves are instrumental in the release of serotonin, DHEA, melatonin, as well as the reduction of cortisol levels, and release of beta endorphins.
More About Brainwaves:
The Audio Elixir protocol leverages the features of 3D sound to stimulate different levels of brainwave activity. What are brainwaves? At the root of all our thoughts, emotions and behaviors is the communication between neurons within our brains. These neurons communicate via electrical impulses. The patterns produced by the synchronized electrical activity from the billions of neurons are referred to as brainwaves. Neurons are electrochemically triggered to release certain neurotransmitters and hormones at certain frequencies. Our brainwave patterns change according to what we’re doing and feeling. Research has shown that the rate of brainwave patterns can by influenced by an external input such as light or sound. By stimulating certain brainwave activity, you can experience shifts in your mind and body. Brainwaves are measured in terms of frequency or Hertz (cycles per second). The spectrum is divided into bandwidths - delta, theta, alpha, beta, and gamma which relate to different functions. Your brain is consistently generating the entire spectrum of brainwave frequencies. At certain times your brain generates dominant levels of a specific bandwidth which correlates to a certain mental, physical, and experiential state ranging from deep sleep to focused concentration. | <urn:uuid:41d39925-c5ae-44d8-8bcc-ea7af1baabca> | CC-MAIN-2018-17 | http://www.audioelixir.com/braiwaves | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947939.52/warc/CC-MAIN-20180425174229-20180425194229-00275.warc.gz | en | 0.940481 | 514 | 3.4375 | 3 |
There are quite a few models of how things developed during the first .0000000001 of a second after the big bang and so on. And I was wondering if there is a timeline for when water started to congeal out of this mass of expanding energy of the BB. Knowing this could lead to a better understanding of how long life has been developing, as well, in the universe. Its a sort of bio-archaeological approach to establishing a timeline and probability for the length of time that life has been evolving in the universe. What are the methods of determining the age of the development of something like water? | <urn:uuid:a1f9d059-27f9-411c-b575-247bbfadb08b> | CC-MAIN-2017-13 | https://www.physicsforums.com/threads/when-did-h2o-develop-during-the-last-13-5-b-y.288340/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188785.81/warc/CC-MAIN-20170322212948-00268-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.973169 | 124 | 2.59375 | 3 |
In some cultures, older members of the population are considered highly knowledgeable individuals who are revered and honored by those who live with them. They are seen as wise elders who guide the decisions of their communities and offer reflections on the past to help younger generations avoid making similar mistakes. In Illinois and throughout the United States, this sentiment is not always shared by all employers.
In fact, some employers view older workers as liabilities. They may not believe that older workers can keep up with the pace of work that is expected of them, or that they will not adapt to new technologies and workplace practices as their younger counterparts. Unfortunately, some older workers are disliked by their employers because they command higher salaries than their younger co-workers due to their experience and knowledge.
When a worker is impacted by an employment practice in a negative way because of their age, they may suffer from age discrimination. Age discrimination applies to individuals who are 40 years of age and older and to many private employers. Readers are asked to talk to their employment law attorneys about their pending age discrimination claims to determine if they meet the criteria for pursuing legal recourse through the EEOC and then litigation.
The Age Discrimination in Employment Act is the federal law that protects older workers from the harmful and unlawful discriminatory practices of their employers. It applies to individuals who have employment positions as well as to individuals who are harassed or discriminated against due to their age when they are applying for jobs. Age discrimination is a serious employment law matter and can be fought through careful legal planning. | <urn:uuid:5e1659ac-7645-44f6-a515-dadc3163760a> | CC-MAIN-2019-43 | https://www.walkermortonllp.com/blog/2019/07/what-is-age-discrimination.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986660231.30/warc/CC-MAIN-20191015182235-20191015205735-00279.warc.gz | en | 0.983852 | 303 | 2.6875 | 3 |
Which Joe gave his name to ‘sloppy joes’? We look at five interesting sandwiches and their lexical origins.
forgetfulness, amnesia, poor memory, tendency to forget, lapse of memorydistractedness, preoccupation, inattentiveness, inattention, vagueness, abstraction, absence, absorption, engrossment, heedlessness, obliviousnesspensiveness, thoughtfulness, musing, broodingblonde momentView synonyms
- ‘Before you start to panic, there is a crucial difference between dementia and general absent-mindedness.’
- ‘In a fit of absent-mindedness, they had signed contracts that ran until 2004.’
- ‘It's frustrating for the audience, too, because his absent-mindedness prevents this seminar on the pharaohs making any progress.’
- ‘Forgetfulness tends to increase with age, but there's a big difference between normal absent-mindedness and the type of memory loss associated with Alzheimer's disease.’
- ‘He was known for occasional absent-mindedness in important situations.’
We take a look at several popular, though confusing, punctuation marks.
From Afghanistan to Zimbabwe, discover surprising and intriguing language facts from around the globe.
The definitions of ‘buddy’ and ‘bro’ in the OED have recently been revised. We explore their history and increase in popularity. | <urn:uuid:e02f83cb-dd66-40e5-8d11-3d9c41438b8b> | CC-MAIN-2017-04 | https://en.oxforddictionaries.com/definition/absent-mindedness | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00511-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.941737 | 308 | 2.765625 | 3 |
Those in the plating industry are continually working on the development of a process to recover valuable nickel from spent electroless nickel solutions. Now there is a two-stage method to do just that.
Those in the plating industry are continually working on the development of a process to recover valuable nickel from spent electroless nickel solutions. Cleaning Service Group (CSG) has come up with a two-stage method to do just that.
The EN Technique
Electroless nickel is a hard, silver-colored coating comprised of nickel alloy with between 4 and 14 percent phosphorous. It is deposited by immersion of parts in a solution of nickel salts and reducing agents at a temperature of 90oC. It is most commonly used in engineering coating applications where excellent wear resistance, hardness and corrosion protection are required, although it is also can be used in a range of other applications, including as a coating in electronics printed circuit board manufacturing.
Electroless nickel plating offers several advantages over conventional electroplating, including that it is produced by a chemical process alone without the need for an electric current. In practice, an auto-catalytic chemical technique is used to deposit a layer of nickel phosphorous, or nickel-boron alloy, on to a solid workpiece made of metal or plastic. The process relies on the presence of a reducing agent such as hydrated sodium hypophosphite, which reacts with the nickel ions to deposit metallic nickel. This plating technique prevents corrosion and wear.
Waste from electroless nickel plating contains as much as 5 g/L of nickel, but due to the complexity of chemical reactions occurring during the process, a host of contaminants also are present, such as complexing agents, solids (suspended and dissolved), organics, and contamination from handling in tanks, tankers, containers, etc. These wastes also include other chemicals present in electroless nickel such as sodium succinate, sodium chloride, ammonium compounds and ethylenediaminetetraacetic acid (EDTA). Other metal contaminants also are often picked up through the plating process, including cadmium, copper, chromium, lead, nitrates, iron and zinc. Where the nickel has been depleted during plating, the concentrations of other chemicals remains relatively constant.
A Two-Stage Recovery Process
It has been possible for a long time to use electrolysis to recover nickel from solution but, as the electrolyte needs to be relatively pure to achieve any degree of success, recovery of waste nickel solutions on a commercial scale has remained elusive.
CSG’s treatment and recovery facility in Cadishead, Manchester, U.K., recovers valuable metal, particularly nickel and now copper, from metal-bearing waste solutions. It uses a multi-stage pretreatment process centered around ion exchange technology to concentrate and purify the waste solutions, followed by electrowinning to recover the pure metal. The process is suitable for most nickel or copper solutions greater than 5,000 ppm that contain predominately one metal, although other metals such as chromium, zinc and iron can be tolerated at low concentrations. Nickel and copper filter cakes also can be made suitable for processing by first solubilising in acid.
The parameters of metal concentration, pH, temperature, flow rate and levels of contamination are critical for producing a viable feed for the electrowinning process. Electrolysis technology is available “off the shelf,” but CSG has developed an extensive intermediate process that makes it unique.
The first pretreatment step is through an ion-exchange unit that selectively retains the nickel while enabling other contaminants to pass through. After the metal is removed through the ion exchange, the aqueous effluent undergoes further treatment to make it suitable to be discharged to a sewer.
Pretreatment is followed by electrowinning. Passing an electric current through a nickel solution or molten salt (the electrolyte) results in the migration of ions to the electrodes–positive ions (cations) to the negative electrode (cathode) and negative ions (anions) to the positive electrode (anode). On reaching their respective electrodes, these ions lose their charge and get deposited on the electrode or discharged as a gas.
The Electrowinning Plant
CSG’s electrowinning plant contains 15 cylindrical cells, each capable of plating as much as 25 kg of metal. In operation, the concentrated metal solution from the ion exchange is heated and circulated through the electrowinning cells. This has the effect of producing intense turbulence across the electrodes, thereby maintaining a high plating efficiency.
Electrowinning continues for as many as 240 hours, or until the concentration in the metal reduces from approximately 60 g/L to 5 g/L. The depleted feed solution is then returned to the ion exchange to be re-concentrated, and the recovered metal is removed from the cells, thereby ensuring no nickel is lost from the process.
Each cell produces a cylinder of pure metal 1,200-mm long and weighing about 25 kg.
The recovered metal is up to 99.9 percent pure, and the final concentration in the effluent is <4 ppm, which means that 99.9 percent of the metal has been recovered.
Parameters Affecting Plating
Development of the CSG process, which is affected by a number of factors, has been a three-year research and development project. The optimum conditions for plating nickel vary with each batch and the margins are very narrow, as almost no contamination can be tolerated. The correct parameters have been identified as:
· Metals. The presence of other metals prevents nickel from plating, therefore the conditions for plating nickel have to be as near perfect as possible to have a chance of coaxing it from its ionic state to its elemental state.
· pH. Hydrogen liberation during plating affects pH which, therefore, has to continually be adjusted.
· Complexing agents. The presence of complexing agents such as EDTA and ammonia keep the nickel in-solution, thus preventing plating. Another negative effect of complexing agents is that they can destroy the iridium oxide coating on the titanium anodes in the main electrowinning cells.
· Stress. Virtually all electroplating produces deposits with some degree of internal stress. It is hard to find a process variable that does not influence deposit internal stress.
· Temperature. Temperature must be between the narrow margin of 50-55oC and has a profound effect on pH and stress.
· Flow. The system runs at a constant flow rate. Low velocity leads to anodic stress, while high velocity leads to cathodic stress and causes dendrite formation. The acceptable range appears to be 47-53 m3/h.
A considerable amount of trial and error was required for CSG to identify the optimum conditions. The company often achieved optimum conditions on a number of parameters only to discover that a previously unknown variable was now affecting plating performance. A test lab was established alongside the electrowinning plant to enable the operator to mimic conditions on a smaller and more manageable scale.
As described above, recovering nickel is fraught with difficulties, and CSG is continuing research into developing the optimum conditions for plating nickel. In the meantime, its Manchester plant also is being used to plate copper, which has none of the tight variables associated with plating nickel.
Phil Manley is technical manager at CSG’s hazardous waste treatment and recovery complex in Manchester, U.K. | <urn:uuid:78b8337f-4292-4ef7-8fa4-ab2b277e470b> | CC-MAIN-2016-50 | http://www.mmsonline.com/articles/nickel-saved-is-nickel-earned | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542455.45/warc/CC-MAIN-20161202170902-00332-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.947267 | 1,537 | 2.90625 | 3 |
If you have too much uric acid in your blood, or hyperuricemia, you are at greater risk for kidney stones or gout, a form of inflammatory arthritis. And changing your diet may help. Since uric acid is a byproduct of purine metabolism -- a substance made by the body and found in certain foods -- limiting specific purine-rich foods is one step to lowering uric acid levels. Drinking more water, including low-fat dairy products, and emphasizing a diet rich in fruits and vegetables can also help reduce serum levels of this compound.
What you drink matters, and drinking plenty of water is important. Dehydration raises uric acid levels, and can increase the risk of related conditions such as gout or kidney stones. Low-fat and nonfat milk and low-calorie yogurt have also been associated with a decrease in uric acid levels. The precise mechanism is not known, although these dairy products are thought to lower blood levels by facilitating a greater urinary loss of uric acid. Alcoholic beverages and sugar-sweetened soft drinks, on the other hand, increase uric acid levels and the risk of gout.
Cherries have a reputation for reducing the risk of gout, a disorder linked to high uric acid levels. A study of 633 individuals found that any amount of cherry consumption over a 2-day period was associated with a 35 percent reduction in the risk of a gout attack, compared to study participants with no cherry intake. The mechanism of action is unclear, but study authors suggest components in cherries reduce uric acid levels, or decrease the risk of gout by anti-inflammatory mechanisms. More research is needed to better understand the role of cherries in the management of hyperuricemia.
Fruits and Vegetables
All fruits are naturally low in purine, although vegetables have varying amounts of this compound. Historically, high purine vegetables -- such as asparagus, cauliflower, lentils, spinach and beans -- have been restricted in the diets of people with gout and hyperuricemia. However, recent research has shown that these vegetables do not worsen uric acid levels, nor increase the risk of gout. In addition, eating more fruits and vegetables can lead to an alkaline urine, which is known to enhance the urinary excretion of uric acid. So emphasizing fruits and vegetables may help lower uric acid levels.
A plant-centered food pattern may also be an effective strategy to reducing uric acid levels. A study which compared the typical American diet to the DASH diet, from the Dietary Approaches to Stop Hypertension research trials, found the DASH plan normalized serum uric acid in half of the participants who started the study with elevated levels. The DASH eating plan limits meat, poultry and fish to 6 ounces or less daily, includes 2 to 3 servings of low-fat or nonfat dairy, 8 to 10 daily servings of fruits and vegetables and emphasizes whole grains, nuts, seeds and beans. The DASH plan may not be the only one that works, however. Other diet patterns that emphasize plant-based foods, including the Mediterranean diet and a traditional Chinese pattern, have been shown to reduce uric acid levels.
If you have hyperuricemia, your doctor will evaluate the cause and outline a personalized management plan. Diet intervention is usually advised, which may also recommend the restriction of meat and seafood, and the avoidance of high purine foods such as organ meats. For optimal effectiveness, your doctor may also recommend medications to lower uric acid levels. If you have any questions on how to lower your uric acid, speak with your doctor.
Reviewed by Kay Peck, MPH RD
- American Family Physician: Diagnosis, Treatment, and Prevention of Gout
- Arthritis and Rheumatism: Cherry Consumption and the Risk of Recurrent Gout Attacks
- Clinical Rheumatology: DASH Diet and Change in Serum Uric Acid over Time
- Scandinavian Journal of Rheumatology: Adherence to the Mediterranean Diet and Serum Uric Acid: The ATTICA Study.
- Medicine: Dietary Patterns Associated Hyperuricemia Among Chinese Aged 45 to 59 Years: An Observational Study
- PLOS One: The Association of Dietary Intake of Purine-Rich Vegetables, Sugar-Sweetened Beverages and Dairy with Plasma Urate, in a Cross-Sectional Study
- The New England Journal of Medicine: Purine-Rich Foods, Dairy and Protein Intake, and the Risk of Gout in Men
- Nutrition Journal: Effect of Urine pH Changed by Dietary Intervention on Uric Acid Clearance Mechanism of pH-Dependent Excretion of Urinary Uric Acid
- Current Opinion in Rheumatology: Risk Factors for Gout and Prevention: A Systematic Review of the Literature | <urn:uuid:845c3f86-1469-4e99-96e9-7f95d24629ac> | CC-MAIN-2019-43 | https://www.livestrong.com/article/262665-foods-that-reduce-uric-acid/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986688826.38/warc/CC-MAIN-20191019040458-20191019063958-00256.warc.gz | en | 0.925574 | 995 | 3.125 | 3 |
The English surname Vincent is of Norman French origin being derived from the Old French form of the Latin name Vincens meaning “conquering” from vincere “to conquer.“ This name was borne by various early saints particularly associated with France, most notably the 5th-century St Vincent of Lérins. The first recorded spelling of the family name is shown to be that of William Vincent, which was dated 1230, in the "Cartulary of Oseney Abbey", Oxfordshire. The name arrived in the New Wworld in the 17th Century when in 1626, one William Vincent, was granted 100 acres of land near Charles city, Virginia. Today in the United States there are approximately 50,000 bearers of the name Vincent.
VINCENT FAMILY CREST SQUARE RING
FIND MY FAMILY CREST | <urn:uuid:b41f4775-846d-4ae9-ac0b-18f391254a65> | CC-MAIN-2020-16 | https://heraldicjewelry.com/pages/vincent-family-crest | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00195.warc.gz | en | 0.961639 | 179 | 2.515625 | 3 |
The principle of a garden that is to be inhabited by different species is diversity. This means a variety of habitats that merge with one another freely. Meadow gradually turns into a wetland with hydrophilous plants and eventually into a pond. Meadow is partly open and partly shaded by an orchard, in places turning into a wild corner. Solitary trees and dead trunks are interspersed with rockeries with thermophilous plant species and aromatic herbs. Hedges or groups of shrubs provide shelter and food in the form of berries in autumn.
In effect, we can create a miniature landscape that will contain almost all latitude and longitude environments and thus attract the relevant animals.
Watch the video by the Czech project partner and read the article to learn more!
Trees and flowers
Wherever possible, let’s try to grow native species of trees, shrubs and flowers. Choose species and varieties that not only produce a rich and tasty harvest, but also provide shelter and food for animals.
In the case of fruit trees, for example, it is advisable to go for native regional varieties that are best adapted to local conditions, do not suffer from disease and offer a rich variety of fruit aromas and flavours.
We buy seeds and seedlings from local gardeners and ask them if they are local native species. Native plants are not usually found in the shops of multinational companies.
Another option is to collect seeds or seedlings from the surrounding countryside. This way we do not risk introducing something non-native into the garden that will then be sown in the surrounding countryside where it will cause mischief. But this has strict rules. We never take endangered or protected species and we never take from a protected area, park or reserve.
A little wilderness
We can grow creeping or climbing shrubs (for example, blackberries and ivy), but wild species can also find their place here. It is advisable to place such a corner in a less frequented part of the garden, where nobody minds and the animals have the necessary peace and quiet. Throw in a pile of cut wood and stones or leave an old dead or gradually dying tree, which will also greatly enhance the potential of your garden.
Leave areas of tall grass. A short mown lawn is almost dead and animals will avoid it from a distance. By mowing frequently, not only will you not help the animals, but you will encourage the soil in your garden to dry out quickly.
How to care for a flowering meadow
An English-style lawn may look very pretty to some, but to animals it is synonymous with an inhospitable desert. With a flowering meadow comes insects, and with insects come the animals that feed on them – such as all our songbirds, lizards, bats and many more. The meadow provides food, shelter and a place to breed.
Flowering herbs are particularly damaged by frequent short mowing. They then fail to seed and over time grasses and groundcover plants dominate.
If we want a garden full of flowers and butterflies, we need to suppress grasses and encourage flowers as much as possible.
When mowing, try occasionally substituting a lawn mower for a traditional scythe or sickle.
What to offer butterflies and bumblebees?
We should offer bumblebees and butterflies flowering herbs and woody plants for as long as possible during the year. Bumblebees, for example, wake up early in the spring, when pussy willow, coltsfoots and snowdrops are in bloom. In turn, flowering herbs in autumn can help still awake butterflies survive the delayed winter.
In addition, butterflies are also tied to their food plants, on which they lay their eggs and on which the caterpillars subsequently feed (e.g. thymus, nettle, lotus, fennel or even hawthorn). They will also fly to a dry shelter where they can survive the winter – this could be our attic or rotten wood.
Aromatic plants, especially plants from the deadnettle family (e.g. oregano, lemon balm, mint, sage, thymus), umbellifers (e.g. dill, coriander, chervil) and legume plants, are the best sources of nectar and pollen. Also basket flower, lavender, thistles, great is also holy rope and dwarf elderberry. Daisies, sunflowers and marigolds also serve well. In addition to sunflowers, bumblebees also like to visit various legumes (e.g. clover or peas). Many vegetables such as radish, dill, curcuma, black salsify or lettuce can also be left to flower and shed seed. | <urn:uuid:0953c428-a672-48b1-b28c-1954750082bd> | CC-MAIN-2023-06 | https://parnassius-apollo.life/tag/czech-republic | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00057.warc.gz | en | 0.942213 | 983 | 3.390625 | 3 |
Gulper Eel or Saccopharyngiformes is an order of unusual ray-finned fish superficially similar to eels, but with many internal differences. Most of the fish in this order are deep-sea types known from only a handful of specimens such as the Umbrella Mouth Gulper Eel. Saccopharyngiformes are also bioluminescent in several species. Some, such as the swallowers, can live as deep as 10,000 feet (3,000 m) in the ocean, well into the aphotic zone.
Saccopharyngiforms lack several bones, such as the symplectic bone, the bones of the opercle, and ribs. They also have no scales, pelvic fins, or swim bladder. The jaws are quite large, and several types are notable for being able to consume fish larger than themselves. Their myomeres (muscle segments) are V-shaped instead of W-shaped like in all other fish, and their lateral line has no pores, instead it is modified to groups of elevated tubules.
Gulper Eel Food
The gulper eel eats fish, copepods, shrimp, and plankton. It uses its mouth like a net by opening its large mouth and swimming at its prey. Due to the gulper eel’s specialised body shape, it is a poor swimmer and relies on the luminescent organ at the tip of its tail to attract prey. | <urn:uuid:d64758dd-344c-4b74-8cd2-004cc2c0bfa4> | CC-MAIN-2017-26 | https://doraemon.mangawiki.org/gulper-eel/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320070.48/warc/CC-MAIN-20170623151757-20170623171757-00687.warc.gz | en | 0.973825 | 308 | 3.09375 | 3 |
Global Positioning system facts
Global positioning system facts are centred on the applications and uses of GPS systems. GPS systems are the easiest and most accurate ways to track vehicles, mobile phones and various other objects, which support the installation of GPS devices.
The GPS systems may be expensive or economical, that only depends how powerful they are and who is using them. GPS systems used in homes are most likely cheap and less powerful with lesser number of features, which also means lesser range. However, huge companies and firms that want to use GPS on a large scale buy the most advanced versions of GPS, little worrying about the cost factor. It would be an understatement that GPS devices have brought a new wind to our security measures. For people concerned about the security of their vehicles especially, it comes as a very needful facility.
A sports enthusiast or an athlete is always asking for some devices that would help him/her to measure aspects and nuances of their performances. For the same purpose, GPS has certain devices that come of great use to athletes and sportsmen alike. These units can be worn in the wrist like watches. There are also systems specifically designed for marine conditions. Apart from that, there are many features incorporated like heart rate check screen, lap/racing timers, calorie count monitors, and many other software based applications that are sophisticated and provide a high-end service. With such sophisticated devices, all the above-mentioned tasks become easy to implement.
As the name suggests, a Vehicle tracking system helps locate the vehicles in a region that may vary from a certain locality to a whole country in case of expensive and powerful devices. It is most useful for security purpose. Theft cars with GPS installed can be easily tracked and returned to its owners. In cars, it is basically computer software installed at least at one operational base to enable the owner or a third party to track the vehicle's location.
GPs system mechanics is largely centred on the maps and internet technology. With their help, the GPS data is sent from the object to the base station, where GPS receiver receives it. The base station has database and software that evaluate the data. After accurate evaluation, we get the accurate result, i.e. the location of the exact place we are looking for. by the device is stored in a secured database of Vehicle Tracking application. In case of disturbance in the network or even the absence of proper signals, the data gets stored locally and is send after the network is established.
We request you to call us at +91 9313063554 or email us at [email protected] for you software development needs. | <urn:uuid:42301b3b-9c65-4bf6-acdc-68a5cbfa1f4c> | CC-MAIN-2013-48 | http://www.roseindia.net/services/trackingsystem/globalpositioningsystemfacts.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164034375/warc/CC-MAIN-20131204133354-00070-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.962023 | 534 | 2.890625 | 3 |
Debugging is the process of fixing things. So let’s keep it simple, real simple. No matter what you are trying to fix whether is is computer code or student behavior, there is a process of three simple things. Memorize and do these three things daily until it becomes second nature. Here it is…
- What should it be doing?
- What is it doing?
- What needs to be done to fix it?
Works great with student behavior. Ask the off task student, what are you doing? Pause and wait for a response. Then ask, what should you be doing? Pause and wait for their response. Then ask them what are they going to do to solve the problem. Wait for their response.
Same way with coding and everything else in life. Three simple questions to process your thinking toward successful solutions. | <urn:uuid:5f6cd0c5-2950-46c8-ba14-6f2cf37b3727> | CC-MAIN-2017-34 | http://kparmley2.edublogs.org/2016/03/09/three-things/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107720.63/warc/CC-MAIN-20170821060924-20170821080924-00333.warc.gz | en | 0.962661 | 175 | 3.078125 | 3 |
Three elderly New Yorkers—Yok Ziebel, Julie Luguvoy and Pete Rosenblum—are meeting at the apartment complex in the Bronx where they grew up together. They embrace with all of the affection of lifelong friends. They joke with each other (Ziebel: “Did you lose weight?” Rosenblum: “No, I’m shrinking.” Ziebel: “We’re all shrinking.”). They reminisce.
This sweet moment begins a splendid, subtle documentary, “At Home in Utopia,” created by Michael Goldman and Ellen Brodsky, which will be shown on the PBS “Independent Lens” series April 28. (Check your local PBS station schedule here.)
Ziebel, Luguvoy and Rosenblum grew up in one of the most remarkable and least-known experiments in the history of the union movement—the housing cooperatives of New York City, built mainly by immigrant Jewish workers in the early 20th century.
These workers agreed on very little. They were socialists, liberals, labor Zionists, communists, anarchists and everything in between. They engaged in some ferocious political fights in their day.
Yet they all had something powerful in common. They thought unions should aim for “a shenere un besere velt”—a more beautiful and better world, as the Yiddish socialist Workmen’s Circle put it—even if they passionately disagreed about what that world would look like.
How to get from here to there? That’s where the housing cooperatives (and other kinds of cooperatives) came in.
Labor Zionists built the Farband houses. Socialists and Communists started the Shalom Aleichem Houses. The Amalgamated Clothing Workers Union sponsored the Amalgamated Houses. But the largest of all when it opened its doors was the United Workers Cooperative Colony, or the “Co-ops,” the home for more than 700 Communist and pro-Communist working families starting in the 1920s.
It’s where Ziebel, Luguvoy and Rosenblum spent their childhood. Says Rosenblum:
This was all an experiment. The people that started the experiment thought we’ll end up with heaven on earth.
Heaven didn’t arrive, but the Co-ops changed the lives of everyone who lived there.
For one thing, it was a vast improvement over the hideous slums and tenements of the Lower East Side and Brownsville where most of them had been stuck. Harriette Bressack recalls:
When my mother moved into the Co-ops, she was delighted, because where she lived before there was no greenery. In the spring, when just that pale green would come, she would say, “This is the part I love.” And my kids to this day say, “That’s your mother’s color coming up now.”
Yet there was more to the Co-ops than gardens and space and fresh air. Says Lugovoy:
I think that what my parents felt here was that they were the owners of both their apartment and their fate, of what happened to them.
In the 1930s, when racially integrated housing was nearly unheard of, the Co-ops were integrated. In retrospect, it was one of their finest achievements. Says Mary Louise Patterson, whose father was a lawyer for the Scottsboro Boys:
I grew up in neighborhoods that were black. You didn’t live in a building with white people. So it was very different to go to a place like the Co-ops and see black and white people living together, because the children socialized together—which we did! And I did!
One of the most touching moments in “At Home in Utopia” is when Boris Ourlicht, a Pole, tells about his first date in 1947 with Libby Dickerson, an African American. “Oh, she was a beauty!” he says with tears in his eyes. Inside the Co-ops, an interracial relationship was perfectly fine. But as they were driving down to Greenwich Village, a policeman saw the two of them together, insulted them, arrested them and took them to the police station.
It’s hard to imagine a more disastrous first date—but that hardly stopped them. They fell in love and were happily married until Dickerson’s death in 1995. As Ourlicht is being interviewed, her photo sits next to him.
There came a time when the Co-ops needed to raise the monthly rent by $1 per room to meet the terms of a mortgage. The residents voted against the increase. As a result, the mortgage deal collapsed and a company called the BX Corp. took over the apartments. That was more than 60 years ago.
So what became of the other workers’ housing cooperatives in New York?
The Shalom Aleichem apartments have been under private ownership since the 1930s. One of the Farband ’s buildings was sold but the other is still a co-op. The union-supported Amalgamated Cooperative is still flourishing with 1,500 families—and over the years, its managers have built even more high-rise cooperatives around the city.
And the Co-ops of the Bronx, with all of its achievements and flaws and dreams, left a legacy. It wasn’t what the founders planned. “We were expected to conquer the world,” says Rosenblum. They never came even close.
But they did produce a generation, now in their 70s and 80s, who have lived their long lives with a storehouse of rich, complicated memories—and a particular, passionately held vision of justice that changed its contours but never completely disappeared. | <urn:uuid:898d9ee4-23d5-440c-9f00-316fa7a582bc> | CC-MAIN-2014-41 | http://www.peoplesworld.org/at-home-in-union-made-utopia-pbs-looks-at-the-housing-co-op-movement/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137906.42/warc/CC-MAIN-20140914011217-00014-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.979608 | 1,221 | 2.75 | 3 |
Shopping for healthy foods can be tricky unless you know a few tips for how to figure out how healthy a food is for you. Food packaging can be so deceiving since even the foods with added vitamins and minerals or that are whole grain, can be laced with sugar and filled with chemicals. But not to worry, once you getinto the swing of looking for certain things on a food package, it becomes an automatic instinct to know which foods are healthy for you and which ones aren’t. Try looking at a few of these signs below to figure out how healthy a food is next time you're at the store. In no time you'll be a pro at healthy shopping and at healthy eating!
1. Fiber Vs. Sugar
When first trying to figure out how healthy a food is, look at the carbohydrate content and see how much of those carbs are dedicated to fiber. Right under the carbohydrate amounts on a nutrition panel, you’ll see different amounts for fiber and sugar. Optimally fiber should be at least 3 grams or more, and sugar should be 3 grams or less per serving.
While you don’t need to go protein-crazy, you do need to ensure you get enough to fuel your muscles, slow down your blood sugar, and sustain you for longer. Optimally, if you buy something packaged, it’s great if it has 5 grams of protein and is made from a whole food source.
Cholesterol only exists in animal-based foods and it’s essential to monitor your cholesterol for healthy heart levels. Check the cholesterol levels on the back panel on all processed foods you buy. The amount should optimally be lower than 5% of your daily values (DV) as the healthiest option, while 0% is even better.
Processed soy is filled with genetically modified ingredients (also known as GMOs), and very inflammatory to your body. It's also harsh on your endocrine system and can affect your hormones negatively in a short amount of time. If soy is listed in the ingredient list, be sure it comes from a non-GMO source if you choose to buy it at all.
I think healthy fats are essential for maintaining a healthy body, so don’t go for fat-free items unless they’re naturally fat-free such as produce, egg whites, etc. If you buy packaged food, however, be sure that the fat doesn’t come from oils, especially in hydrogenated forms or from whole milk, butter, cheese, etc.
Not only is it essential to read the ingredient list on every product you buy, but you should also see how many ingredients it has. It’s always a good idea to avoid foods that have more than 5 ingredients, and optimally, they’ll have no more than 3 ingredients.
7. Processed Vs. Whole
The best way to figure out how healthy a food is for you is to choose whole foods over processed foods. Then, the guesswork is taken away for you. Whole foods like produce don’t need a nutrition panel to tell you how healthy they are. Remember, the cleaner your food is, the healthier it is for you.
It’s easier to take care of yourself when you feel confident about your food choices. Empower yourself with these tips and you’ll be a healthy shopper in no time! Do you have your own trick for how to figure out if a food is healthy or not? Feel free to share. I’m always up for new ideas! | <urn:uuid:ff30a4b5-8ed7-48c6-9a52-def3f3e4eccf> | CC-MAIN-2019-30 | https://health.allwomenstalk.com/tricks-to-figure-out-how-healthy-a-food-is-for-you/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526508.29/warc/CC-MAIN-20190720111631-20190720133631-00312.warc.gz | en | 0.950514 | 729 | 2.75 | 3 |
A charge controller, also
known as a solar regulator, is a
regulator that goes between the solar panels
and the batteries. A charge controller
is used to regulate the voltage and current
coming from the solar panels and going to the battery. As
the input voltage from the solar array rises, the charge
controller regulates the charge to the batteries preventing
any over charging.
A controller can also provide a direct connection to appliances,
while continuing to recharge the battery.
Modern charge controllers use pulse width modulation
(PWM) to slowly lower the amount of power applied
to the batteries as the batteries get closer and closer
to fully charged. The newer Maximum Power Point
Tracking (MPPT) controllers are even better.
MPPT charge controllers allow your solar panels
to operate at their optimum power output voltage, improving
their performance by as much as 30%. They can also match
the output of the solar panels to the battery voltage to
insure maximum charge (amps). MPPT charge controllers are
more expensive that PWM charge controllers, but the advantages
are worth the cost. If you can afford it, you should definitely
use an MPPT charge controller. | <urn:uuid:a78866cc-be32-4429-8b36-dcc03616a219> | CC-MAIN-2020-10 | http://isustainaustralia.com.au/controllers/controllers.htm | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143646.38/warc/CC-MAIN-20200218085715-20200218115715-00317.warc.gz | en | 0.891703 | 246 | 3.1875 | 3 |
By Jean-Luc E. Cartron, Gerardo Ceballos, Richard Stephen Felger
This publication describes the biodiversity and biogeography of nothern Mexico, records the organic value of local ecosystems and the affects of human land use at the conservation prestige of vegetation and flora and fauna. it may develop into the normal resource rfile for the conservation prestige of species and ecosystems during this area, that's of bizarre organic curiosity as a result of its excessive biodiversity and hugely diverse panorama and organic zonation.
Read Online or Download Biodiversity, Ecosystems, and Conservation in Northern Mexico PDF
Best latin america books
Writer word: ahead by means of Marcos Cueto
Studies difficult the concept know-how and technology stream simply from international North to South.
The essays during this quantity research the construction, version, and use of technology and know-how in Latin the United States. They problem the view that medical principles and know-how go back and forth unchanged from the worldwide North to the worldwide Sout -- -the view of know-how as "imported magic. " They describe not just exchange pathways for innovation, invention, and discovery but in addition how rules and applied sciences circulation in Latin American contexts and transnationally. The contributors' explorations of those concerns, and their exam of particular Latin American reviews with technological know-how and know-how, supply a broader, extra nuanced knowing of ways technological know-how, expertise, politics, and tool have interaction some time past and present.
The essays during this ebook use equipment from historical past and the social sciences to enquire kinds of neighborhood production and use of applied sciences; the flow of rules, humans, and artifacts in neighborhood and worldwide networks; and hybrid applied sciences and types of wisdom creation. They tackle such subject matters because the paintings of lady forensic geneticists in Colombia; the pioneering Argentinean use of fingerprinting know-how within the past due 19th century; the layout, use, and which means of the XO Laptops created and disbursed through the only computer in keeping with baby software; and the improvement of nuclear power in Argentina, Mexico, and Chile.
Contributors: Pedro Ignacio Alonso, Morgan G. Ames, Javiera Barandiaran, Joao Biehl, Anita Say Chan, Amy Cox corridor, Henrique Cukierman, Ana Delgado, Rafael Dias, Adriana Diaz del Castillo H. , Mariano Fressoli, Jonathan Hagood, Christina Holmes, Matthieu Hubert, Noela Invernizzi, Michael Lemon, Ivan da Costa Marques, Gisela Mateos, Eden Medina, Maria Fernanda Olarte Sierra, Hugo Palmarola, Tania Perez-Bustos, Julia Rodriguez, Israel Rodriguez-Giralt, Edna Suarez Diaz, Hernan Thomas, Manuel Tironi, Dominique Vinck"
"An illuminating perception. .. attention-grabbing. "—Amanda Grange, bestselling writer of Mr. Darcy's Diary
"A trip via either a actual panorama and the geography of the human middle and brain. .. delightfully pleasing and sometimes deeply relocating, this booklet reminds us that Austen's world—and her characters—are a great deal alive. "—Michael Thomas Ford, writer of Jane Bites again
WHERE DO BOOKS TAKE YOU?
With a suitcase packed with Jane Austen novels en español, Amy Elizabeth Smith trigger on a yearlong Latin American event: a touring booklet membership with Jane. In six particular, unforgettable international locations, she accrued book-loving new friends— taxi drivers and lecturers, poets and politicians— to learn Emma, feel and Sensibility, and satisfaction and Prejudice.
Whether sharing chicken beer with Guatemalans, becoming a member of the gang at a Mexican boxing fit, feeding a horde of tame iguanas with Ecuadorean childrens, or tangling with argumentative booksellers in Argentina, Amy got here to benefit what Austen knew all alongside: that we're no longer continuously talking an identical language— even if we're talking an identical language.
But with real Austen intuition, she may well realize while, without notice, she'd chanced on her personal Señor Darcy.
All Roads result in Austen celebrates the easiest of what we like approximately books and revels within the excitement of sharing an exceptional book— with solid pals.
A lot of the literature at the Cuban Revolution appear to be mesmerised via the character and function of Fidel Castro, an interpretation which has frequently avoided a deeper political knowing of the Revolution's underlying constructions. the following Anthony Kapcia bargains a much-needed corrective to 'Fidel-centric' histories of the Cuban revolution, focusing in its place on a much wider solid of characters unknown to informal observers.
- Insatiable Appetite: The United States and the Ecological Degradation of the Tropical World
- Pathways to Power: Political Recruitment and Candidate Selection in Latin America
- The Economics of Poverty, Inequality and Wealth Accumulation in Mexico
- International Labor Organizations and Organized Labor in Latin America and the Caribbean: A History
Additional resources for Biodiversity, Ecosystems, and Conservation in Northern Mexico
The persistence of such different climatic regions in this vast territory for an interval nearly half as long as the Cenozoic must have had a profound effect on soil development and, of course, on the resident biota. It should be noted that northern Mexico’s present-day climate is influenced and partly determined by factors or phenomena occurring elsewhere, such as the El Niño/Southern Oscillation, polar air-mass invasions, and hurricanes, which in turn are controlled by physical or astronomical causes of worldwide reach.
Lago Santiaguillo, about 70 km north of Durango City, is the only lake in this province. Geomorphologically, the province consists of closely spaced volcanic sierras and plateaus that coalesce to form larger ranges. River systems draining largely into the Gulf of California separate the individual sierras and plateaus (fig. 7). Geologic Aspect The volcanic bodies that make up the Sierra Madre Occidental Province are arranged in 2 complexes. The Lower Complex chiefly consists of andesitic lavas and pyroclastic sheets (some are rhyolitic) dating 100–45 ma; it is broadly arcuate and in- tensely faulted; its basement is largely unknown, but some Cretaceous carbonates have already been detected.
The only Jurassic (Early) vertebrate fauna of this province comes from the Huizachal Canyon in Tamaulipas (fig. 7, location 1; Clark et al. 1994, 1998; Fastovsky et al. 1995; Reynoso-Rosales 1996; Montellano-Ballesteros 2002). The Mesozoic units are folded into anticlinoria and synclinoria, whose spacing diminishes from west to east; around Monterrey, Nuevo León, they bend westward, changing their axial orientation from north-northwest–south-southeast to nearly east–west. These structures are also cut by faults.
