text
stringlengths
198
621k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
15
1.73k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
49
160k
score
float64
2.52
5.03
int_score
int64
3
5
What is Phosphate? Phosphate is a major nutrient found principally in fish food to help with growth, good bone formation and many other biological processes. However, not all of the phosphate will be utilised by the fish and will be excreted as a waste product. It can also be generated by the breakdown of other organic matter and is also often present in tap water. While phosphate is beneficial for life, it is only required in small quantities. Why test for Phosphate? Increased phosphate in the water column is often a major contributor to the growth of nuisance algae. At low levels, it is generally considered safe for fish, but should be monitored for algae prevention. Higher concentrations of phosphate can start to interfere with the mineral balance within fish. What is the correct phosphate level? The ideal phosphate concentration should be as close to zero as possible. While some phosphate is desirable to aid with the healthy growth of higher plants, only trace amounts between 0 and 0.25 mg/L PO4-P are required. What do I do if the Phosphate level is wrong? In most instances, regular partial water changes with dechlorinated tap water should help to keep the phosphate low. Check the phosphate concentration in the tap water too to make sure phosphate isn’t being accidentally introduced. Algae Gone is a liquid solution that can be used to bind phosphate. Aquarium Phosphate Remover is a filter medium that has a high affinity for phosphate and can provide continual phosphate removal for 3 months (depending on phosphate load). How do I do the test? Ensure the test tube is clean. Take a 5 ml sample of aquarium water into the test tube. Add 5 drops of the phosphate reagent, place the cap on the tube and mix gently for a few seconds. Wait 5 minutes for the test to develop, remove the cap and look down through the test tube to determine the colour. Compare this colour to the colour chart provided to determine the phosphate concentration.
<urn:uuid:00ef9720-f4ad-4405-9cd0-00d1b5448cdb>
CC-MAIN-2023-50
https://fishcove.co.uk/products/nt-labs-phosphate-test-liquid
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00819.warc.gz
en
0.942468
409
3.5625
4
The prostate is a gland that is part of the male reproductive system. The prostate is a walnut-sized gland located between the bladder and the penis. The function of the prostate is to secrete a slightly alkaline fluid, milky or white in appearance, that in humans usually constitutes roughly 30% of the volume of the semen along with spermatozoa and seminal vesicle fluid. Average dimensions of the prostate are: 3.5 x 4.5 x 2.5 cm. Weight for normal prostate ranges between 16 and 22 grams. From the age of 30 for many men there is an increase in size of the prostate. Usually it is a benign prostatic hyperplasia (BPH). The disease is very common, to the point that, although wrong, often believed that this is normal. With increasing age and the incidence of this disease so that 50-90% of men aged between 50 and 80 years have signs of BPH. The importance of this disease is that the enlarged prostate can press the urethra Abstract reducing the flow of urine and thus make it difficult urination. On the other hand inflammation of the prostate (prostatitis) can occur at any age, so no man is spared the risk of developing some types of prostatitis. The most common ailments on prostate: The most common diseases of the prostate are: -Benign Prostatic hyperplasia (BPH); -Prostatitis (inflammation of the prostate); -Carcinoma of prostate. Each of these diseases in different ways affects the health and life of man. Potension and prostate Erectile function was not directly affected by the prostate, so that, theoretically, disturbances in the function of the prostate should not affect sexual function. In practice it is, however, different. The vast majority of men who have prostate problems or suffering from a prostate disease has a minor or major problems with their sexual function. Symptoms of inflammation of the prostate Inflammation of the prostate following strong pain, fever, abdominal uneasy sexual organs, frequent urges to urinate, and pain during sexual intercourse. The inflammation can become chronic, which are milder pain, and eventually leads to sterility. Regular control can save your life. For example, after detection of prostate cancer on time, is virtually curable, and the patient continues normal life. Avoiding regular controls can do nothing. When you feel the first symptoms of any prostate pain usually has it in quite an advanced stage when treatment is less effective. So, the best thing you can do for yourself when it comes to prostate are regular check-ups. Just regular prostate checks allow you to live a carefree and relaxed.
<urn:uuid:68b65ead-1739-4d39-b28c-0abed8125026>
CC-MAIN-2017-51
http://besthealthypage.com/learn-more-about-prostate-basic-review/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948594665.87/warc/CC-MAIN-20171217074303-20171217100303-00441.warc.gz
en
0.940569
557
3.046875
3
Since President Richard Nixon first declared a nationwide War on Drugs in June 1971, law enforcement and the U.S. government have operated under the idea that the best drug policy was to jail anyone using or selling drugs. Debate continues to rage about how effective this has been over the last 40 years. Many believe that the War on Drugs has created more problems than it has solved, such as treating addicts like criminals instead of treating drug addiction as a medical condition. There are also the class issues involved with how drug abuse is punished, prison overcrowding, increasing violence and death connected to drug cartels, and finally a growing movement for legalization of drugs. These topics would serve as good research paper topics to explore for a range of classes from political science to sociology to criminal justice. Time for a new approach A recent academic report from the London School of Economics (LSE), authored by five Nobel prize-winning economists, Britain’s deputy prime minister and a former U.S. secretary of state, stated it is time for the world to figure out a new way to handle drug abuse. A May 7, 2014, article for Aljazeera.com, “Global drugs war a ‘billion-dollar failure’,” highlights the many ways that the current drug policy has failed people and governments around the world. The report cited the following as outcomes of the current War on Drugs: - Mass drug-related incarceration in the U.S. - Corruption and violence in developing countries - An HIV epidemic in Russia - Creation of a $300 billion black market The Aljazeera article also quoted John Collins, coordinator of international drug policy at the LSE, who said, “Leaders need to recognise that toeing the line on current drug control strategies comes with extraordinary human and financial costs to their citizens and economies.” An issue of class While certainly prison overcrowding and the enormous black market for drugs are huge issues to be dealt with, the dangers of drug abuse and how poorly our current drug policy handles those with an addiction is also crucial. In “The War on Drugs Becomes an Issue of Class” published on February 9, 2014, in the Daily Herald (Arlington Heights, IL) acknowledges how those with money are able to handle their drug addition in an altogether different manner than the poor. The article says that although billions have been spent in the War on Drugs, “the drugs are cheaper and easier to find than ever. The war enriches dealers by constricting the supply while turning addicts into criminals afraid to publicly confront their drug use.” Meanwhile, the governor of Vermont, which is facing a major heroin crisis in that state, wants to treat drug addition as the disease it is. Other government officials are less understanding, with Republicans denying federal aid to any student with a drug offense through a last minute amendment to the Higher Education Act. The future of the War on Drugs policy Strides are being made to change how drug abuse and drug addiction are treated. Colorado and Washington have both voted as states on the legalization of drugs, in both cases marijuana for recreational use. But there are other ways that people are speaking out. The World Policy Blog posted “Cities Worldwide Protest the War on Drugs” by Marya Pasciuto on June 26, 2014, illustrated how grassroots movements are growing to change the way governments handle drug policy. Eighty cities around the globe participated in the day of protests. Pasciuto cites three cities holding protests: Kuala Lumpur, Mexico City and London. A major issue in Kuala Lumpur is the “death penalties for drug possession in Malaysia’s justice system,” which Pasciuto wrote disproportionally affect the poor. In Mexico City the focus will be more on Mexico’s violent and dangerous drug cartels that are linked to “over 60,000 deaths and 20,000 disappearances … reported from 2006-2012.” The protest in London is centered more on the racism and cultural stigma the United Kingdom’s drug laws create. Pasciuto wrote, “Current drug laws in the UK allow for mass searches of certain communities, which allow for racist police practices.” Whether it is prison overcrowding or drug cartels, the War on Drugs has not managed to eradicate drug abuse. Instead drug policy around the world has served to only exacerbate the problems, even creating additional issues. Do you feel that the War on Drugs has been more of a problem or a solid solution? Let us know what you think in the comments.
<urn:uuid:8770a169-9ea7-4c04-8a97-564d072bdf33>
CC-MAIN-2015-32
http://blog.questia.com/2014/07/how-the-war-on-drugs-is-a-problem-not-a-solution/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438043058631.99/warc/CC-MAIN-20150728002418-00188-ip-10-236-191-2.ec2.internal.warc.gz
en
0.960017
933
2.640625
3
Since March 2020, we have been living with an increased sense of instability, uncertainty, and confusion as our lives changed significantly with the emergence of a global pandemic. Positioned in this constant state of flux, many of us have become financially, socially, and emotionally insecure as we struggle to survive amidst an illness that not only saddens us but that has increased anxiety, tension, and fear in children and their families. Many have suffered losses, and our youth feel this deeply on a social-emotional level worldwide. The need for social-emotional learning (SEL) and strategies in school has become increasingly urgent for students, whether they are learning virtually, in person, or in a hybrid setup. This is especially true for those students who are dealing not only with the pandemic but with the impact and dehumanization caused by racism and fear as well. The harm is felt deeper when faced with racism, watching the unnecessary deaths of Black and Brown lives on the news, and inequities in schooling, healthcare, and housing. How do we further support students impacted on this deep level? We need to be ready to center their voices and allow them agency. A safe and caring environment needs to be provided where they can discuss what they are feeling and where they know that they are significant and worth hearing. Glenn Anton “Doc” Rivers, then the coach of the National Basketball Association’s Los Angeles Clippers, after seeing the shootings of Black citizens and the protests that grew in response to these shootings, shared the feelings and perceptions that have existed for Black, Indigenous, and People of Color (BIPOC) in this country and that have been even more visible during the pandemic: My father was a 30-year veteran of the Chicago police department, and if he were still with us right now, he’d be hurt and outraged by the senseless acts of racial injustice that continue to plague our country. Being black in America is tough. I’ve personally been called more racial slurs than I can count, been pulled over many times because of the color of my skin, and even had my home burned down.Pickman, 2020 It’s amazing to me why we keep loving this country, and this country does not love us back.Pina, 2020 We need to be thoughtful about how SEL skills and strategies are implemented in a classroom focused on racial equity and social justice. The Responsive Classroom core belief states, In order to be successful in and out of school, students need to learn SaintSurina set of social and emotional competencies— cooperation, assertiveness, responsibility, empathy, and self-control—and a set of academic competencies—academic mind-set, perseverance, learning strategies, and academic behaviors (Center for Responsive Schools, n.d.). If we keep this core belief as our focus, we can create and lay a foundation for our students that will enable a supportive community where they know they belong and feel significant. What follows are some strategies and suggestions that can help in making time to teach SEL skills with students and with centering the needs and experiences of BIPOC students. In the Responsive Classroom approach, building community is something that is focused on and embraced when planning the school year. There are many strategies that support building a positive community with all students and specific practices that allow space to center and lift up students of color dealing with issues such as bias, racism, and inequity. Know Your Students. One of the guiding principles of Responsive Classroom is to inform our expectations, reactions, and attitudes about our students by knowing them individually, culturally, and developmentally. This is a powerful statement when we center students of color and their voices in class. For this to be successful, the teacher needs to become familiar with the experiences of students of color so that the teacher is more aware and knowledgeable. The teacher must avoid getting defensive and passing judgment. When students share difficult topics such as racism, implicit bias, inequities, and injustices, we need to remember that we are being invited into their worlds. Ijeoma Oluo makes this point about conversations on race in So You Want to Talk About Race: If your top priority is understanding racism better, or addressing an incident involving race, or righting a wrong caused by racism, don’t let the top priority suddenly become avenging your wounded pride if the conversation has you feeling defensive.Oluo,2020, p. 46 Morning Meeting, Responsive Advisory Meeting, Closing Circle. Beginning the day with Morning Meeting or Responsive Advisory Meeting for 20–30 minutes and ending with a 5- to 10-minute closing circle is a powerful way to communicate to each student that we are glad they came to school, that they matter to the community, and that their thoughts and reflections are valued. This special time of greeting each other, sharing verbally, participating in an activity as a group, and receiving messages and announcements from the teacher affords an opportunity to be in community with each other and develop trust, relationships, and student agency on a daily basis. These meetings can be validating for students and affirm that their experiences, stories, and cultures are welcome in a safe environment. (These in-person get-togethers can be easily adapted for hybrid or distance learning.) Role-Play. A strategy that involves the thoughts, input, and voices of students in problem-solving a social interaction affecting the class community, role-play allows student agency, sharing, and reflecting where everyone can be heard. Students brainstorm and act out positive and beneficial responses to complex, sometimes uncomfortable, social circumstances and dilemmas. Role-play can also be used before a circumstance arises (e.g., choosing teams fairly) or to revisit something that has happened to prevent it from recurring (e.g., misunderstandings when communicating). Teacher Language. Reinforcing, reminding, redirecting, and envisioning language can also be modeled and offer support to a student sharing the injustices and racism they experience in the world. By recognizing the student’s strengths, we create the means to respect the student and make room for their voice and experience. For example, when a student shares a sentiment similar to those of Doc Rivers in an environment that is loving and accepting, they can experience the validation of being listened to, heard, respected, and affirmed regarding how difficult living with such negative, harmful experiences can be. Creating Rules. The process of creating positive rules with the class is another way to offer support to students, especially those sharing the heaviness and discomfort of issues such as injustice, racism, and inequity. When a learning community creates agreements together, it gives them a voice in how they want to interact. This, in turn, offers opportunities for accountability to themselves, to each other, and to the community to respectfully honor the covenant that protects them and their rights to belong and feel significant. Engaging Academics. When difficult topics such as social injustice, inequity, prejudice, racism, and bias arise during class time, conversations can get uncomfortable. But if we lean into this discomfort, there may be opportunities to learn more deeply about these issues. When the content matters to students, the motivation increases. If we can meet these opportunities with student-directed instruction and high expectations, we can see the emergence of resilient students who feel that their thinking and work is valuable to the whole community and who feel safe to take risks. Interactive learning structures and Academic Choice are strategies that support student engagement in collaborating, discussing, agreeing, and disagreeing— all of which are social skills that can be taught and supported. If we allow for discussions that share perspectives and plan for the voices of marginalized students to be centered, then we can integrate these topics into our academic curricula while working on SEL skills involving collaboration, discourse, perspective taking, and critical thinking. For example, if a young student reports that a peer commented that their skin is ugly or too dark, an opportunity arises for the whole class to learn about race and differences. Teachers can select texts such as Laleña Garcia’s What We Believe: A Black Lives Matter Principles Activity Book (2020) to share on this topic and to help with conversations among students. Cross-curricular connections can extend students’ learning by engaging them in collaborative small groups to write letters to activists, invite visitors with experience in protesting and marching for human rights to speak to the class, or make posters about the Black Lives Matter principles. In another scenario, students could explore the Black Lives Matter movement as a way to deal with a microaggression or bias against them. This experience will not only deepen their feelings of being validated, affirmed, and acknowledged, but it could also potentially help students understand and learn about earlier movements—the struggle for civil rights, the Black Panther Party, the Young Lords, the Student Non-Violent Coordinating Committee (SNCC)—and what parallels exist between them and Black Lives Matter. Exploring a movement such as Black Lives Matter will allow for self-identity and awareness opportunities along with student-directed exploration and discovery of perspective taking and the analysis of power and position in our society. It will also better prepare students to problem-solve any future microaggressions or biases. Commit to Doing the Work. Since the deaths of George Floyd, Breonna Taylor, Ahmaud Abery, and others last year, we are witnessing further outcry about the way BIPOC (black, indigenous, and people of color) are villainized because of racism. The urgency to no longer tolerate silence and to share our voices and actions is growing. Many students feel uncomfortable and scared, and do not know how to proceed to improve the circumstances. If support is needed in moving forward with our words, discussions, and actions, then consider taking workshops on antiracism, implicit bias, and undoing racism. Start with friends and families, in community together. Join a book club whose focus is on racism, bias, and race relations both past and present. Attend a workshop on undoing racism. The People’s Institute for Survival and Beyond offer “The Undoing Racism Workshop,” where core trainers delve deeply into racism historically, structurally, and institutionally, along with how it manifests in our interactions with each other and within our communities. Creating a safe and challenging class where students feel engaged, heard, significant, and that they belong is at the heart of Responsive Classroom practices and strategies. We need to give students the permission to interact and share in culturally affirming environments that support social-emotional learning on all levels. If we work to build our communities based on the individual and collective identities of our students, including those who are marginalized, we can support them with strong SEL strategies that will lift them up and center them when they have experiences, thoughts, concerns, and strong feelings about the biases, injustices, and prejudice against them. This involves our commitment to them, our communities, and ourselves. We can empower our youth to know and believe that they genuinely matter and that they all belong in our class community and world—without the prejudiced, predetermined, noninclusive societal definition of what belonging should look like. - Center for Responsive Schools. (n.d.). RC-Approach-Handout [pdf]. Responsive Classroom. https://www.responsiveclassroom.org/wpcontent/uploads/2018/07/RC-Approach-Handout.pdf - Garcia, L. (2020). What we believe: A Black Lives Matter principles activity book (C. Davidson Illus.). Lee and Low Books. - Oluo, I. (2019). So you want to talk about race. Seal Press. - Pickman, B. (2020, May 31). Clippers HC Doc Rivers: “Words carry a lot of weight and your ballots carry even more.” Sports Illustrated. https://www.si.com/nba/2020/05/31/doc-rivers-statement-protests-clippers - Pina, M. (2020, August, 28). Doc Rivers has been fighting racism all his life. GQ. https://www.gq.com/story/doc-rivers-has-been-fighting-racism-all-his-life
<urn:uuid:0ef3d9ba-cfad-43ec-b840-41ddac56f7b6>
CC-MAIN-2023-06
https://www.crslearn.org/publication/reflecting-rebuilding-digest-edition/social-emotional-learning-strategies-with-a-focus-on-racial-equity/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499949.24/warc/CC-MAIN-20230201180036-20230201210036-00432.warc.gz
en
0.951755
2,542
2.6875
3
Would you be willing to eat Human Cheese? The idea repulses me, and I’m guessing it repulses you too. Why is that? This is one of the questions that New York University graduate student Miriam Simun poses with her Human Cheese Project. She has manufactured human cheese from the breast milk of two women who were overproducing and saving their milk in freezers, finding it too painful to throw away. The purpose of Simun’s project is to inspire conversation about food systems, bio-technology, and the human body. In her project description, she asks: As global urban populations increase, developing nations industrialize, and energy, water and land become ever more scarce resources, how will we redesign our food systems to produce healthier, kinder, more sustainably and efficiently produced food? As we navigate the complex landscape of technologically modified food production, how do we understand what is natural, healthy, ethical? Other questions naturally arise, like: Is it exploitative of the women who provide the milk? Is it okay for Vegans to eat human cheese? Is it cannibalistic? And, of course, the obvious sociological question arises: Why is it that we don’t cringe at the thought of eating cow’s milk, goat’s milk, or even sheep’s milk, while the thought of eating human milk, which we are biologically equipped to consume, repulses us? So…is human cheese a reasonable, humane, healthy, kinder alternative? And more importantly, how does it taste? It looks like Simun isn’t the only person experimenting with human cheese. This New York chef came up with a recipe using his wife’s breast-milk:
<urn:uuid:cf7359b2-fdbe-42f1-9bfa-f5b5be2bc08f>
CC-MAIN-2022-27
https://www.elephantjournal.com/2011/01/would-you-eat-human-cheese/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104204514.62/warc/CC-MAIN-20220702192528-20220702222528-00035.warc.gz
en
0.934135
371
2.546875
3
Planetary Defense. The close passage of asteroid 2004FH (42,000 kilometers from Earth) brings to mind the question as to whether or not anything can be done about one that is going to hit. The short answer is, not much. Asteroid 2004FH, being only 100 feet across, was small and probably would have detonated in the atmosphere. However, even that sort of impact could ruin a citys day. The Tunguska event of 1908 was either a small icy comet or meteorite that detonated about ten kilometers up with a force of up to 30 megatons. Had that occurred over a major city, the results would have been catastrophic. Air Force Space Command has been working on the planetary defense mission, sending the Clementine probe up, and testing lightweight technology developed via the Strategic Defense Initiative of the 1980s. The asteroid flyby portion of Clementines mission failed, and Clementine II, a mission to dart asteroids, was cancelled in 1997. However, a NASA probe, NEAR-Shoemaker, launched by a Delta II, entered into orbit around the asteroid Eros on February 14, 2000, and eventually landed on it. This was an important, if unheralded milestone in carrying out the mission of planetary defense. If you can land a space probe on an asteroid, you can land another kind of spacecraft on an asteroid. The real challenge, however, is finding and tracking an asteroid to get a long-enough lead time to apply that technology. Asteroid 2004FH was detected on March 15th less than four days before its close pass. NEAR-Shoemaker took 28 months to develop and four years to approach Eros. There may also be an issue with booster availability. The Titan 4 is probably the booster that would be used. However, the Air Force has a total of ten left, albeit with no launches scheduled (prior to 2004 there had been as many as five launches a year present capability is eight launches a year, but can surge to twelve). The Delta III booster, which is almost as capable as the Titan 4, failed in two launches (destroyed in 1998 after going off-course, the next flight put a satellite in the wrong orbit. A third launch was with a dummy payload). The Titan II, a refurbished ICBM, and the previously mentioned Delta II could also be used to launch an interceptor. Should an asteroid be headed for Earth, the interceptor to rendezvous with it would probably be carrying a nuclear weapon. The objective would be to either deflect the asteroid by detonating the nuclear weapon a short distance from the surface of the asteroid or to go for a hard kill. The latter would be accomplished through a nuclear detonation that would either disintegrate or fragment the asteroid by placing the nuclear weapon in contact with the asteroids surface. Harold C. Hutchison ([email protected])
<urn:uuid:2cb62da9-45dc-4323-a851-06def43003bb>
CC-MAIN-2018-09
https://www.strategypage.com/htmw/htspace/articles/20040323.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812978.31/warc/CC-MAIN-20180220145713-20180220165713-00363.warc.gz
en
0.970161
593
3.3125
3
Power Quality and Management Power quality is a measure of how well an electrical system supports the reliable operation of its loads. Poor power quality is a result of a disturbance or event in the system that can cause deviation in voltage, current, or frequency. Power disturbances can originate from the utility supply or from operations in the plant facility itself. A portion of this course has been designed to provide participants with an understanding of these issues that affect power quality in an industrial plant, its effects on the operation of electrical equipment, and remediation techniques used to lessen their impact. Today’s industrial power systems are complex with several power sources and several loads with different level of importance to the operation of an industrial plant. Modern power management systems help avoid blackouts and manage the system for optimum efficiency. A portion of this course has been designed to familiarize the participants with the typical parameters that are monitored and controlled by power management systems. It will include the hardware, communication, and software available for power management systems. Upon completion of this course, participants should have a better understanding of the technology related to power quality and power management within the industry. Having this knowledge will help each technician develop confidence and professional enthusiasm, therefore, increasing their efficiency. The knowledge that technicians gain from this course will be further expanded by on-job training and practical experience they will receive throughout the duration of their career. Power Quality Management - Sources of poor power quality - Standards for power quality - Measuring power quality - Methods for improving power quality Day one discussions will include power quality management topics. Participants will be introduced to power quality terms such as voltage dips, voltage spikes, flicker, and harmonic distortion. Reasons for these variants and methods used to control their impact will be explained. Instruments used to measure the power quality parameters and standards used for acceptable deviation levels will be covered. Power Management Systems - Typical power management system layout - Load control - Active and re-active power control - Integration with protection scheme The topics on day two will cover power management schemes. The participants on this day will gain an understanding of how brownouts and blackouts can be avoided by load shedding and load sharing techniques. They will also be introduced to voltage control using the re-active power control method. Main components found in typical power management systems, including hardware and software, will be covered. This day will conclude with a discussion on the advantages of integrating protective relay system with the power management system. This course is designed for electrical technicians, maintenance planners, supervisors with operation and maintenance responsibilities, and others who work in an industrial plant setting. Participants should be familiar with electrical installations in an industrial setting.
<urn:uuid:8accc17d-7994-4a4f-b3ff-c8390e557c8b>
CC-MAIN-2018-30
http://www.nexttraining.net/Courses/Details/OM-TC2-NXT19970/Power-Quality-and-Management.aspx?trainingplan=True
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591455.76/warc/CC-MAIN-20180720002543-20180720022543-00317.warc.gz
en
0.925161
543
3.4375
3
FM Generation using 555 Timer In communication systems, Frequency Modulation (FM) is the process in which information (message signal) is transmitted over a carrier wave by varying its instantaneous frequency. The difference between instantaneous frequency and central frequency of the carrier will be directly proportional to the instantaneous value of the amplitude of message signal. 555 Timer wired in Astable Mode can be used for generating Frequency Modulated (FM) waves. Please read the article Astable Multivibrator using 555 Timer for more details about the circuit. In astable multivibrator we don’t use the 5th (Control Voltage) pin of 555 but here we fed the message signal to this pin which results in the variation of frequency. 8th and 1st pin of the 555 are used for giving power, Vcc and GND respectively. 4th pin is the Reset pin which is a active low input, since it is tied to Vcc. When the output is high, capacitor C1 charges to Vcc through R1 and D. When the output is low, capacitor discharges through resistor R2 and 7th of the IC. This charging and discharging time periods determines the time period of output. Message signal is fed to 5th (Control Voltage) pin of the IC through a coupling capacitor and the output can be taken from the 3ed pin of the IC. I hope that you read the working of Astable Multivibrator using 555 Timer. Central frequency or Carrier frequency of the generated FM can be determined from the expression, fo = 1/(1.4RC), where R = R1 = R2 and C = C1. When an input voltage (say V) is given to Control Voltage pin, the upper and lower comparator reference changes to voltages V and V/2. So when the capacitor voltage becomes less than V/2, output becomes high and the capacitor starts charging to Vcc through resistor R1 and diode D. When the the capacitor voltage becomes greater than V, output becomes low and the capacitor starts discharging through resistor R2 and 7th pin of the IC. So the time period is proportional to the input voltage V. So as V increases, time period of the output wave increases and when V decreases time period of the output wave decreases. - fo = 1/(1.4RC), where R = R1 = R2 and C = C1 - Coupling capacitor C3 is designed in such a way that it can couple the input message signal. You can use our 555 Astable Multivibrator Calculator in the bottom of the article Astable Multivibrator using 555 Timer for easy calculations. Hi there, thank you for the project but I have a problem I made the circuit correctly and used the right capacitors and resistors with the right values but it didn’t work, I even checked the connections and there were no problems, I also tried every single FM wave from 87.5 to 108 and none of them worked, and I connected a antenna as well but no hope, can you help me please, thank you. (By the way I used a 10uF 50V electrolytic capacitor if that matters, the 0.1uf capacitor is ceramic) (something else, can i put a microphone at the input signal?) Shouldn’t frequency be 1/(0.693*2*R*C)? The period is 2*0.693*R*C (As we are first charging and then discharging through the RC). It should be in the Range 88 to 108MHz, but 555 will not work on that range. what will be the frequency of modulation so i tuned my moble radio …sir! ya u can give 4 volt also Please give me more details like the following. 1. Input Voltage 2. Input Frequency 3. How are you checking the output etc.. lo arme igual que el diagrama y no logro conseguir la modulacion de FM, que frecuencia y amplitud debe tener la senl moduladora? Check the frequency limits of 555. Can the input signal be smaller than 5V p-p?? Given the formula for oscillating frequency, by varying the values of R and C, it’s possible to get f in range of 88 to 108Mhz right? yes.. variable frequency. please tell me variable frequency or not. if it is variable please tell me range its 42 its always 42 what is the maximum carrier frequency we can generate using 555 Try using any fm demodulators.. but how demodulate this signal ? That is not a good idea…. For generating frequency modulated sine wave.. you should try a different circuit……. Use a sine wave oscillator with.. a varactor diode.. Is there a way to convert the modulated square wave to a modulated sinusoidal wave? Can you use a sharp low pass filter? But we can produce frequency modulation…. @ Abhay – will the 555 oscillate in the 88 to 108 Mhz range ? No, you can’t make a demodulator using 555.. And is there any way to make a Demodulator(receiver) using 555??? ok…can i directly connect an antenna at pin3 I think you need external antenna.. It depends on the frequency of carrier.. WILL PIN 3 WORK AS ANTENNA??
<urn:uuid:2da10209-934f-421a-ace2-3d35c8aba0aa>
CC-MAIN-2023-14
https://electrosome.com/fm-generation-using-555-timer/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00166.warc.gz
en
0.847044
1,168
3.15625
3
BLUFDefense Advanced Research Projects Agency (DARPA) program is beginning the next phase of an experiment to assess the feasibility of nuclear-powered propulsion systems operating between the Earth and the Moon. This article by Courtney Albon, writing for Defense News, makes the following points: - The area between Earth and the Moon is known as ‘cislunar’ space. - DARPA awarded General Atomics a $22 million contract to develop a design for a nuclear thermal propulsion reactor and subsystem—the centrepiece of the program. - Blue Origin and Lockheed Martin each won contracts valued at $2.5 million and $2.9 million to design a spacecraft using a nuclear thermal propulsion system. - In the past few years, the US Defense Department has changed its posture toward cislunar space, shifting from an earlier view that deep-space threats were part of a distant future. Recent Runway Posts related to this topic: - 'SPACE' (Operating in and use of) 01: COLLECTION | The Runway (airforce.gov.au) - Alternative Link: 'SPACE' (Operating in and use of) 01: COLLECTION References from the Web: - MAY 2022 DARPA seeks in-space demonstration of nuclear thermal rockets—Electronics Weekly - MAY 2022 DARPA moving forward with development of nuclear powered spacecraft—Space News - MAY 2022 DARPA prepares to launch a spacecraft with nuclear reactor—Universe Magazine - Article Source: Defense News - Media Check: Defense News - Media Bias Fact Check (mediabiasfactcheck.com)
<urn:uuid:708607b7-0b67-437d-8a74-a6e8c1aba8bd>
CC-MAIN-2023-23
https://runway.airforce.gov.au/resources/link-article/darpa-s-nuclear-space-propulsion-project-advances-next-phase
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00756.warc.gz
en
0.885387
348
3.15625
3
Canada, as a British Dominion, was until 1982 governed by a constitution that was a British law and could be changed only by an Act of the British Parliament. Patriation thus specifically refers to making the constitution amendable by Canada only, with no role for the Parliament of the United Kingdom to play in the amending process. Hence, patriation is associated with the adoption of the Canadian amending formula, and the corresponding acquisition of sovereignty. This, however, did not stop continued negotiations between federal and provincial levels of government in Canada to develop a new amending formula in which the United Kingdom would have no part. In the 1960s, efforts by the governments of Prime Ministers John Diefenbaker and Lester Pearson culminated in the Fulton-Favreau formula, but without Quebec's endorsement, the patriation attempt failed. Soon the other eight premiers came to an agreement, and submitted their own plan for a constitution, without a Charter of Rights; and with an "opt out" clause for federal programs with equivalent funding given to the province(s). They would be dubbed the "Gang of Eight" by the media. Surprisingly included among them was René Lévesque, because it meant Lévesque was refusing the traditional Quebec demand for a veto power over future constitutional amendments. Lévesque was not trusted by many in the group until he signed the document, and many of the "Gang's" later problems would be attributed to the fact that Lévesque thought the agreement was a final one when he signed it, not a starting point for negotiations as the other premiers understood it. Trudeau rejected the proposed document out of hand, and then threatened to take the case for patriation straight to the UK Parliament, "…[without] bothering to ask one premier." The "Gang" soon appealed to the Supreme Court of Canada. The decision was controversial, and a loss for the "Gang." Lévesque would later remark, "In other words, Trudeau's goals might be unconstitutional, illegitimate, and even 'go against the principles of federalism,' but they were legal!" The other seven opposition premiers were startled: Canadians nationwide were mostly in agreement with Trudeau on the issue, and were tired of the constant constitutional talks. A referendum would surely give him what he wanted with the backing of the people, undermining provincial powers. Even though Lévesque would later back off of the referendum proposal, saying it looked as though it was "written in Chinese," Trudeau had succeeded in breaking up the Gang of Eight. Lévesque went to sleep in Hull, Quebec for the night, telling the other premiers to call him if anything happened. The next morning, Lévesque walked into the premiers’ breakfast and was told a deal had been made. Lévesque refused to agree to the deal and left the meeting. Quebec announced on November 25, 1981, that it would veto the deal. However, the Supreme Court issued a ruling on the matter on December 6, 1982, stating that Quebec had never held such veto powers. Until the Quebec Liberals came to power in 1985, every law passed in Quebec used the "Notwithstanding Clause." The events were very divisive in Canada. Many Québécois saw the deal as the English-speaking premiers stabbing Quebec in the back, which would prompt many Quebec nationalists to call it the "Night of the Long Knives. Many in English Canada saw Lévesque as trying to do the same to the English-speaking premiers by accepting the referendum. Among those was Brian Mulroney, who said that "[b]y accepting Mr. Trudeau's referendum idea, Mr. Levesque himself abandoned, without notice, his colleagues of the common front." Jean Chrétien's role in the negotiations made him almost universally reviled among sovereigntists. With this agreement, the Canada Act 1982 was therefore approved by the governments of the United Kingdom, Canada, and all provinces save Quebec. The Canada Act contained the Constitution Act 1982, which included an amending formula involving only Canadian governments. Section 2 of the Canada Act, meanwhile, plainly states that no subsequent UK law "shall extend to Canada as part of its law." Elizabeth II, the Queen of Canada, who proclaimed the patriated constitution in Ottawa in 1982, was aware of the rift Quebec's exclusion had caused. Thus, being aware that this was the first time in Canadian history that a major constitutional change had been made without the Quebec government's agreement, the Queen demonstrated her position as head of the whole Canadian nation, and her role as conciliator, by privately expressing to journalists her regret that Quebec was not part of the settlement.
<urn:uuid:07a28db6-1fbb-4581-bb4e-307c8531523a>
CC-MAIN-2015-22
http://www.reference.com/browse/patriation
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928907.65/warc/CC-MAIN-20150521113208-00204-ip-10-180-206-219.ec2.internal.warc.gz
en
0.982978
963
3.53125
4
Academic Integrity means acting with honesty, fairness and responsibility in learning, teaching and research. It involves observing and maintaining ethical standards in all aspects of academic work. Everyone at Charles Sturt is responsible for the integrity of all academic activity. The following resources can help you foster Academic Integrity in your teaching practice and help students avoid academic misconduct. TEQSA has developed free Academic Integrity resources that are free to use by students, academics and providers: Academic integrity ELMO training is currently available for fixed and full time continuing staff. This is compulsory for academic and some professional/general staff members. These staff will be required to repeat this every three years. Hrasky, S., & Kronenberg, D. (2011). Curriculum redesign as a faculty-centred approach to plagiarism reduction. International Journal for Educational Integrity, 7(2), 23–36. https://doi.org/10.21913/IJEI.v7i2.761
<urn:uuid:0ebbd372-6951-4e81-8f2f-4f7b69078245>
CC-MAIN-2023-23
https://www.csu.edu.au/division/learning-teaching/teaching/academic-integrity
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644855.6/warc/CC-MAIN-20230529105815-20230529135815-00455.warc.gz
en
0.929159
202
2.765625
3
Groundhog facts for kids |Groundhog at Laval University campus, Quebec, Canada| The Groundhog is a rodent. It is also called a woodchuck. It belongs to the group of ground squirrels. Those squirrels are also known as marmots. The animal may also be called Woodchuck, or Whistlepig. Groundhogs dig tunnels and live underground. Groundhog holes, called burrows, are easy to recognize; they are holes, about 9.in (inches) (23 cm (centimeters)) wide which usually have large piles of dirt and rocks at the entrance. Every single hole, may have tunnels which lead to as many as ten other holes, the tunnels are very large and can have chambers, like rooms, in them. Groundhogs can make their homes under trees, around buildings and in open fields. The time spent observing groundhogs by field biologists represents only a small fraction of time devoted to the field research. W.J. Schoonmaker reports that groundhogs may hide when they see, smell or hear the observer. Ken Armitage, marmot researcher, states that the social biology of the groundhog is well understudied. Despite their heavy-bodied appearance, groundhogs are accomplished swimmers and occasionally climb trees when escaping predators or when they want to survey their surroundings. They prefer to retreat to their burrows when threatened; if the burrow is invaded, the groundhog tenaciously defends itself with its two large incisors and front claws. Groundhogs are generally agonistic and territorial among their own species, and may skirmish to establish dominance. Outside their burrow, individuals are alert when not actively feeding. It is common to see one or more nearly-motionless individuals standing erect on their hind feet watching for danger. When alarmed, they use a high-pitched whistle to warn the rest of the colony, hence the name "whistle-pig". Groundhogs may squeal when fighting, seriously injured, or caught by a predator. Other sounds groundhogs may make are low barks and a sound produced by grinding their teeth. When groundhogs are frightened, the hairs of the tail stand straight up, giving the tail the appearance of a hair brush. David P. Barash wrote he witnessed only two occasions of upright play-fighting among woodchucks and that the upright posture of play-fighting involves sustained physical contact between individuals and may require a degree of social tolerance virtually unknown in M. monax. He said it was possible to conclude, alternatively, that upright play-fighting is part of the woodchuck's behavioral repertory but rarely shown because of physical spacing and/or low social tolerance. Mostly herbivorous, groundhogs eat primarily wild grasses and other vegetation, including berries and agricultural crops, when available. In early spring, dandelion and coltsfoot are important groundhog food items. Some additional foods include: sheep sorrel, timothy, buttercup, tear thumb, agrimony, red and black raspberries, buckwheat, plantain, wild lettuce, all varieties of clover, and alfalfa. Groundhogs also occasionally eat grubs, grasshoppers, insects, snails and other small animals, but are not as omnivorous as many other Sciuridae. Like squirrels, they also have been observed sitting up eating nuts such as shagbark hickory, but unlike squirrels, do not bury them for future use. Groundhogs will occasionally eat snails, insects and baby birds they come upon by accident. An adult groundhog will eat more than a pound of vegetation daily. In early June, woodchucks' metabolism slows, food intake decreases, their weight increases by as much as 100% and fat deposits are produced upon which they will live during hibernation and late winter. Instead of storing food, groundhogs stuff themselves to survive the winter without eating. Thought not to drink water, groundhogs are reported to obtain needed liquids from the juices of food-plants, aided by their sprinkling with rain or dew. Groundhogs are excellent burrowers, using burrows for sleeping, rearing young, and hibernating. W.J. Schoonmaker excavated 11 dens finding the earth removed from these averaged six cubic feet or four and eight-tenths bushels per den. The longest burrow was 24 feet plus 2 short side galleries. The amount of soil taken from this den was eight bushels and it weighed 640 pounds. The average weight of the earth taken from all eleven dens was 384 pounds. Though groundhogs are the most solitary of the marmots, several individuals may occupy the same burrow. Groundhog burrows usually have two to five entrances, providing groundhogs their primary means of escape from predators. Burrows are particularly large, with up to 14 metres (46 ft) of tunnels buried up to 1.5 metres (5 ft) underground, and can pose a serious threat to agricultural and residential development by damaging farm machinery and even undermining building foundations. In a June 7, 2009 Humane Society of the United States article, "How to Humanely Chuck a Woodchuck Out of Your Yard", John Griffin, director of Humane Wildlife Services, stated you would have to have a lot of woodchucks working over a lot of years to create tunnel systems that would pose any risk to a structure. The burrow is used for safety, retreat in bad weather, hibernating, sleeping, love nest, and nursery. In addition to the nest, there is an excrement chamber. The nest chamber may be about twenty inches to three feet below ground surface. It is about sixteen inches wide and fourteen inches high. There are typically two burrow openings or holes. One is the main entrance, the other a spy hole. Description of the length of the burrow often includes the side galleries of the burrow. Excluding the side galleries, Schoonmaker reports the longest was twenty-four feet, with the average length of eleven dens dug out to be fourteen feet. W.H. Fisher investigated nine burrows, finding the deepest point to be forty-nine inches down. The longest, including side galleries, was forty-seven feet eleven and one half inches. Numbers of burrows per individual groundhog decreases with urbanization. Bachman mentioned that when the young groundhogs are a few months old, they prepare for separation, digging a number of holes in the area of their early home. Some of these holes were only a few feet deep and never occupied but the numerous burrows gave the impression that groundhogs live in communities. Groundhogs are one of the few species that enter into true hibernation, and often build a separate "winter burrow" for this purpose. This burrow is usually in a wooded or brushy area and is dug below the frost line and remains at a stable temperature well above freezing during the winter months. In most areas, groundhogs hibernate from October to March or April, but in more temperate areas, they may hibernate as little as three months. Groundhogs hibernate longer in northern latitudes than southern latitudes. To survive the winter, they are at their maximum weight shortly before entering hibernation. When the groundhog enters hibernation, there is a drop in body temperature to as low as 35 degrees fahrenheit, heart rate falls to 4-10 beats per minute and breathing rate falls to one breath every six minutes. During hibernation, they experience periods of torpor and arousal. They emerge from hibernation with some remaining body fat to live on until the warmer spring weather produces abundant plant materials for food. Males emerge from hibernation before females. Groundhogs are mostly diurnal, and are often active early in the morning or late afternoon. Usually groundhogs breed in their second year, but a small proportion may breed in their first. The breeding season extends from early March to mid- or late April, after hibernation. A mated pair remains in the same den throughout the 31- to 32-day gestation period. As birth of the young approaches in April or May, the male leaves the den. One litter is produced annually, usually containing two to six blind, hairless and helpless young. Groundhog mothers introduce their young to the wild once their fur is grown in and they can see. At this time, if at all, the father groundhog comes back to the family. They encourage their young to copy their behaviors and during this time may differ from usual routines. By the end of August, the family breaks up; or at least, the larger number scatter, to burrow on their own. - See also: Groundhog Day Images for kids Groundhog Facts for Kids. Kiddle Encyclopedia.