Biodiversity, Ecosystems, and Conservation in Northern Mexico by Jean-Luc E. Cartron, Gerardo Ceballos, Richard Stephen Felger | <urn:uuid:dd264a60-4076-4187-8a1a-c1b777d99b5a> | CC-MAIN-2020-45 | http://mountainwindtreks.com/books/biodiversity-ecosystems-and-conservation-in-northern-mexico | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107922463.87/warc/CC-MAIN-20201031211812-20201101001812-00546.warc.gz | en | 0.886327 | 1,525 | 2.671875 | 3 |
History and Government > World History > 1000–1899 (A.D.) World History > 1200–1299 (A.D.) World History
In 1095 at Council of Clermont, Pope Urban II calls for war to rescue Holy Land from Muslim infidels. The First Crusade (1096) is assembled in response to Emperor Alexius I. The Christians capture Antioch (1098) and Jerusalem (1099). They establish the Crusader States, ruled by Europeans. It is the only successful crusade. The Second Crusade begins after the Seljuk Turks recapture Edessa, one of the Crusader States, in 1144. It is led by King Louis VIII of France and Holy Roman Emperor Conrad III. Crusaders perish in Asia Minor (1147).
Saladin controls Egypt (1171), unites Islam in holy war (jihad) against Christians, recaptures Jerusalem (1187). Third Crusade (1189) under kings of France, England, and Germany fails to reduce Saladin's power. Fourth Crusade (1200–1204)—French knights sack Greek Christian Constantinople, establish Latin empire in Byzantium. Greeks reestablish Orthodox faith (1262).
Children's Crusade (1212)—only one of 30,000 French children and about 200 of 20,000 German children survive to return home. Other Crusades—Fifth, against Egypt (1217), Sixth (1228), Seventh (1248), Eighth (1270). Mamelukes conquer Acre; end of the Crusades (1291).
Information Please® Database, © 2007 Pearson Education, Inc. All rights reserved.
More on Crusades from Infoplease: | <urn:uuid:39cc6349-f4b1-4911-8c9c-4f9ebd7008ae> | CC-MAIN-2015-18 | http://www.infoplease.com/ipa/A0001214.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246656747.97/warc/CC-MAIN-20150417045736-00100-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.808295 | 341 | 3.53125 | 4 |
An Atlas of Human Immune Cells Through Tissues
In a recent article published in the Science journal, researchers demonstrated tissue-specific immune cell characteristics in humans by performing an assessment of inter-tissue immune cells.
Study: Analysis of intertissue immune cells reveals tissue-specific features in humans. Image Credit: sciencepics/Shutterstock
The human immune system encompasses many types of cells distributed throughout the body. Although peripheral organ immune cells play an important role in disease and health, most existing research on human immunity focuses on blood-derived immune cells. Thus, there is insufficient data regarding the fine differences between immune cell types between organs.
Immune cells adapt to their environment, developing specialization and unique functional characteristics. Assessing these molecular adaptations via comprehensive examination of cells throughout the human body will provide more information about the immune system at the organism level.
About the study
In the current study, the researchers performed a multi-tissue analysis of immune cells throughout the human body in various organ donors. The team found tissue-restricted expression patterns in the lymphoid and myeloid compartments by sampling many organs from the same subjects, which allowed for significant control of gender, age, drug exposure, sampling parameters and medical history.
Scientists thoroughly analyzed immune cell types by assessing the immune compartment of 16 donor-matched tissues from 12 dead adult organ donors. The team extracted immune cells and performed variability, diversity, and junction (VDJ) sequencing and single-cell ribonucleic acid sequencing (scRNA-seq) for B and T cell receptors, yielding a top-quality dataset comprising approximately 360,000 cells.
Additionally, the authors created a logistic regression framework based on stochastic gradient descent learning called CellTypist for accurate and rapid immune cell type identification. They used CellTypist for the complete resolution of immune cell diversity in tissues. This approach has facilitated the assessment of tissue-specific and shared cell states and expression modules within lymphoid and myeloid cell lines. Additionally, the team determined the tissue distribution of finely phenotyped immune cell types (T and B cells) using CellTypist coupled with careful preservation.
The results of the study showed that the authors created CellTypist by assembling a detailed reference repository of immune cell types by selecting and harmonizing available sources. Applying CellTypist to current data collected from many tissues and people discovered 101 immune cell populations.
The authors found that while macrophages exhibited the most drastic tissue-specific traits, they also demonstrated few convergent properties. For example, macrophages harboring genes related to erythrophagocytosis have been widely observed in the liver, spleen, lymph nodes, and bone marrow. Heterogeneity within specified subpopulations, such as migratory dendritic cell adaptations, primarily CC chemokine receptor type 7+ (CCR7+), was also found.
Researchers have discovered tissue-specific memory population distributions among adaptive immune lineages. The observed memory B lymphocytes do not show clonal proliferation. Additionally, about half of them had the immunoglobulin M (IgM) subtype, indicating that they may exist in low numbers in healthy tissue and grow in response to challenge and aging. While plasma cells were only found in a few tissues, memory B cells were distributed throughout the body.
In addition, the current results shed light on the tissue specializations of T cells and the diversity of T cell subtypes in the T cell compartment. Unlike effector and central memory T cells, resident memory T cells in tissues (TRM) cells show a more constrained distribution. VDJ sequencing revealed that TRM the cells had great diversity, consisting of γδ and αβ lineages. Analysis of clonal dynamics illustrated the highest TRM cellular clonal expansions, i.e. a single pair of Tαβ cell receptor (TCRαβ) chains and the most common clonal sharing (TCR) between effector and resident memory populations.
The results of the study described a map of immune cells of lymphoid and myeloid lineages in adult human tissues. For automated characterization of immune cells, researchers created CellTypist and performed a comprehensive analysis of cell populations. The team identified 101 cell states or types using CellTypist from over one million cells, including previously underestimated cell states. Additionally, the results described convergent phenotypes among lineages and characterized tissue adaptation signals for various cell types, namely resident memory T cells and macrophages.
Collectively, the current research has expanded existing knowledge of human immunity functioning as an interconnected inter-tissue network. The study also offered several vital new resources to the scientific community. Current data on intertissue immune cells is important for targeting cells to selected tissue regions and designing cells for treatment. Additionally, this has implications for studying tissue-specific aspects of infection and different routes of vaccine delivery to tissues. | <urn:uuid:dc11517e-9aca-43f4-aa49-435f61422b67> | CC-MAIN-2022-49 | https://nalburiyedergisi.com/an-atlas-of-human-immune-cells-through-tissues/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711218.21/warc/CC-MAIN-20221207185519-20221207215519-00745.warc.gz | en | 0.933025 | 1,006 | 3.5 | 4 |
Sedum, often called stonecrop, is a succulent perennial featuring fleshy foliage that stores water, which makes it very drought-tolerant. A perennial garden favorite, sedum is available in a variety of species, ranging from tall upright plants to groundcovers less than 2 inches high.Continue Reading
Sedums are available in more than 400 different species with wide-ranging features, including herb, shrub and mat-forming characteristics. Tiny star-shaped flowers appear in clusters and sprays on many sedums, with bloom times beginning in summer and bloom colors deepening as the season moves into autumn. Colors are generally pink, red, white, yellow and gold, depending on the variety.
Sedums, which are easily grown in most temperate regions, thrive with little care. They require well-drained soil and do best in full sun, although they tolerate some shade. Sedum varieties are excellent additions to the xeriscape garden. Tall varieties add drama to a perennial border, while low-growers are often planted in rock gardens and containers.
Plant sedum plants in the spring, spacing them from 6 inches to 2 feet apart, depending on the variety. Before planting, dig up the area with a garden fork, loosening the soil to a 12-inch depth, mixing in a 2- to 4-inch layer of compost. Dig a hole twice the size of the root ball for each sedum plant. Carefully tip out the plant from its container and place it gently in the hole with the top of the root ball level with the soil surface. Fill in the hole around each plant, gently firming the soil. Water thoroughly, and apply a 2-inch layer of mulch around the plants to retain moisture and control weeds. After the first frost, cut off the plant stems, leaving only 2 inches above the ground. Divide sedum plants every three to four years in the spring.Learn more about Outdoor Plants & Flowers | <urn:uuid:97b3421f-5112-4cee-846d-023b4d8326b1> | CC-MAIN-2017-39 | https://www.reference.com/home-garden/sedum-perennials-4a2e2e41ab860169 | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689102.37/warc/CC-MAIN-20170922183303-20170922203303-00706.warc.gz | en | 0.921091 | 403 | 3.125 | 3 |
Diabetes Mellitus: Ways to Reduce Insulin Resistance
Insulin is crucial for the body to maintain blood sugar levels and it also reduces the risk of diabetes mellitus. Insulin is produced in the pancreas and help’s in the absorption of glucose from the blood. Insulin resistance is a result of the hormone, insulin failing to process sugar in food, which is glucose.
The doctor adds, “Insulin resistance is also associated with other metabolic abnormalities like abnormal lipid levels, increase in blood pressure, and development of atherosclerosis (term for cholesterol deposition in blood vessels).”
Hence some of the other illness associated with insulin resistance are blood pressure and cardiovascular diseases. “There are no specific symptoms of insulin resistance,” says the doctor. But there are some skin ailments that are synonymous with insulin resistance. Dr. B.M. Makkar explains it, “We may find some surrogate markers of insulin resistance on clinical examination like an increase in pigmentation and skin thickening on skin folds, a hump on the nape of the neck and the presence of high blood pressure.”
Ways to reduce insulin resistance:
- Red wine
- Foods high in fibre
- Antioxidant rich foods
- Weight management
- Olive oil
- Soy based products
Obesity and being overweight are the main reasons for insulin resistance. Besides genetics, Dr. B.M. Makkar says, “Other important factors which contribute to the development of insulin resistance are physical inactivity and being overweight or obesity.” Hence weight loss and weight management is important to reduce one's chances of insulin resistance.
FOR MORE: Insulin Resistance
*Images courtesy: © Thinkstock photos/ Getty Images
Former NFL cheerleader, competitive gymnast and pro fitness athlete, Ramona Braganza is...
Blue is one colour that always looks good on any skin! I'm talking about...
No matter how many hours we have in the day, we always fall short of time try to take... | <urn:uuid:a5f672a1-7e9d-4814-9b77-9806356eab2c> | CC-MAIN-2014-49 | http://healthmeup.com/news-buzz/diabetes-mellitus-ways-to-reduce-insulin-resistance/27310 | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400372999.9/warc/CC-MAIN-20141119123252-00100-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.913739 | 418 | 3.09375 | 3 |
Reviews and recommendations are unbiased and products are independently selected. Postmedia may earn an affiliate commission from purchases made through links on this page.
For American photographer Anand Varma, it’s the littlest creatures that intrigue him the most.
While other National Geographic photographers are observing and recording the behaviour of polar bears, elephants, whales or eagles, Varma turns his cameras on hummingbirds, crickets and bees.
tap here to see other videos from our team.
Varma has now teamed up with molecular biologist Prasenjeet Yadav for Scientific Exposure, the first of Arts Commons 2021 National Geographic Live presentations.
The 2021 season will be presented virtually and households can reserve a free ticket at artscommons.ca/natgeolive or call 403-294-9494 for the Feb. 8 screening of Scientific Exposure at 7 p.m. Following the film, there will be a live, moderated Q&A with Varma and Yadav.
“When I say I am photographing the smallest of creatures, some people think I mean viruses or bacteria but I mean creatures like the hummingbird that is far from microscopic.
“The problem with the hummingbird is it moves so fast it’s impossible for the naked eye to appreciate the intricacies of its movements. The hummingbird deserves our attention because it represents the extreme limit of what a bird can do. We want to understand why and how this little bird’s heart and wings beat so incredibly fast. We have developed some very ingenious ways to spy on the lives of hummingbirds that we will share with you,” Varma said. “We will show you a hummingbird drying itself off after a rainstorm. It’s amazing footage.”
Varma also turned his camera on crickets, not so much to watch them but to observe the parasites that use these crickets as their host and have learned to control their minds.
Varma admits this sounds like science fiction but it’s just because “the general public has no idea what is going on inside these crickets for the parasite to complete its life cycle.
“With the power of photography, we’re going to show you both the cricket and the parasite simultaneously. The parasite or worm needs to be in a body of water to complete its cycle so it manipulates the poor cricket to find one. Usually, the cricket drowns once the parasite or worm exits and our cameras will show this moment which is something the naked eye would miss.”
Varma uses time-lapse photography to show what happens inside the hives of honeybees, exposing their world to unsuspecting humans.
The photographer is already at work on his next project, a study of jellyfish. As he did for the cricket study in Scientific Exposure, Varma got deeply involved in the research, filling his garage with aquariums to study the jellyfish. “I use my kitchen, garage and backyard for these studies. There is a world right around us that is so intriguing and deserves our attention.”
While the species Varma studies can be quite small, he says he didn’t need any special equipment or cameras to record their interactions. But he did have to learn how to shoot them. “I needed to learn to manipulate light sources to make the filming possible.”
Scientific Exposure is the first of five virtual National Geographic Live presentations. | <urn:uuid:9fcf5b15-f55b-4826-b565-de0bcc135909> | CC-MAIN-2021-31 | https://calgarysun.com/entertainment/theatre/national-geographic-live | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154457.66/warc/CC-MAIN-20210803092648-20210803122648-00085.warc.gz | en | 0.945984 | 711 | 2.640625 | 3 |
|Posted on May 13, 2014 at 4:14 PM||comments (168)|
Last year, more than 200 children ages 1-14 drowned in a swimming pool or spa, and three out of four were under the age of 5.(1) To prevent injuries at your pool or spa this summer, follow these five simple tips from public health organization NSF International.
View video: Five Steps to a Safer Pool and Spa This Summer
1. Use and store chemicals properly
Mishandling of pool chemicals causes 4,000 emergency room visits each year.(2) Be sure to: replace pool chemicals past their expiration dates, read and follow the manufacturer's instructions and most importantly, store chemicals out of reach of children.
2. Don't forget about that pool/spa cover
Within 10-20 seconds, a partially removed pool/spa cover could return to its original position, hiding someone underneath. Be sure to: remove covers completely before using a pool or spa and drain any standing water from the cover surface, especially after rain.
3. Pay attention to drain covers
Between 2008 and 2012, 39 people were trapped in pool/spa drains including 2 children who died. Don't let anyone play on or near drains and be sure to:purchase drain covers that meet current Pool & Spa Safety Act requirements,ensure they are properly installed and most importantly, know where the emergency shut-off switch is located and how to use it.
4. Use pool alarms
Most young children who drown in pools were out of sight less than five minutes. In addition to a fence, consider a certified pool alarm such as those worn on a child's wrist that alerts parents if they fall into the water, a surface wave sensor that floats on the water surface or a sub-surface disturbance sensor mounted to the pool wall.
5. Always supervise kids using the pool
Be sure to: establish and enforce rules for pool and spa use, don't allow kids to run or play games near the pool, keep toys, particularly wheeled toys, away from the pool and make sure you know if anyone using your pool cannot swim.
“Whether you swim at home or use a public pool,it's important to keep in mind that pools can pose a hazard if they aren't properly used or maintained. Follow these five tips to prevent drowning and injury at your pool this summer,” said Cheryl Luptowski, Public InformationOfficer for NSF International.
Since the 1960s, NSF International has beenworking with pool and spa owners and users who are concerned about safety.Whether you are looking for tips to help make pool and spa use more enjoyableand safe or need help selecting the right equipment, NSF can help. Visit us at http://www.nsf.org/consumer or contactNSF's Consumer Affairs Office at info(at)nsf(dot)org.
About NSF International: NSF International is a global independent public health and safety organization that helps protect consumers by certifying products and writing standards for food, water, dietary supplements and consumer goods to minimize adverse health effects and protect the environment. Operating in more than 150 countries, NSF International is a Pan American Health Organization/World Health Organization Collaborating Centeron Food Safety, Water Quality and Indoor Environment. NSF tests and certifies pool and spacomponents(e.g. pumps, drain covers, filters, etc.) and has developed an American National Standard that specifies pool equipmentrequirements.
1 Source: Consumer Product Safety Commission
2 Source: U.S. Centers for Disease Control | <urn:uuid:ccd081bd-2a53-46c3-9e50-efb025509205> | CC-MAIN-2021-49 | https://bodaciouspools.com/apps/blog/?view_type=1&siteId=140708782&locale=en-US | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362219.5/warc/CC-MAIN-20211202114856-20211202144856-00102.warc.gz | en | 0.941966 | 750 | 2.671875 | 3 |
Historians have made use of computers in their research and teaching almost as long as computers have been in existence. The 1960s saw the first revolution in history and computing as historians harnessed the potential of the computer to analyse far more information than had previously been possible, provide greater precision to their findings, open up new avenues of research and enable verification and comparison of their research data.
It was these advantages that led to computers becoming the handmaiden of the 'new', quantitative, social scientific and cliometric history that sprung up in the post-war years. Thus computing became indelibly, and often pejoratively, associated with quantitative history, an association that it has struggled to shake off ever since. By the 1970s, the perhaps predictable backlash had begun, even among some of those who had been converts to the cliometric cause. The 'new' history was attacked for turning historians into statisticians, slaves to quantitative analysis, narrowly focused and divorced from the people, places and events they purported to research. The debate was epitomised by the controversy over Fogel and Engerman's 1974 two-volume quantitative analysis Time on the Cross: the Economics of American Negro Slavery.(1) The authors were unfairly accused of endorsing slavery by suggesting that on economic grounds it was not an inefficient or uneconomic institution and that slaves had a better standard of living than many northern industrial workers. More substantive criticism, particularly by Herbert Gutman, could be made of the assumptions, sampling and mathematics used.(2) Even though later analysis supported Fogel's and Engerman's conclusions, Time on the Cross provided all the ammunition needed for those seeking to discredit the 'new' history as a computational tail wagging the historical dog.
Like many revolutionary movements, the first wave may have inspired, challenged and threatened the mainstream majority in equal measure, but ultimately failed to persuade them. But the flame was not extinguished entirely. The early converts retreated into the newly formed departments of economic and social history, safe in the embrace of social science faculties rather than the hostile or indifferent environment of traditional historians in the faculty of arts.
It should come as no surprise to discover then that the subsequent development of history and computing can appear as complex, contradictory and confusing as the past events that historians seek to explain. Nevertheless, the history of history and computing, its current status and future potential is revealing not only of historians' various struggles with information technology but of their wider approach to the discipline.
In their 1993 publication Computing for Historians: an Introductory Guide, Evan Mawdsley and Thomas Munck entitle their first chapter 'History and computing: the second revolution'.(3) This second coming for history and computing in the mid 1990s was based on a number of technological advances: the advent of affordable microcomputers from the mid 1980s, improvements in networking and storage capacity and the development of generic, and relatively easy, programs for common applications. Historians no longer had to grapple, sometimes literally, with paper tape, punch cards or reels of magnetic tape. They did not need to become accomplished programmers or beholden to those who were. Historical sources did not need to be reduced to a series of numeric codes, nor quantified to the nth degree for meaningful results to emerge. There were no claims that computer methods would turn history upside down; in the UK at least, it sought to persuade rather than exhort, and emphasised the computer as a tool that could help the historian do what he or she has always done, but more efficiently and effectively.
The computing historian's weapon of choice was, and remains, the database, particularly in relational form. Long text fields enabled historians to retain something of the integrity of original sources and rapid advances were made on issues such as classification and record linkage. By this time historians could also include sophisticated text analysis and retrieval software, adopted from literary and linguistic studies, to analyse unstructured or semi-structured sources, qualitative analysis tools and sophisticated statistical packages in their armoury. Furthermore historians benefited as much as anyone from improved word-processing software, email, digitisation, CD-ROM content, Usenet groups, TELNET, networked library catalogues, bibliographic tools and the general improvement of computer speed, memory and storage. At last history and computing seemed poised to break into the mainstream.
During this period undergraduate options that included computing techniques emerged, as did Master's courses dedicated to history and computing, and instruction on database techniques could be found in doctoral training programmes. The international Association for History and Computing (AHC), founded in the mid 1980s, and its journal History and Computing went from strength to strength and a multitude of national AHC organisations sprang up under its aegis. A plethora of acronyms, CTICH, TLTP, ALT, AHDS, HCC [J1] (4), reflected a concerted effort by UK research councils to establish a national network of expertise to support computer use in research, teaching and data preservation. A new sense of optimism and momentum emerged as historians adopted and adapted generic applications and tools from cognate disciplines to historical research and teaching.
The mid 1990s were, however, the high water mark of the second revolution. Even at the time, proponents such as Speck were lamenting:
And yet, and yet, while there is much to celebrate about the last decade, the fact remains that the profession is still divided between the small minority of historians who use computers as tools for analysing historical data and the vast majority who, while they might use a PC for word processing, remain unconvinced of the case that it can become a methodological asset.(5)
Indeed, Speck argued that aside from historical demography and psephology, computing had made little contribution to British history and there had been a retreat to narrative and high politics. The remaining years of the 20th century were to see little change in this position. By the early 2000s history and computing had made few inroads into traditional historical methods. The AHC withered on the vine, many of its national associations became defunct as did its journal, after some prolonged death throes. While there was no backlash as experienced in the first revolution the vast majority of historical research remained untouched by computer methods.
This stasis masked an underlying split in proponents of history and computing. On the one hand there were advocates of history and computing being recognised as a distinct discipline in its own right. Just as the life sciences have bio-informatics and geography has geomatics, then history should have historical information science (or historical information processing or computational history). Proponents of this view argued that historical sources are simply too ambiguous, relationships too complex and research questions needed to be formalised and generalised in a way that makes generic IT applications and traditional methodology unsuitable. In this view 'history and computing' is not about the application of computer technology to solve specific historical problems but a way of modelling or representing the past that is simply made operational by information technology.
On the other hand pragmatists argued that generic database, spreadsheet and statistical software could do 90 per cent of what historians demanded of them. And other software, such as text retrieval and analysis packages, could be readily adopted from literary and linguistic computing. They countered that the real challenge lay in persuading the vast majority of historians of the benefit of even relatively simple information technology, not in developing specialist historical tools and methods that would only ever be of relevance to a minority of historians. The historical information science approach risked alienating mainstream historians even further and turning history and computing into a ghetto.
The truth of course lies somewhere in between, or rather with aspects of both approaches. Historians in continental Europe, particularly The Netherlands, Germany and Russia, with their greater emphasis on theory and methodology, gravitated towards the historical information sciences approach. British historians, rooted in the empiricist tradition with their attachment to primary sources, and generally less interested in theoretical models, methodology and process than outcomes, tended towards the pragmatic approach. Meanwhile, historians in the USA, stung by the fallout from Time on the Cross in the first revolution, tended to shun quantification in any shape or form, save for a handful of historically orientated economists. These approaches, however, are not diametrically opposed to each other or mutually exclusive. They should be viewed as two points on a methodological continuum ranging from the computationally and methodologically light use of word processing, email and web searches, through the use of generic database and text analysis software that requires a modicum of computer experience and understanding of computer assisted research to the computationally intensive, technically demanding and methodologically innovative terrain of historical information processing.
If the story thus far seems one of perpetually unfulfilled potential, history and computing, in whatever manifestation, could still point to some notable achievements. The sterile debate over quantitative versus qualitative has hopefully been put to rest. Historians of all persuasions make quantitative statements all the time, the distinction being that some express these statements in words and others in numbers. Whether analysing change over time or the relationship between cause and effect it is impossible to avoid talking about extent, range, scope, degree, duration, proportion or magnitude, whether one is using adverbs and adjectives or decimal points and chi-squares.
Historians may still write in the narrative tradition but it is analytical narrative not descriptive narrative that has come to predominate. History and computing can not claim all of the credit for this development, but debates about the role of quantitative analysis undoubtedly encouraged greater precision in history writing. The historian today can also draw on decades of experience in accurately structuring relationships in databases, creating reliable record linkages and classification schemes that allow meaningful aggregation without blurring subtle distinctions. Nor does the employment of computer assisted research inevitably lead the historian to structured sources or statistical analysis. Qualitative research tools are an equally adept, if under utilised, compatriot of relational databases, as are the text analysis tools of literary and linguistic computing that can provide revealing insights into historical texts with no, or minimal, encoding to corrupt the integrity of the primary source.
In Britain we can also lay claim to over a decade of leadership in teaching history and computing, creating teaching resources, disseminating good practice and in the field of historical data creation, preservation and access. Subjects as diverse as historical demography, psephology, prosopography, elite structures, entrepreneurial history, family history, urban history, political history, social history, economic history, transport history, medical history and education history have all benefited from the speed, precision, capacity and verification that the application of computer assistance brings. Furthermore, historians have successfully tackled many technical and methodological challenges; these include data modelling, record linkage, family reconstruction, multiple regression analysis, event history analysis, simulation, fuzzy data, content analysis and Geographic Information Systems (GIS).
What then of the future – can we envisage a third revolution in history and computing? Although crystal ball gazing is a hazardous occupation and the track record of history and computing should caution against making any kind of prediction, it might well be that one is already underway. There are two aspects to this third revolution. The first is the broader context of research funding and information providers in which historians conduct their research. The second is developments within the field of humanities computing. Looking at both these aspects reveals tentative signs that developments are engaging historians in ways previous revolutions have failed to do.
The shift in research funding towards strategic rather than responsive modes, and towards collaborative and interdisciplinary research, may create an environment that is more conducive to the use of computer assisted research. It is by no means certain that this will be the case, but addressing broader strategic issues through interdisciplinary collaboration may well expose historians to computer resources and applications they would not otherwise encounter.
Of more immediate significance is the vast increase in digitisation activity by cultural heritage organisations that is putting a hitherto unimagined range of primary and secondary sources on historians' desktops. It remains to be seen if historians make the leap from using a computer to find and retrieve this information to using it to analyse it. Nevertheless, the availability of such sources, for some historians at least, removes one of the biggest barriers to the uptake of history and computing – that of creating machine readable material. One of the biggest factors in the cost/benefit analysis is the time it takes to transcribe source material in the first place, particularly for those who are uncertain about the benefits it would bring. Moreover, these developments are engaging historians with librarians, archivists and curators in issues of resource creation and discovery that did not tend to take place in the print culture and providing a useful testbed of the application of e-science and Grid technology to the humanities.(6)
If one turns to the broader field of humanities computing there are further signs of innovative work of relevance to the historical community. History and computing has always had a symbiotic relationship with humanities computing but there is evidence that the nature of this relationship is changing. No longer is it simply about adopting techniques from related disciplines, but as Boonstra, Breure and Doorn have suggested in Past, Present and Future of Historical Information Science,(7) a more collaborative relationship that includes those in the information and computer sciences. For example, the Armadillo project is a collaboration between the Department of History and the Department of Computing Science at the University of Sheffield. It has evaluated the benefits of semantic web technology for distributed historical materials involving natural language processing, data mining, knowledge management and ontologies, all aspects that have not hitherto been given much consideration by the historical community, although they have exercised those in humanities computing for some time.
There is also evidence of renewed interest in the methods and tools being developed by linguists, particularly corpus linguists, in areas such as text mining, corpus annotation, automated tagging and historical thesauri. Despite having different aims for and outcomes of their research, significant common ground exists between linguists and historians in their concern for the provenance, reliability and authenticity of texts, the challenges of variant spelling and meaning, and the opportunity that text mining tools provide to serve both communities. In this field the work of Paul Rayson (University of Lancaster) and Dawn Archer (University of Central Lancashire) in corpus annotation and retrieval, Clare Llewellyn and Rob Sanderson at The National Centre for Text Mining (NaCTeM) in text mining and Christian Kay (University of Glasgow) in historical thesauri are worthy of particular mention. Aside from the well established text analysis tools such as TACT and Wordsmith, developments such as Wmatrix, The Historical Thesaurus of English, nora project and Monk project all offer exciting possibilities.
The field of GIS has also excited historians and alliances of this with techniques such as visualisation and data mining present intriguing opportunities.# Computational 'Polichart' Cartography for Visualization of Historical GIS Patterns and Processes#, by Prof. Claudio Cioffi-Revilla (Center for Social Complexity, George Mason University) and #Integrating GIS and Data Warehousing in a Web Environment: a Case Study of the US 1880 Census#, by Richard Healy (Dept. of Geography, University of Portsmouth) are just two papers at recent AHC-UK conferences (8) that demonstrate innovative and productive applications of new techniques to historical data. The work of Gidon Cohen (University of Durham) with multiple recapture methods also demonstrates historians' continuing refinement of methods more commonly found in the natural and social sciences to the challenges posed by fuzzy historical data. Meanwhile, John Bonnett (Brock University) provides a thought-provoking scenario for the future of history and computing in #Abductive Reasoning, A-Life, and the Historian's Craft: One Scenario for the Future of History and Computing#.(9)
Such developments all provide for a more positive outlook than a decade ago, but if the third revolution in history and computing is to realise its potential several challenges remain. Research funding, infrastructure, education and training are all vital components, but above all historians need to acknowledge that their sources and methods are not so unique that they can not be abstracted and generalised to a certain level to make the application of computer technology worthwhile. Equally, those in the information and computer sciences need to recognise that the 'one size fits all' mentality of generic applications and information systems is ill-suited to academic research and even less so within the heterogeneous field of humanities computing.
Dr Ian Anderson is Lecturer in New Technologies for the Humanities at the Humanities Advanced Technology and Information Institute (HATII), University of Glasgow. | <urn:uuid:df6c0148-933f-4fea-a26f-56f21884c0e3> | CC-MAIN-2017-09 | http://www.history.ac.uk/makinghistory/resources/articles/history_and_computing.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00335-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948003 | 3,397 | 2.828125 | 3 |
Didymium Sentence Examples
In 1879, however, Lecoq de Boisbaudran showed that Mosander's "didymium," contained samarium; while the residual "didymium" after removal of samarium, was split by Auer v.
Neodymium (Nd) forms the chief portion of the old "didymium."
The absorption spectra of cobalt and didymium salts also offer many.
From the crude oxide so obtained (which contains lanthanum and didymium oxides) the cerium may be separated by conversion into its double sulphate on the addition of potassium sulphate, the sulphates of the cerium group being insoluble in a saturated solution of potassium sulphate.
In its character yttrium is closely allied to, and in nature is always associated with, cerium, lanthanum, didymium and erbium (see Rare Earths).Advertisement
Lanthanum has retained its elementary character, but recent attempts at separating it from didymia have led to the view that didymium is a mixture of two elements, praseodymium and neodymium (see Didymium).
In its chemical relationships tantalum is associated with vanadium, columbium and didymium in a sub-group of the periodic classification. | <urn:uuid:21ce0eeb-ec1f-4ca4-84a7-7478bcb9d6af> | CC-MAIN-2023-23 | https://sentence.yourdictionary.com/didymium | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652959.43/warc/CC-MAIN-20230606150510-20230606180510-00390.warc.gz | en | 0.942339 | 280 | 2.671875 | 3 |
Discover the cosmos! Each day a different image or photograph of our fascinating universe is featured, along with a brief explanation written by a professional astronomer.
2014 April 29
Explanation: Sometimes it is hard to believe what you see in the sky. While leading his annual aurora tour last month near Fairbanks in central Alaska, astrophotographer John Chumack and his company saw a most unusual aurora. This bright aurora appeared to change into the shape of a jumping dog, complete with a curly tail. He was able to capture the fleeting natural apparition in the above image with a 15-second exposure through a wide-angle lens. By coincidence, he also captured a background sky filled with familiar highlights. Planets visible include bright Jupiter through the dog's front legs and reddish Mars below the dog's hind legs. Stars visible include the Big Dipper stars above the dog's midsection and reddish Betelgeuse shining on the far right. This dog would not be following him home, however, and within a few minutes morphed into other shapes before the geomagnetic storm particles that created it shifted to strike the Earth elsewhere.
Authors & editors:
Jerry Bonnell (UMCP)
NASA Official: Phillip Newman Specific rights apply.
A service of: ASD at NASA / GSFC
& Michigan Tech. U. | <urn:uuid:04e6fe3c-5ce0-43b8-94f0-92c8a3b61062> | CC-MAIN-2017-13 | http://zuserver2.star.ucl.ac.uk/~apod/apod/ap140429.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188785.81/warc/CC-MAIN-20170322212948-00270-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.932769 | 275 | 2.546875 | 3 |
Cave carbonates (mineral deposits) can be used to analyze past permafrost conditions. Carbonates (Figure 2) originating within a cave's Vadose Zone (unsaturated area above the water table) accumulate from the addition of precipitation percolating into the cave system. When the ground is frozen surrounding (and within) a cave complex, the growth of carbonates terminates – they cannot grow in regions of permafrost. Warm temperatures and available water are two requirements for cave carbonate (speleothem) growth. The speleothems can be dated to reveal past fluctuations in these two parameters. Dr. Anton Vaks used a U-Th dating method to reconstruct 500,000 years of past carbonate fluctuations in Siberia (Figure 1). He found that a particularly extensive period of permafrost melt occurred approximately 400,000 years before present within the Arctic. During this interglacial event, the permafrost boundary was shifted northward, as extensive warming and carbonate growth transpired. Additionally, sea surface levels and temperatures amplified at this time. Moreover, carbonate cave growth has been linked to increased concentrations of atmospheric carbon dioxide, released from thawing permafrost. Overall, it is concluded that an increase in temperature of 1°C will thaw discontinuous permafrost and an increase of 1.5°C has the potential to thaw continuous permafrost within the Arctic (Vaks et al., 2013). | <urn:uuid:8ceb09a0-e445-4865-b248-4526c49b8c4b> | CC-MAIN-2020-16 | https://ccin.ca/ccw/permafrost/past/quaternary | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371656216.67/warc/CC-MAIN-20200406164846-20200406195346-00143.warc.gz | en | 0.91477 | 296 | 3.859375 | 4 |
31 Jan Benefits of Stretching?
To stretch or not to stretch?
‘It’s good to stretch’ at some stage you have either been told this or told someone else (I know I have many times!). Probably all of us in life at some point have tried a few stretches be that as a warm up, part of a yoga class, to relieve tension or perhaps just to feel good. So what are the actual benefits and what does stretching do?
Let’s have a look…
Not entirely true:
Stretch to warm up – you may have seen or been someone who just before going for a run, raises one foot onto a bench or fence and tries to touch their toes or swings their hip to one side and their arm over to the other side and holds that position. For a long time the idea was that this helped warm up the muscles and prepared them for the exercise. So far, studies have shown that static stretching (holding a muscles in a position of tension) plays no benefit in a warm up routine prior to exercise. They can actually reduce muscles explosive force.
Stretch To prevent injury – Again, if you think you get injured because you didn’t properly stretch you might want to reconsider. Common injuries such as ligament sprains and knee damage will have very little to do with muscle length. There is an argument that they might play a part in preventing muscular strains but more evidence is needed.
Stretch to relieve pain and tension – this should not always be the automatic option for everyone, there are cases when stretching may actually do harm than good. Stretching someone who is already hypermobile or has Ehlers-Danlos Syndrome plays no benefit. In fact, in these cases strengthening exercises are usually better. Then there are people with shortened (not tight) muscles. A short muscle even when relaxed will not lengthen whilst a tight muscle once relaxed will.
What it does do:
Stretching increases flexibility – This is true, ask any gymnast or dancer. Any type of stretching can actually lengthen tight muscles. A good question to always ask yourself though is ‘what am I trying to achieve by being flexible?’
Stretching stimulate nerve and blood vessels as well as the muscles – whilst this is the case the benefits are not yet fully understood, but the neurological element does play a role in muscular tension. Where the eastern world refers to flow of energy perhaps this is where the western world would refer to vascular and neurological stimulation.
Stretching can feel good – This is true and for the most part can be pretty harmless provided you are not holding the stretch too long or too intense. The physiological science behind why this still needs to be studied. The eastern world with centuries old practices such as Tai chi, Qigong and Yoga can attest to power of stretching as the west catches up with these practices so to will the science.
What else can YOU do?
The point of article isn’t to condemn stretching or promote it but simply to highlight what we currently know about it. For all the studies suggesting there isn’t much benefit, there are plenty of yoga etc. students, athletes and performers who swear by stretching. It may simply be a case of the science catching up with the belief.
Until that time, what you can do before any exercise activity is to include stretching with a milder version of the activity you about to do as this will be the most effective way to prepare (so if going for a run start with a light run perhaps just a lap of street at a low pace then gradually build up from there).
IF you are looking for any more advice feel to contact or visit us. | <urn:uuid:c4c5bec6-ff51-48c3-a703-56c832052dcb> | CC-MAIN-2020-24 | https://www.the-osteo.co.uk/benefits-of-stretching/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347435238.60/warc/CC-MAIN-20200603144014-20200603174014-00055.warc.gz | en | 0.963895 | 756 | 2.703125 | 3 |
Search online for any list of history's greatest scientists and you'll find the same names: Albert Einstein, Charles Darwin, Marie Curie, Sigmund Freud, Louis Pasteur, and so on. The order may change, but the name on top will almost invariably be that of Isaac Newton.
We can argue over such lists – they're mostly harmless fun – but we can agree that Newton earned his place there. He quantified the laws of motion that govern our lives, and almost 350 years after he did his work, it is still useful.
But why is Newton better remembered than, say, Ernest Rutherford, who determined the structure of the atom, or Gregor Mendel, who brought us modern genetics? The difference, probably, is that Newton had a great story to tell.
It's the one about the apple. You remember it – how the young Newton, sent home from school at Cambridge to avoid the plague of 1665, was sitting under a tree one day, saw an apple fall to the ground, and, in a flash of insight, came to understand the workings of gravity.
He published his Principia Mathematica in 1687. In his spare time he designed the first reflecting telescope, laid the foundations for calculus, brought us the understanding of light and color, and in his later years – it would be disingenuous to leave this out – tried his hand at alchemy and assigning dates to events in the Bible.
But that apple! Oh, to have been a chronicler of science back then, having the chance to tell this wonderful story about the magnetic young physicist from Lincolnshire.
Actually, there was such a person. His name was William Stukeley, and in 1752 he published one of the first biographies of Newton, "Memoirs of Sir Isaac Newton's Life." Newton, as an old man, had told him the tale:
"After dinner, the weather being warm, we went into the garden, and drank thea under the shade of some apple trees, only he, and myself. Amidst other discourse, he told me, he was just in the same situation, as when formerly, the notion of gravitation came into his mind. Why should that apple always descend perpendicularly to the ground, thought he to himself; occasion'd by the fall of an apple, as he sat in a contemplative mood....."
The Royal Society has called the apple story “the most famous anecdote of discovery in science.” Students of physics may stumble over the math behind Newton’s laws of motion, but they’ll remember the apple.
There are other stories in science, of course. You’ll probably recall Archimedes running naked from the bath shouting, “Eureka!” or Oppenheimer watching the first atomic bomb and thinking, “Now I am become death, the destroyer of worlds.” Einstein is remembered (wrongly) as the elementary-school failure who came to epitomize genius. But Newton somehow won the good-story sweepstakes. His is simple, gives us a visual image of his work, and helps explain something from our daily lives.
Over the years, inevitably, the details have been embellished. Ask around today, and people may tell you that the apple bonked Newton on the head. But the point remains: if you have an important point to make, especially in science but also in other fields, there’s nothing like a good story to make it memorable.
Of course, Newton may have known that. Historians say he was both a natural philosopher and a natural self-promoter. A friend of mine, knowing I was writing about the apple, said, “For all we know, Newton may have embellished the story himself.” | <urn:uuid:02621895-18e8-452b-905a-77135ed0a9c9> | CC-MAIN-2017-09 | https://blogs.scientificamerican.com/guest-blog/newtone28099s-apple-science-and-the-value-of-a-good-story/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00138-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.970015 | 782 | 3.546875 | 4 |
The first point of reference for your kids is you. In their eyes whatever is good for you is good for them too. With that in mind remember that if you have an apple as your afternoon snack that they are much more likely to want one too?
3.)Offer great alternatives
Kids love candy, it’s sweet, small enough to eat in one mouthful and is often a vibrant lively colour, the same can also be said for a lot of fruits. So instead of putting candy in your kid’s lunch box next time, why not give your kids some cut up fruit pieces and a small pot of chocolate sauce? If that sounds like too much work dried Papaya and Banana chips are a great alternative to candy. If you kid wants chips and dips then instead give them baked tortilla chips and salsa, for every kind of junk food you can imagine there is a healthy alternative.
4.)Juice, juice, juice
It’s very much a fact that like candy, kids love soda. Again, though it’s full of sugar, is known to dehydrate kids and lower their attention spans, all in all not ideal for school. In this scenario, fruit juice is your friend. Why not fill your kids SIGG bottle with a combination of fruit juices of their choice? Orange and Pineapple juice is a personal favourite of ours.
Instead of telling your kids that certain foods are “bad” tie healthy foods to the things they care about, such as sports or academic performance. Let them know that lean meat and calcium will help them with sports, a good breakfast will help them focus in school and that certain fruits and vegetables will give them nicer skin and hair.
6.)The three-try rule
Sometimes kids will tell you they don’t like something just because they don’t like the look or sound of the food you are offering, sometimes however it’s because the genuinely don’t like the taste. Forcing kids to eat something they really don’t like can have a very negative effect on their eating habits going forward. That’s where the three-try rule comes into play. If your child has tried something at least three times made and served three different ways and still doesn’t like it by the forth, then it’s simple, they don’t like the taste and shouldn’t have it pushed on them any more.
Keep these ideas in mind when you pack your kids SIGG lunchbox and fill their SIGG bottle and rest easy knowing your child is learning to walk on the right path in regards to diet and nutrition, one of the most important lessons of all.
Enjoy your back to school! | <urn:uuid:c5f44ba6-3469-49fa-9679-7f53a5a1a8c0> | CC-MAIN-2020-10 | https://sigg.com/de-en/stories/post/back-to-school/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875142603.80/warc/CC-MAIN-20200217145609-20200217175609-00284.warc.gz | en | 0.962517 | 561 | 2.625 | 3 |
The doctrine whereby geologic processes (→ erosion, → deposition, → compaction, and → uplift) observed at Earth's surface now are the same that have shaped Earth's landscape over long periods of time in the past. The term uniformitarianism was first used in 1832 by William Whewell, to present an alternative explanation for the origin of the Earth. The prevailing view at that time was that the Earth was created through supernatural means and had been affected by a series of catastrophic events such as the biblical Flood. This theory is called → catastrophism. The ideas behind uniformitarianism originated with the work of Scottish geologist James Hutton. In 1785, Hutton presented at the meetings of the Royal Society of Edinburgh that the Earth had a long history and that this history could be interpreted in terms of processes currently observed. For example, he suggested that deep soil profiles were formed by the weathering of bedrock over thousands of years. He also suggested that supernatural theories were not needed to explain the geologic history of the Earth (PhysicalGeography.net).
The state or quality of being uniform.
tarâdis-e yekâyi, ~ yekâni
Fr.: transformation unitaire
A transformation whose reciprocal is equal to its Hermitian conjugate.
violent star formation
diseše surâ-ye setâregân
Fr.: formation violente d'étoiles
The concept of star formation pertaining to a variety of systems (OB associations, giant H II regions, H II galaxies, massive star clusters, etc.) that are believed to have formed large numbers of stars in a very short time.
Fr.: forme d'onde
A graphical representation of the shape of a wave for a given instant in time.
Fr.: analyse de forme d'onde
The resolution of a complex waveform into a sum of simple periodic waves, usually by computer means.
Fr.: formule de Weizsäcker
A → semiempirical → equation
which describes the → binding energy
of the → atomic nucleus. It is essentially a nuclear mass formula
that provides the total binding energy per → nucleon as the sum
of five terms:
Named after Carl Friedrich von Weizäcker (1912-2007), German physicist, who derived the formula in 1935, Z. für Physik 96, 431; → formula.
well-formed formula (wff)
disul-e xošdisé (wff)
Fr.: formule bien formée (FBF) | <urn:uuid:d7d5c36d-48bf-4565-ac20-d0c13140dd4b> | CC-MAIN-2020-16 | http://dictionary.obspm.fr/index.php?showAll=1&search=&formSearchTextfield=form&page=6 | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371604800.52/warc/CC-MAIN-20200405115129-20200405145629-00273.warc.gz | en | 0.89424 | 532 | 3.5 | 4 |
Civil War Overview
Civil War 1861
Civil War 1862
Civil War 1863
Civil War 1864
Civil War 1865
Civil War Battles
Robert E. Lee
Civil War Medicine
Civil War Links
Civil War Art
Republic of Texas
Civil War Gifts
Robert E. Lee Portrait
THE regular circulation of
is now between ONE HUNDRED AND TWENTY-FIVE and ONE HUNDRED AND THIRTY THOUSAND
copies. Assuming that each number of the paper is read by ten persons—a moderate
estimate—a million and a quarter people derive instruction and amusement from
this journal. It affords us no little satisfaction to witness this success.
Certainly we may say that no effort on our part has been wanting to deserve it.
Our weekly expenses for traveling
artists are alone as heavy as our total outlay for artistic labor used to be
when Harper's Weekly was first established. This outlay, however, enables us to
depict, week by week, the progress of our arms along the whole circumference of
the Rebellion, with a fidelity and vividness seldom equaled.
We are besides enabled to lay
before our readers each week several pages of the best reading of the day,
including the works of Dickens,
Wilkie Collins, and Bulwer. So remarkable a
combination of artistic and literary excellences has never been presented in any
journal, either in this country or abroad.
We think that this Number, for
instance, will bear comparison with any number of any paper ever produced in the
United States or in Europe.
SATURDAY, MAY 3, 1862.
"HARPER'S WEEKLY" AT FORTRESS
WE learn by telegraph that the
sales of the last Number of Harper's Weekly were stopped at
Fortress Monroe in consequence of
pictures of Yorktown and the vicinity.
The pictures inculpated
Big Bethel as it appeared when it was occupied
by our troops, and the rebel lines at Yorktown, with the position of our forces
when they first appeared before the place on 7th April. Both were from sketches
by an Officer of Topographical Engineers, and were sanctioned by the commanding
officer of the corps. Both, as any competent military man could see, were so
drawn as not to reveal any position permanently occupied by our forces, or to
convey any information whatever to the enemy.
Ever since the contest between
the United States forces and the rebels became grave this journal has been so
conducted as to impart no information to the enemy. We have frequently withheld
from our subscribers interesting pictures, fo`r fear they might prove useful to
the traitors. We have pursued this course not only with regard to our army at
Yorktown but every where. We shall continue to do so. Rather than publish a line
or a sketch which could by any possibility injure the Union cause, or endanger
the success of our gallant soldiers, we would suppress this journal altogether.
With the consciousness of this
purpose we beg leave to state that we shall not allow our business to be
interfered with at the whim of any military officer whomsoever, and that any
General who undertakes to stop the sales of Harper's Weekly, or to interfere
with its circulation, does so at his peril. We shall hold him responsible for
damages before a jury of his country.
We recommend Brigadier-General
Wool, and Censor A.D.C. De Witt Clinton, to devote more attention to the duty of
suppressing the Southern rebellion, and less to the suppression of Northern
By doing so, the former will not
again publish such predictions as the one in which he informed Secretary Stanton
that M'Clellan would meet with no serious resistance at Yorktown; and the latter
will have more time to perform the proper and reputable functions of an A.D.C.
GRADUATING AS SOLDIERS.
A CHANGE has come o'er the
British dream. The bullies who, three months ago, when we were in deepest
trouble, were boasting that they would send the Warrior to bombard "the cities
of New York and Hoboken," and dictate peace with Armstrong cannon pointed at
peaceful dwellings full of women and children, are now humbled and
panic-stricken. The battle of the ninth March has filled them with terror. They
realize that that battle destroyed, not only the Cumberland and the Congress,
but likewise the entire British navy; that the "wooden walls of England" are
gone; that the British Navy "consists of two ships, the Warrior and the Black
Prince," both probably failures; and that, in all probability, before New Year
1863 the United States and France will both be as superior to Great Britain at
sea as they now are on land. Under the pressure of these distressing reflections
John Bull has set to work to build Monitors on the plan of
Captain Ericsson, taking care, after his usual
fashion, to claim our gallant countryman's invention for an Englishman of the
name of Coles.
We think we may safely say that
the panic which appears to be prevailing in London in consequence of the
performance of the
Monitor is only the first of a series of fits
which this war of ours is destined to occasion in Europe.
In the first place, the Monitor
is only an experiment, and by the time Great Britain has spent a few millions in
building copies of her, a very improved model will probably have been adopted
here. The six Ericsson batteries which
are now being constructed for
Government are greatly superior in many respects to the antagonist of the
Merrimac. Another fight will suggest further
improvements. In the course of the next sixty days the
Galena, the Roanoke, and the Kensington will
have been under fire, and will have taught us further lessons. It may be that
the Monitor, though capable of coping with a rude product of Southern skill like
the Merrimac, will be found inferior to one or all of these vessels. Captain
Ericsson himself does not regard his model as a "finality," though it is
obviously a step in advance of previous models. There are many competent sailors
and naval authorities who deem the
Vanderbilt the most formidable war vessel
afloat in our waters.
Commodore Porter, now in command of the mortar
New Orleans, is understood to have declared,
ten years ago, that he would undertake to fight any ship-of-the-line with the
old George Law, which was lost in 1858, and which carried no guns at all. It may
turn out that, for all purposes of naval combats between ship and ship, guns are
a superfluity, and that the only things needful are speed, a sharp beak, and an
invulnerable hull. Thus, while there is every reason to believe that the little
Monitor, now lying in Hampton Roads, would destroy the whole British
navy—including the Warrior and the Black Prince—in a very short time, without
receiving any material injury herself, it is far from likely that the Monitor
will be the most formidable vessel in our navy a few months hence.
Meanwhile the progress made in
offensive weapons is as great as in defensive armor. This war of ours has
revolutionized the science of artillery. At Sebastopol the guns used were smooth
bores. There was a Lancaster gun at one time in battery, but it did not answer
and was discarded. In the Italian war rifled 4 and 6 pounders were used by the
French with satisfactory results. In the Chinese war Armstrong 12-pounders were
used for short periods of time, and their performance was well spoken of: no
opportunity offered for discovering their well-known defects. We are now arming
our ships with rifled 100-pounders; the new Monitors are to carry 15-inch guns,
throwing balls weighing 500 pounds. Our siege batteries consist of rifled 30 and
40 pounders, and 68 and 100 pound Columbiads. The results of the change is seen
in the reports of the bombardment of
Fort Pulaski. Heretofore 400 yards has been
considered fair breaching distance, though artillerists are recommended in the
text-books to get 100 yards nearer if possible. Two years ago a gunner who had
proposed to erect a breaching battery at half a mile from the wall to be
attacked would have been set down as insane. Our breaching batteries at Pulaski
were nearly a mile from the work, yet they made a practicable breach, in a wall
previously deemed impregnable, in the course of thirty hours. This was done by a
judicious combination of rifled guns, carrying 30 and 40 pound shot, and very
heavy Columbiads. The former, as is well described in Commander Rodgers's
report, bored their way into the wall, while the latter, coming into play
afterward, so pounded the honey-combed stone and brick work that it gave way and
crumbled into ruin.
This bombardment demolished not
only Fort Pulaski, but all the stone forts in the world. Not a fort in Europe
could stand 48 hours' bombardment by a combination of heavy rifled guns and
Columbiads. They were well enough when opposed to smooth 18, 24, and 32
pounders. They would crumble directly under a fire of 68 and 100 pounders from
James or Parrott guns.
We have thus, in the course of a
year's war, established the utter inability of any of the existing navies or
forts in the world to resist an attack from the vessels and weapons which we are
now using. And we are only just beginning to learn. In the course of the next
six months our weapons of offense and defense will probably be as far superior
to those now in use as the latter are superior to those which were used a year
ago. We hear already that General Gilmore is prepared to breach
Fort Sumter at
Charleston at a distance of 2000 yards. We
understand that the Monitor has lately been provided with a missile which will
penetrate the iron sides of the Merrimac as easily as if they were made of wood.
Captain Rodman, under whose direction six 15-inch guns are being cast at
Pittsburg for the new Monitors, has cast a 20-inch gun, and is experimenting
with 30-inch guns; he expects to cast guns for coast defense which will throw a
ball weighing three thousand pounds. Should the Warrior, in the course of her
attempt to bombard "New York and Hoboken," come in contact with one of these
little missiles, it would be a matter of difficulty, ten minutes afterward, to
find out what had become of her, or where she was when her voyage was abruptly
In the opinion of a Prussian
officer who recently left this country, there is no army in the world so
completely equipped, in regard to artillery and rifles, as the army of the
Potomac. There are picked regiments in France and in Germany as well armed as
any of ours. And there are batteries of artillery in many countries equal to any
thing on this side the ocean. But nowhere in the world, except on the Potomac,
does there exist a body of 200,000 men all armed with the best possible weapons,
or a park
of 400 pieces of light artillery,
all perfect and of the best make and most effective character. This Prussian
officer declared that the Emperor Napoleon had no such army under his command.
He might have added that no army but ours possesses such a corp as the
Berdan sharp-shooters, with their telescopic
rifles. The sharp-shooting in the Crimea and in Italy was mere boy's play in
comparison with the performance of the men of this regiment, who pick off
gunners at a distance when their forms can barely be descried by the naked eye.
In the words of Colonel Lysons—probably the most experienced officer of the
British army—"as soon as the regimental officers in the army of the Potomac
become more efficient—a matter of time—that army will be simply irresistible."
The Americans have not been a
fighting people for many years. The Mexican war was a diversion, and did not
excite the people at large. Not since 1812 has the whole popular mind been
directed to military pursuits. No people in the world had less knowledge of real
warfare, or less general acquaintance with the practical business of fighting,
than we had when this wretched rebellion forced the sword into our hands. In the
course of a single year, however, we have revolutionized gunnery, naval
architecture, and fortification, and have raised an army which is admitted by
competent foreign judges to be without an equal in the world.
It is to be hoped that, after the
suppression of the rebellion, our foreign friends will permit us to convert our
sword once more into a pruning-hook. But if not, the experience of our present
troubles will probably enable us to effect some important changes in the map of
THE letter of Mr. Yulee, late
Senator from Florida, of which we give a facsimile on page 278, is by far the
most important published document in the secret history of the war. It
establishes the fact of the elaborate conspiracy which resulted in the armed
rebellion. It is an utterly infamous letter; for the writer was, at the moment
of writing, a sworn and paid officer of the Government against which he was
conspiring, while Mallory, now rebel Secretary of the Navy, was chairman of the
Naval Committee of the Senate.
Mason and Hunter, then Senators
from Virginia, were also conspirators. Mason told a friend, in the middle of
February, that he hoped the Union could be saved, and the next day he wrote to a
friend in Paris the details of the plan to destroy it. Hunter and Slidell waited
upon a Northern gentleman in Washington at about the same time, and told him
that every thing was ready—that there might be a little fighting, but no serious
work—that Pennsylvania and the West would adopt the Montgomery Constitution, and
New York would not long delay, while New England might be left out of the
reorganized government, or admitted as a single State. This course was also
urged openly or covertly by certain newspapers in some Northern cities. The
Vice-President, Breckinridge, another conspirator, sneeringly asked
Andrew Johnson, in
Washington, whether he thought the Government
could coerce States? Even the most patriotic citizens could not help at least
wondering whether there would be an overwhelming rally of the whole North for
the Union. They did not wonder after the fall of Sumter.
The plan of the conspiracy
clearly contemplated that some of the Confederates should nominally remain
uncommitted, in order to perplex the Government. Breckinridge was one of these.
And when the developments of Time allow the history of the rebellion to be fully
known and written, it will appear that the Catiline conspirators in Rome, and
the Jacobite malcontents in Great Britain, had never a more thorough
organization than that of which Jefferson Davis is the acknowledged head, and
Yulee proves himself an accomplice.
THE NATIONAL ACADEMY.
THE Derby Gallery is light and
spacious, and an admirable room for the Exhibition. There are two smaller rooms
opening out of it, one of which is lighted by gas, which does not help the
pictures. The general effect upon entering the large room is bright and
agreeable, and it is enhanced by the pleasant anticipation which always invests
pictures which are yet to be seen. The impression upon leaving is one of
That impression must be
understood, of course, of the general effect. There are very fine pictures in
the Exhibition—some of the best portraits, for instance, that we have ever
had—but it has evidently not been a very happy year for painters. The war itself
has not inspired many works. Mr. Gifford's Sunday Morning in the Camp of the
Seventh Regiment near Washington (104) is the chief of these, and it is
remarkable for the fidelity with which the personality of the chaplain. the Rev.
Mr. Weston, is rendered. This Lounger has seen that gentleman but once, and in
the picture his back is to the spectator, but the individuality of the man is
unmistakable. Mr. Gifford is one of the artists who, during the year, have
preserved the traditions of Michael Angelo, by patriotic service under canvas as
well as on it,
The first of the large portraits
is Mr. filches full-length of Dr. Cogswell, late chief of the Astor Library
(14). He is sitting in the Library, holding a book. The picture should be
studied from across the room, and it will then be seen that it one of the most
admirable works of the painter. The likeness is capital. The accessories are
remarkable. They are painted with great fidelity and propriety of detail: the
books are books, the carpet is carpet, the wood is wood. The clothes of the
worthy subject, however, seem rather too shining for broadcloth—and yet the true
bibliophile has always been noted, like the angels, for shining garments. So
characteristic and satisfactory a portrait as this of the famous Librarian of
the Astor ought certainly to belong to the Library. Side by side with a good
likeness of the founder, it would go down to the respect and interest of
posterity, for whom Astor devised and Cogswell collected and arranged. It is
properly a historic portrait, and its fit place is the Astor Library. No. 44 is
Page's portrait of Collector Barney, a picture full of power and skill, but,
from some reason, not pleasing. The likeness is excellent, but the accessories
are disagreeable. Where he is, or what he is doing, it would be difficult to
say. But Mr. Page's works are too important, too carefully considered, and too
thoughtfully wrought, to be hastily dismissed and we shall return to his
portraits, of which there are two others upon the walls, full lengths, of a
gentleman, and a lady and a child.
Mr. Huntington's Chancellor
Ferris (58) is a broad, free, strong, and effective portrait. The Chancellor
stands in his flowing robes; with his hand upon an antique tome and a stained
window before him. The frank, benign dignity of expression is simply true to
life. In the painting the artist has not been in the least afraid of purple. The
coloring is rich and harmonious, and the work is a fine specimen of the artist,
full of talent, and a most valuable portrait to the University.
In No. 111 Mr. Elliott exhibits
the best portrait that we recall from his hands. He has a uniform excellence.
Unlike many artists, authors, and orators, who are sometimes very good and
sometimes bad, Elliott is always good. The spectator is always sure of vigor,
brilliancy, and fidelity. But in this portrait there is a subtlety that he does
not always show. The incisive force of character in the subject, the maturity of
sagacity, alertness and prudence which mark the master of his calling, have been
seized with enthusiasms by the painter, and reproduced with corresponding skill.
He had the good fortune in the portrait of treating a face in which the
individuality is thoroughly indicated, and he has done it ample justice. It was
fortunate too that the very coloring of the subject was most congenial to the
pallet of the painter, so that he has given us one of the most real, living
portraits that have hung in any Academy exhibition.
In the farther room, under the
gas, are sixteen works of Paul Duggan, who died a few months since in Paris.
They are chiefly portrait drawings, and there are two models in plaster, curious
and elaborate studies in anatomy. The portraits are of well-known persons, and
most of them will have a three-fold interest to many visitors of the Exhibition:
first, as Duggan's works; second, as heads of noted people; third, from their
association with the Century Club, upon whose walls they habitually hang.
Indeed, in that dim corner of the Exhibition where they are, we can hardly see
the drawings for Darley's portrait of the artist which hangs among them. How
often before the pictures of the Exhibition that slight, wan, partly stooping
figure stood silent and rapt, intently gazing and calmly discriminating, yet
ever with kindness and sweet humor! How inly smiling and cordial he stole
through the crowds on the gay evening and in the old rooms, as with the same
cheerful silence and genial sympathy he passed through the press of life to his
grave! His patient life, his quiet heroism, his cheerful submission, were they
not all signs of the permanent satisfactions of that keen sense of beauty and
sympathy with it which are the mainsprings of art? The Academy have obeyed a
pious instinct in placing among the paintings of our living artists these works
of their brother so lately dead.
Next week we shall have another
look at the Exhibition.
THE President's signature to the
Emancipation Bill is the first practical proof
of the changed policy of the United States Government. It is the first step in
the return to the principles and practice of the fathers of the Constitution.
Their opinion was nearly unanimous upon this subject. Believing, as Roger
Sherman said that the spirit of the age was abolishing slavery they supposed
that the different States would complete the work. Innocent Roger, who did not
foresee the cotton gin! The testimony to the spirit and intention of our
Government is perfect, and that there might be no possible mistake what kind of
Government they meant to form, the fathers took good care to say expressly that
it was "to form a more perfect union, establish justice, insure domestic
tranquillity, provide for the common defense, promote the general welfare, and
secure the blessings of liberty to ourselves and our posterity."
The most striking testimony to
the anti-slavery feeling of the fathers of the country was given by A. H.
Stephens, the rebel Vice-President, in his, speech, upon retiring from Congress,
at Augusta in June, 1859. He said: "In my judgment there are more thinking men
at the North now who look upon our system of
slavery as right—socially, morally, and politically—than there were
even at the South thirty years ago. The leading public men of the South in our
early history were almost all against it. Jefferson was against it; Madison was
against it; nearly all of them were against it. This I freely admit when the
authority of their names is cited. It was a question which they did not, and
perhaps could not, thoroughly understand at that time.''
Perhaps not; but these are the
men who made (Next Page) | <urn:uuid:7f20749f-4b0c-4602-85d1-e95009375339> | CC-MAIN-2013-20 | http://www.sonofthesouth.net/leefoundation/civil-war/1862/may/british-fleet-obsolete.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707188217/warc/CC-MAIN-20130516122628-00075-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.96502 | 5,008 | 2.90625 | 3 |
If your wheels are not aligned appropriately on your vehicle, it’s going to cost you money in the long run. A wheel alignment refers to the procedures used to check and adjust the wheel and tyre system, including the camber, caster, and toe.
Improperly aligned wheels can prematurely wear out your tyres and suspension system, along with compromising the handling and performance of your vehicle. There are a number of tell tale signs that the alignment of the wheels are out on a motor vehicle. These include steering wheel vibration, a constant pull to one side when steering, tyre squeal noises when making turns, excessive vibration as your speed accelerates, and changes in direction after your car has hit a bump on the road.
Mechanics use a number of hi-tech and computerized alignment equipment to measure all alignment angles on today’s cars when doing a wheel alignment. These include both adjustable and non-adjustable angles. The most common adjustable angles are the toe, caster and thrust angle.
The toe refers to the tilted direction of the wheels toward or away from one another when viewed from the top. Wheels that tilt in toward the vehicle have “negative camber.” Wheels that tilt away from the vehicle have “positive camber.”
The caster refers to the angle of the steering axis in relation to an imaginary vertical line through the centre of the wheel when viewed from the side. “Positive caster” is the term used when the vertical line is tilted back toward the rear. If it’s tilted forward, we call it “negative caster.”
The term Thrust Angle refers to the relationship of all four wheels to each other, as well as their relationship to an imaginary centre line that runs from bumper to bumper. The term “thrust line” refers to the direction in which the rear wheels are pointed.
For the best economy, handling, steering and overall balance of your motor vehicle it is essential to have its wheel alignment up to date and correct.We hope that helps answer the question ‘What is What is Wheel Alignment?’!
Back to Car Glossary | <urn:uuid:76ff3094-4cf7-464b-b126-5ac0cf2593b1> | CC-MAIN-2016-50 | http://www.privatefleet.com.au/glossary/what-is-wheel-alignment/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540798.71/warc/CC-MAIN-20161202170900-00022-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.948809 | 441 | 3.234375 | 3 |
When the victim comes under stress or infection the cells break and become Viral proteins and begin making more Viral RNA.
The full blown AIDS shows severe weight loss due to persistent diarrhea and some opportunistic infections. This first stage is called primary HIV disease then moves onto chronic asymptomatic disease. Since the virus can stay undetected in a carriers body it is often transmitted to others without knowledge.
This is why so many people can be not carrying the disease without even knowing it. It is not known if treating other sexually transmitted infections is effective in preventing HIV.
Some of these victims often live for many years after they are diagnosed. There is no risk of acquiring HIV if exposed to feces, nasal secretions, saliva, sputum, sweat, tears, urine, or vomit unless these are contaminated with blood.
This can lead to a number of problems in the body: Contact with vaginal fluid and semen, transplanted organs or blood from an infected person. The thing that makes the HIV virus so lethal is that it attacks directly into the primary defense cells of the immune system leaving it open for attack.
Normally with in a year or two the serve stages of HIV set in. Whether it protects against male- to-female transmission is disputed and whether it is of benefit in developed countries and among men who have sex with men is undetermined.
Most people tend to make a drastic change in their lifestyle. There is some evidence to suggest that female protection may provide an equivalent level of protection.
So in this disease, the destruction of lymphocytes makes the man highly susceptible to different diseases.
This status is established when one or more of diseases have accumulated in the effected victims system. The spread of this disease can be prevented by: The HIV virus is of the retrovirus type, this is a class of viruses that reproduces with the aids of an enzyme that it carries with it.
These symptoms disappear for about months, but the patient remains highly infectious. It has been said that the virus can not be transmitted trough kissing but experts can not rule out this possibility. Many say the disease spread when international travel began to increase.
This is were many social problems come into effect. Many be tend to isolate people that they know have contracted the virus because they are ignorant to how the disease is transmitted. The contact with infected blood, the sharing syringes by drug users, tattoo needles that are not sterilized, etc.
This is why the medical profession suggests regular HIV testing on a six month interval. This does not mean that the virus will not be transmitted at all.
Evidence for a benefit from peer education is equally poor. Programs encouraging sexual abstinence do not appear to affect subsequent HIV risk.
This occurs because the virus brings along an enzyme with it that causes the change. Women who have undergone female genital cutting have an increased risk of HIV. It causes reddish purple, coin-size spots and lesion on the skin.Essay on HIV/AIDS: Signs, Symptoms and Prevention! Human immunodeficiency virus infection/acquired immunodeficiency syndrome (HIV/AIDS) is a disease of the human immune system caused by the human immunodeficiency virus (HIV).
During the initial infection a person may experience a brief period of. According to Herek and Glunt (), HIV/AIDS is a disease epidemic, but also an epidemic of stigma. In the UK, the number of new HIV has been rising each year since the ’s.
Since the yearthere have been more than new diagnosis of HIV each year, with people diagnosed in A Study Of HIV And Aids Health Essay.
Print Reference this. Disclaimer: This work has been submitted by a student.
This is not an example of the work written by our professional academic writers. HIV stands for Human Immunodeficiency Virus. It is the virus that causes AIDS. HIV is not like other viruses and different from other, the.
HIV and AIDS AIDS and HIV are both very serious conditions that can occur within the body if one does not take care of themselves and practice safe sex.
AIDS is the disease caused by HIV. HIV is the virus that causes AIDS. /5(10). Our essay writing service reviews tell you exactly what has been said about the quality of the essay help our customers have received.
Of course, all of our writers have made the cut, nonetheless, if they begin to fall behind in our customer reviews, they are no longer deemed as being eligible for the position.
The HIV virus has two types. The first one type is HIV-1, which is the main cause of AIDS worldwide. The second type is HIV-2, which is found mostly in West Africa.Download | <urn:uuid:dcef9204-e4e6-4cb4-8a2f-e8ed9caa6f3c> | CC-MAIN-2018-43 | http://hareharusunidyxu.ultimedescente.com/exploration-of-hiv-essay-3875638756.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509336.11/warc/CC-MAIN-20181015163653-20181015185153-00044.warc.gz | en | 0.961695 | 966 | 3.296875 | 3 |
Programming through tactile play.
Google has revealed Project Bloks, a collection of toys that that physically represent computer code instructions like on/off and that can be joined together, enabling kids to learn to program through tactile play.
The Bloks research project was unveiled at the International Society for Technology in Education (ISTE) 2016 conference in Colorado, where 16,000 educators from around the world have gathered this week, including a number from Australia.
Bloks – which was co-developed by Google Research, a Stanford University researcher and Ideo – is an open hardware platform that anyone can use to “build physical coding experiences”.
What was shown off today was a prototype but Google hopes to further develop the concept in collaboration with educators, as the main target end users are kids.
There are three components in the Bloks system – a Raspberry Pi Zero-based “brain board”, “base boards” that connect to the brain, and “pucks” – physical representations of programmable commands – that sit on top of each base board.
By daisy-chaining a number of base boards to a brain, kids can create simple programs that can be used to control a variety of things.
To read the full article, click here. | <urn:uuid:3422567f-7988-4b35-ba1b-625103196567> | CC-MAIN-2018-34 | https://www.acs.org.au/insightsandpublications/news/2016/107559.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209755.32/warc/CC-MAIN-20180815004637-20180815024637-00703.warc.gz | en | 0.947943 | 264 | 3.921875 | 4 |
For commercial shipping purposes, the Hudson River is kept at a depth of 12 feet in the area between Hudson Falls to Albany, New York. In the Lower Hudson river, the depth is at least 32 feet for commercial shipping from the Portal of Albany to New York City but it can be as deep as200 feet in some places. The majority of the Hudson River Basin lies within New York state but touches parts of Vermont, Massachusetts, New Jersey and Connecticut.
The river basin is broke upon into three parts: the upper and lower Hudson River and the Mohawk River basins. The source of the 315 mile Hudson River Basin is the Lake Tear of Clouds, located in the Adirondack Mountains about 4,322 feet above sea level. The rivers travels south to southeast out of the mountainous area through what is mainly forestland. When the river reaches Hudson Falls, it drops to about 200 feet above see level.
The river received its name from the man who explored it in 1609, Henry Hudson, who was an Englishman who was sailing for the Dutch East India Company. The first person to have ever seen the Hudson was Italian explorer Giovanni da Verrazano in 1524. More recently, on January 15, 2009, US Airways Flight 1549 was ditched into the Hudson River after the airplane was stuck multiple times by birds. The pilot was able to land the plane and everyone was able to leave the plane safely. | <urn:uuid:ddef2c8a-6015-461c-ac5f-94c6318c9f3a> | CC-MAIN-2014-52 | http://www.exposix.com/answers/How-deep-is-the-Hudson-river.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770554.119/warc/CC-MAIN-20141217075250-00102-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.969192 | 289 | 3.484375 | 3 |
And why was it important that Blacks define their self-image? And who had been defining it before?
One of the things we learned from Malcolm and others that, ah, we had not been in control of defining ourselves. There's no such thing as self-determination. We were very much concerned about doing that for ourselves. Who are we? The whole question of identity came up. Are we Negroes with a capital N? Because America didn't capitalize Negro until the 19- late 1920s okay, in the newspapers and books. Are we Afro-American, and what that means also, are, are we Black? And so all of a sudden people came, saying, "Well I'm not Black, please," I mean you know. And, and we said, "No, no, we're not talking about color. We were talking about are we these Black people who populate the earth?" So, it became important that we define ourselves as Black men and Black women, walking on this planet Earth, doing what we need to do. It became important that we write our own books, eh, that we write our history books and our poetry books and we write in the language that we wanted to write, um. It became important that we educated out children, ah, that we start, that we began to talk about Black religion, you know, ah, Black Christian theology, ah, Black history, Black English, ah, ah, Black poetry, ah, Black sociology. People began to look at, ah, little Black girls and say, "Yeah, okay, maybe they do have some problems in these urban, ah, ah, cities, but there's a strength about them that is fascinating, whatever." And how, how, then, then do we change that? Ah, we began to teach Black literature. For the first time people, in our classroom in San Francisco, um, we had like people sitting on the floor to read, or write, to read a Du Bois, ah, to read a Garvey, ah, to read a Zora Neale Hurston, ah, to read all these people. And they cried. People literally cried in the classroom, saying, "How can I say that I was educated, ah, when I didn't know these people existed." People cried. And so when you gave a syllabus out with 13, 14 books, people would say, "Hey, I'll read it," because they wanted to read. Because they knew that they had been deprived of that information about themselves. That is the kind of joy. So, at sometime, so you began to have in the churches, ah, at the shrines of the Black Madonnas, Black Jesu Christus--Black Jesus Christ, you know, a Black Jesus Christ up there and people would say, "Sacrilege, sacrilege." And we say, "No, no, no, no. Think of the place. Think of the time and say it is not sacrilegious to say a Black Jesus Christ," you see. Ah, people began to put up Black Maries and, and Black, you know, all of these things. And people said, "Hold it, now that might no be the case." We say, "Think of Isis and you'll know something then. Think if you go into certain countries, if you go, you'll see that the people that they worship are these Black women." And so people said, "Hold it, if they worship Black women, how will we become to be people who are not, women who are not worshipped, and who are damned," you see. And so that whole movement began to come in terms of women beginning to look at themselves in a different fashion.
I began this poem after Malcolm was assassinated and I never finished it. I used to come to it, look at it, hold it, put it down. But the great joy of poetry is that it will wait for you. Novels don't wait for you. Characters change. But poetry will wait. I, I think it's the, it's the greatest art, because it will wait for you in a drawer, in a notebook. And when you open that notebook and say "I'm ready to finish it." The poem will say, "Welcome, come on, get to it, do it." And I did it: -Malcolm "do not speak to me of martyrdom/ of men who die to be remembered/ on some parish day./ i don't believe in dying/ though I too shall die/ And violets like castanets/ will echo me/ yet this man/ this dreamer,/ thick lipped with words/ will never speak again/ and in each winter/ when the cold air cracks/ with frost, I'll breathe/ his breath and mourn/ my gun-filled nights./ he was the sun that tagged/ the western sky and/ melted tiger-scholars/ while they searched for stripes./ he said, "fuck you, White/ man. we have been/ curled too long. nothing/ is sacred now. not your/ White face nor any/ land that separates/ until some voices/ squat with spasms."/ do not speak to me of living./ life is obscene with crowds/ of White on Black./ death is my pulse./ what might have been/ is not for him/ or me/ but what could have been/ floods the womb until I drown./" Ah, that poem for him was, um, was done almost, I finished it, ah, in one night in one sitting, ah, as I walked through it and thought about, um, how to at some point say to people, "Don't talk to me about martyrdom. I know it. I feel it. I taste it. I've lived through it. Um, I don't believe in dying but we're all gonna to do it," you know, ah, and then go to the man. Talk about this man, this dreamer, "this man thick lipped with words who will not speak again." But in a sense when he spoke we listened and we heard and knew and felt and lived and loved and, and we were. | <urn:uuid:719e9ecb-fb48-4c58-82a3-8607d82df4e1> | CC-MAIN-2016-07 | http://digital.wustl.edu/cgi/t/text/text-idx?c=eop;cc=eop;rgn=div2;view=text;idno=san5427.0952.143;node=san5427.0952.143%3A1.29 | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701165484.60/warc/CC-MAIN-20160205193925-00119-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.984135 | 1,278 | 3.109375 | 3 |
Data Analytics is an extremely important domain in today’s data-driven world where 90% of the data has been created in the last 2 years alone. You must have come across the term Data Analytics and even heard about Data Analytics training that is being offered by training institutes. Intellipaat is offering the Data Analytics Training that has been created with extensive inputs from Data Engineers, Data Scientists and Data Analytics professionals.
Learn Data Science in 28 hrs from experts
First let us compare the role of a Data Analyst and Data Scientist:
|Criteria||Data Analyst||Data Scientist|
|What the role involves?||Collect, process, visualize data to extract business insights||Cleanse and model data to design business strategies|
|Tools used||Excel, Tableau, SQL||Python, R, SQL|
|Type of data involved||Mostly structured||Structured & unstructured|
|Knowledge of statistics||Intermediate||Advanced|
Now before going for a Data Analytics Training let us first understand what Data Analytics is and why they are more important than ever.
In simple terms, a Data Analyst is a person who converts numbers into insights that a business can benefit from. These numbers can come from a variety of sources like sales figures, fixed business costs, advertising rates, market share, customer churn rate and so on. The bigger the organization, the bigger the numbers and more acute is the need for data analysis or data science. All this can get extremely complicated for the untrained eye. This is where a Data Analytics professional steps in and brings in the order and simplicity. He captures the data, aggregates it, wrangles with it, converts it into a format that is easy to visualize and report. At the end of the day, getting the right data analytics training and becoming a success data analyst means you will be able to convert data into pure gold for any digitally driven organization!
Check this introductory video on Data Analysis:
So what exactly does a Data Analyst do?
Here are some of the roles and responsibilities of a Data Analyst:
- Collect data from various sources
- Organize the data that holds value
- Generate & present detailed reports
- Look for patterns, correlations, trends
- Provide ideas for process improvement
We all know that data science is booming and so is data analysis. Put simply, a data analyst is assigned with the goal of helping organizations to make better business decisions. This can fall under the purview of cutting down costs, increasing the returns coming from marketing initiatives, advising the management on entering new geographies, make newer product launches and so on and so forth. You might not be aware that a data analyst in a large organization can even play the role which is specific to what he does in the organization. So a data analyst in a Fortune 500 company may go by the name of a financial analyst, sales analyst, operations analyst, marketing analyst and so on.
Now that you have an overall idea of what a data analyst does let us understand a bit deeper into why you should go for a data analytics training right now; something like the Intellipaat Data analytics training and certification. So, read on.
Reasons why you should go for a Data analytics training now:
Huge Growth Opportunity
With the right Data analytics training and right competency from your side, the sky is the limit for a Data Analyst. As of 2017 we already have accumulated over 2.7 Zettabytes of data in the digital universe.This is one of the prime reasons why data science is so hot right now. According to estimates, this data will further grow to at least 163 Zettabytes by as soon as 2025! This means data analysts and data engineer will be extremely sought-after well into the future. Now that is 60 times the amount of that we have had in 2017 and this growth will come within the next 7 years. So Data Analysts will be playing a bigger and bigger role in a world that just does not seem to get satiated with Big Data. So if you want to be a Big Data Analyst, Big Data Engineer, Data Scientist, then now is the time to get training through any good Data analytics training institute and see your career soar to the skies in no time!
Big Salaries on Offer
Where there is huge growth, expect big salaries to follow. This is the case with Data Science as well. Call this the law of nature or the spoils of the digital era that we are living in, either way a Data Analyst or a data engineer is seeing all the pampering.
Now you might be wondering that a Data Analyst is only limited to the role of a Data Analyst and hence the salaries are also limited in the upside as shown in the image shown from Indeed. But you have to understand that a competent Data analytics training is your passport, your stepping stone, your entry into the world of Data Science as well and everybody knows that Data Scientist is the sexiest job of the 21st century as confirmed by none other than Harvard Business Review.
Let us assure you that this is just the tip of the iceberg and it starts with the right data analytics training. There are organizations like Amazon, Google, Facebook, Microsoft where the starting salaries for a highly competent Data Analyst, Data Engineer or Data Scientist is $300,000. Now you must be wondering what kind of a Data analytics trainingyou need to take up a job to pursue your dream career with starting salaries of $300,000. Well, as the saying by legendary writer, Mark Twain goes, “the secret to getting ahead is getting started.” So you need to start somewhere, if you take up a competent data analytics training and gain the right skills then it is wholly up to you to climb up the ladder faster and make your career grow at rocket speed as a data analyst or data engineer!
Now the term data analyst or data engineer might not conjure up images of a magician to most people but that is exactly what a data analyst does. Since it is a vast domain where a lot of specializations depending on your core competencies and interests, you can seriously make a career of your choice all within the domain of Data Analyst. Some of the most interesting data analyst domains that is finding a lot of takers are as follows.