<urn:uuid:515bb644-2cfe-4f06-8620-f87cb533b46f>
CC-MAIN-2019-13
https://kids.kiddle.co/Groundhog
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202572.29/warc/CC-MAIN-20190321193403-20190321215403-00284.warc.gz
en
0.956376
1,829
3.65625
4
How should the world react to US withdrawal from the Paris Agreement? Ignore Trump and get on with the job In pursuit of his America First agenda, Donald Trump has announced that he wants America to be the first country to withdraw from the Paris Agreement, just seven months after it entered into force. With the exception of Nicaragua and Syria, every country in the world signed the Paris Agreement. The overwhelming majority have now also ratified it. They signed it for a very good reason – the consequences of even two degrees of warming are severe. Changing weather patterns and rising sea levels will cause chaos. They can destroy ecosystems and damage the economy. In turn, this poses a real risk to global stability and security, leading to migration and provoking conflict. By pulling out of the Paris Agreement, Donald Trump will undoubtedly slow progress in some areas. One of the biggest impacts from US withdrawal is likely to be the loss of climate finance and assistance for developing countries. Under the Paris Agreement each country pledges its own nationally-determined contributions to global emissions reductions. But many countries made both absolute and contingent pledges, where a higher level of ambition was dependent on receiving international support. Without US federal money on the table, it is likely that some countries will take the easier of the two paths at least in the short term. However, Trump’s actions are unlikely to have any effect on the direction in which the world is travelling, which is increasingly towards a low carbon economy – primarily driven by the business opportunity. Progress to date is genuinely promising. The growth in global emissions has stalled, even as the economy grows. Investment in coal is collapsing, with stocks falling even in the face of US withdrawal. Renewable energy is far cheaper than predicted and being deployed at a faster rate. Battery technology is advancing far quicker than expected and the expectations for electric vehicle sales are going upwards in an increasingly steep curve. In the face of US backsliding, China and the European Union have stepped forward as global leaders and strengthened their commitments. Other major emitters like India are increasing their level of ambition and taking action ahead of schedule. This isn’t being done purely out of a spirit of altruism and goodwill. These countries believe it will give them a competitive advantage, creating wealth and new jobs. This is a business opportunity that could be missed out on by a nation that has a rich history of innovation, but is refocusing its efforts on the economy of the past rather than the economy of the future. But it is not all bad news. Even within the United States much of the current impetus for action on climate change will be unaffected. This is because the states, cities and businesses that are directly responsible for a large proportion of US carbon emissions are making their own bold commitments to action that will deliver meaningful change. The governors of 12 states representing a population of over 100 million Americans and almost 40 percent of GDP wrote to Trump to affirm their commitment to US commitments under the Paris Agreement, aiming if possible to go further and faster. The newly-formed United States Climate Alliance is already moving this forward, with founding members California, New York and Washington. Mayors are leading the charge locally, as they realise the hard benefits that green energy and clean transportation can deliver for their citizens, as well as understanding the risks of physical damage and disruption to services that climate change can cause. Trump’s actions have been strongly opposed collectively by the US Covenant of Mayors, with a number of individual cities making their voices heard, such as Nashville and Pittsburgh. And US businesses are continuing to boost their own levels of action on climate change and have been calling for continued government commitment. The Silicon Valley titans are on board – with the likes of Apple, HP, Microsoft, Intel, Google, Salesforce and Facebook taking out full page adverts to state their support, alongside others huge corporations including Mars and Morgan Stanley. The CEO of ExxonMobil, America’s biggest oil company, wrote personally to President Trump asking him to keep a seat at the negotiating table. And over one thousand companies and investors are signed up to the Business Backs Low-Carbon USA pledge, with a host of blue chip signatories including DuPont, NIKE, Kellogg Company, Hilton and Johnson & Johnson The reason this is all happening is because the evidence is clear and the case for action is unequivocal – or at least it is unequivocal outside of the current US administration. We have finally reached a tipping point where there is a clear and affordable path emerging to achieving a zero carbon world this century. And most governments, businesses and investors have woken up to the severe risks of failure to adapt, as well as the considerable opportunities in doing things better. When logic and common sense fail in the face of illogical and intractable opposition, there is only one thing to do, which is to ignore Trump and keep taking action on climate change. It is the right thing to do and many of the right things are already happening. It is time to get on with the job. Michael Rea is chief operating officer of the Carbon TrustCarbon Trust
<urn:uuid:c945d15f-b4b1-4612-9911-9f824107a78c>
CC-MAIN-2018-05
https://www.edie.net/blog/How-should-the-world-react-to-US-withdrawal-from-the-Paris-Agreement-Ignore-Trump-and-get-on-with-the-job/6098265
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886979.9/warc/CC-MAIN-20180117212700-20180117232700-00018.warc.gz
en
0.962344
1,042
2.703125
3
The need to adapt our urban areas and create more sustainable city environments takes on new significance in light of conversations held at COP26 last year. Getting it right means nurturing specialist skills, creating more jobs and embracing new ideas Britain’s cities were hit hard by the pandemic. A great number of the cultural and leisure attractions that make them so popular with inhabitants and visitors were shut down, and families moved out as they craved more space after the confines of lockdown. Services and accounting group PwC reports that 2021 could be the first time that London’s population has declined this century. Despite this, more than eight in 10 British people still live in urban areas, meaning that getting eco city living right is vital to ensure sustainable cities and communities across the UK. “We need to strengthen cities from the inside out,” says Lauren Sorkin, executive director of the Resilient Cities Network, which combines knowledge, partnerships and funding to support each of its members to become a more sustainable city. “We’re talking about a green and resilient city that looks at keeping people safe from the impacts of climate change that we know are baked in because of historic emissions, as well as looking at net zero.” Turning our cities green will create jobs, she says, in everything from managing flood risk to retrofitting buildings and measuring planning with the climate in mind. “Some of the skills are there but there are a lot of jobs to be created,” she adds. What is a sustainable city? Investment bank Schroders recently ranked Europe’s cities on a sustainability index, highlighting what really makes a city green. The bank ranked 59 cities on 13 different, equally weighted environmental issues including air quality, waste policies, renewable energy consumption targets, public transport and electrical charging vehicle stations. Despite London’s high ranking, second only to Amsterdam, Professor Will Eadson, professor of urban and regional studies at the Centre for Regional Economic and Social Research (CRESR), Sheffield Hallam University, says there’s plenty more to do. “We need to remake our cities so that they are clean, green and zero-carbon. This requires retraining, new jobs and new approaches to work in all professions. But it also offers an opportunity to rethink what we work for and the implications of our consumption habits for the work that others do – even those products that help us to be green and clean.” How to build a sustainable city Professor Eadson says that Britain needs to retrain an army of experts to green Britain’s cities further. “There is a need for huge numbers of new jobs for people with skills to implement the range of measures needed to decarbonise our buildings, industry and transport. We also need people with skills for achieving large-scale system change, catalysing processes of organisational and cultural change in urban public institutions, like local authorities, universities, schools and hospitals, as well as the private sector,” he says. His department has been looking at the employment and skills implications of moving to low-carbon heating in cities. “We found huge potential for job creation, especially for low- carbon heat engineers and insulation installers, as well as for those with transferable engineering and construction skills.” Tor Burrows, executive director, sustainability and innovation for property group Grosvenor Britain & Ireland, and COP26 ambassador for the built environment, says the skills shortage is already apparent. Her organisation is working to green its buildings and environs, including introducing new habitats in urban areas such as London’s Grosvenor Square, but she says that finding people with the right skills is key. “Councils have been pared right back, and not everyone has the skills to think sustainably,” she says. Many of Grosvenor’s buildings have listed status, and Burrows says this is a problem for sustainability. “There is a need for expert guidance and training on how to reduce carbon emissions in listed buildings,” she says. “Time and again we have proved that our nation’s historic assets can be sensitively adapted to changing times and new uses. But ambiguous policy, inadequate funding and a major skills gap are stalling our ability to help them adapt once more – this time against the climate emergency.” Sustainable cities of the future Britain’s cities will require new planning and architecture experts as well as retrofitting experts, Burrows says. Green apprenticeships and retraining for those in the construction industry will help to fill some of the gaps. But Sorkin, at Resilient Cities Network, says there is also a need for new kinds of jobs that will join up the gaps for cities that need to learn to think green. “The first step is to actually put a resilience officer in place in your city, someone who has the requisite skills to look across the city, break down silos, and take a medium-term view so that the city is not constantly in recovery mode but actually in a place to plan and achieve multiple benefits with a single investment. That’s really the key to this new economy. “We also need more people who can understand the kinds of risk and resilience information coming in. Then you need people who can interpret that data and use it for planning an investment. So, there are a lot of jobs that need to be created in terms of educating people and building those skills.”
<urn:uuid:2a9602fa-b8f1-4a86-bb71-63d78a57e147>
CC-MAIN-2022-27
https://recruiters.theguardian.com/advice/eco-cities
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103915196.47/warc/CC-MAIN-20220630213820-20220701003820-00012.warc.gz
en
0.964324
1,147
2.96875
3
The HITECH Act – or Health Information Technology for Economic and Clinical Health Act – forms a portion of an economic stimulus program introduced prior to President Trump taking office: The American Recovery and Reinvestment Act of 2009 (ARRA). The Act was signed into law by the then President Barack Obama on February 17, 2009. Aims of the HITECH Act The HITECH Act was put in place to encourage and grow the adoption of health information technology, specifically, the use of electronic health records (EHRs) by healthcare groups. The Act also made redundant loopholes in the Health Information Portability and Accountability Act of 1996 (HIPAA) by cleaning up the language of HIPAA. This assisted in making sure that business associates of HIPAA covered entities were falling in line with HIPAA Rules and notifications were shared to affected individuals when health information was impacted. More stringent penalties for HIPAA compliance failures were also brought in to add an extra incentive for healthcare organizations and their business associates to adhere with the HIPAA Privacy and Security legislation. HITECH Act Relevance Before the HITECH Act became enforceable in 2008, only 10% of hospitals had implemented EHRs. In order to expand healthcare, improve efficiency and care coordination, and make it more straightforward for health information to be sent between different covered entities, electronic health records needed to be put in place. While many healthcare bodies aimed to transition to EHRs from paper records, the cost of doing so was prohibitively expensive. The HITECH Act brought in incentives to encourage hospitals and other healthcare providers to make the switch. Had the Act not been introduced, many healthcare providers would still be working with paper records. The Act grew the rate of adoption of EHRs from 3.2% in 2008 to 14.2% in 2015. By 2017, 86% of office-based physicians had achieved an EHR and 96% of non-federal acute care hospitals has implemented certified health IT. The HITECH Act also made sure that healthcare organizations and their business associates were complying with the HIPAA Privacy and Security Rules, were implementing security measures to keep health information private and confidential, limiting uses and disclosures of health information and were ensuring their obligation to provide patients with copies of their medical records on request was being fulfilled. The Act did not make compliance with HIPAA obligatory as that was already the case, but it did make sure that groups found not to be in compliance could be issued with a significant financial penalty. HITECH Act Explained The HITECH Act called on healthcare providers to introduce a system of electronic health records and improved privacy and security protections for healthcare data management. This target was met thanks to financial incentives for adopting EHRs and increased penalties for breaches of the HIPAA Privacy and Security Rules. The HITECH Act has within it, four subtitles (A-D). Subtitle A covers the promotion of health information technology and is split into two parts. Part 1 covers improving healthcare quality, safety, and efficiency. Part 2 covers with the application and use of health information technology standards and reports. Subtitle B relates to the testing of health information technology, Subtitle C covers grants and loans funding, and Subtitle D covers privacy and security of electronic health information. Subtitle D is also divided into two separate parts. Part 1 relates to improving privacy and security of health IT and PHI and part 2 covers the relationship between the HITECH Act and other legislation. Compliance with the requirements of the HITECH Act became mandatory from November 30, 2009, one year after the Act being signed into law. The requirements of HITECH were incorporated into HIPAA in the Final Omnibus Rule, which combined HIPAA and HITECH in the same legislation. The HIPAA Omnibus Final Rule was made public on Jan. 25, 2013 and had a compliance date of September 23, 2013. Explanation of the Meaningful Use Program The Department of Health & Human Services (HHS) was allocated a budget of more than $25 billion to meet its goals. The HHS invested that budget to fund the Meaningful Use program – A program that encouraged care providers to put in place certified EHRs by providing monetary incentives. Certified EHRs are those that have been certified as meeting defined standards by an authorized testing and certification body. Certified EHRs had to be used in an important way, such as for issuing electronic prescriptions and for the exchange of electronic health information to better the quality of care. The program sought to improve coordination of care, improve efficiency, reduce costs, ensure privacy and security, boost population and public health, and involve patients and their caregivers more in their own healthcare. The financial incentives were massive and grew year on year with the program and new requirements were introduced at each of the three different stages of the Meaningful Use program. The failure to achieve the requirements of each stage lead to a financial penalty: A reduction of reimbursements for Medicare and Medicaid. In order to receive federal monies, care providers not only had to adopt EHRs but also demonstrate meaningful use of certified EHRs. They had to display that they had achieved the minimum core objectives in each stage along with a set number of menu objectives. It was also required to prove compliance with the HIPAA Security and Privacy Rules by conducting risk assessments. Legislative Requirements for Business Associates to be HIPAA Compliant When HIPAA was first passed in 1996, business associates of HIPAA covered entities had a “contractual obligation” to comply with HIPAA. As there was no enforcement of that requirement, and covered entities could avoid penalties (in the event of a breach of PHI by a business associate) by stating that they did not know their business associate was not HIPAA-compliant. Since business associates could not be fined directly for HIPAA breaches, many failed to meet the standards required by HIPAA and were putting millions of health records at risk. The HITECH Act applied the HIPAA Security and Privacy Rules to business associates and put on them the same legal requirements to protect PHI, detect breaches, and report violations of HIPAA to their covered entities. Business associates were also subject to obligatory HIPAA audits and civil and criminal fines could be issued directly to business associates for the failure to adhere with HIPAA Rules. Stricter Penalties for HIPAA Breaches Before the HITECH Act was enforceable, as well as covered entities escaping sanctions by claiming their business associates were unaware that they were breaking HIPAA rules, the sanctions HHS could impose were little more than a slap on the back of the hand ($100 for each violation up to a maximum fine of $25,000). Tougher fines were introduced for HIPAA violations and penalties were split into separate tiers based on different levels of culpability. The maximum fine for a HIPAA breach was grown to $1.5 million per violation category, per annum. The HITECH Act called for mandatory financial fines for HIPAA-covered entities and business associates on all occasions that there was willful neglect of HIPAA Rules. The HHS was given the power to determine the level of knowledge that HIPAA Rules were being breached and whether the violations represented willful neglect of HIPAA Rules. The direct result of the new $1.5 million maximum fine was covered entities and business associates began to pay more attention of HIPAA regulations. With such high potential fines, HIPAA compliance could no longer be thought of as ‘optional’. The penalties could be more than the cost of actually complying with HIPAA. The HSS can keep a proportion of the HIPAA penalties paid to fund its enforcement efforts. With a higher source of income, HHS was able to focus more resources to looking into the cause of data breaches and, in 2011, the HHS kicked off the first phase of its HIPAA compliance audit program. The next phase of ‘desk audits’ – paperwork checks – on covered entities came to an end in 2016, paving the way for a permanent audit program. Major Amendment: HIPAA Breach Notification Rule A significant change that arose due to the introduction of the HITECH Act was the development of a new HIPAA Breach Notification Rule. Under the new Breach Notification Rule, covered entities are required to send out official notifications to those impacted by a breach within sixty days of the identification of a breach of unsecured protected health information. These breach notification letters to patients must be mailed using first class mail and must describe, in detail, the nature of the breach, the types of protected health information that were exposed or compromised, the measures that are being taken to remedy the breach, and the actions affected individuals can take to tackle the potential for harm. Breaches of 500 or greated health records also need to be reported to the HHS within 60 days of the discovery of a breach, and smaller breaches within 60 days of the end of the current calendar year in which the breach took place. Along with reporting the breach to the HHS, a notice of a breach of 500 or greater health records must be shared with a prominent media outlet serving the state or jurisdiction where those affected by the breach mainly reside. The Breach Notification Rule also states that business associates must alert their covered entities of a breach or HIPAA violation to allow the covered entity to submit a report of the incident to the HHS and arrange for individual notices to be broadcast. HIPAA Wall of Shame The HITECH Act also included a provision that the HHS’ Office for Civil Rights would begin publishing a summary of healthcare data breaches that had been submitted by HIPAA covered entities and their business associates. Kicking off in October 2009, OCR published breach summaries on its website, which includes the name of the covered entity or business associate that suffered the breach, the category of breach, where the breached PHI was geographically located, and the number of people affected. The OCR breach portal has been referred to as ‘The HIPAA Wall of Shame’. Electronic Health Records Access The HIPAA Privacy Rule allowed patients and health plan subscribers a right of access and permitted them to obtain copies of their health information by sending in a formal request. Healthcare providers that implemented EHRs were storing health information electronically. HITECH altered the HIPAA right of access to allow individuals to obtain a copy of their health data in electronic format if they needed it. This change made it more straightforward for people to share their health data with other bodies. While it should be quite a quick and easy process to provide electronic health records in electronic format, the reality was that this was not the case. Some electronic health record systems make it complicated for health data to be supplied in electronic format. To counter the costs of providing copies of electronic health records, healthcare groups were allowed to charge a reasonable fee to include the cost of labor for completed the request for healthcare data. Protected Health Information – Uses and Disclosures The HITECH Act also introduced changes to permitted uses and disclosures of PHI and tightened up the wording of the HIPAA Privacy Rule. Business associates were stopped from using ePHI for marketing campaigns without adequate authorization, patients were given the right to take back any authorizations they had previously handed over, and new requirements for accounting for disclosures of PHI and keeping records of disclosures were introduced, including to whom PHI had been disclosed and for what aim.
<urn:uuid:c4a66748-2e72-47c3-870a-fa871d1a79c3>
CC-MAIN-2021-43
https://www.compliancejunction.com/hitech-act-explained/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583423.96/warc/CC-MAIN-20211016043926-20211016073926-00692.warc.gz
en
0.973226
2,315
2.859375
3
"When our people were fed out of the common store, and laboured jointly together, glad was he could slip from his labour, or slumber over his taske he cared not how, nay, the most honest among them would hardly take so much true paines in a weeke, as now for themselves they will doe in a day: neither cared they for the increase, presuming that howsoever the harvest prospered, the generall store must maintaine them, so that wee reaped not so much Corne from the labours of thirtie, as now three or foure doe provide for themselves." Captain John Smith (1580-1631) On 10 April 1606, the Virginia Company of London was granted a charter by King James to establish a colony in Virginia in North America. In December three ships were dispatched with 104 settlers, including one Captain John Smith. Establishing the colony in 13 May 1607, they named it Jamestown, in honor of the king. It was the first permanent settlement of England in North America. The colony was originally governed by a council of seven men, with Captain Smith named as one of them. They set up a common system whereby each would work for the good of all, and each would receive what they needed from a common store. Things did not go well, for many years. Sooner or later, as we know and are taught by Socialism, you run out of other people's Corne... The colony suffered from food shortages, unhealthy drinking water, disease and attacks by the pesky, nearby Powhatan Indians. It was during a small expedition into one of the Powhatan villages, in a desperate search for food, that Captain Smith was captured. It was on this expedition that Captain Smith was saved from execution by the daughter of Chief Powhatan, named Pocahontas, and was released to return to James Fort. When he got back there were only 38 settlers left alive. Smith returned in January with food sent by the Chief, but misfortune struck and part of the fort was lost to fire. Smith found the settlers engaged in searching for gold and idling their time. He immediately took action. Quickly elected president of the settlement, Smith instituted his famous "if ye shall not worke, ye shall not eate" edict. Success ensued, the death toll dropped, food was harvested in abundance, a well was dug, houses were built and the colonists made pitch, tar and soap to return to England. Captain John Smith wrote about this turn around in his autobiography, with one quote recorded above. When each colonist was given his own plot of land to farm, and earn a return from, and was forced to work for his own welfare, the profit that followed literally saved the colony from ruin. Phillip L. Barbour, a Smith biographer, wrote, "Captain John Smith has lived in legend even more thrillingly than even he could have foreseen. Let it only be said that nothing John Smith wrote has yet been found to be a lie." This, by the way, is the same experience as was had, and written about, by William Bradford in New England. The story we hear about "the first Thanksgiving" is NOTHING like what really happened. The "First Thanksgiving" was rather a celebration of the successes of capitalism which Bradford instituted there, as did Smith in Virginia. We know this from Bradford's own journal! It's as if Bradford learned from the Virginia experience! It reminds me of the sixth chapter of Proverbs, where six different things that are hated are written about. Look at verses 6 - 8: "Go to the ant, thou sluggard; consider her ways and be wise: Which having no guide, overseer or ruler, Provideth her meat in the summer and gathereth in the harvest." That's right, idlers do not contribute. In fact, when there are idlers expecting an entitlement from the "common store" (meaning from the work of others), everybody suffers. The free enterprise of providing for oneself and contributing in that way is the true principle, demonstrated by and practiced in nature. When one is providing for oneself, there is no need of a boss or directive telling how one must work. One sinks or swims. The people of Jamestown learned to develop their own capital and contribute what capital they could not simply for personal profit and gain, but for the gain, and survival, of the whole. And the colony of Virginia survives, even today!
<urn:uuid:37e7c9e1-a956-4954-b3cc-32f802747e90>
CC-MAIN-2015-06
http://jaysfreeenterpriseblog.blogspot.com/2013/02/you-dont-work-you-dont-eat.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422120928902.90/warc/CC-MAIN-20150124173528-00011-ip-10-180-212-252.ec2.internal.warc.gz
en
0.985421
943
3.65625
4
To capture any image of the object and send it to the PC using wireless audio and Video communication for any security systems. Now a day’s mobile robots are vastly used in many industries for performing different activities. Controlling a robot is generally done using a remote control which can control the robot to a fixed distance. This project aims at designing control system for a robot such that the mobile robot is controlled using mobile and wireless RF communication. In this project the controlling is done depending on the feed back provided by the IR sensor which is the part of object detection The project contains different modules such as Object detection and angle determination in the path using IR sensor. SMS protocol (F-Bus) development. Design of RF circuits for data transfer and camera interface. In the object detection module when the at89c2051 microcontroller is powered up the stepper motors starts rotating at 180 degree arc. The IR sensor is mounted on stepper motor. When an object is detected by the IR sensor the microcontroller stops the robot and stepper motor. The video camera mounted on the stepper motor starts transmitting the object picture continuously. Here the IR sensor consists of IR transmitter and receiver .the IR transmitter is a led and receiver is Tsop receiver. Here the frequency used is 38 kHz. The angle detected is sent to PIC where it is displayed on the LCD display. In the SMS protocol development module F-Bus is High-speed full-duplex bus. It uses one pin for transmitting data and one pin for receiving data plus the ground pin. Very much like a standard serial port. It is fast 115,200bps, 8 data bits, no parity, and one stop bit. For F-Bus the data terminal ready (DTR) pin must be set and the request to send (RTS) pin cleared. This F-Bus is used to connect mobile to PIC microcontroller. The commands for controlling the robot are sent by mobile through PIC using RF communication. In the RF circuit design two pairs of RF transmitter and receiver are used. One set is used for communication between at89c2051 microcontroller and PIC microcontroller. The other pair is used for communication between PIC and mobile robot for controlling activities To find the path and control the motion of mobile robot in the path using IR sensor feed back mechanism. The controlling is done by using mobile. This system is divided into different modules 1) Object detection and angle determination in the path using IR sensor. 2) SMS protocol (F-Bus) development. 3) Design of RF circuits for data transfer and camera interface. Related Projects : : : Microcontroller - based electronic Locking system module,Micro Controller based Security System using Sonar,Micro Controller based Power Theft Identifier,Micro Controller based Dissolving Process Controller,Micro Controller based Burner Automation,Manual EPROM Programmer cum Verifier,Magic lights,Local PCO Meter,JPEG2000,Integrated Photonic Microwave Band Pass Filter,Integrated Circuit Tester,Honeypots,Highway Alert lamp,Function Generator With Frequency Counter,Frequency Counter,Float cum Boost Charger,Energy Consumption Indicators,Electronic Number Lock,Electricity Theft Monitoring System,Electric Bikes,Efficient Coding Technique for Aerospace Telecommand system,eBadge Using RFID With Biometrics,Digital Stopwatch,Device Controlling Using TAPI,Design of Manchester Encoder-decoder in VHDL,Cordless Power Controller,Centrally Controlled Multichannel Token Display,CCU SIMULATOR,Card Based Security System,Band Pass Filter,Automatic Over Speed Detector,Authn,Appliances Security Controller Using Power Line,Analog To Digital Converter,Alarm Annunciator with Real Time Event Recorder,Access Control System,A Bi-directional Visitors Counter,Virtual Class Rooms,Microcontroller Based Barcode Decoder,Railway Switches And Signals
<urn:uuid:bba4c95e-8bfb-49ef-af31-ee8c60f5df0d>
CC-MAIN-2015-40
http://www.seminarsonly.com/Engineering-Projects/Electronics/Sensor_Based_Motion_Control_Of_Mobile_Car_Robot.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737898933.47/warc/CC-MAIN-20151001221818-00219-ip-10-137-6-227.ec2.internal.warc.gz
en
0.797681
843
3.0625
3
Ramadan: Reverence, Restraint & Responsibility ‘There’s only one corner of the universe you can be certain of improving, and that’s your own self,’ said Aldous Huxley, the English novelist best known for his dystopian novel, Brave New World. In his exploration of the dilemmas confronting modern man (the rise of capitalism, the dehumanising demands of technological progress, and the cult of self-worship and instant gratification), Huxley hits on many truisms in his chilling forecasts to the modern world. This month will see Muslims the world over observe the fasts of Ramadan. Ramadan is a month in which believers are required to buckle down more consciously so as to improve their own ‘corner of the universe.’ The month is marked by heightened religious observance and also a keener sense of social cohesion, and provides a powerful energy for self-transformation. As the month progresses, many Muslims, repentant for the ills and misdeeds of their past, resolving never to return to such ways again. Indeed, men, women and whole societies actively purify themselves during this month. This experience becomes, for many, the turning point of the year and, for some, their whole lives. Furthermore, Ramadan yields to the believer an array of timely lessons to help steer them through what is fast becoming a chaotic and volatile world. Let’s touch upon three such lessons: 1. Undoubtedly, Ramadan’s core lesson is learning to be more mindful and conscious of God, which relates to the sense of ta‘zim (“reverence” and “awe”) of Him. Ramadan is a call to renew our reverence of God by revering the Divine orders and respecting their limits (hudud). The regime of fasting sets certain limits which, though designed to facilitate our detachment from the dunya; the lower world, and from the nafs; the ego, it is ultimately about offering believers an opportunity to revere and remember God more fully and faithfully. 2. Another of Ramadan’s recurring lessons is that of restraint. By temporarily denying themselves instant gratification while fasting, Muslims are taught self-restraint. Here we confront Islam as counter-culture. For what could be more unmodern than to keep the cravings of the nafs in check. Modernity is about pandering to the nafs. “Free yourself”, “Be yourself”, “Indulge yourself”, is modernity’s holy trinity. Our current climate is one where Muslims find themselves under constant scrutiny, criticism or attack. Hardly a day goes by, in the media or the world at large, without Islam being fair game. Yet for believers, the self-restraint exercised in Ramadan is the same restraint we must demonstrate in the face of all such provocations. The Qur’an asserts: You shall certainly hear much that is hurtful from those who were given the Book before you, and from the idolaters. But if you are patient and God-conscious, these are weighty factors in all affairs.[3:186] 3. Ramadan also teaches us responsibility, particularly to the world’s poor and hungry. For by the end of a day’s fast, Muslims usually experience some sensation of hunger. Thus we are awakened, in a most direct manner, to the plight of hundreds of millions of our fellow human beings who suffer hunger and starvation every day. This should compel us to extend to them our help and support. In a world filled with grotesque human inequalities, and soaked in the unholiness of poverty, we must each commit ourselves to eliminating this global injustice. This year, as schools up and down the country wind-up the task of grounding pupils in the Three R’s (reading, writing and arithmetic), Ramadan offers its own Three R’s: reverence, restraint & responsibility. Internalising such lessons best prepares believers to engage the brave new world of the turbo-consumerist Monoculture and help bring about its much needed healing.
<urn:uuid:874c0fb4-3092-46cc-af57-5b5a07f87fb6>
CC-MAIN-2021-43
https://thehumblei.com/2013/07/01/ramadan-the-brave-new-world/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585911.17/warc/CC-MAIN-20211024050128-20211024080128-00408.warc.gz
en
0.944959
854
2.78125
3
Celebrate African American History Month Archeology has made important contributions to knowledge about black history in America. This Black History Month, learn more about archeology and the stories it has to tell about freedom, oppression, life, and liberty using lesson plans available online. The people behind those stories set the groundwork for African Americans to become archeologists—check out the biography of John Wesley Gilbert, the first African American archeologist, and listen to Nedra Lee talk about her work today. Maybe one of these lesson plans will inspire a student of yours to become an archeologist! New Philadelphia: A Multiracial Town on the Illinois Frontier Learn about New Philadelphia, Illinois, the first town platted and registered by an African American before the Civil War. New Philadelphia is a National Historic Landmark. “Gentleman Jim”: Tough Choices in a Time of Crisis and Robinson House Hear the story of the Robinson Family, a free black family living in Manassas at the time of the Civil War. The remains of the Robinson House are now part of Manassas National Battlefield Park in Virginia. See an online exhibit to learn more about archeology at the homesite. Lick Creek African-American Settlement (PDF) Explore the Lick Creek African American Settlement, located within the Hoosier National Forest (part of the U.S. Forest Service) in Indiana. It was settled by free blacks in the early nineteenth century, but many people left right before the Civil War. Read more about the settlers and their lives at Lick Creek, and the archeology done there. If you’re interested in taking students on a field trip to learn about African American archeology, two places to go are the African Burial Ground and Cane River Creole. Many more places of African American heritage are commemorated by listing in the National Register of Historic Places.
<urn:uuid:8b18fccc-2297-4c12-89b3-ae3ed66371fa>
CC-MAIN-2014-10
http://www.nps.gov/history/archeology/months/february13.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999640676/warc/CC-MAIN-20140305060720-00010-ip-10-183-142-35.ec2.internal.warc.gz
en
0.92618
388
3.875
4
Etymology is the study of the origin of words and their meanings. The nuances of language can be better grasped by users if the origin of the word or phrase used is understood. The coining of new words and phrases which conform to recognized patterns will help to enrich our experiences as writers, speakers and developers of this new world of WIKI. - a "study of the historical development of languages, particularly as manifested in individual words" or - an "account of the origin and historical development of a word" is called an etymology. Def. "[t]he humanistic study of historical linguistics" is called philology. Def. the "study of dialects" is called dialectology. - "etymology, In: Wiktionary". San Francisco, California: Wikimedia Foundation, Inc. 23 April 2015. Retrieved 2015-07-01. - "philology, In: Wiktionary". San Francisco, California: Wikimedia Foundation, Inc. June 4, 2013. Retrieved 2013-06-08. - Philology. Books.google.com. 2008-02-09. Retrieved 2011-07-16. - "Philology, In: Wikipedia". San Francisco, California: Wikimedia Foundation, Inc. June 17, 2012. Retrieved 2012-06-19. - SemperBlotto (20 July 2005). "dialectology, In: Wiktionary". San Francisco, California: Wikimedia Foundation, Inc. Retrieved 2017-07-09.
<urn:uuid:ae891fa6-36c7-448b-aa5d-8d1c8a09c88e>
CC-MAIN-2019-47
https://en.wikiversity.org/wiki/Etymology
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670036.23/warc/CC-MAIN-20191119070311-20191119094311-00402.warc.gz
en
0.698211
309
3.546875
4
In the beginning was a “big bang”. No one is sure how it happened but it happened about 14 billion years ago (in Earth time, that is). All the material in the universe came from this event. The material in the form of dust slowly gathered to form galaxies, suns, planets and satellites through attraction. The planet we call Earth was formed about 4 billion years ago, a little after the formation of the Sun, the star which gives us the energy for our survival, around which we revolve. Life on Earth began around 1 billion years ago in the form of simple cells. Our species – Homo – is perhaps one to two million years old. Civilisation in the form of societies and writing came about perhaps 20,000 years ago. Recognisable society is perhaps 7,000 years old. We know these things because we are smart. Homo was descended from apes (evolution and natural selection), our closest relatives on the African continent. Modern Homo left Africa around 70,000 years ago through Egypt and spread into the Mesopotamia, Indus and then moving along the coast eastward perhaps into China, and also into Europe. These are the four great civilisations from which we descend. Of the great civilisations Indo-European is perhaps the most important in terms of influence and migration. It gave us Zoroastrianism and Brahmanism. From Zoroastrianism we were given the religions of Judaism, Christianity and Islam, the dominant religions of today. From Brahmanism came the religions of Hinduism, Jainism and Buddhism, just a few other important religions. Zoroastrianism began the ideas 1) of one god above the others (or no other), 2) of the struggle between good and evil forces, 3) that the beginning of the universe must have had a first cause (cosmology) and 4) that there shall be a purpose and meaningful end to life (eschatology). Religions were the simplest way to explain the things that Homo did not understand. By positing into an unseen and infallible god all the answers to the unknown many – if not all – things could be explained. The power of the imagination was then to let that is unknown to be believed and to be known through the process of naming (Let there be “God”). The rule of the all-powerful and unquestionable god had controlled the Homo’s way of life until perhaps 500 years ago when Homo (mainly European societies) realised that things can be explained in a way not reliant upon faith and belief. In other parts of Earth Homo, lived without the baggage of one god, first causes, judgement day and the like. Good and evil, however, was a nice analogy that seemed to be acceptable. Today, Homo continues to live with religion alongside science and philosophy, just two of many of the alternative ways to explain the nature of reality and existence. Amen, gassho, namaste, far out man, To be Continued and/or The End.
<urn:uuid:d853c8ea-571f-4ae2-8ee2-df29b7267f33>
CC-MAIN-2022-40
https://signature103.blog/2017/10/18/the-book-of-warren-the-unauthorised-revised-version/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00648.warc.gz
en
0.963015
622
3.671875
4
Shengchang Bioenergy ? Building China’s BOP Biomass Market Biofuels have become a fashionable and controversial topic of late (just yesterday, the New York Times reported on resistance to ethanol in Iowa). Debates range from lauding the benefits of renewable energy sources to questioning whether biofuels will raise prices of staple comestibles, leaving millions to starve, or replace food-crop cultivation altogether. Concerns have also arisen about the cost and scalability of the technologies and the mass implementation of apparatuses required for replacing daily uses of fossil fuels on the large scale. Yet one company recently added to the New Ventures China Portfolio seems to be escaping these conundrums, and providing reason to believe that biomass fuel, even in one of the most polluting developing countries on the planet, can be environmentally and socially and financially sustainable.Beijing Shengchang Bioenergy S&T Co. Ltd. is not only developing and marketing advanced biomass fuel technologies, but it is doing so with a business model that stands to benefit low-income groups as both suppliers and as a significant portion of its potential customer base. Shengchang Bioenergy produces biomass fuel out of agriculture and forestry waste, made by compressing and refining saw dust, straw, and peanut shells sourced from local farmers. With special technology and equipment, Shenchang Bioenergy produces a fuel that is easily transported, easily stored, has a high degree of combustibility, and can even be used for biomass cogeneration. (Derek Newberry has also written more on Shenchang Bioenergy’s technologies in an article for New Ventures) While expanding into the market on the fuel-supply side, Shengchang Bioenergy is aiming to build demand for its advanced combustion products currently under development: special, high-efficiency household heating and cooking stoves, industrial boilers, and biomass thermoelectric generators. This is where the BOP comes in, not just as raw materials supplier, but as the end-user and beneficiary of better technology. There are currently 177 million households in China using wood and coal-fired stoves, which are inefficient in their use of heat energy, highly polluting, and are also major health hazards, especially for low-income families that use them within highly confined spaces. Studies cited in a report by the US National Academy of Sciences on the health impacts of domestic coal use in China reveal that coal stoves and small coal boilers alone provide more than 50% of the energy for urban households in China, and an additional 22% of rural households rely on coal. One report estimates that since about 70 percent of the Chinese population lives in rural areas, this means that roughly 400 million people in China are relying on coal for their domestic energy needs. The company is currently designing various series of stoves to specifically meet the heating and cooking needs of different populations in China, spanning broad geographic and economic ranges – including rural, suburban, and urban low-income households. By combining advanced technology with specific knowledge about local use and practical design, Shengchang Bioenergy’s objective will be to tailor an environmentally-friendly concept to the needs and common usage patterns of multiple income groups. If it succeeds, it will prove that green technologies are not out of reach for developing countries, and in fact can be driving forces in creating greater economic opportunity and improving quality of life for the poor on a mass scale.
<urn:uuid:6629e892-33a7-4735-b687-279ed8f975f8>
CC-MAIN-2021-31
https://nextbillion.net/shengchang-bioenergy-a-company-aspires-to-build-china-s-biomass/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154432.2/warc/CC-MAIN-20210803061431-20210803091431-00228.warc.gz
en
0.941459
703
2.578125
3
Learn About Ransomware: A Malware That Keeps Your Data as A Hostage For data that’s quite near and dear to you, you would do anything to keep it protected, wouldn’t you? When someone targets you with a ransomware, this is exactly the weak spot that they intend on hitting. The significance of data in modern times has evolved so much that if there’s even a chance that the access to the data is blocked, one wouldn’t mind paying money in exchange for access. This is what ransomware is all about, using an individual’s or an organization’s need for data against them. Let’s explore the threat of ransomware in more depth. What Exactly Is a Ransomware? Ransomware is a kind of malware that attacks a system by blocking user access to partial or complete data on the system. The data can be locked through encryption so there is no way for a user to access the data without a decryption key, which is in the possession of the attacker. The user is asked to pay a ransom to the attacker, usually through digital currencies, in exchange for the decryption key. Attackers prefer virtual currencies as the mode for receiving their ransom payment because tracing such transactions is nearly impossible, and therefore the chance of catching the attackers also becomes very slim. If the victim fails to pay the demanded ransom on time, there is not only the risk that they could lose their data forever, but there is also the risk that the attacker might publish the victim’s private data. There have been quite a few famous instances of a ransomware attack in the recent times, most notably WannaCry, Reveton, Petya, CryptoLocker, Bad Rabbit, etc. While the basic principle of ransomware is preventing users from accessing their data, the method via which this is accomplished can vary. The ransomware could lock the screen of the user’s device by altering the login id and password for the device. This is a simpler version of a ransomware attack, where the victim might be able to wiggle out of the situation taking help from an expert. A more complex type of ransomware attack is where either certain select files or the complete hard drive of the device is encrypted. In addition to the primarily attacked device, other devices which are connected to the network may also get affected by this ransomware. Getting out of such a ransomware attack is not so easy. How Does a Ransomware Attack Take Place? The big question here is how does this kind of malware attack takes place. There are multiple methods via which ransomware can infect a system. Phishing emails are one of the most common ways used for spreading malware, which makes it a good medium for spreading ransomware too. The phishing email sent to the victim may be accompanied by an attachment that secretly contains the ransomware. When the unsuspecting user opens or downloads the attachment, the ransomware kicks into action. The email may also feature link to a malicious web page, setting the stage for a ransomware attack when the user visits the web page. Phishing messages containing the threat of ransomware may also be sent via messages on social media. Clicking on malvertisements can also launch a ransomware attack. For more information on what malvertisements are, read: Online Ads Can Be Dangerous for Cybersecurity. Remote Desktop Protocol (RDP) is a common method used by attackers to remotely access and infect a system with ransomware. Attackers could also use exploit kit to target systems with software applications that are not updated and thus have cracks in the security that offer an entry point into the system. Using external storage devices that are already infected with a ransomware also poses risk. Once a device has been infected by the ransomware, user will get an alert on their device about the attack along with the instructions that they need to follow for completing the ransom payment and having their data released. What’s most dangerous about a ransomware attack is that even after the victim does make the payment, there is no guarantee that they will regain access to their data. In case the attacker doesn’t come through with their promise, the victim would be out of money and would have also lost their valuable data. Who Can Be a Victim of a Ransomware Attack? Practically speaking, anyone can become a victim of a ransomware attack, from home users to big corporate organizations. The impact and consequences of the attack will also vary from victim to victim. For an organization, the stakes would be a lot higher. Without being able to access their data, they might find it impossible to carry on with their daily operations. They could face huge monetary losses due to operational delays. If the organization finds no other option but to pay, then the ransom amount paid would just add to their already mounting expenses. 5 Tips To Prevent A Ransomware Attack From Happening To You The only best strategy when it comes to dealing with a ransomware attack is prevention. Here are some tips that can prevent you from becoming a victim of such an attack: - Make regular backups of your data, so that in the event of a ransomware attack, you are able to recover all your data without having to pay the ransom. Ensure that the backups are stored on a different network altogether. Hiring a managed IT services provider can help greatly with the backup and recovery process. - When you see a suspicious email in your inbox, don’t click on the links or open any attachments in the email, no matter how tempting the message of the email may be. Chances are that it’s a phishing email presenting a malware attack (possibly a ransomware attack). Read more on phishing here: What is a Phishing Attack. - Have a good firewall and anti-malware software solution in place as a security measure. Update the anti-virus software from time to time. - Any extensions or plugins that you are not using should have no place in your web browser. - Install security updates on your operating system and software applications regularly, reducing your system vulnerability with every update. This article here explains the role of security updates in your system security: About Pesky Security Updates.
<urn:uuid:b527650a-0fd2-4e4b-8eaf-ac78f487f7e5>
CC-MAIN-2019-47
https://www.ctgmanagedit.com/what-is-ransomware/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668594.81/warc/CC-MAIN-20191115065903-20191115093903-00325.warc.gz
en
0.948627
1,258
3.25
3
The sale of the product has been completed. Check other sets in this category. The set enables to create an educational racing robot of line follower class. This type of construction moves on a black tape on a white line background. For this purpose they use a drive (usually in the form of two DC motors), simple rebound sensors and control systems. During construction, the user will become familiar with the basic electronic elements, sensor operation and motor control. He will also write a simple program for the microcontroller being the main control module of the robot. The exact course of the construction of the robot can be found in the robotics forum. forbot.pl . Lessons are written in a simple and understandable way by the author of many interesting articles in trade journals. A film presenting a sample robot made on the basis of an article from Forbot forum. Appearance depends on the inventor's invention :) - Universal PCB PDU27 (or substitute PDU14) - H-bridge L293D with stand - ATmega8A microcontroller in a threaded housing with base - Single-row and double-row goldpin strip - 0 .5 m twisted-pair cable for creating connections - CNY70 sensors (3 pieces) - Basket for 4 AA batteries (sticks) - Chronic capacitors (10 pieces each): - 100 nF - 10 uF - Chronic resistors (10 pieces each): - 470 Ω - 220 Ω - 10 kΩ - Two 5 mm LEDs - Female goldpin 5 x 1 female connector body with plates We also invite you to visit our website: http://hobbyrobotyka.pl/ .
<urn:uuid:ba96bc9e-ada3-4ed5-a257-bc84983e2d24>
CC-MAIN-2021-25
https://botland.store/withdrawn-products/184-simple-line-follower-set.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487582767.0/warc/CC-MAIN-20210612103920-20210612133920-00096.warc.gz
en
0.845781
354
2.53125
3
Section 88 is named the “Olive Leaf.” To “extend the olive branch” means to seek for or offer peace. Over the centuries the olive tree has become a symbol of peace. During 1832 a spirit of contention developed between some of the brethren in Missouri and some living in Ohio. Some of the former even challenged Joseph Smith’s right to preside over them. On January 14, 1833, the Prophet wrote to W.W. Phelps in Missouri, enclosing a copy of section 88, “the Olive Leaf” whose lofty concepts would bear testimony of the Prophet’s inspiration and would help the Saints overcome their differences and again enjoy a spirit of peace. The Prophet Joseph Smith said: “I send you the ‘olive leaf’ which we have plucked from the Tree of Paradise, the Lord’s message of peace to us; for though our brethren in Zion indulge in feelings towards us, which are not according to the requirements of the new covenant, yet, we have the satisfaction of knowing that the Lord approves of us, and has accepted us, and established His name in Kirtland for the salvation of the nations; for the Lord will have a place whence His word will go forth, in these last days, in purity…. “The brethren in Kirtland pray for you unceasingly, for, knowing the terrors of the Lord, they greatly fear for you. You will see that the Lord commanded us, in Kirtland, to build a house of God, and establish a school for the Prophets, this is the word of the Lord to us, and we must, yea, the Lord helping us, we will obey: as on conditions of our obedience. “He has promised us great things; yea, even a visit from the heavens to honor us with His own presence…. [Signed] JOSEPH SMITH, JUN. “P.S.-I am not in the habit of crying peace, when there is no peace; and, knowing the threatened judgments of God, I say, Wo unto them who are at ease in Zion; fearfulness will speedily lay hold of the hypocrite. I did not suspect you had lost the commandments, but thought from your letters you had neglected to read them, otherwise you would not have written as you did ” ( History of the Church, 1:316-317). The Olive Leaf Revelation Some Eternal Truths D&C 88:1-5 The Holy Spirit of Promise. Joseph Fielding Smith said: “The Holy Spirit of Promise is the Holy Ghost who places the stamp of approval upon every ordinance: baptism, confirmation, ordination, marriage. The promise is that the blessings will be received through faithfulness. If a person violates a covenant, whether it be of baptism, ordination, marriage or anything else, the Spirit withdraws the stamp of approval, and the blessings will not be received ” ( Doctrines of Salvation, 1:45). D&C 88:6-13 The Light or Spirit of Christ is the power by which the world was made and which gives light and life to all things. It also enlightens the mind and enables us to distinguish between truth and error. These verses testify of the closeness of God’s Spirit to his children. D&C 88:17-39; see particularly 13, 34, 38 The law of God. God’s law not only governs, but it is the means by which we may be preserved, perfected, and sanctified. In this orderly system each kingdom is governed by its particular law; therefore, those who live the celestial law are assured that they will inherit that glory. D&C 88:15-16 The body and the spirit constitute the soul of man. Thus, the resurrection in which the body and the spirit are inseparably connected is the “redemption of the soul.” (Compare with D&C 93:33). D&C 88:17-32 The Resurrection. Each person will be restored to that glory and kingdom whose laws they have lived. D&C 88:63-68 Our Relationship to the Savior – v. 63 The reciprocal relationship promised to those who draw near the Lord. – v. 63 We must “seek diligently” not casually if we expect answers to prayer. – vv. 64-65 We will receive that which is “expedient” for us; asking for that which is not expedient will turn to our condemnation. – v. 68 The Lord instructs those who would draw near unto him to “sanctify themselves. To “sanctify” means to cleanse or to free from sin. We “sanctify” ourselves by following the Lord’s teachings. – v. 68 If we do these things, we have the promise that at some future point (when it is expedient for us) “you shall see him.” D&C 88:70, 74, 117 A Solemn Assembly. The Lord instructs the elders to call a “solemn assembly” and to sanctify and purify themselves, that they might receive knowledge. This is the nature of the “School of the Prophets” the Lord wants to establish among them. What We Should Study and Learn D&C 88:77-79 “The doctrine of the Kingdom.” Gordon B. Hinckley quoted Matt. 11:29 (“learn of me”), then said: “I should like to suggest that you follow that injunction given by the Son of God. With all of your learning, learn of him. With all of your study, seek knowledge of the Master. That knowledge will complement in a wonderful way the secular training you receive and give a fulness to your life and character that can come in no other way ” (In Conference Report, Oct. 1964, 118; or Improvement Era, Dec. 1964, 1092). Thomas S. Monson said: “A… hallmark of a happy home is discovered when home is a library of learning….The Lord counseled, `Seek ye out of the best books words of wisdom; seek learning, even by study and also by faith’ (D&C 88:118). The standard works offer the library of learning of which I speak. We must be careful not to underestimate the capacity of children to read and to understand the word of God” (In Conference Report, Oct. 1988, 81-82; or Ensign, Nov. 1988, 70). D&C 90:15 Other branches of knowledge are also important-astronomy, geology, history, culture, foreign affairs, and more (see also D&C 93:53). Why We Should Study and Learn (D&C 88:80-82) To magnify our callings, especially in missionary work but also as parents, in church callings, and in service to our fellow men. We are to seek seriously, through study and faith, to be “prepared in all things.” To go forth and preach -warn the people, that they might be left without excuse. Brigham Young said: “Our education should be such as to improve our minds and fit us for increased usefulness; to make us of greater service to the human family” (Discourses of Brigham Young, 255). Russell M. Nelson said: “Because of our sacred regard for each human intellect, we consider the obtaining of an education to be a religious responsibility…. Our Creator expects His children everywhere to educate themselves” (In Conference Report, Oct. 1992, 5; or Ensign, Nov. 1992, 6). Gordon B. Hinckley said: “It is so important that you young men and you young women get all of the education that you can. The Lord has said very plainly that His people are to gain knowledge of countries and kingdoms and of things of the world through the process of education, even by study and by faith. Education is the key which will unlock the door of opportunity for you. It is worth sacrificing for It is worth working at, and if you educate your mind and your hands, you will be able to make a great contribution to the society of which you are a part, and you will be able to reflect honorably on the Church of which you are a member. My dear young brothers and sisters, take advantage of every educational opportunity that you can possibly afford, and you fathers and mothers, encourage your [children] to gain an education which will bless their lives. ” (“Inspirational Thoughts,” Ensign, June 1999, 4). How We Should Learn (D&C 88:118) By study and faith. Both are required in order to learn. Learning by faith is based on the premise that God knows all things and will reveal eternal truths to his children if they diligently seek them. Marion G. Romney said: “I believe in study. I believe that men learn much through study…. I also believe, however, and know, that learning by study is greatly accelerated by faith” (Learning for the Eternities, 72). Harold B. Lee said: “Learning by faith requires the bending of the whole soul through worthy living to become attuned to the Holy Spirit of the Lord” (In Conference Report, Apr. 1971, 94). Through consistent and diligent effort. There is a real difference between mere reading and a diligent, systematic study effort. Out of the best books. The Lord wants us to read good literature. John Taylor said: “We ought to foster education and intelligence of every kind; cultivate literary tastes, and men of literary and scientific talent should. Improve that talent; and all should magnify the gifts which God has given unto them…. If there is anything good and praiseworthy in morals, religion, science, or anything calculated to exalt and ennoble man, we are after it. But with all our getting, we want to get understanding, and that understanding which flows from God” (The Gospel Kingdom, 277). Gordon B. Hinckley said: “You know that your children will read. They will read books and they will read magazines and newspapers. Cultivate within them a taste for the best. While they are very young, read to them the great stories which have become immortal because of the virtues they teach. Expose them to good books. Let there be a corner somewhere in your house, be it ever so small, where they will see at least a few books of the kind upon which great minds have been nourished. “Let there be good magazines about the house, those which are produced by the Church and by others, which will stimulate their thoughts to ennobling concepts. Let them read a good family newspaper that they may know what Is going on in the world without being exposed to the debasing advertising and writing so widely found ” (In Conference Report, Oct. 1975, 57-58). Ezra Taft Benson said: “Today, with the abundance of books available, it is the mark of a truly educated man to know what not to read…. Feed only on the best. As John Wesley’s mother counseled him: ‘Avoid whatever weakens your reason, impairs the tenderness of your conscience, obscures your sense of God, takes off your relish for spiritual things,… increases the authority of the body over the mind.’ ” (“In His Steps,” in 1979 Devotional Speeches of the Year , 61). D&C 88:122 How the gospel should be taught. Rather than lectures or sermons, gospel teaching should be collaborative-“that all may be edified of all.” The School of the Prophets Patterns of Preparation D&C 88:119-120 “Establish a house.” This was fulfilled with the erection of the Kirtland Temple. These qualities, however, can also be applied to our present meetinghouses and even to our homes. John A. Widtsoe said: “The temple is a place of instruction. Here the principles of the gospel are reviewed and pro-found truths of the kingdom of God are unfolded. If we enter the temple in the right spirit and are attentive, we go out enriched in gospel knowledge and wisdom ” (“Looking toward the Temple,” Ensign, Jan. 1972, 56-57). Boyd K. Packer said: “The temple is a great school. It is a house of learning. In the temples the atmosphere is maintained so that it is ideal for instruction in matters that are deeply spiritual…. “The temple ceremony will not be fully understood at first experience. It will only be partly understood. Return again and again and again. Return to learn. Things that have troubled you or things that have been puzzling or things that have been mysterious will become known to you. Many of them will be the quiet, personal things that you really cannot explain to anyone else. But to you they are things known…. “So look toward the temple. Point your children toward the temple. From the days of their infancy, direct their attention to it, and begin their preparation for the day when they may enter the holy temple. In the meantime, be teachable yourself, be reverent. Drink deeply from the teachings-the symbolic, deeply spiritual teachings-available only in the temple ” ( The Holy Temple [pamphlet, 1982], 6-8). Ezra Taft Benson asked: “Do we return to the temple often to receive the personal blessings that come from regular temple worship? Prayers are answered, revelation occurs, and instruction by the Spirit takes place in the holy temples of the Lord ” (In Conference Report, Apr. 1988, 98; or Ensign, May 1988, 85). D&C 88:121, 123-126 Personal preparation. The members of this school are instructed to prepare themselves mentally, emotionally, and spiritually for participation in these classes. D&C 88:127-131 Teacher preparation. This advice applies to gospel teachers in all settings. How the School of the Prophets Functioned D&C 88:132-137 A specific greeting ritual and covenant was used in the original school. The School of the Prophets was organized 22 January 1833, less than four weeks after section 88 had directed its establishment. In accordance with the instructions in this revelation, all who participated in the school were admitted by receiving the ordinance of the washing of feet, symbolizing their being clean from the sins of the world (D&C 88:74, 138-139; History of the Church, 1:323). Setting for the School. According to Brigham Young, the school of the prophets met in a small room, about ten by fourteen feet, situated above Joseph Smith’s kitchen at the back of Newel K. Whitney’s store. (Journal of Discourses, 12:157). Sessions began about sunrise and continued until about 4:00 M. Those attending were instructed to bathe, put on clean linen, and come to school fasting. In this school, the leaders of the Church were instructed in gospel doctrine, the affairs of the Church, and other matters. They were to prepare for Church leadership and missionary service. Significant spiritual manifestations blessed meetings of the School of the Prophets. The following occurred when the First presidency was organized during one of the school’s sessions: The Prophet Joseph Smith said: -Great joy and satisfaction continually beamed in the countenances of the School of the Prophets, and the Saints, on account of the things revealed, and our progress in the knowledge of God. The High Priests assembled in the school room of the Prophets, and were organized according to revelation…. “Elder Rigdon expressed a desire that himself and Brother Frederick G. Williams should be ordained to the offices to which they had been called, viz., those of Presidents of the High Priesthood, and to be equal in holding the keys of the kingdom with Brother Joseph Smith, Jun., according to the revelation given on the 8th of March, 1833 [D&C 90:6]. Accordingly I laid my hands on Brothers Sidney and Frederick, and ordained them to take part with me in holding the keys of this last kingdom, and to assist in the Presidency of the High Priesthood, as my Counselors; after which I exhorted the brethren to faithfulness and diligence in keeping the commandments of God, and gave much instruction for the benefit of the Saints, with a promise that the pure in heart should see a heavenly vision; and after remaining a short time in secret prayer, the promise was verified; for many present had the eyes of their understanding, opened by the Spirit of God, so as to behold many things. I then blessed the bread and wine, and distributed a portion to each. Many of the brethren saw a heavenly vision of the Savior, and concourses of angels, and many other things, of which each one has a record of what he saw ” ( History of the Church, 1:334-335). Gospel Study Today Church Education System classes -Seminary, Institute, and Adult Education. Gordon B. Hinckley said: “Our great program of Church education moves forward. The work of training students through the seminary and institute program is constantly being enlarged…. We urge all for whom it is available to take advantage of it. We do not hesitate to promise that your knowledge of the gospel will be increased, your faith will be strengthened, and you will develop wonderful associations and friendships” (In Conference Report, Apr. 1984, 69; or Ensign, May 1984, 47). Wilford Woodruff said: “Do not be discouraged because you cannot learn all at once; learn one thing at a time, learn it well, and treasure it up, then learn another truth and treasure that up, and in a few years you will have a great store of useful knowledge which will not only be a great blessing to yourselves and your children, but to your fellow men” (The Discourses of Wilford Woodruff, 269).