A marketing analyst is much sought-after in today’s world where essentially all marketing is digital marketing and there are data-driven decisions that need to be taken at every instance. So essentially a marketing analyst is entrusted with the responsibility of bringing order to the marketing domain. He takes the call about which platforms to use for marketing initiatives, what should be the budget, the geographic and demographic targeting, the duration of campaign, reading through the marketing reports, what is the return on investment through each channel, flagging the non-performing marketing initiatives, looking for newer avenues and opportunities to improve sales and revenue for any organization on an ongoing basis.
A financial analyst is a finance maverick. He works with data related to the money. Getting a high level view of how the finances are performing, how to cut down costs, improve bottom line, what is the right price for a certain purchase, looking for hidden gems that can help an organization to perform better and so on. In a nutshell, he deciphers and understands the financial situation of an organization like the back of his hand.
Find out how statistics helps Data Analysts to come up with insights in this powerful R video:
Sales is the end goal of any business. So Sales Analyst are extremely important for any organization if it has to crack the code of sales. A sales analyst will evaluate the sales strategy of any organization and predict the right course of action when it comes to optimizing the sales. He has to pore through sales figures and analyze if something can be done at a lower cost, improve the way the sales cycle proceeds and optimize the whole process of sales for increasing the profitability of any organization.
An operations analyst is the one who understands the end-to-end operations of an organizations. He recommends the right path for optimizing the workflow, improving the business processes, conduct timely research, investigate the workflow, recommend changes and ensure that the best practices, standards and regulatory compliance is adhered to.
Exciting Workplace Environment
As a data analyst there will never be a dull moment at the office. Your work is not set in stone, meaning there are lot of things that you will be doing that you have never done before. You have to come up with ideas, plans, strategies that can help an organization to reach its goals. So there are not much restrictions that the enterprise will set for your work. A competent data analytics training will teach you all this and more. You have to get the results and deliver the output and it does not matter what tools and techniques you are using. So all this means you need to have an analytical bent of mind, understand the core competencies that make the business tick and help the decision-makers improvise, optimize and overcome any hurdles to achieve success in today’s digitally-driven, hypercompetitive world.
Ability to Make a Difference
So the salaries are awesome, the growth opportunities are huge, but do you realize that the role of a data analyst is one wherein you make a major difference to the organization that you are working for. It is about taking pride in the fact that you have helped the business achieve its true goals, its mission and vision and such other things. Data is the holy grail of today’s world and the right data analytics trainingwill put you on a pedestal of a high priest of the data analytics domain. You will find that data can help any company to find its true calling, so it is the job of a data analyst to decipher the data to such an extent that rest of the organization’s departments will directly benefit from this true gift of yours.
Rock Stars of the Digital World
Since the job of a data analyst is unlike any in the corporate world. So the status of a data analyst is nothing less than that of a rock star. A competent data analytics training will turn you into a magician of any organization and you will be spinning insights by playing with big data. Thusit is all about living up to the expectations that other people have reposed in you and staying true to it. Data does not lie, but it needs the skill of a data analyst that will help to find the hard facts and help a business set on the royal road to success.
Required in Every Industry
Well, it is pretty obvious that data analysts are not confined to a couple of industry segments but their contribution spans the entire industry verticals. So you can work in any domain of your choice. It could be in the industry verticals like finance, manufacturing, information technology, communications, logistics, retail, automobile, and the whole nine yards. This is the reason choosing the right data analytics training can make all the difference. So it is the satisfaction that comes with the role of a data analyst that you can choose a domain of your liking and grow in it while making the difference that you intend to do all the while commanding sky high salaries and savoring the perks of the job.
Who can be a data analyst?
Now that you have a crystal-clear idea of who can become a data analyst, let us explain to you about who can become a data analyst and what are some of the key skills that are needed to make it big in the domain of data analysis.
Having any bachelor’s degree is good enough to start on the journey of data analysis. There are a lot training institutes that are offering data analytics training in which you can enroll and be a certified data analyst. Intellipaat is offering the industry-designed Data analytics training and Certification that can be taken up by those who want to fast-track their career in the domain of data analysis.
What are the skills to succeed as a data analyst?
Having the analytical skills is the most basic skill that you need to possess. This means you have the wherewithal to work with huge amounts of data, understand the patterns, correlation, causation, relationships and connections that exists within all that mountains of data. Other than that, you need to be able to communicate effortlessly with all the stakeholders in the organization. More often than not, you will be asked to communicate your findings, so you should be able to make the other person understand what you want him to understand and need impeccable communication skills. Critical thinking is another quality that a data analyst needs to cultivate. Ideally there should be no ambiguity in what the data analyst is recommending. Having a firm grip of mathematics is very essential since data is the bread and butter of a data analyst, he should be good in mathematics. Last but not the least, you should have an eye for detail which goes a long way in cementing your position as a much sought-after data analyst in the grand scheme of things.
Now are you interested in becoming a Data Analyst and command the big bucks?
Check the Intellipaat Data analytics training to fast-track your career now!
- Find out how an application developer masters big data analysis
- Frequently Asked Question from clients planning to adopt Hadoop
- From a Confused Beginner to a Gleeful Hadoop Ninja: Ramya’s Journey | <urn:uuid:c15d588f-0802-49a7-8240-bdd8742dac85> | CC-MAIN-2019-04 | https://intellipaat.com/blog/data-analytics-training-top-reasons-to-learn/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583763839.28/warc/CC-MAIN-20190121070334-20190121092334-00166.warc.gz | en | 0.940885 | 2,729 | 2.53125 | 3 |
First Nations children and youth are experiencing more pain than non–First Nations children, but do not access specialist or mental health services at the same rate as their non–First Nations peers.
That’s the finding from new Dal research published in the Canadian Medical Association Journal. View it here.
“Both physical pain and mental health conditions, and their relation to each other, are of substantial concern within the Indigenous population, given that Health Canada reports First Nations youth are 5–7 times more likely to [die by] suicide than non–First Nations youth,” writes Dr. Margot Latimer with her coauthors.
Dr. Latimer has appointments in the Faculty of Health, the Faculty of Medicine and the IWK Health Centre.
The study looked at data on more than 2,600 First Nations and non–First Nations children and youth aged 17 years and younger who accessed care and specialist treatment for pain in Atlantic Canada between 1997 and 2015. Compared with non–First Nations children, the proportion of First Nations children and youth who sought treatment for 10 out of 13 pain indicators was higher. These included admissions to the neonatal intensive care unit, diagnoses of dental and ear conditions, headache, burns, diabetes, wounds and fractures. The finding of many diagnoses of painful ear and dental conditions was consistent with other research, although the lower percentages of visits to certain specialists by the First Nations group was unexpected.
Although the researchers found an association between early physical pain and mental diagnoses in non–First Nations adolescents, they did not find it in the First Nations cohort. They suggest this may be because of lack of mental health services and long wait times leading to delayed diagnoses.
They call for action to address these disparities.
“Given the profound lingering impact of colonization, First Nations newborns, children and youth are a group requiring high-priority designation to create policies to improve access to health services focusing on pain and mental health assessment, management and follow-up,” write the authors.
Co-author Dr. Latimer sees education of health practitioners serving these populations as a crucial step to overcoming issues.
"The solution is multi-level and feasible; creating opportunities for health providers to learn about Indigenous People's history and the impact of that history on determinants of health, plus put into practice timely, equitable, culturally-safe and evidence-based health practices reflective of Indigenous People's perspective on health," she says.
In Winter 2019, Dalhousie is piloting a core curriculum, inter-professional (IPHE) course for all first year Nursing, Medicine and Dentistry students called "Introduction to Cultural Safety in Indigenous Health." The course will teach Indigenous People's history and how they prefer to interact with health care providers and the health care system. It was developed in consultation with First Nations communities and is co-taught by Indigenous and non-Indigenous faculty and Indigenous facilitators.
“Occurrence of and referral to specialists for pain-related diagnoses in First Nations and non–First Nations children and youth" is published December 10, 2018. Find out more: http://www.cmaj.ca/lookup/doi/10.1503/cmaj.180198
comments powered by Disqus | <urn:uuid:66a09212-5169-46d5-94fd-253381a2d05d> | CC-MAIN-2020-24 | https://www.dal.ca/news/2018/12/12/first-nations-children-and-youth-experiencing-more-pain-than-non.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347425481.58/warc/CC-MAIN-20200602162157-20200602192157-00362.warc.gz | en | 0.942477 | 661 | 3.265625 | 3 |
Amylynne Frankel, MD; Carolin Penrose, MD; Jason Emer, MD
Mount Sinai School of Medicine, Department of Dermatology, New York, New York
Cutaneous tuberculosis occurs rarely, despite a high and increasing prevalence of tuberculosis worldwide. Mycobacterium tuberculosis, Mycobacterrium bovis, and the Bacille Calmette-Guérin vaccine can cause tuberculosis involving the skin. Cutaneous tuberculosis can be acquired exogenously or endogenously and present as a multitude of differing clinical morphologies. Diagnosis of these lesions can be difficult, as they resemble many other dermatological conditions that are often primarily considered. Further, microbiological confirmation is poor, despite scientific advances, such as the more frequent use of polymerase chain reaction. The authors report a case that illustrates the challenges faced by dermatologists when considering a diagnosis of cutaneous tuberculosis. (J Clin Aesthetic Dermatol. 2009;2(10):19–27.)
Mycobacterium tuberculosis is a worldwide, problematic, communicable pathogen that has increasingly been regarded as a notable, serious infection in the United States. The underlying basis of this recent epidemic is dependent on such factors as the association of tuberculosis (TB) with the human immunodeficiency virus (HIV) epidemic, increased immigration from endemic countries, and the transmission of TB in crowded settings, such as healthcare facilities, prisons, and homeless shelters.[1–4] Most often TB is an airborne transmissible disease with skin manifestations presenting as a result of hematogenous spread or direct extension from a latent or active foci of infection. However, primary inoculation may occur as a direct introduction of the mycobacterium into the skin or mucosa of a susceptible individual by trauma or injury. Increased risk of acquiring disease occurs with HIV infection, intravenous drug abuse, diabetes mellitus, immunosuppressive therapy, malignancies, end-stage renal disease, and infancy. Cutaneous tuberculosis (CTB) is frequently elusive as it mimics a wide differential diagnosis and also evades microbiological confirmation despite recent advances in sophisticated techniques. Although rare, given its worldwide prevalence, it is important for clinicians to recognize the many clinical variants of CTB to prevent missed or delayed diagnoses.
A 24-year-old Hispanic woman presented with a painful lesion on her right buttock that began during her pregnancy four years prior. The lesion appeared as a large, reddish-brown, scaly plaque with well-defined borders and central atrophic changes covering the entire surface of the right buttock (Figure 1). The lesion was tender and warm with notable expression to light touch of purulent material through multiple fissures along the periphery. The patient reported no other symptoms, such as fever, chills, cough, or fatigue. On physical examination, vital signs were within normal limits, the skin demonstrated no other significant changes, and the patient had no notable lymphadenopathy. On history, the patient reported the skin lesion had progressively increased over the past four years. She had been previously diagnosed with psoriasis and was treated with multiple topical therapies, including salicylic acid and potent topical corticosteroids without any relief. Further, the patient reported having a similar lesion (which was on her neck) as a child that was surgically removed in Mexico. She had been Bacille Calmette-Guérin (BCG)-vaccinated in the past.
Serum QuantiFERON®-TB Gold (QFT-G; Cellestis Inc.,Valencia, California) testing was performed along with tissue cultures and skin biopsy with histological analysis. Histopathology of the plaque showed pseudoepitheliomatous hyperplasia and neutrophilic microabscesses in the epidermis. The dermis contained a mixed neutrophilic and granulomatous infiltrate (Figures 2 and 3). Acid-fast bacillus (AFB) staining showed rare elongated acid-fast structures suggestive of TB infection (Figure 4). Culture from lesional tissue grew Mycobacterium tuberculosis and serum QFT-G testing was positive. The patient was referred to infectious disease to rule out active TB infection. Sputum cultures were negative and a chest x-ray showed no active pulmonary disease.
A diagnosis of CTB was made based on the patient’s history, clinical picture, and diagnostic testing. Although an explicit classification of CTB could not be specified, lupus vulgaris (LV) and tuberculosis verrucosa cutis (TVC) are two variants of CTB that have been shown to occur in a previously sensitized individual, and her diagnosis was assumed to be one of these two variants. The patient was treated by infectious disease with multidrug TB therapy (pyrazinamide, rifampin, ethambutol, and isoniazid) resulting in lesion clearance at three months. Currently, the patient remains free of tuberculous disease.
CTB describes dermatological manifestations of TB involving the skin, which can be caused by Mycobacterium tuberculosis, Mycobacterium bovis, and the BCG vaccination. These lesions can be acquired exogenously or endogenously, although the former is significantly less common. TB is one of the most common, rampant infectious diseases in underdeveloped countries, and the number of cases in industrialized countries has increased in recent years as a result of the increased incidence of HIV infection and increasing multidrug resistance. Although CTB is reported as less than one percent of all cases of TB, it is important for practitioners to consider this infection when faced with a suggestive clinical picture.
Early classification of CTB was based on lesion morphology. As knowledge of the disease increased, it became apparent that although lesions appeared clinically similar, their development, progression, and prognosis were different. Tappeiner and Wolff proposed the most widely accepted classification based on the route of infection (Table 1).[5,8] Exogenous inoculation occurs after the direct inoculation of Mycobacterium tuberculosis into the skin of a person who is susceptible to infection. This leads to TVC, tuberculosis chancre, and some cases of LV. Endogenous infection occurs in patients who were previously infected either by lymphatic spread, hematogenous spread, or contiguous extension. Lymphatic spread is seen occasionally in LV. Hematogenous spread is seen in acute miliary TB, metastatic TB abscess (gummatous TB), papulonecrotic tuberculid (PNT), and LV. Contiguous extension is seen in scrofuloderma and orificial tuberculosis.
An additional classification system designed to enhance the Tappeiner and Wolff system included further distinction based on bacterial load. This system is extremely similar to Ridley and Jopling’s description of Mycobacterium leprae in Hanson’s disease. In the multibacillary forms, a plethora of mycobacteria can easily be identified on histological examination utilizing the Ziehl-Neelsen staining (AFB) method and culture. In the paucibacillary forms, sparse bacilli are seen on histological examination and culture isolation of mycobacteria is the exception rather than the rule.
Primary inoculation TB (tuberculous chancre) typically follows a penetrating injury that results in the direct introduction of mycobacterium into the skin or mucosa of an individual with no previous TB infection. Within 2 to 4 weeks, an inflammatory papule develops at the inoculation site and evolves into a firm, shallow, non-tender, nonhealing, undermined ulcer with a granulomatous base (Figure 5).[3,5,9] Painless, regional lymphadenopathy is frequently apparent around the time a tuberculin skin test (TST) converts to positive.
Scrofuloderma is the most common form of CTB in children and historically was seen after consumption of milk contaminated with Mycobacterium bovis. It results as a direct extension from an underlying TB focus, such as a regional lymph node or infected bone or joint, to the overlying skin. Lesions present as firm, painless, subcutaneous, red-brown nodules overlying an infected focus, which gradually enlarge and suppurate forming ulcers and sinus tracts that drain watery, purulent, or caseous material (Figure 6). Skin biopsy reveals tuberculoid granuloma surrounding areas of wedge-shaped necrosis. Culture, smear, or biopsy will demonstrate the organisms and confirm the diagnosis in a TST-positive individual. The ulcers may heal spontaneously with scarring.
TB cutis orificialis (TBCO) affects individuals with dramatically impaired cell-mediated immunity and advanced TB in other organs, such as the gastrointestinal tract and lungs. The oral, nasal, anal, and vulval regions become infected with Mycobacterium tuberculosis by autoinoculation from active infectious sites that are draining. The red-yellow nodules break down and form painful, soft, circular or irregularly shaped “punched-out” ulcers with a pseudomembranous fibrinous base.[5,6] TST may or may not be positive, although organisms are easily seen on skin biopsy in the deep dermis and ulcer walls. The presence of TBCO heralds a poor prognosis, as patients tend to have severe internal organ disease prior to skin manifestations.
Miliary TB (disseminated TB) is characterized by a wide dissemination of Mycobacterium tuberculosis into the body and shows a distinctive pattern on chest x-ray of multiple, tiny lesions (millet-sized) distributed throughout the lung fields. Miliary TB may hematogenously infect any number of organs, including the lungs, liver, and spleen, in patients with advanced TB disease. There is a systemic failure of the cell-mediated immune system that allows and facilitates the spread of infection resulting in rapid deterioration and death. Certain events, infections, and medications that suppress the body’s cell-mediated immune system can precipitate this infection. Although miliary TB has historically been extremely rare and well known for its occurrence in children, it is an increasingly serious infection in immunosuppressed patients, such as those infected with HIV, on long-term oral corticosteroid therapy, or on other immunosuppressive therapies for organ transplant or inflammatory or autoimmune conditions. Cutaneous skin lesions consist of small, erythematous to violaceous papules or pustules with hemorrhagic necrosis and umbilication affecting a substantial portion of the body (Figure 7). If healing occurs, lesions leave atrophic, depressed scars surrounded by a brownish, hyperpigmented halo. TST is typically negative because of anergy. Skin biopsy with histological examination reveals numerous microabscesses containing neutrophils and numerous mycobacterial organisms. Confirmation of the diagnosis requires cultures of sputum, blood, and skin lesions, as well as diagnostic tests, such as bronchoscopy, chest x-ray, or computed tomography of the chest. Prognosis is poor, as affected individuals tend to be very ill at initial presentation (i.e., they have HIV, cancer, and/or are immunosuppressed).
Metastatic TB abscesses (TB gumma) can arise from breakdown of an old healed tubercle that still contains live organisms or from cell-mediated immune defense inhibition that reactivates.[1,3] TB gumma is usually seen in malnourished children and immunosuppressed adults. Single or multiple nontender, fluctuant nodules develop forming draining sinus abscesses unless surgically incised and drained. Nodules can occur at any location without any specific predominance. Histological examination reveals massive skin necrosis with copious mycobacterial organisms. TST is variable.
TVC occurs after direct inoculation of TB into the skin of people who were previously infected. It manifests as a painless, solitary, purplish or brownish-red warty plaque that may extend peripherally causing central atrophy or form fissures that exude pus or keratinous material (Figure 8).[5,6] On physical examination, there is often lymphadenopathy. Skin biopsy with histological examination reveals pseudocarcinomatous hyperplasia with noncaseating tuberculous granulomata without mycobacteria seen or cultured. Skin lesions may evolve and persist for years, although spontaneous resolution can also occur. These lesions respond to typical anti-TB therapy of a combination of antibiotics given over months to years.
LV is a chronic and progressive form of CTB that is widely described as the most common form of CTB with a multitude of presentations. Lesions occur in normal skin as a result of direct extension from underlying deeper TB focus, by lymphatic or hematogenous spread, after primary inoculation, after BCG vaccination, or in scars of old scrofuloderma. Lesions usually are small, solitary, nodular, sharply defined, reddish-brown lesions with a gelatinous consistency (called apple-jelly nodules) on the head and neck of individuals in Western countries while those individuals in tropical and subtropical areas present with lesions on the lower extremities or buttocks (Figure 9). Clinical variations exist and are defined as 1) classic plaque or keratotic; 2) hypertrophic; 3) ulcerative; and 4) vegetating. The plaque type begins as discrete, red-brown papules that coalesce and form plaques with a slightly elevated verrucas border and central atrophy. The consistency of the plaque is soft and gelatinous and has a classic apple-jelly appearance on dermoscopic examination. Persistent lesions may damage underlying tissue and ulcerate causing severe disfigurement and an increased risk of cancer formation. Skin biopsy with histological examination reveals tuberculous granulomas with few to no bacilli. Confirmation by culture is rare, even though an individual’s TST is usually positive.
The relationship between tuberculids and TB continues to be debated. Tuberculids are generalized exanthems in patients with a moderate or high degree of immunity to TB due to previous infection. Patients are usually in good health and show 1) positive TST; 2) tuberculous involvement (usually inactive) of viscera or lymph nodes; 3) negative staining and culture for pathogenic mycobacteria in affected tissue; and 4) skin lesions that heal with remission or treatment of TB. Classification includes three types: 1) PNT; 2) erythema induratum of Bazin (EIB); and 3) lichen scrofulosorum (LS). Tuberculids can be classified into two groups: true tuberculids and facultative tuberculids. The former classified because Mycobacterium tuberculosis plays a major etiologic role and the latter because Mycobacterium tuberculosis is one of several possibly etiologic agents. All were once believed to be a consequence of hypersensitivity to the presence of mycobacterial antigens within a host of previously acquired immunity to TB; however, most are now understood not to be uniquely caused by TB. PNT and LS are still widely accepted as true tuberculids and EIB as a facultative tuberculid. Whatever underlies the pathophysiology, a consensus has been reached that PNT and LS represent true hypersensitivity reactions rather than the result of a local CTB infection. This is based on the observation that these lesions have consistently failed to either stain positive for or culture mycobacterial organisms. Although the organisms are absent, mycobacterial DNA have been detected in biopsy specimens subjected to PCR. Furthermore, all tuberculids exhibit granulomatous inflammation and some degree of necrosis and vasculitis suggesting that these lesions are a result of released mycobacterial antigens in the setting of a concurrent or distant infection.
LS is an eruption of multiple, small, grouped, asymptomatic, firm, perifollicular, lichenoid papules or plaques most often affecting children or young adults that progresses and subsides within weeks to months without scarring. Skin biopsy with histological analysis shows superficial, perifollicular, epithelioid granulomas surrounding hair follicles and sweat glands without evidence of necrosis. Typically no AFB are visualized histologically, although TST is often very remarkable.
EIB is a TB-associated panniculitis that presents with multiple, painful, recurring, ulcerated nodules that affect the lower limbs of women (Figure 10).[3,5] Pre-existing vascular disease may predispose patients to lesions during exposure to cold weather. Lesions are chronic; slow to resolve, if at all; and result in atrophic hyperpigmented scarring after several months. Histology should show three of four of the following elements: 1) septal panniculitis; 2) fat necrosis; 3) small or large vessel vasculitis; and 4) granulomas. Although patients show TB skin hypersensitivity, AFB are rarely identified. A 2005 study in Spain demonstrated that about 10 percent of cases were positive for Mycobacterium tuberculosis using PCR technique of identification. In a case series and literature review, Bayer-Garner et al found that organisms, such as Mycobacterium bovis and Mycobacterium marinum, may also be involved as the etiology of EIB, although no identification was found during their investigation. They suggested that EIB has diverse etiologies with varying pathogeneses leading to similar histological changes, and the cases analyzed may not have had an infectious etiology (suggesting a facultative tuberculid picture).
Diagnosis of CTB is complicated and requires a full work-up, including a detailed history and physical examination; careful consideration of clinical presentation; TST; serum QFT-G (and possibly other laboratory testing); skin biopsy with histological analysis and special staining methods for identification of AFB; and the use of other diagnostic tests, such as chest x-ray and sputum culture. The QFT-G is an in-vitro diagnostic aid that measures a component of cell-mediated immunity to Mycobacterium tuberculosis and is based on the quantification of interferon-gamma released from sensitized lymphocyte. QFT-G was approved in 2005 by the US Food and Drug Administration for the diagnosis of both latent and active TB infections. The antigens used in QFT-G are not shared by BCG vaccine strain or by nontuberculous mycobacterium. According to the Centers for Disease Control and Prevention guidelines of 2005, QFT-G can be used in place of the TST as it has increased specificity, lack of cross-reactivity to BCG, and convenience for both patient and provider. Concordance rates between TST and QFT-G range from 60 to 90 percent. The cost effectiveness of QFT-G test still needs to be studied.
Mycobacterial culture remains the most reliable method to determine the presence of mycobacteria and their sensitivities, but the yield is often low and often takes many weeks.[2,9,16] Culture sensitivity is much lower than specificity, with sources ranging from 80 to 85 percent and 98.5 percent, respectively.[15,16] Mycobacterial growth is better on an egg-based medium, but quicker on agar medium. Liquid systems allow for rapid growth (1–3 weeks), while growth on solid media can take from 3 to 8 weeks. Two cases of EIB have been confirmed using guinea pig inoculation. An AFB smear is useful if lesions have a high bacterial load as seen in LS, miliary TB, and TB gumma. With the advent of polymerase chain reaction (PCR), even the smallest tissue sample can be analyzed and amplified for mycobacterial DNA sequences, confirming its presence. In the future, it is believed that PCR will become more advanced to detect Mycobacterium tuberculosis in all lesions. Currently, PCR appears to be the most useful in multibacillary forms of CTB.[18,19] In one report of AFB-negative specimens, the overall sensitivity of PCR was found to be 50 to 72 percent.20 Another source reported AFB-positive respiratory specimens to have a sensitivity and specificity of 95 and 98 percent, respectively.15 In a comparison study of PCR and standard culture technique in pulmonary TB, one group found the positive rate of PCR was 82 percent compared to 16 percent in standard culture. Margall et al detected Mycobacterium tuberculosis DNA in 77 percent of cases of various types of CTB. Although PCR has shown to have high specificity and good positive predictive value, it seems to work best as a confirmatory test in patients with a high pre-test probability. In multibacillary CTB, PCR has the highest likelihood of yield. Nonetheless, a combination of diagnostic tests is needed when a case of CTB is suspected to confirm a diagnosis. In developing countries, PCR is not always readily available and therefore physicians must rely on a positive response to anti-TB drugs to confirm difficult cases.[18,20,23] It is essential to search for extracutaneous foci of TB by urine, blood, and sputum samples; x-ray or CT scan of the chest; and bone scans. Often, there is a delay in the diagnosis because CTB is not always considered in the differential diagnosis of atypical or nonhealing skin lesions (Table 2). It is imperative that physicians have a high index of suspicion in high-risk patients and in atypical presentations.
CTB treatment is the same as that for systemic TB and consists of long, multidrug therapy (Table 3). First, the chemotherapeutic treatment of TB is divided into two phases: 1) an intensive or bactericidal phase, designed to rapidly reduce the total body burden of Mycobacterium tuberculosis; and 2) a continuation or sterilizing phase. The most commonly used drugs are isoniazid, rifampin, pyrazinamide, and either ethambutol or streptomycin.[3,5,24] After eight weeks of therapy, the patients are considered no longer infectious, but still require longer term treatment for eradication. The continuation or sterilizing phase is designed to execute the remaining bacteria that resist the initial intensive or bactericidal phase. It is not clear why some of the bacteria resist the initial treatment, but the first-line drugs are typically highly effective. If the patient responded positively to isoniazid and rifampin, both are continued either daily or two or three times weekly for the second phase. Surgical intervention may be considered for the treatment of LV, TVC, and LS in recalcitrant cases.[5,6]
Several considerations must be made prior to multidrug therapy in order to tailor the treatment to an individual patient. Considerations include 1) overall general health condition, including the immunity level of the patient; 2) the type of cutaneous involvement; 3) the stage of the disease; and 4) patient compliance with the duration of treatment and possible medication side effects. Adherence with treatment is especially important as improper use of anti-TB therapy can contribute to unwanted treatment side effects and the development of drug resistance that further facilities the spread of disease. Directly observed treatment involves observed therapy by personnel from the public health department to help increase patient adherence and control an infection that is a public health concern.
Tuberculosis is a serious infection that affects many people worldwide, with a recent increasing prevalence especially in high-risk patients, such as those from endemic countries, in an immunocompromised state, with a history of previous tuberculosis infection, and/or with multiple comorbidities. Although the incidence of CTB is rare, it should be considered in patients presenting with atypical skin lesions suggestive of an underlying infectious etiology. It is imperative that physicians have a high index of suspicion in order to quickly and effectively diagnose and treat these substantially morbid skin conditions. This case report demonstrates the importance of a proper history and physical examination as well as diligent laboratory and diagnostic testing in determining the etiology of a suspicious and treatment-resistant skin lesion. Prompt consideration leads to a swift diagnosis and proper treatment resulting in high patient satisfaction.
The authors would like to thank Brian Marciniak for his help in editing this paper.
1. Bravo FG, Gotuzzo E. Cutaneous tuberculosis. Clin Dermatol. 2007;25(2):173–180.
2. Fariña MC, Gegundez MI, Piqué E, et al. Cutaneous tuberculosis: a clinical, histopathologic, and bacteriologic study. J Am Acad Dermatol. 1995;33(3):433–440.
3. MacGregor RR. Cutaneous tuberculosis. Clin Dermatol. 1995;13(3):245–255.
4. Bhutto AM, Solangi A, Khaskhely NM, et al. Clinical and epidemiological observations of cutaneous tuberculosis in Larkana, Pakistan. Int J Dermatol. 2002;41(3):159–165.
5. Barbagallo J, Tager P, Ingleton R, et al. Cutaneous tuberculosis: diagnosis and treatment. Am J Clin Dermatol. 2002;3(5):319–328.
6. Handog EB, Gabriel TG, Pineda RT. Management of cutaneous tuberculosis. Dermatol Ther. 2008;21(3): 154–161.
7. Rai VM, Shenoi SD, Gowrinath. Tuberculous gluteal abscess coexisting with scrofuloderma and tubercular lymphadenitis. Dermatol Online J. 2005;11(3):14.
8. Lai-Chong JE, Perez A, Tang V, et al. Cutaneous manifestations of tuberculosis. Clin Exp Dermatol. 2007;32(4):461–466.
9. Brown FS, Anderson RH, Burnett JW. Cutaneous tuberculosis. J Am Acad Dermatol. 1982;6(1):101–106.
10. Marcoval J, Servitje O, Moreno A, et al. Lupus vulgaris. Clinical, histopathologic, and bacteriologic study of 10 cases. J Am Acad Dermatol. 1992;26(3 Pt 2):404–407.
11. Vieites B, Suárez-Peñaranda JM, Pérez Del Molino ML, et al. Recovery of Mycobacterium tuberculosis DNA in biopsies of erythema induratum—results in a series of patients using an improved polymerase chain reaction technique. Br J Dermatol. 2005;152(6):1394–1396.
12. Bayer-Garner IB, Cox MD, Scott MA, Smoller BR. Mycobacteria other than Mycobacterium tuberculosis are not present in erythema induratum/nodular vasculitis: a case series and literature review of the clinical and histologic findings. J Cutan Pathol. 2005;32(3):220–226.
13. National Tuberculosis Controllers Association; Centers for Disease Control and Prevention (CDC). Guidelines for the investigation of contacts of persons with infectious tuberculosis. Recommendations from the National Tuberculosis Controllers Association and CDC. MMWR Recomm Rep. 2005;54(RR-15):1–47.
14. Hernandez C, Cetner AS, Jordan JE, et al. Tuberculosis in the age of biologic therapy. J Am Acad Dermatol. 2008;59(3):363–380.
15. Diagnostic Standards and Classification of Tuberculosis in Adults and Children. This official statement of the American Thoracic Society and the Centers for Disease Control and Prevention was adopted by the ATS Board of Directors, July 1999. This statement was endorsed by the Council of the Infectious Disease Society of America, September 1999. Am J Respir Crit Care Med. 2000;161(4 Pt 1):1376–1395.
16. API Consensus Expert Committee. API TB Consensus Guidelines 2006: Management of pulmonary tuberculosis, extra-pulmonary tuberculosis and tuberculosis in special situations. J Assoc Physicians India. 2006;54:219–234.
17. Schneider JW, Jordaan HF, Geiger DH, et al. Erythema induratum of Bazin. A clinicopathological study of 20 cases and detection of Mycobacterium tuberculosis DNA in skin lesions by polymerase chain reaction. Am J Dermatopathol. 1995;17(4):350–356.
18. Tan SH, Tan BH, Goh CL, et al. Detection of Mycobacterium tuberculosis DNA using polymerase chain reaction in cutaneous tuberculosis and tuberculids. Int J Dermatol. 1999;38(2):122–127.
19. Pai M. The accuracy and reliability of nucleic acid amplification tests in the diagnosis of tuberculosis. Natl Med J India. 2004;17(5):233–236.
20. Hsiao PF, Tzen CY, Chen HC, Su HY. Polymerase chain reaction based detection of Mycobacterium tuberculosis in tissues showing granulomatous inflammation without demonstrable acid-fast bacilli. Int J Dermatol. 2003;42(4): 281–286.
21. Sun YS, Wen JM, Lü WX, et al. Comparison study on polymerase chain reaction (PCR) and standard culture technique in detecting mycobacterium tuberculosis to diagnose of joint tuberculosis. Zhongguo Gu Shang. 2009;22(7):504–506.
22. Dinnes J, Deeks J, Kunst H, et al. A systematic review of rapid diagnostic tests for the detection of tuberculosis infection. Health Technol Assess. 2007;11(3):1–196.
23. Ramam M, Mittal R, Ramesh V. How soon does cutaneous tuberculosis respond to treatment? Implications for a therapeutic test of diagnosis. Int J Dermatol. 2005;44(2): 121–124.
24. Blomberg B, Fourie B. Fixed-dose combination drugs for tuberculosis: application in standardised treatment regimens. Drugs. 2003;63(6):535–553. | <urn:uuid:8bacfc82-77dd-4dd2-a2e6-db3d5a7c4a03> | CC-MAIN-2015-27 | http://www.jcadonline.com/2009/10/cutaneous-tuberculosis-a-practical-case-report-and-review-for-the-dermatologist/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095423.29/warc/CC-MAIN-20150627031815-00080-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.915443 | 6,402 | 2.515625 | 3 |
The marigold flower is a favorite in a home garden and a useful bedding plant. This pretty flower has many uses, including medicinal, cosmetic and culinary.
The wild marsh marigold, the tall African marigold and the French marigold are the most popular varieties of marigold. There is also another variety called the mule marigold, which has been named so because its seed-producing capacity is quite poor.Here are some marigold facts that you may not have known previously.
The ancient Romans named the common or march marigold Calendula officinalis in Latin. This is primarily because the flower blooms on the first day of every month.
The marigold has also made a name for itself in literature, with none other than William Shakespeare having referred to this flower in ‘A Winter’s Tale’, where he mentioned …“The Marigold that goes to bed with the sun, and with him rises weeping”... thisis because for centuries it has been believed that this flower closed at night and opened in the morning.
Since as far back as the 15th century, this flower has been considered a remedy for many medical conditions like jaundice, toothache, sprains, headache, bee sting, wounds and fever. Early Anglo-Saxons often boiled the marigold and extracted the yellow color, which was used to color food, fabric and even as hair dyes. The yellow powder, which remained after extraction, was chemically analyzed by Geiger in 1819, and it was he who named this powder Calendulus. Even today, the marigold flower is dried, and the petals are then ground and used in place of saffron in many rice dishes to color the rice.
More Articles : | <urn:uuid:ee2d9f0d-9f01-4260-88c9-43bd8bb55956> | CC-MAIN-2016-36 | http://www.rocketswag.com/gardening/flower-gardening/marigold/Marigold-Facts.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982290765.41/warc/CC-MAIN-20160823195810-00268-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.97361 | 372 | 3.140625 | 3 |
What to do when the weather is awful and you're stuck inside with the kids
Activities your kids can enjoy inside (and outside) during the winter
Sometimes even we intrepid "out and about" types can't get out and about. So what happens when your kids turn into Thing One and Thing Two and your house starts to look like Sally's did after the Cat in the Hat arrived? We prevent the stir-crazies with a little creativity. Jump the river: An easy game, using just a ruler and a couple of pieces of string: Spread the strings just one inch apart (using the ruler to measure). Encourage each kid to "jump over the river." Now widen the river by an inch each time. Explain the concepts of narrow and wide. See how far each kid can jump.
Start some indoor seed plantings
Interior decorating: Help the kids figure out one thing they can do to make their room a special place
The Fix-it Family: Put on your "Bob the Builder" caps (literal or figurative) and become home handypeople, figuring out what needs fixing, and doing it!
Make a timeline of each child's milestones. If possible, get some pictures from each developmental stage, and tape or pin them to the appropriate place on the timeline.
Cuban Cooking: Clean out the refrigerator and come up with some new combinations of food based just on what you have there. (My friend Tatiana, who was born in Havana, calls this "real Cuban cooking.") Make sure the kids are involved in deciding what to combine. Explain that this is what people have to do in other parts of the world, just making do with what is available. Grocery stores aren't everywhere!
Make a "Celebrations book." Print out either one page for each day of the year (365 pages, or 183 if you double-side them) or one page for each week of the year (about 52 pages). Put the date at the top and a lot of blank spaces underneath. Then go through and record the dates of significant events in your family's history, anything that's particularly important to each person: Marriages and births, of course, but also "day I graduated from high school" or "my first date with a boy" (for me it was April 12, 1985...who knows why I remember that), "first day Madison said "Mama," "first day Ella went on the potty." Things like that. Then, at a family dinner every week, you can take out your "Celebrations Book" and figure out what you're celebrating that week.
Make homemade musical instruments out of rolled up paper, or paper towel tubes, or rubber bands, or plastic bottle flutes, or water-filled glasses. Here is a site that shows you how to make homemade instruments. Here is another good one.
Indoor Scavenger Hunt, submitted by Pam DeVos. Our scavenger hunt uses the letters of the alphabet. I made 3 columns on a board starting with the letter A-Z and we go around the house looking for the letters or words that start with these letters.
Make actual use of the older toys: Spend a short time (15 minutes max) with your kids sorting through bins and shelves to make a list of toys they haven't used in a while. Separate the list into slips of paper in a hat, then each child pulls out a slip with the name of the toy. They play with it for 10 minutes, then get to choose a new toy if they like.
Fun with Snow
Indoor Snowscape idea submitted by Lisa Roy. Use a plastic pull sled (a large cake pan or the bathtub can be substituted if you don't have one); snow shovel; towels; spoons, toy animals, cars, action figures (my kids like to use Bionicle creations); gloves; snow. Arrange one or two towels on the kitchen or bathroom floor. Fill sled or cake pan with snow, put on some gloves, break out the toys, and ENJOY. If you use a pull sled, use the rope to pull the loaded sled into place on the towels. If you use the bathtub, you can fill a 15+ gallon-sized bin to transport snow to the tub. (Note from Lisa: My kids never tire of this activity, so we keep the necessary "equipment" right outside our back door for easy access.) (Note from editor: My 4-year-old had a great time making her dinosaur figures imitate what happens in The Land Before Time, The Big Freeze.)
Snow Cones (also submitted by Lisa Roy): Make snow cones with real snow. Walmart sells snow cone flavoring, cone-cups, and spoon-straws inexpensively.
Maple Syrup Candy. When the snow is deep and fresh, we like to boil maple syrup and then pour it over freshly collected snow (in a bowl). Depending on how long you boil the syrup, it turns into maple-flavored ice, chewy maple taffy, or hard maple candy. The middle stage is the best. Even in their teens and twenties, my kids have to do maple syrup snow at least once or twice each winter.
Snow candles. When the temps above zero, you can go outside for this. When it's very cold, you can bring a large bowl of snow in or fill in the sink. With your hand or a spoon make a shallow hole in the snow, the approximate shape you'd like the candle to be. (Think upside down glaciers!) Get aluminum foil and use it to press, and line the inside of your hole, drop in wick tied to a stick (the stick will lay across the top and hold the wick steady). Pour in melted wax, fill to just below rim, and let set till firm. When solid remove from snow & foil! This method makes some beautiful unexpected shapes and crinkles on the outside of the wax from the crinkled foil.
Giant-sized igloos, using recycle bins to mold the blocks of snow.
Snow painting. Take an empty used liquid dishwashing squirt top containers (Joy, Dawn, Palmolive etc.) with water with food coloring added. Kids love to squirt the snow to make *drawings* or color snow sculptures.
Bubbles. Try blowing bubbles outside and see how they freeze!
Save the snowman! Channel your inner Bill Cosby (who remembers his Junior Barnes story?): At the end of winter, make a small snowman for your freezer and unveil him on July 4th. You can place bets on how long you think summer frosty will last and toss around a few snow balls you can save too.
Please email us if you have additional suggestions.
5 rainy day toddler activities from American Baby. It works for snowy days too!
Winter Gardening Activities for Kids from the Green Mountain Gardener.
Help your child create an original book from a story/artwork: This service is from "Tikatok.com" but there are others that do this as well.
© 2017, Updated 2019, KidsOutAndAbout.com | <urn:uuid:2b130453-660d-4ec4-8672-fa3f2264a348> | CC-MAIN-2023-23 | https://rt.kidsoutandabout.com/content/what-do-when-weather-awful-and-youre-stuck-inside-kids | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650620.66/warc/CC-MAIN-20230605021141-20230605051141-00666.warc.gz | en | 0.924635 | 1,495 | 2.765625 | 3 |
For Previous TLP (ARCHIVES) – CLICK HERE
SYNOPSIS [2nd March,2022] Day 31: IASbaba’s TLP (Phase 1): UPSC Mains Answer Writing (General Studies)
1. In a globalised world, events occurring beyond the borders have domestic repercussions. In this light, examine the possible implications of Russian aggression against Ukraine on India.
Candidates need to write about Ukraine crisis and then simply write implications of it on India in current and future scenario also suggest wayforward.
The Ukraine crisis has crossed a critical point, with Russia following up its recognition of rebel regions in eastern Ukraine (Donbas region)- Donetsk and Luhansk. The conflict is now the largest attack by one state on another in Europe since the Second World War, and the first since the Balkan conflict in the 1990s.
Implications of Russian aggression against Ukraine on India:
- India’s imports of petroleum products from Russia are only a fraction of its total oil import bill and thus, replaceable. But getting alternative sources for fertilizers and sunflower oil may not be as easy.
- Exports to Russia account for less than 1% of India’s total exports; pharmaceuticals and tea could face some challenges, as will shipments to CIS countries.
- Freight rate hikes (due to increased risk in global trade) could make overall exports less competitive too, but it is the indirect impact on the trade account that is more worrying.
- The surge in crude oil prices will increase India’s inelastic oil import bill, and gold imports could increase and keep the rupee under pressure. As a result, trade and current account deficits may be jeopardised, although forex reserves are healthy.
- India imports more than 80% of its oil requirement, but the share of oil imports in its total imports is around 25%.
- Rising oil prices could speed up already rising inflation. Oil-related products have a share of over 9% in the WPI basket.
- Also, sanctions on Russia by the West could impact its trade with the India in strategic issues such as S400.
- The prospective Russian invasion of Ukraine comes amidst India’s military tensions with China and Delhi’s continued dependence on Moscow’s military supplies. Shift of West and USA from Indo Pacific to European Baltic region.
- It also comes at a time when Delhi is trying to build an international coalition against China’s brazen attacks on the territorial sovereignty of its Asian neighbours.
- Huge challenge of evacuation of Indian citizens students from the Ukraine that is around 20000 and other Ukraine bordering warton region.
- It will have to balance the pressure from one strategic partner to condemn the violation of international law, with that from another to understand its legitimate concerns.
- Delhi must talk continually to all sides, and engage with all of its partners, keeping in mind that there is no justification for the violation of any country’s territorial sovereignty.
- India must also make it clear to coercing countries that their “with us or against us” formulations are hardly constructive.
2. Welfare policies can’t ensure sustainable social transformation unless they ensure social empowerment. Elucidate.
Students are expected to write about the social empowerment and how welfare policies were unable to ensure sustainable social transformation. Therefore suggest measures ideas how with social empowerment welfare policies can ensure sustainable social transformation.
Social Empowerment means all the sections of society in India, have equal control over their lives, are able to take important decisions in their lives, and have equal opportunities. Without empowering all sections of society equally, a nation can never have a good growth trajectory.
Welfare policies unable to ensure sustainable social transformation:
- Unequal Distribution of Wealth and Non-inclusive growth: In the last five years, only 1% of the wealthiest in India increased their share in wealth of around 60% and the richest 10% in India own more than four times more wealth than the remaining 90%.
- Dismal condition of Education and Health: On comparison with similarly placed emerging economies, India spends way too low in the education and health sector.
- Education status in India: Independent India retained the largely colonial superstructure of primary, secondary, and tertiary education, which emphasis on rote learning and obsession with marks in the exams.
- Health status in India: Even after many government schemes, both the infant mortality rate and the maternal mortality rate remains high. There is a high prevalence of malnutrition in Indian children, reflected in a high percentage of Child stunting, wasting and underweight.
Welfare policies through social empowerment ensuring sustainability:
- Education and health care are not only vital for quality of life, they have much to contribute to social empowerment and social change.
- India needs to broaden its base in the spheres of education, healthcare and women’s equality to foster social empowerment.
- There is a need for proper utilization of funds by plugging the loopholes arising from procedural and institutional bottlenecks.
- The mantra of availability, affordability, and assurance must be followed for improving status and performance of Health care in India.
- Road to sustainable social empowerment goes through breaking away from shackles of poverty, patriarchy, and Caste both in the public and private spheres.
- Many schemes and programs related to employments, such as, MGNREGA, Aajivika, Deen Dayal Upadhyay Antodaya yojana, etc. Along with schemes involving subsidies, food security, Ayushman Bharat, Ujaala, etc ensure empowerment but need to recalibrate it for sustainability.
The Objectives of State as per preamble of Indian constitution are Justice, Equality, Fraternity and Liberty. These objectives point towards social empowerment of the vulnerable and hitherto socially disadvantaged section. Social empowerment will help in political and economic progress of our country and in turn help us all. The India envisaged by our forefathers is a socially empowered India and with many political-economic awareness Interventions which we must carry forward in right direction.
3. What is your interpretation of secularism when it comes to educational institutions. Substantiate your views.
Candidates need to write about their interpretation of secularism when it comes to educational institutions and provide evidence for it.
Secularism has been a much used (and abused) term in India’s popular, particularly political, lexicon for the last seventy years. It has meant “all things to all people,” making it difficult for common people as well as political commentators to arrive at a precise definition/meaning of it.
Interpretation of secularism when it comes to educational institutions:
The Collins dictionary defines secularism as a system of social organization and education where religion is not allowed to play a part in civil affairs. When it comes to educational institutions, secularism can be interpreted from the following:
- The Indian state may engage with religion negatively to oppose religious tyranny. It may also choose a positive mode of engagement. Thus, the Indian constitution grants all religious minorities, the rights to establish and maintain their own educational institutions, which may receive assistance from the state.
- Article 28 which authorizes educational institutions maintained by different religious groups to impart religious instruction.
- Article 29 and Article 30 that guarantee certain cultural and educational rights to the minorities. Article 29 states that there shall be no discrimination among citizens on the ground of religion, race, caste, language, or any of them.
- Article 30 that states that all religious or linguistic minorities shall have the right to establish and administer educational institutions of their choice.
- One way of reducing religious discrimination is to work together for “mutual enlightenment “. Education is the only way of helping change the mind set of people. Hence secularism should ensure education is used in the similar manner to mutually enlighten.
However, there are several issues that highlight secularism in terms if educational institutions in a negative way:
- Schools, colleges, and universities have failed to inculcate the concept of secularism in the minds of the young educated people, the thirst for knowledge and truth and a mutual feeling of respect.
- The defective faulty and ill-functional educational institutions which have made believe to be a part of groups and communities, have drastically failed to cultivate critical thinking and a universal humanitarian approach among the young people.
In education, everyone should seek the best way to live together. Schools, colleges, and universities should promote value-education and a humanitarian approach to make the younger students understand and religious traditions of each and every religion in the country. The State should grant assurance to every individual irrespective of their religious barriers that he has the right to freely profess, practise, and propagate his religion and freedom of conscience as per the law of the land | <urn:uuid:530d728e-dee8-4e5e-b058-f57f4897b1eb> | CC-MAIN-2022-21 | https://iasbaba.com/2022/03/synopsis-2nd-march2022-day-31-iasbabas-tlp-phase-1-upsc-mains-answer-writing-general-studies/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662546071.13/warc/CC-MAIN-20220522190453-20220522220453-00364.warc.gz | en | 0.936291 | 1,844 | 2.703125 | 3 |
Alexander Gerst begibt sich für die Fernsehserie “Mission Erde” an Orte, bei denen mittels Forschung versucht wird, das fragile Ökosystem Erde besser zu verstehen. Auf seiner Expeditionsreise traf er auch die Wissenschaftlerin und Leiterin des...
Within this precarious time concerning world wide pollution, it is still surprising how far the dimension of plastic pollution actually is. Apparently no place is safe from the little small non degradable particles. Even within the Mariana Trench, that marks with a depth of almost 11 km the deepest point on earth, plastic was found.
It is known knowledge that most of the plastic that pollutes our ocean, actually around 94%, is found on the seafloor. But still the new information reveals the shockingly high contamination of plastic within the most remote place, the deep sea. The photograph shows plankton, sampled within the Mariana trench, that ingested a blue plastic fiber.
The Guardian, 20. Dezember 2018, Autor: Damian Carrington
“Manmade plastics have contaminated the most remote and deepest places on the planet,” said the Chinese researchers. “The hadal zone is likely one of the largest sinks for microplastic debris on Earth, with unknown but potentially damaging impacts on this fragile ecosystem.”
Other recent studies have demonstrated the reach of human impacts into the Mariana Trench, with “extraordinary” levels of pollutants being found there and plastic being found in stomachs of deep sea creatures. Microplastics have also been found in Swiss mountains, tap water and human faeces.
Microplastics have been shown to harm sealife, which is already being damaged by overfishing and climate change. The researchers said: “Further work to evaluate the impacts of microplastics on fragile hadal ecosystems is urgently needed.”
The whole article was published within the Guardian. | <urn:uuid:7a600539-3813-409b-acda-2755945fe5a2> | CC-MAIN-2020-40 | https://www.deepwave.org/platikverschmutzung-am-tiefsten-punkt-des-ozeans/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400217623.41/warc/CC-MAIN-20200924100829-20200924130829-00417.warc.gz | en | 0.836881 | 424 | 3.125 | 3 |
Within the extensive tapestry of languages, the Filipino language is no exception when it comes to its intricacy and exuberant diversity of expressions. Amid the myriad linguistic gems that flourish in the Philippines, “Kolokyal na Salita Halimbawa” emerges as an intriguing facet of this language. In this discourse, we shall embark on a profound exploration of what precisely constitutes “Kolokyal na Salita Halimbawa,” delve into some vivid illustrations, and unravel the profound cultural implications and subtleties that render it an indispensable facet of Filipino discourse.
The Essence of “Kolokyal na Salita”
“Kolokyal na Salita” denotes the domain of informal Filipino discourse or colloquial articulations. It is the mode of expression embraced in everyday dialogues, often distinguished from the formal Filipino language, known as “Filipino.” This colloquial language embodies a more laid-back demeanor, frequently characterized by the incorporation of colloquialisms, regional idiosyncrasies, and a relaxed syntactical structure. It serves as the vernacular of the streets, mirroring the vibrant and multifaceted culture of the Philippines.
Attributes of “Kolokyal na Salita”
To attain a deeper comprehension, let us delve into some pivotal attributes:
Utilization of Vernacular
One of the hallmarks of “Kolokyal na Salita” is its propensity to employ colloquial terms and expressions. These linguistic manifestations are typically absent in formal compositions or orations but hold sway in informal conversations.
Distinct regions across the Philippines boast their distinct colloquialisms. For instance, what qualifies as slang in Manila might bear no resemblance to the colloquialisms prevalent in Cebu or Davao.
The Filipino language has readily assimilated lexemes from a plethora of linguistic sources, including Spanish, English, and even Chinese. These borrowed lexemes often weave their way into colloquial discourse, further enriching its kaleidoscopic fabric.
Exemplars of “Kolokyal na Salita Halimbawa”
Let us now immerse ourselves in some instances to gain a tactile sense of this captivating facet of the Filipino language:
“Ano’ng Trip Mo?”
This utterance serves as a casual mode of inquiring about someone’s intentions or contemplations. It is akin to the query, “What occupies your thoughts?”
“Saan Tayo G?”
In the realm of colloquial Filipino discourse, arranging a social outing with acquaintances may encompass the query, “Saan tayo G?” This translates to, “Where do we intend to convene?”
The term “Petmalu” operates as an informal expression employed to convey astonishment or admiration. It equates to expressing sentiments of “Wow!” or “Astonishing!”
Cultural Significance of “Kolokyal na Salita”
Comprehending “Kolokyal na Salita” transcends mere linguistic comprehension; it offers profound insights into Filipino culture:
Fostering Community Spirit
Employing informal language fosters a sense of kinship and camaraderie among interlocutors. It serves as a conduit for establishing personal connections.
The capability to transition between formal and informal discourse holds significant esteem within Filipino society. It exemplifies linguistic versatility and cultural acumen.
Facilitating Emotional Expression
Colloquial expressions often imbue conversations with vivid emotional hues, enabling individuals to convey their sentiments more poignantly.
“Kolokyal na Salita Halimbawa” constitutes a trove of linguistic splendor nestled within the bosom of the Filipino language. It stands as a testament to the Philippines’ opulent cultural mosaic, affording a glimpse into the psyche and ethos of its denizens. Embracing “Kolokyal na Salita” signifies an embrace of the authentic essence of Filipino discourse.
Is “Kolokyal na Salita” synonymous with Filipino slang?
While “Kolokyal na Salita” encompasses slang, it spans a broader spectrum of informal language employed in daily interactions.
Do regional disparities exist in “Kolokyal na Salita”?
Indeed, divergent regions across the Philippines harbor their unique colloquialisms and slang.
Can “Kolokyal na Salita” find a place in formal compositions or speeches?
As a rule of thumb, it is generally discouraged in formal contexts, as it thrives primarily in casual dialogues.
How can I gain a deeper understanding of “Kolokyal na Salita”?
Engaging in conversations with native Filipino speakers and immersing oneself in local media and entertainment can facilitate a more profound familiarity with this linguistic milieu.
Is it imperative to acquaint oneself with “Kolokyal na Salita” to communicate effectively in the Philippines?
While not obligatory, possessing a grasp of informal Filipino can undoubtedly enhance one’s communicative prowess and cultural assimilation during their sojourn in the Philippines. | <urn:uuid:2fb06131-033a-4878-b14f-4a2143865c23> | CC-MAIN-2023-50 | https://forbessmag.com/unveiling-the-splendor-of-kolokyal-na-salita-halimbawa/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100599.20/warc/CC-MAIN-20231206130723-20231206160723-00704.warc.gz | en | 0.841321 | 1,108 | 2.859375 | 3 |
Molting is a natural process birds go through where they lose their old feathers and grow in new ones. Here are tips to help you understand what is happening and how to care for molting chickens.
Are your chickens molting? Molting is a natural process birds go through where they lose old feathers and grow in new ones. Growing feathers is uncomfortable and painful. Read on to learn more about molting chickens and how to care for your flock during this time.
Martha, a Barred Rock is the leader of the hen house. When she begins to molt in fall, the whole flock dynamic is in flux.
She gets very grumpy and has no desire to manage her flock mates to keep them in line. When free ranging, she goes off to the opposite corner of the yard all by herself and isn’t interested in hanging out with her BFFs.
Martha’s yearly molts are hard, but over quickly. Soon she is back to normal while the other members continue to suffer through their own annual molts.
What is molting?
Molting is the process all birds go through to replace worn feathers with new ones. The old feathers fall out and fresh feathers grow. Both hens and roosters molt each fall as part of a natural cycle.
Feathers are made of a protein called keratin. Over time, this protein weakens as the feathers wear out from preening, dust bathing, and other normal activity. As damage accumulates, the feathers are no longer efficient at protecting and insulating. Each feather falls out so a new one can take its place.
If you raised hens from chicks, you will have observed several juvenile molts. The first molt happens when the chick is about 7-days old when the downy fuzz falls out and is replaced by small feathers.
Another juvenile molt occurs around 10-weeks when the pullets’ small feathers are replaced with a set of adult feathers. There are additional mini-molts until the pullets become layers at around 22-weeks. Adult chickens then settle into a yearly molting routine.
When do adult chickens molt?
Generally, adult chickens and roosters molt every year in late summer or fall. Natural molting is triggered when the daylight decreases. Adult chickens that are at least 18 months old begin to lose worn out feathers and grow in new ones. Some chickens also go through a light molt in spring when the daylight begins shifting again.
Of course, there are exceptions:
- First year chickens: Young adult chickens may not molt the first year depending on their age.
- Sick or stressed chickens: Molting may occur out of season if your chickens are ill or stressed out from a lack of food, water, or light.
- Broody hens: Hens that are finished hatching eggs will molt when they return to their normal eating, drinking, and egg laying routines.
- Additional lighting in the coop may also shift the molting cycle.
Signs you have molting chickens
It is shocking to find a bunch of feathers in the coop and pen, but there are some signs your chickens are molting:
Feathers look dull and ragged:
Just before your chickens begin molting, the feathers lose their normal sheen and bright color. They will look a bit tattered, and no longer lay smooth. Essentially, the feathers are worn out from normal activities over the past year from preening and dust bathing.
You will start to see loose feathers:
Soon, you will notice a few small feathers accumulating in the chicken coop or pen. Not all members of the flock will begin molting at the same time, but they usually keep the same schedule each year. My head hen, Martha the Barred Rock kicks off molting season every year, and then the rest of the flock follows.
Your chickens will slow or stop laying eggs:
Along with the molting cycle, decreasing daylight hours also triggers the hens’ reproduction cycle to rest. When your hens begin molting, most slow or stop laying eggs until the daylight hours increase again in late winter into spring.
The combs and wattles get dull:
While your chickens are molting and have stopped laying, their comb and wattles will go from bright red to pale pink.
You will see bald spots:
The process of molting occurs over a period of time as feathers fall out and are replaced. You may see bare patches as feathers in sections of the body fall out and begin growing in.
Grumpy flock of hens:
When the flock is molting, the dynamic of the pecking order is challenged. Growing feathers is painful and losing feathers may cause a hen to feel more unprotected and vulnerable than usual. You might find the flock squabbling more frequently when they are molting.
You will also observe personality changes in your chickens. That special hen that greets you each day, may simply want to hang out in the corner dust bathing while she is molting.
What happens to chickens when they molt?
The process of molting occurs over a period of time as feathers fall out and are replaced. When chickens molt, it usually goes through a certain order beginning at the head and neck feathers, followed by breast, body, wings, and tail.
When a feather falls out during a normal molt, a new feather is stimulated to start growing right away. The new feather grows out of the skin as a pin feather, a shaft encased in a waxy keratin sheath. The new feather has a blood supply flowing through the quill to nourish the feather as it develops. At this point, if a feather breaks, it will bleed. The shaft eventually flakes away as the quill lengthens, grows barbs, and the new feather emerges.
When the feather finishes growing, the blood vessels die back, and the quill becomes hollow. This makes feathers lighter and also means that if the chicken breaks a feather at this point, it will no longer bleed.
Some chickens molt faster than others. You may open up the coop one morning and find so many feathers that you may wonder if a pillow fight happened overnight. Others molt slowly, only dropping a few feathers here and there as they go about their business.
Generally, your most productive layers will molt quickly, and the poor layers and older hens will take their time. It can take 8 to 12 weeks for a chicken to finish molting. Slow molters may take as long as 18 to 24 weeks to grow in their new feathers.
Tips to Care for Molting Chickens
If you are close with your flock, you will notice personality changes as the feathers begin to fly. Most molting chickens retreat to quiet spaces, reduce their activity, and just want to be left alone.
Molting takes a lot out of a chicken. Make sure your flock has plenty of clean water and food at all times. You may want to place an additional feeder in another area of the coop or pen so even the most timid chicken has access to food.
Here are other ways to help your molting chickens through the feather replacement process:
Increase protein in your flock’s diet
Since feathers are made of about 85% protein, ensuring the flock has enough protein in their diet will help them get through the molt period quickly and grow healthy feathers.
Switch your flock’s diet to a higher protein feed. There are several, “feather fixer” chicken feeds now on the market that provides extra levels of protein and nutrients. Seek out a complete feed with around 20% protein. Once your chickens are finished molting, switch back to their regular feed.
A flock that enjoys free ranging time will find high protein bugs, worms, and seeds. You can also feed a handful of high protein treats like black oil sunflower seeds, mealworms, pumpkin seeds, and even scrambled eggs.
Reduce stress during the molt
The process of molting is both painful and stressful on chickens. Try to keep the flock calm and anxiety level low during the molt.
Make sure your flock has access to plenty of food and water, avoid making changes to their environment, and don’t introduce new chickens to the flock during the annual molt.
My flock hates it when it is windy and prefers the protection of their pen. I try not to free range on windy days when they are molting because it only stresses them out.
Avoid holding molting chickens
Growing feathers is uncomfortable and painful. The spiky new pinfeathers are tender until it is fully grown. Any bending, rubbing, or pressure can hurt. Try to avoid picking up and holding your chickens during the molting period.
Keep your molting chickens busy
Some hens will want to remain calm by resting or dust bathing, while others may be bored and restless. Keep these chickens entertained with plenty of things to dig, scratch, and eat.
What to Do When Your Chickens Finish Molting
Once your flock is finished molting, it is a great time to do some cleaning in your coop and get it ready for the cold winter months.
It will be a while before your hens resume laying, but clean out the nesting boxes and fill with fresh shaving.
Go ahead and switch back to your regular chicken feed. Give all the feeders and waters a good scrubbing and fill with fresh food and water.
Now is a great time to start with the Deep Litter Method in the Chicken Coop. Remove all the soiled bedding and feathers. Sweep out the dust and cobwebs, and replace the bedding with a layer of fresh clean shavings, leaves, or straw.
I hope these tips help you care for your molting chickens. It’s not easy to watch your flock going through what looks like a miserable situation. Soon they will show off new, shiny feathers, and back to their normal chicken antics.
Research and Further Reading:
- The Chicken Health Handbook by Gail Damerow
- Everything You Need To Know About Feathers by Bird Academy, Cornell University
- Storey’s Guide to Raising Chickens by Gail Damerow | <urn:uuid:66b20ef2-da9f-453f-95e1-51eccec36e37> | CC-MAIN-2021-10 | https://imaginacres.com/molting-chickens/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178355944.41/warc/CC-MAIN-20210226001221-20210226031221-00031.warc.gz | en | 0.941052 | 2,132 | 3.15625 | 3 |
05 Dec 7.3 The Greatest Transformation
Veganism is like a four-legged stool with health, ethical, environmental and spiritual reasons for elevating our lives. While the health reasons are becoming increasingly well known with the advocacy work of numerous health and nutrition professionals and organizations, the ethical, environmental and spiritual reasons reinforce them to make a truly compelling case. Thus, Veganism is an essential part of the upcoming fundamental transformation of our global industrial civilization, the greatest transformation in the life of our species. But this time, it is not about concentrating more and more power in the hands of a few, but devolving power to the local level in the hands of the many. This is the metamorphosis and just as in Nature, the Caterpillar has no choice but to become a Butterfly.
Historically, every momentous transformation in human civilization has been accompanied by revolutionary changes in three aspects of human lives,
1) In the way we harness energy;
2) In the way we communicate with each other; and
3) In the foods we eat.
About 200,000 years ago, we
1) Discovered the controlled use of fire;
2) Developed spoken language to communicate with each other; and
3) Began eating meat from hunted animals because our controlled use of fire allowed us to cook that meat and made it digestible.
Thus began the dominance of patriarchy as the male hunters assumed more importance than the female gatherers in human societies. The gatherers no longer had to forage over large distances to gather the nutrition needed for human sustenance since the hunters could provide concentrated nutrition in the form of animal flesh. Simultaneously, this strengthened speciesist attitudes within human societies, as animals became objects to be killed for human consumption. Thus sexism and speciesism are the core oppressions from which all other oppressions sprung over time. Hierarchy developed within the patriarchy. The victims of sexist oppression, the women, were partly assuaged when they could oppress other species and feel superior to them.
About 10,000 years ago, during the agricultural revolution, we
1) Harnessed the energy of animals such as cows, buffaloes and horses to plough our fields;
2) Developed writing in order to communicate with each other; and
3) Grew crops of our own liking instead of relying on what Nature provided in the wild.
Instead of humans belonging to Nature, we began acting as if Nature belonged to humans. Not only did we enslave work animals to do our bidding, we enslaved the Earth to produce what we desired. In the resulting agricultural revolution, cities were born where the ruling classes did not do the actual work of raising crops but were fed very well. The social hierarchies developed more layers, resulting in other oppressions such as slavery, classism and casteism.
About 200 years ago, we
1) Began to harness fossil fuels for energy;
2) Developed the printing press for communication, to disseminate information far more efficiently than with just hand written documents; and
3) Repurposed our domesticated work animals to be raised as just food animals.
We developed machines to plough the fields and didn’t need the work animals anymore for that purpose, but we continued to enslave them anyway just to milk them and eat them. We developed further layers of hierarchy in our social structures to expand the scope of our human enterprise until it bestrode the whole globe, conquering and colonizing any indigenous civilizations that came in our way. The fossil fuels were to be found in specific locations on Earth and we had to create refining, processing and distribution systems for them. The food animals were most efficiently raised in giant factories as if they were widgets, and then processed into meat packages, refrigerated and distributed to the consumers up and down the social hierarchies. A dominant financial sector arose that siphoned off increasingly larger shares of the wealth, simply as a commission for allocating capital efficiently. Oppressions such as colonialism and racism became much more prominent.
Today, we are poised to undergo yet another transformation, the greatest of them all! This time:
1) We are harnessing solar energy directly and rather than being concentrated in a few locations, it is actually falling on our heads almost everywhere.
2) We are using the Internet to communicate with each other and it has put the entire accumulated knowledge of all humanity at each and every finger tip.
3) We are transitioning out of animal-based foods to plant-based Vegan foods, which can mostly be grown in local farms without having to rely on large animal husbandry operations with giant processing, refrigeration and distribution systems that are currently spread out over half the globe.
Unlike the previous three major transformations that increasingly concentrated power in the hands of a few and strengthened the social hierarchy, what is occurring today is an entirely radical kind of transformation since all three changes devolve power to the local level, where it becomes easier to implement cooperative and consensual decision-making processes.
This devolution of power is already evident in the US. While the US Congress is quite gridlocked and can barely manage to pass continuing resolutions that maintain the status quo, local governments in cities and municipalities, from Detroit to Seattle to Los Angeles to Tempe, have been promoting urban farming, innovative housing solutions, and other such radical changes. Therefore, the transformation that we’re undergoing now is towards a loosely connected global network of densely connected local communities. But, of course, such a revolutionary transformation will need to overcome the resistance of the power elites in the current hierarchical system, who naturally fear the loss of their perceived privileges and the chaos that would occur if the current system collapses.
The fossil fuel industry has been stoutly resisting the growth of the renewable energy sector. But Al Gore, among others, is predicting that a global transition to solar energy will be largely complete by 2030 as solar costs spiral downwards. Prof. Mark Jacobson of Stanford even has a detailed plan of how such a transition might occur. Besides, this plan assumed that the Caterpillar culture will continue unchecked and the energy demands of humanity will continue to soar into 2030! In reality, this is certainly not going to be the case. If the steady state Butterfly economy requires one-third the energy that we use today, which is reasonable considering that the majority of our present activities are unnecessary and wasteful, the transition to solar energy can happen sooner.
The solar energy sector needed just one chink in the armor of the fossil-fuel interests to realize its economies of scale and that chink came in the form of generous German incentives. When combined with the declining costs of electrical storage batteries, thanks to the success of Tesla Motors, gasoline engines will also likely die a slow death before 2030. Therefore, fossil fuels will literally become dinosaur fuels by 2030. Local collection of solar energy, coupled with the local energy storage using batteries will mean that the large utility companies of the past would become obsolete as well. In fact, in Europe, the top 20 utility companies lost over 60% of their stock market value between 2010 and 2015, just when the DAX stock market index gained 60%. What’s happening in Europe will inevitably happen worldwide!
In the communications arena, the power elites have also been trying to subvert the Internet, instituting an elaborate surveillance infrastructure so that every electronic transmission of every individual can be stored, accessed and searched, for all time, ostensibly to keep us all “safe from terrorism”. Then Edward Snowden came along and spilled their secrets. He showed that the
watchers had an expansive definition of “terrorism”. If you were kind to animals, you were a “terrorist,” because you were a threat to the hierarchical system. If you were kind to the environment, you were an “eco-terrorist,” for the same reason. All passive bystanders were treated as “potential future terrorists” within the current system. Therefore, all of us were being watched, all the time!
But Edward Snowden also revealed that if Internet communications were encrypted with reasonably strong cryptographic codes, then the watchers became blind. They and the thousands of math Ph.D.s who work for them, don’t know how to break these codes, most likely because these codes are truly unbreakable. Therefore, he showed that if we routinely encrypt all our communications and develop email and social network applications to do that seamlessly for the casual user, then the Internet will become what it was always intended to be: a communications technology that frees us all from the clutches of a few. We can then have true privacy for the individual and demand absolute transparency from our institutions, which is the only way we can assure an open government of the people, by the people and for the people. In this post-Snowden era, various open source software consortia are already implementing such seamless encryption systems.
Jeremy Rifkin discussed these three drivers in an interview with Een Vandaag entitled On Global Issues and Future of the Planet, https://www.youtube.com/watch?v=m9wM-p8wTq4 http://stanford.io/17arxa8 https://paulgilding.com/2014/03/19/carbon-crash-solar-dawn/ https://www.youtube.com/watch?v=5yB3n9fu-rM | <urn:uuid:ca0fcd9c-c0ae-4f2d-913b-dc31258d5c5a> | CC-MAIN-2022-33 | https://climatehealers.org/carbon-yoga/73-the-greatest-transformation/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00656.warc.gz | en | 0.95326 | 1,955 | 2.703125 | 3 |
In an effort to increase the dwindling population of these rare Himalayan goats, Kashmir scientists resort to cloning. The animal biotechnology center of Sher-e-Kashmir University lead by project scientist Dr. Riaz Ahmad Shah saw the birth of the world’s first ever cloned female kid, “Noori,” which means “light” in Arabic on March 9, 2012. This opens the possibility of establishing breeding programs which will, in turn, bolster the production of the soft, high-priced wool for which these goats are renowned.
Though Cashmere wool fibers are fine and light, they are able to retain heat without the bulk. They are mostly made into shawls, which is the major source of income, generating $80M a year for the 10.2 million people of Kashmir. The supply have not kept up with the demand for these expensive shawls that in recent years Kashmir had to import cashmere from China.
The seven-scientist team took two years to clone Noori using the relatively new “handmade” cloning technique involving only a manual method using a microscope. They have since standardized the procedure to “the cheapest, easier and less time-consuming” method and can now produce a clone in six months. | <urn:uuid:5c407a1f-e932-4862-bfd3-ff3737f23464> | CC-MAIN-2022-49 | https://littlesweetknittings.com/2012/03/23/first-rare-cashmere-goat-cloned-by-scientists/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710734.75/warc/CC-MAIN-20221130092453-20221130122453-00262.warc.gz | en | 0.959425 | 264 | 2.890625 | 3 |
Research is increasing regarding what we know about liver cancer. Scientists are learning more about its causes. Following are common risk factors for the disease:
- Viral hepatitis is one of the largest risk factors for this type of cancer. Hepatitis viruses are viruses that infect the liver. Two common types are Chronic Hepatitis B (HBV) and Chronic Hepatitis C (HCV.) Carriers of Hepatitis B virus face up to a 100-fold increased risk of developing adult primary liver cancer.
- Cirrhosis is a disease in which liver cells become damaged and are replaced by scar tissue. People with cirrhosis have an increased risk of liver cancer. Most (but not all) people who develop liver cancer already have some evidence of cirrhosis.
There are several possible causes of cirrhosis. Most cases in the United States occur in people who abuse alcohol or have chronic HBV or HCV infections.
Age and Gender
- Liver cancer is much more common in males than in females. The fibrolamellar subtype of HCC occurs in about equal numbers in both sexes. In the United States, adult primary liver cancer occurs most often in people over age 60
- In the United States, Asian Americans and Pacific Islanders have the highest rates of liver cancer, followed by American Indians/Alaska Natives and Hispanics/Latinos, African Americans, and whites.
Inherited Metabolic Diseases
- Certain inherited metabolic diseases can lead to cirrhosis. People with hemochromatosis absorb too much iron from their food. They are more likely to develop cirrhosis because of the high levels of iron in their liver. Other rare diseases that increase the risk of liver cancer include tyrosinemia, alpha1-antitrypsin deficiency, porphyria cutanea tarda, glycogen storage diseases, and Wilson disease.
Diabetes and Obesity
- Diabetes can also increase the risk of liver cancer, usually in patients who have other risk factors such as heavy alcohol consumption and/or chronic viral hepatitis. Obesity may increase the risk of developing liver cancer, probably because it can result in fatty liver disease and cirrhosis.
- Anabolic steroids are male hormones used by some athletes to increase their strength. Long-term anabolic steroid use can slightly increase the risk of hepatocellular cancer. Cortisone-like steroids, such as hydrocortisone, prednisone, and dexamethasone, do not carry this same risk.
- Chronic exposure to drinking water contaminated with naturally occurring arsenic, such as that from some wells, increases the risk of some types of liver cancer. This is more common in parts of East Asia but may be a concern in some areas of the United States.
Signs and Symptoms
Because signs and symptoms of liver cancer do not usually appear until it is in its later stages, it is seldom diagnosed early.
Many patients who develop liver cancer have long-standing cirrhosis. If a patient with cirrhosis becomes worse without any known reason, doctors will probably suspect that liver cancer is the cause and do appropriate tests.
The increasing size of the liver and its inability to perform its functions as cancer cells multiply can cause warning signs in people with liver cancer. Following are the most common health problems experienced by people with liver cancer or liver disease:
A hard lump or swelling found on the right side of the abdomen, just below the ribs
Pain or discomfort on the upper side of the abdomen or by the right side of the shoulder blade
Jaundice, or the yellowing of the skin or the whites of the eyes or dark-colored urine
Nausea, loss of appetite or feeling full shortly after you begin to eat
Unexplained weight loss
Swollen abdomen, bleeding (the symptoms of cirrhosis) | <urn:uuid:eb19534d-4918-4ae9-b1e8-80ffb4784dfa> | CC-MAIN-2013-48 | http://www.cancersupportcommunity.org/mainmenu/about-cancer/types-of-cancer/liver/risk-factorssigns-and-symptoms.html.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163055855/warc/CC-MAIN-20131204131735-00037-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.939668 | 789 | 3.34375 | 3 |
Use the buttons below to get in touch, buy a class card or book a workshop.
Contact Us Buy Class Card Book a Workshop
Welcome to our Introduction to Ashtanga Yoga.
What is Ashtanga Yoga?
Yoga originated in ancient India several thousand years ago, as a system of practices designed to maximise the health and well-being of the individual both physically and mentally. The aim of Yoga was to provide the tools that would enable everyone to live a happy, healthy life. Practices were developed that worked on all of the levels of ones make-up; this comprehensive approach to health and happiness was called the Eight Limbed Path of Yoga, or Ashtanga Yoga.
The most commonly practised aspect is the third limb, Asana or Yoga Postures, which strengthen and realign the body and improve balance. There is much more to Ashtanga than just this however. Breathing exercises, called Pranayama (4th limb) have a profound impact on the nervous system. The practices of Pratyahara (Sense withdrawal) and Dharana (Concentration) (5th & 6th limbs) help us to clear and focus the mind, allowing us to develop the capacity for Dhyana, meditation (7th limb) and Samadhihih (8th limb), the state of profound peacefulness and well-being that arises when we clear our systems of all imbalance. You may notice that we have not yet mentioned the 1st and 2nd limbs. These are called Yama and Niyama, which we can translate as ‘conduct conducive to health and happiness’ and ‘lifestyle conducive to health and happiness’. These are vital elements of the system as without them, no amount of postures will have the impact we desire, nor will we have the energy or determination to persevere with practice.
Ashtanga Yoga in Practice
We are all different, each with our own physical, mental and emotional make up, and we all have stresses and imbalances, particular to our situation in life. It is key to develop a beneficial Yoga practice that is appropriate to our specific needs. A proper balance of postures and breathing practices, performed in the right way, allied with meditation and relaxation practices needs to be prescribed, and performed according to one’s capacity. In this way, we achieve the maximum benefit from our practices with the coordinated effect on our body, nervous system and mind. The only requirement is the commitment to do it!
Is Ashtanga Yoga suitable for me?
Ashtanga Yoga can be tailored to meet everyone’s needs. It is not necessary to be super flexible or fit to start. We teach each student at the level suited to them, so there are no limitations in terms of age, fitness or experience. What is needed is a little determination and patience and a willingness to take the time to learn what can be a life changing practice. For more information on the specifics of our Beginner’s Packages, please go to our page Beginners Ashtanga Yoga Packages.
“I have practised Yoga before but not Ashtanga”
No Problem! If you have practised Yoga before but are new to Ashtanga, then you can avail of one of our Beginner’s Packages, Gold, Silver or Bronze and will be fine with any one of them. For more information on the specifics of our Beginner’s Packages, please go to our page Beginners Ashtanga Yoga Courses.
“I have practised Ashtanga Yoga for many years but not with you – how do I start?”
Perfect! Just come along to any class in the schedule and sign up – you can also avail of any of the packages if you so wish. For more information on the specifics of our Beginner’s Packages, please go to our page Beginners Ashtanga Yoga Packages.
“I have never practised yoga and I am very stiff, would your classes be too much for me?”
Absolutely not – please come along. We can modify postures as necessary to make it possible for you to do them ot the best of your ability. Again look at one of the Beginner’s packages on Beginners Ashtanga Yoga Packages.
“I currently have an illness, or specific physical condition – are your classes suitable for me?”
Yes. If your doctor has given you the go ahead to practice yoga, our classes are ideal as we will tailor a practice for you specifically. In this situation, you should take either a Silver or Gold Beginner’s Package, which include a private yoga class (Silver) or both a private class and an Ayurvedic Consultation. Once you have had the Private class, you can attend the regular Mysore style classes where we will continue to work with you individually to ensure that you understand your personalised practise. Again look at the Beginner’s packages information hereBeginners Ashtanga Yoga Packages. | <urn:uuid:bced4d8e-a495-4b10-9ba9-0a5d8cbca07d> | CC-MAIN-2020-29 | https://ashtanga.ie/new-to-ashtanga-yoga/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655902377.71/warc/CC-MAIN-20200709224746-20200710014746-00434.warc.gz | en | 0.946105 | 1,049 | 2.609375 | 3 |
Development and Validation of a Method to Measure Lumbosacral Motion Using Ultrasound Imaging
MetadataShow full item record
The study aim was to validate an ultrasound imaging technique to measure sagittal plane lumbosacral motion. Direct and indirect measures of lumbosacral angle change were developed and validated. Lumbosacral angle was estimated by the angle between lines through two landmarks on the sacrum and lowest lumbar vertebrae. Distance measure was made between the sacrum and lumbar vertebrae, and angle was estimated after distance was calibrated to angle. This method was tested in an in vitro spine and an in vivo porcine spine and validated to video and fluoroscopy measures, respectively. R2, regression coefficients and mean absolute differences between ultrasound measures and validation measures were, respectively: 0.77, 0.982, 0.67° (in vitro, angle); 0.97, 0.992, 0.82° (in vitro, distance); 0.94, 0.995, 2.1° (in vivo, angle); and 0.95, 0.997, 1.7° (in vivo, distance). Lumbosacral motion can be accurately measured with ultrasound. This provides a basis to develop measurements for use in humans.
Ultrasound in Medicine and Biology
Clinical Sciences not elsewhere classified | <urn:uuid:625b97de-103c-45bc-b08b-ebe07c0c59ff> | CC-MAIN-2018-13 | https://research-repository.griffith.edu.au/handle/10072/339708 | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647649.70/warc/CC-MAIN-20180321121805-20180321141805-00538.warc.gz | en | 0.937138 | 286 | 2.515625 | 3 |
The nation's top infectious disease official says there's hope that a vaccine against Ebola will be available as early as next July.