<urn:uuid:951aa65b-4a62-4346-aeba-5679af4b2098>
CC-MAIN-2017-43
https://ldsmag.com/article-1-12754/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820556.7/warc/CC-MAIN-20171017013608-20171017033608-00289.warc.gz
en
0.955383
3,829
3.453125
3
Woody vine, high-climbing by branched tendrils tipped with adhesive disks. Leaves long-petioled, palmately compound. Leaflets usually 5 (3-7), elliptic to obovate, to 15 cm (6 in) long and 8 cm (3 in) wide, acuminate, coarsely serrate above the middle of the blade, glabrous and dull green above, paler and sometimes pubescent below. Inflorescence a panicle of cymes. Flowers small, numerous, yellowish-green, blooming in late Spring or early Summer. Fruits black or dark blue drupes, globose, 5-9 mm (0.2-0.4 in) in diameter, with 1-3 seeds, ripening in Fall. Distribution: Native to the eastern half of the U. S., southeastern Canada, and northeastern Mexico. Habitat: Bottomland forests, oak-hickory forests, Cross Timbers. NWI status: FAC Comment: Virginia creeper is one of the most common plants in the forests of Oklahoma. It is also widely planted as an ornamental, since it is able to climb brick and stone walls. Parthenocissus is from a Greek phrase meaning "virgin ivy"; quinquefolia refers to the five leaflets. Distribution in Oklahoma: RETURN TO INDEX Last update: 9/15/99 Go to Oklahoma Biological Survey Home Page
<urn:uuid:71cc757e-3370-447c-8a2e-e2e5992f1d6a>
CC-MAIN-2015-11
http://www.biosurvey.ou.edu/shrub/paqu2.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463658.66/warc/CC-MAIN-20150226074103-00116-ip-10-28-5-156.ec2.internal.warc.gz
en
0.859615
308
3
3
Once upon a time A贸nikenk (Tehuelche) tolder铆as (teepees) dotted this is Southern Patagonia landscape scattered with 3000-year-old archaeological remains. Later European colonists came to establish the large sheep estancia in the region here. Hernando de Magallanes and Charles Darwin explored these shores, hunters killed sea lions for oil and miners scraped the rocks of millennia guano. From Ruta Nacional 3, a road cuts eastward across steppe lands where guanaco, rhea, puma and fox reign. It ends at the South Atlantic coast laced with coves, rocky outcrops, islands, beaches and deep low-tide flats. This is Parque Nacional Monte Le贸n, the first coastal national park in Argentina. This reserve contains 62,175 hectares of Patagonian steppe and shore, including 40 kilometers (24 mi) of coastline. The land is covered by two types of vegetation: mata negra (Junellia tridens) and mata verde (Lepidophyllum cupressiforme). On route to Parque Nacional Monte Le贸n is Ca帽ad贸n de los Guanacos, a prime spot for spotting Choique (Lesser Rhea, Pterocnemia pennata), guanaco (Lama guanicoe), peludo (hairy armadillo, Chaetophractus villosus) and zorro colorado (Andean fox, Pseudalopex culpaeus). Also along the way is a trail to the ping眉inera where 75,000 pairs of Ping眉ino de Magallanes (Magellanic Penguin, Spheniscus magellanicus) breed (1.5 hr walk round trip). Near the end of the main road is a path leading to a viewpoint of the lober铆a on Cabeza de Le贸n. Here reproduce lobo marino de un pelo (South American sea lion, Otaria flavescens) (20 min round trip). Offshore is Isla Monte Le贸n. It is for this rock formation looking like a giant lion resting that the park owes its name. This island, once exploited for guano, is a nesting ground for three varieties of cormorants: Cormor谩n Gris (Red-legged Cormorant, Phalacrocorax gaimardi), Cormor谩n Roquero (Rock Shag, Phalacrocorax magellanicus) and Cormor谩n Imperial (Imperial Shag, Phalacrocorax atriceps). Another attraction of Parque Nacional Monte Le贸n is La Gruta. Although this geologic formation collapsed in 2006, at low tide you can still walk to where it was (45 min round trip; consult with the ranger about conditions before striking out). Aside from the star attractions, the sea lions and penguins, Parque Nacional Monte Le贸n also boasts over 70 species of birds, including the three cormorants, rhea, Gaviot铆n Sudamericana (South American Tern, Sterna hirundinacea), and Ostrero Negro (Blackish Oystercatcher, Haematopus ater). Sometimes ballena franca austral (Southern right whale, Eubalaena australis), delfin austral (Peale's dolphin, Lagenorhynchus australis) and tonina overa (Commerson's Dolphin Cephalorhynchus commersonii) are sighted the coast. As well, five reptiles, including the matuasto (Diplolaemus darwini) call this land home. The park experiences a South Ocean Climate. Its annual precipitation totals 255 millimeters (10 in). Temperatures average 1.8潞C (35潞F) in winter and 14.6潞C (58潞F) in summer. Always carry warm clothing when visiting here. Parque Nacional Monte Le贸n is open October-March. Entry is free. Camping is allowed within the reserve at designated areas. The main ranger station is in the former estancia鈥檚 main building. However, the main administration office, or Intendencia del Parque Monte Le贸n, is in Puerto Santa Cruz (Monday-Friday 9 a.m.-4 p.m. San Martin 112, Tel.: 49-8184, E-mail: [email protected], URL: boletinmonteleon.blogspot.com / www.parquesnacionales.gov.ar).
<urn:uuid:00afc1ef-4f3e-4494-b4d2-4a292691cc34>
CC-MAIN-2017-17
http://www.vivatravelguides.com/south-america/argentina/patagonia/argentinas-ruta-3/parque-nacional-monte-leon/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121267.21/warc/CC-MAIN-20170423031201-00566-ip-10-145-167-34.ec2.internal.warc.gz
en
0.769681
1,031
2.640625
3
History of Internet Why did the object first come about? Did someone set out to make it or did an accident of sorts inspire the inventor? In the late 1950's the Advanced Research Projects Agency (ARPA) was founded in the United States with the primary focus of developing information technologies that could survive a nuclear attack. This project was made on purpose. Through what stages did the object develope? What caused the changes in the object over time? If the 1970's were a time of research, the 1980's were a time of development. The TCP/IP protocol was introduced in 1983. How did the everyday object in questin change the object change the way people behave? Families and friends can communicate with each other a lot easier and faster by using email and chat room. The Internet has given people great knowledge. What did the economic impact of the object? That is, how many are made each year, and how many people are involved in making it? The Advanced Research Projects Agency was the one who made the internet? Christopher, Jerry, Crystal, Rosemary
<urn:uuid:c8c9fe53-a804-45a1-b0b7-c4c3a5e3c6c3>
CC-MAIN-2018-13
https://www.smore.com/7tms7
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648404.94/warc/CC-MAIN-20180323161421-20180323181421-00633.warc.gz
en
0.967482
224
3.21875
3
September is National Spinal Cord Injury Awareness month. There are approximately 17,000 new spinal cord injury (SCI) cases each year. Approximately 80% of new cases are male, and the primary causes of SCI are motor vehicle accidents, acts of violence (primarily gunshot wounds), falls and injuries that occur during recreational activities. For more facts and statistics about SCI, check here: SCI Facts and Figures at a Glance For information and resources, check out the United Spinal Association’s Spinal Cord Resource Center: Spinal Cord Resource Center
<urn:uuid:b56277ed-964a-4fb4-bf32-9278b4478f97>
CC-MAIN-2022-33
https://disabilityrightsar.org/3079-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00134.warc.gz
en
0.936627
116
2.953125
3
Sleep Apnea Appliance What is sleep apnea? Sleep apnea is a serious, potentially deadly sleep disorder that affects millions of Americans, including children. People who have sleep apnea actually stop breathing for 10 seconds to 30 seconds at a time during their sleep, and these episodes can happen up to 400 times every night. Although it would seem like our bodies would immediately respond to a cessation in breathing, unfortunately it can take some patients up to 120 seconds before they begin to breathe again! So why does this happen? Sleep apnea actually comes down to an airway issue. Dr. Coffey says think of it like a garden hose. When you bend a garden hose, most of the water is trapped and can’t get out. Patients with sleep apnea have closed off or restricted airways, especially when they lie down, which causes them to stop breathing. Who is most affected? How do I know if me or my child is at risk? Dr. Coffey says sleep apnea can affect men, women, or children of any weight or age. However, overweight men with larger necks tend to be those at the highest risk. What are the symptoms of sleep apnea? (Remember, you don’t have to have all of these symptoms to actually be diagnosed with Sleep Apnea. Presenting symptoms and the severity of a cases can vary from person to person) - Heavy, loud, chronic snoring - Choking or gasping during sleep - Long pauses in your breathing during sleep - Daytime sleepiness (such as falling asleep at work, while driving or when talking) - Irritability or fatigue - Headaches, forgetfulness, and a decreased interest in sex - Waking up with a dry mouth or sore throat - Waking up feeling out of breath How is sleep apnea treated? There are several treatment options for patients suffering from sleep apnea. Depending on the severity of your case, and also what you personally can tolerate, your physician and Dr. Coffey will come up with the best treatment plan for your individual case. In some cases, a CPAP machine is recommended. CPAP stands for Continuous positive airway pressure therapy. A CPAP machine is basically a mask connected to an air machine that’s worn at night during sleep to help the patient breathe more easily. A CPAP machine increases air pressure in your throat so that your airway does not collapse when you breathe in. Some patients adjust to the CPAP easier than others. Sleep Apnea Appliances For patients who can’t tolerate the CPAP, or whose cases don’t warrant using a CPAP device, Dr. Coffey says there are appliances that can be worn at night to move the jaw in a more forward position and keep the airways open. One of the oral appliance devices used at Edward B. Coffey, DDS MS – Encinitas Dental Art to treat sleep apnea is the Herbst appliance. Herbst is a custom-made mandibular repositioning device designed for the treatment of snoring and sleep apnea. The appliance works by repositioning the lower jaw downward and to a slightly more forward position, which allows the airway to remain open throughout the night. Dr. Coffey can discuss your options when it comes to available appliances during your sleep apnea consultation. If you would like to schedule a FREE consultation for a sleep apnea appliance with Encinitas Dentist, Edward B. Coffey, DDS MS – Encinitas Dental Art, please call us at (760) 942-7272. Hablamos Español.
<urn:uuid:13b9cb00-f755-45ae-88f8-4bb3065c284a>
CC-MAIN-2022-40
https://www.encinitasdentalart.com/treatments/sleep-apnea-appliance/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00734.warc.gz
en
0.932837
758
3.015625
3
The Printed Museum: 3D printings impact on museum audience, policy and practice. What is 3D printing? 3D printing is the process of transforming 3D computer models into physical objects. This process is usually done by successively depositing thin layers of molten material to form a three dimensional object. It is currently possible to 3D print in a range of different materials including plastic, wax, metal and ceramic. This research examines the impact 3D printing has on different museums. It examines regional, national and international museums to gain an understanding of how and why 3D printing affects a museum, its policies and audiences. A particular focus is on the visual and physical properties of 3D printed museum objects and how they affect the formulation of meaning. At present both national and university museums are using 3D printing in research and audience engagements. However, it is currently unclear how people learn from this these objects which, in turn affects the museum experience and formulation of object based meaning. A 3D printed museum object is visually different from the original museum object, requires a digital model to print from, and is often printed in contemporary materials such as plastic. This generates a visual disconnection between the 3D printed object, its source artefact and digital scan, which, combined with a museums reputation as a centre for historical learning, makes the integration of 3D printing into museum practice an important and timely area of research. This research adopts an experimental approach, positioning 3D printed museum objects at the centre of this study. It will also take into account the digital model of the museum object, as it is an intrinsic part of the 3D printing process and is often combined with 3D printing to support object research and audience engagements. As an initial means of investigation this research will undertake a pilot study, scanning and printing museum objects in a range of different materials. The results of this will inform further investigations held in a regional, national and international museum. These further investigations will form the main part of this research and comprise of task-based interviews and workshops with museum staff and professionals. 3D printed museum objects and their scans will be used throughout the interviews and workshops as a way of provoking and generating thoughts around the use, materiality and impact of 3D printed objects within museums. Why is this research important? 3D printing has only recently been integrated into the cultural sector and as such very little is known about how it effects museums on a practical and theoretical level. There has been no practical or academic study which examines how 3D printing effects museum research, learning or curatorial practice. This is an important issue, and one this research will attempt to solve, especially given the media interest and support from funding bodies that 3D printing in museums in currently receiving. Furthermore by undertaking a comparative study of how 3D printing impacts on a regional, national, and international museum, this research will provide a cross-cultural cross-institutional analysis of policy, perception and environmental developments that could benefit UK museum practice and vice versa. This will provide a platform for future research and audience engagements with 3D printed museum objects to take place. Amelia Knowlson is a PhD researcher, freelance curator and lover replicating museum objects. She completed her MA studies at Newcastle University during which she won the Day Star award for outstanding studentship. Upon graduating she was employed on the AHRC project ‘Co-Curate’ where she engaged communities and museums with 3D capture and print technology. Amelia has built a strong reputation of working with museums where, as a freelance curator she has led workshops and curated exhibitions using 3D print and capture technology. She has worked with The Laing Art Gallery, The Centre for Life and The Great North Museum. For Amelia, 3D printing is a vital tool for future engagements within museums and this belief has influenced all aspects of her academic and practical work. She is currently in receipt of catalyst funding to co-develop sensory interactives with the Royal Society of the Blind. Amelia has presented her work national conferences including the 2015 Provocative Plastics held at The Art University at Bournemouth, where her work appears as part of the conferences publication and the 2015 Social History Conference hosted by Museums Sheffield. She is supervised by Dr Becky Shaw at Sheffield Hallam University and co-supervised by Dr Andrew Wilson at Bradford University and Nick Dulake from Sheffield Hallam’s Design Futures.
<urn:uuid:96ae9543-dbff-4a61-b659-9d0782d6fc2e>
CC-MAIN-2017-34
http://www.heritageconsortium.ac.uk/current-students-2/2015-cohort/amelia-knowlson/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102967.65/warc/CC-MAIN-20170817053725-20170817073725-00166.warc.gz
en
0.955417
898
3.140625
3
I couldn't play on the same playground as the white kids. I couldn't go to their schools. I couldn't drink from their water fountains. There were so many things I couldn't do. In 1963 Birmingham, Alabama, thousands of African American children volunteered to march for their civil rights after hearing Dr. Martin Luther King Jr. speak. They protested the laws that kept black people separate from white people. Facing fear, hate, and danger, these children used their voices to change the world. Frank Morrison's emotive oil-on-canvas paintings bring this historical event to life, while Monica Clark-Robinson's moving and poetic words document this remarkable time.
<urn:uuid:65495e2c-c883-40fb-a4ae-1a9432d8955f>
CC-MAIN-2023-40
https://frugalbookstore.net/products/let-the-children-march-by-monica-clark-robinson-frank-morrisonillustrator?_pos=1&_sid=eba6f0d36&_ss=r
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510179.22/warc/CC-MAIN-20230926075508-20230926105508-00885.warc.gz
en
0.975954
142
3.09375
3
10 card games for language learners Levels: Beginner to Intermediate. Primary to Adult. Illustrated by: Thomas Pyle Learning vocabulary and question/answer practice are all part of the game, naturally. These games provide the motivation and the structure for practicing conversation. The simple rules encourage players of any age to be creative and humorous. They relax and speak up, even in groups of mixed language proficiency. There are 40 full-color, plastic-coated playing cards-10 families, each with a mother, father, daughter, and son. Each card has 8 features: clothes, hat, shoes, expression, object, cost, transportation, and time. How to Play Game 1 ... 1 Sample Exchanges ... 2 40 full-color, plastic-coated playing cards ready to be torn out and cut up with scissors along the dotted lines. Round the cormers. Suggestions to the Teacher ... 3 Possible Linguistic Items ... 4 Nine More Games ... 5
<urn:uuid:9cc31330-2ff7-4a8f-962d-cd176658bff1>
CC-MAIN-2018-13
http://www.fll.co.kr/shop/view.asp?gno=336
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645775.16/warc/CC-MAIN-20180318130245-20180318150245-00762.warc.gz
en
0.916783
205
3.359375
3
Why don’t you join the current project – the wonderful world of Cyprus bats? The new project began in summer 2006 when we learned that the fruit bats of Cyprus were unprotected and were being shot for fun. Bats are strictly protected by law in every EU country including Cyprus, of course. Yet practically no measures had been taken to set up any conservation system more than a decade after bat work had begun in countries such as Ireland or the UK. In only a few months, ARC had produced posters and leaflets in English, Greek and Turkish. They also succeeded in co-organising the island’s first seminar on bats, which was attended by government personnel from Forestry and other departments. They also succeeded in getting the Competent Authority (Department of Environment) to erect protective fences around the fruit bats’ cave roosts. Did you know? Cyprus is the only EU country to have fruit-eating bats? These megechiropterans (or large bats) may come to your garden to feed, if you have fig trees or mesphila. You may see the mother bats with their infant clinging to their belly, before the young are able to fly. Why you are lucky if u have bats visited your garden? One of the small insect-eating (microchiropteran) bats can eat literally thousands of mosquitoes each evening, amounting to tons in one year. Please don’t spray insecticides – let these harmless little creatures do the job. What can you do? – Put up a couple of bat boxes – Contact ARC for leaflets/ posters to distribute – Count your bats. – Contact ARC and they can visit with a bat detector and tell you what species you have. – Join the bat walk. – Teachers – ask them to visit your school – use our bat educational worksheets – Bats cannot get caught in your hair – their echolocation is so finely tuned that they can detect a spider’s web. – Bats will collect in your house. Not true. Each bat can only have one baby per year (it is a mammal like us). Bats constantly move – from maternity roosts to hibernation roosts etc.
<urn:uuid:f15a7163-ea2a-4f0b-9dac-baa2428e8e9e>
CC-MAIN-2016-50
http://www.animalscyprus.org/
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543567.64/warc/CC-MAIN-20161202170903-00180-ip-10-31-129-80.ec2.internal.warc.gz
en
0.959023
463
3.09375
3
Did you know that the U.S. government paid $20,000 to move a cemetery to make way for the Hanford nuclear reservation in 1943? Or that the federal government published a pamphlet in 1945 to dispel myths about Japanese-Americans such as widespread disloyalty and dishonesty? That information comes from two of the more than 600,000 federal documents kept at Central Washington University’s Brooks Library. The library adds 10,000 to 20,000 new items every year. Photo: CWU Dean of Libraries Patricia Cutright oversees numerous and diverse volumes of information found in the Federal Depository Library located on Central's Ellensburg campus. Read more here. Article and story courtesy of the Yakima Herald-Republic.
<urn:uuid:77a4ff5f-564f-4ceb-a1af-398acc3eaf84>
CC-MAIN-2015-18
https://www.cwu.edu/print/3467
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430448947973.19/warc/CC-MAIN-20150501025547-00073-ip-10-235-10-82.ec2.internal.warc.gz
en
0.91323
151
2.53125
3
“I will gladly pay you Tuesday for a hamburger today” -Wimpy from the classic cartoon Popeye Making the rounds in the press lately are many stories about the United States Debt Level passing the $22 trillion mark. Some are concerned about the debt level and others argue that deficits don’t matter. The reason for the complacency about the national debt can in part be attributed to an Australian economist named Bill Mitchell. In 1990, Mitchell coined the term Modern Monetary Theory or MMT (1). MMT as an idea is starting to make a resurgence in economic circles. Once you understand what it means, hopefully you will think this theory is as ill-conceived as we think it is. According to MMT, the United States and other countries that have the ability to print their own money and borrow from foreign governments in their own currency shouldn’t have to worry about running deficits.That’s because, according to MMT, we won’t ever run out of money. We can simply raise taxes or just print more greenbacks. But money doesn’t grow on trees. There are limits to how much money the United States can prudently borrow or print, in our opinion. If pushed too far, sooner or later the credit of the US Government could be called into question. Keep in mind that in 2011 S&P downgraded US Debt from AAA to AA+. Also, the more dollars in circulation over time (printed money) should equal a devalued currency (read inflation). In order to be compensated for the extra credit risk and the risk of inflation, foreign investors should demand higher interest rates in order to lend to the US. And the cycle would continue and interest payments would increase over time until MMT comes crashing down. Fortunately, the general consensus in economics right now seems to be that MMT won’t work and that our deficits do need to be corrected at some point. For example, Fed Chair Jerome Powell said during a recent interview that our deficits aren’t sustainable. Going back a few years Alan Simpson and Erskine Bowls famously attempted to craft a bipartisan path to fix the deficit. Unfortunately, the the political will to follow up wasn’t there. But let’s keep things in perspective. First of all, this is a long-term problem and probably not an immediate threat to the stock and bond markets. Secondly, there is still time to address the fiscal irresponsibility of the past. Hopefully the following charts will illustrate why we don’t think that the debt and deficit are immediate threats to our economy. We do believe that ultimately the good ‘ole USA will figure things out – just like we’ve always done. (1) Modern Monetary Theory Creates more problems than it solves – Global Economics January 31, 2019 In their best-selling book Ken Rogoff and Carmen Reinhart demonstrate empirically that when a nation’s debt reaches 90% of GDP then there tends to be a 1% drag on economic growth. This phenomenon occurs across a diverse sample of countries, government philosophies and even centuries. The chart below shows that the US Government has already surpassed the 90% debt to GDP ratio. The rate of increase of Public Debt Outstanding has come down.But we still have a long way to go to balance the budget. The Consumer is about 70% of the US Economy so let’s see how Mom and Pop are doing. 1) Subprime loans appear to be in check since the Great Recession…... 2) and mortgage delinquencies seem contained…… 3) Credit Card Delinquencies are below pre-recession levels and appear to be stabilizing…... 4) The delinquency rate on Student Debt looks like the chart above – credit card debt. But this is an area to watch for future signs of trouble. So how about Corporate America? The much-advertised binge on corporate debt doesn’t appear so bad and it could be moderating. Conclusion: MMT is an economic theory that we believe is bunk. To think that a country can just print, tax and spend indefinitely is the height of absurdity. However, much of the evidence in the previous charts suggests that the day of reckoning is some ways down the road. Hopefully we as a nation will fix the issue while we still can. But for now, we think the national debt is a back-burner issue.
<urn:uuid:4f106474-fa3f-42cf-929e-26033712811f>
CC-MAIN-2019-51
https://www.emeraldam.com/single-post/2019/03/01/Somebody-Lend-Me-a-Dollar
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541318556.99/warc/CC-MAIN-20191216065654-20191216093654-00344.warc.gz
en
0.946682
916
2.796875
3
The purpose of a dental sealant is to create a protective barrier on your teeth to help prevent decay. Since back molars tend to have grooves that are difficult to clean, sealants can be used to help safeguard them from cavities. Whether you are a child who has never had a cavity or an adult who is constantly going to the dentist, Greenbelt Dental Associates can determine if you are a good candidate for dental sealants. A dental sealant is a paste or gel that is placed on your tooth by a dentist. Usually, it is made of a specific type of plastic material, but sometimes other materials are used. The dental sealant later hardens to create a strong coat over your tooth. If the dental sealant needs intense light to solidify, the dental professional will shine ADA approved lights on the tooth in the safety of the office. Once dental sealants have hardened, they should be very durable and last for several years. Prevention is the best type of treatment. Dental sealants prevent food and bacteria from getting into the little nooks and crannies of your teeth. The back molars are particularly susceptible to decay since they tend to be rougher with more grooves and dips for breaking food down. These grooves and crevices can be very difficult to clean. Children with teeth that have no decay are great candidates for dental sealants. Adults may also have sealants applied to teeth that are free of decay. We’ve applied sealants to many patients from Greenbelt, Beltsville, Lanham, Riverdale, Hyattsville, Glenn Dale, and surrounding areas. We know just what to look for to determine if sealants are a good idea for you. After you have had dental sealants applied you should continue with good oral care. Regular checkups are very important so the dentist can make sure the sealants are holding up properly. The dentist will check the dental sealants during every visit to determine if they need to be reapplied. According to the ADA, even though your dental sealants are providing your teeth with some more protection, you still need to brush your teeth for two minutes two times a day. The ADA further suggests that you floss once a day to help remove sticky plaque and bacteria that can lead to tooth decay between your teeth. Give us a call at (301) 241-8100 to hear more about how dental sealants can protect your teeth. When you’re ready to come in for a visit, you’ll find that Greenbelt Dental Associates is easy to get to in Greenbelt, Maryland.
<urn:uuid:f5c3bb41-6908-44e7-ac59-d65660f041fc>
CC-MAIN-2019-43
https://www.greenbeltdentalassociates.com/services/general-dentistry/dental-sealants.php
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987779528.82/warc/CC-MAIN-20191021143945-20191021171445-00289.warc.gz
en
0.953473
542
2.5625
3
Handbook of Demonstrations and Activities in the Teaching of Psychology, Second Edition Volume III: Personality, Abnormal, Clinical-Counseling, and Social Edited by Mark E. Ware, David E. Johnson Psychology Press – 2000 – 330 pages For those who teach students in psychology, education, and the social sciences, the Handbook of Demonstrations and Activities in the Teaching of Psychology, Second Edition provides practical applications and rich sources of ideas. Revised to include a wealth of new material (56% of the articles are new), these invaluable reference books contain the collective experience of teachers who have successfully dealt with students' difficulty in mastering important concepts about human behavior. Each volume features a table that lists the articles and identifies the primary and secondary courses in which readers can use each demonstration. Additionally, the subject index facilitates retrieval of articles according to topical headings, and the appendix notes the source as it originally appeared in Teaching of Psychology--especially useful for users needing to cite information. The official journal of the Society for the Teaching of Psychology, Division Two of the American Psychological Association, Teaching of Psychology is a highly respected publication devoted to improving teaching and learning at all educational levels. Volume III consists of 95 articles about teaching personality, abnormal, clinical-counseling, and social psychology. Divided into four sections (one for each specialty), the book suggests ways to work with case studies, advocate a research perspective, use the arts and literature as teaching tools, and otherwise facilitate understanding of theoretical concepts. "…the second [edition] has something to offer to all teachers of psychology. It is well organized, with a structure that parallels most introductory psychology texts….This three-volume set of class activities complied by Ware and Johnson remains a potentially valuable resource for the faculty member who desires to be more effective in the classroom. It is arguably the most complete source of its kind available to teachers of psychology." Contents: Preface. Part I: Personality. Discovering Students' Perspectives. Exploring Theories. Emphasizing Writing. Part II: Abnormal. Teaching With Simulations. Teaching With Case-Studies. Teaching Abnormal Psychology Through the Arts and Literature. Examining Miscellaneous Issues. Part III: Clinical-Counseling. Learning Concepts and Principles. Acquiring Skills--Undergraduate Students. Acquiring Skills--Graduate Students. Treating Fears. Advocating a Research Perspective. Part IV: Social. Focusing on Experimentation. Emphasizing Writing in Social Psychology. Illustrating Concepts in Social Perception and Social Cognition. Demonstrating Bias in Social Perception and Social Cognition. Teaching About Attitudes and Persuasion. Exploring About Aggression. Examining Group Processes. Teaching About Spatial and Nonverbal Behavior. Examining Stereotypes of Gender and Race. Integrating Social Psychology and Personality. Examining Miscellaneous Issues.
<urn:uuid:62099ed6-f1c8-4693-8d82-0a020de6a14c>
CC-MAIN-2015-22
http://www.psypress.com/books/details/9780805830477/
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928869.6/warc/CC-MAIN-20150521113208-00173-ip-10-180-206-219.ec2.internal.warc.gz
en
0.888861
583
2.90625
3
What is it? Women are significantly more often affected by stalking than men. Most offenders are known to the victims. Stalking means following and harassing another person constantly. It could also commonly be described as “psychological terror”. The phenomenon became more widely known due to celebrities who felt persecuted by fans. Today it is known that persecutions, harassment and psychological terror are widespread phenomena and that, generally speaking, all people can become stalking victims although women are significantly more often affected. Even though some offenders are unknown to the victims, the majority of victims know the stalker. These are prevalently rejected men, ex-partners or ex-husbands, who do not accept the rebuff or separation. Temporary rage or lovesickness are not stalking though. This could only be called stalking if the pursuit is persistent. There is a smooth transition from harassing actions to stalking. Stalking can last months to years. A certain continuity and frequency of the stalking incidents are characteristic. Stalking actions may be: - repeated phone calls at any time of the day and night, privately and at work; - messages on the answering machine; - frequently turning up in front of the victim’s residence, work, in the supermarket etc.; - sending letters, e-mails and text messages on a massive scale; - following the victim on her daily journey to work, to sports or to meet friends; - unwanted presents; - purchase orders or subscriptions in the victim’s name; - spying on her daily routine, social environment and personal data; - damage to property, e.g. the door, car, in the garden etc.; - bodily harm; Women are far more often victims of stalking than men. According to research, 17% of all women and 4% of all men become victims of a stalker once in their lifetimes in Germany (Dressing, Kuehner, Gass (2005). The offenders come from all walks of life and belong to all age groups. Approximately 80% of offenders are men. About 80% of victims are women. The culprits are mostly ex-partners (Dressing & Gass 2005).
<urn:uuid:db98786d-df80-41d8-a61f-3d2b3098fde6>
CC-MAIN-2019-30
https://www.frauen-gegen-gewalt.de/en/what-is-it-772.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528635.94/warc/CC-MAIN-20190723002417-20190723024417-00497.warc.gz
en
0.961466
454
2.640625
3
THE EFFECT OF FAST, LIGHT AND FAVORITE MUSIC ON PHYSIOLOGICAL FUNCTION AND PHYSICAL PERFORMANCE OF THE MALE ATHLETE STUDENTS Languages of publication Listening to music can be useful for athletic performance because of the similarities between the rhythm of the music and the movements of the human body. Given the ambiguity in the lead for better music, the goal of this study was to investigate the effect of fast, light and favorite music on physiological function and physical performance of the male athlete students. 25 healthy male athlete students with the age of 20.8 ±1.20 years, height of 180.5 ±7.02 cm and weight of 70.8 ±10.9 kg participated in this study voluntarily. The present study was a repeated based test (4 times without music, fast, light and favorite music in 4 consecutive weeks with a one week rest apart them to control the effects of fatigue during the test). Results showed that fast music caused a significant changes in anaerobic power, sprint, agility, muscular endurance, aerobic power, rating of perceived exertion (RPE) (p < 0.05). Also, favorite music caused significant changes in explosive power and agility (p < 0.05). But, light music just made significant effect on minimum power (p < 0.05). According to this study, it seems that listening to fast music before aerobic and anaerobic activities can be effective on maximum and submaximal functions. - Alex, Z.R., Adelino, S.R.S, Claudio, A.G. (2008). Determinations and Relationships of the RAST Anaerobic Parameters, Anaerobic Threshold and Lactacidemia Response Obtained at the Beginning, Interval and the End of an Official Handball. MatchRev Bras Med Esporte, 14 (1), 46. - Atkinson, G., Wilson, D., Eubank, M. (2004). Effects of music on work-rate distribution during a cycling time trial. International Journal of Sports Medicine, 25, 611–615. - Barwood, J.M., Weston, Neil J.V., Thelwell, R., Page, J. (2009). Motivational music and video intervention improves high-intensity exerciseperformance. J of Sports Science and Medicine. No. 8, 435–442. - Baulddoff, G.S., Hoffman, L.A., Zullo, T.G., Sciurba, F.C. (2002). Exercise maintenance following pulmonary rehabilitation: effect of distractive stimuli. Chest, 3, 948–954. - Birnbaum, L., Boone, T., Huschle, B. (2009). Cardiovascular responses to music tempo during steady-state exercise. Exercise Physiology online, 12, 50–56. - Boutcher, S.H., Trenske, M. (1990). The effects of sensory deprivation and music on perceived exertion and affect during exercise. Journal of Sport & Exercise Psychology, 12, 167–176. - Copeland, B.L., Franks, B.D. (1991). Effects of types and intensities of background music on treadmill endurance, J Sports Med Phys Fitness, 31 (1), 100–103. - Costasi, K., Terry, P.C. (1997). The psychophysical effects of music in sport and exercise. A review. - Crust, L., Clough, P.J. (2006). The influence of rhythm and personality in the Endurance response to motivational asynchronous music. Journal sport science, 24 (2), 95–187. - Crust, L. (2004). Carry-over effects of music in an isometric muscular endurance task. Percep Mot Skills, 98, 985–991. - Dave, E., Sam, C., Duncan, O. (2005). The effect of motivational music on submaximal exercise. European Journal of Sport Science, 9, 97–106. - Eliakim, M., Meckel, Y., Nemet, D., Eliakim, A. (2007). The effect of music during warm-up on consecutive anaerobic performance in elite adolescent volleyball players. Int j sports med, 4, 321–325. - Ferguson, A.R., Carbonneau, M.R., Chambless, C. (1994). Effects of positive and negative music on performance of karate drill. Perceptual Motor skill, 78, 1217–1218. - Geisler, G., Leith L.M. (2001). Different type of asynchronous music and effect onperformance of basketball foul shot. Percept Mot Skills, 93, (3), 734. - Ghaderi, M., Rahimi, R., Azarbayjany, M.A. (2009). The effect of motivational and relaxation music on aerobic performance, rating perceived exertion and salivary cortisol in athlete males. South African Journal for Research in Sport, Physical Education and Recreation, 31 (2), 29–38. - Hayakawa, Y., Miki, H.T., Akada, K., Tanaka, K. (2000). Effect of music on mood during bench stepping exercise. Percept Mot Skills, 1, 307–314. - Karageorghis, C.I., Mouzourides, D.A., Priest, D.L., Sasso, T.A., Morrish, D.J., Walley, C.L. (2009). Psychophysical and Ergogenic Effects of Synchronous Musicduring Treadmill Walking. Sport & Exercise Psychology, 31, 18–36. - Karageorghis, C.L., Drew, K.M., Terry, P.C. (1996). Effects of pretest stimulative and sedative music on grip strength. Percept Motor Skills, 83, 1347–1352. - Koc, H., TurchIan C. (2009). The effects of music on athletic performance. Ovidius University Annals, series physical education and sport/science, movement and health. No.1, 44–47. - Labbe, E., Schmidt, N., Babin, J., Pharr, M. (2007). Coping with stress: the effectiveness of different types of music. Appl Psychophysiol Biofeedback, 32 (3–4), 163–168. - Leslie, J.J. (1967). The effect of music on the development of speed in running. Physiocal Education and Recreation, 10, Abstract, (697). - Litwack, G., & Schmidt T.J. (1992). Biochemistry of hormones: Steroid Hormones. Devlin, T.M: Text Book of Biochemistry: With clinical correlations. 3rd Ed New York: wiley-liss. - Makoto, I., Asami, K., Chie, K. (2005). Heart rate variability with repetitive exposure to music. J Biological Psychology, 70, 61–66. - McMordie, J. (2009). The Effect Of Music Loudness On Anaerobic Performance And Muscular Endurance. Medicine & Science in Sports & Exercise, 41 (5), 257. - Miller, T., Manire, A., Robertson, S., John, R., Barbara, W.B. (2010). Effect of music and dialogue on perception of exertion, enjoyment, and metabolic responses during exercise. International J of Fitness, No. 2, 45–52. - Mohammadzadeh, H., Tartibiyan, B., Ahmadi, A. (2008). The effects of music on the perceived exertion rate and performance of trained and untrained individuals during progressive exercise. Physical Education and Sport, 6, 67–74. - Nakamura, P.M., Pereira, G., Papini, C.B., Nakamura, F.Y., and Kokubun, E. (2010). Effects of preferred and nonpreferred music on continuous cycling exercise performance. Percept Mot Skills, 110, 257–264. - Nittono, H., Tsudakai, S., Nakajima, Y. (2000). Tempo of back ground sound and performance speed. Percept, Mot Skill: (3 Pt2), 11–22. - Pujol, T.J., Langenfeld, M.E. (1999). Influence of music on wingate Anaerobic test performance. Percept Mot Skill, 88, 292–296. - Schmidt Peters, J. (1991). Introduction to music therapy. Translation of Ali Zadeh Mohammadi. Asrar danesh publishers, second edition, 486. - Schwartz, S.E., Fernhall B., Plowman, S.A. (1990): Effect of music on exercise performance. Journal of Cardiopulmonary Rehabilitation, 10, 312–331. - Shephard, R.J. (2001). Chronomic fatigue syndrome: an update. Sports Med. 31 (3), 167–94 [Rev. Article]. - Simpson, S., Karageorghis, C.I. (2006). The effects of synchronous music on 400-m sprint performance. Journal of Sports Sciences, 24 (10), 1095–1102. - Smolen, D., Topp, R., Singer, L. (2002). The effect of self- selected music during colonoscopy on an anxiety, heart rate, and blood pressure. Appl, Nurse, Res, 15, 126–136. - Szabo, A., Small, A., Leigh, M. (1999). The effects of slow - and fast-rhythm classical music on progressive cycling to voluntary physical exhaustion. The Journal of Sports Medicine and Physical Fitness, 39, 220–225. - Van Eck, M., Berkhof, H., Nicolson, N., Sulon, J. (1996). The effects of perceived stress, traits, mood states, and stressful daily events on salivary cortisol. Psychosomatic Medicine, 58 (5), 447–458. - Yamamoto, T., Ohkuwa, T., Itoh, H., Kitoh, M., Terasawa, J., Tsuda, T., Kitagawa, S., Sato, Y. (2003). Effects of Pre-exercise Listening to Slow and Fast Rhythm Music on Supramaximal Cycle Performance and Selected Metabolic Variables. Archives Of Physiology And Biochemistry, 111 (3), 211–214. Publication order reference
<urn:uuid:e382354b-44e2-42a5-8ab7-7d4546b11d97>
CC-MAIN-2017-43
http://psjd.icm.edu.pl/psjd/element/bwmeta1.element.psjd-28731f7a-f505-4132-97b9-1023996ed7ec
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820487.5/warc/CC-MAIN-20171016233304-20171017013304-00582.warc.gz
en
0.749626
2,232
2.546875
3
India is truly a fast emerging space power in the world. Space conquest probably began during the cold war between two most powerful states, United States and Soviet Union (now disintegrated into 15 different countries). However, the main aim of the race was not space exploration, but was political exploitation. Although India was far behind in the conquest of space, but hats off to Indian space scientists who made India into the list of space conqueror. Many believe that ‘Indian space exploration’ history is just few decades old when in 1961; the National Committee for Space Research was set up under the Chairmanship of Dr. Vikram Sarabhai. But in reality, the history dates back around 1500 years ago. Famous mathematician and astronomer during Chandragupta regime (5th century AD.), Aryabhata gave some great calculation regarding space that is almost accurate. He presented his theory of heliostat, which states that planets revolve around the sun. This theory was presented about a millennium before than the very same theory presented by Galileo. Rig Veda, the oldest text, also mentioned space exploration. India’s rich space exploration history is probably unparallel in the world. But, in the real sense, the history of space exploration starts in 1963, when a sounding rocket, Nike Apache was launched from a church-turned-launch pad, Thumba Equatorial Rocket Launching Station (TERLS) in Kerela. This was a point where space development started. Then the first Indian satellite, Aryabhata was launched in April 1975. Although designed by scientists of ISRO, but Aryabhata was launched from the Soviet Union cosmodrome at Baikonur. Then it was the era of advancement in communication. India too participated in the race by sending its first experimental communication satellite, APPLE (Ariane Passenger Payload Experiment), which made India the sixth country to send communication satellite. Although designed by Indian scientists working at ISRO, previously, the satellites were sent by other countries, due to lack of technology. But after the successful launch of Rohini satellite into the space, India is now not only capable to launch her own satellites from native land, but also the payload of other countries. So India is a self-sufficient country in the field of space exploration. With the failure of SLV-3 in 1979, India’s debut venture in developing satellite launch vehicle was introduced. But later in 1983, a modified version of SLV-3, carrying Rohini-2 was successfully launched. The satellite sent 2,500 pictures to its ground station. Again starting with a failure, ISRO launched ASLV (Augmented Satellite Launch Vehicle) program. But in 1992, ASLV-D3 successfully placed SROSS-III into the orbit. Then came the PSLV (Polar Satellite Launch Vehicle) program. Its first successful launch in form of PSLV-D2 was made from the launch pad of Sriharikota in 1994. It escorted remote satellite, IRS-P2. India successfully launched its first GSLV (Geo stationary Satellite Launching Vehicle) in 2001, which allowed India to join the elite space club of five nations- USA, Russia, European Union, China and Japan. Indian Space and Research Organzation has played an incredible role in the development of space technlogy and made India into the top list of space conqueror. Having a budget of $1.3 billion in 2008, ISRO made India’s name into the list of space conqueror. Till date, India has launced several communication and weather monitoring satellite. India’s first indegeneous multipurpose satellite was INSAT series. First in this series was INSAT 1A which was launched in 1982 from United States. India successfully launched I.R.S 1A, her first indegeneous remote sensing satellite in 1988. After the launch of I.R.S series, India stated locating resources on the Earth from space. Indian space program is a broad one-from communication to weather forecasting and from mapping of resources on the Earth to space exploration. India has got a huge success in the field of communication. After the first launch of experimental communication satellite, APPLE, India has traveled miles to get a respectable position. Now using a satellite phone one can communicate to another, without considering the fact where the person is. We everyday use mobile phones, which is a gift of Indian space program. In television sector, one can just obtain a connection to any channel of the world just by placing an antenna on his rooftop. After the launch of INSAT 4A in 2005, India entered into the era of Direct-to-Home (DTH) service. Now private organizations were able to take pace with the government agencies in this industry. A man can surf Internet just by a push of a single button of his mobile phone. This type of comfort is present to us just because of the Indian space program. In weather monitoring too, India is very much capable to forecast the weather and can warn us enough before any natural calamity occur. ISRO also plans to map the earth and make the maps publicly available and thus will become a competition for Google Earth. The project is named Bhuvan. Another major success of ISRO is the introduction of virtual classes using satellite technology. It means that a teacher sitting in front of a camera, can teach his students who are miles away from the classroom. This communication is possible only because of satellite technology. Modern age is an era of internet tecnology which can also be used to set up a virtual classroom. But for those who can not afford internet, IGNOU is a perfect one. Indira Gandhi National Open University (IGNOU) was set up for those graduate sudents who cannot afford studying in a well graded university. A student can optain a degree of MBA or MCA just by attending virtual classes, sitting in front of a television set. Nation poet, Rabindranath Tagore wrote, “If nobody lend their ears to your voice, Do the work without them.” Indian space scientists proved the statement correct when they built India’s first cryogenic engine without the support of any other external help. During 1990s, under the pressure of Glavkosmos, Russian Space Agency halted its support to India in the field of space technology. As a result, India’s Cryogenic project faced a serious threat. But thanks to the scientists of ISRO, who turn the dream of indigenous cryogenic engine into reality. This proved not only the capability of Indian scientists but also showed her desire to make her name into the list space conqueror. On 22nd October 2008, a new chapter was added in the history of space for India by launching Chandrayaan-1 from Satish Dhawan Space Centre in Sriharikota. A Polar Satellite Launch Vehicle (PSLV-C11) escorted chandrayaan-1 weighing 1304 kilogram. Its basic purpose is to make a survey of lunar surface and to locate minerals on the moon by staying in the lunar orbit for couple of years. It carried six scientific payloads- three from European Space Agency two from Nasa and one from Bulgaria. India became the sixth member of moon club after United States, Russia, the European Space Agency, Japan and China. It is the third member from Asia, followed by Japan and China. It again showed the capability of Indian Space scientists and her power in the field of space. The launch of Chandrayaan increased the confidence level of ISRO scientist and foresees to send a manned mission to space in next few years. The first step towards this goal was the 600-kg Space Capsule Recovery Experiment (SRE), launched using the Polar Satellite Launch Vehicle (PSLV) rocket, and safely returned to earth 12 days later. This demonstrates India's capability to develop heat-resistant materials necessary for re-entry. The Indian Space Research Organization (ISRO) has conceptually developed a Sun mission called 'Aditya'. ISRO Chairman G. Madhavan Nair announced that this mission was approved. ISRO also plans to send a navigation mission, called Indian Regional Navigational Satellite System (IRNSS). It is similar to Global Positioning Satellite (GPS) system and can be used to from any location of the country. IRNSS consist of seven satellite, which can detect the position accurate upto 20 metres. The work for the mission has already been started and it is believed that its fuctioning would start within 2012. But these developments in space sector came into controversy. People generally ask what is the need for investing billions of rupees in space exploration. The answer is plaussible and yet simple. It is estimated that there may be enough resources present in the universe which can fulfill all our energy and resource crisis. Asteroids and comets are such heavenly bodies which may consist vast deposits of useful natural resources. Hence more and more countries would try to locate and capture those celestial bodies which are actually the deposits of useful minerals. It is also predictated that the main cause of the third World War would probably be scarecity of water and space exploration for the exploitation of these resources. Investment in space sector means that India would be, of course, one of the country in the lead in upcoming decades.