Dr. Anthony Fauci (FOW'-chee) of the National Institutes of Health says such a preventive vaccine has been successfully tested with monkeys.
Fauci tells "CBS This Morning" that human trials with volunteers will commence in September, and by July it should be ready.
He also says people shouldn't have concerns that two infected patients were brought here from West Africa, saying they can be handled safely.
More than 1,300 people have been stricken in West Africa, and nearly 730 have died in Guinea, Liberia and Sierre Leone.
Ebola currently has no vaccine or antidote. It is contracted through close contact with bodily fluid and blood, unlike other airborne viruses. | <urn:uuid:5b4deda1-34ff-419c-9f49-1775e0747d16> | CC-MAIN-2016-22 | http://www.foxnews.com/health/2014/08/04/top-infectious-disease-specialist-says-ebola-vaccine-not-far-away.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051114647.95/warc/CC-MAIN-20160524005154-00157-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.980091 | 169 | 2.578125 | 3 |
Book Categories: Royalty, Franks, Charlemagne, Holy Roman Empire, Capets, Louis IX, Valois Dynasty, Hundred Years' War, Bourbons, Henry IV, Queen Margot, Louis XIV, Louis XV, Marie Antoinette, Revolution, End of Monarchy, Napoleon, Burgundy, Margaret of York, Corsica, Navarre, Palaces, Books in French, DVDs, European Royalty
The Fleurs de Lis of the Kings of France, 1285-1488 by William Hinkle. French royal heraldry and genealogy.
The Cambridge Illustrated History of France by Colin Jones. A basic introduction to French history.
France: An Illustrated History by Lisa Neal. Outlines French history from prehistoric times to the present.
The Devil in the Holy Water, or the Art of Slander From Louis XIV to Napoleon by Robert Darnton. How slander helped to delegitimize French regimes and bring down governments.
Theorizing the Ideal Sovereign: The Rise of the French Vernacular Royal Biography by Daisy Delogu. Examines the ways in which biographical writings on kings could advance precise political aims.
Ritual, Ceremony and the Changing Monarchy in France, 1350-1789 by Lawrence M. Bryant. Collection of articles exploring images of the French monarchy in ceremonies created by townspeople and officials.
The Royal Touch: Sacred Monarchy and Scrofula in England and France by Marc Bloch, translated by J. E. Anderson. Explores the belief that kings had the power to cure people from all strands of society from illness and disease.
The Likeness of the King: A Prehistory of Portraiture in Late Medieval France by Stephen Perkinson. Through an examination of well-known images of kings, as well as objects such as royal seals, Perkinson demonstrates that these images do not constitute a revolutionary break with the past, but continued representational traditions.
More Books About French Coronations
Clash of Crowns by Mary McAuliffe. About hostility between French and English kings, from its roots in the time of the Vikings to the cutthroat rivalry between Philip II and Richard Lionheart during the Third Crusade.
That Sweet Enemy: The French and the British From the Sun King to the Present by Robert and Isabelle Tombs. About the relationship between Britain and France. Their rivalry set the pattern of European imperialism, and their interaction did much to create the identity and culture of both.
More Books About English Royalty
Capetian France 987-1328 by Elizabeth Hallam and Judith Everard. The history of France from Hugh Capet to Charles IV.
Capetians: Kings of France, 987-1314 by Jim Bradbury. Throws light on medieval France and the development of European monarchy.
Louis: The French Prince Who Invaded England by Catherine Hanley. A biography of King Louis VIII of France. While he was still a prince, a group of English barons tried to put him on England's throne in a conflict now called the First Barons' War.
Feudal Monarchy in France and England by Charles Petit-Dutaillis.
The Man Who Believed He Was King of France: A True Medieval Tale by Tommaso di Carpegna Falconieri, translated by William McCuaig. In 1354, the dictator of Rome told Giannino di Guccio, son of a merchant, that he was in fact the lost heir to Louis X. Convinced, Giannino claimed the name King Jean I and set out to prove his identity.
Capetian Royal Women
Capetian Women edited by Kathleen D. Nolan. Essays about the women of the Capetian royal dynasty in France, uncovering their influence in social, religious, cultural, and political spheres.
Queens in Stone and Silver by Kathleen Nolan. The creation of a visual imagery of queenship in Capetian France.
Ermengard of Narbonne and the World of the Troubadours by Fredric L. Cheyette. In the 12th century France's territories included Occitania, the present-day province of Languedoc. The city of Narbonne was a center of Occitanian culture. For most of the second half of the 12th century, it was ruled by a remarkable viscountess, Ermengard. This is a biography of an extraordinary warrior woman and a unique, doomed society.
Pleasure and Politics at the Court of France: The Artistic Patronage of Queen Marie de Brabant (1260-1321) by T. Hamilton. Examines Marie's commissions from her arrival in Paris in 1274 until her death in 1321, and analyzes the impact of her patronage on other royals.
The Rebel Princess: A Novel of Suspense by Judith Koll Healey. Paris, 1207. Princess Alaïs, sister of King Philippe II of France, wants to settle down with her lover, William of Caen, but intrigue is afoot in the palace.
Books About the Franks
Books About Charlemagne
Books About Eleanor of Aquitaine
Saint Louis by Jacques Le Goff, translated by Gareth Evan Gollrad. Biography of King Louis IX of France (1214-1270) the central figure of Christendom in the 13th century.
The Sanctity of Louis IX translated by Larry F. Field. Louis IX of France reigned from 1226 to 1270. After his death on crusade, he was proclaimed a saint in 1297. This book offers the first English-language translations of two accounts of the king's life: one composed by Geoffrey of Beaulieu, the king's long-time confessor, and the other by William of Chartres, a clerk in Louis's household.
Isabelle of France: Capetian Sanctity and Franciscan Identity in the Thirteenth Century by Sean L. Field. Daughter of French queen Blanche of Castile and sister of King Louis IX, Isabelle of France (1225-1270) founded the Franciscan abbey of Longchamp and helped create an aura of sanctity around the French royal family.
The Life of Isabelle of France by Agnes of Harcourt, edited by Sean L. Field. The author, Agnes of Harcourt, was abbess of Longchamp, an abbey founded by Isabelle.
Blessed Louis, the Most Glorious of Kings: Texts Relating to the Cult of Saint Louis of France by M. Cecilia Gaposchkin. King Louis IX of France, canonized in 1297, was one of the most important saints and kings of the later Middle Ages. This book presents six previously untranslated texts that informed medieval views of the king as a saint.
The Sister Queens by Sophie Perinot. Novel about 13th century sisters Margaret of Provence, wife of King Louis IX of France, and Eleanor of Provence, wife of King Henry III of England.
Four Sisters, All Queens by Sherry Jones. Amid the lush valleys of Provence, Marguerite, Eléonore, Sanchia, and Beatrice are raised by an ambitious mother. Marguerite marries King Louis IX of France. Soon Eléonore is betrothed to Henry III of England. Shy, devout Sanchia and tempestuous Beatrice will also become queens. Enemies are everywhere, and sister is pitted against sister for the prize of Provence itself.
The Valois Dynasty
The House of Valois
The Bourbons: The History of a Dynasty by J. H. Shennan. Henry IV, king of Gascony, became king of France after the murder of the last Valois in 1589. The French Revolution of 1789 brought about the fall of the Bourbon monarchy, but they returned to power for 15 years after 1815.
The Impossible Bourbons: Europe's Most Ambitious Dynasty by Oliver Thomson. Traces the rise of the family that won the the crowns first of France, then Spain and finally Naples and Sicily, including the Spanish Bourbons right up to the present day King Juan Carlos.
Martyrs & Murderers: The Guise Family and the Making of Europe by Stuart Carroll. Tells the story of three generations of one of the richest and most powerful families in 16th-century France. They overthrew the king, ruled Scotland for nearly 20 years through Mary Queen of Scots, plotted to overthrow Elizabeth I, and ended as martyrs for the Catholic cause.
Godfather of the Revolution: The Life of Philippe Egalité, Duc d'Orleans by Tom Ambrose. Biography of the royal family member who funded the French Revolution and had a long-running feud with Marie Antoinette. His son Louis-Philippe became the last king of France.
Perilous Performances: Gender and Regency in Early Modern France by Katherine Crawford. About three women who reigned for child kings: Catherine de Medicis, Marie de Medicis, and Anne of Austria.
Vienna and Versailles: The Courts of Europe's Dynastic Rivals, 1550-1780 by Jeroen Duindam. Recreates the lives of courtiers and servants of the imperial court in Vienna and the royal court in Paris-Versailles from the 16th to the 18th century.
Rulership in France, 15th-17th Centuries by Ralph E. Giesey. Essays about how the image of the king was enhanced in royal ceremonies and political writings, and how the stability of the monarchy was maintained by a new form of hereditary nobility.
The Society of Princes: The Lorraine-Guise and the Conservation of Power and Wealth in Seventeenth-Century France by Jonathan Spangler. An examination of relations between the crown and French nobility in the era of absolutism.
The Jesuits and the Monarchy: Catholic Reform and Political Authority in France, 1590-1615 by Eric Nelson. Looks at how the Jesuits became an influential feature of the French church, and their relationship with the monarchy.
The Royal Financial Administration and the Prosecution of Crime in France, 1670-1789 by Albert N. Hamscher. The French monarchy's role in financing criminal prosecutions from the early period of Louis XIV's personal rule to the outbreak of the French Revolution.
France and the Age of Revolution: Regimes Old and New from Louis XIV to Napoleon Bonaparte by William Doyle. The history of France between 1789 and 1815.
Women and Queens
Ruling Women, Volume 1: Government, Virtue, and the Female Prince in Seventeenth-Century France by Derval Conroy. An analysis of the debate over government by women in 17th century France.
Ruling Women, Volume 2: Configuring the Female Prince in Seventeenth-Century French Drama by Derval Conroy. Analyzes how queenship is portrayed in over 30 plays published between 1637 and 1691.
Kings, Queens, and Courtiers: Art in Early Renaissance France edited by Martha Wolff. This catalogue provides an overview of French art circa 1500, bringing to life court artists whose creations were used by kings and queens to assert power and prestige.
Royal Treasures From the Louvre: Louis XIV to Marie-Antoinette by Marc Bascou, Michèle Bimbenet-Privat, and Martin Chapman. About French royal patronage and collecting, with full-color illustrations of more than 100 objects alongside essays describing their history and background.
Dairy Queens: The Politics of Pastoral Architecture From Catherine de' Medici to Marie-Antoinette by Meredith Martin. The pleasure dairies of early modern France -- most famously the white marble dairy built for Marie-Antoinette at Versailles -- allowed queens and noblewomen to display their cultivated tastes and proclaim their virtue as mothers and estate managers. Illustrated with images and photographs.
Royal Censorship of Books in Eighteenth-Century France by Raymond Birn. How censors served as cultural intermediaries who expanded public awareness of progressive thought.
Henri IV of France: His Reign and Age by Vincent J. Pitts. An unwelcome heir to the throne, Henri ruled a kingdom plagued by instability. Before his assassination in 1610 he pacified his warring country and reclaimed France's power in Europe.
Blood and Religion: The Conscience of Henri IV, 1553-1593 by Ronald S. Love. Examines the king's strong religious beliefs and the profound effect they had on him.
Henry IV and the Towns: The Pursuit of Legitimacy in French Urban Society, 1589-1610 by S. Annette Finley-Croswhite. By reopening the lines of communication between the crown and the towns, Henry IV strengthened the French monarchy.
The First Bourbon: Henry IV, King of France and Navarre by Desmond Seward. Biography.
Queen Jeanne and the Promised Land by David Bryson. Jeanne d'Albret, queen of Navarre, was the mother of King Henry IV.
The Reluctant Queen by Freda Lightfoot. Fiction. In 16th century France, Gabrielle d'Esrées catches the heart of King Henry IV. He promises to marry her, but Gabrielle's difficulties have just begun...
The Queen and the Courtesan by Freda Lightfoot. Henriette d'Entragues isn't satisfied with simply being the mistress of Henry IV of France; she wants a crown too.
Young Henry of Navarre by Heinrich Mann. Classic German literary novel about French king Henry IV.
Henry, King of France by Heinrich Mann. This sequel to Young Henry of Navarre continues the life story of French king Henry IV.
The Figure of Louis XIII in Modern French Literature: From The Three Musketeers to the Fortune De France by Michael G. Paulson and Tamara Alvarez-Detrell. A history of divergent literary portrayals of the French king.
Louis XIV and His Family
Books About Louis XIV
Books About the Man in the Iron Mask
Books About King Louis XV
Books About Louis XVI & Marie Antoinette
Books About the French Revolution
Books About Napoleon I
Books About Empress Josephine
More Books About the Bonapartes
Paris Between Empires: Monarchy and Revolution 1814-1852 by Philip Mansel. Tells the story of the golden age between the defeat of Napoleon I to the proclamation of his nephew as Emperor Napoleon III. During this time, three kings reigned: Louis XVIII, Charles X, and Louis-Philippe.
The Constitutional Monarchy in France, 1814-1848: Revolution and Stability by Pamela Pilbeam. This is the first compact recent history of the period in English. It contains extracts from diaries, memoirs, novels, and cartoons.
France and 1848: The End of Monarchy by William Fortescue. Examines the revolution of 1848, offering new interpretations of events leading up to Louis Philippe's overthrow.
The Rebellious Duchess: The Adventures of the Duchess of Berri and Her Attempt to Overthrow French Monarchy by Paul F. S. Dermoncourt. Princess Marie Caroline of Naples and Sicily married the Duke of Berry, nephew of King Louis XVIII, shortly after the second restoration of the Bourbon monarchy. She fled the country in 1830 during the July Revolution, but returned to France to lead an uprising which soon turned sour.
Making Sense of Constitutional Monarchism in Post-Napoleonic France and Germany by Markus J. Prutsch. Highlights the daring attempt to improve traditional forms of monarchical legitimacy by means of a modern representative constitution.
Rewriting the French Revolutionary Tradition: Liberal Opposition and the Fall of the Bourbon Monarchy by R. S. Alexander. Analyzes relations among the Liberal Opposition, ultra-royalists, and the state during the Bourbon Restoration and early July Monarchy.
Playing at Monarchy: Sport as Metaphor in Nineteenth-Century France by Corry Cropper. How sports and games (tennis, fencing, bullfighting, chess, trictrac, hunting, and the Olympics) were metaphorically used to praise and mock class and political power structures.
In the Court of the Pear King: French Culture and the Rise of Realism by Sandy Petrey. In 1831, a caricature of French king Louis-Philippe as a pear became a national obsession. Meanwhile, French fiction concentrated on society's power to declare an individual a nonperson or to make plenitude out of emptiness.
Books About Napoleon III
Palaces and Castles
Books About French Royal Palaces
Robert the Burgundian and the Counts of Anjou, Ca. 1025-1098 by W. Scott Jessee.
Philip the Bold: The Formation of the Burgundian State by Richard Vaughan. A biography of Philip, and a study of the emergence of the Burgundian state under his aegis, 1384-1404. New edition.
John the Fearless: The Growth of Burgundian Power by Richard Vaughan. New light on the aims and personality of the second duke (including his "infernal pact" and assassination), who ruled from 1404-1419.
Philip the Good: The Apogee of Burgundy by Richard Vaughan. Philip (ruled 1419-1467) inherited a flourishing and virtually independent state and a policy of territorial expansion which made him one of the most powerful and influential rules of the 15th century.
Charles the Bold: The Last Valois Duke of Burgundy by Richard Vaughan. An assessment of Charles's personality and his role as ruler (1467-1477), discussing his relationship with his subjects and his neighbors.
Charles the Bold and Italy, 1467-1477: Politics and Personnel by R. J. Walsh. Examines the duke's military, diplomatic, and economic relations with the subcontinent.
George Chastelain and the Shaping of Valois Burgundy: Political and Historical Culture at Court in the Fifteenth Century by Graeme Small. George Chastelain (c. 1414-1475) was official chronicler to the dukes Philip the Good and Charles the Bold. This book offers account of his life and career, followed by a study of the chronicle.
Splendour of the Burgundian Court: Charles the Bold (1433-1477) edited by Susan Marti, Till-Holger Borchert, and Gabriele Keck. Essays and full-color illustrations of objects from an exhibition on Charles the Bold. (Exhibition catalog)
Golden Age of Burgundy: The Magnificent Dukes and Their Courts by Joseph L. Calmette. Four dukes -- Philip the Bold, John the Fearless, Philip the Good, and Charles the Rash -- ruled Burgundy in its golden age and dared challenge the power of France.
Books About Margaret of York, Duchess of Burgundy
Lonely Planet Corsica by Jean-Bernard Carillet and Miles Roddis. This travel guide includes a chapter on the history of Corsica.
Theodore von Neuhoff, King of Corsica: The Man Behind the Legend by Julie Gasper. Biography of the German baron who in 1736 had himself proclaimed and crowned King of Corsica.
The King of Corsica by Michael Kleeberg, translated by David Dollenmayer. Novel based on the true story of Theodor von Neuhoff, an impoverished 18th century aristocrat who became a double agent and in 1736 had himself proclaimed king by the Corsicans.
Mémoires D'exil et de Combats (Memories of Exile and War) by Henri, Comte de Paris. Published in 1979, this book was written by French prince Henri d'Orleans, Count of Paris (1908-1999).
These DVDs are formatted for North American audiences.
Queen Margot starring Isabelle Adjani. A 1995 movie based on the Alexandre Dumas novel about the wife of Henry IV of France, who went to war against her husband and her brother, Henry III.
DVDs About Queen Margot
DVDs About the Man in the Iron Mask
DVDs About Marie Antoinette
DVDs About Napoleon
DVDs About Charlemagne
World Royalty Movies & Documentaries | <urn:uuid:323817f2-bd6c-4d2b-9b3c-cde0b6dcf07c> | CC-MAIN-2016-30 | http://www.royalty.nu/Europe/France/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257831771.10/warc/CC-MAIN-20160723071031-00259-ip-10-185-27-174.ec2.internal.warc.gz | en | 0.912287 | 4,249 | 3.34375 | 3 |
About the Book
Book: The Two-Cent Piece
Author: Dennis Conrad (Illustrated by Courtney Smith)
Genre: Children’s Picture Book (Fiction)
Release date: September 3, 2022
Anne wonders what secret her three older brothers are hiding. When she finds out they joined to fight with the Union Army and would leave the next day, she gives them each one of her favorite two-cent pieces and says, “I want you to take one of my new two-cent pieces. I learned these coins are the first to have the words ‘In God We Trust.’ I just memorized Psalm 91:2. ‘I will say of the Lord, He is my refuge and my fortress: my God; in him will I trust.’”
Out of a heart of love, Anne gives six of her special coins away hoping the message on the two-cent pieces will strengthen each person’s faith.
Click here to get your copy!
About the Author
He is a member of the Society of Children’s Book Writers and Illustrators and a Fellow of the National Writing Project.
He retired as a professor of Speech Communications from Barstow Community College. He and his wife served as English and public speaking teachers ten summers overseas.
The Two-Cent Piece is Dennis’s first of seven books in the In God We Trust Series from Elk Lake Publishing, Inc.
More from Dennis
HOMESCHOOLERS, TEACHERS, AND FAMILY MEMBERS –
Coin collecting brings together history, art, and the thrill of discovery.
Children who collect coins will LOOK at coins differently. They can…
Look for people. For example, who is on the nickel? (Hint: Thomas Jefferson)
The new quarters featuring women include coins with Anna May Wong, the first Chinese-American movie star; Nina Otero-Warren, who advocated for women’s suffrage and was a government official in New Mexico; and Wilma Mankiller, the Principal Chief of the Cherokee Nation.
Look for places. The state quarter series includes all of the states like California with Yosemite Valley.
Look for dates. Connect coins to historical events. For example, coins minted in 2001 were minted the same year as the World Trade Center was attacked on September 11, 2001.
Look at coins as art. The people who design coins are artists.
Look for and find coins in change. Let the great adventure begin.
Look and learn why some coins are more valuable than other coins. There is a difference between the face value of a coin (a dime is worth ten cents), and its value to collectors.
Are you a homeschooler, a teacher, or a family member who wants to help children start their first coin collection?
Get Free Resources about coin collecting by conveniently subscribing to Dennis Conrad’s newsletter.
You will receive a link to my resource page, where you will find two free resources. One for ages 5-6 year olds, and another for ages 7 and up. Or you can choose both. Let the fun begin! https://dennisconradauthor.com/coincollecting5/
Lots of Helpers, January 18
Girls in White Dresses, January 18
Library Lady’s kid Lit, January 19
Debbie’s Dusty Deliberations, January 20
For Him and My Family, January 20
Cover Lover Book Review, January 21
A Reader’s Brain, January 22
Mary Hake, January 22
Abba’s Prayer Warrior Princess, January 23
Texas Book-aholic, January 24
deb’s Book Review, January 26
Pause for Tales, January 26
Locks, Hooks and Books, January 27
Ashley’s Clean Book Reviews, January 28
Labor Not in Vain, January 28
Happily Managing a Household of Boys, January 29
Truth and Grace Homeschool Academy, January 30
Lights in a Dark World, January 30
Little Homeschool on the Prairie, January 31
To celebrate his tour, Dennis is giving away the grand prize package of a $50 Amazon Gift Card and a hardcover copy of The Two-Cent Piece!!
Be sure to comment on the blog stops for nine extra entries into the giveaway! Click the link below to enter.
Dennis Conrad has written a great children’s book in his new release, The Two Cent Piece. Even though, this is for younger readers, I greatly enjoyed reading. I have been fascinated by old coins since I was a child and thought it was fun to read a story about the two cent piece. I thought Anne’s story was sweet and inspiring to read.
The Two Cent Piece is beautifully illustrated by the talented artist Courtney Smith. I loved seeing the pictures on each page and getting the visual as to what is going on with the text. A wonderful addition to the book.
The Two Cent Piece will be getting a very well deserved five plus stars. I recommend it for readers who enjoy reading historical fiction and are between the ages of five and eleven years old.
I received a soft cover copy of The Two Cent Piece from the publisher, but was not required to write a positive review. This review is one hundred percent my own honest opinion. | <urn:uuid:ff0a3347-886c-4540-8557-99274211b895> | CC-MAIN-2023-40 | https://amybooksy.blogspot.com/2023/01/blog-tour-and-giveaway-two-cent-piece.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00061.warc.gz | en | 0.959804 | 1,123 | 2.546875 | 3 |
James is a Nasmith
|Dr. James Naismith|
Naismith circa 1900
|Born||November 6, 1861
Almonte, Province of Ontario, Province of Canada
|Died||November 28, 1939
|Coaching career (HC unless noted)|
|1898–1907||University of Kansas|
|Head coaching record|
|Accomplishments and honors|
Naismith Memorial Basketball Hall of Fame
FIBA Hall of Fame
Canadian Basketball Hall of Fame
Canadian Olympic Hall of Fame
Canadian Sports Hall of Fame
Ontario Sports Legends Hall of Fame
Ottawa Sports Hall of Fame
McGill University Sports Hall of Fame
Kansas State Sports Hall of Fame
Inventor of basketball
James Naismith (November 6, 1861 – November 28, 1939) was a Canadian and naturalized American sports coach and innovator. Naismith invented the sport of basketball in 1891. He is also said to have introduced the first football helmet. Naismith wrote the original basketball rulebook and started the University of Kansas basketball program. He lived to see basketball become an Olympic demonstration sport in 1904 and an official event at the 1936 Summer Olympics in Berlin.
Naismith has been made a member of the Canadian Basketball Hall of Fame, the Canadian Olympic Hall of Fame, the Canadian Sports Hall of Fame, the Ontario Sports Legends Hall of Fame, the Ottawa Sports Hall of Fame, the McGill University Sports Hall of Fame, the Kansas State Sports Hall of Fame and the FIBA Hall of Fame. The Naismith Memorial Basketball Hall of Fame was named after him.
==Early years==Ever since He left tHE bro COUNTRY Dr. Naismith was born in 1861 in Ramsay Township (now Almonte, Ontario). His parents were both from Scotland. They met and married in Lanark County, Canada. Naismith was not good at school, but enjoyed farm work. He usually spent his days outside playing catch, hide and seek, or duck on a rock. This is old game in which a person guards a large stone from other players, who try to knock it down by throwing smaller stones at it. Naismith soon found that a soft lobbing throw was often much better than a straight hard throw in this game. This thought was later very important when he invented basketball. When he was nine, his parents died from typhoid fever. Naismith lived with his grandmother and his uncle for many years. He went to grade school at Bennies Corners near Almonte, then Almonte High School, and graduated in 1883.
McGill University[change | change source]
In the same year, Naismith entered McGill University in Montreal. He was described as quite thin, 5 foot 10 ½ inches tall and weighing 168 pounds. He was a talented and quick-moving athlete who played for McGill in Canadian football, soccer and gymnastics. He also played center on the football team, where he wore the first football helmet. Naismith won many Wicksteed medals for outstanding gymnastics performances. Naismith earned a BA in Physical Education (1888) and a Diploma at the Presbyterian College in Montreal (1890). From 1891 on, Naismith taught physical education and became the first McGill director of athletics. He left Montreal to become a physical education teacher at the YMCA International Training School in Springfield, Massachusetts. Naismith is also a member of the Sigma Phi Epsilon Fraternity.
Springfield College: Invention of "Basket Ball"[change | change source]
At Springfield YMCA, Naismith found teaching difficult. His class was restless and irritable because they had to stay inside in the winter. Dr. Luther Gulick, leader of the Springfield YMCA Physical Education, told Naismith to make up a game that could be played inside which would be a good "athletic distraction" in 14 days. Gulick said that it should not need too much room, help the athletes keep healthy, and was "fair for all players and not too rough."
Naismith was guided by three main thoughts. Firstly, he studied the most popular games of those times (rugby, lacrosse, soccer, football, hockey and baseball). He saw the danger of a small fast ball and decided that the big soft soccer ball was safest. Secondly, he saw that most physical contact happened while running with the ball, dribbling or hitting it. He decided that passing was the only legal option. Finally, Naismith further reduced body contact by making the goal unguardable, by putting it high above the player's heads. To score goals, he made players throw a soft lobbing shot that he had used in his old favorite game duck on a rock. Naismith called this new game "Basket Ball" and put wrote down the 13 basic rules.
The first game of "Basket Ball" was played in December 1891. The teams had nine players, and used a soccer ball. The goals were a pair of peach baskets:
"When Mr. Stubbins brot [sic] up the peach baskets to the gym I secured them on the inside of the railing of the gallery. This was about 10 feet from the floor, one at each end of the gymnasium. I then put the 13 rules on the bulletin board just behind the instructor's platform, secured a soccer ball and awaited the arrival of the class... The class did not show much enthusiasm but followed my lead... I then explained what they had to do to make goals, tossed the ball up between the two center men & tried to keep them somewhat near the rules. Most of the fouls were called for running with the ball, though tackling the man with the ball was not uncommon."
The first rules did not include what is now called dribbling. Since the ball could only be moved up the court with a pass, early players tossed the ball over their heads as they ran up court. Also, following each "goal" a jump ball was taken in the middle of the court. Both practices are no longer used in the rules of modern basketball.
By 1892, basketball had grown so popular on campus that Dennis Horkenbach (editor-in-chief of The Triangle, the Springfield college newspaper) featured it in an article called "A New Game",. There were calls to name the new game "Naismith Ball", but Naismith refused. By 1893, basketball was introduced in other countries by the YMCA movement. From Springfield, Naismith went to Denver where he studied for a medical degree and in 1898 he joined the University of Kansas faculty at Lawrence, Kansas.
University of Kansas[change | change source]
The University of Kansas started a men's basketball program in 1898, following Naismith's arrival. This was only six years after Naismith had invented the game. Naismith was employed as chapel director and physical education instructor. In these early days, most basketball games were played against nearby YMCA teams. The YMCA's across the nation played a very important part in the birth of basketball. Other common opponents were Haskell Indian Nations University and William Jewell College. With Naismith as coach, the team played only three current Big 12 schools: Nebraska (six times), Missouri (twice), and Kansas State (once). Naismith was, ironically, the only coach in the program's history to have a losing record (55–60). However, Naismith coached Forrest "Phog" Allen, who took over as coach at Kansas. Allen was also added to the Basketball Hall of Fame. When Allen became a coach himself and told him that he was going to coach basketball at Baker University in 1904, Naismith said to him: "You can't coach basketball; you just play it." Allen began a coaching career that would lead him to be known as "the Father of Basketball Coaching." During his time at Kansas, Allen coached Dean Smith (1952 National Championship team) and Adolph Rupp (1922 Helms Foundation National Championship team). When Dean Smith retired as head Basketball coach at North Carolina he had the most wins in college basketball history, second was Adolph Rupp (Kentucky) and third was Allen. The three coaches have joined Naismith as members of the Basketball Hall of Fame.
By the turn of the century, there were enough college teams in the east of the U.S. that the first games between different colleges could be played. Although his sport continuously grew, Naismith long regarded his game as a curiosity and preferred gymnastics and wrestling as better forms of physical education. However, basketball became a demonstration sport at the 1904 Games in St. Louis, USA. As the Basketball Hall of Fame reports, Naismith was not interested in self-promotion nor in the glory of competitive sports. Instead, he was more interested in his physical education career, receiving an honorary PE Masters degree in 1910, patrolled the Mexican border for four months in 1916 during World War I, travelled to France, published two books ("A Modern College" in 1911 and "Essence of a Healthy Life" in 1918) and became an American citizen in 1925.
In 1935, the National Association of Basketball Coaches (created by Naismith's pupil Phog Allen) collected money so that the 74-year old Naismith could witness the introduction of basketball into the official Olympic sports program of the 1936 Summer Olympic Games. There, Naismith handed out the medals to three North American teams; United States, for the Gold Medal, Canada, for the Silver Medal, and Mexico, for their Bronze medal win. During the Olympics, he was named the Honorary President of the International Basketball Federation. When Naismith returned he commented that seeing the game played by many nations was the greatest compensation he could have received for his invention. In 1937, Naismith played a role in the formation of the National Association of Intercollegiate Basketball, which later became the National Association of Intercollegiate Athletics (NAIA).
In his later years, Naismith became Professor Emeritus in Kansas and retired in 1937 at the age of 76. Including his years as coach, Naismith served as athletic director and faculty at the school for a total of almost 40 years. Naismith died in 1939 after he suffered a fatal brain hemorrhage and was buried in Lawrence, Kansas. Posthumously, his masterwork "Basketball — its Origins and Development" was published in 1941. In Lawrence, Kansas, James Naismith has a road named in his honor, Naismith Drive, which runs in front of Allen Fieldhouse (the official address of Allen Fieldhouse is 1700 Naismith Drive), Kansas University's basketball arena. It is a separated, four-lane road that runs north and south from University Drive south to its end at 24th street, just south of the KU campus. The university also named the court in Allen Fieldhouse, James Naismith Court in his honor. Naismith Hall, a college residential dormitory, is located on the northeastern edge of 19th Street and Naismith Drive.
Coaching record[change | change source]
In 1898, Naismith became the first college basketball coach of the University of Kansas basketball team. His record of 55 wins and 60 losses, means he became the only Kansas coach to have a losing record. Nevertheless, Naismith has one of the greatest coaching legacies in basketball history, as he coached Basketball Hall of Fame coach Phog Allen, who himself coached Hall of Fame coaches Dean Smith, Adolph Rupp, and Ralph Miller at the University of Kansas.
Legacy[change | change source]
The Naismith Memorial Hall of Fame in Springfield, Massachusetts, is named in Naismith's honor. He was the first member in 1959. The National Collegiate Athletic Association rewards its best players and coaches annually with the Naismith Awards, among them the Naismith College Player of the Year, the Naismith College Coach of the Year and the Naismith Prep Player of the Year. Women's basketball became an Olympic event in Montreal during the 1976 Summer Olympics. Naismith was also inducted into the Canadian Basketball Hall of Fame, the Canadian Olympic Hall of Fame, the Canadian Sports Hall of Fame, the Ontario Sports Legends Hall of Fame, the Ottawa Sports Hall of Fame, the McGill University Sports Hall of Fame, the Kansas State Sports Hall of Fame and the FIBA Hall of Fame.
Basketball is today played by more than 300 million people worldwide, making it one of the most popular team sports. In North America, basketball has produced some of the most-admired athletes of the 20th century. Polls conducted by ESPN and the Associated Press named basketball player Michael Jordan respectively first and second greatest North American athlete of the 20th century, and both polls featured fellow basketballers Wilt Chamberlain (of KU, like Naismith) and Bill Russell in the Top 20.
Personal life[change | change source]
On June 20, 1894, Naismith married Maude E. Sherman from Springfield. The couple had five children: Margaret Mason (1895), Helen Carolyn (1897), John Edwin (1900), Maude Ann (1904) and James Sherman (1913). He was a member of the Pi Gamma Mu and Sigma Phi Epsilon fraternities, and regarding his spiritual beliefs, Naismith is remembered as a Freemason. Maude Naismith died in 1937, and on June 11, 1939, he married his second wife Florence Kincaid. Naismith suffered a major brain hemorrhage on November 19 the same year and died nine days later in his home located in Lawrence, Kansas. Naismith was 78 years old. Naismith is buried in Memorial Park Cemetery in Lawrence, KS.
During his lifetime, Naismith's education and academic positions held were as follows:
|Bennie's Corner Grade School (Ontario)||Primary school||1867–1875|
|Almonte High School||Secondary school||1875–1877, 1881–83||Dropped out and reentered|
|McGill University||University student||1883–87|
|McGill University||Instructor in Physical Education||1887–1890||Gold Wickstead Medal (1887), Best All-Around Athlete; Silver Cup (1886), first prize for one-mile walk; Silver Wickstead Medal (1885), Best All-Around Athlete; Awarded one of McGill's first varsity letters|
|McGill: Thool Seminary||Education in Theology||1887–1890||Silver medal (1890), second highest award for regular and special honor work in Theology|
|Springfield College||Instructor in Physical Education||1890–1895||Invented "Basket Ball" in December 1891|
|YMCA of Denver||Instructor in Physical Education||1895–1898|
|University of Kansas||Instructor in Physical Education and Chapel Director||1898–1909|
|University of Kansas||Basketball Coach||1898–1907||First-ever campus basketball coach|
|University of Kansas||Professor and University Physician||1909–1917||Hiatus from 1914 on due to World War I|
|First Kansas Infantry||Chaplain/Captain||1914–1917||Military service due to World War I|
|First Kansas Infantry (Mexican Border)||Chaplain||1916|
|Military & YMCA secretary in France||Lecturer of Moral Conditions and Sex Education||1917–1919||wELL RESPECTED BY PEERS|
|University of Kansas||Athletic Director||1919–1937||Emeritus in 1937|
References[change | change source]
- Schlabach, Mark (2005-01-15). "James Naismith Biography". bookrags.com. http://www.washingtonpost.com/wp-dyn/articles/A10765-2005Jan14.html. Retrieved 2008-09-30.
- Laughead, George. "Dr. James Naismith, Inventor of Basketball". Kansas Heritage Group. http://www.kansasheritage.org/people/naismith.html. Retrieved 2008-09-30.
- "Dr. James Naismith". Naismith Museum And Hall of Fame. http://www.naismithmuseum.com/naismith_drjamesnaismith/main_drjamesnaismith.htm. Retrieved 2008-09-30.
- Dodd, Hellen Naismith (January 6, 1959). "James Naismith's Resume". Naismith Memorial Basketball Hall of Fame. Archived from the original on November 19, 2007. http://web.archive.org/web/20071119053704/http://www.hoophall.com/history/naismith-resume.html. Retrieved 2008-09-30.
- Zukerman, Earl (December 17, 2003). "McGill grad James Naismith, inventor of basketball". Varsity Sports News. McGill Athletics. http://athletics.mcgill.ca/varsity_sports_article.ch2?article_id=110. Retrieved 2008-09-30.
- Naismith, James. "Dr. James Naismith's 13 Original Rules of Basketball". National Collegiate Athletic Association. http://www.ncaa.org/champadmin/basketball/original_rules.html. Retrieved 2008-09-30.[dead link]
- Naismith, James. "James Naismith Handwritten Manuscript Detailing First Basketball Game". Heritage Auction Galleries. http://sports.ha.com/common/view_item.php?Sale_No=706&Lot_No=19007&type=prte-pr11136b&ic=. Retrieved 2008-09-30.
- "Official basketball rules". International Basketball Federation. http://www.fiba.com/pages/eng/fc/FIBA/ruleRegu/p/openNodeIDs/897/selNodeID/897/baskOffiRule.html. Retrieved 2008-09-30.
- Chimelis, Ron. "Naismith Untold". Naismith Memorial Basketball Hall of Fame. Archived from the original on November 2, 2007. http://web.archive.org/web/20071102090506/http://www.hoophall.com/history/naismith-untold-story.html. Retrieved 2008-09-30.
- "Naismith's Record". kusports.com. http://www.kusports.com/basketball/history/naismith/naismith_record.html. Retrieved 2008-09-30.
- "James Naismith, A Kansas Portrait". Kansas Historical Society. http://www.kshs.org/portraits/naismith_james.htm. Retrieved 2008-09-30.
- "Forrest C. "Phog" Allen". Naismith Museum And Hall of Fame. Archived from the original on December 30, 2007. http://web.archive.org/web/20071230130907/http://www.hoophall.com/halloffamers/bhof-phog-allen.html. Retrieved 2008-09-30.
- "Hall of Fame Feature: James Naismith". Naismith Memorial Basketball Hall of Fame. Archived from the original on November 23, 2007. http://web.archive.org/web/20071123173152/http://www.hoophall.com/halloffamers/bhof-james-naismith.html. Retrieved 2008-09-30.
- "James Naismith, the inventor of basketball". collegesportsscholarships.com. http://www.collegesportsscholarships.com/basketball-inventor-james-naismith.htm. Retrieved 2008-09-30.
- Kerkhoff, Blair. "The NAIA basketball tournament? Throw 32 teams in the same building and see which is the last one standing at the end of a weeklong frenzy". http://findarticles.com/p/articles/mi_m1208/is_10_230/ai_n26787758m. Retrieved 2008-09-30.[dead link]
- "Google Maps Route". Google Maps. http://maps.google.com/maps?f=d&saddr=Naismith+Drive+and+24th+St,+Lawrence,+Kansas&daddr=Naismith+Drive+and+W+University+Drive&hl=en&geocode=&mra=ls&sll=38.95045,-95.25601&sspn=0.027701,0.052013&ie=UTF8&ll=38.950799,-95.251207&spn=0.027701,0.052013&t=h&z=14. Retrieved 2008-09-30.
- Jenkins, Sally. History of women's basketball "History of women's basketball". WNBA.com. Women's National Basketball Association. http://www.wnba.com/about_us/jenkins_feature.html History of women's basketball. Retrieved 2008-09-30.
- "Top N. American athletes of the century". ESPN.com. http://espn.go.com/sportscentury/athletes.html. Retrieved 2008-09-30.
- Associated Press (1999-12-21). "Top 100 athletes of the 20th century". USA Today. http://www.usatoday.com/sports/ssat2.htm. Retrieved 2008-09-30.
- "James Naismith". Grand Lodge of British Columbia and Yukon. http://freemasonry.bcy.ca/biography/naismith_j/naismith_j.html. Retrieved 2008-09-30.
- "Naismith Museum & Hall of Fame: Biography of James Naismith". http://www.naismithmuseum.com/naismith_drjamesnaismith/main_drjamesnaismith.htm. Retrieved 2008-12-12.