<urn:uuid:5da44836-12b6-4033-a553-ed747e4b7863>
CC-MAIN-2018-39
http://chamatkarindia.blogspot.com/2010/08/india-fast-emerging-space-power.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160454.88/warc/CC-MAIN-20180924125835-20180924150235-00156.warc.gz
en
0.95384
1,917
3.5625
4
The latest news from academia, regulators research labs and other things of interest Posted: Oct 18, 2016 Novel, non-invasive cancer therapy using targeted single-walled carbon nanotubes (Nanowerk News) A staggering 1.7 million persons in the United States will be diagnosed with cancer in 2016, with 600,000 cases ending in death. University of Oklahoma researchers have collaborated to design a novel, non-invasive cancer therapy that could eliminate tumors without affecting the healthy cells in the body. The cancer therapy targets specific cancer cells using single-walled carbon nanotubes that bind directly to the tumor, then are heated with near-infrared light. The OU photothermal therapy is most effective against shallow or surface tumors in breast, bladder, esophageal and melanoma cancers, without the adverse side effects of chemotherapy, radiation or surgery. The therapy was created by Roger G. Harrison, Jr. and Daniel E. Resasco, professors in the School of Chemical, Biological and Materials Engineering, Gallogly College of Engineering. Harrison is also affiliated with the Stephenson School of Biomedical Engineering. Harrison’s expertise is protein design, production and purification, while Resasco focuses on nanostructured materials based on single-walled carbon nanotubes. “Single-walled carbon nanotubes are unique in that they strongly absorb near-infrared light in very narrow, but tunable, wavelength ranges, while biological systems have very low levels of absorption of near-infrared light,” said Harrison. “The targeting of single-walled carbon nanotubes to tumors and subsequent localized application of near-infrared light allows the selective elimination of tumors.” “Very few groups around the world are able to synthesize nanotubes which absorb light in a narrow range of wavelength,” said Resasco. “We have a unique method of synthesis that produces single-wall nanotubes with a narrow distribution of diameters and carbon atom arrangements, which causes this selective light absorption in the near-infrared spectrum.” The new OU photothermal therapy consists of single-walled carbon nanotubes of tailored absorption wavelength injected into the blood stream where proteins on the nanotubes selectively bind to blood vessels that supply a tumor. Within 24 hours, a laser light is applied to the tumor causing the nanotubes to heat up, which causes the tumor to heat and be eliminated. The photothermal therapy has been tested and proven in the laboratory. The OU researchers already have one U.S. patent for this technology, and a second patent is nearing issuance.
<urn:uuid:ef0d1176-adf5-4a3c-8b82-0594a40dcd6b>
CC-MAIN-2017-09
http://www.nanowerk.com/nanotechnology-news/newsid=44830.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00308-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930153
548
2.71875
3
Afghanistan has experimented with different forms of government since its emergence as a modern nation-state. From absolute and constitutional monarchies to the first republic and communist/Marxist regimes, never has Afghanistan experienced as much democratic rule as over the past 18 years since the fall of the Taliban. Even though democracy has gradually evolved, with most of the Afghan state institutions still developing to deliver on the promise of democracy in a system of checks and balances, the process of institutionalization of democracy continues unhindered with the strong support of the Afghan people and commitment of the country’s leadership, including President Mohammad Ashraf Ghani and Chief Executive Abdullah Abdullah. Free press, which is one of the key features of any rising and functioning democracy, has played a seminal role in strengthening democratic governance and rule of law in Afghanistan. More notably, free media have directly contributed to the rapid development of a still growing civil society and, as its essential member, have empowered such vulnerable groups as women, youth, and the poor — a clear majority in Afghanistan — to increasingly exercise their rights under the country’s progressive constitution. In other words, where women and youth are often relegated to the bottom of society given traditional practices of gender inequity and other cultural double-standards, the free press — through TV, radio, and print — has awakened them to see how they can play their rightful, equal role in helping stabilize, rebuild, and develop Afghanistan on a sustainable basis. Moreover, Afghan media have lost no opportunity to tap into social media platforms — Facebook, Twitter, Instagram, and others — to serve their role as a check on the government, helping expand transparency and highlight efforts or lack thereof to fight corruption. Since the judicial institutions of Afghanistan, including law enforcement agencies, lack adequate investigative capacity and are still developing, the free press has filled some of the gaps, investigating and reporting on major crimes and cases of corruption. This interim contribution from the press has helped the government take punitive measures against the perpetrators, who could possibly escape justice. Even when exposure by the press of corruption and crimes has delivered gradual results, the public has at least been informed of the principal criminals and those engaged in corruption and undermining rule of law. This naming and shaming by media have helped expose the corrupt, who would otherwise evade public knowledge and eventually justice. This critical role of media as a check has extended to the Afghan parliament and the functioning of this key legislative institution. Media reporting from parliamentary sessions and meetings has informed the public of the laws proposed or adopted for implementation and enforcement, as well as follow-up reports on whether the passed laws have actually been applied and made a difference in the lives of Afghan citizens. Moreover, Afghan media have helped shape and direct electoral processes, reforms, and campaigns, including presidential, parliamentary, provincial, and now district elections across the country. As relevant state institutions remain weak, media have informed the public of their electoral rights, how to exercise them, as well as the logistical and security preparations in place for conducting elections at the national, provincial, and local levels. Ensuring transparency and fairness in all electoral processes has been one of the key achievements of media as a contribution to institutionalization of democracy in Afghanistan. Despite its constructive role in ongoing gains over the past 18 years, however, war and violence have limited the reach of media to do more to help strengthen democracy in Afghanistan. Since 2001, over 60 Afghan journalists have been killed and many wounded, according to the Reporters Without Borders, which recently reported that 2018 in Afghanistan was the deadliest year when “a total of 15 journalists and media workers were killed in a series of bombings that began early in the year, nine of them in a single day.” Even though the Afghan Journalists Safety Committee (AJSC) — which is led by a dedicated journalist and advocate for free press, Najib Sharifi — has conducted many safety training workshops for journalists across the country, they remain vulnerable to complex terrorist attacks, as well as to threats and intimidation by criminals, whose crimes journalists often investigate and report. In spite of these challenges, which have intensified since the end of 2014, when most of international forces withdrew from Afghanistan, the 2019 World Press Freedom Index ranked Afghanistan 121 out of 180 countries. That puts Afghanistan ahead of all its immediate neighbors in South and Central Asia, and higher than regional powerhouses India and Kazakhstan. Where there used to be one radio and one newspaper solely for the propaganda purposes of pre-2001 regimes, today, Afghanistan boasts over 1,000 print and broadcast media outlets. And this unprecedented progress is continuing unabated, despite ongoing terrorist threats and targeted attacks on Afghan journalists. Moreover, in 2018, Afghanistan ranked top on the Global Right to Information Rating with an impressive score of 139 points out of a possible 150, or 93 percent. Indeed, this is a shared achievement of the Afghan government and its international partners, who remain firmly committed to ensuring and protecting the freedoms of press and expression in Afghanistan. All told, however, like the rest of Afghanistan’s state-building enterprise, media development and the contributions it has made to institutionalization of democracy remain a work in progress. In the years to come, the international community — especially the United States, Europe, India, and other major democracies — has a clear opportunity to help Afghanistan further build on its hard-earned democratic gains of the past 18 years. This should underpin the current peace efforts, in support of the Afghan government, whose key precondition for negotiating a sustainable political settlement is the preservation of the Afghan constitution and its core provisions for institutionalization and protection of human rights, including the freedoms of expression and press. M. Ashraf Haidari is the Ambassador of Afghanistan to Sri Lanka and a Senior International Security Fellow at New America in Washington-DC. He tweets @MAshrafHaidari.
<urn:uuid:87d04d93-f79f-4a05-b767-93aa57788b20>
CC-MAIN-2020-10
https://thediplomat.com/2019/06/how-free-press-has-strengthened-democracy-in-afghanistan/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145654.0/warc/CC-MAIN-20200222054424-20200222084424-00143.warc.gz
en
0.958023
1,185
2.921875
3
Children have as much of a right to be free from emotional harm as they do from physical harm. Bullies have moved from the playground to cyberspace. They have moved from intimidating their victims with physical violence to intimidating them with emotional violence. The cyberbullying problem is exploding. According to a recent Justice Department study, a third of teens are subjected to cyberbullying. Studies have shown that those who are cyberbullied have a dramatic increase in suicidal thoughts and actions. The children who are the targets of bullies are most often the vulnerable especially lesbian, gay, bisexual and transgender students. Albany County recognized the problem and took action. Albany County has outlawed cyberbullying by enacting law that prohibits a bully from using the Internet to spread lies and expose private photos or intimate details of a teen's sexual life for the sole purpose of inflicting emotional harm. After the law was enacted, a miscreant teen created a webpage called the Cohoes Flame. He used the anonymity of the Internet to torment a number of his classmates by engaging in homophobic, misogynistic and racial attacks, as well as lies and fabricated sexual encounters — the vileness of the attacks prevent the verbatim reproduction of the actual slurs. Ultimately, the teen was arrested, charged, prosecuted and convicted under the county's Cyberbullying Law. The state's highest court is now being asked to determine whether criminalizing cyberbullying violates the First Amendment. The New York State Court of Appeals will be the first court in the nation to decide this question. Potentially at stake are the cyberbullying laws of 19 states and four other New York counties. Indeed, it is a tricky situation when punishment involves speech. However, the Cyberbullying Law is located well within the zone of speech that the First Amendment leaves unprotected. Think of it in another context, the government could not ban hateful speech in the abstract. However, the government can stop people from creating a hostile work environment. If a person utters misogynistic speech with the intent to create a hostile workplace for a female worker, then the government can impose liability. In New York state, our hate crimes law singles out hate speech — calling a gay man a slur when beating him — as proof enough to increase a felony penalty when being charged. Critics of the law have argued that schools, and not criminal courts, are the better place to stop cyberbullying. Education is an important component to deal with the problem, it is not the exclusive one. A cyberbully may need more than a teacher's lecture. An emotionally abused victim or a parent of a child who has committed suicide may find small comfort in the existence of an educational program. Free speech is important value, but so too is protecting our children from intimidation. Albany County simply is punishing those whose actions are aimed to inflict emotional injury on a minor by false and abusive speech. The state Court of Appeals should take the opportunity to protect children who are bullied through the Internet and uphold the county's Cyberbullying Law.
<urn:uuid:30eecf26-493f-496b-9bbb-b9587198c054>
CC-MAIN-2014-52
http://m.timesunion.com/opinion/article/Cyberbulling-law-should-be-upheld-5517300.php
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802766267.61/warc/CC-MAIN-20141217075246-00037-ip-10-231-17-201.ec2.internal.warc.gz
en
0.963313
617
2.828125
3
Have you ever wondered what goes into making peanut butter from scratch? It really isn’t as difficult as it seems! With March being National Peanut month and February being Black History Month, this was the perfect time for us to explore the life of George Washington Carver. What better way to honor George Washington Carver than through experimenting with Peanuts to create our own recipe? My kids had a blast learning How to Make Peanut Butter Playdough from Peanuts! Who Is George Washington Carver? George Washington Carver was the first African-American to enroll at Iowa State University where he received a Bachelors and Masters Degree from. This brilliant man was born in Missouri before the Civil War and devoted his entire life to plant research. While most people know him as the inventor of peanut butter, George Washington Carver actually was not the inventor! Instead, he did much more amazing things with peanuts and was the driving force behind what was then called Peanut Paste becoming popular. In 1916, Carver released a publication on 105 Ways to Use Peanuts that covered everything from foods to shampoo and shaving cream to plastics! In fact, Carver worked with Henry Ford during WWII to use his peanut rubber on cannons! By the end of his life, Carver had created over 300 uses for the peanut. For a fun short introduction to the Life and Works of George Washington Carver, watch the video below with your kids. [su_youtube url=”https://youtu.be/d0wS4DCBm6M” width=”680″] How to Make Peanut Butter Playdough from Peanuts Even though Carver was not the inventor of Peanut Butter, he still had a love for peanuts. This simple hands-on activity in one that kids can easily do from start to finish and is the perfect trial-and-error recipe for your little inventor! Items Needed to Make Peanut Butter Playdough How To Make Peanut Butter Playdough For this recipe, we used equal amounts of peanut butter to coconut flour. While we were able to do 1:1 with this, I would have extra coconut flour easily accessible just in case your peanut butter ends up stickier than ours did. To make our peanut butter we started by chopping up our peanuts in the food processor. My kids love using our Ninja 2-in-1 and with it only having one very large button it is perfect for them to use under supervision. This next part is where yours could possibly vary from our results. To create the peanut butter we the added in on tablespoon of coconut oil in at a time and blended until we reached a consistency the kids were happy with. I think we used about 1/2 cup of coconut oil, but in all honesty, my kids were adding and blending at this point and I was doing all I could to keep the chaos under control. I stopped them once we reached a nice smooth consistency that wasn’t yet runny. If your peanut butter gets runny simply add in some more peanuts. Once at this stage, we transferred our peanut butter into a bowl and added in the coconut flour. We added in a cup at a time until the peanut butter quit sticking to our fingers. Our Peanut Butter Playdough did turn out a tad crumbly, but it molded just like playdough. It was almost like a mixture of moon sand and playdough! It turned out super neat! Invitation to Create with Peanut Butter Playdough Ok y’all, I have to admit – I am kinda obsessed with this playdough. Unlike any of the other playdoughs we have created, this one had NO cooldown time! Plus, it kinda tasted like a peanut butter cookie… To play with this playdough I simply set out some toys and let my kids do their thing. Some toys I included were: - Plastics Letters to Spell “PEANUTS” - Cookie Cutters - Mini Bundt Pan - Playdough Scissors and Tools We had a BLAST with this! Peanut Month Resources and Activities! Food Allergy Books for Kids – The Jenny Evolution Find the Letter P is for Peanuts – 3 Boys and a Dog How Do Peanuts Grow? – Living Ideas Peanut Print Painting – Playground Parkbench History of Peanuts – Schooling a Monkey Peanut Clip Counting Cards – Simple Fun for Kids George Washington Carver Books and Resources – Our Daily Craft Cooking with Kids No Cook Peanut Butter Energy Bites Peanut Butter Whoopie Pie – Crafty Mama in ME Peanut Butter Muffins –Sunny Day Family Peanut Butter Brownie Truffles – Play Dough & Popsicles Peanut Butter Cookies –Kidz Activities Share This Post!
<urn:uuid:0485fa3e-d638-4192-acaa-f490f0657a9b>
CC-MAIN-2021-04
https://parentingchaos.com/how-to-make-peanut-butter-playdough/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506832.21/warc/CC-MAIN-20210116165621-20210116195621-00519.warc.gz
en
0.954584
1,012
2.859375
3
It's natural that as the internet has grown in size and complexity, so to have the scams and tricks that criminals play to try and steal your information for insidious purposes. This guide aims to show you what to look out for when visiting websites and how to spot the dodgy ones. Broadly, unsafe websites are websites designed to extract information – either personal or financial – from unsuspecting victims through some sort of scam or trick. Some unsafe websites will look like poor copies of genuine websites they're trying to mimic. Many use reputable brands to try and convey legitimacy to their victims. Other unsafe sites go for original designs but include things like 'trust badges'. These badges make up the little banner of credit card symbols you often see before paying. As you can see, it's pretty easy to get a hold of these online, and it's not like you have to prove your check out is safe, in this instance, to get the badge. It's a good reminder that you can't just trust a name because you've heard of it previously. How to check if a website is safe? The important thing to remember with the below tips is that most of them don't provide full certainty a website is safe, but rather good indicators that one is. This means they should be taken as mutually supportive; in other words, you should be using them in combination with one another rather than relying solely on a single method or criterion. Check for the 'S' on the end of HTTPS One indication that a site is probably safe is whether it uses the secure scheme, also known as (HTTPS://), now often symbolized with a green padlock in the address bar and known as an SSL certificate. However, the operative word in the previous sentence is, unfortunately, 'probably' – we can no longer say with assurance that this definitely means a site is safe. The APWG (Anti-Phishing Working Group) revealed that an SSL was used in the URL of 77.6% of the phishing sites they detected in the second quarter of 2020, a number that rose to 80% in the third quarter. This is no longer a good criterion for determining the authenticity of any given website. According to the report, approximately 40% of phishing sites have free SSL certification from authority Let's Encrypt. The long and the short of this situation is that now, it's more likely than not that a given phishing website will have a green padlock/HTTPS URL. However, it's still advisable to stay away from sites without this certification – and you can tell because it'll say 'not secure' in the address bar. Check the URL Some scammers bank on unsuspecting users misspelling the web addresses of genuine, popular websites. They take over website domains that might be just one letter or symbol different from the URL of a widely-visited site. So if you do suddenly find yourself on a suspicious-looking site, definitely have a look to see if you made an error in the address bar. If you are going through a link on another site or in the body of an email address, hovering over the link with your mouse can often reveal where the link is going to take you. If it looks suspicious – including having a spelling error, for example – then just don't click it! You can also run the URL through a website safety checker. There are some nifty free sites out there that will scan URLs you plug into their page for viruses and malware. Virustotal is recommended by several cybersecurity firms. However, if there's little information about their site available, a free checker may struggle. To learn more, check out our how to spot a fake website guide for more information about how to read URLs. Again this is simply another indicator, rather than a full-proof method of knowing, but googling whether a website is legitimate is certainly a savvy move if you suspect it might not be. There are a number of reputable websites set up to provide precisely this service, one notable one being TrustPilot. Asking Google or any other search engine whether a website URL is legitimate may return limited information – that's a big red flag, especially if the website claims to be an appendage of a reputable, well-known company. Another thing you can do is simply google the website's URL (in the search bar of a search engine, not the address bar of your browser) followed by the word 'scam'. This may get you an answer pretty quickly if it's been particularly successful and hit a lot of victims. Check the contact information Check to see whether the contact information listed on a website is legitimate. Do emails to the email address actually send? When you search for the company address (providing it is real) does the location look plausible? You could even ring their phone number – whether (or how) they answer will give you a good indication of their legitimacy. If you are using this method to check whether a website is safe and you do get an answer, never give out any personal information over the phone. Remember, you're using this call to help you to determine whether the website or operation is a scam – you aren't phoning up to buy their product or hand over any money. Remain skeptical throughout and don't take a good conversation as proof the business is legitimate. Adjust your browser's safety options Every browser you use will have slightly different safety settings that will likely need adjusting to suit your needs. These settings can be a good tool to help you decide whether a website is safe. These are not always the default setting either – as you can see above in Google Chrome, for example, you can turn on the enhanced protection version of the safe browsing tool, which checks website URLs for you and gives you an advanced warning on dangerous activity. Download and install antivirus software Like browsers, antivirus software will have features that will help you to determine whether a website is in fact safe to visit. Many will provide you with warnings about websites either on search result pages or when you click on the site link itself, whilst others will bar you from entering without bypassing a warning screen that highlights the dangers associated with your imminent visit. Some antivirus software will be more useful than others – check to see if your provider has an anti-phishing certificate, for example, because this will really help you out if it does. Check the spelling Another indication that a website is safe is flawless spelling and grammar. Legitimate businesses will want to look as professional as possible for customers, so most will have spell-checked the text that appears on their website thoroughly. If you're spotting error after error, it's highly unlikely anyone with any level of relevant training or skill has looked at the site – which suggests it might belong to something other than a real business that has a reputation to uphold. Other types of 'safety' Some websites might be perfectly legitimate, yet still, clash with user conceptions of 'safety'. Some users will consider sites unsafe if they have shady practices when it comes to data. Control over private information is, for many people, intimately linked to safety. Spotting fake websites One easy way to protect yourself and confirm a website is safe is to become familiar with what scam websites tend to look like and the features they often share. Remember, the vast majority of scammers do not have the time, resources, or technical know-how to create sites that are exact replicas of legitimate ones, especially if they're trying to target victims from countries where they don't speak the language. It's also important to remember that scammers' targets are primarily people who aren't the most clued up with computers and technology – so knowing what to look for, in a way, is one of the best defenses. Bearing this in mind, you should leave a site immediately if it: - Has so many pop-ups you can't smoothly navigate the website. - Redirects you to a completely different website. - Provokes warnings from your search engine. - Immediately slows down your mouse movement. - Keeps refreshing itself without instruction. - Is claiming to be a legit brand's site but has spelling errors en masse. - Has countdown timers and threats of service revocation. - Unusual payment methods, like paying in Google Play gift cards. Other red flags Other signs that may be indicators of shady activity and should lead to browsing with extreme caution include: - Ridiculously low prices, or free offers on expensive products. - Weird uses of caps/exclamation marks to inject urgency - A lack of user reviews, or blatantly fake ones from bots. - Pop-ups with pornographic imagery/adverts of a sexual nature. - Poor design/odd color and font combinations. - Looking more like a site from the early 2000s than 2021. Conclusion: use your common sense Legitimate websites will never ask for your personal information unless it really needs it. They won't ask you to input it into a flashing pop-up, demand you enter it before a timer runs out to avoid punishment, or ask for your financial information when there's nothing to pay for. If you're being threatened with arrest, service revocation, or a fine, you wouldn't find out through a spontaneous website visit, through clicking on a link in an email riddled with spelling errors or a phone call you've had to make because a pop up has frozen your computer. Remember, that's not how legitimate businesses communicate with their customers. Genuine companies will be more than happy to go to great lengths to show you they're the real deal, both in correspondence and on their website. I know, for example, when an email is really from my bank because they prove who they are by showing me information only they could know. You likely visit hundreds of legitimate websites every month, so you do know what one looks and feels like through experience, and you know what legitimate correspondence is like too. Always ask yourself 'would a legitimate company do this, and have legitimate websites ask me to do this before?' If the answer isn't a definite 'yes', it's time to leave.
<urn:uuid:ecfc4aa6-038e-4b86-8ef8-2667b8f34930>
CC-MAIN-2021-17
https://proprivacy.com/blog/check-if-website-is-safe
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077810.20/warc/CC-MAIN-20210414095300-20210414125300-00111.warc.gz
en
0.947598
2,090
2.734375
3
Every year, on April 1st, Argentine war veterans gather at sundown in the remote, southern city of Ushuaia, where, 30 years ago, the country launched a military invasion to claim the Falkland Islands, known locally as the Malvinas. They come to replace a wind-battered flag, to sing the Argentine national anthem and, most of all, to remember the soldiers who died in the war against Britain. Carlos Alberto Latorre heads a veterans group and said that he and his fellow former soldiers travel the country, giving presentations and educating citizens about the war. "A year ago, we protested in this plaza that we are not former combatants. We are Malvinas combatants. That's why we have a job to do from Ushuaia from where we have already travelled 100,000 kilometres in a year, across the country, 'Malvinising' (giving presentations and educating people about what happened in the Malvinas). "That's what gives us strength - the strength of our people. You see it in the people here and these young people will someday follow us and, aside from them are our children, our grandchildren, who are the Malvinas generations coming up," he said. On April 2, 1982, Argentina's ruling military junta invaded the Falklands. Britain sent a naval task force and recaptured the islands but 255 British and 650 Argentine lives were lost. Contains video from Reuters
<urn:uuid:d5a13e70-d6a8-4caf-8d0d-0644e3ecbc2f>
CC-MAIN-2016-44
http://www.telegraph.co.uk/news/worldnews/southamerica/falklandislands/9180249/Falklands-war-anniversary-Argentine-veterans-hold-ceremony.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720972.46/warc/CC-MAIN-20161020183840-00180-ip-10-171-6-4.ec2.internal.warc.gz
en
0.957597
300
2.703125
3
Gingivitis in Cats: Causes, Symptoms, Treatment Bad smell from the mouth of the cat is not always the cause of diseases of the gastrointestinal tract. Often the smell from the mouth is the first sign of gingivitis - common inflammatory infections of the gums Gingivitis - a mild form of the dangerous disease - periodontitis. Inflammation can affect not only one tooth, but several at once. Infection, which is accompanied by inflammation, quickly spread from the most infected gums to the ligaments and bone that hold the teeth in the oral. If the owner just did not pay attention to the problems of the caudate, consequently did not start treatment or not adhered to all the recommendations of a veterinarian, as a result tooth lost support, which leads to his slacking, and in the later stages - loss of tooth. Problems with gums and teeth have extremely negative impact on the body in general. Besides unpleasant putrid odor from the mouth also can occur the spread of infection throughout the body of the animal, affecting the liver, kidneys, lymphatic system and other organs through infected blood, because in the cat's mouth is quite good blood supply. Getting infection in the blood, transporting it to the organs can cause them heavy defeat. If at this point not to pay attention to the condition of the cat - all can end is pitiable, leading to a denial of one or another organ. Causes and symptoms of gingivitis in cats To determine the symptoms of gingivitis in cats need to understand the reasons why the disease develops. Gingivitis of pets can be of two types: - Plasmacytic-Lymphocytic Gingivitis - a more severe form of inflammatory gum disease. It causes severe acute pain, the occurrence of ulcers on the soft palate or oropharynx. As a result - a cat's appetite decreases, she refuses to eat or loses weight. Establish the cause of plasmacytic-lymphocytic gingivitis is not possible. Furthermore, veterinarians believe that it is a form of gingivitis that can eventually lead to serious diseases such as the rhinotracheitis, calicivirus cats or distemper (panleukopenia); - Dental Gingivitis occurs after raid on teeth and canines of pet. It should be remembered that the plaque is caused by settling of bacteria and food particles near the compound of teeth and gums. First on the teeth is formed faint patina, which each time becoming more dense. Not removed plaque is hardens and becomes dental tartar. It is easy to see in those places where the tooth is connected to the gum. Usually tartar has a distinctive yellow color that is different from the natural enamel. After some time, there is a reddening of the gums, which is the first sign of developing gingivitis. Based on the above reasons, it is clear that the first sign of any type of gingivitis is a bad smell from the pet's mouth. There are also the main symptoms, visible to the naked eye: - Profuse salivation; - Swelling of the gums, their redness. This is especially evident at the site of compounds of the tooth and gum; - Unpleasant smell from the mouth; - Bleeding gums, increasing by touch or light pressure; - Lack of appetite. More specifically, the pet is hungry, appetite is not lost, but a strong pain in the mouth does not let pet to eat the food. For the diagnosis of "dental gingivitis" or "gingivitis" veterinarian will examine the oral cavity of cat, paying particular attention to the presence of plaque, inflammation or redness in the gums and the presence or absence of odor from the mouth. To confirm the diagnosis of "Plasmacytic-Lymphocytic Hepatitis", cat should be biopsied. Treatment of gingivitis in cats Treatment depends entirely on the degree of development of gingivitis. In the initial stages of early treatment is possible by regular brushing. Removing tartar is a preventive measure rather than curative, but can also be a cause of gingivitis. In fact, gingivitis - inflammation of the gums, and improperly performing procedures to remove the stone fangs and teeth pet can lead to penetration of infection into the space between the tooth and gum, and as a result, give rise to inflammatory processes in the mouth. In the treatment of Plasmacytic-Lymphocytic Gingivitis typically use such preparations and methods: - First appointed antibiotics to reduce inflammation and kill the infection. They can be used both topically and in tablet form; - Immunomodulators are used to enhance immunity pet, they are dripping on the tip of the nose to kitty could lick it; - Removing plaque which is appearing in the jaws of the cats. Only qualified veterinarian can do it; - The use of anti-inflammatory drugs also contributes to the passage of infection. If no improvement is seen, and the treatment is not successful, the only salvation for this pet health becomes the removal of teeth, exposed to infection.
<urn:uuid:80232878-608a-4add-891c-1dc39f3825d7>
CC-MAIN-2018-34
http://stomatitisincat.ucoz.com/index/gingivitis_in_cats/0-13
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221219197.89/warc/CC-MAIN-20180821230258-20180822010258-00110.warc.gz
en
0.937884
1,091
2.703125
3
Maheshwari, Ramesh (2005) Fish death in lakes. In: Current Science, 88 (11). pp. 1719-1721. An incidence of mass-scale fish mortality in Bangalore was reported recently in the local newspaper as front-page headline1:'Five tonnes of fish die in Ulsoor Lake. From being a clear, tranquil water body, the recently restored Ulsoor Lake has become a sea of dead fish'. Among the views expressed as the cause of this tragedy were 1-3: (i) Chemicals flushed into the lake, following a cleaning of the BCCowned Ulsoor swimming pool; (ii) lowered Biological Oxygen Demand; (BOD) level due to the approaching summer [BOD, expressed as mg O2 per l, is the amount of dissolved oxygen needed to oxidize organic materials to carbon dioxide and water at a particular temperature and pressure. If there is a large quantity of organic waste, there will be a lot of bacteria working to decompose this waste. |Item Type:||Journal Article| |Additional Information:||Copyright for this article belongs to Indian Academy of Sciences.| |Department/Centre:||Division of Biological Sciences > Biochemistry| |Date Deposited:||20 Jul 2005| |Last Modified:||19 Sep 2010 04:19| Actions (login required)
<urn:uuid:a9107de7-71a6-42f7-ab08-9a3b02b1603d>
CC-MAIN-2015-22
http://eprints.iisc.ernet.in/3361/
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207926620.50/warc/CC-MAIN-20150521113206-00078-ip-10-180-206-219.ec2.internal.warc.gz
en
0.860304
286
2.859375
3
Coursework assignment: Jack the Ripper 1. Source A is part of a newspaper article describing the murder of Martha Tabram and Polly Nicholls. From source A I can learn that there have been two murders in London within a month of each other, I can also learn that Polly Nicholls and the other victim, Martha Tabram, were very poor. Source A also tells us that the murderer did not kill the women for financial gain as there was no proof of stealing, the killer had used too much force to kill these women and this suggests that the killer was not of stable mind. Source A is part of an article in the East End Observer describing the murders of Martha Tabram and Polly Nicholls and it was written within a month of the murders, it suggests that the murderer was not of stable mind. Source B is part of the Coroner’s report of the death of Polly Nicholls and it suggests that the killer had a good knowledge of the human body. Source C is the report of Dr Frederick Blackwell on the body of Elizabeth Stride and its gives a detailed description of the victims body. A Custom Essay Sample On Source A supports Source C by saying that the victims have been of the poorest of the poor whilst Source C implies that the victim, Elizabeth Stride, was poor as there was ‘no money on the body. ‘ However Source A is different to Source C as it says that the killer used ‘extraordinary violence’ to murder the women where as Source C says that there was only one incision on the body and it cut the windpipe ‘completely in two meaning that no force was used’. Source C also says that the appearance of the face was calm meaning there was no force used against the victim and it was a quick kill. Source A states that the murders were a work of a ‘demented being’ as so much effort was used to kill the victims but the evidence from Source C suggest that the killer had a knowledge of how to kill a person quickly as it says that only one incision was found on the victim and it rendered them dead. Source B says the killer had ‘anatomical skill and knowledge’ the wounds inflicted on the victim were in specific places that would lead to certain organs, additionally Source C also suggests that the killer had a good understanding of the human body as it mentions that only one wound was inflicted on the victim and it was enough to kill her and this shows that Source B supports Source C. Source B also supports Source C by saying the killer used a knife as a weapon to kill the victims and Source C implies that the killer used a knife as an incision is caused by a knife or sharp object. However Source B is different from Source C as all the statements in this are opinions whereas all the statements of Source C are facts and are given by a doctor who knows what he is seeing. Source B is also trying to decipher the identity of the victim where as Source is just a description of the body 3. Source E is Part of an article published in a local newspaper after the murders of Polly Nicholls and Annie Chapman. It tells us of how an informant warned police officers that the security of the streets should be improved otherwise murders would ensue. It also tells us a bit about the geography of White Chapel. This source implies that the security of the streets in White Chapel was really poor as there were crimes going on in every street and people had predicted that there would be murders happening in the town if the quality of the police force was not increased. It also tells us that there were crimes going on such as ‘ruffianism’ (violent lawless behavior), and although the police were told of it they did nothing to prevent or stop these crimes. This Source also tells us about the way White Chapel is built, with the main roads connected by narrow alleyways, meaning that the killer could easily slide into an alley if he heard or saw the police approaching. However the Source does not tell us who the informant is; implying that the killer had to be a police to hide his identity because otherwise he would have been fired from his job. As a result of not knowing the identity of the killer, we cannot tell if the Source is reliable or not. But as the source was a newspaper article, its main job was to inform people of the news accurately, however the newspapers also had to be sold meaning that the article evidence given by the informant could have stretched to make the article more interesting. Source D is the evidence of Elizabeth Long at the inquest into the death of Annie Chapman; she was describing the man seen talking to Annie before she was killed. It tells about the appearance of the man seen with Annie Chapman before she was killed. It says that the man was a foreigner and that he was of a ‘shabby genteel’. The description given by the eye-witness is very detailed and it describes a foreigner. During the time that the murders happened White chapel was a dirty and polluted place, people could even see their own hands in front of their faces in the dark. The time at which Miss Long said she say the man was at 5. 30 am and it was still pretty dark at that time which leads me to believe that this source is not very reliable. This however shows me that the police had trouble capturing the killer because of all the false eye-witness accounts given to them by the public, they could not interpret which ones were true and which were not and the killer took advantage of this. Source D is not very reliable as there is no way that Miss. Long could have made out the appearance of the man in such detail, it is a make belief story as at the time of which the account was given many people presumed that the killer was a foreigner, therefore Miss. Long gave the description of one. 4. The police made use of many methods to try and catch the killer but they were all to no avail. One of the things that the police was to circulate leaflets around to the general public. Source F is the leaflet distributed to over 80,000 households in hopes of catching the murderer. The leaflet contains dates of the first four murders (starting from Polly Nicholls) and it is suggesting that the killer lives in Whitechapel. It is asking for people to come forward and report anybody suspicious. This is a good idea as it would save the police from interviewing everyone in Whitechapel but the public did help the police as they came up with too many false witnesses and they gave information on people who acted the slightest unusual. Source G is part of a letter from the Home Secretary to the mile end vigilance committee on 17 September 1888. The Home Secretary states that offering a reward would mean people would make false accusations on innocent people just for the money. The police were asking permission to offer reward to anyone who gives information on the killer but they were declined. This would have been a good idea as they would get a list of suspects but the public would give information on anyone just to get the money and this would leave the police in a bigger state of confusion. The police also requested for 100 more men both uniformed and plain clothed so there can more of a chance to catch the killer. This was definitely a good idea as there were more men patrolling the area and there were more chances of spotting the killer. However this method proved to be insufficient as the killer was not seen the police, both uniformed and plain clothed. The metropolitan police sent a private and confidential letter to Col turner asking him to provide trained bloodhounds that could track the scent of the victim’s blood in order to find the killer. This was a very good idea and it is still used today to track down suspects but this also failed to catch the notorious Whitechapel, murderer. Although this did prove that the killer murdered his victims rather stealthily as to not get any blood on himself. The police also put their time and effort into interviewing over a thousand lodgers in the area of Whitechapel. This does not seem like a good idea as all the murders had taken place on the weekend or on a holiday suggesting that the killer was from out of town or that he had a job meaning that he would have his own house. One of the stranger things the police did was use silent boots. There logic was that the killer would here the police man approach and so the killer would not run away. This obviously did not help the police catch the killer. These boots also cause pain to the officers as they were uncomfortable. Autopsies were carried out and police photographed each scene. Detailed interviews were conducted throughout the area and existing mental patients and those with a history of violence were investigated. Also the police offered pardons to accomplices willing to come forward with information. The police tried almost everything they could to try and catch the killer during the murders but the facilities that police had were just not enough and most of the time criminals were caught red handed or they would most likely escape. 5. The Whitechapel murders were something that the police have never experienced, they do not know of killing without reason or serial killing. As you have seen, the police tried various methods to try and catch the murderer but they were all a failure and that is due to the following reasons. The killer was a mad-man. This is what everybody believed in White chapel, that someone who kills for his own pleasure has to be foaming at the mouth, this was the perceived of Jack the ripper. He was seen as a man who could not keep his emotions in check and who was a basic raving lunatic. However through modern serial killings we have found that most serial killers look outwardly normal and sane even though they are mad on the inside. The killer could have had an ordinary day-light life with maybe even a family and by night time he could have set out to kill. This was not known at the time so people were looking out for mad person who was swinging a knife at every prostitute and because of this lunatics all over White chapel were examined but to no avail. This also meant that if the killer had family and friends they would never suspect him as he would not have filled the description of a lunatic. The killer on the other hand was a very confident person as he no doubt believed he would never be caught so he never hid the bodies and murdered in daring places, such as ten minutes away from the police station. The killer was also very artful as source H states that ‘not a trace is left’ of the killer at the crime scene. The victims of the killer had one thing in common: heavy drinking. They were known for drinking and wondering around the streets, the first victim’s, Polly Nicholls, marriage broke down as a cause of her heavy drinking. Polly Nicholls was a sad woman who made a living from prostitution. The second victim, Annie Chapman, was also a separated wife who suffered from alcoholism and she was also homeless. The next victim, Elizabeth Stride, was also separated from her husband and used prostitution as a source of a living. The fourth victim, Catherine Eddowes, was also a heavy drinker, a separated wife and a prostitute. The fifth and final victim was Mary Jane Kelly and she was a young prostitute whose husband had died. All these victims are prostitutes and almost all were heavy drinkers meaning they were all exceptionally easy targets as they would have to go in dark places with men who they were strangers with and when they were drunk they were disoriented and did not know what was going on. They would also do anything for a drink meaning they would meet up with men at night just because he promised a drink. The victims were also picked at random except for the fact that they were prostitutes so the police could not find a pattern in the victims and there were too many prostitutes in White chapel to protect them all. Whitechapel was a densely populated area in one of the poorest districts in London. There were many slaughterhouses and such in those parts of London, and so it wasn’t odd for men to walk around in dirty and even blood stained clothes. Furthermore, the fact that there were so many narrow alleys and thoroughfares may have made the Ripper’s escape easier. As source E tells us that the alley ways were ‘dark’ and ‘narrow’. The area of Whitechapel had many penniless, homeless and nameless people drifting in and out of its streets, so it was difficult to keep the track, monitor the streets and the police also had to deal with the vigilante behaviour that erupted as a result of the murders. The eyewitnesses that came forward were almost all very inaccurate except for the police officers. In eye-witness account of Elizabeth Long (source D), a description of a man she sees talking to Annie Chapman is given but it is not very detailed and it only describes his attire and not his facial features. Elizebeth Long is also not sure about the things she sae as she says: ‘as well as I could make out’, ‘I think’ and ‘I cannot be sure’. Also, the time at which she saw the man, it was dark and smog covered the whole of White chapel so therefore she could not have seen clearly and her evidence is most likely made up. These sort of eye-witness accounts lead the police to a dead end and their time is wasted. The chance of the police catching any criminal in those days would drastically drop if they didn’t catch him in the act. The investigative tools the police had at the time did not include fingerprinting, forensic evidence and DNA. The police tried almost everything they could and they made requests that would help catch the killer (even though some of them were denied). The police was not used to the concept of killing without a motive and this confused the police as to what course of action they should take. Although the police did make some mistakes such as when the writing on the wall was erased before it could be photographed and they let Catherine Eddowes out of jail at 1. 00 am when they clearly knew about the dangerous times. The police were not to blame for the ripper murders as they had never experienced anything like it and they did whatever they could to try and catch the killer. The public did not help the police in the investigation by giving false witnesses and accusations. The layout of White chapel was in such a way that it would be extremely easy for the ripper to escape.
<urn:uuid:16bc2d84-7b36-47d8-8005-26f847418b87>
CC-MAIN-2018-17
https://bigbuddysociety.net/essays/coursework-assignment-jack-ripper/
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948617.86/warc/CC-MAIN-20180426222608-20180427002608-00071.warc.gz
en
0.992032
3,003
3.21875
3
|This article needs additional citations for verification. (July 2008)| Effects of Development Increased development of the city of Cabarete and deforestation of upland regions has resulted in increased urban and sediment runoffs into the bay, impacting the health of the coral reefs. Overfishing of the coral reefs during the 1980s has also contributed to a decline in ecosystem function. Paradoxically, tourism in the Dominican Republic has helped alleviate one aspect of stress on the reefs. Many fishermen now work in tourist hotels for higher pay, decreasing fishing pressure on the coral reefs. Village Life and Tourism Cabarete is also a small Caribbean beach village located about 35 minutes away from the Puerto Plata International Airport (Gregorio Luperon Airport - POP) on the northern shore of the Dominican Republic. It is a frequent tropical vacation spot. The village of Cabarete is spread out across the center of a semi-circular beach. The area is very popular for kitesurfing and windsurfing, with trade winds providing strong, consistent wind. The best months for strong winds are June, July and August when wind speeds average 13-22 knots onshore, followed by the winter months (January-March) |This Dominican Republic location article is a stub. You can help Wikipedia by expanding it.|
<urn:uuid:d47d4e7e-05b0-4a48-a532-9a793dc664a7>
CC-MAIN-2014-52
http://en.wikipedia.org/wiki/Cabarete_Bay
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447561188.130/warc/CC-MAIN-20141224185921-00077-ip-10-231-17-201.ec2.internal.warc.gz
en
0.930601
268
2.828125
3
Canon Inc. (originally Precision Optical Instruments) is one of the largest and best makers of cameras worldwide. With the initial goal of providing domestic Japanese competition to German-made camera equipment in 1933, Goro Yoshida developed and produced a prototype 35mm Camera which he named the "Kwanon" after a Buddhist Bodhisattva (Avalokiteshvara). Yoshida's brother-in-law, Saburu Uchida wanted a more high-class name for the camera, so the two decided on the name "Canon" and applied for the trademark, which they were granted in 1935. In subsequent years, thriving on the success of the original "Hansa Canon" 35mm camera, the company grew, relocated to larger offices, and began in-house production of components (previously they outsourced for components). The company developed Japan's first domestic indirect X-ray camera in 1940. In 1942, Takeshi Mitarai took the helm as president of the company but was forced to suspend operation of the company in 1945 due to wartime situations. After the war Mitarai began to rebuild the company and in 1947 it changed its name to Canon Camera Co. in order to appeal to occupant soldiers who showed an interest in the cameras. In 1955, the company, which had grown a great deal in Japan over the past 8 years, opened an American branch in New York. Canon changed its US branch to an affiliated company by the name of Canon U.S.A. Inc. in 1966. Sales of office equipment as well as camera equipment were booming in the US with the release of 8mm cinecameras and projectors as well as the "L" series 35mm camera, "Canonet" automatic exposure camera, and "Canola" 10 key electronic calculator. During this time Canon also spent a great deal of time and money researching lens production in an attempt to perfect high resolution lenses. In 1969, the company again changed its name to "Canon Inc." In 1971, Canon released its Single Lens Reflex Camera, the "F-1" 35mm. This was followed by numerous developments in the microprocessing and laser printing areas. In 1976, Canon released the "AE-1" (Auto Exposure #1) 35mm SLR Camera. This camera was the first in the world to use an embedded microprocessor to operate various subsystems. This camera won numerous awards in subsequent years. In 1979, Canon released the "SureShot" or "Autoboy" auto-focus camera. This camera won numerous awards as well. In 1987, Canon released the "EOS650" SLR Auto-Focus camera in order to compete with Minolta, who took the lead in the marketplace two years earlier with its SLR Auto-Focus camera. Canon has continued to be absolutely the best damn 35mm SLR camera you can get. Sure, some people swear by Minolta and other brands, but Canon has had the best equipment since mid-20th century and to this date has by far the best 35mm camera lenses you can get. There are a huge number of cameras that were created and sold by Canon listed here. Those listed above are merely the exemplary models; those which brought the company much deserved fame and fortune. Other camera models were primarily spinoffs of those models with added or altered features. Canon Inc. website, http://www.canon.com/
<urn:uuid:eaa6447b-91e7-49cd-96b1-888fc4956b8e>
CC-MAIN-2015-14
http://everything2.com/user/litui/writeups/canon
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299121.41/warc/CC-MAIN-20150323172139-00239-ip-10-168-14-71.ec2.internal.warc.gz
en
0.969855
710
2.546875
3
The self-serving bias is our tendency to attribute our success to "stable internal causes" and our failure to "unstable external causes" (145). M. (1981). "Motivational biases in the attribution of responsibility for an accident: A meta-analysis of the defensive-attribution hypothesis". One reason is that we are familiar with our circumstances. I acknowledge that by submitting this question I will end my trial Submit Your question has been submitted! Check This Out The self-serving bias refers to our tendency to overattribute our successes to internal factors and overattribute our failures to external factors. Next, go to any lesson page and begin adding lessons. doi:10.1037/0033-2909.117.1.21. Some participants viewed the conversation while facing Actor one, such that they were unable to see the front of Actor two, while other participants viewed the conversation while facing Actor two, http://study.com/academy/lesson/fundamental-attribution-error-definition-lesson-quiz.html Studies show that people are generally able to predict how another person will behave toward them based on an initial interaction. Attribution: Perceiving the causes of behavior. In other words, the subjects were unable to properly see the influence of the situational constraints placed upon the writers; they could not refrain from attributing sincere belief to the writers. Opponent-Process Theory Belief Perseverance: Definition & Examples Schachter's Two Factor Theory of Emotion Contrast Effect: Definition & Example Hindsight Bias in Psychology: Definition & Examples Central Route to Persuasion: Definition & Login here for access Back Coming up next: Proprioception: Definition & Exercises You're on a roll. In committing these misconceptions we come to incorrect conclusions and delude the reality of the situation. Why don’t they get a real job and stop ruining my life!” If you Google some clips from the reality television show Parking Wars, you will see the ire that people Defensive Attribution Further reading Heider, Fritz. (1958). Example I assume you have not done much today because you are lazy, rather than perhaps tired or lack the right resources. Likewise, negative interpretations of information can lead us to form negative first impressions. Remember in Creating the Discipline of The Advantage Patrick Lencioni believes the single greatest advantage any company can achieve is organizational health. http://stenswenson.blogspot.com/2010/05/attribution-errors.html Log In Back Description Summary: Visit the Social Psychology: Tutoring Solution page to learn more. E. (1998). "Situational salience and cultural differences in the correspondence bias and actor-observer bias". Actor Observer Effect Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. Jones Jr. 2.2 Perceiving Others Learning Objectives Differentiate between internal and external attributions. doi:10.1111/j.1467-8624.1996.tb01778.x ^ a b Camodeca, M., Goossens, F.A., Schuengel, C. & Terwogt, M.M. (2003). The arrangement of furniture also creates impressions. http://strategicdiscipline.positioningsystems.com/bid/85539/Fundamental-Attribution-Error-Barrier-to-Growth Links between social informative processing in middle childhood and involvement in bullying. Fundamental Attribution Error Examples She made a good first impression by being organized, approachable, and interesting during the first days of class. Fundamental Attribution Error Quizlet When we observe other people, the person is the primary reference point while the situation is overlooked as if it is nothing but mere background. Got It You're 25% of the way through this course! his comment is here pp. 173–220. ^ Jones, E.E. & Harris, V.A. (1967). Yes! T. (1977). "Just-world research and the attribution process: Looking back and ahead". Ultimate Attribution Error Recognize the roles that culture and personality play in the perception of others. Is there any evidence of the fundamental attribution error or self-serving bias in this conflict encounter? Causal attributions viewed from an information-processing perspective. http://imagextension.com/fundamental-attribution/fundamental-error-of-attribution.php Self-serving bias Main article: Self-serving bias A self-serving bias refers to people's tendency to attribute their successes to internal factors but attribute their failures to external. This bias helps to explain But, it assumed that people had access to such information (i.e., the consensus, consistency, and distinctiveness of a person's behavior). Fundamental Attribution Theory Definition Also watch out for people doing it to you. For example, a tennis player who wins his match might say, "I won because I'm a good athlete," whereas the loser might say, "I lost because the referee was unfair." The Journal of Personality and Social Psychology. 48 (4): 813–838. Burges Kerawalla ~ Autopia Car Wash, Fremont, CA Just wanted to let you know our first Supper Huddle was a huge success!! Refers to a person’s level of negative thoughts regarding himself or herself. Self Serving Bias Nell has recently graduated with her degree in communication studies and is looking to start her career as a corporate trainer. We are socialized to perceive differences between men and women, which leads us to exaggerate and amplify what differences there actually are.Steven McCornack, Reflect and Relate: An Introduction to Interpersonal Communication Select a subject to preview related courses: Math History English ACT/SAT Science Business Psychology AP If, for example, you get an 'F' in a college course, you are likely to explain For students who performed low or average on their first exam, attributional retraining resulted in higher in-class test grades and GPA in the second semester. navigate here L.; Munhall, P. Next: Creating a Custom Course Create a new course from any lesson page or your dashboard. analytically: Comparing the context sensitivity of Japanese and Americans". Social Cognition. 11 (2): 243–269. It’s a reflection of how judging others reflect on us. D.; Geers, A. © 2017 imagextension.com
<urn:uuid:c3a77636-3399-41e6-8d1a-20cce52f53d0>
CC-MAIN-2018-30
http://imagextension.com/fundamental-attribution/fundamental-attribution-error-in-communication.php
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591150.71/warc/CC-MAIN-20180719164439-20180719184439-00419.warc.gz
en
0.891075
1,333
2.875
3
These move between standing poses and belly down poses. Then from there the focus is on standing poses, some of them balancing on one foot poses like Big Toe Pose, then seated poses, most of them seated forward bends or hamstring stretches, and supine (belly up) poses, followed by some inverted yoga poses, namely headstand and shoulderstand. A closer look at sun salutations shows that they include backward and forward bending spine actions. So for example, the first movement of each sun salutation, lifting the arms, can be accompanied by a backward bend of the spine. Also, upward dog involves a backward bend of the spine. Meanwhile, The second movement, bending forwards, can involve a forwards bending of the spine. They also include backward and forward bending hip actions. The main backward bending hip action happens in upward dog. Forward bending hip actions occur in the standing forward bends, chair pose (at the beginning of sun salutation b) and in downward dog pose. As for the standing poses, they include a mix of bent and straight knee poses, as well as asymmetrical poses with the legs spread front to back (longitudinal standing poses) and then side to side (lateral standing poses). The lateral asymmetrical poses are noteworthy because in these poses, triangle and side angle, the hip is bent to the side with the thigh turned out (or if you prefer, externally rotated.) The seated poses are mainly forward bends for the hips. A lot of these are asymmetrical with one leg straight and the other knee bent. But, the bent knee leg is taken through a wide variety of bent knee positions. These include positions with the shin folded to the inside of the thigh and to the outside of the thigh. As an example, the first two asymmetrical seated poses are a lotus pose variation which folds the foot to the inside of the thigh and a hero pose variation which folds the foot to the outside of the thigh. If you look closely at the ashtanga primary series with a discerning eye you'll see that a lot of similarities between the standing poses and the seated or supine poses. It's almost as if the seated part of the series is just the standing poses done sitting down. Learn how to use Friction to improve leg and arm strength. Simple exercises with easy to follow instructions Making difficult poses like Chaturanga Dandasana easier to learn. Learn Your Body with Frictional Arm and Leg Strength PDF or Video
<urn:uuid:83540525-113f-4b0a-9361-16c370cf2626>
CC-MAIN-2018-17
https://www.sensational-yoga-poses.com/ashtanga-yoga.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947931.59/warc/CC-MAIN-20180425154752-20180425174752-00589.warc.gz
en
0.940789
512
2.640625
3
Books & Music Food & Wine Health & Fitness Hobbies & Crafts Home & Garden News & Politics Religion & Spirituality Travel & Culture TV & Movies Young Astronomers Reveal the Universe A teenager with a small telescope discovers a comet in the film Deep Impact. This is unlikely because comet-hunters with larger telescopes would have found it long before the young hero. However young people do make astronomical discoveries and here are some of them. The green comet A little boy in China spotted Comet Hale-Bopp in a telescope. He was sad to learn that he hadn't discovered the comet and was determined to find one of his own one day. Seven years later, when Quanzhi Ye was a student at Sun Yat-Sen University, he found his comet. Not in a small telescope, but in photographs taken by an astronomer at Lulin Observatory in Taiwan. Comet Lulin's unusual green color is noticeable in Jack Newton's photograph. Big telescopes don't have eye pieces People used to make discoveries by looking through their telescopes. Then astrophotography was invented and large telescopes could take pictures of big areas of sky for later analysis. Today, cameras use CCDs to collect and store information electronically. Big telescopes don't have eyepieces. Astronomers monitor them from a control room or simply request images from distant robotic telescopes. In Wales the University of Glamorgan's Faulkes Telescope Project has access to two robotic telescopes, one in Hawaii and one in Australia. They are used mainly for educational purposes, so schools can initiate and contribute to genuine research. Welsh schoolgirl Hannah Blyth got a summer work experience placement at the University of Glamorgan in 2011. She worked with professional astronomers hunting for asteroids. Along with the rest of the team, Hannah used the robotic telescopes. Altogether the team discovered 22 asteroids. Two of them were Hannah's and if they're confirmed by the Minor Planet Center in Cambridge, Massachusetts, one of them may be named after her. Five University of Washington freshmen and sophomores carried out a research project. The original idea was to look for supernovae (massive stellar explosions). But since they kept seeing asteroids, they sensibly decided to look at those instead. Their results were announced in 2007 as they submitted 1,300 previously-unknown asteroids to the Minor Planet Center. The group had no telescope, but used freely-available data from the Sloan Digital Sky Survey (SDSS). Since 2000 the SDSS has had a dedicated 2.5-meter telescope in New Mexico systematically imaging the sky. The youngest supernova discoverer In 2008 Caroline Moore had more luck finding a supernova than the students in Washington. Her father is a keen amateur astronomer with an observatory in the back yard. He gave Caroline her first telescope when she was ten. She was a member of the Puckett Observatory Supernova Search, an international group of volunteers studying images from a network of robotic telescopes. In order to find supernovae you need to compare pictures of the same area of sky taken at different times. You're looking for an object that appears in one, but not the other. Software lets you do this on the computer. Here is how the software blinks between two pictures. If you look closely at David Lane's images, you should be able to pick out an object that's only in one of them. Then 10-year-old Kathryn discovered one Caroline was the youngest person ever to discover a supernova. But not for long, because her discovery helped inspire young Canadian Kathryn Aurora Gray to search for supernovae. Like Caroline's father, Kathryn's father is an experienced amateur astronomer. Paul Gray had himself discovered six supernovae. He showed Kathryn how to do the search, and a friend with his own observatory sent some pictures. Kathryn found a likely supernova which was then confirmed by other astronomers. The discovery was reported at the beginning of 2011 in the names of David Lane (who took the pictures), Paul Gray and Kathryn Gray. Not all astronomy is done with images. Radio telescopes produce plots. Here is a plot from the Green Bank Radio Telescope in West Virginia. Green Bank ran a pulsar search project with schools, teaching students how to recognize unusual signals and to spot human radio interference in the data. A pulsar is a collapsed remnant of a massive star that ended its life as a supernova. It rotates very rapidly, sending out pulses that radio telescopes can detect. In 2009 Lucas Bolyard, a high school sophomore, found a rare object called a rotating radio transient, which is similar to a pulsar, but only gives out a radio burst every now and again. These stories are news because they're uncommon. Yet they're not as uncommon as you might think, as I found many more stories than I could use in this article. Let's give Caroline Moore the last word. She said of her discovery, "I think this will motivate other kids to do anything they want. Not just astronomy." Content copyright © 2013 by Mona Evans. All rights reserved. This content was written by Mona Evans. If you wish to use this content in any manner, you need written permission. Contact Mona Evans for details. Website copyright © 2013 Minerva WebWorks LLC. All rights reserved.
<urn:uuid:0f3761c7-dcfb-4109-9a46-e7189d98ab35>
CC-MAIN-2013-48
http://www.bellaonline.com/articles/art18718.asp
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163048362/warc/CC-MAIN-20131204131728-00007-ip-10-33-133-15.ec2.internal.warc.gz
en
0.942197
1,099
3.015625
3
Dinosaurs are one of the biggest land-dwelling animals to ever exist on Earth. When you picture a dinosaur, you might imagine a 13-meter long T. rex or a Tit.. The largest dinosaurs — those of titanic size — are known as Titanosaurs. And one big-daddy from this group would make aTyrannosaurus rex look like a munchkin. This newfound dinosaur stretched a bit longer than a 25-meter (82-foot) swimming pool. Its head and neck alone ran about half that length: 12.2 meters (39 feet) 'Biggest dinosaur ever' discovered. By James Morgan Science reporter, BBC News. Published. 17 May 2014 Meet the 10 largest dinosaurs ever. Some were so large that their dimensions are hard to believe. -----.. The top 10 largest terrestrial animals on Earth were all dinosaurs, and a new analysis of dinosaur fossils reveals the biggest of the big. The new study, published in the journal Scientific. Biggest Dinosaur Largest Dinosaur Facts for Kids. Want to know which is the biggest dinosaur? Find out who are the giants of the dinosaur world - the tallest, heaviest and largest of them all! The World's Biggest Dinosaur. The giant plant-eating sauropds were the biggest and heaviest dinosaurs to walk the earth Think of the word dinosaur, and two images are likely to come to mind: a snarling Velociraptor hunting for grub, or a giant, gentle, long-necked Brachiosaurus lazily plucking the leaves off the tops of trees. In many ways, the sauropods (of which Brachiosaurus was a prominent example) are more fascinating than famous predators like Tyrannosaurus Rex or Spinosaurus The biggest dinosaurs that ever existed were the sauropods, which were four-legged herbivores with long tails and necks. The sauropod fossils have been unearthed on all continents. Here is a list of the most massive dinosaur fossils ever found. Argentinosaurus. The Argentinosaurus was first discovered in 1987, but it was fully known to science. What is the biggest dinosaur in the world? What is the tallest dinosaur? The biggest water dinosaur? Well, between the Tyrannosaurus Rex, Giganotosaurus and Titanoceratops, these prehistoric creatures may be extinct animals, but they can still be scary big dinosaurs. WatchMojo counts down ten of the largest dinosaurs to have ever lived R are dinosaur footprints belonging to the largest animal to ever roam the planet have been found in Scotland. Dozens of the 170 million-year-old fossils, belonging to early sauropods, have been. . 1. Argentinosaurus. image: Wikimedia Commons Argentinosaurus has been known to hold the title of largest dinosaur to ever lived. The estimation of the length of this dinosaur is about 30-45 meters with the weight up too 110 tons Dinosaurs remain one of life's literal biggest mysteries—scientists still aren't sure why they got so big, what exactly finished them off, and what they really looked like. Fossils only reveal so much, and many are incomplete, further complicating the task. That said, we've got a pretty good idea about the basic structures of most The Biggest Dinosaurs is one of the I Love Dinosaurs books about the largest dinosaurs of all time, the sauropods. Brontosaurus Dryosaurus Stegosaurus Allosaurus Archaeopteryx Diplodocus Mamenchisaurus Brachiosaurus Supersaurus Ultrasaurus Seismosaurus Add a photo to this galler The biggest dinosaur ever may have been twice the size we thought. A near-mythical titanosaur could have been twice as heavy as Patagotitan, the dinosaur previously thought to be the largest. The New Biggest Dinosaur Ever Has Been Found And It's 10 Times Larger Than A T-Rex. By Annie Garau. Published August 9, 2017. Updated June 25, 2019. It's as big as 14 elephants, two semi-trucks, or 10 T-rex. G. Lio/PA Patagotitan Mayorum What was the biggest dinosaur? What was the smallest? The largest complete dinosaur we know of was Brachiosaurus (arm lizard); it reached 23 m in length and 12 m in height (about the length of two large school buses and the height of a four-story building). Fragmentary leg bones and vertebrae of even larger dinosaur species are known, but these skeletal remains are too incomplete to. The history of the dinosaurs is as follows: The dinosaurs were built over 30 years ago. The apatosaurus (formerly known as the brontosaurus) took eleven years to build and is one of the biggest dinosaurs in the world. The belly of the dinosaur hosts an awesome store with something for everyone World's Biggest Dinosaur Discovered. 11 Share on Facebook. Share Understanding the true size of the dinosaurs is always open for some debate when there isn't a complete skeleton Any one who drives close to the Cabazon Dinosaurs, will stop to see these dinosaurs. The dinosaurs is at their height. We humans are small between the dinosaurs. Kids like that. There is a store that sell all kinds of fun for kids there, for a fee. I was told that there is way more for kids to play here. A must see! Spinosaurus was the biggest of all the carnivorous dinosaurs, larger than Tyrannosaurus and Giganotosaurus.It lived during part of the Cretaceous period, about 112 million to 97 million years ago. Did Scientists Just Unveil the Biggest Dinosaur of All Time? The jury's still out—but if you can get over the size contest, far more fascinating patterns about these giants emerg Never fall for the biggest dinosaur ever or the dinosaur bigger then argentinosaurus discovered when a new one is dug up cause they always get shrunk on the next few years. level 1. 2 points · 55 minutes ago. Some Hadrosaurs got thicc in the late Cretaceous too. level 2 The baby dinosaur, believed to have been forcibly extruded from an egg, is still in its embryonic posture, chin tucked down towards its chest and hips forward and up. At 23 cm (9 inches) long, measured from the top of the skull to the base of the tail, it would have only occupied less than two-thirds of the largest of the eggs beneath, further strengthening the notion that it was embryonic Why the World's Biggest Dinosaurs Keep Getting Cut Down to Size. Debate erupts over how best to estimate the sizes of the largest creatures ever to have walked the eart The biggest dinosaur to ever walk the earth, the Brachiosaurus, was a kind of Sauropoda and would have been found around the East Midlands - as shown by remains found close to the town Northampton. Brontosaurus: Species: Sauropod dinosaur: Nourishment: herbivore: Size: Length: 22m, 30 ton: Tameable: Yes: Colors: Purple, Green: Description: Can destroy the enviromen Nov 11, 2020 - The World's Largest Dinosaur is 4 times larger than a Tyrannosaurus Rex standing 82 feet tall. Visitors can climb 106 steps to the mouth to view the badlands & Drumheller, Alberta, Canada Curious viewers will soon be able to see the biggest-known king of the dinosaur world for themselves: In May 2019, the Royal Saskatchewan Museum is set to open a new exhibit featuring Scotty's. 'World's biggest dinosaur' Fossilised bones of a dinosaur believed to be the largest creature ever to walk the Earth have been unearthed in Argentina, palaeontologists say The recent success of Jurassic World, which has secured the title of highest global box-office opening ever, has got dinosaurs on everyone's mind.Whether you're debating with your friends about whether or not you'd go to an actual dinosaur theme park (even though you know that everyone would possibly die, admit it, you'd go) or you're considering re-watching a personal dinosaur movie. . Meet Patagotitan mayorum , the biggest. Maximo the dinosaur, now on display at Chicago's Natural History Museum, is the biggest dinosaur discovered to date by scientists In the latest study, Paul used these techniques to estimate the masses of the biggest dinosaurs known to science. He found that the largest dinosaur by body mass was indeed Argentinosaurus. The dinosaur, unveiled last week in The Anatomical Record, consists of a skeleton that's about 65 percent complete, including the skull and hips along with some of its ribs, leg bones, and tail bones And then of course with the really basal sauropods you have Turiasaurus, which some reports overhyped as the biggest dinosaur and for some reason people still like to believe it was some kind of supergiant - yet it lags far behind most of the animals on this list, at 70-80ft. and MAYBE 30 tons (like most basal sauropods, it's relatively lightly built and most of its length is tail) Dinosaurs are one type of many creatures to be found in ARK: Survival Evolved. This list includes only non-avian dinosaurs, not Birds. Carnivore Aggressive No Yes Yes 32 Small Deinonychus_Character_BP_C Dilophosaur Carnivore Aggressive Yes No Yes Unknown Small Dilo_Character_BP_C Diplodocus Herbivore Naive Yes Yes Yes 32 Large Diplodocus_Character_BP_C Gallimimus Herbivore Skittish Yes Yes Yes. The biggest dinosaur to ever walk the Earth. Vijay Mathur/Getty Images. By Tom Meisfjord / Nov. 13, 2019 9:12 am EST. Dinosaurs have been capturing the human imagination for centuries with their remarkable size, variety, and unceasing perseverance when determining whether or not someone is the mama .But these eight dinosaurs are even scarier — because they actually existed.. Paleontologists have just reported the world's biggest Tyrannosaurus rex and the largest dinosaur skeleton ever found in Canada. The 13-metre-long T. rex, nicknamed 'Scotty,' lived in prehistoric. . This mistake was only corrected in 2010 when Paul studied the bone and realised it was from a new species. He named it Duriatitan, which means 'Dorset giant'. It is another contender for Britain's biggest Jurassic dinosaur Sir David Attenborough invites you to walk with the biggest dinosaur ever to roam the planet in the BBC's first mixed reality 360 fil The biggest dinosaur bones, like the hips of supersaurus, were eight feet wide. Q: How tall were dinosaurs? A: We don't measure dinosaurs by height, since they didn't stand up straight. (They leaned forward.) So we go by their length. But the tyrannosaurus and other large meat-eaters, called carnosaurs, were large In life, the dinosaur might have stretched over 200 feet long, making it almost twice the length of the closest contenders. The trouble is that the bone used to name this dinosaur was lost long ago, and more recent analyses have shrunk the size estimates. This is actually something of a common problem among the biggest of the big August 10, 2017 - This is the biggest dinosaur ever discovered, which also means it's the biggest land animal that's ever lived.Its name: Patagotitan mayorum.Patagotitan may have been as large as any land animal could possibly get, weighing as much as 12 elephants Everyone wants their giant dinosaur to hold the title of biggest and, with multiple methods for assessing size to choose from, the team needed to be certain of what they'd found Question #3: What was the biggest dinosaur? Answer: The biggest dinosaurs were sauropods; they were gigantic, slow-moving, tiny-headed, cow-like plant-eaters from the late Jurassic period and the early Cretaceous period . They had very long necks which were useful for reaching wide (and tall) swatches of vegetation. The lengthy neck was counterbalanced by a massive tail Dinosaur toys are going to see a huge boom in 2020. Here are the 25 best dinosaur toys available: your ultimate list New Clues to How the Biggest Dinosaurs Got So Big A fossil found in Argentina that is more than 200 million years old suggests the most giant of dinosaurs existed earlier than paleontologists. Letar du efter hotell nära World's Biggest Dinosaurs-Cabazon Dinosaurs i Riverside? Boka ditt hotell hos Expedia.se! Här kan du enkelt jämföra priser och läsa recensioner om alla våra hotell. Läs mer och boka ditt hotell här The Biggest Dinosaurs Hardcover - September 1, 1997 by Don Lessem (Author) › Visit Amazon's Don Lessem Page. Find all the books, read about the author, and more. See search results for this author. Are you an author? Learn about Author Central. Don. Size Comparison of the Creatures in ARK There are many different creatures to be found in ARK: Survival Evolved. This page lists every creature currently revealed, some of which may not yet be found in game. For lists separated by group: Aberrant Creatures Alpha Creatures Amphibians Birds Bosses Brute Creatures Corrupted Creatures Dinosaurs Eerie Creatures Enraged Creatures Event Creatures. Delve into these fast facts about dinosaurs for kids of all ages. Discover why the Tyrannosaurus had sharp teeth, where the name dinosaur comes from, and more!. Basic Dinosaur Facts. Dinosaurs are a group of reptiles that have lived on Earth for about 245 million years Asked by James (aged eight) At 43 foot (13 metres) long and weighing up to nine tons (heavier than one and a half African elephants), Tyrannosaurus Rex was one of the largest meat-eating dinosaurs to have lived, but not the biggest dinosaur ever.Spinosaurus aegyptiacus was even longer at up to 59 feet (18 metres), and possibly twice as heavy. However, the largest dinosaurs were herbivores, not. NFL analyst out at ESPN after more than 2 decades. Pelosi, Mnuchin agree on plan to avoid shutdown. Tiffany Haddish: I tested positive for COVID-1 Ska du hyra bil i World's Biggest Dinosaurs-Cabazon Dinosaurs? Expedia jämför biluthyrningsföretag så att du lätt hittar de bästa priserna. Inga dolda kostnader. Gratis avbokning This category lists these dinosaur categories: Ornithischians; Sauropods; Theropods; Individual dinosaurs should only be added to this category if they don't fit in any subcategory The title of biggest dinosaur wasn't all about length. In 1903, palaeontologist Elmer Riggs discovered a partial dinosaur skeleton in western Colorado, naming it Brachiosaurus altithorax The dinosaur was built during the term of former Drumheller Mayor Phil Bryant. Each month 15 percent of the revenue generated by visitors to the World's Largest Dinosaur and the attached gift shop is directed to the World's Largest Dinosaur Legacy Fund, which reinvests funds into community economic development initiatives Biggest Ichthyosaur. From flying dinosaurs to swimming dinosaurs, the biggest ichthyosaur, or fish lizard, was the Shastasaurus. This ancient swimmer had a body similar to a dolphin and narrow snout perfect for grabbing unsuspecting prey. Sleek and streamlined, this giant weighed as much as 75 tons! That's 11x heavier than an elephant 2. The Biggest Dinosaur? What was the largest dinosaur of all time? There have been many contenders over the years - Brachiosaurus, Supersaurus, Seismosaurus, Argentinosaurus, and more.But the current front runner is Patagotitan.Found in 2008, and named in 2017, this enormous herbivore belonged to a dinosaur subgroup called titanosaurs Massive 1,100-pound bone of 'world's biggest dinosaur' found. The femur of a Sauropod, which is over 140 million years old, 6.5 feet in length and weighing 1,100 pounds, has been unearthed by. Basically a Brachiosaurus T-rex a new dinosaur in the newspaper Predator-X and is stronger then T-rex a Alasourus and other huge dinosaurs so we have 1 T-rex 2 Predator-X you know it would be a. It may well be the biggest dinosaur yet discovered, but is so new it doesn't yet have a formal scientific name. The dinosaur cast was unveiled before a packed crowd of media on 14 January Q: Which dinosaur is the largest? A: The biggest dinosaur is probably ultrasauros. We only have a few bones of this late Jurassic (140 million years ago) plant-eater from Colorado, but the bones show an animal who was six-stories high and may have weighed more than 50 tons Here's how big the dinosaurs in Jurassic Park would be in real life. Skye Gould and Jessica Orwig. 2015-06-12T20:04:00Z The letter F. An envelope. It. Dinosaurier (Dinosauria), även kallade skräcködlor, är en stor grupp reptiler som tillhör gruppen härskarödlor (Archosauria) och som oftast behandlas som en överordning. Absoluta merparten av grupperna levde endast under Mesozoikum, den era som omfattar de geologiska perioderna Trias, Jura och Krita.De tidigaste dinosaurierna utvecklades för ungefär 230 miljoner år sedan The largest dinosaurs were as heavy as most great whales but few came close to the weight of the blue whale at its maximum size though there could still be undiscovered dinosaurs to rival it in weight. Some were similar in length to the blue whale.. The top 10 largest Dinosaurs EVER. These massive creatures are the biggest dinosaurs ever. Tell me what video you want next. If you like anime look at my oth.. An enormous two-metre thigh bone from the world's biggest dinosaur dating back 140 million years has been uncovered in France. Sean Keach The Sun July 26, 2019 1:15p The biggest dinosaur overall in history was the Argentinasaurus, a long necked herbivore. But, the biggest carnivore was the Spinosaurus which was recorded to be 45 feet long, but it's biggest. DINOSAUR hunters have uncovered a 6.5-foot thigh bone likely belonging to a giant sauropod in France. The enormous femur was dug up in a fossil-rich area in Charente, and dates back 140million years The biggest dinosaur in history. The 75 tonne Argentinosaurus is brought to life. Share on Facebook. Share on Twitter. Share on Reddit. Share on WhatsApp. Share on Google+. Share by Email The World's Largest Dinosaurs is organized by the American Museum of Natural History in collaboration with Coolture Marketing, Bogotá, Colombia.. The World's Largest Dinosaurs is proudly supported by Bank of America. Additional support is generously provided by Marshall P. and Rachael C. Levine, and Drs. Harlan B. and Natasha Levine There, in the corner, was Carpenter's reproduction of the Amphicoelias vertebra, mounted just like the other biggest dinosaur in the world, Titanosaur, minus a few hundred bones here and there 'Biggest Dinosaur Ever' Unearthed in Argentina A technician lays next to the femur of a dinosaur -- likely to be the largest ever to roam the earth, in Rawson, Chubut, some 1,300 kilometers (800. Dinosaur discovery: Giant 500kg bone from 'world's biggest dinosaur' found in France A HUGE two-metre thigh bone believed to be from the world's biggest dinosaur has been found in. The heaviest, the biggest, the smallest, the oldest... all the hottest dinosaur facts can be found here. The Longest Dinosaur The longest dinosaur was Argentinosaurus, which measured over 40 metres, as long as four fire engines Biggest dinosaur ever found gets a suitably epic name. Researchers announced the fitting formal name for a honking huge titanosaur that dwarfs the T. rex. Amanda Kooser. Aug. 9,. Winton dinosaur field reveals biggest carnivorous dinosaur ever found in Australia. By Holly Richardson. Posted Wed Wednesday 15 Jan January 2020 at 12:00am Wed Wednesday 15 Jan January 2020 at 12. Check out our biggest dinosaur selection for the very best in unique or custom, handmade pieces from our shops Tweet. The biggest dinosaur in the world was thought to be the Seismosaurus, a Sauropod that reached up to 45 meters long! There are however, a number of contenders for this title: the Titanosaur (Argentinasaur) in the same family was 44 meters long and the Supersaurus in the same family was 40 meters long Alibaba.com offers 161 the biggest dinosaurs products. About 30% of these are Animatronic Model, 12% are Other Amusement Park Products. A wide variety of the biggest dinosaurs options are available to you, such as material Top 10 Dinosaurs From Britain. Britain might not be the first place you think of when the subject of dinosaurs comes up, yet some of the most important dinosaur discoveries are directly attributable to the dinosaurs that lived in what would eventually become the British Isles. Although in popular media discoveries in North America, Asia, and more recently China. Sauropod dinosaurs are the long neck dinosaurs that walked on 4 legs and lived on land like elephants. The heaviest Sauropod was recently named. So it is the biggest, but it is also the longest but not the tallest. This new dinosaur is one of the Argentinian Titanosaurs called Patagotitan Check out our biggest dinosaurs selection for the very best in unique or custom, handmade pieces from our shops Two stories involving Antarctic dinosaurs captured the imagination of paleontologists and the public in 2011. Early in the year, William Hammer and colleagues revealed the discovery of two nearly 200-million-year-old dinosaur skeletons and the partial remains of a massive sauropod (a large herbivorous dinosaur) on the slopes of Mt. Kirkpatrick in the Central Transantarctic Mountains Category:Jurassic World dinosaurs - Park Pedia - Jurassic Park, Dinosaurs, Stephen Spielberg. Games Movies TV Video. Wikis. Explore Wikis; Community Central; Start a Wiki; Search This wiki This wiki All wikis | Sign In Don't have an account? Register Start a Wiki. The Park Is Closed... 4,168 Pages. Add.
<urn:uuid:9aba17ce-f6e7-49e3-914a-1efb6bdf66db>
CC-MAIN-2022-27
https://heurechoisi.com/science/1100-pound-bone-worlds-biggest-dinosaurb79g4319-f9
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103205617.12/warc/CC-MAIN-20220626101442-20220626131442-00573.warc.gz
en
0.927076
4,756
3.40625
3
Horses played an important part in the history of The United Methodist Church. They carried Francis Asbury, the founding bishop of Methodism in America, more than 270,000 miles as he rode the circuits, preaching more than 16,000 sermons. Jan 30 2013 Pilot Horse Program Provides Support for Prison Chaplains About the author Permanent link to this article: http://methoblog.com/3_0/2013/01/pilot-horse-program-provides-support-for-prison-chaplains/
<urn:uuid:7ac11387-6715-47da-8163-78d0a382d5eb>
CC-MAIN-2014-15
http://methoblog.com/3_0/2013/01/pilot-horse-program-provides-support-for-prison-chaplains/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609525991.2/warc/CC-MAIN-20140416005205-00151-ip-10-147-4-33.ec2.internal.warc.gz
en
0.884191
116
2.890625
3
I was listening to Matt Swoboda’s 2012 GDC talk, where he mentions using histopyramids to optimize the marching cubes algorithm. You can also use histopyramids to speed up counting sort, as he describes. A histopyramid is essentially a mip chain of a tensor, except instead of the reduction operator being an average, the reduction operator is addition. Because our input is only one dimensional, a histopyramid can more simply be described as adding elements pairwise in our input array, then recursing. For example, if our input list is this: [3, 1, 4, 1, 5, 9, 2, 6] then the next level of the histopyramid would be [4, 5, 14, 8] and the subsequent two levels are It can easily be seen that there are O(log(n)) levels in the histopyramid, and that the last element is the sum of all the elements in the original list. You can also see that, if you have a parallel processor, creating each level from the successive level has constant time delay, which means the delay for creating the entire histopyramid is O(log(n)). Memory allocation is easy because n + n/2 + n/4 + n/8 + ... + 1 just equal 2n, so you can simply allocate one array that’s twice the size of the input, then populate the second half of the input from the first half. There has to be synchronization between generating each level of the histopyramid, however, and because the OpenCL ‘barrier’ function only operates on thread groups and not globally, this has to be done with multiple kernel invocations. Okay, so how do we use this to actually sort the list? Well, let’s associate each value in the histopyramid with the slice of the input array that contribute to its value. The last value in the histopyramid would therefore correspond to the entire input list. In the previous level of the histopyramid, the two values correspond to the first half of the input array and the second half of the input array, respectively, and so on and so forth. Now, let’s say that we create a histopyramid of the frequency histogram. In such a histopyramid, each value in the histopyramid corresponds to the size of the output array that its slice encompasses. In our example above, this would mean that there are 31 values in the output array, 9 of which are between [0..3] and 22 of which are between [4..7] (because these are the bounds of the slices that each value corresponds to). If you look one level deeper, you can see that 4 of the output values are between [0..1], 5 values are between [2..3], 14 values are between [4..5], etc. This means that, if i’m trying to populate a particular cell in the output list, I first ask “is the index of my cell less than 9 or greater than 9?” This is relevant because I know that the first 9 values are between [0..3]. If my index is greater than 9, I then shrink my range to the 22 that I’m about to inspect (by subtracting 9 from my cell index), and ask if my index is now less than 14 or greater than 14. Eventually, I find the cell in the frequency histogram that my index corresponds to, so I can then fill in my cell with the frequency histogram’s cell’s index. You can see that this algorithm is O(log(n)). Therefore, we have three passes. The length of the input array is ‘n’, and the size of the maximum value in the input array is ‘m’. - To initialize the frequency histogram and the histopyramid to 0, 2m threads perform a O(1) computation - To create the frequency histogram, n threads perform a O(1) computation (using atomic_inc). Because atomic operations have to be serialized, this has a delay of mode(input). - To create the histopyramid, there are log(m) passes, the biggest of which requires m/2 threads, and they each perform a O(1) computation - To create the output array, n threads perform a O(log(m)) computation. Therefore, overall, the overall delay of the algorithm is O(mode(input) + log(m)). Also, max(n, 2m) threads are required to achieve this delay. The memory complexity is the same as for the serial case, because the histopyramid is the same size as the frequency histogram (so it’s just twice as big, which is the same asymptotic function).
<urn:uuid:f74e6cb6-3833-4a03-b141-2c3ef88023dc>
CC-MAIN-2018-30
http://litherum.blogspot.com/2013/05/speeding-up-counting-sort-with.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589902.8/warc/CC-MAIN-20180717203423-20180717223423-00306.warc.gz
en
0.903245
1,013
2.75
3
Friday, March 7, 2014 The Law Of Direct Democracy is the first casebook on direct democracy. This book uses state and federal judicial opinions, the text of ballot initiatives, statutes and constitutional provisions to compare and contrast the various state laws that govern the ballot initiative, the referendum and the recall. This book also contemplates the role of interest groups, voters, courts and elected officials and examines their ability to utilize, influence and limit the initiative process. It provides students and instructors both the information they need to learn the law of direct democracy and the tools to pursue further inquiry on discrete topics of interest.
<urn:uuid:97477336-61a3-41d3-8bd8-f030b5569fc7>
CC-MAIN-2014-41
http://lawprofessors.typepad.com/immigration/2014/03/from-the-bookshelves-.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657118950.27/warc/CC-MAIN-20140914011158-00329-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.900541
121
2.5625
3
Sawmills and Cordwood: Life in Natchez-Under-the-Hill during the Nineteenth and Early Twentieth Centuries Between June and September 1999, Coastal Environments, Inc. (CEI), conducted Phase III data recovery excavations at the Well site (22AD993) in Natchez, Adams County, Mississippi, for the U.S. Army Corps of Engineers (COE), Vicksburg District. Those cultural resources investigations were conducted as part of the COE’s Natchez Bluffs Stability Project and Natchez Riverfront Revetment projects. Both construction projects are designed to protect the historic Natchez Bluffs and Natchez-Under-the-Hill from impacts caused by erosion. The Well site was first recorded by CEI in the summer of 1998 during the course of a Phase I cultural resources survey of the Natchez Riverfront Revetment project area. The site was revisited in the winter of 1998–1999 in regard to the construction of Reach 4 of the Natchez Bluffs Stability Project. Subsequent National Register eligibility testing of the site in the spring of 1999 found that the site met Criterion “d” of the National Register of Historic Places (NRHP). The data recovery excavations were undertaken soon after the development of a data recovery plan. A combination of mechanical and hand excavations at the site revealed 14 archaeological features dating circa 1840–1933— two associated with the circa 1840–1863 sawmill, eleven associated with several circa 1867–1933 residences, and an erosional feature containing a quantity of cultural material. Not including the over 260,000 pieces of gravel, baked clay, and concretions that were hand excavated, these investigations yielded in excess of 413,000 artifacts. Combined with in-depth archival research, the field investigations and artifact analyses have provided considerable information about the circa 1840–1863 McFadden-Sisloff/Cozzens sawmill and the circa 1867–1906 Roth cordwood yard at Natchez-Under-the-Hill. Together, these resources have illuminated a small window into the lives of the people who lived and worked at Natchez-Under-the-Hill. This report presents the results of the data recovery excavations and the analyses of the recovered artifacts. This Resource is Part of the Following Collections Cite this Record Sawmills and Cordwood: Life in Natchez-Under-the-Hill during the Nineteenth and Early Twentieth Centuries. Thurston Hahn III, Joanne Ryan, Sara A. Hahn, Jerame J. Cramer, Douglas Wells, Carey Coxe. Baton Rouge, LA: Coastal Environments, Inc. 2005 ( tDAR id: 375622) ; doi:10.6067/XCV8VD6XQW Calendar Date: 1867 to 1933 (Residences) Calendar Date: 1840 to 1863 (Sawmill) min long: -91.421; min lat: 31.547 ; max long: -91.392; max lat: 31.586 ; Individual & Institutional Roles Contributor(s): Elizabeth M. Boggess Principal Investigator(s): David B. Kelley Prepared By(s): Coastal Environments, Inc. Baton Rouge, LA Submitted To(s): U.S. Army Corps of Engineers Vicksburg District U.S. Army Corps of Engineers Vicksburg District(s): DACW38-98-D-0004 General Note: Contract DACW38-98-D-0004 |Name||Size||Creation Date||Date Uploaded||Access| |natchez_under_the_hill_cei_2005.pdf||70.54mb||May 4, 2012 9:10:31 AM||Public|
<urn:uuid:13a82c05-1200-4d5f-9cb5-3dd195e53f1b>
CC-MAIN-2018-30
https://core.tdar.org/document/375622/sawmills-and-cordwood-life-in-natchez-under-the-hill-during-the-nineteenth-and-early-twentieth-centuries
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589980.6/warc/CC-MAIN-20180718002426-20180718022426-00482.warc.gz
en
0.885892
814
2.703125
3
Briefly describes RAND research in developing photographic processes for generating pseudocolor transformations using either two or three separations. Techniques for creating the separations by computer in addition to photographically are presented. The computer-generated separations are more difficult to produce, but they make an infinite variety of transformations possible. Digital information containing the gray levels of an image are input to a microfilm platter and the image is created on 35 mm film. The importance of data handling problems is also discussed. 10 pp. Ref. This report is part of the RAND Corporation Paper series. The paper was a product of the RAND Corporation from 1948 to 2003 that captured speeches, memorials, and derivative research, usually prepared on authors' own time and meant to be the scholarly or scientific contribution of individual authors to their professional fields. Papers were less formal than reports and did not require rigorous peer review. This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.
<urn:uuid:a5b395c9-841c-4f42-a053-85fffbf37e38>
CC-MAIN-2023-50
https://www.rand.org/pubs/papers/P4870.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00544.warc.gz
en
0.919437
308
2.953125
3
Equality in Design Curriculum presented by Nida FatimaNida Fatima About this video Collaboration is an essential part of the design process. However, in group-based learning environments, bold personalities easily take on leadership roles while introverts take on lesser roles, regardless of their expertise. How can we make learning design more inclusive and provide equal opportunities? In this presentation, Nida will present strategies for building the leadership and communication skills for designers of all types, whether they're naturally confident and assertive, quiet and shy, or somewhere in-between. Nida will discuss how educators can use behavioural management strategies to increase student engagement and participation. She’ll explain how, when students slip into their predefined roles, introvert, extrovert, etc., educators have an opportunity to show them an expanded version of themselves. Nida will explain how we change their existing mindset and teach them the value of taking risks and failing. By providing techniques and new ways of teaching, this presentation will give you ideas on how you can create more equality in your teams and classroom.