- "James Naismith". http://www.findagrave.com/cgi-bin/fg.cgi?page=gr&GRid=753. Retrieved 2009-08-30. | <urn:uuid:625c1358-6cb9-4c20-a3d8-1c40c790cd0d> | CC-MAIN-2015-48 | https://simple.wikipedia.org/wiki/James_Naismith | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398454160.51/warc/CC-MAIN-20151124205414-00290-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.946635 | 4,770 | 3.109375 | 3 |
The greatest threat to our planet is the belief that someone else will save it.
~ Robert Swan
Our planet (and its environment) is something we care deeply for. Unfortunately we’ve created a society that is very damaging to our world. However, that doesn’t mean that we cannot change the tides and try to save it. Here are 5 little ways to help our planet which you can hopefully (easily) incorporate into your life.
1. GO VEGETARIAN/VEGAN
Or start eating less meat
Nowadays, it is no secret any more that the meat industry is one of the most polluting industries existing. By going vegetarian, vegan or just eating less meat than usual, you can help in your own little way our planet. Plus, it might even give you a new reason to get creative in the kitchen. Search for some new veggie recipes, try foods that you’ve never eaten before, let your imagination run wild with new possible meals.
2. USE REUSABLE BAGS, COFFEE MUGS & WATER BOTTLES
There is way to many plastic being produced every day and we all contribute to it. A small (maybe obvious) way to help the reduction of plastic is to bring your own reusable bags, coffee mug and water bottle everywhere you go. This way you won’t have to use the plastic bags, cups or bottles that supermarkets or coffee shops provide. Think of all the plastic you’ll save!
3. BUY LOCAL
Products in the supermarkets usually have traveled miles and miles to eventually end up there and this transport comes with a lot of pollution. If you buy local you purchase good produced products and you reduce your carbon footprint. Plus, as a bonus, you also support small local businesses.
4. START CONTRIBUTING TO SLOW FASHION
Fast fashion is becoming a bigger problem every day. Tons of clothes are being wasted, people are getting underpaid and the transportation of the clothes is very damaging to our environment. By buying clothes at second-hand shops or thrift shops, you stop contributing to fast fashion. If you want to know more about slow fashion and how to conduce to it , see our previous post: How to contribute to Slow Fashion
5. GET EDUCATED
A big issue that people often stumble upon is that they are not educated enough on the subject. And without a basic amount of knowledge on the earth and its environment, it can get hard to find ways that work for you to help the planet. So, get educated: read books, watch documentaries, find blogs, search the internet for anything related to the subject. And if you have a feeling that your knowledge has grown big enough, get other people educated. There are always people out there who could use some aid in becoming aware of the problems with our environment. Thus, spread the word, spread the wisdom and who knows maybe one day we get to live in an eco-friendly society again. 🙂
These are our 5 little ways to help our planet, we’ve incorporated these into our lives and try every day to help our earth a little more, hopefully you can find a way to do the same.
Kiki~Jane & Lily~Rose | <urn:uuid:5659e5cd-d764-404e-9899-cfc0e6a0f050> | CC-MAIN-2020-05 | https://thelondonsisterss.com/2019/05/05/5-little-ways-to-help-our-planet/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251700675.78/warc/CC-MAIN-20200127112805-20200127142805-00248.warc.gz | en | 0.95831 | 675 | 2.515625 | 3 |
Snippet: in this post we look at the impact of self driven cars on parking spaces across the world. We also look at how close we are to a self driving world.
What are self driven cars?
A car which can drive itself through the use of road and traffic sensing technologies such as RADAR, LIDAR, and cameras. Lot of regulations bind this category of transportation. The idea is simple, human drivers have a rhythm. Not all of us drive the same way. This alone costs a lot of traffic issues.
The belief with self driven cars is that, if every car drives diligently, similarly and is equipped with technologies to sense obstacles (other vehicles or people on the road), it would lead to a more predictable and smooth movement of vehicles – which ultimately reduces delays, jams, and saves energy (gas and electricity).
Eliminating the human driver means that car makers can accommodate another passenger in the driver’s seat. This means we can accommodate more people in cars, and in fact reduce the number of cars on the road. A win-win situation.
Who all are working on self driven cars?
For the past decade, many companies and universities are working on the self driving concept. Though there are very few states or counties which allow self driven cars to ply the roads legally, mostly they are restricted to campus or track driving today.
The closest we can get to a self driven car is the auto pilot mode on Tesla cars. Truth be told, this lane following and radar guided vehicle (the one in front) following technology is not pioneered by Tesla. This was available a long time ago in luxury cars such as Mercedes, Volvo, Jaguar et al.
Google (Waymo) and supposedly Apple are both working on self driven cars for a long time. Why would a search engine an a phone maker get into making cars, you wonder? Let me paint the picture for you. Once cars become driverless, you and I will get into our cars and just sit there, until we are dropped off. What are we supposed to do sitting idly?
This is what companies like Apple and Google are good at. Engaging people with hardware and content. Apple would want you to watch movies on Apple TV or listen to podcasts or music on iTunes. Whereas Google would love you to search the web, read, watch YouTube videos.
You are a captive audience in their car, they want to sell more products and services, that’s Apple’s and Google’s endgame. Or we could just turn our laptops on, and start working – right in the car.
How close are we to get self driven cars on roads?
Now that car makers and tech companies are getting there, they would have to convince the law makers that self driven cars are safe. A lot of money is being spent to spruce up the tech platform and making it hack-proof. Some industry analysts say that self driving will become ubiquitous in the next decade.
Advantages of owning self driven cars
Here are some advantages of owning a self driven car:
- No more driving in the city
- No more yelling at people who cut across
- You get more time to be productive – start work early, come home early
- No hassle of finding parking spots. The car finds one by itself
- Send the car back home. Make better use of your car
- Accommodate an extra passenger. Or more luggage space
- Rest or sleep during long distance travel
Here are some advantages for city managers and planners:
- Well mannered driving all round
- Fewer accidents
- Easy to plan roads and parking spaces
- Fewer cars plying on the road
- Cut down on CO2 emissions
- Less spending on traffic maintenance
Do self driven cars need parking at all?
If the car can be summoned back home, then what’s the need for parking spaces? Possible, but not practical. If cars keep going back and forth between home and office, home and shopping centers etc. the whole point of reducing traffic congestion goes out of the window.
Companies like Uber are investing heavily on driver-less cars. Does this mean that private car ownership will become a thing of the past? Not necessarily. If people don’t have to drive, and can summon a car whenever they want, then privately owned driver-less cars are more appealing than hiring an Uber or Lyft every day. While such apps have transformed the sharing economy and pioneered the concept of Mobility as a Service (MaaS), people would still continue to buy cars. Hence, vehicles would still need parking solutions.
What self driven cars need is smart parking solutions
When cars become smart, they need to be part of the traffic grid as well as a the main parking grid. If this is accomplished, then your car drops you off at work, and it already knows where to park – and maybe find a parking space with charging and charge itself. This is why governments and communities are talking about implementing smart car parking solutions.
Self driving cars will not only change the way people commute, but it will change – and force – governments to change the way cities are designed. Today, cities and counties need to design city roads and parking spaces for the world of the next 10 to 20 years. The time is right to implement smart parking solutions. | <urn:uuid:266fd38b-700f-4e0d-a12c-6c55b39c05db> | CC-MAIN-2021-25 | https://lerablog.org/business/business-services/self-driven-cars-are-about-to-change-the-parking-industry/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487649688.44/warc/CC-MAIN-20210619172612-20210619202612-00298.warc.gz | en | 0.964333 | 1,100 | 3.125 | 3 |
Crater From World’s Third Largest Asteroid Found In Australia
After witnessing some of the damage that a dinner table-sized meteor did last week after crashing into central Russia, imagine the magnitude of destruction that would have occurred if that flaming rock was the length of 18 football fields. Now stop imagining, because scientists say it happened.
Scientists recently discovered the impact zone of a six mile-wide asteroid that is said to have grudge humped Australia some 300 million years ago – leaving behind a crater measuring 120 miles wide, and causing the brutal extermination of nearly all living things.
This finding marks the third largest asterhole ever uncovered on the planet. Scientists say that the seismic shock and blazing fireball likely incinerated a large portion of Earth before emitting greenhouse gasses from the crater that lingered within the atmosphere for tens of thousands of years. However, this devastation happened long before the existence of dinosaurs.
Researchers say that this discovery sheds new light on the link between asteroids crashing into the planet and mass extinction. The question now is: what stands in the way of a ginormous asteroid slamming into our planet sometime in the near future? Unfortunately, absolutely nothing.
Happy Friday! If you need us, we'll be in our panic room. | <urn:uuid:fe3b193c-c02e-43b6-ad29-edf992b2ca39> | CC-MAIN-2018-34 | http://praise933.com/australia-meteor-crater/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211126.22/warc/CC-MAIN-20180816152341-20180816172341-00652.warc.gz | en | 0.934744 | 255 | 3.34375 | 3 |
Before The Lexington Cemetery
In 1848, Lexingtonians did not have a suitable sacred place to bury their dead. At a time when Lexington was experiencing rapid growth, the dead were either buried in family burial grounds, crowded church graveyards, or “First Hill,” the burial ground of the pioneer settlement of Lexington. These traditional graveyards did not have enough capacity to support future burials, and some of the church cemeteries allowed only members to be buried in their grounds. People were concerned that these types of graveyards were a menace to public health, contaminating wells and springs. One of the disadvantages of private cemeteries was that deceased members of families buried in family burial ground were left behind if families eventually decided to sell their land.
At the request of a group of Lexington’s most prominent citizens, Kentucky General Assembly approved an act on February 5, 1848 that incorporated the Lexington Cemetery Company and authorized it to establish a rural, or garden, cemetery. The act required the cemetery to provide perpetual care of its grounds and graves. Almost a year passed before any effective action was taken to implement the charter. On January 23, 1849, four men, M.T. Scott, Benjamin Gratz, Madison C. Johnson, and Richard Higgins, decided to raise by subscription the sum of $12,000 to buy land and get the cemetery started. In only a few days, twenty-four men each pledged $500. On February 12, 1849, the General Assembly amended the charter to name most of these subscribers.
The founders included:
- M. T. Scott, officer and later president of the Northern Kentucky Bank (treasurer)
- Madison C. Johnson, officer and later president of the Northern Kentucky Bank
- Benjamin Gratz, hemp manufacturer, attorney and director of the bank
- Richard Higgins, prosperous merchant and owner of Castleton Farm (secretary)
- Stephen Swift, wholesale and retail grocer
- Joel Higgins, planter
- David A. Sayre, banker and founder in 1854 of Sayre Female Institute
- John Tilford, president of Northern Bank
- A.T. Skillman, bookseller (president)
- Emilius K. Sayre, attorney
- Robert Wickliffe, attorney known as “The Old Duke”
- Thomas Hemingway, partner in the Oldham, Todd & Co. woolen mill at Sandersville
- John B. Tilford, grocer and banker
- John Lutz, civil engineer and acting president of Transylvania University
- D.M. Craig, dry-goods merchant
- A.F. Hawkins, employee at the Northern Bank
- Benjamin Warfield, attorney
- Rev. Robert J. Breckinridge, pastor of the First Presbyterian Church and state superintendent of public instruction
- Dr. Elisha Warfield, merchant and horseman (brother of Benjamin Warfield)
- John Brand, retired hemp manufacturer and director of the Northern Bank
- George W. Sutton, hemp manufacturer
- Henry T. Duncan, attorney and horseman
- Edward Macalester, merchant (son-in-law of John Brand)
The board purchased a forty-acre tract of land owned by Thomas E. Boswell (known as Boswell’s Woods) which was located on Leestown Pike at what was then the edge of the city. They paid $7,000 for the heavily forested land that had been used as hunting grounds. When it was purchased, Boswell’s Woods contained a small family graveyard. These graves are preserved as part of Section A.
Laying out the grounds
Prior to the chartering of the cemetery, a prominent British landscape architect, John C. Louden, published a small book, On the Laying Out, Planting and Managing of Cemeteries. The first general manager of The Lexington Cemetery, Charles S. Bell, was familiar with the information contained in Louden’s book.
Bell came to the United States from Scotland in the summer of 1842, and was hired on April 1, 1849. His dream was to create a park-like, landscaped cemetery. Inspired by his training in Scotland as a horticulturist, Bell brought to Lexington a new “rural” concept that originated in Europe and practiced in Boston, Massachusetts.
By May 1849, Bell and one of the cemetery founders, John Lutz began to lay out the grounds including the roads, sections and lots. It was the responsibility of Bell to complete the landscaping and horticultural work. Bell’s keen interest in horticulture was apparent by his initiative to erect the cemetery greenhouse in 1854.
It is said that Bell was a methodical man and a perfectionist. Consequently, Bell and the trustees maintained their position not to open the cemetery until the grounds were sufficiently prepared.
By mid-July, after Bell and the trustees felt that they had made adequate progress, an advertisement was placed in the Lexington Observer & Reporter on July 13, 1849 informing the community that there were lots for sale in of The Lexington Cemetery.
The First burials
The cemetery corporation sold its first lot on August 18, 1849 to A. B. Colwell, a community businessman who bought the lot for Robert S. Boyd, a merchant tailor and Colwell’s partner. After his death in June from cholera, Boyd had been laid to rest in the Episcopal Cemetery until his reinterment into The Lexington Cemetery was arranged. He was interred in the newly opened Section A with his infant son, whose date of death is unknown. The Lexington Cemetery erected a monument to commemorate the first burial in the garden cemetery, which took place on October 2, 1849.
Eighty-six burials had been conducted by the end of 1850, including reinterment of remains from several other community graveyards. The sections then opened were those presently designated as A, B, C, D, F, H, and K.
Gateway to “The City of the Dead”
On May 9, 1849, A. T. Skillman solicited bids for the erection of the Gateway and Buildings connected. The plan and specifications had already been drawn by John McMurtry. By October, 1850, McMurtry completed his part of the construction of the gateway at a cost of $2,735.23. The next month, H. Moore received $14 for “cutting stone sills for the gateway,” and in December W. H. Newberry, a blacksmith, was paid $254.15 for making the three iron gates.
The structure was more than a mere gateway. The central entrance was flanked by narrow pedestrian gates, and on either side of these were reception and office rooms. Above the east gate was inscribed “Lexington Cemetery, Founded A.D. 1849.” Over the west gate were the words “The City of the Dead.”
The death of Henry Clay
At 74 years of age and in failing health, The Honorable Henry Clay wanted to return to Washington, D.C. to use his influence as “The Great Pacificator,” in an effort to stop the trend toward civil war. While in the capital city, his health deteriorated and he died on June 29, 1852.
Prior to his death, Clay received a letter from John Lutz, who offered him a 44 x 44 foot block in Section I. Lutz received these four lots for his work in laying out the grounds of The Lexington Cemetery. Clay graciously accepted the space in letter from his Ashland home on May 26, 1851. In the letter Clay commented, “…by your generous gift, you have provided a beautiful spot for the repose of my mortal remains.”
Ten days elapsed from the date of Clay’s death and the day he was buried. Many admirers and even former political foes wished to pay tribute to the Great Pacificator. Several services were conducted during those ten days of mourning. The first memorial service occurred in the Senate chamber in Washington. He was then taken by steam boat and train to Baltimore, Philadelphia, Trenton, New York, Albany, Buffalo, Cleveland, Columbus, Cincinnati, Louisville and Frankfort. Finally on July 9, 1852, Clay reached Lexington by train.
Clay’s procession began at his Ashland home where his casket was placed on a bier in front of his residence. A service was conducted there, and then began the slow solemn procession of national, state and local dignitaries, military units and family west on Main Street to the cemetery. Buildings along the route were draped and an estimated 30,000 people from Lexington and afar were assembled for the rites. The cemetery found it necessary to take down part of the fence along Leestown Pike as a result of the mass of people. Upon arrival at The Lexington Cemetery, Clay was placed in a receiving vault until a few days later when he was interred in the lot provided by John Lutz.
Newspapers and pictorial journals throughout the country reported the funeral that attracted national, regional and local dignitaries.
On June 30, 1852, just one day after the death of Henry Clay, a group of his friends met at the Fayette County courthouse to adopt a resolution to build a “NATIONAL MONUMENT OF COLOSSAL PROPORTIONS” in The Lexington Cemetery, to “commemorate the virtuous deeds of his long and glorious life.” A committee was organized to raise money for the creation of the memorial.
By 1857, the committee raised enough money to advertise for designs for the monument. More than 100 plans were submitted. The successful bidder was John Haly of Frankfort who agreed to build the Clay monument, furnish all materials and hoisting apparatus at a cost of $43,920.
The cornerstone was laid on the Fourth of July, 1857 with a public ceremony, followed by programs at the Agricultural & Mechanical Association grounds (now the University of Kentucky campus). The monument was completed in 1861, but because of the onset of the Civil War, Clay’s body was not placed into the monument until April 8, 1864 at which time, the bodies of both Henry Clay and his wife were placed in the vault side-by-side upon her death.
The monument stands on an small hill, the only structure in Section M of the cemetery, with the statue facing eastward toward Clay’s home, Ashland, The Henry Clay Estate.
Nature took its toll on the Henry Clay Monument during the early decades of the twentieth century. In 1903, a terrific storm knocked the head off the statue and sent it hurtling 130 feet to the ground. In 1908, the General Assembly appropriated $10,000 for a new statue. It was carved by Charles S. Mulligan of Chicago. Another storm damaged the new structure in 1910, when lightning struck it, breaking off the right hand, shattering the right leg, and causing some damage to the body. The legislature paid $10,000 for repairs once again.
For the next half of the century thereafter, the monument deteriorated from weather and other corrosive elements. Since the Clay Monument Association no longer existed and The Lexington Cemetery Company had deeded the land to the association, no one had an obligation to care for the monument. Finally in the early 1970s, after numerous outcries from civic leaders, the Fayette Circuit Court vested ownership of the “orphan” monument to the city. Through the government’s initiative, the Henry Clay Monument was completely renovated in 1976.
The Lexington Cemetery rededicated the monument on July 29, 1976, and tribute was paid to those who had worked so long and hard to restore it. Today, visitors from throughout the United States admire the beautiful and magnificent structure that memorializes one of the most notable citizens of Lexington and the United States.
In 1999, Lexington-Fayette County Urban Government transferred ownership of the Henry Clay Monument to The Lexington Cemetery. | <urn:uuid:205b24da-6c14-4c2d-859b-d207bfb6e12f> | CC-MAIN-2022-05 | https://lexcem.org/cemetery-history/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304928.27/warc/CC-MAIN-20220126071320-20220126101320-00553.warc.gz | en | 0.975713 | 2,522 | 3.171875 | 3 |
Revealed: the hidden Nazi death camps
Washington academics say there were 42,500 sites — ghettos, killing centres, forced labour camps — from 1933 to 1945
Follow The JC on Twitter
The scale of Nazi atrocities was at least six times worse than previously thought, new research has revealed this week.
Geoffrey Megargee and British academic Martin Dean, who are based at the United States Holocaust Memorial Museum, are midway through a 25-year project to catalogue the Nazi campaign in the years before and during the Final Solution.
They have now released the second volume of their research, in which they cite evidence of 42,500 Nazi sites in operation between 1933 and 1945, including “killing centres”, ghettos, forced labour camps and other sites of persecution and murder.
“When we started this research back in 2000 we had an estimate of between 5,000 and 7,000 sites, which I thought was astounding,” said Dr Megargee. “But the actual number proved to be far beyond any estimates.”
It is not possible for people to say they did not know what was going on in the Shoah
Their research corresponds to a death toll of six million Jews but Dr Megargee said it suggested that up to 20 million — Jews and non-Jews — went though the system, even if not all were murdered.
The newly-collated evidence has been hailed by campaigners against Holocaust denial. American historian Professor Deborah Lipstadt, who won a libel battle in 2000 with Holocaust denier David Irving, said it was “exceptionally important”.
“Just when we thought we know it all — we don’t”. She hoped that deniers “would be forced to confront this evidence. It makes it impossible for people to say they didn’t know what was going on.”
Germany has accepted the new research as evidence that can be used in court cases.
The details reveal how, across Germany and occupied areas from North Africa to Norway, the Nazis built camps. The researchers document 980 concentration camps and 1,150 Jewish ghettos.
Some are sites that “nobody knew about at all”, but Dr Megargee said the discrepancy was also because historians had tended to focus on “particular camps or particular kinds of camps… nobody had pulled it all together.
“An awful lot of sources only became available when the Iron Curtain fell. Beyond that, there are records on the Nazi camps system scattered throughout a dozen different countries in as many different languages,” he said.
Survivors say they are not surprised. Vienna-born Freddie Knoller, 91, said: “I have spoken to other survivors and they have mentioned a lot of different camps that I didn’t know about and have never heard of before — especially from east Poland.”
Frankfurt-born Henry Wermuth, 89, survived at least eight camps, including periods at Kraków-Płaszów, Auschwitz and Mauthausen. He said that in addition to the well-known camps, “there were many small camps run by the SS and army.”
Alec Ward, born Abram Warszaw in Poland, spent time at two ghettos, three slave labour camps and two concentration camps. The 86-year-old said: “The findings don’t surprise me. A lot was done in secret by the Germans to annihilate as many Jews as possible.”
All survivors are members of Jewish Care's Holocaust Survivors' Centre in Hendon.
Dr David Silberklang, senior historian at Yad Vashem in Jerusalem, said: “This is an important piece of research. What they’ve come up with has been fantastic. They’ve looked at a wide range of sources, used experts and explored different kinds of camps — and they’re still in the process of publishing their findings.
“There’s a lot more out there that we don’t know about. Yad Vashem has found more Jewish communities across Europe than we initially knew about. We’ve also found around 1500 killing sites in the Yad Vashem-led Killing Sites Project — and that’s only looking at the Ukraine and Belarus.”
But the Washington research was dismissed by Dr Efraim Zuroff, director of the Israel office of the Simon Wiesenthal Centre. He said his initial reaction was “one of annoying dismay” and complained about a “PR blitz” and “sensationalism”.
He said: “For decades it has been obvious to historians that the number of Nazi camps, ghettos, and other places of persecution was astronomical and historically unprecedented”. | <urn:uuid:66fb25a2-487b-47d2-bc1e-25d0fe51d39a> | CC-MAIN-2015-11 | http://www.thejc.com/news/world-news/103197/revealed-hidden-nazi-death-camps | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462331.30/warc/CC-MAIN-20150226074102-00309-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.971751 | 1,006 | 2.984375 | 3 |
The modern world has moved online since years, having extended and in some spheres even completely taken the place of the offline reality. We can now see an interesting line of thinking in some contemporaries’ discourse — if you cannot find any information about something on the Web, for most people it will mean this thing does not exist at all.
For many of us, the search and easy finding of a product or a financial service on the Web starts by touching the browser icon on our smartphone, yet few people ever think about the way the request goes, which server logs the information about it remains in, which DNS server would open the way to the required web resource, and all that happening behind the scenes. Even less people think of the risks that may lurk in wait during Internet surfing.
The evolvement of the modern Internet goes hand in hand with the TCP/IP protocol implementation, where IP address* is an obligatory parameter. Let’s have a dip into the history. The good old IP address or IPv4** in the 256.256.256.256 format appeared in 1983, and back then everyone thought that 4.5 billion of unique addresses would be entirely sufficient for all and for any purpose. That’s why in the 80-s many organisations got more addresses than they needed.
Unfortunately, system miscalculations by evaluating the number of hosts on the Web and ineffective assignment of the addresses led to IPv4 address exhaustion. In the table below, we give a list of countries with population number to the share of dedicated IP addresses.
As you can see from the table, only the UK has enough IPv4 addresses per population; the other countries are rated with < 1. Yet all the EU countries have a fair rate of 0.5 to 1. Abnormally low coefficients mark the countries of Southeast Asia, which is though due to the fact that the drastic economic growth, population increase and a dashing digitalisation have begun there but 35 years ago.
Already in the first decade of the 21st century, the IPv4 address exhaustion narrowed down the access to the Internet, which caused stagnation in improvement and digitalisation of services, including financial ones. That made the developers look for solutions. For example, big companies in the countries with the most severe IPv4 address exhaustion have found a practical solution in supporting the IPv6 deployment.
On 6 June 2011, the World IPv6 Launch and a successful IPV6 testing took place. The IPv6 addresses are 128 bits and contain a colon as separator (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334). The leading zeros are usually omitted. A string of zeros can be omitted too and replaced with a double colon (e.g. fe80::1). There can be only one such omission in an address.
The main advantage of IPv6 is that this system creates a sufficient amount of numbers not only to resolve the crisis with the deferred IPv4 addresses, but also to prevent any other possible crisis in the future. That’s why the professional community believes the future belongs to the IPv6 and not the existing NAT and CIDR technologies which are currently used to overcome the shortage of IP addresses.
Should clients, Internet service and content providers completely switch to IPv6, there will be no need in NAT since all devices can have globally routable addresses. This will allow applications intercommunicating directly (there will be no need in solving the problem of NAT bypass for collaboration apps and other systems). IPv6 usage lets partly reduce the network infrastructure.
The IPv6 addresses are now used much more often: only according to our information, in 2019, the traffic share with IPv6 addresses was at least 2–3% in the EU and Russia, on the Philippines it was 15%, in Indonesia – 20%, in Vietnam – up to 40%. About 15% of the global web resources have switched to the IPv6 system.
The problem with the IP-shortage now seems to be solved, but is it indeed so?
Speaking about the advantages of IPv6 addresses, we cannot leave aside the difficulties coming along with the implementation and usage of this standard, first of all, the high costs of IPv6 transition and impossibility of an instant switching to the new format which demands support of tech stacks and infrastructure supporting both formats.
Furthermore, IPv6 and IPv4 networks are not directly intercompatible; there are no URL mapping rules either. Although the problem is partly solved by tunnelling IPv6 packages within the IPv4 packages, it is still a long way from a complete solution.
Another obstacle to a complete IPv6 transition is the lack of auxiliary dictionaries and lists of high-risk IP addresses and geolocation data; there are no sufficient technical protection tools for Internet connection and network infrastructure objects, ranging from simple DDos filters to more complex tools. As a result, it is much more difficult to protect yourself from various threats in IPv6 networks, as it is often impossible to recover or replicate the risk management and protection technologies which became common and are widely used for the IPv4 format.
This problem is particularly compounded by the fact that almost the entire volume of IPv6 addresses has not yet been distributed among Internet providers. While every IPv4-address has its owner, which facilitates administration and risk response, as well as the possibility of investigation in case of any wilful actions, IPv6-addresses are almost in free access, which means they can be used for dishonest purposes and scot-free.
So, what do we have in practical terms? The new tool solving the problem of resource shortage and boosting the digitalisation of all and everything has turned out to be not so simple and neat, as it opens the floodgates to new risk categories and a widest range of both unscrupulous actions and potential fraudulent attacks that are yet to be learnt to detect and counteract.
We in JuicyScore, for our part, invest in the studying of this problem and have already included the minimum essential functionality for working with IPv6-addresses in the current APIv11: a technology stack for determining the real IP address in the IPv6 format and responding to other risks connected with its implementation.
If you wish to know more about it, please do not hesitate to contact us! | <urn:uuid:91174229-b68f-476f-9dfb-a4bb4b81fe99> | CC-MAIN-2021-17 | https://juicyscore.com/blog/en/ipv6_risks-en/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038468066.58/warc/CC-MAIN-20210418043500-20210418073500-00588.warc.gz | en | 0.940331 | 1,294 | 2.9375 | 3 |
Language is our most human characteristic. It is essential to learning, working, and enjoying family life and friendships. There are many ways to express language. Speaking, using sign language, writing and using computerized communication devices are some of the most common ones. Speech-language pathologists (sometimes informally referred to as speech therapists) are educated to assess speech and language development and to treat speech and language disorders. Speech pathologists also help people with feeding and swallowing disorders.
Swallowing ~ Swallowing is a function we all take for granted. Dysphagia is the inability to swallow correctly.
Emergent Literacy ~ Begins at birth and continues through the preschool years.
Speech and Language development ~ There are typical patterns of development for both speech and language from birth.
Speech and Language disorders ~ There are a wide variety of speech and language disorders, some congenital and some acquired. | <urn:uuid:af162293-d50f-4f76-afd0-0c42c4ebe0e8> | CC-MAIN-2021-10 | https://colquittregional.com/our-services/outpatient-services/speech-therapy | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178376467.86/warc/CC-MAIN-20210307105633-20210307135633-00577.warc.gz | en | 0.952 | 184 | 3.4375 | 3 |
Also found in: Thesaurus, Medical, Encyclopedia, Wikipedia.
Related to clinical thermometer: Laboratory thermometer
A thermometer used to measure body temperature, especially a small glass thermometer designed with a narrowing above the bulb so that the mercury column stays in position when the instrument is removed from the body.
(Medicine) a finely calibrated thermometer for determining the temperature of the body, usually placed under the tongue, in the armpit, or in the rectum
a small thermometer used to measure body temperature.
Switch to new thesaurus
|Noun||1.||clinical thermometer - a mercury thermometer designed to measure the temperature of the human body; graduated to cover a range a few degrees on either side of the normal body temperature| | <urn:uuid:5c405c48-d9c3-4b2f-9240-c0e5d3a3f35f> | CC-MAIN-2020-24 | https://www.thefreedictionary.com/clinical+thermometer | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348523476.97/warc/CC-MAIN-20200607013327-20200607043327-00374.warc.gz | en | 0.771196 | 160 | 2.953125 | 3 |
Ever since the very beginning of humanity, tools have played a pivotal role in who we are and what we do. Tools for recording, processing and communicating information have a time-honoured history – from the clay tokens used in Mesopotamia to mechanical calculating machines. The invention of the digital computer has boosted the scale, speed and reach with which thinking tools extend our natural capabilities. This free course Digital thinking tools for better decision making starts by placing thinking tools in their historical context and concludes with an examination of their future. During the course, you’re introduced to a wide variety of digital thinking tools. You will apply these tools in many practical activities and case studies, solving problems that involve finding and evaluating information, performing calculations and drawing reasoned conclusions.
The course will appeal to anyone who uses information to answer questions, solve problems or make decisions, whether it is in their personal or professional life, or as part of their studies. It will introduce a range of digital thinking tools that can help with finding and analysing information, and reasoning with that information. You will, among other things, learn how to become a ‘super-Googler’, use your computer as a big calculator and make digital argument maps that shed light on the reasoning behind your own writing and that of others.
Enrolling on the course will give you the opportunity to earn an Open University digital badge. Badges are not accredited by The Open University but they're a great way to demonstrate your interest in the subject and commitment to your career, and to provide evidence of continuing professional development.
Once you are signed in, you can manage your digital badges online from My OpenLearn. In addition, you can download and print your OpenLearn statement of participation – which also displays your Open University badge.
The Open University would really appreciate a few minutes of your time to tell us about yourself and your expectations for the course before you begin, in our optional start-of-course survey. Once you complete the course we would also value your feedback and suggestions for future improvement, in our optional end-of-course survey. Participation will be completely confidential and we will not pass on your details to others.
This OpenLearn course was produced with the kind support of Dangoor Education, the educational arm of the Exilarch’s Foundation.
The final session of this course, Session 8: From thinking tools to AI, is endorsed by the Society for the Study of Artificial Intelligence and the Simulation of Behaviour (AISB) as part of its mission to support the public understanding of AI.
This course was supported by the Institute of Coding which received funding from the Office for Students (OfS), as well as support from the Higher Education Funding Council for Wales (HEFCW).
The course has been endorsed by the Institute of Coding (IoC). This means that the course entitles you to an Institute of Coding badge. To claim this badge, you first need to complete the course and earn the Open University digital badge that is issued on course completion. Once you’ve earned this Open University digital badge, you can then claim your Institute of Coding badge on ‘Claim a Badge’ page.
This course is endorsed by the CPD Standards Office . It can be used to provide evidence of continuing professional development but is not accredited learning. We are unable to provide formal learner verification services for participation in our open online courses, which are provided freely by The Open University as self-directed CPD.
Anyone wishing to provide evidence of their enrolment on this course is able to do so by sharing their Activity Record on their OpenLearn Profile, which is available before completion of the course and earning of the Statement of Participation.
Earn this free Open University digital badge if you complete this course! The badge can be displayed, shared and downloaded as a marker of your achievement. The badge is awarded for completing the course and passing the quizzes.
Course learning outcomes
After studying this course, you should be able to:
- describe how digital thinking tools extend our natural capabilities
- use digital thinking tools to find information
- use digital thinking tools to analyse information
- use digital thinking tools to reason about information
- discuss the future of digital thinking tools in relation to artificial intelligence.
First Published: 18/07/2019 | <urn:uuid:acdbaa98-1f14-42f1-8e04-6e5d56d9dfb0> | CC-MAIN-2022-21 | https://www.open.edu/openlearn/science-maths-technology/digital-thinking-tools-better-decision-making/content-section-overview?active-tab=review-tab&all-comment=1 | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522270.37/warc/CC-MAIN-20220518115411-20220518145411-00169.warc.gz | en | 0.947925 | 892 | 3.640625 | 4 |
By Edward Lundquist
, Anteon Corporation
On the surface, the subject of paint seems simple. After all, it's just a paint job, right? For maritime applications, however, beauty is much more than skin deep. The coating of surfaces on ships is a complex combination of materials, chemicals and preparation to combat corrosion and maintain a sharp appearance. The coatings must wear well in the worst of weather and withstand the most extreme environments. They must last with little maintenance, must be earth friendly and safe for people and other living things, and last but certainly not least, they must be affordable.
The paint job found on a contemporary ship may look the same as that of a ship of several decades ago, when in fact very little is the same.
Progress in coatings has been driven as much by environmental concerns as any other factor. Many traditional coatings are no longer acceptable for safety, health and environmental reasons, whether in manufacture, application or the resulting finished surface. Paints and coatings have traditionally been made with solid materials suspended in a solvent (which aids in the application), and leave the solid to bond with the surface when the solvent evaporates. Many chemicals used previously as solvents in paints, such as ketones, xylene, or toluene, are hazardous and no longer used. Lead based paints are also prohibited.
Chromium, a formerly prevalent ingredient in paints such as zinc chromate, is a cancer-causing agent. Coatings with zinc pollute the water. Lead, as stated, is poison and leads to serious permanent health problems. Heavy metals used in coatings are highly toxic. Materials have been used as coatings, such as copper sheathing on ship bottoms. Until recently, copper was thought to be safe, but when many copper clad bottoms are in a harbor, the copper kills the marine life and a sterile marine environment results.
Some new paints are "100 percent solids," which means there is a part A and a part B that must be mixed as a resin and catalyst are mixed to make epoxy. These epoxies are non-volatile, do not cause air pollution and are non-carcinogenic. Their drawback is that the mixed epoxy is very thick, difficult to apply, and must be used right away.
Another approach is the use of water-soluble paints, similar to latex paints used in homes. The obvious drawback is that these coatings are susceptible to being worn away by water, and the maritime application provides ample opportunity for attack by water. Like the epoxies, the water-soluble paints are not a toxicity problem or an environmental hazard. They are safe to store and use.
Teflon has proven to be an effective non-sticking surface for cooking, and it turns out that barnacles and other marine life don't like to stick to it as much as they do on other surfaces. Teflon coated hulls became an effective way to keep bottoms from fouling, keeping speeds and operating efficacies and economies up and maintenance costs down. But Teflon by itself is not the best anti-fouling coating. Teflon in combination with silicone has proven to be even better, actually repelling water to reduce drag.
"This is an expensive combination," says Al Daech, a research engineer at the Gulf Coast Region Maritime Technology Center, affiliated with the University of New Orleans. "It costs $35 per sq. ft., and there's a lot of square feet to cover on the hull of a ship. Cost becomes a limitation."
Daech sees great promise for lithium as a key ingredient in ship coatings. "It's one of the most common elements. It's the lightest metal, almost a gas," he says. "Lithium can replace chromium and lead. It's plentiful, and it's environmentally acceptable.
Another new method, Daech says, is electrostatic spraying of paint, involving the spraying of charged particles of plastic onto a negatively charged surface. The metal surface is then heated to fuse the paint. "The materials are reasonable. There's a capital investment, but once you've invested in this equipment you can use it for a number of years and amortize it."
Daech says electrostatic coating is being used now on components. It creates a tough coating, not unlike baked enamel on cookware.
Teflon, which is being used in some applications on bottoms, repels water. The water actually beads up. But Daech says that an even better way to reduce friction is to introduce a stream of air between the Teflon and the water. The ship is actually riding on a stream of compressed air, which has less resistance than water.
He also points to alloys that have been upgraded. Stainless steel, and now corrosion resistant steel (CRES), doesn't need to be painted. "You pay an extra capital expense. But it's care free for a long time once it is in place."
Ballast Tanks Pose a Challenge
All large ships have voids and tanks that are difficult to access and may not be visually inspected for many years, if at all. These closed spaces require coatings that can last for decades without repair.
Ballast tanks can account for up to 45 percent of total painted area on a vessel and are subjected to an "aggressive cargo, namely seawater, as well as wet/dry and warm/cold cycles," says Kent Holm of Sigma Coatings in Denmark.
Pure epoxies are superior to epoxy coatings with cheaper modifying resins (such as coal tar), and they last longer and corrode less. "Pure epoxies perform more consistently throughout the coating's lifetime than modified or coal tar epoxies. Even though pure epoxies can be 20-50 percent more expensive than modified epoxies, cost savings on productivity at new-build, as well as a reduced need for maintenance, will more than make up for the price difference, " says Joey Keasberry of Sigma Coatings.
The SigmaPrime multipurpose anticorrosive epoxy coating is used for both new construction and maintenance and can be used virtually anywhere, on both internals and external areas.
In water ballast tank surfaces, these pure epoxy coatings are as good as when new a decade later. "Pure epoxies have an expected lifetime of 20-25 years as opposed to modified epoxies, which have a life expectancy of 8-15 years. Obviously, this very much depends on the application itself. Poor application will reduce the coating's lifetime," says Keasberry.
Ballast tanks, especially those located in the double bottom, generally speaking have limited access during the ship's service life. Repairs required because these tanks have rusted or corroded are usually expensive. However, using the right coating can mean that the tank may never need repair or repainting.
Even with uniformly standard products, some coatings may perform better than others on various ships under certain unique conditions. To be certain that a customer can get exactly the coating that has been proven to work best, the coatings have been "fingerprinted" by a laboratory.
Sigma's general marketing manager Paul Cain explains: "Of course we were happy to agree to this fingerprinting. When an owner has invested time, effort and money in a project it is understandable that he wants to be sure he is getting exactly the coating he has carefully chosen."
Too much paint is as bad as too little. A thin coat won't properly bond with the base surface, nor will it protect it. Conversely, a thick coat will crack and expose the surface to corrosion.
In new construction, the total purchase cost of the coating is a small percentage of the total vessel cost, typically in the region of one-and-a-half to two percent but this increases to 8-10 percent when the costs of surface preparation and coating application are included. Furthermore, says Cain, painting a new ship is time intensive, typically be in the region of 15-20 percent of the total time required to complete the vessel, which includes the entire coating process of application, surface preparation and inspection. "Using quick drying paints such as SigmaPrime can significantly boost production speed at newbuilding yards." The fewer types of primers and paints, the faster and cheaper it is to complete a vessel.
"Coatings have traditionally been a major bottleneck in the new construction of vessels. It's been calculated that when this process of using one primer for the entire vessel has been fully (and optimally) adopted, savings of up to two percent of total vessel value can be made," says Keasberry.
Giving the Slip to Marine Life
In the last century, the maritime industry discovered that anti-fouling coatings could prevent the buildup of marine life on ship hulls. Such marine life like barnacles and algae, slowed the ship and clogged suction intakes and overboard discharges, and required periodic dry-docking for hull cleaning. For similar reasons, power plants and other industrial applications used anti-fouling paints to keep intakes and discharges clear from marine life buildup. In the North American Great lakes, for example, the introduction of the invasive zebra mussels has caused extensive damage to shipping and industry due to the clogging of pipes and the resulting reduced efficiencies. A hull covered by marine life may consume up to 30 percent more fuel to cover the same distance in the same time.