<urn:uuid:237405bc-ea53-4426-a169-65a8208590cc>
CC-MAIN-2024-10
https://rgd.ca/connecting-learning/events-training/videos/equality-in-design-curriculum-presented-by-nida-fatima
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474594.56/warc/CC-MAIN-20240225071740-20240225101740-00370.warc.gz
en
0.925372
222
2.8125
3
Cyprus is an island located in the northeastern part of the Eastern Mediterranean and is the third largest Mediterranean island after Sicily and Sardinia. It has a maximum length of 225 km and 94 kilometers width. The total length of its coastline is 782 kilometers. The closest country to Cyprus is Turkey (Asia Minor). Greece, to the northwest, is the closest to Cyprus European country. Geographically, Cyprus is dominant in the eastern Mediterranean which impacted heavily on the course of history and culture in general. The main features of the position of Cyprus are: - Cyprus is situated in the middle of the ancient world (Syria, Egypt, Mesopotamia, Asia Minor, Greece and Crete). For this reason the island accepted many different cultures. So it is not surprising that Cyprus has experienced a very ancient culture. - The geographical position of Cyprus between the three continents of Europe, Asia and Africa helps the island to develop trade and tourism relations with countries in these continents. - The Suez Canal is a short distance on the southern coast of Cyprus. - The oil-producing Middle East countries are very close in Cyprus and the movement of oil, this valuable form of energy to Europe is done through the Suez Canal or through pipelines leading to the coastal cities of Lebanon, Syria and Turkey which are within walking distance to the east of Cyprus. - The Black Sea Motorway - Bosporus-Dardanelles-Marmara-Aegean-Mediterranean region is a short distance north of Cyprus. This helped a lot the spread of Greek culture and the development of Greek commerce. The geographical position of Cyprus is the main reason that the island was occupied at times by various conquerors left their stamp on the Cyprus landscape. England, which in other areas lost bases, still keeps in Cyprus two major military bases and many rights. Also in 1974 the Turks invaded the island and placed under their sovereignty to 38.5% of the territory of the Republic. Geographically and historically Cyprus is an integral part of Europe.
<urn:uuid:5a14dd14-7a76-4b15-a51b-e3e944945115>
CC-MAIN-2022-40
https://www.cyprus-maps.com/article/geographical-positioning-of-cyprus-island.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335396.92/warc/CC-MAIN-20220929225326-20220930015326-00626.warc.gz
en
0.940907
415
3.453125
3
Miles Davis Wiki, Biography, Age as Wikipedia Miles Davis was an American trumpeter, bandleader, and composer. He is among the most influential and acclaimed figures in the history of jazz and 20th-century music. Davis adopted a variety of musical directions in a five-decade career that kept him at the forefront of many major stylistic developments in jazz. Discover Other awards‘s Biography, Age, Height, Physical Stats, Dating/Affairs, Family and career updates. Learn How much net worth Miles was in this year and how he spend his expenses? Also learn about how he was rich at the age of 49 years old? also know about his Social media accounts i.e. Instagram, Facebook, Twitter and much more. |Complete Family Name||Other awards| |Born||May 26, 1926| |Birth Day||October 6| |Birth Place||Santa Monica, California| |Nationality / Country||American| |Popular As||jazz musician (1926-1991)| |Occupation||jazz musician (1926-1991)| Miles Davis Family Background & Career Miles Davis, better known by her family name Other awards, was a popular American jazz musician (1926-1991). Born on May 26, 1926 in United States of America, Miles Davis started his career as jazz musician (1926-1991) 29. he was one of famous jazz musician (1926-1991) with the age 15 years old group. We recommend you to check the complete list of Famous jazz musician (1926-1991) Read Also: Ray William Johnson Wiki, Biography, Age, Family, NetWorth & Know More Miles Davis Early Life Story, Family Background and Education Miles Dewey Davis III was born on May 26, 1926, to an affluent African-American family in Alton, Illinois, 15 miles (24 kilometers) north of St. Louis. He had an older sister, Dorothy Mae (born 1925), and a younger brother, Vernon (born 1929). His mother, Cleota Mae Henry of Arkansas, was a music teacher and violinist, and his father, Miles Dewey Davis Jr., also of Arkansas, was a dentist. They owned a 200-acre (81 ha) estate near Pine Bluff, Arkansas with a profitable pig farm. In Pine Bluff, he and his siblings fished, hunted, and rode horses. Davis’s grandparents were the owners of an Arkansas farm where he would spend many summers. In 1927, the family moved to East St. Louis, Illinois. They lived on the second floor of a commercial building behind a dental office in a predominantly white neighbourhood. Davis’s father would soon become distant to his children as the Great Depression caused him to become increasingly consumed by his job; typically working six days a week. From 1932 to 1934, Davis attended John Robinson Elementary School, an all-black school, then Crispus Attucks, where he performed well in mathematics, music, and sports. Davis had previously attended Catholic school. At an early age he liked music, especially blues, big bands, and gospel. Miles Davis Height, Weight & Measurements At the age of 15 years, Miles Davis weight not available right now. Miles wiki profile will be updated soon as we collect Miles Davis’s Height, weight, Body Measurements, Eye Color, Hair Color, Shoe & Dress size soon as possible. |Shoe Size||Not Available| |Hair Color||Not Available| |Eye Color||Not Available| |Body Measurements||Not Available| Miles Davis Social Media Profiles The Santa Monica May 26, 1926-born jazz musician (1926-1991) expert was arguably the world’s most influential Miles Davis was expert, with a wide-ranging social media outreach. Miles was a phenomenal celebrity influencer. with lot of social media fan he often posts many personal photos and videos to interact with her huge fan base social media plateform. It helps to already be famous to become a social media influencer, but he demonstrates that you need to have a raw or personal touch and engage with your followers if you want to do well on Instagram Facebook, Twiter, Youtube, etc. Please scroll down to see information about Miles Davis Social media profiles. |Miles Davis Facebook Profile| |Miles Davis Twitter Account/Profile| |YouTube||Miles Davis Youtube Channel| |Spotify||Miles Davis Spotify Profile| |Website||Miles Davis Website| |Itunes||Miles Davis Itunes Profile| |Wikipedia||Miles Davis Wikipedia| |Deezer||Miles Davis Deezer Profile| |Quora||Miles Davis Quora Profile| Miles Davis Net Worth his net worth has been growing significantly in 2021-2022. So, how much was Other awards networth at the age of 15 years old? Miles’s income mostly comes from and basic source was being a successful American jazz musician (1926-1991). Here we are updating just estimated networth of Other awards salary, income and assets. |Miles DavisNet Worth in 2021||$1 Million – $5 Million| |Salary in 2021||Not Available| |Net Worth in 2020||Under Review| |Source of income||jazz musician (1926-1991)| Miles Davis Death: and Cause of Death On September 28, 1991, Miles Davis died of non-communicable disease. At the time of his death, he was 65 years old. At the time of his death he survived by his large extended friends and family.
<urn:uuid:bec1256c-ed3d-44ec-9faf-7ff639f81bb6>
CC-MAIN-2023-14
https://wikitrusted.com/miles-davis-wikipedia/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943698.79/warc/CC-MAIN-20230321131205-20230321161205-00278.warc.gz
en
0.949015
1,263
2.796875
3
NUMBER OF DIGITS REQUIRED TO REPESENT A NUMBER The greater number, the larger number digits required to represent that number, for Instant we can represent numbers up to 99 by two digits in to Decimal system. Similarly if there are n Binary digits (bits) available, then maximum number which may be represented is: In Sub-script of 10 represent base (10) or a decimal number. In binary number system” The right most digit having a “Lowest” weight is refer to as the least significant “HIGHEST” weighting is referred to as the MOST Significant Bit (MSB).
<urn:uuid:47d6fb33-d48d-4f72-896a-62aecbe15d23>
CC-MAIN-2017-47
https://bigertips.wordpress.com/2013/08/11/number-of-digits-required-to-repesent-a-number/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934808972.93/warc/CC-MAIN-20171124214510-20171124234510-00139.warc.gz
en
0.886112
139
3.171875
3
Originally from Poland, Ernestine Rose was a nineteenth-century human rights advocate and atheist who was committed to the rights of women and the abolition of slavery. Below are excerpts from the many speeches she delivered during her time in the United States. She was one of the first women to advocate for property rights for women as well as one of the first women to speak publicly and forcefully about the morality of atheism. On Women’s Rights: “Humanity recognizes no sex—virtue recognizes no sex—mind recognizes no sex—life and death, pleasure and pain, happiness and misery recognize no sex. Like man, woman comes involuntarily into existence; like him she possesses physical and mental and moral powers, on the proper cultivation of which depends her happiness; like him she is subject to all the vicissitudes of life.” -1851 “What is it to be a slave? Not to be your own, bodily, mentally, and morally—that is to be a slave. To work hard, to fare ill, to suffer hardship, that is not slavery; for many of us white men and women have to work hard, have to fare ill, have to suffer hardship, and yet we are not slaves.Slavery is, not to belong to yourself—to be robbed of yourself. There is nothing that I so much abhor as that single thing—to be robbed of one’s self.” -1853. “Truth, justice, charity, kindness and love, combined, make the creed of morality and virtue belonging to man, and necessary to this life; for it teaches him his duty to his fellow man, while religion, being a mystery, belongs wholly to some other unknown life, hence we can make no use of it in this. It teaches faith, blind, implicit faith, in things unseen and unknown; morality has nothing to do with religion, for a man may be ever so virtuous and moral, yet if he does not profess faith, he is called an Infidel.” -1859 Excerpts from Mistress of Herself: Speeches & Letters of Ernestine Rose, Early Women’s Rights Leader edited by Paula Doress-Worters.
<urn:uuid:0a508d1b-5aad-4175-a7fd-e8efaf3042bd>
CC-MAIN-2017-09
http://www.forthebirdscollective.org/tag/womens-history/
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172050.87/warc/CC-MAIN-20170219104612-00121-ip-10-171-10-108.ec2.internal.warc.gz
en
0.973923
457
2.6875
3
Table of Contents What does a Doppler radar collect? Answer: The Doppler radar used in weather forecasting measures the direction and speed, or velocity, of objects such as drops of precipitation. This is called the Doppler Effect and is used to determine whether movement in the atmosphere is horizontally toward or away from the radar, which aides in weather forecasting. What three things can Doppler radar measure? What three things can Doppler radar measure? Doppler radar can measure precipitation, wind speed, and wind direction. What information does Doppler radar provide to the public? Conventional radar provides information about the location and intensity of precipitation associated with a storm, while Doppler radar adds the capability to discern air motions within a storm. How accurate is Doppler radar? Doppler radar provided false positive results (rain event predicted but did not occur) 8.8% of the time and false negative results (failed to predict a rain event) 0.7% of the time. What are radars used for? Radars today are used to detect and track aircraft, spacecraft, and ships at sea as well as insects and birds in the atmosphere; measure the speed of automobiles; map the surface of the earth from space; and measure properties of the atmosphere and oceans. What is the primary function of the Doppler radar? Explanation: The primary function of a Doppler radar is to determine the velocity vector of an aircraft with respect to the ground. The velocity component can be integrated into distance travelled and hence Doppler radar can be used as a primary sensor for dead reckoning. How does a Doppler radar work? Doppler radar works by sending a beam of electromagnetic radiation waves from the transmitter (TX Antenna), with a precise frequency, at a moving object. Once the electromagnetic radiation wave comes in contact with an object, it travels back towards the receiver (RX Antenna). How do radars detect planes? A radar system detects other aircraft, ships, or other objects and the speed and direction in which they travel by sending out a pulse of high-frequency electromagnetic waves. This pulse goes out ahead of the aircraft until it encounters an object and reflects off of it. Radio waves are like these sound waves. What is the main advantage of Doppler radar? Doppler radar is used by a meteorologist to diagnose rainfall as well as provide data on the flow of wind in the atmosphere. 2. Accurate data: It can accurately predict how severe a thunderstorm will be and ensure a warning is issued on time. It can accurately forecast changes in the wind and the flow of wind. What is the primary function of Doppler radar? How far can radar detect? Detection range can be as low as 100 feet or less to over a mile. A radar may track a distant large vehicle instead of a closer small vehicle without any indication to the operator which vehicle the radar is tracking. The angle between the radar or lidar and target must be small for an accurate speed measurement. What does acronym radar mean? Radio Detection And Ranging RADAR RADAR is an acronym for Radio Detection and Ranging. It is a device capable of detecting objects at far off distances, mea. Page 1. RADAR.
<urn:uuid:e0cbc7ab-30dd-4153-ac54-bb6ae0c88558>
CC-MAIN-2022-40
https://quick-advices.com/what-does-a-doppler-radar-collect/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337631.84/warc/CC-MAIN-20221005140739-20221005170739-00691.warc.gz
en
0.921916
696
3.96875
4
For the first time in thirty years, poverty is set to rise. Global institutions warn that millions will be pushed into poverty this year with far-reaching consequences for health, education and living standards. During this period, most self-employed workers have been affected by income or job losses and reported savings of up to one month. One of the worst affected sectors were agriculture, livestock and fisheries, where 70% of workers have seen their income reduced and 21% have lost their jobs as of end of March. Natural disasters, like cyclones or floods, demand early preparedness and addressing risks and vulnerabilities before these events occur. The same applies to the current crisis. Even before the pandemic hit, rural communities in Malaysia already face higher levels of poverty, lower income levels, and lower levels of educational attainment than urban areas. Over 7 million of our population lives in rural towns, villages or settlements. The states of Sabah, Kelantan and Perlis – the most financially affected by the partial lockdown – have significant rural populations. Rural communities are exposed to the global turmoil but are excluded in multiple ways from what urban households can access– leading to widening of existing disparities. Building resilience, the ability to use resources and recover from shocks without compromising long-term prospects, is essential. Without resilience, vulnerable rural individuals and households fall deeper into poverty and debt, educational opportunity is reduced, leading to even lower capacity to respond to the next shock. Strengthen social safety net and promote decent work Promotion of decent work is integral to a strong social safety net. Daily wage workers, small farmers and informal workers are the most vulnerable to economic shocks. Working conditions for them does not automatically lead to uplifting of their socioeconomic condition, and retirement savings – if any – are dismal. Rural women in particular will benefit from a conducive and supportive environment to upgrade informal work into micro- or small enterprises. Leave no child behind Online learning modalities such as Google Classroom and video conferencing tools are making sure education continues despite school closure. However, children who lack reliable broadband access or have not acquired basic computer literacy skills, are unable to benefit. Rural households may not have Wi-Fi, or earn a reliable and sufficient source of income to have multiple devices such as smartphones, laptops or tablets for each child. The lack of tailored programs for rural settings means children from rural schools will fall further behind those who have mastered new skills. Missing out on digital literacy effectively reduces their economic opportunities and employability in the future. Develop human capital and diversify rural economy Developing human capital in rural areas should be in line with the future goals and direction of the region. Attracting youths and graduates to competitive and decent jobs in rural areas depends on adequate infrastructure, digitisation, entrepreneurial training and shifting to a green economy. One of the underlying issues for rural SME’s is the lack of incentive for growth and adoption of new practices or technology. Social enterprises that are connected to the community are key to tapping into an online market for local produce. The use of digital platforms requires strong commitment to provide connectivity and training for entrepreneurs to take part in the platform. Arguably, it also links back to basics: the degree of digital and financial literacy for rural students in their educational pathways. Emerging issues in sustainability and food security will become increasingly pressing. Diversifying crops,encouraging eco-tourism and agro-tourism initiatives, and creating value from natural ecosystems over the long term is crucial. Plan for community needs in health services Rural patients often have to travel longer distances for specialist care and treatment. For low-income households, key health challenges are related to nutrition, mental health, reproductive health, and non-communicable diseases. Though rural areas are most underserved due to geographic distances and low population density, the promise of telehealth has not been fully realised despite the increasing burden of chronic diseases. The organisation and delivery of rural healthcare services will need to involve state governments and continue to improve in quality and accessibility. In conclusion, more global shockwaves are expected in the future. Building resilience is not optional. In carrying out its rural development policy for 2030, the government should identify local actors in local government, city councils, civil society, businesses, artists, institutions like universities, to drive community aspirations and inclusive development. Inclusivity – a word that is used widely – implies a shift in policy making that is more consultative and conscious of unique characteristics of each rural locality. Shifting from process indicators to outcome indicators aligned to community needs will need the participation of researchers and public policy specialists. The impact of rural transformation centres should be evaluated from the qualitative perspective of users and businesses over time, beyond aggregate indicators of how many participated in its programs. Services offered should continue to evolve with the needs of the community. Rural research can help policy design by capturing how different policies link to each other and how they are performing in each location, and to inform planning policies for governments. The future of rural communities is closely related with that of urban towns and cities, and their resilience to withstand and recover from challenges is essential to the nation as a whole.
<urn:uuid:da5cbc98-d0ce-4e34-a14c-8e97b69ff46a>
CC-MAIN-2021-10
https://galencentre.org/2020/05/06/pandemic-exposes-gap-in-rural-resilience-and-preparedness/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359082.48/warc/CC-MAIN-20210227174711-20210227204711-00394.warc.gz
en
0.945594
1,065
2.859375
3
Death of Newspapers #9: Grafix fades out Leading cartoonists once had their own Sunday pages to fill, and many people bought newspapers for the comic strips. So the newspapers made the strips small and then even smaller. Why? Instead of improving, color printing became inferior. New strips by people who could not draw were introduced. The logic is elusive, leading to this question: Why didn't the National Cartoonists Society do something about the impending doom? When Roy Crane launched Buz Sawyer in November 1943, no one thought newspapers would fade away. Here are the first five Buz Sawyer Sunday pages (running from November 28 to December 26, 1943). In the dailies, Buz went on adventures with his sidekick Roscoe Sweeney. (Why is Roscoe spelled two different ways?) In the Sunday strips, Sweeney was the star. Instead of a single Sunday situation, Crane kept the story continuity going, and despite the passage of seven days, readers were so involved that they had no problem remembering previous weeks. End of an era footnote: While newspapers die, it was announced last month that Grafix Duoshade and Unishade papers are being discontinued due to a decline in demand, says Grafix prez Hayley Prendergast. These papers were long used by editorial cartoonists for shading, and Roy Crane used this product effectively back in the days when it was known as Craftint. Cleveland's Craftint Manufacturing Company sold the process to the Ohio Graphic Arts Systems, also in Cleveland. Then in 1990, Ohio Graphic Arts changed their name to Grafix. Crane's artful application of Craftint gave his Wash Tubbs and Buz Sawyer strips a unique three-dimensional look. The process involved brushing a chemical solution over an inked drawing to develop shading lines embedded in the paper. A separate solution brought out cross-hatching. Crane used this for watery wave effects, smoke clouds, atmospheric perspective and leafy jungles. He effortlessly turned panels into miniature b/w paintings, and no one else doing comic strips ever equaled his Craftint creations. Labels: buz sawyer, death of newspapers, grafix, roy crane
<urn:uuid:6250ddb7-b8af-4bb9-8419-68fcd3cf65c0>
CC-MAIN-2018-17
http://potrzebie.blogspot.com/2009/10/death-of-newspapers-9-buz-sawyer.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947654.26/warc/CC-MAIN-20180425001823-20180425021823-00149.warc.gz
en
0.966348
451
2.6875
3
| Psychological Science The Ergonomics of Dishonesty: The Effect of Incidental Posture on Stealing, Cheating, and Traffic Violations Can the structure of our everyday environment lead us to behave dishonestly? Four studies found that expansive postures incidentally imposed by our ordinary living environment lead to increases in dishonest behavior. The first three experiments found that individuals who engaged in expansive postures were more likely to steal money, cheat on a test, and commit traffic violations in a driving simulation. We also demonstrated that participants' sense of power mediated this effect. The final study found that automobiles with more expansive drivers' seats were more likely to be illegally parked on New York City streets. These findings are consistent with research showing that (a) postural expansiveness leads to a psychological and physiological state of power and (b) power leads to corrupt behavior. Crime and Corruption; Situation or Environment; Power and Influence;
<urn:uuid:34c79ca5-0b9a-4a2d-8b1e-7b7607d78485>
CC-MAIN-2016-07
http://www.hbs.edu/faculty/Pages/item.aspx?num=44823
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701152959.66/warc/CC-MAIN-20160205193912-00087-ip-10-236-182-209.ec2.internal.warc.gz
en
0.925601
190
2.6875
3
There are many uses for cryptocurrency, including a payment system and a virtual world in which you can buy, sell, and trade items. Cryptocurrency is also used in video games as a token. While cryptocurrencies are not based on any particular country, you can use them while traveling to other countries to avoid having to pay currency exchange fees. However, cryptocurrencies are not without risk. Unlike bank deposits, cryptocurrencies do not carry any insurance. Although the FDIC insures bank accounts for up to $250,000 per account holder, there is no similar protection for cryptocurrency. This means that if you lose cryptocurrency, there is no recourse. Moreover, cryptocurrency transactions are final, and there is no recourse for the investor. Cryptocurrencies rely on a distributed ledger called a blockchain. The blockchain is a constantly growing list of records that are linked by cryptography. Each block contains a hash of the previous block and transaction data. As a result, the blockchain is resistant to modification by design. As a result, cryptocurrency can record transactions between two parties in an efficient, permanent manner. It is typically managed by peer-to-peer networks that adhere to a protocol for validating new blocks. In addition to its scalability, cryptocurrency is free from central banking systems. In the past, central banks controlled monetary transactions. With cryptocurrencies, the central banks are not involved in establishing their validity. As a result, many cryptocurrencies have a limited supply. This limit prevents the creation of fraudulent transaction records and increases user confidence. Because of its high volatility, cryptocurrency is a risky investment and should be managed carefully. Even a small amount can add to overall returns while protecting against bigger losses. As an alternative investment, crypto is an excellent way to diversify your portfolio. However, it is crucial to understand the various concepts that surround the digital currency. A cryptocurrency’s value comes from the supply and demand of the currency. While bitcoin is the most popular cryptocurrency, there are other types of digital tokens that use the same technology. One popular type of crypto is the bitcoin blockchain, which is based on the blockchain. Some of these are merely security tokens, whereas others are tied to real functions and have utility. Another way that cryptocurrency differs from traditional currencies is that it has no central bank to control it. It is available to anyone who has internet access. The digital currency can be used for buying and selling goods, and it can also be used as an investment strategy. Furthermore, it is decentralized, which means that it is available to people in any country. The most popular cryptocurrency is Bitcoin, which has the highest adoption rate and the largest network of miners. The second largest cryptocurrency is Ethereum’s Ether, which serves as a platform for other cryptocurrencies. Ethereum offers decentralized applications to token creators. Many other cryptocurrencies are based on Ethereum. However, Bitcoin is the leader among all the others because it has a well-developed ecosystem and strong adoption.
<urn:uuid:ead0b2a7-3452-4af6-b784-926ddef6f0d5>
CC-MAIN-2022-40
https://auditandtaxhub.com/the-basics-of-cryptocurrency/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00109.warc.gz
en
0.955925
592
2.8125
3
See More Information on Making Homemade Ice Cream: When making homemade ice cream, be aware that there is the risk of being infected with Salmonella Enteritidis, a strain of Salmonella. The risk comes when the ice cream has eggs as one of its ingredients. Salmonella is found in raw eggs and can cause Salmonella Enteritidis, which causes fever, diarrhea and abdominal pains. Most recipes that include eggs are the custard style ice cream and the eggs are cooked in the custard making process. If brought to a temperature of at least 160°F, the threat of being infected by the Salmonella would be eliminated. The Salmonella is killed at a temperature of 160°F. Another way of eliminating the risk of being infected by Salmonella is to use an egg substitute, a pasteurized egg product or pasteurized shell eggs rather than regular eggs. Also, be sure that the milk and cream are pasteurized. Properly clean and maintain all the equipment and the ice cream maker according to the manufacturer's instructions before starting. How to Properly Store Homemade Ice Cream When storing homemade ice cream, make sure it is placed in a container with a tightly sealed cover. Be sure there is at least 1/2 inch headspace in the container to allow for expansion. It is best to store the ice cream in a freezer unit rather than in the freezer section of a refrigerator because the freezer section in a refrigerator does not get as cold and does not maintain a consistent temperature. The colder the temperature is the faster the ice cream will freeze. If a freezer unit is not available, be sure to place the ice cream in the main freezer section of the refrigerator. Do not store it in the door of the freezer section. If stored in an airtight container at proper temperatures, the ice cream can be stored for a fairly long period of time. Do not allow the ice cream to sit out in room temperature for very long. This will help prevent it from melting. Partially thawed ice cream should not be placed back in the freezer. Any ice cream that contains raw eggs should be eaten within a week. To keep ice crystals from forming on leftover ice cream, place a piece of plastic wrap over the surface of the ice cream and press it down with your hands so the entire surface is covered.
<urn:uuid:c51bf50b-1ec4-4395-9306-51d6e873c843>
CC-MAIN-2018-13
http://www.recipetips.com/kitchen-tips/t--1386/safety-and-storage-of-homemade-ice-cream.asp?slide=2
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648207.96/warc/CC-MAIN-20180323102828-20180323122828-00204.warc.gz
en
0.927215
480
2.796875
3
Ebussuud Efendi was a significant sheikhulislam who had solved thousands of fatwas and personal issues regarding various domestic and foreign political events and all areas of life together with the arrangement of the state affairs. He played an important role in this sectarian / political nature with the hard fatwas he gave in his office where he stayed for thirty years in a century when the Ottoman-Safavid rivalry took place. He is the most important person who determined the way Iranian Shiism is perceived in Anatolia together with Kemalpashazade. Among the thousands of fatwas of Ebussuud Efendi, who is also a poet, there are many fatwas related to poetry and literature, some of which are direct verse fatwas and some are answers to various questions asked about poetry, poet, language and literature. Our work on verse fatwas still continues and we have introduced some of them before. In this study, various fatwas which are related to poetry, poet, language and literature are introduced. Ebussuud Efendi, fatwa, language, literature.
<urn:uuid:3b1c6a52-6540-4888-9fb1-520c2e8bf5a8>
CC-MAIN-2020-24
http://rssstudies.com/?mod=makale_ing_ozet&makale_id=36889
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347436828.65/warc/CC-MAIN-20200604001115-20200604031115-00113.warc.gz
en
0.978155
227
3
3
Definition of Open Access Open Access is the free, immediate, online availability of research articles, coupled with the rights to use these articles fully in the digital environment. - Scholarly Publishing and Academic Resources Coalition (SPARC) OA is a way of getting research to as many people as possible without the restrictions of traditional publishing eg. subscription only access, and the lengthy timeframes. Levels of Open Access What is an institutional repository? Institutional repositories are digital spaces for presenting and accessing an institution's staff and student research. The purpose is to make this research more accessible for more people. Find more information about institutional repositories at NZCommons.org.nz. Accessing institutional repositories Can't access what you want online? Contact our Interlibrary loans team to see if they can source it for you. Open Access Scholarly Publishing Association (OASPA) is a collaboration between several bodies to represent OA publishers. It is a reliable source. From its website you can access: Visit the SPARC website for in-depth information on Open Access.
<urn:uuid:c7afc46f-4974-40da-af0d-46f071552098>
CC-MAIN-2021-10
https://guides.unitec.ac.nz/researchandmore/openaccess
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178389472.95/warc/CC-MAIN-20210309061538-20210309091538-00200.warc.gz
en
0.91284
219
3.0625
3
Creative Writing /Drama Activity In this activity, children will use their imaginations, personal experiences, and a sense of humor to write some creative excuses. WHAT YOU NEED WHAT TO DO - Ask children if they know what an excuse is. Discuss various excuses you may have heard from former students who were late to school or missing homework. Explain that some excuses can be quite incredible. If you remember an especially incredible or unusual excuse, share it with the class. - Tell children that they are going to pretend to be parents who need to write a note explaining why their child doesn't have a homework assignment, or is late to school. Remind them that no ordinary excuses will be accepted. They need to come up with the most incredible excuse they can think of. Children can work in groups or with a partner to brainstorm different ideas for excuses. - When children are ready, distribute copies of the Note Form and have them write their excuses in the form of a brief note addressed to you. When they are finished, have them place their notes inside envelopes. Then have children role-play bringing in the note from home and giving it to the teacher. Children can take turns being the teacher and being the student with the incredible excuse. Have the "teacher" read the excuse aloud, encouraging him or her to read with expression to emphasize the incredible parts of the note. You may want to have children expand the role-playing by having the "teacher" ask the "student" some follow-up questions about the note. - Invite the principal to visit the class and listen to the children read their excuses aloud. - Have an Incredible Excuse Contest. Submit the excuses that the children write to a panel of teachers who will determine which excuse is the most incredible. Or, simply have the class listen to all the excuses and vote for the most incredible one. You may want to have several categories, such as funniest excuse, most unusual, most believable, etc. Activity Search | Reading Center | Math Center | Social Studies Center Education Place | You may download, print and make copies of this page for use in your classroom, provided that you include the copyright notice shown below on all such copies. Copyright © 1997 Houghton Mifflin Company. All Rights Reserved.
<urn:uuid:d56b1c32-764e-4344-9a51-ecfbe4aaf60c>
CC-MAIN-2014-10
http://www.eduplace.com/rdg/gen_act/incred/excuse.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654453/warc/CC-MAIN-20140305060734-00087-ip-10-183-142-35.ec2.internal.warc.gz
en
0.955623
494
3.375
3
Tuesday, June 14, 2011 Time for a Pause Often teachers have very little wait time between asking a question and calling on a student to answer it, and this limits the type of students who can respond to it. Pausing for longer - even longer than 5 seconds - will allow more students to participate as they can think about their answer more carefully and have the time to gain confidence that their response is worth listening to. Research has shown that in a classroom where there are short pauses, only a few quick-thinking students dominate and the answers are low-level, whereas in a classroom where teachers pause for longer, students are able to hear the questions, think about them and formulate a meaningful response. What happens in this situation is that the length of the students' responses increases, that weaker students contribute more, there is more variety of student responses and that the responses are more creative. It's important to pause after students have responded to the question too. Oftentimes a teacher will say "good" and move on. However this doesn't give the other students time to comprehend the response and decide if they agree or disagree with it. Sometimes a teacher will repeat the answer the student gave, perhaps rephrasing it. Again this is not very helpful as it tells students that the teacher has the "right" answer and that they should listen to the "teacher talk" and not the "student talk", which in turn discourages students from listening to or talking to each other. In addition judging an answer as good is telling students that the answer given is the only one needed, and there is no need for further thinking on the matter. If the teacher is non-judgemental when accepting answers, it gives the students the freedom to continue to think and to decide if they agree of disagree with the answer that has been given. Another "pausing" technique is to follow up the answers given with the question "why?". This helps students who didn't know the answer to the first question to find out how the answer was reached. Another way I've noticed of involving more students is to ask the rest of the class "do you agree?" This is especially important when a student has answered incorrectly - you don't want to discourage that student, but you hope that through further dialogue he or she may come to revise his or her initial response. The best questions, of course, are probably those where there is no single right answer. The motivation behind these questions is to provoke a discussion which leads to greater understanding on behalf of all. Both students and teachers need to pause, to really listen, to formulate their thinking, and then to respond. Photo Credit: Who's pushing your buttons? by Krikit
<urn:uuid:b7b4d354-282f-4ea7-af4d-0c1fcbbd1d28>
CC-MAIN-2018-43
http://www.maggiehosmcgrane.com/2011/06/time-for-pause.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512332.36/warc/CC-MAIN-20181019062113-20181019083613-00326.warc.gz
en
0.981188
553
3.609375
4
Author(s)/Editor(s): Rodd, Helen D. and Wray, Alyson P.M. This book presents the basic principles underlying sound treatment planning for the young patient, whose early experiences can significantly affect future behavior and attitudes. Treatment planning is not merely a sequence of procedures, but should address the individual social, medical, and dental needs of each child. 1. The First Visit and Information Gathering 2. Interceptive Orthodontic Treatment 3. Planning for Prevention 4. The Restorative Phase of Treatment 5. Management of the Dental Emergency 6. Recall Strategy
<urn:uuid:16628823-8a17-4db5-80e8-9eeb0a25269d>
CC-MAIN-2023-50
https://quintpub.asia/product/treatment-plan-for-developing-dentition/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00867.warc.gz
en
0.84829
125
3.546875
4
Wear of single-crystal silicon carbide in contact with various metals in vacuum Kazuhisa Miyoshi, Donald H. Buckley, United States. National Aeronautics and Space Administration. Scientific and Technical Information Office National Aeronautics and Space Administration, Scientific and Technical Information Office, 1978 - Science - 22 pages 3 pages matching stronger chemical affinity in this book Results 1-3 of 3 What people are saying - Write a review We haven't found any reviews in the usual places. Aeronautics and Space affinity for silicon aluminum and titanium basal plane boundary of rhodium brittle fracture carbide and produces Carbide in Contact carbide wear debris CONTACT WITH VARIOUS copper rider cracking and fracturing debris during sliding debris of silicon Donald H experiments were conducted fracture during sliding Fracturing and cracking grain boundary greater shear moduli grooves and indentations hexagon-shaped Kanazawa University Lewis Research Center metal riders Miyoshi mm/min NASA National Aeronautics passes on SiC percent pure primarily due produced by brittle produced during sliding rhodium and tungsten rhodium rider rider produced rolling of silicon Scanning electron micrograph silicon and carbon silicon carbide 0001 silicon carbide surface silicon carbide wear single-crystal silicon carbide slides or rolls sliding contact sliding direction sliding direction,<1010 sliding velocity Space Administration stronger chemical affinity temperature titanium rider Tungsten rider vacuum pressure various metals wear behavior WEAR OF SINGLE-CRYSTAL wear scars wear track X-ray map
<urn:uuid:774c6653-bf6e-4001-b996-5737a11e7e28>
CC-MAIN-2016-07
https://books.google.com/books?id=GzNtwyUveQsC&q=stronger+chemical+affinity&dq=related:NASA31769000426794&lr=&source=gbs_word_cloud_r&hl=en
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701166261.11/warc/CC-MAIN-20160205193926-00161-ip-10-236-182-209.ec2.internal.warc.gz
en
0.804985
317
2.6875
3
Children of recent immigrants face many challenges Jennifer Greenstein Altmann Princeton Professor Alejandro Portes has captured the dynamic of these children's lives in his new book, "Legacies: The Story of the Immigrant Second Generation," co-written by Rubén Rumbaut of Michigan State University. The book is based on interviews with 5,262 children of immigrants, making it the largest study of its kind. The children were initially contacted in 1992 when they were in junior high school; that research produced an early edited collection, "The New Second Generation," published in 1996. Follow-up interviews, conducted when the children were finishing high school, formed the basis for the new book, which provides real-life stories of immigrant families and an analysis of their achievements, self-esteem and family life. Portes, a professor of sociology and a faculty associate at the Woodrow Wilson School, recently talked about the book's findings. Why did you write this book? What we have attempted to do in the book, after collecting these massive data, is to provide a report that is not limited to hard statistics -- one that only social scientists can read -- but that conveys, through the stories of our respondents and their parents, the drama of confronting a new country and struggling with the challenges, and the effort to try to succeed. You were surprised by some of the findings of your research, particularly the fact that English is so universally adopted by children of immigrants. In fact, you found that 98 percent said they are fluent in English, meaning they can speak, read and write it, while only 30 percent said they are fluent both in English and in the native language of their parents. The educational system, the media and American society in general do such a good job of socializing people -- of teaching them English -- that what is at risk is the preservation of some fluency in the languages from their parents' native land. Those are valuable language skills that these kids acquire as a gift from their parents, and in the course of their education and trying to assimilate to America, they lose that. We quote a Miami businesswoman who declared, "There are 600,000 Hispanics in Miami, and we have a hard time hiring a person who can write a proper business letter in Spanish." That is why we recommend, instead of a full transition toward English monolingualism, efforts to preserve fluent bilingualism. We think efforts should be made by immigrant communities and school systems to promote selective acculturation, which is combining learning English with maintaining the parental language and learning elements of the parents' culture. That language is a source of pride and a source of understanding of where their parents came from, and when that is maintained, the prognosis for the children's success in this country is much better. You talk about the immigrant drive to succeed, which can lead the offspring of poor immigrants to do very well in the United States and make the leap, through education, into the middle class. But you point out that pushing children so much can also have drawbacks. In fact, you used a quote from the daughter of Korean immigrants who says, "By making the biggest move of their lives for me, my parents indentured me to the largest debt imaginable -- I owe them the fulfillment of their hopes for me." Is it common for the second generation to feel that kind of pressure? Newcomers arrive in the United States with a great willingness to do whatever is necessary in order to succeed. They view this as the land of opportunity, and parents work very hard to instill in their kids the sense that they can respond to their parents' sacrifices by doing well in school. Most immigrant families are very ambitious -- in some cases it can be excessive -- but that leads children to have a strong desire to achieve, and it can become a self-fulfilling prophecy. In fact, children of immigrants tend to do better in school than children of native-born Americans. On average their grades are higher and their rates of graduation are higher, when compared with the rest of the school population. Parents pushing their kids to do well in life is particularly a phenomenon among Asian immigrants, according to your book. You describe one Vietnamese family in which the parents have posted handmade signs throughout their house with Vietnamese aphorisms, such as "If you don't salt a fish, it will rot" (a variation of the American saying, "Spare the rod, spoil the child"). They posted another sign that says, "If you talk back, you are doomed forever." Yes. Can you imagine an American family doing that? There is a very high success rate for second-generation Asians, especially Southeast Asians, Cambodians and Laotians. We call it the Asian paradox. Their parents have such low levels of education, they come from almost tribal societies that found themselves in the middle of the Vietnam War. They are often illiterate even in their own languages. You would expect that their children would do the worst in school, and yet they work very hard, they are appreciated by their teachers and they do well. It's very common in areas with high levels of immigration that the valedictorian and the salutatorian at the high school turn out to be Vietnamese-American or Korean-American. Why? We attribute it to a positive reception in the United States. Because these people were refugees, they received a lot of assistance, and that allowed the parents to concentrate on their kids. The second reason is this drive from their parents, that they are going to make it no matter what the obstacles. If the parents come from modest origins but they have a strong community that supports the family, usually the kids do well. But immigrants who are not welcomed as enthusiastically into this country face some major obstacles, right? Yes, children of certain immigrant groups, such as Mexicans, Haitians and Nicaraguans, may be significantly at risk of dropping out of school, getting in trouble with the law and assimilating to the bottom of American society. When parents have low levels of education, they are poor, and they have been subject to high levels of discrimination, then there may be problems in terms of how the children assimilate. Those children often get a negative reception here -- poor support from government agencies and often generalized discrimination. They are racially stereotyped as black or brown, and that makes the process of adaptation difficult. There is an anecdote in chapter one about Mexican kids who witnessed their parents being treated roughly because of their ethnicity, and the kids reacted with great ire to that. They changed their focus from achieving in school, in order to make it in the system, to viewing the educational system as an adversary. That tends to have very dangerous consequences. It is very telling that three-fourths of the black kids in the sample, mostly Haitians and Jamaicans, say that no matter how much education they get, they will always be subject to prejudice. But you point out that no group is doomed to failure, that the outcome ultimately depends on the individual? You can have individual cases of success despite the most adverse circumstances. There will be many, many second-generation Mexicans, Haitians and Nicaraguans who make it despite adverse circumstances. As well, there will be children from relatively privileged backgrounds who disappoint their parents' dream. Some children are slated to enter easily into the American middle class, riding on their parents' achievements and income. Others will make it on the strength of the support and solidarity of their communities, and others will fall below even their parents' modest condition. This last group represents a real concern, because they create the prospect of an expanded "rainbow underclass" at the bottom of society.
<urn:uuid:22390606-426b-4211-9e56-554333c09369>
CC-MAIN-2014-52
http://www.princeton.edu/pr/pwb/01/0917/8a.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802764809.9/warc/CC-MAIN-20141217075244-00023-ip-10-231-17-201.ec2.internal.warc.gz
en
0.976889
1,586
2.625
3
The U.S. federal budget deficit is probably the world's most cited economic statistic. In recent years U.S. debt has risen at what is widely believed to be an alarming rate and has almost tripled since 1981. [Editor's note: this article was written in 1993. Since then the debt held by the public rose even further but started falling in 1998.] Those concerned about large deficits usually argue as follows: deficits let current generations off the hook for paying the government's bills. Therefore, current generations consume more. This reduces the amount Americans save and invest. A reduced rate of investment means less capital per worker and, therefore, lower productivity growth. When capital is scarce, its rate of return rises, causing interest rates to increase. Higher U.S. interest rates attract foreign investment to the United States and imply larger trade deficits, because increased foreign investment must increase the trade deficit (see Balance of Payments). Yet, there is very little correlation between budget deficits and interest rates, saving and investment rates, or productivity growth rates. Some economists, led by Robert Barro of Harvard, claim that the absence of a correlation is evidence for their view that deficits do not matter. They take seriously an off-the-cuff remark by David Ricardo (one of the great nineteenth-century economists) that deficits may not matter because current generations will hand future generations the means to pay off the debt. Barro argues that parents and grandparents do this by making bequests and gifts to children and grandchildren. But for such transfers to be large enough, older generations must have strong altruistic ties to younger generations. Recent studies find that, on the contrary, the ties are weak. Other economists, who worry about deficits, claim that the correlation between the deficit and other economic variables is so low because the deficit has been defined incorrectly. Two such economists are Robert Eisner (see Federal Debt) of Northwestern University and Stanford's Michael Boskin, chairman of the President's Council of Economic Advisers under George H. W. Bush. They point out that the government's official debt measures only the government's liabilities. It completely ignores the government's assets. Using the government's debt figures to assess its financial position is, in their view, akin to calling the owner of a $1 million property a debtor because he has a large mortgage on the property. These and other economists also fault the conventional deficit measure for failing to correct for inflation. It is hard to know where these corrections should end. The research of Martin Feldstein, a Harvard economist and former chairman of the Council of Economic Advisers, suggests that the unfunded liabilities of government retirement programs, such as Social Security, should be included in the deficit. Including such liabilities would more than triple the measure of U.S. federal debt. But if the government's commitments to pay Social Security benefits should be included, shouldn't we also include implicit commitments to other federal expenditures, such as those for defense and national parks? The debate over how to measure the deficit is not confined to academics. In recent years many members of Congress have noted that the traditional deficit (i.e., the one that gets reported) will, in the late nineties, be reduced because revenues from Social Security taxes will greatly exceed Social Security payments. They worry that including Social Security in the deficit may mask the true fiscal picture. To avoid this outcome, Congress in 1990 redefined the federal deficit to exclude Social Security receipts and payments. This is not the first time Congress redefined the deficit, nor the last. Indeed, by 1993 Congress had restored the old definition of the deficit that includes the Social Security surplus. The manipulation of the definition should not be surprising. Since everyone is sure the deficit should be zero, but no one is sure how to measure it, the deficit's definition has real implications for economic and budget policy. Choosing a definition that makes the deficit large will invite efforts to lower it by limiting spending or increasing taxes. The opposite will be true with definitions that make the deficit appear small. The simple fact is that the deficit is not a well-defined economic concept. The current measure of the deficit, or any measure, is based on arbitrary choices of how to label government receipts and payments. The government can conduct any real economic policy and simultaneously report any size deficit or surplus it wants just through its choice of words. If the government labels receipts as taxes and payments as expenditures, it will report one number for the deficit. If it labels receipts as loans and payments as return of principal and interest, it will report a very different number. Take Social Security, for example. Social Security "contributions" are called taxes, and Social Security benefits are called expenditures. If the government taxes Mr. X by $1,000 this year and pays him $1,500 in benefits ten years from now, this year's deficit falls by $1,000 and the deficit ten years hence will be $1,500 higher. But the taxes could just as plausibly be labeled as a forced loan to the government, and the benefits could be labeled as repayment of principal plus interest. In that case there would be no impact on the deficit. There are real problems to be concerned about, but the federal deficit doesn't measure those problems. One thing that neoclassical economists are concerned about is intergenerational transfers. Many government programs—some of which increase the traditional deficit (because of our choice of words), and some of which, like pay-as-you-go Social Security, don't increase the deficit (again because of our choice of words)—transfer resources from one generation to another. The redistribution of resources by the government occurs between existing and future generations as well as between young and old existing generations. According to Franco Modigliani's life-cycle model (the most famous neoclassical macroeconomic model), policies that redistribute from future generations to current generations, as well as policies that redistribute from younger people to older ones, cause national consumption to increase and national saving to fall. The reason is that older generations have larger propensities to consume than do younger generations. This reflects the fact that older people, who are closer to the end of their lives, want to spend their remaining resources more quickly. Hence, redistribution from younger to older generations can raise consumption, lower saving, lower investment, raise interest rates, increase trade deficits—in short, do all the bad things that have been ascribed to deficits. But using the federal deficit as a measure of U.S. generational policy is like driving in Los Angeles with a map of New York. While the map may be highly detailed, with overlays and multiple colors, it will, nonetheless, get us lost. For measuring the government's generational policies, neoclassical economics suggests an alternative to deficits: generational accounts. Generational accounts indicate in present value what the typical member of each generation can expect to pay to the government, minus benefits from the government, now and in the future. A generational account is thus a set of numbers, one for each existing generation, indicating the average remaining lifetime burden imposed by the government on members of the generation. Used properly, these accounts help assess generational policy, independent of the labels the government gives to receipts and payments. Generational accounts indicate not only what existing generations will pay, but also what future generations are likely to pay. The burden on future generations is determined by working through the government's "intertemporal budget constraint." This constraint says that the present value of the government's spending on goods and services cannot exceed the sum of three items: (1) the government's net wealth, (2) the present value of net payments to the government by current generations, and (3) the present value of net payments by future generations. Translation: the government cannot spend more than the sum of what it has and what it can raise. At any point in time we can project the present value of the government's spending and also estimate items 1 and 2. By subtracting 1 and 2 from the present value of government spending, we can determine the aggregate present value taken from future generations. By one set of estimates, as of 1989 the present value of future government spending was $25.4 trillion, the government's net wealth was—$0.5 trillion, and the present value of net payments of current generations was $21.2 trillion. This left $4.7 trillion to be paid by future generations. An analysis of U.S. generational accounts for 1991 indicates that unless U.S. economic policy is decisively altered, the typical member of future generations will end up paying roughly 71 percent more over his or her lifetime than will the typical member of current young generations! This figure is above and beyond the fact that future generations will pay more because their incomes will be higher due to economic growth. This 71 percent figure is extraordinarily high and indicates that U.S. economic policy is, generationally speaking, very badly out of balance. Generational accounting leads to a radically different interpretation of postwar economic policy than does reliance on the deficit. From the perspective of generational accounts, the fifties, sixties, and seventies were periods of quite loose fiscal policy (policy that placed larger burdens on future generations). The reason was the buildup of our unfunded pay-as-you-go Social Security, civil service, and military retirement programs. The eighties, in contrast, were marked by rather tight fiscal policy. While the Reagan tax cuts did increase the burden on future generations, other policies, particularly the 1983 Social Security reform, greatly reduced the projected burden on future generations. By raising the retirement age in stages to sixty-seven from sixty-five, and by gradually subjecting all retirees' Social Security benefits to income taxation, the 1983 reforms reduced the present value of Social Security benefits to be paid to current adults by about $1.1 trillion. Generational accounting automatically deals with each of the major concerns raised by those who think the deficit is conceptually sound but simply needs to be adjusted. By measuring all current and projected payments and receipts in inflation-adjusted (constant) dollars, the proposed accounting deals with changes in the price level. It uses the government's assets minus its liabilities to form the value of government net worth, which is ultimately used to help determine the "hit" on future generations. In considering future government payments and receipts to and from individuals, it accounts for the commitments to pay future Social Security benefits and to spend on other items, such as defense and parks. In projecting the future level of government payments and receipts, it takes into account economic growth. Finally, it considers the fiscal actions of all governments—federal, state, and local. Generational accounting thus represents a sensible alternative to the deficit delusion that has misled postwar fiscal policy. Laurence J. Kotlikoff is an economics professor at Boston University and a research associate at the National Bureau of Economic Research. From 1981 to 1982 he was senior economist for taxation and Social Security with the Council of Economic Advisers. Kotlikoff, Laurence J. "Deficit Delusion." The Public Interest (Summer 1986): 53-65. Kotlikoff, Laurence J. "From Deficit Delusion to the Fiscal Balance Rule—Looking for a Meaningful Way to Describe Fiscal Policy." National Bureau of Economic Research working paper no. 2841, February 1989. Kotlikoff, Laurence J. "Generational Accounts—A Meaningful Alternative to Deficit Accounting." In Tax Policy and the Economy, vol. 5, edited by David Bradford. 1991. Kotlikoff, Laurence J. Generational Accounting: Knowing Who Pays and When for What We Spend. 1992.
<urn:uuid:910b4101-30aa-42fa-b4c5-a69c0d31ff5a>
CC-MAIN-2014-10
http://www.econlib.org/library/Enc1/FederalDeficit.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654345/warc/CC-MAIN-20140305060734-00061-ip-10-183-142-35.ec2.internal.warc.gz
en
0.949428
2,392
3.265625
3
Psalms for Families: Devotions for All Ages, Psalm 23 Psalms for Families, by Robert J. Keeley and Laura Keeley, is a devotional book for the entire family designed to help parents explore the riches of the book of Psalms with their children and teens. These devotionals will help parents learn more about the psalms as they teach their children about praise, prayer, and lament. This book contains four devotionals on each of our selected psalms as well as notes for adults that provide additional information and background. A psalm of David. 1 The Lord is my shepherd, I lack nothing. 2 He makes me lie down in green pastures, he leads me beside quiet waters, 3 he refreshes my soul. He guides me along the right paths for his name’s sake. 4 Even though I walk through the darkest valley, I will fear no evil, for you are with me; your rod and your staff, they comfort me. 5 You prepare a table before me in the presence of my enemies. You anoint my head with oil; my cup overflows. 6 Surely your goodness and love will follow me all the days of my life, and I will dwell in the house of the Lord Your presence in our lives gives us great comfort. We remember that we are always in your care. When we are afraid, we know that you are there. Your goodness and your love are with us as long as we live. Thank you for the blessing of knowing that you care for us and that we will live with you forever. Amen. Devotional 1: Picture This! Read Psalm 23 together. Psalm 23 is probably the best-known of all the psalms. Did you recognize the words? Why do you think it is so well-known? Psalm 23 might be so well-known because it offers us comfort and talks about how God protects us. In Psalm 23, God is compared to a shepherd who is taking care of his sheep. Because God is such a good shepherd for us, we don’t need anything else. The shepherd provides everything we need: food, water, protection, and shelter. This psalm also lets us know that God is with us as long as we live. He was with us yesterday. He is with us today. He will be with us tomorrow. It makes us feel good to know that God is always with us. This psalm reminds us of that life-long comfort. Hearing Psalm 23 also puts several pictures into our minds: a shepherd, green pastures, still waters, paths, the valley of death, a rod and a staff, a table, and the house of the Lord. Enter the Psalm: Take a moment to go through this list of pictures that you just read. Take turns describing what you see in your mind when you hear words like “shepherd” or “green pastures.” Keep going until everyone has had a turn to speak or until you talk about all the pictures. Devotional 2: Shepherds In the city where we live, lots of people work in the automotive industry making parts for cars and trucks. People in our community make visors, seats, mirrors, ceiling panels, and lights. One member of our church even researches how much noise a person hears in a car and figures out how to make cars quieter. Some people in your community may do the same kind of work, or maybe they’re farmers, chemists, builders, or other things. When the Bible was written, many people were shepherds. We even know who some of them were. Jacob took care of his father-in-law’s sheep. Joseph’s brothers were tending the sheep when Jacob sent Joseph out to find them. Moses was tending sheep when God called to him from the burning bush. David was a shepherd, and he came in from the field to be anointed by Samuel. Now read Psalm 23 again. The people of Israel understood the life of a shepherd. Sheep provided them with wool for clothes and meat to eat. Making the connection between God and a shepherd was easy for them because they knew what shepherds were like. We don’t really know what shepherds are like though, do we? Learning more about shepherds help us understand what David meant when he wrote “The Lord is my shepherd.” A shepherd doesn’t just watch sheep, he cares for his sheep. He takes them to where food and water are, and he shelters them from storms. Because sheep do not have claws or teeth to protect themselves, he protects them from other animals that want to eat them. Because the shepherd is there, the sheep are protected, comforted, and fed. Without a shepherd, the sheep would not last long in the wilderness. That’s a pretty good picture of how God cares for us, isn’t it? Enter the Psalm: Some animals won’t go anywhere unless you drive them—that means you have to get behind the herd and force it to go in a certain direction. Sheep aren’t like that. Sheep need to be led. So when the psalmist uses the image of a shepherd for the Lord, he’s saying that God leads us rather than forces us. What do you think it means that God leads us rather than forces us to do things? Can you think of any examples of what that looks like? Devotional 3: Valleys Read Psalm 23:4. Even though I walk through the darkest valley, I will not be afraid. You are with me. Your shepherd's rod and staff comfort me. (NIrV) Valleys can be beautiful. Have you ever been on a vacation to a place that has beautiful valleys? We have. In Great Smokey Mountain National Park we saw some wonderful mountains and valleys. We took pictures, but the pictures are never as beautiful as the real thing—at least ours aren’t. When we think about valleys we mostly think about nice scenery, because that is all we have experienced. For sheep, though, valleys are more than just pretty pictures. They can be dangerous places. Animals that attack sheep might be lurking behind rocks or in caves in the walls of the valley. When it rains a lot, valleys can fill up with water quickly—that’s called a “flash flood”—and the sheep could be in danger if they’re in the valley when that happens. For sheep and shepherds, valleys can be places of death. Even though we’re not sheep or shepherds, we know what it can feel like to be in a dangerous valley. We know what it’s like when we are sick or when a friend or relative dies. We know what it means to feel like the whole world is against us. Even though there are probably no predators waiting to attack us from behind rocks, we know what it means to be scared. So we also know what it means to be comforted. Notice that this psalm does not say that we will never be in danger or never be scared. It says that God is with us when we are. Enter the Psalm: Talk together about some of the “valleys” in your life. Use a time of silence to thank God for being with us in these valleys and then ask God to comfort us in those times. Pray especially for people who are in a valley right now. Remember that God is with us when we are scared. Devotional 4: Our Shepherd Knows Us Read Psalm 23. Psalm 23 is not the only passage in the Bible that compares the Lord to a shepherd. Jesus also said that he was a shepherd—the Good Shepherd. In John 10:11-13 we read, 11 “I am the good shepherd. The good shepherd lays down his life for the sheep. 12 The hired hand is not the shepherd and does not own the sheep. So when he sees the wolf coming, he abandons the sheep and runs away. Then the wolf attacks the flock and scatters it. 13 The man runs away because he is a hired hand and cares nothing for the sheep. Jesus explains more about what it means to be a good shepherd in this passage. The shepherd isn’t just some hired hand; he knows his sheep and his sheep know him. The sheep know his voice and follow where he leads. When we say, “The Lord is my shepherd” we are also saying that we are God’s sheep. The Good Shepherd knows his sheep by name, cares for them, lays down his life for them, and gives them eternal life. He knows when we are joyful and he knows when we are sad. He knows when we’re having a good day and when we’re not. He also knows that sometimes we need to be quiet, so, like a shepherd, he leads us to places where we can just be still and pay attention to him. God knows us and he knows what we need. He will always be with us, caring for us and leading us. Enter the Psalm: Jesus knows us and cares for us. He asks us to care for each other too. Take out your church directory or some other list or schedule that has your name and other names on it. (It could be a soccer schedule, a class list, or something else.) Find your own name. Look at all the other names. Do you know all those people? Pick out five names and write these names on a slip of paper and put them on your refrigerator. Use this list as a reminder to pray for these people this week when you are having quiet time with God. More—The Lord Is My Shepherd (Notes for Adults) Psalm 23 is one of the most beloved passages in the Bible, and rightly so. Many Christians memorize this psalm. Just saying the first line reminds us of the entire psalm. But many of us focus on the word “shepherd” when we read the first line. For the people of Israel, the image of the shepherd was also widely used to describe their kings. Therefore, when the writer begins “The Lord is my shepherd,” he may be putting emphasis on the word “my,” stating that even though there are many shepherd-kings in the region, the Lord is his shepherd. Other parts of this psalm also reflect kingly things. Verses 5 and 6, for example, evoke images of a king receiving an honored guest, someone with whom he is making a covenant. They share a meal, there is anointing, and the guest’s cup is full to overflowing. One of the poetic devices sometimes used in the psalms is putting the most important line in the exact middle of the psalm. The middle of Psalm 23 is the phrase, “You are with me. Your rod and your staff, they comfort me.” Psalm 23 is clearly meant to be what it has been for generations: a psalm of comfort. If you don't see a place above to enter or view comments, it may be due to your browser's security or privacy settings. Please try adjusting your settings or using a different browser.
<urn:uuid:d93e3b15-f6b4-430e-8649-84b3a1f52d0d>
CC-MAIN-2021-49
https://worship.calvin.edu/resources/resource-library/psalms-for-families-devotions-for-all-ages-psalm-23
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358673.74/warc/CC-MAIN-20211128224316-20211129014316-00395.warc.gz
en
0.967858
2,436
2.546875
3
BUFFALO, N.Y. — Being a Catholic youth and having an identity within the LGBTQ+ community comes with a distinct set of challenges, especially following the Vatican’s announcement in March that it would not bless same-sex unions. There are faith-based institutions, including Catholic high schools, that offer counseling services for those struggling with their faith and identity, but what kind of counseling are these youths receiving? “Most of what I do is cognitive behavioral therapy," said Brigid Vilardo Lyons, a licensed clinical psychologist who provides counseling at Canisius High School. "So identifying, what are some automatic negative thoughts that we have, and how can we think about those in a more rational and more reasonable way to then better manage our emotions and our actions?” Vilardo Lyons explained how traditional therapy has evolved in terms of helping individuals who identify as LGBTQ+. “It’s not necessarily a disorder, I think it is something that has other co-morbid disorders that go along with it,” said Vilardo Lyons. “So, just as I may be heterosexual, that’s not a disorder. Homosexuality, not a disorder. Being transgender, not a disorder. But has other co-morbid challenges that go along with that; anxiety, depression, suicidality, and things that we need to be mindful of that can co-occur with however that person may identify.” Vilardo Lyons also explained that she is Roman Catholic, but she does not bring religion into her therapy sessions unless her patient chooses to incorporate it. However, she notes, working with youths in an institution founded in religion that is accepting to all has personal value to her. “As someone who actually lost someone who was very close to me to suicide who identified as LGBT, who himself was also Catholic, it’s very important and it hits home to be able to be in an environment as welcoming and as supportive as Canisius to facilitate the support of students who may need it most,” said Vilardo Lyons.
<urn:uuid:289460a0-a864-4769-ab4e-02becf9fbb8c>
CC-MAIN-2024-10
https://spectrumlocalnews.com/nys/buffalo/news/2021/06/15/counseling-for-catholic-youth-in-the-lgbtq--community
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473871.23/warc/CC-MAIN-20240222225655-20240223015655-00791.warc.gz
en
0.978329
433
2.875
3
In March 1811 France dispatched a mixed French and Venetian flotilla of six frigates, and several smaller craft, under Rear-Admiral Bernard Dubourdieu to capture the strategic Adriatic island of Lissa. Off the coast of the island this force was met by a force of four British frigates under Captain William Hoste. We played out the ensuing action last night using 'Form Line of Battle' The Franco-Venetian force consists of six ships. Windward Column - Favourite (40), Flore (40), Bellona (32) Leeward Column - Danae (40), Corona (40), Carolina (32) The Favourite, Flore and Danae are French and the other ships Venetian. Opposing them, in line are Amphion (32), Active (38), Volage (22) and Cerberus (32). The Volage is entirely carronade-armed. I rated the 40s and the 38 and Superior 5th rates, the 32s as 5th rates and the Volage as a 6th rate. The French and British ships had a gun-class of A, whilst the Venetian ships were B, as they didn't seem to have secondary carronades. The Volage was rated as D. Venetian crews were Poor, French were Experienced and the British crews Elite. The Franco-Venetian ships all had extra crew factors to represent the Italian soldiers they had on board. Here are the British ships. They started in line ahead, beating and very close into the shoreline. The two Franco-Venetian columns bore down on them. An overview of the opening positions. The wind is coming from the top-left of the photo, and the land a little off the bottom of the picture. This meant that the battle would tend to drift into the island itself. The French leeward column made for the two British ships at the rear of the line, and firing commenced at medium range between the Cerberus and the Danae. The British got off to a bad start when, in the light winds under which the battle commenced, the Active almost ran on board the Amphion, steering out of the way at the last minute, but throwing the head of the British line into confusion. The Danae and Cerberus closed to point-blank range and began to pound each other in earnest. Despite its smaller size, the more experienced British crew gave the Cerberus the advantage, and the Danae quickly began to suffer serious damage. The engagement began in earnest. To the left the Favourite and Flore engaged the Amphion and Active, who had turned towards the land in order to avoid masking each other. Cerberus and Danae fought each other to the right. The Venetian ships lagged behind, barely into the fight yet, whilst the Volage also found itself strangely isolated, its deadly short-ranged firepower making the French somewhat reluctant to close with it. The situation a few turns later. As in the actual battle the British ships had worn, and were now travelling in the opposite direction to that which they had started in. The Danae had taken a serious battering from the Cerberus and was close to striking, but kept passing its morale checks. Most of the Venetian ships were now engaged, although still not closely. A broadside from the Cerberus finally finished off the Danae, shattering its hull and leaving it sinking. The little Volage found itself stuck between two larger Venetian vessels, the Corona and Carolina. But quality told over quantity, and Corona caught fire The Favourite had taken some major damage early on, and was soon in trouble. The crew were ready to strike after a broadside from the Active, but the wounded French captain rallied them. (In FLOB a killed captain critical gives a penalty when taking strike tests, but if the captain is wounded he inspires his crew and gives them a bonus - the Favourite missed a roll by one point and was saved soley because of this rule.) By now the wind had picked up to a strong breeze, which made fine maneuvering harder, and very dangerous in such close proximity to the shore. But as the laggardly Bellona came into the fight the wind gave the Amphion a chance sweep across its stern, and rake the Venetian, hulling it below the waterline. The crew panicked and struck. Meanwhile the crew of the Corona were having real difficulty extinguishing the fires on board their ship, but despite that managed to pull of a last minute tack to avoid going aground. That black bit is the edge of the table, representing the rocks on the coast of Lissa. The Volage took advantage of a lull in the action to lower boats and take possession of the Bellona before it drifted into the island. The British had also tacked, and were now back on their original course. Aside from the Amphion, who was now engaged with the Flore at the top of the picture. The Flore put up a good fight, but once again the superior British gunnery began to tell. The Favourite was pretty much beaten, and the Volage closed in to force it to strike. Having extinguished the fire, but now badly damaged, the crew of the Corona decided that discretion was the better part of valour, and sailed their ship away. The Carolina joined them The Franco-Venetian force lost the Danae, Favourite, Flore and Bellona, the first one sinking and the other three captured. Rear-Admiral Dubourdieu was seriously wounded, whilst the captain of the Danae was killed. Carolina and Corona escaped with moderate to heavy damage, mostly from fire in the case of Corona. The British ships took very little damage to the fabric of their ships, but the Cerberus and Amphion had taken plenty of hits, and both had their captains killed. Despite their superiority in numbers this is a tough one for the Franco-Venetian force, but it's the numbers they have to use, ganging up on individual British ships whilst preventing others from assisting. In this game the British were mostly able to prevent this, fighting a series of one-on-one engagements in which quality was always going to win out. But it made for a great game, with some truly cinematic moments.
<urn:uuid:7739efc2-7020-44c5-982e-746fc73ae057>
CC-MAIN-2019-04
http://hordesofthethings.blogspot.com/2015/01/the-battle-of-lissa-1811.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583835626.56/warc/CC-MAIN-20190122095409-20190122121409-00122.warc.gz
en
0.978551
1,318
3.015625
3
Tutorial 17: Shady Characters - HTML with Style | 5 Numeric character references use a number to refer to a character in the document character set. As we saw earlier, HTML's character set is UCS. There are two ways to use numeric character references. One is to use decimal numbers and the other is to use hexadecimal numbers. Here are some examples: <P>å or å is the latin letter "a" with a circle above it.</P> <P>И or И is the Cyrillic letter "I".</P> <P>水 or 水 is the Chinese character for water.</P> As you can see, numeric character references start with an ampersand and a hash mark (&#), are followed by a number in decimal or the letter "x" and a number in hexadecimal, and are ended with a semi-colon (;). å or å is the latin letter "a" with a circle above it. И or И is the Cyrillic letter "I". 水 or 水 is the Chinese character for water. If you don't see what you expected to see above, don't worry: numeric character references are nice, but they do have some serious niggles: First of all, if you're using Netscape Navigator or an older version of another browser, you probably won't see the hexadecimal references displayed correctly. This is because many older browsers don't recognize the hexadecimal syntax. For this reason, you should generally avoid the hexadecimal notation until its use becomes more wide-spread. The reason it is included in the specification is that most character sets, including UCS, list characters in hexadecimal in their specification, so it should be easy to look up a character in the specification and just insert it into your document. But, to be on the safe side, use a scientific calculator or something similar to convert the number to decimal. Also, many older browsers do not properly understand character references with respect to the character set, and attempt to interpret them according to the character encoding. This is another source of confusion for people trying to understand the difference between character set and character encoding (or, you might say, a result of many programmers not understanding said distinction; but I digress). This should not be a problem with this document, as it uses the UTF-8 encoding that covers all of UCS, but it might be a problem if you where using an encoding that did not cover, for instance, the Chinese character for water used in the example above. Another reason that you may not view the above characters correctly is if your browser does not have access to a font that contains glyphs (images) for these characters. Your browser might understand that the above entity stands for the water character, but be unable to display it. If this is the case, the browser will probably display a question mark or a blank box in place of the character. This is usually not much of a problem; usually, if your audience is expected to be able to read a document containing certain characters, they'll probably have appropriate fonts. And before you start whining, another reason the above characters don't work for you might be that I speak no languages that use them, so I may have gotten them wrong. In this case, I apologise and welcome criticism on the matter. In general, numerical character references can cause a lot of trouble with browsers that are not properly internationalized. The best solution is to avoid them and use characters from your selected character encoding instead.
<urn:uuid:92fa9484-991c-45a7-9e3c-9f41f72dd4d7>
CC-MAIN-2014-42
http://www.webreference.com/html/tutorial17/4.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507449153.0/warc/CC-MAIN-20141017005729-00281-ip-10-16-133-185.ec2.internal.warc.gz
en
0.929817
748
4
4
Female macroptera. Body brown, fore tibiae, tarsi and antennal segment III paler; fore wings brown. Antennae 7-segmented, III–IV with small, usually forked, sensorium. Head wider than long, only 2 pairs of ocellar setae present, pair III very short and anterolateral to ocellar triangle; postocular setae small. Pronotum wider at posterior than anterior margin, with 2 pairs of short posteroangular setae, posterior margin with 5 pairs of setae; prosternal basantra with several setae. Metanotum with linear sculpture forming lens-like shape; campaniform sensilla present, median setae arise behind anterior margin. Mesofurca with spinula. Fore wing first vein with 3 setae on distal half, second vein with about 7 setae; clavus with 5 marginal setae. Tergites with sculpture lines medially on anterior half but not on posterior half; campaniform sensilla posterior to median setae; paired ctenidia present on tergites V–VIII, on VIII posteromesad to spiracle; tergite posterior margins with craspedum of triangular lobes, comb on VIII with slender microtrichia arising from broad bases. Sternites without craspeda, with double row of discal setae. Male macroptera or microptera. Similar to female but smaller and paler; tergite VIII posterior margin with craspedum of triangular lobes similar to preceding segments; sternites with craspeda of triangular lobes, III–VII with small circular pore plate. There is only one species in the genus Microcephalothrips, and this shares many character states with the species of Thrips genus, in particular the abdominal ctenidia that are posteromesad to the spiracles on tergite VIII. However, the prosternum bears several setae, unlike any species of Thrips, and there is a distinctive lobed craspedum on the abdominal tergites. Known from tropical and subtropical areas around the world. Northern Territory, Queensland, Tasmania, Victoria, Western Australia. Breeding in flowers Various Asteraceae, sometimes large populations in Helianthus sunflowers. Microcephalothrips abdominalis (Crawford DL) Mound LA & Marullo R. 1996. The Thrips of Central and South America: An Introduction. Memoirs on Entomology, International 6: 1-488.
<urn:uuid:3bb1619c-6bf5-494b-9e7a-8af24647eb78>
CC-MAIN-2023-14
http://www.ozthrips.org/terebrantia/thripidae/thripinae/microcephalothrips-abdominalis/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00741.warc.gz
en
0.75729
541
2.75
3
Apples are undeniably good for you, especially if you have diabetes. Apples are high in the soluble fiber pectin, making them good at controlling blood sugar by releasing it a little more slowly into the bloodstream (no this does NOT replace insulin) nor do I recommend you stop taking your insulin, so lets just clear that up right now. In addition to helping to regulate blood sugar and bowel function, soluble fiber is thought to have an anti-inflammatory affect that may help diabetics recover faster from infections. Apple Vitamin C Benefits: Apples benefit your health by boosting your intake of vitamin C, or ascorbic acid. Vitamin C helps you make collagen, a protein found abundantly in your skin. Collagen is a crucial structural component of skin and helps maintain your skin’s waterproof barrier. Low collagen production caused by vitamin C deficiency affects your skin, leading to a re-opening of old wounds and skin tearing. A large apple contains 10.3 milligrams of vitamin C, 14 percent of the daily vitamin C requirements for women, according to the Linus Pauling Institute, or 11 percent for men. Apple and Cancer: Lab studies have shown that several compounds in this juicy fruit curb the growth of cancer cells — but apples are most potent when eaten whole (minus the stem and seeds, of course). People who munch more than one a day lower their risk for several cancers (oral, esophageal, colon, breast, ovarian, prostate, and others) by 9 to 42 percent, Italian researchers found. What Are Phenols? Apples contains phenols, which have a double effect on cholesterol. It reduces bad cholesterol and increases good cholesterol. They prevent LDL cholesterol from turning into oxidized LDL, a very dangerous form of bad cholesterol which can be deadly. Since one apple contains a moderate amount of carbohydrates, diabetics must count the fruit as part of their healthy eating plan and its generally a good idea to bolus for them (depending on your current blood sugar levels). The average apple contains approximately 20 g of carbohydrates, most of which come from the fruit’s natural sugars. The American Diabetes Association recommends that “fruit can be eaten in exchange for other carbohydrates in your meal plan such as starches, grains or dairy.” Apples are also great to help cleanse your body of toxins both inside and out. They’re known to clear out heavy metals, such as lead and mercury. Staying hydrated is important, and the one thing they are great at is quenching your thirst and increasing body fluids. They also neutralize free radicals. If this article on apples was helpful, please leave a comment right below my bio or hit the share button to share with your friends 😀 Thanks for Reading!
<urn:uuid:17b1de2f-1642-4577-a300-69445a88b067>
CC-MAIN-2023-06
https://theorganicdiabetic.org/2015/11/can-diabetics-eat-apples/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500028.12/warc/CC-MAIN-20230202133541-20230202163541-00297.warc.gz
en
0.943005
575
2.75
3
The Table Round Malory calls the table 'the Table Round' and only reverses the adjective when speaking of the 'knights of the Round Table'. The great table was a gift from Uther to Leodegrance and when Arthur marries Guenever, Leodegrance provides it and its present complement of an hundred knights as the dowry. Leodegrance states that it was designed for one hundred and fifty but that the wars had reduced its ranks. Merlin is set the task to fill the remaining fifty but he can only find twenty-eight. The knights were placed in their sieges and the Bishop of Canterbury blessed them. When the knights arose to pay their homage to Arthur, Merlin found in every siege letters of gold that told the knight's name that was seated there. But there were two sieges void. When Pellinore arrives, the number grows to three, the two plus the Siege Perilous. When Pellinore is seated next to the two sieges, Merlin declares that no man will sit in the two sieges unless they be of the most worship and that no man would ever sit in the Siege Perilous but one and if anyone tried, he would be destroyed. Because of the position Pellinore is accorded, Gawaine determines even more to slay him for the death of Lot. At the end of his wedding feast and when he had established all of his knights and given them lands, he charged them never to do outrageously nor murder, and always to flee treason; also, by no means to be cruel, but to give mercy unto him that asketh mercy, upon pain of forfeiture of their worship and lordship of King Arthur for evermore; and always to do ladies, damosels, and gentlewomen succour, upon pain of death. Also, that no man take no battles in a wrongful quarrel for no law, nor for no world's goods. All knights were sworn to this and every year they renewed this vow at the feast of Pentecost.
<urn:uuid:0fdef2ac-72e0-4da7-81e9-744ca6b5d26c>
CC-MAIN-2016-18
http://www.celtic-twilight.com/camelot/infopedia/t/table_round.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111518.82/warc/CC-MAIN-20160428161511-00128-ip-10-239-7-51.ec2.internal.warc.gz
en
0.973138
434
3.109375
3
Please Note: This article is written for users of the following Microsoft Excel versions: 97, 2000, 2002, and 2003. If you are using a later version (Excel 2007 or later), this tip may not work for you. For a version of this tip written specifically for later versions of Excel, click here: Positioning a Column on the Screen. by Allen Wyatt (last updated June 19, 2018) Riek encountered a problem while developing a macro that sets up the screen for user input. Columns A:G always need to stay on the screen, so his macro freezes those columns. He then issues a command to move to column Z to start input. This places columns T:Z to the right of the frozen columns A:G. What Riek really wants is for columns Z:AF to appear to the right of A:G, but he doesn't know how to accomplish that. There are several ways that the desired results can be achieved. The first is to simply move "past" the desired target, and then move back to it, as in the following macro: Sub GotoCol1() With Application ActiveWindow.FreezePanes = False Range("H1").Select ActiveWindow.FreezePanes = True .Goto Range("IV1") .Goto Range("Z1") End With End Sub The important code lines are those that use the Goto method. The first jump is to the last cell of the first row, and the second jump moves back to the true target, Z1. By moving in this way, column Z ends up just to the right of the frozen range, A:G. While this works just fine, a better solution would be to use the Scroll parameter with the Goto method. Consider the following example: Sub GotoCol2() With Application ActiveWindow.FreezePanes = False Range("H1").Select ActiveWindow.FreezePanes = True .Goto Reference:=Range("Z1"), Scroll:=True End With End Sub The Scroll parameter is optional with the Goto method; it defaults to False. If you set it to True, then Goto scrolls through the window so that the upper-left corner of the target range (Z1) appears in the upper-left corner of the window. ExcelTips is your source for cost-effective Microsoft Excel training. This tip (2464) applies to Microsoft Excel 97, 2000, 2002, and 2003. You can find a version of this tip for the ribbon interface of Excel (Excel 2007 and later) here: Positioning a Column on the Screen. Professional Development Guidance! Four world-class developers offer start-to-finish guidance for building powerful, robust, and secure applications with Excel. The authors show how to consistently make the right design decisions and make the most of Excel's powerful features. Check out Professional Excel Development today! You can hide a bunch of worksheets at the same time, but Excel makes it impossible to unhide a bunch at once. You can, ...Discover More Want to have you macro completely hide the Excel interface? You can do so by using the Visible property for the Excel ...Discover More You can, from within your macros, easily display a message box containing a message of your choice. If you want to ...Discover More FREE SERVICE: Get tips like this every week in ExcelTips, a free productivity newsletter. Enter your address and click "Subscribe." Got a version of Excel that uses the menu interface (Excel 97, Excel 2000, Excel 2002, or Excel 2003)? This site is for you! If you use a later version of Excel, visit our ExcelTips site focusing on the ribbon interface.
<urn:uuid:81de7f3e-26ee-4fed-9dc2-31aeefc64aed>
CC-MAIN-2021-21
https://excel.tips.net/T002464_Positioning_a_Column_on_the_Screen.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988927.95/warc/CC-MAIN-20210508211857-20210509001857-00632.warc.gz
en
0.839419
774
2.734375
3
Fun with Flags: What do flags stand for- significance & meaning There’s something about seeing your country’s flag hoisted that makes you proud of who you are, doesn’t it? A flag is like a thumbprint of a country or institution- reflecting and communicating its unique identity. The elements of a flag- colors, shapes and symbols are all used to highlight the country’s features, history and values that it stands for. It is a patriotic symbol that reminds us of our roots and our culture. The importance of flags is underscored by the fact that they represent their respective countries in international meets, summits and festivals. As we had mentioned in our previous article about flags, we were inspired by Jim Parsons (a.k.a Sheldon Cooper) teaching vexillology, the study of flags, on his “Fun with Flags” shows. This is the second post of our own version of “Fun with Flags”, where we look at interesting facts, meanings and tidbits about flags from around the world. Let us know your thoughts and suggestions in the comments section below. Flags of popular countries, their meaning & significance Overview: Brazil’s flag was adopted in November, 1889. A Brazilian philosopher and mathematician named Raimundo Teixeira Mendes is credited with creating the flag. It comprises of a blue circle with stars and an inscription “Ordem e Progresso” inside a yellow rhombus on a green background. A lot of you might be familiar with the flag especially if you follow the sport of football. Meaning of Brazil’s flag: - Green background: symbolizes Brazil’s lush green fields and forests. - Yellow diamond: symbolizes the country’s wealth in gold. - Blue circle: a blue celestial globe representing the starry sky. - White stars: the 27 white five-pointed stars represent the Brazilian states and the Federal district. The stars are part of 9 constellations and are arranged in the same pattern as the sky over Rio de Janeiro on November 15, 1889 (when the flag was first flown). - Inscription: On the blue circle is a white equatorial band with Brazil’s national motto “ORDEM E PROGRESSO”, which is Portuguese for ‘Order and Progress’. People’s Republic of China Overview: The flag of China was first hoisted on October 1, 1949 at a ceremony formally announcing the founding of the People’s Republic of China. The flag was designed by Zeng Liansong as part of a competition organized to submit designs for the national flag. The competition received about 3000 entries and Zeng’s design was chosen with slight modifications. The flag comprises of a large golden star within an arc of four smaller golden stars in the upper left corner (also called the canton) on a red background. The flag is often referred to as the “Five-star Red Flag”. Meaning of China’s flag: - Red background: symbolizes the communist revolution. Golden was used as the color of the stars to radiate on the red background. - Large golden star: represents the Communist Party of China. - Four smaller golden stars: represent the 4 social classes – the working class, the peasantry, the urban bourgeoisie and the national bourgeoisie. Together the 5 stars represents the unity of the people of China under the leadership of the Communist Party of China. United States of America Overview: The flag of United States of America was first adopted on June 14, 1777. At the time of its first official adoption, it contained 13 horizontal alternating red and white stripes and a blue field in the upper left corner containing 13 stars. The number 13 was significant as it represented the 13 original colonies that declared independence from the British and formed the United States. Since then, the flag has been modified 26 times as the number of states increased and the current 50-star flag was adopted on July 4, 1960 and is the longest-running version of the flag. It is known by many names including The Stars and Stripes, Old Glory and The Star-Spangled Banner. Meaning of United States of America’s flag: - Red color: represents valor, strength and hardiness. - White color: represents purity and innocence. - Blue color: represents perseverance, vigilance and justice. - 13 stripes: represents the original 13 colonies that formed the U.S. - 50 stars: represents the 50 states of the nation. Overview: The flag of Australia was first flown in Melbourne on September 3, 1901 (September 3 is also the Australian National Flag Day). A slightly modified design, however, was approved by King Edward-VII in 1903. The flag’s design was chosen from a competition held in 1901. The flag comprises of the Union Jack in the upper left corner, a large white seven-pointed star below the Union Jack and five stars in the right half representing the Southern Cross constellation. Meaning of Australia’s flag: - Union Jack: symbolizes Australia’s history of British colonization and loyalty to the British Empire. - Large white 7-pointed star: Also known as the Commonwealth Star or Federation Star. 6 of its 7 points represent Australia’s 6 states. The seventh point was added in 1908 to represent the Territory of Papua and other future territories of the Commonwealth of Australia. (Papua later gained independence from Australia) - Southern Cross constellation: The Southern Cross constellation, comprising of 5 stars, is a way of symbolizing Australia’s geographical location as the constellation is only visible in the Southern Hemisphere and visible from all over Australia. Overview: The flag of South Korea was officially adopted on October 15, 1949 although it had been used prior to that as well. Also known as the Taegeukgi, it consists of a red and blue circle composed of interlocking spirals (called the Taegeuk) surrounded by four different black trigrams set against a white rectangular background. Meaning of South Korea’s flag: - White background: symbolizes peace and purity. White is a traditional color of the South Koreans. - 4 trigrams: The trigram on the upper left with 3 unbroken bars symbolizes heaven and justice, the lower left trigram symbolizes sun (fire), the upper right trigram symbolizes moon (water) & wisdom and the lower right trigram symbolizes earth and vitality. Together, they represent the principle of movement and harmony. - Red and Blue Taegeuk: Derived from the philosophy of yin-yang, it represents the balance of the universe. The blue part, Yin, represents the negative cosmic forces while the red part, Yang, represents the positive cosmic forces. The circle represents unity by bringing together the positive and the negative. Republic of South Africa Overview: The flag of South Africa was adopted on April 27, 1994. It was chosen to symbolize unity and represent the country’s new democracy after the end of Apartheid. The flag was designed by a vexillologist named Frederick Brownell, who has also designed the flag of Namibia. At the time of its adoption, it was the only flag to have six colors in its design. Its design comprises of red and blue horizontal stripes separated from a central green ‘Y’ by white stripes and the ends of the green band enclose two triangles of black and yellow respectively. Meaning of South Africa’s flag: - Black, Green and Yellow: These colors were taken from the banners of the African National Congress and Pan Africanist Congress to represent South Africa’s black population. Individually, black symbolizes the people, green the fertility of the land and yellow represents mineral wealth. - Red, White and Blue: These colors are representative of European colonists as well as of the flags of the old Boer republics (self-governed republics created by Dutch-speaking inhabitants in the 19th century), thus signifying the country’s white population. - The ‘Y’: Symbolizes unification of various ethnic groups and ushering in a new united South Africa. Overview: The flag of Iceland was officially adopted on June 19, 1915 thought the laws regarding the flag were officially described on June 17, 1944 when Iceland became a republic. The flag comprises of a red cross enclosed within a white cross on a blue background. The cross design is modeled after the flag of Denmark. Meaning of Iceland’s flag: - Blue background: symbolizes the Atlantic Ocean that surrounds Iceland. - White color: represents the snow and ice that covers most parts of the country for most of the year. - Red color: symbolizes the 100+ active and inactive volcanoes in Iceland. - The cross: The cross is a symbol of Christianity. Overview: The flag of Pakistan was adopted in its current form during a meeting of the Constituent Assembly on August 11, 1947, 3 days before it gained independence on August 14, 1947. It was designed by Amiruddin Kidwai and is based on the flag of the All-India Muslim League, the political party instrumental in the separation of Pakistan from India. The flag has a white crescent moon and a five-pointed star on a green background and a vertical white stripe at the hoist side. Meaning of Pakistan’s flag: - Green color: symbolizes Islam and the Muslim population. - White color: symbolizes the minority religions. Together, green and white represent peace and economic success. - White Crescent: representative of progress. - Star: symbol of light and knowledge. Overview: The flag of India was adopted in its present form during a meeting of the Constituent Assembly on July 22, 1947 and became the official flag of India on August 15, 1947, India’s Independence Day. Known as the Tiranga (meaning ‘tricolor’), it is based on the Swaraj flag of the Indian National Congress that was designed by Pingali Venkayya. It comprises of 3 horizontal bands of saffron, white and green respectively with the Ashok Chakra (a 24-spoked wheel) in navy blue in the center Meaning of India’s flag: - Saffron color: symbolizes courage, bravery and sacrifice. - White color: symbolizes truth, purity and peace. - Green color: symbolizes faith, fertility and prosperity. - Ashok Chakra: Known as the dharmachakra or wheel of virtue, the 24-spoked wheel represents Dharma or life principles that are at the crux of many faiths including Hinduism, Buddhism and Jainism. The wheel also signifies motion and growth as a reminder that India cannot oppose change.