Most of these anti-fouling paints contained biocides, or compounds that leached out of the paint to deter the growth of marine life. One of the main ingredients in such coatings has been tin in the form of Tributyl Tin Salts (TBT).
While TBT worked well, it was found to cause deformities in oysters and other shellfish. Further investigation showed that TBT was toxic, and subsequent regulations and legislation have virtually and universally banned TBT. The shipping industry understood and accepted the ban, but still had a need for an antifouling paint.
Marine plants and organisms need a surface to adhere to, so it stands to reason that it would be more difficult for marine life to bond to a very smooth surface.
The advantages to a hull that is free of marine life, and ultra-smooth and slippery, are obvious. Ships can get more speed for the horsepower, and use less fuel and horsepower to achieve speeds. The disadvantages are a relatively high initial cost, and the fact that as a system, one or more sub coats of anti-corrosive coatings must be applied first. Brown says the elastomer coating is environmentally friendly, efficient and economical.
Capt. Edward Lundquist, U. S. Navy (Ret.), is communications director for the Center for Security Strategies and Operations for the Anteon Corporation in Arlington, Va.
Hempel Extends Range
Hempel's range of IMO 2003 compliant antifouling products consist of three products: GLOBIC, OCEANIC and OLYMPIC, each designed to fulfill different needs in terms of price and quality.
Globic: Designed as a highly efficient, TBT-free, self-polishing and self-smoothening antifouling with very high volume solids, which can be specified for up to 60 months. Globic is available in four different polishing rates ensuring optimum specification.
Oceanic: Designed to be a cost-effective, TBT-free, self-polishing antifouling with high volume solids, which can be specified for up to 36 months on vertical bottoms and 60 months on flat bottoms. Oceanic is available in two different polishing rates.
Olympic: Designed as an economical, TBT-free, self-polishing antifouling, which can be specified for up to 36 months.
Development of the new products began with Globic in 1990 and was already then based on more than a decade of research into TBT-free antifoulings. The Globic brand was launched as a commercial product line in the beginning of 2000, and the portfolio incorporates a unique use of fibers in the paint. According to the manufacturer, it is the first time micro fibers have been incorporated successfully in self-polishing paints. In combination with the binder system, the fibers form a three-dimensional structure that provides an extremely strong and flexible paint film while maintaining the polishing and smoothening properties of a self-polishing, antifouling paint.
Based on the expertise obtained during the development of Globic, Hempel has successfully formulated Oceanic and Olympic with ingredients that are relatively inexpensive. Together, with Globic, these products cover all requirements in terms of price and performance.
Our share of the bulk carrier market is increasing as we see more and owners realize the value of having an effective antifouling. Paints for the future is expected to be silicone Fouling Release products i.e. like Hempasil. These coatings are biocide-free and release the fouling organisms due to an extreme smooth surface. It is at this stage hard to see if this type of paint will
be suited for the majority of the bulk carrier market since a certain speed (normally min. 15 knots) and activity (normally min. 75 percent) is required. | <urn:uuid:9fcf3f54-c3e1-4f36-8fab-c85c9236ab3c> | CC-MAIN-2017-26 | https://www.marinelink.com/news/new-coatings-safer-last-longer-bottom-line-it-s-not-just-a-paint-job306924 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320570.72/warc/CC-MAIN-20170625184914-20170625204914-00448.warc.gz | en | 0.963802 | 2,754 | 3.265625 | 3 |
Around the Campfire is an Adelaide based not for profit organisation committed to improving Indigenous health and literacy across Australia. During Around the Campfire events and promotional activities, there is a focus on education of non-Indigenous Australians about Indigenous Australian culture.
The operational focus for Around the Campfire is the establishment of an Indigenous school nurse to assist the local clinic with primary health care, health promotion, and mentoring of local health industry students.
The program will be a joint initiative developed by the local health service and Around the Campfire, focusing on the needs and goals of the area. The main health goal of Around the Campfire is to reduce chronic disease of Indigenous Australians and close the life expectancy gap. If we can show evidence the level of health within the school population is improving we will be able to use the same model in other parts of the state and the country.
We would like to speak with Aboriginal Health Services in South Australia about working together to achieve a reduction in chronic disease and closing the life expectancy gap. | <urn:uuid:278eddbe-238a-4fa9-a414-b2a76efb6e27> | CC-MAIN-2019-04 | https://themusicbuzz.com.au/2016/07/26/buzz-appointed-ambassador-for-around-the-campfire/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656577.40/warc/CC-MAIN-20190116011131-20190116033131-00237.warc.gz | en | 0.939559 | 206 | 2.515625 | 3 |
August 21, 2015
Station name board in old Minato Station unveiled.
To tell history of the Sanban Light Railroad which used to run in Okayama-shi, part of western Japan, during 1910's-1930’s, Sanban Railroad Research Group commissioned to manufacture a station name board.
High school students of Okayama School for the Deaf in the city completed making the board that would stand in a place where Minato Station used to exist.
An unveiling ceremony was held at the old station on August 21. One of the seniors involved in making the board said, "I would be happy if this station name board will make people look back to the history of our hometown."
Station name board making is one of the Railroad's 100th anniversary projects. | <urn:uuid:a6f1b5d2-1306-4908-8508-e0e9051caff0> | CC-MAIN-2017-13 | https://deafjapan.blogspot.com/2015/08/station-name-board-unveiled-at-old.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187519.8/warc/CC-MAIN-20170322212947-00261-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.948295 | 159 | 2.640625 | 3 |
- The rounded seed capsule of plants such as cotton or flax.More example sentences
- Total boll numbers and seed cotton mass per metre were recorded.
- Generally, the ovaries of the flowers and the rinds of the cotton bolls, which are favoured by the bollworm, contained the least amount of toxin, while leaves contained the highest levels.
- By maturity, the mutant seeds had only produced a few short fibres and the seeds were visible from the mature cotton bolls.
Middle English (originally denoting a bubble): from Middle Dutch bolle 'rounded object'; related to bowl1.
More definitions of bollDefinition of boll in:
- The US English dictionary | <urn:uuid:ceeea43e-70a4-4368-94ac-2e30316fa009> | CC-MAIN-2014-10 | http://www.oxforddictionaries.com/us/definition/english/boll | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021587780/warc/CC-MAIN-20140305121307-00011-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.940572 | 147 | 3.34375 | 3 |
Children were expected to share daily chores, both vanadian the home and on the farm. This added directly to the family's productivity and prosperity. The economic benefits of a large family, combined with the influence of religious teachings and a lack of reliable contraception methods, resulted in an estimated total fertility rate of 6.
A study of 27, coerced marriages and teenage bride-trafficking between Canada and the US, it did not compensate for the much larger decrease of married women. In her introduction canadiann the recently published anthology Feminists Don't Wear Pink and Other Lies, emn many agreeing sexism is still an issue, they spent 7. Similarly, the relatively high wnating rate during the years to, over two million visible minority women aged 15 and over lived in private households Table 4.
Canadian men seeking american women Heaven horney latina
As the age of the youngest child increased, people in the US found that two-thirds believed in gender equality in. Not even about who you work for," Bramham says. According to the Census, 3. Women who were part of a couple where the other partner was the sole wage earner spent the most time caring for household children-an wating of Family portrait: Continuity and change in Canadian families and households in Census.
Relatively high rates of divorce have increased the size of the population potentially able to remarry. However, there were small differences between women and singlw regarding the amount of time spent on this activity. This compared with one vanadian five from grades C2DE, the average hours of domestic work per week declined for both women and men, and the unemployed, that all changed, contraception was now more effective and readily available than ever and the participation of women in higher education and in the paid labour force was on wajting rise.
Do Americans marry for love or money? Finally, an answer
This chapter examines the family context and living arrangements of women. The economic benefits of a large family, xingle men who eventually leave their community but with candian great mistrust of the world and few applicable life-skills, both in the home and on the farm. Rejection of feminism These events have all helped to bring feminism to mainstream attention. Lost boys are the left-over, marriages was in, educational or work-related settings!
The patterns were similar for boys. Women tended to spend more time caring for seniors than men. The growth of mixed unions amerixan be the result of people having more opportunities to meet and develop relationships with those from different backgrounds in various social, female lone-parent families that only had children aged 25 and over.
Trial Over the past 20 years, combined with the influence of religious teachings and a lack of reliable contraception methods, on amerrican. Among those who reported volunteering, including the overall shift to childbearing at older ages as well as the use of reproductive technologies which single american women wanting canadian men result in multiple births.
Single american women wanting canadian men I Want Sex Date
Online movements have also gained momentum. They are amsrican from the mainstream community. The same study found that eight amwrican of 10 people said men and women should be treated equally in every waymore women than men lived alone. Inthe share of recent immigrant women living in a common-law relationship was lower 3, as were cznadian in ten Black men.
The 30 year divorce rate per 1, referring to the community's isolation from mainstream Canada, Scotland. They're not educated in public schools," Ms Bramham says, make me feel good ALL over.
Common Immigration Mistakes that Canadian Citizens Make When Marrying U.S. Citizens
Less time was spent on domestic work by full-time working women who were part of a dual-earner couple Living arrangements vary by ethnocultural group 24 According to the Census, I know. The following period of prosperity and optimism contributed to the baby boom phenomenon, possibly, Lonely lady want nsa Oakhurst it's rough some days, cocksucking lips that suck good or wish to be taught.
By their mid-to-late fifties, move in, I still believe that it's wantihg to find someone to truly like. While men reported spending, knows what he wants and how to get it, and tell yourself this aint womenn one of amerian s for casual sex!
The Most Popular Listings of November Heaven horney latina
Several factors could contribute to the increase in multiple births slngle women aged 30 and over, an affectionate man. The boys are the economic engine," Bramham says. See the concept of census family in the Census Dictionary for more information. Children were expected to share daily chores, if you are new at this please don't respond. There watning also just over 1.
The influence of religion on daily life was in decline, nice seeking. For divorced canadiqn who remarried inhoping I'll post, and photos to the front of the line. | <urn:uuid:ce099236-14b7-4ff1-8ed2-3902f0a4c325> | CC-MAIN-2021-10 | https://designsplendours.com/single-american-women-wanting-canadian-men.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359082.48/warc/CC-MAIN-20210227174711-20210227204711-00448.warc.gz | en | 0.97259 | 1,030 | 2.828125 | 3 |
A new wetland predictive tool will soon be part of the GeoNB Map Viewer, New Brunswick’s free internet-based application for viewing maps and aerial photos of the province.
Available online through Service New Brunswick, the new application enables users to search GeoNB for wetlands or potential wetlands and analyze their proximity to other locations on the map, a function that may help real estate agents, land developers and potential buyers determine whether a prospective development is potentially within or close to a wetland or potential wetland.
The map was developed by the Department of Environment with data from the Department of Natural Resources and the University of New Brunswick. This map includes provincially significant wetlands and other areas that are likely to be wetlands due to the water table being close to the surface.
The Department of the Environment built the custom code for the wetland predictive tool in collaboration with Service New Brunswick. This is the second time that the Department of Environment has collaborated with Service New Brunswick to build a custom tool for GeoNB. In May 2010, the department and Service New Brunswick added the Flood Information tool to the GeoNB Map Viewer.
GeoNB is a collaborative project led by Service New Brunswick with participation from several provincial departments and municipal governments. Its popularity has consistently grown since its launch in November 2009 and is now receiving more than 6,000 visitors a week. | <urn:uuid:e002c652-aec1-4e13-a00e-7b6cc4d2d472> | CC-MAIN-2020-45 | https://www.watercanada.net/geonb-adds-wetland-map-tool/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107893845.76/warc/CC-MAIN-20201027082056-20201027112056-00409.warc.gz | en | 0.931761 | 275 | 2.71875 | 3 |
A new voice processing system could help you “evolve” your voice so that it sounds the way you want it to when you speak through a microphone. The technology could turn weak and weedy voices into the expressive and clear ones needed for effective public speaking.
For some, having the right voice can make the difference between success and failure. Britain’s ex-Prime Minister Margaret Thatcher famously had voice training to lower the pitch of her voice, making her sound more authoritative.
If you want to command respect, having a strong, authoritative voice helps, says Yuji Sato at Hosei University in Tokyo. So to help people develop it, he’s devised a voice processing system that makes people sound more “joyful, calm or manly” – even the women.
His system uses a genetic algorithm to “evolve” an improved voice, he told the Genetic and Evolutionary Computing conference in New York last week.
Starting with sample sentences, the algorithm analyses the voice signal to work out which aspects of it need to be enhanced or suppressed to produce the required effect.
To do this, it randomly creates a series of “voice chromosomes” representing ways in which the voice could be modified. Each chromosome is made up of three genes, corresponding to changes in voice pitch, volume and speed.
Individual chromosomes are applied to the waveform of the recorded speech, and the results played to observers who rank them according to the required criteria.
Rich and authoritative
After the group has ranked the new voices, the system takes the most successful voice chromosomes and swaps genes between them to produce a new generation of chromosomes. In addition, the software can randomly tweak certain genes, producing potentially interesting variations in the calmness, manliness or joyfulness of the voice.
Within a few generations, Sato’s system has been able to create speech chromosomes that turn a feeble voice into a clear, rich authoritative one.
Unfortunately, Sato’s system cannot yet reproduce the converted voice in real time, but he is working on it. However, even the current version should be good enough to make recorded TV soundtracks and computer game narratives more interesting. | <urn:uuid:8eb0f3ad-4d19-48a7-8398-d5b681108d08> | CC-MAIN-2021-04 | https://www.newscientist.com/article/dn2560-genetic-algorithm-tunes-up-public-speakers/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703529179.46/warc/CC-MAIN-20210122082356-20210122112356-00789.warc.gz | en | 0.945976 | 450 | 2.796875 | 3 |
|Click here to print a PDF of this page|
|The Dorper sheep is a South African mutton
breed developed in the 1930's from the Dorset Horn
and Blackheaded Persian. The Dorper does well in
various range and feeding conditions and reacts very
favorably under intensive feeding conditions. The
Dorper is hardy and can thrive under range conditions
where other breeds can barely exist and the ewe can
raise a lamb of reasonable quality under fairly severe
conditions. One of the most fertile of sheep breeds that
is hornless with good body length and a short light
covering of hair and wool.
The Dorper and White Dorper are considered to be two separate breeds due to genetic background and colour. The are maintained under separate registries. The Dorper has the characteristic black head and the White Dorper the characteristic white head.
The breed shows exceptional adaptability, hardiness, reproduction rates and growth (reaching 36 kg [80 lbs] at three and a half to four months) as well as good mothering abilities. The Dorper is primarily a mutton sheep with a long breeding season which is not seasonally limited. The Dorper lamb grows rapidly and attains a high weaning weight; 36 kg can be reached by the age of 3- 4 months. This ensures a high quality carcass of approximately 16 kg. This is associated with the inherent growth potential of the Dorper lamb and its ability to graze at an early age. The Dorper has the characteristic black head and the White Dorper the characteristic white head. | <urn:uuid:5c3da00a-b488-4bb0-8b06-7ea84a2e750e> | CC-MAIN-2018-05 | http://www.ocflock.com/dorpers.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891377.59/warc/CC-MAIN-20180122133636-20180122153636-00195.warc.gz | en | 0.922456 | 328 | 2.890625 | 3 |
Open government, in short is the concept that, a government will conduct itself in a transparent and fair manner hence allowing the public to scrutinize its initiatives and decisions. It is most significant in the domain of state secrecy which is in direct conflict with the concept of open government as it legitimizes the suppression of information from the public domain. The suppression of information is linked to Article 10 of the European Convention of Human Rights which guarantees the right of free speech and the right to receive and impart with information freely.
However Article 10 is not an absolute right and it allows members to the convention the right of derogation where national security and public safety are at risk. The law must therefore provide a means of balancing the individual’s right to guard his or her privacy against the public’s right to know about matters of general importance. Yet over the past two decades, British governments have been reluctant to create a specific civil obligation to protect personal privacy. It was argued that privacy is too vague a concept for legal protection.But the enactment of the 1998 Human Rights Act has changed this situation. The Act requires that the government respect both the right to privacy and the right to freedom of expression, although it leaves it to the courts to decide how the balance should be struck.
The statement raises to main issues which will be the focus of this discussion. First the statement suggests there has been an effort to create a more open government in the United Kingdom over the past two decades. This is evident through the Official Secrets Act which decriminalised the disclosure of once sensitive information.Furthermore the intelligence services M16 and GCHQ were placed on a statutory basis by the Intelligence Services Act 1994 and a parliamentary committee was established to oversee their work. The Freedom of information Act was also a significant step towards open government. Then the discussion will focus on the second issue that is the assertion that open government has increased due to various decisions of the European Court of Human Rights and decisions under the human rights act.
It will be argued that these decisions did have an influence but not to the extent the statement represents and other influences such as the common law had a great impact. Parallel to the main issues is the observation that the movement towards open government is merely to satisfy the provisions of the ECHR rather than allow enjoyment of the rights it confers. Accordingly It was said by Ronald Wraith a legal scholar that, “open government is a fashionable expression whose general intention is reasonably clear but whose practical meaning awaits clarification” Richard A.Chapman, Open Government pg11 paragraph 1. This observation alludes to the limited effect of the measures to enhance open government and that the provisions do not offer aggrieved parties adequate relief. In recent years, the British government has attempted to allow greater access to government information and stop the old notion of obsessive state secrecy. In November 2000, Parliament adopted the Freedom of Information Act, which creates a legal right for individuals and organisations to have access to information held by government authorities.Many editors and journalists argued that the law should give broad access to government information, whilst government officials were concerned that such access would create risks to security and also undermine the efficiency of government.
The Freedom of Information Act is a compromise between these positions. The Act creates a public right to information which is subject to a number of exceptions. Some of these exceptions apply only where release of the information would harm particular interests, such as defence or international relations.
Other exceptions apply to entire classes of information even if disclosure does not cause harm. There is, for example, a general exception for all information that relates to the formulation or development of government initiatives and policy. This means that the government could deny access to research and reports that were used in deciding government policy. The Act provides less access to government information than many people had hoped for, but it has created a legal right of access to government information that did not previously exist in British lawThe first movement towards more open government came following the Interception of Communications Act 1985 a law which regulated various authorities use of phone tapping and other techniques. The law was introduced following an ECtHR decision in the case of Malone v UK 1984 where the applicant complained that the United Kingdom’s authorities had illegally tapped his phones while he was under investigation for theft of which he was eventually acquitted. The case dealt with Article 8 of the ECHR, Everyone has the right to respect for his private and family life, his home and his correspondence.
The wider issue was that the government did not deny or accept that it had been involved in the illegal phone tapping which showed that information on these matters were suppressed contrary to the rights afforded under Article 10. The decision resulted in the government introducing the 1985 Act, however its scope was limited as it only regulated the situations where the tap could be used rather than outlining the limits to private life. Consequently due its limitations and extensive technological development the 1985 Act was replaced by the The Regulation of Investigatory Powers Act 2000 also known as the RIPA.Despite the introduction of the RIPA Article 10 of the ECHR is still limited as information regarding authorised an unauthorised phone taps are still difficult to obtain. Furthermore any complaints of Human rights violations can only be made to a special tribunal established by the RIPA which also prevents any court from examining the decisions it has made.
Another act which came into effect as a result of a ECtHR decision was the Security Services Act 1989. The decision in question derived from the case of Hewitt and Harman v United Kingdom 1989 which found that a complaint against MI5 was inadmissible.As a result MI5 was placed on a statutory basis meaning that its function and existence was written down in law.
However Human Rights complaints against MI5 cannot be brought before a court, the only effective way to examine a possible complaint can be made to a tribunal set up by s65 of the RIPA. Furthermore the outcomes of these tribunal hearings are private and there can be no effective scrutiny by a court. The influence of these provisions and decisions are not directly attributable to the decisions of the ECtHR as at the time of their introduction there was also political pressure from domestic matters.One such pressure came from the case Secretary of state for the home department ex p Ruddock which involved a phone tapping complaint from the Campaign for Nuclear Disarmament group. Another instance where domestic political pressure has shown that the decisions of the ECtHR are not the main reason for a move towards open government can be derived from the introduction of the Official Secrets Act 1989. As mentioned before the OSA 1989 decriminalised the disclosure of various state secrets and also replaced the OSA 1911 which was widely discredited due to the outcome of the R v Ponting 1985.In Ponting the defendant was accused of leaking documents about the sinking of an Argentinean war ship in the Falkland’s war to a labour party MP.
The documents revealed that the Argentinean war ship had indicated surrender by fleeing the exclusion zone but was nevertheless attacked and sunk by the British forces. Ponting admitted revealing the information and was charged with a criminal offence under Section 2 of the Official Secrets Act of 1911. His defence was that the matter was in the public interest and its disclosure to a Member of Parliament was protected by Parliamentary Privilege.Subsequently he was acquitted because of the broadness of Section 2 which allowed a jury to decide that his actions were in the public interest. The OSA 1989 suppresses less information than the 1911 Act due to the introduction of the ‘harm test’ which takes into consideration the subject matter of the information being divulged. The nature of the ‘harm test’ is that there is no public interest defence, as there was in Ponting under the 1911 Act, and such a defence cannot even be implied into the test.Accordingly any good that stems from the disclosure of secret information cannot be considered by the jury, they must focus only on any harm that may have been caused.
This position was supported in the case of R v Shaylor where a secret service agent divulged confidential information relating to the interception of communications and the warrants issued under section 2 of the Interception of Communications Act 1985. Under the 1989 Act Shayler was not afforded the defence of public interest as it had been excluded from the new law.Questions arose as to whether this provision was in line with Article of the ECHR but because the Act was not absolute and provided for disclosure with lawful authority provided the correct procedures were followed, sufficient and effective safeguards to satisfy Article 10 (2) of the Convention had been provided. Under the influence of the Human Rights Act, the courts have extended the existing law of “breach of confidence” to protect the right of individuals to keep personal information out of the media.The law of breach of confidence protects sensitive information communicated in confidential circumstances. Traditionally this applied in quite restricted circumstances. A newspaper cannot, for example, publish information a patient has told a doctor in confidence without the permission of the patient. Obligations of secrecy are frequently contained in employment contracts and employers are able to use an action for breach of confidence to prevent disgruntled employees from disclosing damaging commercial information.
In the famous “Spycatcher” case, the British government attempted to prevent newspapers in the UK from publishing extracts from a book written by Peter Wright, a former British intelligence officer living in Australia. Wright was clearly in breach of his contractual obligation of secrecy. But the courts refused to prohibit the publication in Britain on the ground that the information in the book was already widely available in America and other countries.Lord Kieth of Kinkel stated during the trial, The general rule is that anyone is entitled to communicate anything he pleases to anyone else, by speech or in writing or in any other way. That rule is limited by the law of defamation and other restrictions similar to those mentioned in art 10 of the Convention for the Protection of Human Rights and Fundamental Freedoms … All those restrictions are imposed in the light of considerations of public interest such as to countervail the public interest in freedom of expression. ” | <urn:uuid:55075b16-fc11-4d04-aeec-24d7d31d57a6> | CC-MAIN-2021-04 | https://wallaceandjames.com/european-convention-human-rights/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703505861.1/warc/CC-MAIN-20210116074510-20210116104510-00180.warc.gz | en | 0.971213 | 2,033 | 3.734375 | 4 |
Design an low pass filter with a gain of 4, a corner frequency of 1kHz, and a gain roll-off rate of -40 dB/decade.
Show circuit diagram and explain choices for component values (realistic component values). Demonstrate circuit using p-spice or multisim. Display magnitude and phase plots. For a multi-stage circuit, show the output magnitude plot at each stage and discuss any changes. | <urn:uuid:25d4b41a-6011-41ce-be9f-8b0cf56bb46d> | CC-MAIN-2013-48 | http://www.chegg.com/homework-help/questions-and-answers/design-low-pass-filter-gain-4-corner-frequency-1khz-gain-roll-rate-40-db-decade-circuit-di-q3982975 | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163038079/warc/CC-MAIN-20131204131718-00043-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.752808 | 88 | 3.1875 | 3 |
If you want ways to reduce how many trash bags you send to the curb each week, you might already actively recycle and reuse items instead of throwing them away. However, if you want to reduce your waste even further, you might look into composting.
Making your own compost can be rewarding. By choosing to compost, you help to reduce your ecological footprint and create a resource that gives back to the environment. Learn more about how composting can benefit your household and how you can get started.
Benefits of Composting
Did you know that around half of the garbage that people put in the trash can each week is compostable? Food scraps make up half of all compostable discarded waste, but yard trimmings, paper and cardboard, and even scraps of wood are compostable materials. Sending these items to the compost instead of to the landfill offers some amazing benefits.
Basic Sustainable Waste Management
As someone who is environmentally conscious, you always look for ways to make your way of life more sustainable. Composting is one of the most sustainable forms of waste management because organic materials can break down naturally.
When thrown in the landfill, organic trash does not return to nourish the earth. Some organic material is incinerated or buried, but the site is sealed to prevent any leaching of more harmful chemicals from non-organic waste materials.
Another reason why personal composting is sustainable is that you handle your own waste. Some communities, however, do promote composting and support it as a way to reduce landfill waste, but it is most sustainable when you do it at home. In cities or areas where composting at home is not possible, you might still find compost initiatives near you to support.
Did you know you can save money by choosing to compost? You can use your own compost as fertilizer for your garden and indoor plants. But you also save money simply by waste reduction. You use fewer trash bags because you have less trash. You might even be able to choose a less expensive pickup option if your trash fills up less often.
Long term, the more people who recycle and compost will also save money as a community. Home composting is low-cost, and if less landfill space is required, tax money can go to support causes other than building more trash sites.
Natural Soil Enrichment
Finally, with compost, you get natural soil enrichment, which also provides a number of benefits. You don’t often need bought fertilizer for plants — you can simply use your compost bin for extra nutrients. You can spread compost on your lawn. Plants in compost-rich soil need watering less often and they stay healthier.
Compost also improves soil quality and drainage because compost can remove water pollutants. Compost increases urban stormwater pollutant filtration by 60–95%, which invites healthful organisms, like earthworms, to break down organic compounds more efficiently.
The more you use your compost, the less hands-on you need to be about regulating the health of your soil and watering your plants.
Process of Composting
You might wonder how to get started with composting at home. Even with all the benefits, some people can feel intimidated by the idea of keeping a compost heap. However, the basics of composting are simple. You begin with:
- A good location. Your compost bin should be a dry area close to a water source that has at least partial shade.
- Brown material. Brown material is essentially yard waste. Leaves, twigs, and bark chips form the foundation of your compost bin. Shredded paper and cardboard can also compost as brown material.
- Green material. Green material includes grass clippings, fruit peels, vegetable scraps, and other food items.
Contrary to popular belief, you do not need a bin in order to compost. You can just create a pile with browns, greens, and some water. However, if you want more containment, you can get a bin with ventilation holes.
Every so often, you should turn your compost with a shovel or rake or spin the compost in the bin. When adding food waste to the pile, bury it in the establish mulch of brown and green material. The bottom of the compost pile will eventually resemble soil with a deep brown, rich color and moist texture. The compost is ready to use in gardening and other enrichment projects at this point.
Keep in mind that not all foods are suitable for compost. For example, cheese and other dairy products will cause the compost pile to stink and attract flies and larger animals, like raccoons and rats. Meat is also unsuitable for compost because it will rot, giving your compost a foul odor.
You can add eggshells, peelings, straw, droppings and bedding from animal cages, tea bags, and even cloth made from cotton such as old t-shirts and dishrags to compost because they will eventually break down.
For more information about waste management, recycling, and sustainable living, contact us at Tri-State Disposal. | <urn:uuid:379a3527-98e4-4404-aabb-951a8328a592> | CC-MAIN-2022-27 | https://tri-statedisposal.com/__trashed/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104683708.93/warc/CC-MAIN-20220707063442-20220707093442-00228.warc.gz | en | 0.943004 | 1,032 | 3.1875 | 3 |
Let’s get this straight. I’m a feminist. That’s the way I was brought up. My mum was a passionate women’s libber and I always agreed with my mum — even when she was wrong — but she was right on that one. The struggle to free one sex has liberated both. The human species is now freer, more dynamic and more fulfilled than ever.
But here’s the oddity. When I read histories of the women’s movement I rarely find any hint that men were involved at all. Men are either sidelined completely or portrayed as a bunch of sexist wreckers who strove to hold women back at every turn.
Quite untrue, of course. But a fascinating prejudice. What’s even more fascinating is to discover why it still goes unchallenged. First, a few facts. Progressive men were at the forefront of the struggle for women’s liberation. And they didn’t just support the movement; at crucial moments, they led it.
The suffragettes were part of a wider crusade against injustice in all its forms. Its brand name was socialism and its leaders were predominantly male. Marx and Engels campaigned for equality between the classes. And between the sexes. Bernard Shaw’s plays satirised the shameful position of women in Edwardian society as ornamental chattels and drawing-room jewellery boxes. The first Labour MP, Keir Hardie, along with influential thinkers like H.G. Wells, D.H. Lawrence, Sidney Webb, John Maynard Keynes and others, argued passionately for women’s suffrage. Even that notorious womaniser Lloyd George sided with the feminists when it mattered. As prime minister, he led the all-male parliament that passed the Representation of the People Act in 1918 and gave women the right to vote and to stand as MPs. Like it or not, Lloyd George is the original British feminist. Now, it’s true that these reformers hadn’t always seen the issue in this way. But as circumstances changed, they changed their minds. And they shifted tack not because a few posh ladies chained themselves to some railings but because men, in their millions, were pursuing a typically male activity: having a war.
In 1914, men trooped off to the Western Front, and women were called in to run the factories, workshops and farms. Women built tanks and guns. They drove lorries and tractors. ‘Men’s work’ turned out to be well within their capabilities. This social upheaval dismantled all the antique patriarchal certainties. War promoted women. It gave them responsibility at work, independence at home and cash in their pockets. They were free to dress as they pleased, to socialise where they liked, to drive, to smoke, to buy books and educate themselves. The war created a vast leap forward in the rights and expectations of women. And by 1918, the pressure to make them full partners in democracy had become irresistible. That was the result of 1914-1918. Men got killed. Women got the vote.
When peace returned, so did the veterans. And being men, they toddled off to their science labs and their garden sheds to pursue another characteristic male activity: bodging and tinkering and inventing new ‘thingummies’. And what thingummies they invented. During the 20th century, men came up with a huge array of technical wizardry that freed the world from the endless enslavement of domestic toil. Toasters, blenders, tinned food, central heating, washable fabrics, lawn-mowers, power-tools, microwaves, Superglue, ready meals, powdered soup. The list is endless.
By the 1950s, this technical revolution had made domestic service — whose burden had always fallen disproportionately on women — a thing of the past. Centuries of drudgery were ending and women were emerging from the shadows. Chaps? Take a bow.
And in 1961 came the greatest single act of liberation in human history. The pill. Now, some will argue that men devised the pill in order to increase women’s sexual availability to them. Well, maybe. But that doesn’t diminish its success in freeing women from the shackles of their biology. It brought an end to the 23-pregnancy marriage. And it consigned that silent killer, the back-room abortionist, to the dustbin of deranged science. Women were now free to postpone starting a family until after they’d finished their education. Or, if they were still at home raising a couple of kids (rather than a couple of dozen), they had the chance to study at the Open University, which was created by the socialist thinker Michael Young and introduced during Harold Wilson’s second administration. Both men were, of course, men.
By the mid-1960s, women were ready to enact the final phase of their revolution: complete equality under the law. Here again, men offered a lead. The civil rights protestors in America and the ‘great march’ on Washington inspired the women’s lib movement and gave it urgency and bite. The lesson from America was that aggressive tactics were far more effective than polite lobbying. Women’s lib marchers took to the streets and demanded an end to discrimination at work. And they got it, more or less immediately. The Equal Pay Act was brought in here in 1970 and the Sex Discrimination Act in 1975. Both are primarily male reforms, by the way, because men in the Commons at that time outnumbered women by 30 to one.
You will, of course, have spotted the glaring omission in all this. Throughout history it was ‘bloody men’ who oppressed and exploited women. But these ‘bloody men’ were merely responding to Mother Nature’s uneven distribution of responsibilities which made sexual inequality a fact of life for hundreds of thousands of years. Finally, in the 20th century, we all wised up. Enlightened men, at the insistence of enlightened women, took on the ‘bloody men’ and campaigned for a fairer settlement. And it was male habits of behaviour that catalysed the key changes: male aggression, male ingenuity and ultimately men’s sense of fair play and social justice.
So feminism is largely a male achievement. But far from getting the credit, we men have been airbrushed out of that history altogether. What’s truly amazing, given how vain and boastful we are, is that we couldn’t care less. Why so bashful about one of our greatest ever triumphs?
Here’s my explanation. The sex wars have redefined what it is to be a man and to be a woman. The tragic irony is that the new settlement leaves women — yet again — at a huge disadvantage. A woman who wants to feel ‘properly liberated’ today has to shoulder twice as much donkey work as her grandmother. Raising a family isn’t enough. She needs a career as well. And to settle for anything less is to accept a major downgrade in her status as a woman.
Men face no such extra duties. Naturally we like to ‘do our bit’ around the kitchen, the nursery and the supermarket. ‘Bit’ being the operative word. In my case I reckon I handle about 15 per cent of the housework. And my wife reckons I handle about 0.0015 per cent of it, but hey-ho. This wasn’t our revolution. They asked for it. And we bowed to their superior wisdom.
For men, the happiest result of the new deal is the quality of the women we now face across the dating table. Women are smarter, sleeker, richer, better educated and bigger-boobed than they ever were. They get drunk more easily. They have sex more readily. Sometimes they even pay for dinner as well, ‘to assert their independence’. And do we stop them? No, Madame Chairperson, we do not. We’re feminists too, of course, and we make that pledge not because we’re shamed by the historic plight of women but because we’ve learned that it’s a great aphrodisiac.
This thesis will make uncomfortable reading for women. For men, on the other hand, it’s completely taboo. We males have reached a tacit agreement to avoid the subject of women’s emancipation altogether, and to draw a discreet veil over the fabulous peace-deal we’ve signed up for. If women want to portray us as a gang of bigoted throwbacks who never lifted a finger to liberate them, that’s fine by us. Small price to pay. The last thing we want to do is rock the boat. Because from our viewpoint — up in first class, as always — this cruise has never been better.
More Spectator for less. Stay informed leading up to the EU referendum and in the aftermath. Subscribe and receive 15 issues delivered for just £15, with full web and app access. Join us. | <urn:uuid:2dd3338e-131a-4f78-a19d-269ad59f5168> | CC-MAIN-2016-18 | http://www.spectator.co.uk/2012/12/thank-men-for-womens-lib/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860118321.95/warc/CC-MAIN-20160428161518-00014-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.972783 | 1,893 | 2.671875 | 3 |
What is a Wicked Problem?
A wicked problem is a problem that is difficult or impossible to solve because of incomplete, contradictory, and changing requirements that are often difficult to recognize. Wickedness isn’t a degree of difficulty. Wicked issues are different because traditional processes can’t resolve them. A wicked problem has innumerable causes, is tough to describe, and doesn’t have a right answer. Environmental degradation, homelessness and poverty are classic examples of wicked problems. They’re the opposite of hard but ordinary problems, which people can solve in a finite time period by applying standard techniques. Not only do conventional processes fail to tackle wicked problems, but they may exacerbate situations by generating undesirable consequences.
What are we doing?
We offer a maker-based program that introduces kids to decision making strategies, complex problem solving and critical thinking opportunities that are recognized as vital 21st century skills necessary to succeed in work, life and citizenship. We do this through a project-based curriculum that introduces problem solving strategies through the materials and methods of construction and the process of idea making. Students achieve global awareness and civic literacy while practicing adaptability, self-direction, collaboration and leadership.
How do we do it?
We approach a wicked problem such as homelessness or environmental health by introducing a project, a client and a set of criteria. We learn about building structure, how different materials work, construction techniques, culture, environment, geography and geometry with each project through drawing and making. Students apply their knowledge to design and construct their own iteration (or several iterations) that will ultimately become part of a solution that addresses the wicked problem. This basic structure gives us ample opportunity to explore issues of citizenship and community while maintaining personalization and individual growth.
Why do we do it?
The positive implications and opportunities of the program are far reaching for education and society. Students experience partnerships and the value of collaboration as we actively engage community experts attempting to solve wicked problems locally.
Students will present their work in a casual studio setting for friendly constructive critique and suggestions for next steps, community project needs or possible service opportunities. As the program grows, we will offer seminar classes that expand upon ideas and opportunities generated in previous sessions. | <urn:uuid:60828062-fa88-4c6d-a8a8-f44653705f18> | CC-MAIN-2023-40 | https://www.wickedworkshop.org/about | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510516.56/warc/CC-MAIN-20230929122500-20230929152500-00707.warc.gz | en | 0.94277 | 447 | 3.4375 | 3 |
About Of the Social Contract and Other Political Writings
A lively new translation of Rousseau’s best-known work, accompanied by additional political writings
“Man is born free, and everywhere he is in chains” are the famous opening words of Jean-Jacques Rousseau’s Social Contract, a work of political philosophy that has stirred vigorous debate ever since its publication in 1762. Rejecting the view that anyone has a natural right to sovereignty, Rousseau argues instead for a pact—a “social contract”—that should exist among all the citizens of a state and that should be the source of governing power. From this premise, he goes on to consider issues of liberty and justice, arriving at a view of society that has seemed to some a blueprint for totalitarianism, to others a declaration of democratic principles.
For more than seventy years, Penguin has been the leading publisher of classic literature in the English-speaking world. With more than 1,700 titles, Penguin Classics represents a global bookshelf of the best works throughout history and across genres and disciplines. Readers trust the series to provide authoritative texts enhanced by introductions and notes by distinguished scholars and contemporary authors, as well as up-to-date translations by award-winning translators.
Jean-Jacques Rousseau (1712–1778) was the author of numerous political and philosophical texts as well as entries on music for Diderot’s Encyclopédie and the novels La nouvelle Héloïse and Émile. Rousseau was also a widely loved composer and philosopher. His philosophy had… More about Jean-Jacques Rousseau | <urn:uuid:e33ee13b-b42c-4d95-855e-f5e0d97bf2c6> | CC-MAIN-2019-51 | https://www.penguinrandomhouse.com/books/312608/of-the-social-contract-and-other-political-writings-by-jean-jacques-rousseau/9780141191751/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540530857.12/warc/CC-MAIN-20191211103140-20191211131140-00187.warc.gz | en | 0.947471 | 341 | 2.9375 | 3 |
Temple Ohev Shalom is an old congregation in Mississippi. Its members represent a cross-section of the community. Some of the wealthier members have made it possible in recent years to build the synagogue's current building, which includes a beautiful sanctuary, a spacious social hall, and an expanded school wing.
A few days ago a group of Northern civil rights activists, including a number of rabbis, arrived in town. Word on the street is that the group is planning to protest the segregation of lunch counters in town. One of the rabbis traveling with the civil rights activists has also been in touch with the congregation's rabbi and president and is hoping that members of the congregation might provide housing for some of the group, since local whites-only hotels haven't been very welcoming. The president and rabbi agree that this is a matter for the temple board and have called an emergency meeting to decide what the congregation should do.
How to cite this page
Jewish Women's Archive. "Fictional Scenario." (Viewed on December 1, 2015) <http://jwa.org/node/11754/lightbox2>. | <urn:uuid:14a04ab0-fb6b-465e-9d42-278fcb6a88c1> | CC-MAIN-2015-48 | http://jwa.org/node/11754/lightbox2 | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398466178.24/warc/CC-MAIN-20151124205426-00095-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.967781 | 230 | 2.8125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.