<urn:uuid:33263dcb-9afc-4055-9823-2f14104f63d4>
CC-MAIN-2019-47
https://www.punditcafe.com/world/significance-and-meaning-of-flags-of-the-world/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496672170.93/warc/CC-MAIN-20191122222322-20191123011322-00468.warc.gz
en
0.933911
2,262
2.828125
3
the stars no longer guide our navigation, orchestrate our time-keeping, or pace our planting and harvesting but nearly all ancient civilizations shared this wisdom of time as a cyclical higher power and thus organized themselves to best survive by keeping the uncertainty and evil of chaos away through acts seeking harmony with this cosmos. Western culture's linear march- of-time model, ignores the wisdom of these past civilizations. In the present, as we become more troubled about our collective future amidst predictions of Armageddon, Apocalypse and Aquarius the legacy of this high wisdom from past looms large. The long obscured story is a spectacular one for it is written in The oldest structures on earth are fertility goddess temples on the island of Malta honoring the annual cycle of life. Their beginning and end between 4400 -2200 BCE holds a remarkable coincidence or synchronicity with the the Age of Taurus. This esoteric knowledge of a 26,000 year cycle pf earth moving through the heavens was known in ancient Egypt and Babylonia where written records have survived. There will never be irrefutable proof that the knowledge has its source in India but the Vedic texts written in the 2nd millennium BCE after a longer period as an oral legacy do reference prior ages before Taurus. The Chinese are said to have adopted around the same time Egypt was first rising as the dominant culture of the Mediteranean. Taurus is city-states] The greatest reference to prior ages is considered the Great Sphinx and the age of Leo [10,715 - 8,572 bce] Festivals in the ancient world were of central importance for they were the community's attempt to find victory for light and life over darkness. The annual return of life when spring gloriously blooms at the vernal equinox or the winter solstice when days finally begin to get longer are where we find our first Carnavals. Some say you can still connect with these ancient rhythmic patterns when you trance dance with others at these cyclic times best acknowledged by the Carnavals and spring festivals of the world. The Age of 4,286 - 2,143 bce Age of Taurus Agricultural Age, Fertility Golden Calf, Hindu Cattle worship, The Hindu religion still clings to its cattle worship from the age of Taurus. Rise of Mesopotamian and Egyptian civilisations. Bronze age in Greece, rise of Minoan and Mycenean cultures. Consolidation of agriculture, building of pyramids and megaliths. Bull cults in Assyria, Egypt, Crete. we find the bull as an object of awe in bullfighting which suggest the end of the Taurus Age, a topic of much myth making in pre-Christian religions including the old testament. The conclusive point of the bull-fight, el momento de la verdad, is when the torrero exposes his chest to the horns of the bull in order to lean over the animalís head and plant the sword between the horns. This act of death defiance highlights the ancient ritual inherent in the sport. One of the most photographed objects in all of the New Orleans Mardi Gras is the Boeuf Gras float in the Rex parade. Since the Middle Ages, the bouef gras (fatted bull) has become the symbol of the last meat eaten before Lent. At one time, it would have been ritually slaughtered as part of the feasting during BUMBA MEU BOI " For thousands of years the fertility rites of the god of vegetation -- the sacred bull who was ripped to death like the grain on the threshing floor or the grape from the vine -- was celebrated with ecstatic frame drumming and dancing. The ritual celebration always included the beer or wine made from the grain or grape. The intoxicating beverage represented the blood of the deity. By drinking the sacred blood one became intoxicated with the presence of the deity. Bumba Meu Boi Frame Drum Festival Persian traditions, the god Mithras was actually incarnated into the human form of the Saviour expected by Zarathustra. Mithras was born of Anahita, an immaculate virgin mother once worshipped as a fertility goddess. Mithraism was the last state endorsed pagan religion in Europe. The famous bull-slaying iconography of the Mithraic Mysteries popular in the Roman colonies, early in the Age of Pisces was meant to correspond to how the stars were set in the Zodiac of Taurus. The obvious connections with the Persian Mithras are still debated by scholars. The Egyptian Hourus was the bull of heaven, and a white bull was sacrificed in Babylonia at the New Year to placate Ramman, the god of thunder and lightning. |The single comet strike of 3150 BCE, impacted the eastern region of the Mediterranean Sea is probably the event that caused the great floods recorded in the myths of ancient Summer, Egypt and Greece but the far greater one of 7640 BCE is quite possible as well. An epic earthquake followed by at civilization was informed by the Age of Taurus, Taurus is the sign ruling over the desire nature on Earth symbolized by the Bull. Taurus also presides over the gifts of mother Earth to its inhabitants. Surprisingly, the Egyptian earth deity was the male god Geb, shown here under the sky goddess Nut Mayan astronomers of Central America, cultural descendants of the original South American civilization, noted that around 3100 BC, an evolutionary shift occurred. They thought of it as the origin point for a 5200 year cycle of sentient evolution, one that culminates in AD. It is also about the time of the dawning of the mother Babylonian culture and possibly their own New World Olmec culture. Pre-Aryan Hinduism, or the Vedic Era, could be seen as the flag-bearer of the Taurus Age, with a noticeable agricultural content and devotion to fertility in the symbolism.The transition from the Age of Taurus to the Age of Aries, is symbolized by the death of Krishna. Palermo stone, carved about 2350 B.C., shows us what Egyptians of the day considered to be important events: religious festivals, creation of statues of the gods, wars, regular taxation, and the height of that year's Nile flood. Administration and piety toward ancestors also formed a part of their history. Official archives journeyed back to the catalytic historical moment when the first pharaoh, King Narmer, unified Upper and Lower Egypt and formed the unified Egyptian state whose beliefs reflected a divine order that required constant care through pageantry and ritual. are give credit for the origins of Persian Zorastorism which is considered among the old Testament's most important influences. How the Babylonian civilization began with such extensive astrological knowledge is one of prehistory's great Two main ancient Vedic epics, Ramayana and Mahabharata, deal with nothing but the culture and lifestyle of the four main Ages before the Age of "In the rig veda, the oldest vedic text, there are clear references to a chakra or wheel of 360 spokes placed in the sky. The number 360 and its related numbers like 12, 24, 36, 48, 60, 72, 108, 432 and 720 occur commonly in vedic symbolism. It is in the hymns of the great rishi dirghatamas (RV I.140 - 164) that we have the clearest such references." by David Frawley one of the few westerners ever to be recognized in india as a Vedacharya or teacher of the We have drunk the Soma; we have become immortal; we have gone to the light; we have found the gods Rig Veda 8.48 As the Aryans had no script of their own, the hymns of the Rig Veda were memorized and passed on orally from one generation to the other before being recorded in written form at a much later stage. |The age stayed under the sign of the bull (Apis, or sacred bull Mnevis of Helipolis, identified to Ra), of the holy cow (Hathor in Egypt, surahbhi or Kamadhenu in India or may be worshipped in many spiritual cultures), or the golden calf in the polytheistic beliefs (see Exodus 32:4), preceding the Judaic monotheism. Krishna was said to have lived at the end of Dvapara Yuga (Encyclopaedia Universalis, Paris 1968, vol. 9, p.711) considered by some to have ended in the year 3102 B.C. (Zimmer, quoted work.) According to tradition, Krishna lived in the fourth millennium B.C. (La grande encyclopedie, H. Lamirault et Co., Paris, vol. 21, p.647.) During his time the fifth chakra (Adi Vishuddhi) of the Cosmic Being was enlightened. The Message of the Ancients: A |"The Mysteries of Mithra, which came to flower in the near east during the Hellenistic age as a kind of Zoroastrian heresy, and in the Roman period was the most formidable rival of Christianity... Celebrants wore masks representing animals of the Zodiac: for astronomy was undergoing a new development in this period through an application of Greek thought to the data of the centuries of Sumero-Chaldean observation. In all religions of the age, the Zodiac had come to represent the bounding, ever revolving sphere of time - space - causality, within which the unbounded Spirit operates unmoved yet moving in all." |Mithraism was a mystery religion with devotees sworn to secrecy. Nothing could be spoken or written down. What little is known of Mithra, the god of justice and social contract, has been deduced from reliefs and icons found in temples. Most of these portray Mithra clad in a Persian-style cap and tunic sacrificing a white bull in front of Sol, the sun god. From the bull's blood and semen, grain, grapes and living creatures sprout forth. Sol's wife Soma, the moon, begins her cycle and time is born. The letters 'VSLM' that are inscribed on many Mithraic stones are part of a secret code thanking Mithra for his good deeds and are recognizable only to the faithful. Mithraism and Christianity competed strongly because of the striking similarity in many of their rituals. Both involve shepherds, an ark built to escape a flood and a form of baptism. Devotees knelt when they worshipped and a common meal - a communion- was a regular feature of the liturgy. THE MYSTERIES OF MITHRA by Franz Cumont Search by google A century ago, Franz Cumont gathered together all the primary evidence about Mithraism: mentions in literary texts, inscriptions, sculptures, coins, excavated Mithraea. This he published in French in two volumes, "Textes et monuments figures relatifs aux mysteres de Mithra" (Brussels: Lamartin, 1896-9) Although it contained little information regarding the secret initiation rites, it remained the definitive text till a conference in 1970. Since then, scholars have rejected the books strong correlation with Iranian Zorasterism and have found many new connections to the Graeco-Roman pantheon of deities of a standard mystery-religion type. This the book is now in the public domain including a google on-line version as well as a lesser quality reprint. This version at sacred-texts.com has the many illustrations "It is thus of great interest to note that in certain regions of the Roman empire a pair of symbols was sometimes added to the tauroctony: namely, a lion and a cup. These symbols must represent the constellations Leo and Aquarius, the locations of the solstices of Taurus. Thus all of the figures found in the tauroctony represent constellations that had a special position in the sky during the Age of Taurus." Solving the Mithraic Mysteries" by The Age of = 6,429 - 4,286 bce time, where a Great Year equal 25,920 earth years, the Age of Gemini began around 6380 BCE. "Golden Age of Wisdom" aligned with the Age of Gemini; the Phoenician, Egyptian, Babylonian, Assyrian and Vedic cultures are testimony to the cult of the Twins who were born of the mating of the universal male principle symbolized by the Sun and universal female principle symbolized by Earth and the Moon. Gemini is the sign of writing and communication, we find that new languages were discovered and spread in this time. The Sumerians, who would eventually give the the art of writing to Mesopotamia, began around this period. and taxes also become part of life along with increased trade. farming based on cattle herding and cereal agriculture took hold along the Nile and as far south as the Sudan. may also be the time of the Great Flood although there is little agreement among scholars on this great historic occurrence. Although neolithic (wiki/Neolithic ) agriculture had by that time already reached the Pannonian plain, its spread may have been pushed by survivors of the The Orion Giant in the Story of the Ages The Giant represents the Constellation of Orion. In Ancient Egypt Orion was known as "The Soul of Osiris". It follows that The Giant, who is usually referred to as Narmer by Egyptologists after the catfish and the chisel emblems in the chiefs at the top of the Plate, is in fact Osiris, the Lord of Precession Ö as opposed to Osiris, the Lord of the Dead. The Giant appears to capture one of the Gemini Twins, perhaps in an attempt to halt the progression into the New Age of Taurus. More likely however he is giving the Twin his blessing in the closing minutes in the Age of Gemini. The scene is reminiscent of a person receiving a Knighthood for services rendered. The one figure represents the set of Gemini Twins since the Twin's body is facing forward towards the forthcoming Age of Taurus, while his face is looking back upon the Age of The Giant represents the constellation of Orion The constellation of Orion: the Soul of Osiris subtle references to Freemasonry are intentional. Copyright Audrey Fletcher 1999 the three Pyramids at Giza,located south-west of Cairo, are aligned exactly as the three middle stars of the constellation of Orion namely Alnitak, Alnilam and Mintaka. (center) with wife Rama and Lakshman are always shown to be ready for battle (with bow and arrow) as it is their to fight. Rama is shown having blue skin which is a characteristic of Vishnu The Age of Gemini (6380 BCE to 4220 BCE ) corresponded to the flourishing period of early Hinduism. It was under this sign that Rama, the seventh incarnation of Vishnu was manifested by the birth of the two pair of brothers: Rama and Lakshmana on the one hand, Satrughna and Bharata on the other. Rama Himself had twin sons: Lav and Kush (in harmony with the name of the constellation where the Sun was at that time.) Lav went to Russia from this we get the name of Slav. The other son, Kush went to China, hence we get the name Kushan. "For where your treasure is, there also will your heart be" Jesus said (Luke 12:34.) main page || site map ||
<urn:uuid:72908fd0-eb02-458d-a960-b2803e4f2981>
CC-MAIN-2013-48
http://www.carnaval.com/taurus/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164580801/warc/CC-MAIN-20131204134300-00021-ip-10-33-133-15.ec2.internal.warc.gz
en
0.9207
3,527
2.96875
3
Judith Pinkerton’s article Music Powers Potential was recently published on Recovery.org, where she will be a regular contributor talking about music therapy. The following is an excerpt of that article… Music Powers Potential: Good, Bad and Ugly How does music power up your life? I can’t imagine life without music. I love my music: it describes my life exactly. I can’t live without my headphones! If I don’t listen to my music I go into rage. Music is on all night to keep me sleeping. Stimulated by these comments, more ideas may spring forward as you reflect on the influence of music in your life. Is it possible that music not only stirs up the good, but the bad and the ugly, too? - What music creates a happy gathering place for folks, or creates conflict and war between people? - When does certain music trigger a memory that reminds you of a good time, or a bad one? - How does your favorite song describe your life when you achieve success, or survive problems? The Power of Music When considering all these ways music influences you, exactly how does the power of music activate your body? Music activates the central nervous system, stimulating whole body responses three ways: physiological, emotional, and behavioral. The invisible power of music influences neurochemicals, blood pressure, heart rate, galvanic skin response (chill bumps or sweating), and respiration. Life becomes more introspective when decoding the influence of music on physiology, emotions, behavior and thoughts. B.F. Skinner affirms that “thoughts are behaviors we haven’t learned to observe yet.” When we observe how thoughts influence behaviors, we tap into the effects of our mindset. We realize that our mindset is a collection of thoughts and beliefs that shape thought habits.3 Thought habits connect to music listening habits which link to physiological, emotional, and behavioral responses. It’s an endless cycle of connectedness. “You mean when I push play on music, that music’s really playing me?” ask clients in life recovery. “Yes,” is the answer. Exploring Music Listening Habits The cycle of connectedness begins to make sense when music listening habits are more deeply explored. A typical response is “music soothes the savage breast, or beast, or mindset.” Here is another way of understanding these four words as they relate to music listening habits. - Savage may refer to our instinctive responses when selecting music. When we scan the radio, iPod, cell, or other audio device, we push play when something feels good to us because we want to listen to it no matter what mood we’re in. - Breast may refer to our heart, or feelings. We may select music based upon our mood, what we’re feeling; or, what we desire, changing to a different mood. - Beast may refer to our physiological responses. We may want to slow down or rev up blood pressure, heart rate, or pace an athletic race with increased stamina. - Mindset refers to our thoughts, which influence behaviors. When we notice a desire to influence how we act, we pay attention to shifting our mindset to influence behavior. Music may influence thoughts or mindset, which evolve into behaviors. As we use music daily, we could be actively influencing all parts of our lives. Songs may describe life and grow to be life’s soundtrack. When working with clients in recovery, the music often describes their life journey, the broad continuum of depicting active addiction to desired recovery. ~JUDITH PINKERTON To read the full article Music Powers Potential: Good, Bad and Ugly click here… Reprint courtesy of Recovery.org
<urn:uuid:51519492-56b0-4392-9e45-0a755df8cd4a>
CC-MAIN-2019-35
http://judithpinkerton.com/music-powers-potential-good-bad-ugly/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313536.31/warc/CC-MAIN-20190818002820-20190818024820-00461.warc.gz
en
0.889591
794
2.515625
3
Böcklin or Boecklin, Arnold (both: ärˈnôlt bökˈlēn) [key], 1827–1901, Swiss painter. Most of his life was spent in Italy. With Feuerbach he led the group of painters known as "German Romans," who attempted to express an idealistic philosophy through art. His carefully constructed works are largely classical in theme and often theatrical in sentiment. Among his paintings are Island of the Dead (Metropolitan Mus.) and mythological frescoes (Basel). The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. See more Encyclopedia articles on: European Art, 1600 to the Present: Biographies
<urn:uuid:af04be10-1218-4ede-a0e3-da91259ab54c>
CC-MAIN-2014-15
http://www.factmonster.com/encyclopedia/people/bocklin-arnold.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539665.16/warc/CC-MAIN-20140416005219-00647-ip-10-147-4-33.ec2.internal.warc.gz
en
0.926828
154
2.5625
3
The rift in the Larsen C ice shelf in Antarctica now has a second branch, which is moving in the direction of the ice front, Swansea University researchers revealed after studying the latest satellite data. The main rift in Larsen C, which is likely to lead to one of the largest icebergs ever recorded, is currently 180 km long. The new branch of the rift is 15 km long. Last year, researchers from the UK's Project Midas, led by Swansea University, reported that the rift was growing fast. Now, just 20km of ice is keeping the 5,000 sq km piece from floating away. Professor Adrian Luckman of Swansea University College of Science, head of Project Midas, described the latest findings: "While the previous rift tip has not advanced, a new branch of the rift has been initiated. This is approximately 10km behind the previous tip, heading towards the ice-front. This is the first significant change to the rift since February of this year. Although the rift length has been static for several months, it has been steadily widening, at rates in excess of a metre per day. It is currently winter in Antarctica, therefore direct visual observations are rare and low resolution. Our observations of the rift are based on synthetic aperture radar (SAR) interferometry from ESA's Sentinel-1 satellites. Satellite radar interferometry allows a very precise monitoring of the rift development". Researchers say the loss of a piece a quarter of the size of Wales will leave the whole shelf vulnerable to future break-up. Larsen C is approximately 350m thick and floats on the seas at the edge of West Antarctica, holding back the flow of glaciers that feed into it. Professor Luckman said: "When it calves, the Larsen C Ice Shelf will lose more than 10% of its area to leave the ice front at its most retreated position ever recorded; this event will fundamentally change the landscape of the Antarctic Peninsula. We have previously shown that the new configuration will be less stable than it was prior to the rift, and that Larsen C may eventually follow the example of its neighbour Larsen B, which disintegrated in 2002 following a similar rift-induced calving event. The MIDAS Project will continue to monitor the development of the rift and assess its ongoing impact on the ice shelf. Further updates will be available on our blog (projectmidas.org), and on our Twitter feed" Explore further: Massive Antarctic ice shelf ready to break apart
<urn:uuid:35cf2557-f0f2-41b2-a65f-12c32b72234f>
CC-MAIN-2018-17
https://phys.org/news/2017-05-antarctic-ice-rift-revealed-latest.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945272.41/warc/CC-MAIN-20180421164646-20180421184646-00009.warc.gz
en
0.943212
510
3.34375
3
This course traces the development of world civilizations from approximately 1500 to the present. It examines the creation of “modern” patterns of thought, culture, society, and politics. Its global approach offers the student an opportunity to learn about the diversity of human social life and understand the historical convergences, divergences, and interrelations among peoples. We are all products of this history, and, in this course, we will critically reflect on the meaning of our shared global heritage, both for us as individuals, as well as for the larger society and times in which we live. In order to accomplish this, human actions must be situated, understood and analyzed in specific contexts. This lays the groundwork for an historical understanding of how the cultures and civilizations were created and developed in response to specific environments and needs. Topics include: - Cultures and civilizations - Forms of political organization - Forms of resistance and revolution - Worldviews and religions - Structures of economic organization - The arts and sciences While this course provides an overview of world history since 1500, the purpose of the course is not to teach you all you need to know about the subject. The primary objective of the course is to learn how to think critically about historical events and trends. With everything you study you will be encouraged to ask, “what was the significance of this in its historical context?,” and “what is its importance today?” The following books are available at the La Verne bookstore: - Kevin Reilly, Worlds of History: A Comparative Reader, Volume II, Bedford/St. Martin’s - J.M. Blaut, The Colonizer’s Model of the World, Guilford - Chinua Achebe, Things Fall Apart Texts must be brought to class on the day they will be discussed. Class meetings will be grounded in discussion of the assigned texts. Readings must be completed before the class meeting in which they will be discussed. This enables students to get the most out of the lectures and to participate effectively in discussion. Discussion: Each student will be assigned study questions to prepare for class discussion. During these discussions, you will not be expected to have fully developed points of view about the course materials. However, you are expected to participate. No one will be penalized for being wrong or imprecise, for expressing uncertainty or frustration, or for changing their mind. But it should be clear that you are trying, that you have done the readings and are working toward a mastery of the material. Questions: None of us, myself included, knows everything about the topics of this class. It is our responsibility to ask others who may know the answer, either in class, in office hours, or over dinner. I expect that you are learning the material, not that you know it. As much as possible, try not to be shy or embarrassed about what you don’t yet know. The biggest failure in learning any material, in college or in life, is to fail to ask questions about things you do not know. Availability: I expect that all of you, either alone or in groups, will contact me throughout the semester. I am almost always available to discuss the course material, or other life issues. Because I maintain an “open-door” policy, you should not hesitate to stop by my office during office hours–or at other times. If you would prefer to schedule a time during non-office hours, simply contact me by phone or email and we will schedule an appropriate time. Laptops and Cell Phones: Laptops may not be used is class. Cell phones must be turned off and put away during class meetings. The value of our meetings will hinge on your advance preparation and on your willingness to engage the issues actively in class. When you are doing the readings, keep in mind that you will be expected to participate in the debates outlined in the readings, reject some positions, embrace others, and defend the choices you make. Grades will be based on the following: - Study questions: 40% - Midterm: 20% - Final exam: 30% - Attendance and participation: 10% Study Questions: Once a week, students must hand in responses to an assigned set of study questions. These responses should be between 250 and 500 words in length. You should write down the question you are answering as well as your answer to the question. Question sets will be assigned on the first day of class. Exams: The midterm and the final will both be in-class exams. The midterm will pose a series of short-answer questions based on the course materials and lectures. The final will do the same and will also ask you to choose one of two essay questions. You will be asked to write an essay on one of the broad themes discussed in the course. Attendance and Participation: This grade will be measured based on attendance and preparedness (i.e. whether students are prepared to discuss the reading). Students who miss more than three classes will automatically suffer a deduction of one-third of a grade (e.g. a B+ becomes a B). Students who miss more than six classes will suffer a full grade deduction (e.g. a B+ becomes a C+). Schedule of Meetings and Required Readings (Sources can be found in Worlds of History.): Aug. 28 Introduction - Charles C. Mann, “1491” (http://www.theatlantic.com/doc/200203/mann) Aug. 30 Overseas Expansion in the early Modern Period, China and Europe, 1400-1600 - Source 15.1 _MF, AL, DL, LG, JK __________________________________ - Source 15.2_AG, LMar, CL, HT, __________________________________ - Source 15.3_EM, LT, AB, EA, SD, __________________________________ - Blaut, pp. 1-17 - What is “Eurocentric diffusionsm?” - How does Eurocentric diffusionism view colonialism? - Which cam first, European colonialism or European development? - What are the main tenets of uropean diffusionism? - What is the “myth of emptiness?” Sept 4 Overseas Expansion in the early Modern Period, China and Europe, 1400-1600 (cont’d) - Source 15.4___WW, GD, IS, RM, SC, BC, SH, DM_______________________________ - Source 15.5__SL, TS, CE, LMach, RP, GC, HD_________________________________ - Blaut, pp. 17-43 - How have notions of European superiority evolved? - What is the ethnographic study of ideas? - What would a non-diffusionist theory be? Sept. 6 Atlantic World Encounters: Europeans, Americans, and Africans, 1500-1850 - Source16.1___EA, AB, BC, SD________________________________ - Source 16.2__HD, MF, LG, SH_________________________________ - Source 16.3__AL, CL, SL, LMac_________________________________ - Source 16.4__RM, EM, IS, TS_________________________________ Sept. 11 Atlantic World Encounters: Europeans, Americans, and Africans, 1500-1850 (cont’d) - Source 16.5___HT, WW, AA, SC________________________________ - Source 16.6___GC, GD, CE, AG________________________________ - Source 16.7___JK, DL, AL, LMar________________________________ - Source 16.8___DM, RP, MS, LT________________________________ Sept. 13 State and Religion: Asian, Islamic, and Christian States, 1500-1800 - Source 17.1___EA, HD, AL, RM, SC________________________________ - Source 17.2___HT, GC, JK, DM, AG________________________________ - Source 17.3___AB, MF, CL, EM, LMar________________________________’ - Blaut, pp. 50-52, 94-102 - What is the European miracle? - Does European superiority explain colonialism or is it a consequence of colonialism? - How does the myth of rationality persist? Sept. 18 State and Religion: Asian, Islamic, and Christian States, 1500-1800 (cont’d) - Source 17.4___WW, GD, DL, RP, LT________________________________ - Source 17.5___BC, LG, SL, IS________________________________ - Source 17.6___AA, CE, AL, MS________________________________ - Source 17.7 ___SD, SH, LMac, TS________________________________ Sept. 20 Gender and Family: China, Southeast Asia, Europe, and “New Spain,” 1600-1750 - Source 18.1__EA, HT, AB, WW, BC_____________________________________ - Source 18.2__AA, SD, HD, GC, MF_________________________________ - Source 18.3__GD, LG, CE, SH, AL_____________________________________ - Blaut, pp. 108-119 - When did technological superiority begin in Europe? - How does China’s technology problematize the doctrine of European superiority? Sept. 25: Gender and Family: China, Southeast Asia, Europe, and “New Spain,” 1600-1750 (cont’d) - Source 18.4 __JK, LMac, RM, DM, EM, RP____________________________________ - Source 18.5 __IS, MS, TS, SC, AG_________________________________ - Source 18.6 __LMar, LT, JK, CL, DL, SL_________________________________ - Blaut, ch. 152-73 - Why did non-European regions decline after 1492? - What was feudalism? Why does Samir Amin prefer the term “tributary?” Sept. 27 The Scientific Revolution: Europe, the Ottoman Empire, China, Japan, and the Americas, 1600-1800 - Source 19.1____EA, AA, AB, SC____________________________ - Source 19.2 ___GC, SD, GD, HD________________________________ - Source 19.3 ___MF, LG, AG, SH________________________________ - Source 19.4 ___JK, ALeary, DL, CL________________________________ Oct. 2 The Scientific Revolution: Europe, the Ottoman Empire, China, Japan, and the Americas, 1600-1800 (cont’d) - Source 19.5____ALopez, SL, LMac, LMar_______________________________ - Source 19.6 ____RM, DM, EM, RP_______________________________ - Source 19.7 ____IS, TS, MS, HT_______________________________ - Source 19.8 ____LT, WW, BC, CE_______________________________ Oct. 4 Enlightenment and Revolution: Europe, the Americas, and India, 1650-1850 - Source 20.1 _____LT, IS, RM, ALopez______________________________ - Source 20.2 _____JK, MF, GC, EA______________________________ - Source 20.3 _____WW, TS, DM, SL______________________________ - Source 20.4 _____ALeary, LG, SD, AA______________________________ Oct. 9 NO CLASS Oct. 11 Enlightenment and Revolution: Europe, the Americas, and India, 1650-1850 (cont’d) - Source 20.5 _____BC, MS, EM, LMac,______________________________ - Source 20.6 _____DL, AG, GD, AB______________________________ - Source 20.7 _____CE, HT, RP, LMar______________________________ - Source 20.8 _____CL, SH, HD, SC______________________________ Oct. 16 Capitalism and the Industrial Revolution: Europe and the World, 1750-1900 - Source 21.1 _ EA, CL, AG, SC, LT, TS, AA__________________________________ - Source 21.2_ MF, CE, MS, LMar, JK, LG__________________________________ - Source 21.3 _ AG, DL, HD, AB, WW, RM, SL__________________________________ - Blaut, pp. 179-187 Oct. 18 Capitalism and the Industrial Revolution: Europe and the World, 1750-1900 (cont’d) - Source 21.4 _ LMar, BC, RP, LMac, ALeary, GC__________________________________ - Source 21.5 _ TS, SH, GD, IS, DM, ALopez__________________________________ - Source 21.6__ WW, HT, EM, MF, SD, EA_________________________________ - Blaut, pp. 187-206, 214-15 Oct. 23 MIDTERM Oct. 25 Colonized and Colonizers: Europeans in Africa and Asia, 1850-1930 - Source 22.1__ EA, HT, SH, BC, DL, CE, CL_________________________________ - Source 22.2 __ LG, EM, GD, RP, HD, MS, AG_________________________________ - Source 22.3__ DM, MF, LMac, AB, LMar, SC________________________________ - Achebe, chs. 1-6 Oct. 30 Colonized and Colonizers: Europeans in Africa and Asia, 1850-1930 (cont’d) - Source 22.4__ RP, SD, DM, ALeary, WW, JK__________________________________ - Source 22.5__ WW, LT, EA, ALopez, GC, RM_________________________________ - Source 22.6 __ MF, LG, TS, SL, AA, IS,_________________________________ - Achebe, chs. 7-13 Nov. 1 Westernization and Nationalism: Japan, India, Turkey, and Egypt, 1860-1950 - Source 23.1__ ALopez,_HT, EM, MF, SH_______________________________ - Source 23.2__ SL, GD, LMac, BC, RP________________________________ - Source 23.3__ IS,_AB, DL, HD, LMar________________________________ - Source 23.4__ LG, CE, MS, SC, CL, AG_________________________________ - Achebe, chs. 14-19 Nov. 6 Westernization and Nationalism: Japan, India, Turkey, and Egypt, 1860-1950 - Source 23.5___SD, LT, LG, DM, JK, IS________________________________ - Source 23.6___EA, TS, ALeary, ALopez, RM________________________________ - Source 23.7___LG, SL, WW, GC, AA________________________________ - Achebe, chs. 20-25 Nov. 8 World War I and Its Consequences: Europe and the Soviet Union, 1914-1920 - Source 24.1___HT, GD, AB, CE________________________________ - Source 24.2 __SD, EA, LG, EM_________________________________ - Source 24.3 __LMac, DL, MS, LT_________________________________ - Source 24.4 __TS, SL, MF, BC _________________________________ Nov. 13 World War I and Its Consequences: Europe and the Soviet Union, 1914-1920 (cont’d) - Source 24.5__HD, SC, RM, ALeary_________________________________ - Source 24.6 __WW, SH, RP, LMar_________________________________ - Source 24.7 __CL, AG, DM, ALopez_________________________________ - Source 24.8 __GC, JK, IS, AA_________________________________ Nov. 15 World War II and Mass Killing: Germany, the Soviet Union, Japan, and the United States, 1931-1945 - Source 25.1 ____CE, EM, LT, BC_____________________________ - Source 25.2 ____RM, RP, DM, IS______________________________ - Source 25.3 ____AB, LG, MS, MF, ALeary_______________________________ Nov. 20 World War II and Mass Killing: Germany, the Soviet Union, Japan, and the United States, 1931-1945 - Source 25.4 ___SC, SH, AG, JK, LMar_______________________________ - Source 25.5 ___GD, EA, DL, SL, ALopez________________________________ - Source 25.6 ___HD, WW, CL, GC, AA________________________________ - Source 25.7 ___HT, SD, LMac, TS_________________________________ Nov. 22 Thanksgiving (NO CLASS) Nov. 27 The Cold War and the Third World: China, Vietnam, Cuba, and Afghanistan, 1945-1989 - Source 26.1 _____ALeary, LMar, ALopez, AA______________________________ - Source 26.2_____JK, SL, GC, TS______________________________ - Source 26.3 ____LMac, BC, IS, MF_______________________________ - Source 26.4 ____MS, AG, DL, CL_______________________________ Nov. 29 The Cold War and the Third World: China, Vietnam, Cuba, and Afghanistan, 1945-1989 (cont’d) - Source 26.5 ____WW, SD, LT, DM_______________________________ - Source 26.6 ____RP, LG, SH, EA_______________________________ - Source 26.7____GD, HD, HT, EM_______________________________ - Source 26.8 ___CE, RM, AB, SC________________________________ Dec. 4 Resources and Environment: The Case of Water, 1945 to the Present - Source 27.1 ___CE, GD, RP________________________________ - Source 27.2 ___MS, LMac, JK________________________________ - Source 27.3 ___RM, HD, LG ________________________________ - Source 27.4 ___AG, BC, GC________________________________ - Source 27.5 ___AB, HT, SH________________________________ Dec. 6 Globalization, 1960 to the Present - Source 28.1 ____DM, AA, GC_______________________________ - Source 28.2 ____SC, EM, EA_______________________________ - Source 28.3 ____CL, MF, TS_______________________________ - Source 28.4 ____WW, ALeary, SD_______________________________ - Source 28.5 ____LMar, LT, ALopez_______________________________ - Source 28.6 ____DL, IS_______________________________ FINAL EXAM: Thursday, December 13, 10-1 The Department of History and Political Science mandates that all submitted work adhere to the Turabian/Chicago style delineated in Kate Turabian, et. al., A Manual for Writers of Term Papers, Theses, and Dissertations, University of Chicago Press (available at the Wilson Library Reference Desk). Exam Proctoring Guidelines: - One seat space between students when possible. - No bathroom breaks except in the case of illness or emergency. Student should discuss this circumstance with the proctor prior to the start of the exam. - No materials on the desk except for pens/pencils, bluebook or writing paper and exam. - Under no circumstances can students access electronic devices during the exam. - Exam proctors will note any violation of these rules and those will be considered in the final grade. Your work will be evaluated according to the following criteria: A— designates work of extraordinarily high quality; reflects unusually thorough and comprehensive understanding of issues at hand; presents a clearly identifiable thesis and argument that demonstrates cogent and creative development and support of ideas. B— designates work of high quality; reflects clearly organized and comprehensive understanding of issues and hand; presents substantive thesis and argument with evident development and support of ideas. C— designates work which minimally meets requirements set forward in assignment; reflects some organization and development of ideas, but develops argument in superficial or simplistic manner; may only address part of the assignment or be otherwise incomplete. D— designates work of poor quality which does not meet minimum requirements set forward in assignment; demonstrates poor organization of ideas and/or inattention to development of ideas, grammar, and spelling; treatment of material is superficial and/or simplistic; may indicate that student has not done reading assignments thoroughly. F— designates work that does not meet ANY of the standards set above or which is not handed in. Plagiarism is a prevalent but highly unethical practice. Plagiarism will result in the immediate failure of this course and disciplinary action which could lead to expulsion from the University. If you are having problems in the course, please come and talk to me about it rather than doing something that could put your entire college career in jeopardy. Plagiarism includes, but is not limited to the following: ·The direct copying of an:y source, such as written and verbal material, computer files, audio disks, video programs or musical scores, whether published or unpublished, in whole or part, without proper acknowledgment that it is someone else’s. ·Copying of any source in whole or part with only minor changes in wording or syntax, even with acknowledgment. ·Submitting as one’s own work a report, examination paper, computer file, lab report or other assignment that has been prepared by someone else. This includes research papers purchased from any other person or agency. ·The paraphrasing of another’s work or ideas without proper acknowledgment.
<urn:uuid:734a0298-9bbc-4c60-997b-f1a8a6afac3c>
CC-MAIN-2018-30
https://neidleman.com/syllabi-2/hist-102-world-civilization-1500-the-present/
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676588961.14/warc/CC-MAIN-20180715183800-20180715203800-00120.warc.gz
en
0.798211
4,434
3.5625
4
Fact Sheet 2008–3004 This fact sheet provides a high-level description of the GIS Weasel, a software system designed to aid users in preparing spatial information as input to lumped and distributed parameter environmental simulation models (ESMs). The GIS Weasel provides geographic information system (GIS) tools to help create maps of geographic features relevant to the application of a user’s ESM and to generate parameters from those maps. The operation of the GIS Weasel does not require a user to be a GIS expert, only that a user has an understanding of the spatial information requirements of the model. The GIS Weasel software system provides a GIS-based graphical user interface (GUI), C programming language executables, and general utility scripts. The software will run on any computing platform where ArcInfo Workstation (version 8.1 or later) and the GRID extension are accessible. The user controls the GIS Weasel by interacting with menus, maps, and tables. Posted March 2008 Viger, R.J., 2008, An overview of the GIS Weasel: U.S. Geological Survey Fact Sheet 2008–3004, 2 p.
<urn:uuid:7013671e-ccb9-402d-bfe4-7544ded4d2c0>
CC-MAIN-2019-43
https://pubs.usgs.gov/fs/2008/3004/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986653876.31/warc/CC-MAIN-20191014150930-20191014174430-00058.warc.gz
en
0.793757
242
2.609375
3
Everyone knows how important it is to keep reading not only while studying, but also during summer vacation. Reading during the summer while on vacation can be a real summer reading challenge, which should be stood up to with bravery. Summer reading programs were initiated in the 1890s and their primary aim was to make children (preferable from urban areas) read during their vacations and develop their reading skills. Despite the existence of lots of good summer reading programs in public libraries, there is no particular list of literature which should be read on vacations, unless instructors give them lists of reading materials. Individuals have to choose books to read themselves and write their essays later on. This influences individuals a lot and helps them not only to develop reading skills, but also to broaden their outlook. Good Summer Reads: Benefits Summer reading possesses a lot of advantages both for teachers and students: - Developing reading skills as a lifelong habit. - Keeping reading skills up among younger children. - Learning to analyze books and express feelings about them. - Generating interest in reading, in various book genres, libraries and movies based on books. - Providing an opportunity to families to spend more time together while reading. - Spending time wisely instead of watching TV and surfing the Web. - Writing summaries and reviews that analyze books from summer reading program. - Determining gaps connected with reading skills and their correction. There are a lot of problems and challenges individuals face while doing summer reading activities. To overcome them successfully, we’ve prepared a list of the most common difficulties and their solutions. Summer Reading Challenges and Solutions - The plot is difficult and the words are not easily understandable. No matter what the pupil’s age is, he or she can get consult online dictionaries and other sources, that help to explain some terminology, events, scientific facts, personalities, etc. - No desire to read the books listed. Very often offered books are not interesting for students and just do not fit their age and sphere of interests. Summer reading should encourage learners to read what they would like to and give them more opportunities to choose really involving books and stories. - Not paying enough attention to the details in the book. Having such a problem is a real summer reading challenge, especially when having to write essays and answering teacher’s questions. You will be assigned to analyze books you have chosen, or speak about them in class. Individuals are recommended to make notes while reading – write down facts, descriptions, events, which may be important for supporting your viewpoint. - Problems appearing while choosing books to read. By having an assignment to pick several books among millions available for summer reading, students face real difficulties. The best way out is to ask the teacher for help and advice, or go to the public library and look for summer reading programs there.
<urn:uuid:2f6a329c-bcd2-4a9a-986b-47c320246511>
CC-MAIN-2017-04
https://essayshark.com/blog/how-to-overcome-a-summer-reading-challenge/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00052-ip-10-171-10-70.ec2.internal.warc.gz
en
0.960891
582
3.09375
3
Asthma is the most common chronic childhood disease in the United States, affecting an estimated 6.8 million kids. The condition, which causes the airways to inflame and narrow, ranks as a leading cause of missed school days for children between the ages of 5 and 17. Nearly a quarter of kids with asthma in this age group report missing out on at least some events due to the disease. In fact, a March 2019 report from the American College of Allergy, Asthma and Immunology (ACAAI) noted that allergy sufferers have more difficulties in school – especially if they live in urban areas, their symptoms aren’t properly controlled, and they’re an ethnic minority. “We found associations between poor asthma status, poorer asthma control, lower lung function, more asthma symptoms, and decline in academic performance, says Daphne Koinis-Mitchell, PhD, lead author of the study, which was published in the ACAAI journal Annals of Allergy, Asthma and Immunology. “These associations were stronger in ethnic minority children, particularly Latino children.” Fortunately, medications can usually control children's wheezing, shortness of breath, and coughing so that they can enjoy all of their favorite activities. Most of these medicines are given with metered-dose inhalers (MDIs), or "puffers." (There are also dry-powder inhalers). Lots of children and their parents, however, find it hard to use an inhaler correctly, and that leads to thousands of preventable emergency-department visits and hospitalizations, as well as countless lost days of school and work. You have to wonder: What is it about these medications that makes them so hard to use, and is there anything we can do to make it easier? The answer to the second question is yes – so keep reading. Inhalers look pretty simple. They have two pieces: a metal cylinder that contains medicine, and an L-shaped plastic holder that ends in a mouthpiece. The cylinder sits in the holder; when a child (or a parent) presses down on the cylinder, a fine mist of medicine sprays from the mouthpiece, hopefully into the child's lungs. Some inhalers even include built-in counters that display how many doses are left. From there, however, things get more complicated. For example, if a child puts the mouthpiece directly in her mouth (a logical thing to do), much of the medicine hits the back of her throat and never reaches her lungs. For this reason, doctors prefer that children also use a plastic tube called a spacer, or valved holding chamber. The inhaler fits into one end of the spacer and the other end goes in the mouth. Many spacers come with a face mask which makes it easier for young children to use. Spacers allow the droplets of medicine to spread out and slow down, so that more of the medicine reaches the lungs. They also hold the medicine as a mist until the child is ready to inhale so that even a crying, uncooperative kid can get the right dose of medicine. It would be great if an inhaler came with a spacer, but you have to buy one separately; the price ranges from less than $10 to $40. It's important to keep it clean. Even though having a spacer greatly increases the chance that your child will breathe in her asthma medicine properly, using an inhaler and a spacer still requires following ten steps correctly. In fact, a recent study in the Journal of Asthma found that only one caregiver out of the 169 observed got all ten steps right. But that's not to say it can't be done right, once you know how. Doctors classify asthma as being either intermittent, mild-persistent, moderate-persistent, or severe-persistent. These grades help them guide the use of medicines, which work in very different ways. Some drugs, called bronchodilators, are known as rescue medicines. They quickly open up the airways and immediately relieve the coughing, wheezing, and chest tightness that patients have during an attack. Kids with asthma should keep a rescue inhaler at home and at school. To help prevent future asthma attacks, doctors will also prescribe controller medicine – usually an inhaled corticosteroid – that reduces underlying inflammation in the lungs. Taking controller medicine every day is essential for keeping many kids with asthma healthy and active. However, it works slowly and won't do anything to relieve the symptoms of an asthma attack. I advise parents and kids to keep their controller medicine in a place where they can't miss it. Leave it in front of the coffee pot, by the toothbrush, even next to the car keys – anywhere that will help you remember to use the drug as prescribed. Many people find it difficult to take a daily medicine for a chronic illness, and they find it even harder to give daily medicine to a child. Research shows that only one in five children take their asthma controller medication as often as their doctor prescribes. It's a tough concept to grasp: You have to take your medicine while you're well in order to stay well. But it's crucial to establish a routine to make giving medicine a habit. Since proper asthma care is both critical and challenging, national guidelines recommend that children with asthma see their doctor at least every six months and leave with an asthma action plan. This plan is simply a sheet that uses a stoplight approach to help families remember what medications to give when a child is in the "green zone" (no symptoms), the "yellow zone" (some coughing and/or wheezing, waking up at night from a cough), or the "red zone" (having a really hard time breathing). Many doctors now have an asthma educator in their office who specializes in helping families understand how to better manage the condition. At this time of year, it's important to discuss allergies too. Doctors group asthma together with allergic rhinitis in a category we call "atopic disease." These conditions develop when the immune system responds inappropriately to substances that it mistakes for threats, such as pollen, mold, animal saliva, and dust mites. While allergies trigger asthma symptoms in many children, they don't cause every case of asthma. Kids exposed to irritants such as cigarette smoke can develop asthma without having allergies. Some children have exercise-induced asthma and may find that symptoms come on within a few minutes of being active. For these reasons, an allergy assessment is considered routine in evaluating and managing asthma, to make sure a child is getting the proper medicine and avoiding allergens. A good medical history is a great start to the process. Sometimes allergy skin or blood tests can help identify triggers. You should never hesitate to call your child's doctor if his medicines don't seem to be working. Ultimately you all share the same goal: for your child to practically forget that he has asthma – but not forget his meds! Some kids have obvious symptoms such as wheezing, chest tightness, or shortness of breath. Other children may just cough. In fact, many parents are so used to their child coughing at night or during exercise that they never suspect that he has a serious and treatable problem. But any cough that goes on longer than three weeks should be checked. At the visit, your child's doctor will ask about any triggers that seem to make the symptoms worse. Asthma and allergies are closely related; for many people, anything that worsens allergies can cause asthma attacks. Other signs, such as swelling of the lower eyelids, narrowed nasal passages, or a crease across the tip of the nose, can all point to allergies. It's tricky to diagnose young children because colds and other viruses can cause wheezing. But kids ages 6 and older can take breathing tests. A peak flow test is quickest and easiest; it uses a handheld plastic tube to measure how fast your child can expel air from his lungs. When possible, doctors prefer to give a computerized test called spirometry, or pulmonary-function testing. As with a peak flow, the child breathes as hard as he can into a tube. Sensors then calculate total lung capacity. A computer program checks the best three breaths based on sex, age, and height. The results help point to asthma as well as a variety of other conditions that affect breathing. Originally published in the May 2015 issue of Parents magazine.
<urn:uuid:2516e65c-911a-4508-b37d-3927be16dbf3>
CC-MAIN-2019-22
https://www.parents.com/health/asthma/taking-control-of-asthma-treatment/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256147.15/warc/CC-MAIN-20190520202108-20190520224108-00225.warc.gz
en
0.967387
1,736
3.265625
3
In 48 States and federal court, a single juror’s vote to acquit is enough to prevent a conviction. But two States, Louisiana and Oregon, have long punished people based on 10-to-2 verdicts. In this case, the defendant Mr. Ramos was convicted of second degree murder in a Louisiana court by a 10-to-2 jury verdict. Instead of the mistrial he would have received almost anywhere else, Ramos was sentenced to life without parole. He appealed his conviction by a nonunanimous jury as an unconstitutional denial of the Sixth Amendment right to a jury trial. COURT’S ANALYSIS & CONCLUSIONS Justice Gorsuch delivered the opinion of the Court, which reversed Ramos’s conviction on the basis that the Sixth Amendment right to a jury trial—as incorporated against the States by way of the Fourteenth Amendment—requires a unanimous verdict to convict a defendant of a serious offense. First, the Court reasoned that a “trial by an impartial jury” requires that a jury must reach a unanimous verdict in order to convict. “Juror unanimity emerged as a vital common law right in 14th-century England, appeared in the early American state constitutions, and provided the backdrop against which the Sixth Amendment was drafted and ratified . . . Thus, if the jury trial right requires a unanimous verdict in federal court, it requires no less in state court.” ~Justice Gorsuch, United States Supreme Court Second, the Court reasoned Louisiana’s and Oregon’s unconventional jury trial schemes had a long history of being viewed as unconstitutional. It stated that jury unanimity was essential to the right to a fair trial guaranteed by the Sixth Amendment. Furthermore, research has demonstrated that a unanimous jury requirement strengthens deliberations, ensures more accurate outcomes, fosters greater consideration of minority viewpoints, and boosts confidence in verdicts and the justice system. Finally, the Supreme Court overturned its deeply divided decision in Apodaca v. Oregon, which concluded that jury unanimity was required in federal criminal trials but not in state criminal trials. In short, the Court reasoned that modern empirical evidence and subsequent case law have undermined Apodaca’s reasoning and conclusions. My opinion? The Court’s decision was a major victory for protecting the rights of criminal defendants. The Court recognized that jury unanimity has historically been an essential element of the Sixth Amendment right to an impartial trial by jury in criminal cases. Also, the potential impact of Ramos v. Louisiana extends far beyond issues of criminal procedure, as the justices’ spirited debate over when and whether to overturn precedent took center stage and illustrated deep divisions within the Court. Please contact my office if you, a friend or family member are charged with a crime. Hiring an experienced and competent criminal defense attorney is the best step toward justice.
<urn:uuid:f208b0aa-b442-4a43-9439-d1295d0ed22a>
CC-MAIN-2022-27
https://ransom-lawfirm.com/guilty-verdicts-must-be-unanimous/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103033816.0/warc/CC-MAIN-20220624213908-20220625003908-00661.warc.gz
en
0.961398
588
2.703125
3
Digital signatures have significantly streamlined the way we authenticate documents in a variety of sectors, from banking and finance to healthcare and government. With the surge in remote work, online transactions, and digital documentation, the need for secure and legally compliant methods of signing documents has never been more crucial. However, there’s a common misconception that digital signatures are merely an electronic form of traditional signatures. In reality, they are a powerful amalgamation of technology and law, designed to provide unparalleled security and compliance. In this blog post, we’ll delve into several key areas where the tech-law blend of digital signatures makes a significant difference. 1. Legally Binding Authentication When you sign a document with a pen, its authenticity is validated by the unique characteristics of your handwriting. Similarly, digital signatures provide an electronic fingerprint that is unique to both the signer and the document. This fingerprint or ‘hash’ is encrypted and stored in a way that can easily be verified for authenticity, making electronic signatures legally binding in many jurisdictions around the world. For instance, if you’re applying for a personal loan, a digital signature on your application form ensures that the document hasn’t been tampered with after you’ve signed it. It also verifies that it was indeed you who signed the document, thus providing strong legal footing similar to a handwritten signature. 2. Two-Factor Authentication (2FA) The blend of technology and law is highly apparent in the use of Two-Factor Authentication (2FA) with digital signatures. This means that to sign a document digitally, you’re often required to prove your identity using two separate methods, like something you know (a password) and something you have (a smart card or mobile device). This multi-tier authentication is consistent with legal requirements for identifying the signatory, thereby enhancing the security of the transaction. 3. Audit Trails Digital signatures come with an embedded audit trail that logs every action taken on the document. This includes who viewed it, who signed it, and when these activities occurred. Not only does this provide an added layer of security, but it also complies with legal requirements for traceability and non-repudiation. Audit trails can play a crucial role in resolving disputes and ensuring that all parties involved in a transaction are held accountable for their actions. Another important feature of digital signatures is the use of time-stamping. This shows exactly when the document was signed, adding another layer of authenticity to it. Time-stamps are particularly important in scenarios where the timing of a signature can have legal implications, like in contractual agreements or financial transactions. What’s more, these time-stamps are synchronized with an authoritative clock, ensuring that they meet the legal criteria for proving the exact time at which an agreement was entered into. 5. Data Integrity Digital signatures ensure the integrity of the document. Once a document is signed digitally, any alterations to the content will invalidate the signature. This is crucial for maintaining the document’s reliability and also satisfies the legal requirement for ensuring that a signed document remains unchanged. In sectors like healthcare and legal services, where the integrity of information can have life-changing implications, this feature of digital signatures is invaluable. 6. International Recognition Digital signatures enjoy a global appeal, largely due to international frameworks and agreements that recognize their legality. Laws like the Electronic Signatures in Global and National Commerce Act (E-SIGN) in the United States and the Electronic Identification and Trust Services (eIDAS) in the European Union set guidelines that are followed worldwide. This international recognition enhances the scope of digital transactions and ensures that your digitally signed document in one country can easily be validated and accepted in another, conforming to global legal standards. 7. Long-Term Preservation Traditionally, paper documents deteriorate over time, and ink fades away, raising concerns about their long-term preservation. Digital signatures solve this problem through technology that enables long-term signature validation. Using secure algorithms, digital signatures can be verified years after the document was originally signed, satisfying long-term legal retention requirements and ensuring the document’s enduring reliability. 8. Chain Of Custody Digital signatures enable a comprehensive chain of custody, which refers to the sequence of actions and individuals who have handled or modified the document. This provides a transparent process for the legal system to follow if a document ever becomes a part of a legal procedure or investigation. The technology of the digital signature ensures that every individual in the chain is clearly identified, time-stamped, and logged, meeting stringent legal compliance criteria. 9. Environmentally Friendly While the primary focus is often on security and legal compliance, it’s worth noting that digital signatures are also environmentally friendly. The digital process eliminates the need for paper, ink, and physical storage space. This alignment with global sustainability goals could also have potential legal implications in the future as environmental laws continue to evolve. In this way, the adoption of digital signatures also helps in fulfilling corporate social responsibilities. 10. Instant Verification Unlike traditional methods that might require weeks or months to validate a document’s authenticity, digital signatures offer instant verification. The advanced technology behind digital signatures allows for real-time validation of the document, the signature, and the signer’s credentials. This rapid verification process not only enhances operational efficiency but also meets legal requirements for timely documentation and record-keeping. The blend of technology and law in digital signatures goes far beyond simple electronic validation of an individual’s agreement or intent. From international recognition to instant verification, digital signatures encapsulate a wide range of features aimed at enhancing security, ensuring compliance, and even contributing to environmental sustainability. As our world becomes more interconnected and businesses increasingly go digital, the multi-faceted advantages of digital signatures continue to gain relevance. By taking into account both technological and legal aspects, digital signatures offer a holistic solution for authenticating documents in today’s fast-paced world. Whether it’s personal loans or corporate mergers, healthcare documentation or legal proceedings, the role of digital signatures is indispensable and will likely become even more integral in the future. Featured Image by Andrea Piacquadio
<urn:uuid:7c273f50-37d0-4a9e-b4ab-a728a2db6f4b>
CC-MAIN-2023-50
https://www.killerrobots.org/2023/09/03/compliance-and-security-the-tech-law-blend-of-digital-signatures/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100912.91/warc/CC-MAIN-20231209134916-20231209164916-00538.warc.gz
en
0.910571
1,280
2.828125
3
This is the best tl;dr I could make, original reduced by 73%. (I’m a bot) Maori history and British colonization would be taught to all children under the new rules, which supporters say reflects a renewed recognition of Maori history and culture. The proposed curriculum includes the arrival of M?ori in New Zealand, early colonial history, immigration and colonisation of New Zealand and the Treaty of Waitangi – a founding treaty that was signed between representatives of the British Crown and more than 500 Indigenous Maori chiefs in 1840. New Zealand marks Waitangi Day on Saturday, which is named after the Waitangi region in the North Island of New Zealand, where the founding treaty was signed.
<urn:uuid:4f548cef-e37d-4c37-8630-82dfff3af4ce>
CC-MAIN-2022-05
https://moderncannabislifestyle.com/new-zealand-plans-national-syllabus-on-maori-and-uk-colonial-history-worldnews/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301730.31/warc/CC-MAIN-20220120065949-20220120095949-00331.warc.gz
en
0.96931
149
2.984375
3